Created
December 26, 2024 21:27
-
-
Save SuryenduB/0a81d846643fc653d1b8e9a773e69907 to your computer and use it in GitHub Desktop.
terraform debug output
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
{"@odata.context":"https://graph.microsoft.com/beta/$metadata#directoryObjects","value":[]} | |
============================= End AzureAD Response ============================: timestamp="2024-12-26T22:23:35.530+0100" | |
2024-12-26T22:23:35.532+0100 [INFO] provider.terraform-provider-azuread_v3.0.2_x5.exe: 2024/12/26 22:23:35 [DEBUG] ============================ Begin AzureAD Request ============================ | |
Request ID: 8384b410-e315-9a3e-08cf-dc9c1b14c3b0 | |
GET /beta/groups/066b5643-f931-46f1-855f-3bac0b6a95e3/memberOf HTTP/1.1 | |
Host: graph.microsoft.com | |
User-Agent: HashiCorp Terraform/1.9.3 (+https://www.terraform.io) Terraform Plugin SDK/2.34.0 terraform-provider-azuread/3.0.2 HashiCorp/go-azure-sdk (Go-http-Client/1.1 MicrosoftGraph-memberof/beta) pid-222c6c49-1b0a-5959-a213-6608f9eb8820 | |
Accept: application/json; charset=utf-8; IEEE754Compatible=false | |
Content-Type: application/json; charset=utf-8 | |
Odata-Maxversion: 4.0 | |
Odata-Version: 4.0 | |
Accept-Encoding: gzip | |
============================= End AzureAD Request =============================: timestamp="2024-12-26T22:23:35.530+0100" | |
2024-12-26T22:23:35.533+0100 [INFO] provider.terraform-provider-azuread_v3.0.2_x5.exe: 2024/12/26 22:23:35 [DEBUG] GET https://graph.microsoft.com/beta/groups/066b5643-f931-46f1-855f-3bac0b6a95e3/memberOf: timestamp="2024-12-26T22:23:35.530+0100" | |
2024-12-26T22:23:35.621+0100 [INFO] provider.terraform-provider-azuread_v3.0.2_x5.exe: 2024/12/26 22:23:35 [DEBUG] ============================ Begin AzureAD Response =========================== | |
GET https://graph.microsoft.com/v1.0/users/13287284-3cf8-46ed-983f-ec51c51c74d1/manager | |
Request ID: affc8327-0970-209d-8c51-34fb8a234962 | |
HTTP/2.0 404 Not Found | |
Cache-Control: no-cache | |
Client-Request-Id: f1343da6-f09e-436b-83a3-1c660ec58b2d | |
Content-Type: application/json | |
Date: Thu, 26 Dec 2024 21:23:35 GMT | |
Request-Id: f1343da6-f09e-436b-83a3-1c660ec58b2d | |
Strict-Transport-Security: max-age=31536000 | |
Vary: Accept-Encoding | |
X-Ms-Ags-Diagnostic: {"ServerInfo":{"DataCenter":"Germany West Central","Slice":"E","Ring":"4","ScaleUnit":"000","RoleInstance":"FR1PEPF0000079B"}} | |
X-Ms-Resource-Unit: 1 | |
{"error":{"code":"Request_ResourceNotFound","message":"Resource 'manager' does not exist or one of its queried reference-property objects are not present.","innerError":{"date":"2024-12-26T21:23:35","request-id":"f1343da6-f09e-436b-83a3-1c660ec58b2d","client-request-id":"f1343da6-f09e-436b-83a3-1c660ec58b2d"}}} | |
============================= End AzureAD Response ============================: timestamp="2024-12-26T22:23:35.620+0100" | |
data.azuread_user.user["[email protected]"]: Read complete after 1s [id=/users/13287284-3cf8-46ed-983f-ec51c51c74d1] | |
2024-12-26T22:23:35.695+0100 [INFO] provider.terraform-provider-azuread_v3.0.2_x5.exe: 2024/12/26 22:23:35 [DEBUG] ============================ Begin AzureAD Response =========================== | |
GET https://graph.microsoft.com/beta/groups/066b5643-f931-46f1-855f-3bac0b6a95e3/memberOf | |
Request ID: 8384b410-e315-9a3e-08cf-dc9c1b14c3b0 | |
HTTP/2.0 200 OK | |
Cache-Control: no-cache | |
Client-Request-Id: 859994b6-3a2b-416d-9e35-8924bdb6c041 | |
Content-Type: application/json;odata.metadata=minimal;odata.streaming=true;IEEE754Compatible=false;charset=utf-8 | |
Date: Thu, 26 Dec 2024 21:23:35 GMT | |
Odata-Version: 4.0 | |
Request-Id: 859994b6-3a2b-416d-9e35-8924bdb6c041 | |
Strict-Transport-Security: max-age=31536000 | |
Vary: Accept-Encoding | |
X-Ms-Ags-Diagnostic: {"ServerInfo":{"DataCenter":"Germany West Central","Slice":"E","Ring":"4","ScaleUnit":"000","RoleInstance":"FR1PEPF0000102D"}} | |
X-Ms-Resource-Unit: 2 | |
{"@odata.context":"https://graph.microsoft.com/beta/$metadata#directoryObjects","value":[]} | |
============================= End AzureAD Response ============================: timestamp="2024-12-26T22:23:35.695+0100" | |
2024-12-26T22:23:35.697+0100 [INFO] provider.terraform-provider-azuread_v3.0.2_x5.exe: 2024/12/26 22:23:35 [DEBUG] ============================ Begin AzureAD Response =========================== | |
GET https://graph.microsoft.com/beta/groups/a6ef256a-0724-4f3c-8ddc-9fdc30e7acec/memberOf | |
Request ID: 2240bc4a-517d-24b1-0488-98c2f2ab82bf | |
HTTP/2.0 200 OK | |
Cache-Control: no-cache | |
Client-Request-Id: 5bdff473-c36c-473a-ac62-4773d5a62467 | |
Content-Type: application/json;odata.metadata=minimal;odata.streaming=true;IEEE754Compatible=false;charset=utf-8 | |
Date: Thu, 26 Dec 2024 21:23:34 GMT | |
Odata-Version: 4.0 | |
Request-Id: 5bdff473-c36c-473a-ac62-4773d5a62467 | |
Strict-Transport-Security: max-age=31536000 | |
Vary: Accept-Encoding | |
X-Ms-Ags-Diagnostic: {"ServerInfo":{"DataCenter":"Germany West Central","Slice":"E","Ring":"4","ScaleUnit":"000","RoleInstance":"FR1PEPF0000136E"}} | |
X-Ms-Resource-Unit: 2 | |
