diff --git a/examples/azuread/202-azuread-application-federated-credentials/configurations.tfvars b/examples/azuread/202-azuread-application-federated-credentials/configurations.tfvars new file mode 100644 index 0000000000..d6ab21993a --- /dev/null +++ b/examples/azuread/202-azuread-application-federated-credentials/configurations.tfvars @@ -0,0 +1,24 @@ +azuread_applications = { + aks_auth_app = { + application_name = "app-najeeb-sandbox-aksadmin" + } +} + +azuread_federated_credentials = { + cred1 = { + display_name = "app-wi-fed01" + subject = "system:serviceaccount:demo:workload-identity-sa" + oidc_issuer_url = "https://westeurope.oic.prod-aks.azure.com/" + azuread_application = { + key = "aks_auth_app" + } + } +} + +azuread_service_principals = { + aks_auth_app = { + azuread_application = { + key = "aks_auth_app" + } + } +} \ No newline at end of file diff --git a/examples/managed_service_identity/101-mi-federated_credentials/configuration.tfvars b/examples/managed_service_identity/101-mi-federated_credentials/configuration.tfvars new file mode 100644 index 0000000000..4fa515f030 --- /dev/null +++ b/examples/managed_service_identity/101-mi-federated_credentials/configuration.tfvars @@ -0,0 +1,27 @@ +resource_groups = { + msi_region1 = { + name = "security-rg1" + region = "region1" + } +} + +managed_identities = { + workload_system_mi = { + name = "demo-mi-wi" + resource_group_key = "msi_region1" + } +} + +mi_federated_credentials = { + cred1 = { + name = "mi-wi-demo01" + subject = "system:serviceaccount:demo:workload-identity-sa" + oidc_issuer_url = "https://westeurope.oic.prod-aks.azure.com/" + managed_identity = { + key = "workload_system_mi" + } + resource_group = { + key = "msi_region1" + } + } +} \ No newline at end of file