{"@odata.context":"https://graph.microsoft.com/beta/$metadata#directoryObjects","value":[]} | |
============================= End AzureAD Response ============================: timestamp="2024-12-26T22:23:35.695+0100" | |
2024-12-26T22:23:35.700+0100 [WARN] Provider "registry.terraform.io/hashicorp/azuread" produced an invalid plan for azuread_group.pimgroup1, but we are tolerating it because it is using the legacy plugin SDK. | |
The following problems may be the cause of any confusing errors from downstream operations: | |
- .mail_enabled: planned value cty.False for a non-computed attribute | |
- .writeback_enabled: planned value cty.False for a non-computed attribute | |
- .description: planned value cty.StringVal("") for a non-computed attribute | |
- .provisioning_options: planned value cty.SetValEmpty(cty.String) for a non-computed attribute | |
- .types: planned value cty.SetValEmpty(cty.String) for a non-computed attribute | |
- .administrative_unit_ids: planned value cty.SetValEmpty(cty.String) for a non-computed attribute | |
- .behaviors: planned value cty.SetValEmpty(cty.String) for a non-computed attribute | |
- .theme: planned value cty.StringVal("") for a non-computed attribute | |
2024-12-26T22:23:35.701+0100 [WARN] Provider "registry.terraform.io/hashicorp/azuread" produced an invalid plan for azuread_group.pimapprover, but we are tolerating it because it is using the legacy plugin SDK. | |
The following problems may be the cause of any confusing errors from downstream operations: | |
- .administrative_unit_ids: planned value cty.SetValEmpty(cty.String) for a non-computed attribute | |
- .assignable_to_role: planned value cty.False for a non-computed attribute | |
- .behaviors: planned value cty.SetValEmpty(cty.String) for a non-computed attribute | |
- .theme: planned value cty.StringVal("") for a non-computed attribute | |
- .description: planned value cty.StringVal("") for a non-computed attribute | |
- .mail_enabled: planned value cty.False for a non-computed attribute | |
- .writeback_enabled: planned value cty.False for a non-computed attribute | |
- .provisioning_options: planned value cty.SetValEmpty(cty.String) for a non-computed attribute | |
- .types: planned value cty.SetValEmpty(cty.String) for a non-computed attribute | |
2024-12-26T22:23:35.702+0100 [DEBUG] ReferenceTransformer: "azuread_group_role_management_policy.pimpolicy1" references: [] | |
2024-12-26T22:23:35.703+0100 [DEBUG] ReferenceTransformer: "azuread_privileged_access_group_eligibility_schedule.example[\"/users/13287284-3cf8-46ed-983f-ec51c51c74d1\"]" references: [] | |
azuread_privileged_access_group_eligibility_schedule.example["/users/13287284-3cf8-46ed-983f-ec51c51c74d1"]: Refreshing state... [id=066b5643-f931-46f1-855f-3bac0b6a95e3_member_65816827-eef3-4110-a0b7-33dccc6df46c] | |
2024-12-26T22:23:35.706+0100 [INFO] provider.terraform-provider-azuread_v3.0.2_x5.exe: 2024/12/26 22:23:35 [DEBUG] ============================ Begin AzureAD Request ============================ | |
Request ID: a78495d5-1f61-43c1-8973-e7855dd64ce0 | |
GET /v1.0/identityGovernance/privilegedAccess/group/eligibilitySchedules/066b5643-f931-46f1-855f-3bac0b6a95e3_member_65816827-eef3-4110-a0b7-33dccc6df46c HTTP/1.1 | |
Host: graph.microsoft.com | |
User-Agent: HashiCorp Terraform/1.9.3 (+https://www.terraform.io) Terraform Plugin SDK/2.34.0 terraform-provider-azuread/3.0.2 HashiCorp/go-azure-sdk (Go-http-Client/1.1 MicrosoftGraph-privilegedaccessgroupeligibilityschedule/v1.0) pid-222c6c49-1b0a-5959-a213-6608f9eb8820 | |
Accept: application/json; charset=utf-8; IEEE754Compatible=false | |
Content-Type: application/json; charset=utf-8 | |
Odata-Maxversion: 4.0 | |
Odata-Version: 4.0 | |
Accept-Encoding: gzip | |
============================= End AzureAD Request =============================: timestamp="2024-12-26T22:23:35.706+0100" | |
azuread_group_role_management_policy.pimpolicy1: Refreshing state... [id=Group_066b5643-f931-46f1-855f-3bac0b6a95e3_eee4d9e9-b21a-4e00-a0e2-eba77233bb3a] | |
2024-12-26T22:23:35.708+0100 [INFO] provider.terraform-provider-azuread_v3.0.2_x5.exe: 2024/12/26 22:23:35 [DEBUG] GET https://graph.microsoft.com/v1.0/identityGovernance/privilegedAccess/group/eligibilitySchedules/066b5643-f931-46f1-855f-3bac0b6a95e3_member_65816827-eef3-4110-a0b7-33dccc6df46c: timestamp="2024-12-26T22:23:35.706+0100" | |
2024-12-26T22:23:35.710+0100 [INFO] provider.terraform-provider-azuread_v3.0.2_x5.exe: 2024/12/26 22:23:35 [DEBUG] ============================ Begin AzureAD Request ============================ | |
Request ID: b510d172-68e4-f1e3-03a7-92c3bb009c87 | |
GET /v1.0/policies/roleManagementPolicies/Group_066b5643-f931-46f1-855f-3bac0b6a95e3_eee4d9e9-b21a-4e00-a0e2-eba77233bb3a?%24expand=%2A HTTP/1.1 | |
Host: graph.microsoft.com | |
User-Agent: HashiCorp Terraform/1.9.3 (+https://www.terraform.io) Terraform Plugin SDK/2.34.0 terraform-provider-azuread/3.0.2 HashiCorp/go-azure-sdk (Go-http-Client/1.1 MicrosoftGraph-rolemanagementpolicy/v1.0) pid-222c6c49-1b0a-5959-a213-6608f9eb8820 | |
Accept: application/json; charset=utf-8; IEEE754Compatible=false | |
Content-Type: application/json; charset=utf-8 | |
Odata-Maxversion: 4.0 | |
Odata-Version: 4.0 | |
Accept-Encoding: gzip | |
============================= End AzureAD Request =============================: timestamp="2024-12-26T22:23:35.710+0100" | |
2024-12-26T22:23:35.711+0100 [INFO] provider.terraform-provider-azuread_v3.0.2_x5.exe: 2024/12/26 22:23:35 [DEBUG] GET https://graph.microsoft.com/v1.0/policies/roleManagementPolicies/Group_066b5643-f931-46f1-855f-3bac0b6a95e3_eee4d9e9-b21a-4e00-a0e2-eba77233bb3a?%24expand=%2A: timestamp="2024-12-26T22:23:35.710+0100" | |
2024-12-26T22:23:36.002+0100 [INFO] provider.terraform-provider-azuread_v3.0.2_x5.exe: 2024/12/26 22:23:36 [DEBUG] ============================ Begin AzureAD Response =========================== | |
GET https://graph.microsoft.com/v1.0/policies/roleManagementPolicies/Group_066b5643-f931-46f1-855f-3bac0b6a95e3_eee4d9e9-b21a-4e00-a0e2-eba77233bb3a?%24expand=%2A | |
Request ID: b510d172-68e4-f1e3-03a7-92c3bb009c87 | |
HTTP/2.0 200 OK | |
Cache-Control: private | |
Client-Request-Id: aaf64ab6-4fef-42ea-a9bf-b73686c88f75 | |
Content-Type: application/json;odata.metadata=minimal;odata.streaming=true;IEEE754Compatible=false;charset=utf-8 | |
Date: Thu, 26 Dec 2024 21:23:35 GMT | |
Odata-Version: 4.0 | |
Request-Id: aaf64ab6-4fef-42ea-a9bf-b73686c88f75 | |
Strict-Transport-Security: max-age=31536000 | |
Vary: Accept-Encoding | |
X-Ms-Ags-Diagnostic: {"ServerInfo":{"DataCenter":"Germany West Central","Slice":"E","Ring":"4","ScaleUnit":"000","RoleInstance":"FR1PEPF000017D8"}} | |
{"@odata.context":"https://graph.microsoft.com/v1.0/$metadata#policies/roleManagementPolicies(effectiveRules(),rules())/$entity","id":"Group_066b5643-f931-46f1-855f-3bac0b6a95e3_eee4d9e9-b21a-4e00-a0e2-eba77233bb3a","displayName":"Group","description":"Group","isOrganizationDefault":false,"scopeId":"066b5643-f931-46f1-855f-3bac0b6a95e3","scopeType":"Group","lastModifiedDateTime":"2024-12-26T21:23:32.477Z","lastModifiedBy":{"displayName":"TerraformCli","id":null},"[email protected]":"https://graph.microsoft.com/v1.0/$metadata#policies/roleManagementPolicies('Group_066b5643-f931-46f1-855f-3bac0b6a95e3_eee4d9e9-b21a-4e00-a0e2-eba77233bb3a')/effectiveRules","effectiveRules":[{"@odata.type":"#microsoft.graph.unifiedRoleManagementPolicyEnablementRule","id":"Enablement_Admin_Eligibility","enabledRules":[],"target":{"caller":"Admin","operations":["all"],"level":"Eligibility","inheritableSettings":[],"enforcedSettings":[]}},{"@odata.type":"#microsoft.graph.unifiedRoleManagementPolicyExpirationRule","id":"Expiration_Admin_Eligibility","isExpirationRequired":true,"maximumDuration":"P365D","target":{"caller":"Admin","operations":["all"],"level":"Eligibility","inheritableSettings":[],"enforcedSettings":[]}},{"@odata.type":"#microsoft.graph.unifiedRoleManagementPolicyNotificationRule","id":"Notification_Admin_Admin_Eligibility","notificationType":"Email","recipientType":"Admin","notificationLevel":"All","isDefaultRecipientsEnabled":true,"notificationRecipients":[],"target":{"caller":"Admin","operations":["all"],"level":"Eligibility","inheritableSettings":[],"enforcedSettings":[]}},{"@odata.type":"#microsoft.graph.unifiedRoleManagementPolicyNotificationRule","id":"Notification_Requestor_Admin_Eligibility","notificationType":"Email","recipientType":"Requestor","notificationLevel":"All","isDefaultRecipientsEnabled":true,"notificationRecipients":[],"target":{"caller":"Admin","operations":["all"],"level":"Eligibility","inheritableSettings":[],"enforcedSettings":[]}},{"@odata.type":"#microsoft.graph.unifiedRoleManagementPolicyNotificationRule","id":"Notification_Approver_Admin_Eligibility","notificationType":"Email","recipientType":"Approver","notificationLevel":"All","isDefaultRecipientsEnabled":true,"notificationRecipients":[],"target":{"caller":"Admin","operations":["all"],"level":"Eligibility","inheritableSettings":[],"enforcedSettings":[]}},{"@odata.type":"#microsoft.graph.unifiedRoleManagementPolicyEnablementRule","id":"Enablement_Admin_Assignment","enabledRules":["Justification"],"target":{"caller":"Admin","operations":["all"],"level":"Assignment","inheritableSettings":[],"enforcedSettings":[]}},{"@odata.type":"#microsoft.graph.unifiedRoleManagementPolicyExpirationRule","id":"Expiration_Admin_Assignment","isExpirationRequired":true,"maximumDuration":"P180D","target":{"caller":"Admin","operations":["all"],"level":"Assignment","inheritableSettings":[],"enforcedSettings":[]}},{"@odata.type":"#microsoft.graph.unifiedRoleManagementPolicyNotificationRule","id":"Notification_Admin_Admin_Assignment","notificationType":"Email","recipientType":"Admin","notificationLevel":"All","isDefaultRecipientsEnabled":true,"notificationRecipients":[],"target":{"caller":"Admin","operations":["all"],"level":"Assignment","inheritableSettings":[],"enforcedSettings":[]}},{"@odata.type":"#microsoft.graph.unifiedRoleManagementPolicyNotificationRule","id":"Notification_Requestor_Admin_Assignment","notificationType":"Email","recipientType":"Requestor","notificationLevel":"All","isDefaultRecipientsEnabled":true,"notificationRecipients":[],"target":{"caller":"Admin","operations":["all"],"level":"Assignment","inheritableSettings":[],"enforcedSettings":[]}},{"@odata.type":"#microsoft.graph.unifiedRoleManagementPolicyNotificationRule","id":"Notification_Approver_Admin_Assignment","notificationType":"Email","recipientType":"Approver","notificationLevel":"All","isDefaultRecipientsEnabled":true,"notificationRecipients":[],"target":{"caller":"Admin","operations":["all"],"level":"Assignment","inheritableSettings":[],"enforcedSettings":[]}},{"@odata.type":"#microsoft.graph.unifiedRoleManagementPolicyApprovalRule","id":"Approval_EndUser_Assignment","target":{"caller":"EndUser","operations":["all"],"level":"Assignment","inheritableSettings":[],"enforcedSettings":[]},"setting":{"isApprovalRequired":false,"isApprovalRequiredForExtension":false,"isRequestorJustificationRequired":true,"approvalMode":"SingleStage","approvalStages":[{"approvalStageTimeOutInDays":1,"isApproverJustificationRequired":true,"escalationTimeInMinutes":0,"isEscalationEnabled":false,"primaryApprovers":[],"escalationApprovers":[]}]}},{"@odata.type":"#microsoft.graph.unifiedRoleManagementPolicyAuthenticationContextRule","id":"AuthenticationContext_EndUser_Assignment","isEnabled":false,"claimValue":null,"target":{"caller":"EndUser","operations":["all"],"level":"Assignment","inheritableSettings":[],"enforcedSettings":[]}},{"@odata.type":"#microsoft.graph.unifiedRoleManagementPolicyEnablementRule","id":"Enablement_EndUser_Assignment","enabledRules":["Justification","Ticketing"],"target":{"caller":"EndUser","operations":["all"],"level":"Assignment","inheritableSettings":[],"enforcedSettings":[]}},{"@odata.type":"#microsoft.graph.unifiedRoleManagementPolicyExpirationRule","id":"Expiration_EndUser_Assignment","isExpirationRequired":false,"maximumDuration":"PT16H","target":{"caller":"EndUser","operations":["all"],"level":"Assignment","inheritableSettings":[],"enforcedSettings":[]}},{"@odata.type":"#microsoft.graph.unifiedRoleManagementPolicyNotificationRule","id":"Notification_Admin_EndUser_Assignment","notificationType":"Email","recipientType":"Admin","notificationLevel":"All","isDefaultRecipientsEnabled":true,"notificationRecipients":[],"target":{"caller":"EndUser","operations":["all"],"level":"Assignment","inheritableSettings":[],"enforcedSettings":[]}},{"@odata.type":"#microsoft.graph.unifiedRoleManagementPolicyNotificationRule","id":"Notification_Requestor_EndUser_Assignment","notificationType":"Email","recipientType":"Requestor","notificationLevel":"All","isDefaultRecipientsEnabled":true,"notificationRecipients":[],"target":{"caller":"EndUser","operations":["all"],"level":"Assignment","inheritableSettings":[],"enforcedSettings":[]}},{"@odata.type":"#microsoft.graph.unifiedRoleManagementPolicyNotificationRule","id":"Notification_Approver_EndUser_Assignment","notificationType":"Email","recipientType":"Approver","notificationLevel":"All","isDefaultRecipientsEnabled":true,"notificationRecipients":[],"target":{"caller":"EndUser","operations":["all"],"level":"Assignment","inheritableSettings":[],"enforcedSettings":[]}}],"[email protected]":"https://graph.microsoft.com/v1.0/$metadata#policies/roleManagementPolicies('Group_066b5643-f931-46f1-855f-3bac0b6a95e3_eee4d9e9-b21a-4e00-a0e2-eba77233bb3a')/rules","rules":[{"@odata.type":"#microsoft.graph.unifiedRoleManagementPolicyEnablementRule","id":"Enablement_Admin_Eligibility","enabledRules":[],"target":{"caller":"Admin","operations":["all"],"level":"Eligibility","inheritableSettings":[],"enforcedSettings":[]}},{"@odata.type":"#microsoft.graph.unifiedRoleManagementPolicyExpirationRule","id":"Expiration_Admin_Eligibility","isExpirationRequired":true,"maximumDuration":"P365D","target":{"caller":"Admin","operations":["all"],"level":"Eligibility","inheritableSettings":[],"enforcedSettings":[]}},{"@odata.type":"#microsoft.graph.unifiedRoleManagementPolicyNotificationRule","id":"Notification_Admin_Admin_Eligibility","notificationType":"Email","recipientType":"Admin","notificationLevel":"All","isDefaultRecipientsEnabled":true,"notificationRecipients":[],"target":{"caller":"Admin","operations":["all"],"level":"Eligibility","inheritableSettings":[],"enforcedSettings":[]}},{"@odata.type":"#microsoft.graph.unifiedRoleManagementPolicyNotificationRule","id":"Notification_Requestor_Admin_Eligibility","notificationType":"Email","recipientType":"Requestor","notificationLevel":"All","isDefaultRecipientsEnabled":true,"notificationRecipients":[],"target":{"caller":"Admin","operations":["all"],"level":"Eligibility","inheritableSettings":[],"enforcedSettings":[]}},{"@odata.type":"#microsoft.graph.unifiedRoleManagementPolicyNotificationRule","id":"Notification_Approver_Admin_Eligibility","notificationType":"Email","recipientType":"Approver","notificationLevel":"All","isDefaultRecipientsEnabled":true,"notificationRecipients":[],"target":{"caller":"Admin","operations":["all"],"level":"Eligibility","inheritableSettings":[],"enforcedSettings":[]}},{"@odata.type":"#microsoft.graph.unifiedRoleManagementPolicyEnablementRule","id":"Enablement_Admin_Assignment","enabledRules":["Justification"],"target":{"caller":"Admin","operations":["all"],"level":"Assignment","inheritableSettings":[],"enforcedSettings":[]}},{"@odata.type":"#microsoft.graph.unifiedRoleManagementPolicyExpirationRule","id":"Expiration_Admin_Assignment","isExpirationRequired":true,"maximumDuration":"P180D","target":{"caller":"Admin","operations":["all"],"level":"Assignment","inheritableSettings":[],"enforcedSettings":[]}},{"@odata.type":"#microsoft.graph.unifiedRoleManagementPolicyNotificationRule","id":"Notification_Admin_Admin_Assignment","notificationType":"Email","recipientType":"Admin","notificationLevel":"All","isDefaultRecipientsEnabled":true,"notificationRecipients":[],"target":{"caller":"Admin","operations":["all"],"level":"Assignment","inheritableSettings":[],"enforcedSettings":[]}},{"@odata.type":"#microsoft.graph.unifiedRoleManagementPolicyNotificationRule","id":"Notification_Requestor_Admin_Assignment","notificationType":"Email","recipientType":"Requestor","notificationLevel":"All","isDefaultRecipientsEnabled":true,"notificationRecipients":[],"target":{"caller":"Admin","operations":["all"],"level":"Assignment","inheritableSettings":[],"enforcedSettings":[]}},{"@odata.type":"#microsoft.graph.unifiedRoleManagementPolicyNotificationRule","id":"Notification_Approver_Admin_Assignment","notificationType":"Email","recipientType":"Approver","notificationLevel":"All","isDefaultRecipientsEnabled":true,"notificationRecipients":[],"target":{"caller":"Admin","operations":["all"],"level":"Assignment","inheritableSettings":[],"enforcedSettings":[]}},{"@odata.type":"#microsoft.graph.unifiedRoleManagementPolicyApprovalRule","id":"Approval_EndUser_Assignment","target":{"caller":"EndUser","operations":["all"],"level":"Assignment","inheritableSettings":[],"enforcedSettings":[]},"setting":{"isApprovalRequired":false,"isApprovalRequiredForExtension":false,"isRequestorJustificationRequired":true,"approvalMode":"SingleStage","approvalStages":[{"approvalStageTimeOutInDays":1,"isApproverJustificationRequired":true,"escalationTimeInMinutes":0,"isEscalationEnabled":false,"primaryApprovers":[],"escalationApprovers":[]}]}},{"@odata.type":"#microsoft.graph.unifiedRoleManagementPolicyAuthenticationContextRule","id":"AuthenticationContext_EndUser_Assignment","isEnabled":false,"claimValue":null,"target":{"caller":"EndUser","operations":["all"],"level":"Assignment","inheritableSettings":[],"enforcedSettings":[]}},{"@odata.type":"#microsoft.graph.unifiedRoleManagementPolicyEnablementRule","id":"Enablement_EndUser_Assignment","enabledRules":["Justification","Ticketing"],"target":{"caller":"EndUser","operations":["all"],"level":"Assignment","inheritableSettings":[],"enforcedSettings":[]}},{"@odata.type":"#microsoft.graph.unifiedRoleManagementPolicyExpirationRule","id":"Expiration_EndUser_Assignment","isExpirationRequired":false,"maximumDuration":"PT16H","target":{"caller":"EndUser","operations":["all"],"level":"Assignment","inheritableSettings":[],"enforcedSettings":[]}},{"@odata.type":"#microsoft.graph.unifiedRoleManagementPolicyNotificationRule","id":"Notification_Admin_EndUser_Assignment","notificationType":"Email","recipientType":"Admin","notificationLevel":"All","isDefaultRecipientsEnabled":true,"notificationRecipients":[],"target":{"caller":"EndUser","operations":["all"],"level":"Assignment","inheritableSettings":[],"enforcedSettings":[]}},{"@odata.type":"#microsoft.graph.unifiedRoleManagementPolicyNotificationRule","id":"Notification_Requestor_EndUser_Assignment","notificationType":"Email","recipientType":"Requestor","notificationLevel":"All","isDefaultRecipientsEnabled":true,"notificationRecipients":[],"target":{"caller":"EndUser","operations":["all"],"level":"Assignment","inheritableSettings":[],"enforcedSettings":[]}},{"@odata.type":"#microsoft.graph.unifiedRoleManagementPolicyNotificationRule","id":"Notification_Approver_EndUser_Assignment","notificationType":"Email","recipientType":"Approver","notificationLevel":"All","isDefaultRecipientsEnabled":true,"notificationRecipients":[],"target":{"caller":"EndUser","operations":["all"],"level":"Assignment","inheritableSettings":[],"enforcedSettings":[]}}]} | |
============================= End AzureAD Response ============================: timestamp="2024-12-26T22:23:36.002+0100" | |
2024-12-26T22:23:36.009+0100 [INFO] provider.terraform-provider-azuread_v3.0.2_x5.exe: 2024/12/26 22:23:36 [DEBUG] ============================ Begin AzureAD Request ============================ | |
Request ID: c4db2e9d-fd26-6332-dd27-21afa3c55715 | |
GET /v1.0/policies/roleManagementPolicyAssignments?%24filter=scopeType+eq+%27Group%27+and+scopeId+eq+%27066b5643-f931-46f1-855f-3bac0b6a95e3%27+and+policyId+eq+%27Group_066b5643-f931-46f1-855f-3bac0b6a95e3_eee4d9e9-b21a-4e00-a0e2-eba77233bb3a%27 HTTP/1.1 | |
Host: graph.microsoft.com | |
User-Agent: HashiCorp Terraform/1.9.3 (+https://www.terraform.io) Terraform Plugin SDK/2.34.0 terraform-provider-azuread/3.0.2 HashiCorp/go-azure-sdk (Go-http-Client/1.1 MicrosoftGraph-rolemanagementpolicyassignment/v1.0) pid-222c6c49-1b0a-5959-a213-6608f9eb8820 | |
Accept: application/json; charset=utf-8; IEEE754Compatible=false | |
Content-Type: application/json; charset=utf-8 | |
Odata-Maxversion: 4.0 | |
Odata-Version: 4.0 | |
Accept-Encoding: gzip | |
============================= End AzureAD Request =============================: timestamp="2024-12-26T22:23:36.003+0100" | |
2024-12-26T22:23:36.010+0100 [INFO] provider.terraform-provider-azuread_v3.0.2_x5.exe: 2024/12/26 22:23:36 [DEBUG] GET https://graph.microsoft.com/v1.0/policies/roleManagementPolicyAssignments?%24filter=scopeType+eq+%27Group%27+and+scopeId+eq+%27066b5643-f931-46f1-855f-3bac0b6a95e3%27+and+policyId+eq+%27Group_066b5643-f931-46f1-855f-3bac0b6a95e3_eee4d9e9-b21a-4e00-a0e2-eba77233bb3a%27: timestamp="2024-12-26T22:23:36.003+0100" | |
2024-12-26T22:23:36.246+0100 [INFO] provider.terraform-provider-azuread_v3.0.2_x5.exe: 2024/12/26 22:23:36 [DEBUG] ============================ Begin AzureAD Response =========================== | |
GET https://graph.microsoft.com/v1.0/identityGovernance/privilegedAccess/group/eligibilitySchedules/066b5643-f931-46f1-855f-3bac0b6a95e3_member_65816827-eef3-4110-a0b7-33dccc6df46c | |
Request ID: a78495d5-1f61-43c1-8973-e7855dd64ce0 | |
HTTP/2.0 200 OK | |
Cache-Control: private | |
Client-Request-Id: 4b5757b3-d842-49b6-b024-ff5d121f07c3 | |
Content-Type: application/json;odata.metadata=minimal;odata.streaming=true;IEEE754Compatible=false;charset=utf-8 | |
Date: Thu, 26 Dec 2024 21:23:35 GMT | |
Odata-Version: 4.0 | |
Request-Id: 4b5757b3-d842-49b6-b024-ff5d121f07c3 | |
Strict-Transport-Security: max-age=31536000 | |
Vary: Accept-Encoding | |
X-Ms-Ags-Diagnostic: {"ServerInfo":{"DataCenter":"Germany West Central","Slice":"E","Ring":"4","ScaleUnit":"000","RoleInstance":"FR1PEPF000007A8"}} | |
{"@odata.context":"https://graph.microsoft.com/v1.0/$metadata#identityGovernance/privilegedAccess/group/eligibilitySchedules/$entity","id":"066b5643-f931-46f1-855f-3bac0b6a95e3_member_65816827-eef3-4110-a0b7-33dccc6df46c","createdDateTime":"2024-12-26T19:33:07.483Z","modifiedDateTime":"0001-01-01T08:00:00Z","createdUsing":"65816827-eef3-4110-a0b7-33dccc6df46c","status":"Provisioned","principalId":"13287284-3cf8-46ed-983f-ec51c51c74d1","accessId":"member","groupId":"066b5643-f931-46f1-855f-3bac0b6a95e3","memberType":"direct","scheduleInfo":{"startDateTime":"2024-12-26T19:33:07.483Z","recurrence":null,"expiration":{"type":"afterDateTime","endDateTime":"2025-01-25T19:33:07.313Z","duration":null}}} | |
============================= End AzureAD Response ============================: timestamp="2024-12-26T22:23:36.246+0100" | |
2024-12-26T22:23:36.249+0100 [INFO] provider.terraform-provider-azuread_v3.0.2_x5.exe: 2024/12/26 22:23:36 [DEBUG] ============================ Begin AzureAD Request ============================ | |
Request ID: 251f8761-af47-acf2-c9a8-458329c57bde | |
GET /v1.0/identityGovernance/privilegedAccess/group/eligibilityScheduleRequests?%24filter=groupId+eq+%27066b5643-f931-46f1-855f-3bac0b6a95e3%27+and+targetScheduleId+eq+%27066b5643-f931-46f1-855f-3bac0b6a95e3_member_65816827-eef3-4110-a0b7-33dccc6df46c%27&%24orderby=createdDateTime+desc HTTP/1.1 | |
Host: graph.microsoft.com | |
User-Agent: HashiCorp Terraform/1.9.3 (+https://www.terraform.io) Terraform Plugin SDK/2.34.0 terraform-provider-azuread/3.0.2 HashiCorp/go-azure-sdk (Go-http-Client/1.1 MicrosoftGraph-privilegedaccessgroupeligibilityschedulerequest/v1.0) pid-222c6c49-1b0a-5959-a213-6608f9eb8820 | |
Accept: application/json; charset=utf-8; IEEE754Compatible=false | |
Content-Type: application/json; charset=utf-8 | |
Odata-Maxversion: 4.0 | |
Odata-Version: 4.0 | |
Accept-Encoding: gzip | |
============================= End AzureAD Request =============================: timestamp="2024-12-26T22:23:36.246+0100" | |
2024-12-26T22:23:36.250+0100 [INFO] provider.terraform-provider-azuread_v3.0.2_x5.exe: 2024/12/26 22:23:36 [DEBUG] GET https://graph.microsoft.com/v1.0/identityGovernance/privilegedAccess/group/eligibilityScheduleRequests?%24filter=groupId+eq+%27066b5643-f931-46f1-855f-3bac0b6a95e3%27+and+targetScheduleId+eq+%27066b5643-f931-46f1-855f-3bac0b6a95e3_member_65816827-eef3-4110-a0b7-33dccc6df46c%27&%24orderby=createdDateTime+desc: timestamp="2024-12-26T22:23:36.246+0100" | |
2024-12-26T22:23:36.375+0100 [INFO] provider.terraform-provider-azuread_v3.0.2_x5.exe: 2024/12/26 22:23:36 [DEBUG] ============================ Begin AzureAD Response =========================== | |
GET https://graph.microsoft.com/v1.0/policies/roleManagementPolicyAssignments?%24filter=scopeType+eq+%27Group%27+and+scopeId+eq+%27066b5643-f931-46f1-855f-3bac0b6a95e3%27+and+policyId+eq+%27Group_066b5643-f931-46f1-855f-3bac0b6a95e3_eee4d9e9-b21a-4e00-a0e2-eba77233bb3a%27 | |
Request ID: c4db2e9d-fd26-6332-dd27-21afa3c55715 | |
HTTP/2.0 200 OK | |
Cache-Control: private | |
Client-Request-Id: 29ddc187-d6d2-4b1b-8934-a960df9ab7c5 | |
Content-Type: application/json;odata.metadata=minimal;odata.streaming=true;IEEE754Compatible=false;charset=utf-8 | |
Date: Thu, 26 Dec 2024 21:23:35 GMT | |
Odata-Version: 4.0 | |
Request-Id: 29ddc187-d6d2-4b1b-8934-a960df9ab7c5 | |
Strict-Transport-Security: max-age=31536000 | |
Vary: Accept-Encoding | |
X-Ms-Ags-Diagnostic: {"ServerInfo":{"DataCenter":"Germany West Central","Slice":"E","Ring":"4","ScaleUnit":"000","RoleInstance":"FR1PEPF0000136B"}} | |
{"@odata.context":"https://graph.microsoft.com/v1.0/$metadata#policies/roleManagementPolicyAssignments","value":[{"id":"Group_066b5643-f931-46f1-855f-3bac0b6a95e3_eee4d9e9-b21a-4e00-a0e2-eba77233bb3a_member","policyId":"Group_066b5643-f931-46f1-855f-3bac0b6a95e3_eee4d9e9-b21a-4e00-a0e2-eba77233bb3a","scopeId":"066b5643-f931-46f1-855f-3bac0b6a95e3","scopeType":"Group","roleDefinitionId":"member"}]} | |
============================= End AzureAD Response ============================: timestamp="2024-12-26T22:23:36.375+0100" | |
2024-12-26T22:23:36.382+0100 [WARN] Provider "registry.terraform.io/hashicorp/azuread" produced an invalid plan for azuread_group_role_management_policy.pimpolicy1, but we are tolerating it because it is using the legacy plugin SDK. | |
The following problems may be the cause of any confusing errors from downstream operations: | |
- .active_assignment_rules: block count in plan (1) disagrees with count in config (0) | |
- .eligible_assignment_rules: block count in plan (1) disagrees with count in config (0) | |
- .notification_rules: block count in plan (1) disagrees with count in config (0) | |
2024-12-26T22:23:36.876+0100 [INFO] provider.terraform-provider-azuread_v3.0.2_x5.exe: 2024/12/26 22:23:36 [DEBUG] ============================ Begin AzureAD Response =========================== | |
GET https://graph.microsoft.com/v1.0/identityGovernance/privilegedAccess/group/eligibilityScheduleRequests?%24filter=groupId+eq+%27066b5643-f931-46f1-855f-3bac0b6a95e3%27+and+targetScheduleId+eq+%27066b5643-f931-46f1-855f-3bac0b6a95e3_member_65816827-eef3-4110-a0b7-33dccc6df46c%27&%24orderby=createdDateTime+desc | |
Request ID: 251f8761-af47-acf2-c9a8-458329c57bde | |
HTTP/2.0 200 OK | |
Cache-Control: private | |
Client-Request-Id: feada0a5-e7ab-4e53-bb55-a3baffa214ff | |
Content-Type: application/json;odata.metadata=minimal;odata.streaming=true;IEEE754Compatible=false;charset=utf-8 | |
Date: Thu, 26 Dec 2024 21:23:36 GMT | |
Odata-Version: 4.0 | |
Request-Id: feada0a5-e7ab-4e53-bb55-a3baffa214ff | |
Strict-Transport-Security: max-age=31536000 | |
Vary: Accept-Encoding | |
X-Ms-Ags-Diagnostic: {"ServerInfo":{"DataCenter":"Germany West Central","Slice":"E","Ring":"4","ScaleUnit":"000","RoleInstance":"FR1PEPF00000C1D"}} | |
{"@odata.context":"https://graph.microsoft.com/v1.0/$metadata#identityGovernance/privilegedAccess/group/eligibilityScheduleRequests","value":[{"id":"65816827-eef3-4110-a0b7-33dccc6df46c","status":"Provisioned","createdDateTime":"2024-12-26T19:33:07.307Z","completedDateTime":"2024-12-26T19:33:07.313Z","approvalId":null,"customData":null,"action":"adminAssign","isValidationOnly":false,"justification":"as requested","principalId":"13287284-3cf8-46ed-983f-ec51c51c74d1","accessId":"member","groupId":"066b5643-f931-46f1-855f-3bac0b6a95e3","targetScheduleId":"066b5643-f931-46f1-855f-3bac0b6a95e3_member_65816827-eef3-4110-a0b7-33dccc6df46c","createdBy":{"application":null,"device":null,"user":{"displayName":null,"id":"82008b05-3cc1-4981-8792-f5354e4c031c"}},"scheduleInfo":{"startDateTime":"2024-12-26T19:33:07.3119125Z","recurrence":null,"expiration":{"type":"afterDuration","endDateTime":null,"duration":"P30D"}},"ticketInfo":{"ticketNumber":null,"ticketSystem":null}}]} | |
============================= End AzureAD Response ============================: timestamp="2024-12-26T22:23:36.876+0100" | |
2024-12-26T22:23:36.879+0100 [WARN] Provider "registry.terraform.io/hashicorp/azuread" produced an invalid plan for azuread_privileged_access_group_eligibility_schedule.example["/users/13287284-3cf8-46ed-983f-ec51c51c74d1"], but we are tolerating it because it is using the legacy plugin SDK. | |
The following problems may be the cause of any confusing errors from downstream operations: | |
- .ticket_number: planned value cty.StringVal("") for a non-computed attribute | |
- .ticket_system: planned value cty.StringVal("") for a non-computed attribute | |
2024-12-26T22:23:36.880+0100 [DEBUG] provider.stdio: received EOF, stopping recv loop: err="rpc error: code = Unavailable desc = error reading from server: EOF" | |
2024-12-26T22:23:36.887+0100 [INFO] provider: plugin process exited: plugin=.terraform/providers/registry.terraform.io/hashicorp/azuread/3.0.2/windows_amd64/terraform-provider-azuread_v3.0.2_x5.exe id=24976 | |
2024-12-26T22:23:36.888+0100 [DEBUG] provider: plugin exited | |
2024-12-26T22:23:36.888+0100 [DEBUG] building apply graph to check for errors | |
2024-12-26T22:23:36.889+0100 [DEBUG] ProviderTransformer: "azuread_group_role_management_policy.pimpolicy1 (expand)" (*terraform.nodeExpandApplyableResource) needs provider["registry.terraform.io/hashicorp/azuread"] | |
2024-12-26T22:23:36.890+0100 [DEBUG] ProviderTransformer: "azuread_privileged_access_group_eligibility_schedule.example (expand)" (*terraform.nodeExpandApplyableResource) needs provider["registry.terraform.io/hashicorp/azuread"] | |
2024-12-26T22:23:36.890+0100 [DEBUG] ProviderTransformer: "data.azuread_user.user (expand)" (*terraform.nodeExpandApplyableResource) needs provider["registry.terraform.io/hashicorp/azuread"] | |
2024-12-26T22:23:36.890+0100 [DEBUG] ProviderTransformer: "azuread_group_role_management_policy.pimpolicy1" (*terraform.NodeApplyableResourceInstance) needs provider["registry.terraform.io/hashicorp/azuread"] | |
2024-12-26T22:23:36.890+0100 [DEBUG] ProviderTransformer: "azuread_group.pimgroup1 (expand)" (*terraform.nodeExpandApplyableResource) needs provider["registry.terraform.io/hashicorp/azuread"] | |
2024-12-26T22:23:36.891+0100 [DEBUG] ProviderTransformer: "azuread_group.pimapprover (expand)" (*terraform.nodeExpandApplyableResource) needs provider["registry.terraform.io/hashicorp/azuread"] | |
2024-12-26T22:23:36.891+0100 [DEBUG] pruning unused provider["registry.terraform.io/hashicorp/time"] | |
2024-12-26T22:23:36.891+0100 [DEBUG] ReferenceTransformer: "azuread_group.pimgroup1 (expand)" references: [] | |
2024-12-26T22:23:36.891+0100 [DEBUG] ReferenceTransformer: "azuread_group.pimapprover (expand)" references: [] | |
2024-12-26T22:23:36.891+0100 [DEBUG] ReferenceTransformer: "azuread_group_role_management_policy.pimpolicy1 (expand)" references: [azuread_group.pimgroup1 (expand)] | |
2024-12-26T22:23:36.892+0100 [DEBUG] ReferenceTransformer: "local.user_ids (expand)" references: [var.user_emails data.azuread_user.user (expand)] | |
2024-12-26T22:23:36.892+0100 [DEBUG] ReferenceTransformer: "provider[\"registry.terraform.io/hashicorp/azuread\"]" references: [] | |
2024-12-26T22:23:36.892+0100 [DEBUG] ReferenceTransformer: "azuread_privileged_access_group_eligibility_schedule.example (expand)" references: [local.user_ids (expand) azuread_group.pimgroup1 (expand)] | |
2024-12-26T22:23:36.892+0100 [DEBUG] ReferenceTransformer: "data.azuread_user.user (expand)" references: [var.user_emails] | |
2024-12-26T22:23:36.893+0100 [DEBUG] ReferenceTransformer: "var.user_emails" references: [] | |
2024-12-26T22:23:36.893+0100 [DEBUG] ReferenceTransformer: "azuread_group_role_management_policy.pimpolicy1" references: [azuread_group.pimgroup1 (expand)] | |
2024-12-26T22:23:36.893+0100 [DEBUG] pruneUnusedNodes: azuread_privileged_access_group_eligibility_schedule.example (expand) is no longer needed, removing | |
2024-12-26T22:23:36.893+0100 [DEBUG] pruneUnusedNodes: azuread_group.pimapprover (expand) is no longer needed, removing | |
2024-12-26T22:23:36.893+0100 [DEBUG] pruneUnusedNodes: local.user_ids (expand) is no longer needed, removing | |
2024-12-26T22:23:36.894+0100 [DEBUG] pruneUnusedNodes: data.azuread_user.user (expand) is no longer needed, removing | |
Terraform used the selected providers to generate the following execution plan. Resource actions are indicated with the following symbols: | |
~ update in-place | |
Terraform will perform the following actions: | |
# azuread_group_role_management_policy.pimpolicy1 will be updated in-place | |
~ resource "azuread_group_role_management_policy" "pimpolicy1" { | |
id = "Group_066b5643-f931-46f1-855f-3bac0b6a95e3_eee4d9e9-b21a-4e00-a0e2-eba77233bb3a" | |
# (4 unchanged attributes hidden) | |
~ activation_rules { | |
# (6 unchanged attributes hidden) | |
- approval_stage { | |
} | |
} | |
# (3 unchanged blocks hidden) | |
} | |
Plan: 0 to add, 1 to change, 0 to destroy. | |
2024-12-26T22:23:36.896+0100 [INFO] backend/local: apply calling Apply | |
2024-12-26T22:23:36.897+0100 [DEBUG] Building and walking apply graph for NormalMode plan | |
2024-12-26T22:23:36.897+0100 [DEBUG] ProviderTransformer: "data.azuread_user.user (expand)" (*terraform.nodeExpandApplyableResource) needs provider["registry.terraform.io/hashicorp/azuread"] | |
2024-12-26T22:23:36.897+0100 [DEBUG] ProviderTransformer: "azuread_group_role_management_policy.pimpolicy1" (*terraform.NodeApplyableResourceInstance) needs provider["registry.terraform.io/hashicorp/azuread"] | |
2024-12-26T22:23:36.897+0100 [DEBUG] ProviderTransformer: "azuread_group.pimapprover (expand)" (*terraform.nodeExpandApplyableResource) needs provider["registry.terraform.io/hashicorp/azuread"] | |
2024-12-26T22:23:36.898+0100 [DEBUG] ProviderTransformer: "azuread_privileged_access_group_eligibility_schedule.example (expand)" (*terraform.nodeExpandApplyableResource) needs provider["registry.terraform.io/hashicorp/azuread"] | |
2024-12-26T22:23:36.898+0100 [DEBUG] ProviderTransformer: "azuread_group.pimgroup1 (expand)" (*terraform.nodeExpandApplyableResource) needs provider["registry.terraform.io/hashicorp/azuread"] | |
2024-12-26T22:23:36.898+0100 [DEBUG] ProviderTransformer: "azuread_group_role_management_policy.pimpolicy1 (expand)" (*terraform.nodeExpandApplyableResource) needs provider["registry.terraform.io/hashicorp/azuread"] | |
2024-12-26T22:23:36.899+0100 [DEBUG] pruning unused provider["registry.terraform.io/hashicorp/time"] | |
2024-12-26T22:23:36.899+0100 [DEBUG] ReferenceTransformer: "azuread_group.pimgroup1 (expand)" references: [] | |
2024-12-26T22:23:36.899+0100 [DEBUG] ReferenceTransformer: "azuread_group_role_management_policy.pimpolicy1 (expand)" references: [azuread_group.pimgroup1 (expand)] | |
2024-12-26T22:23:36.899+0100 [DEBUG] ReferenceTransformer: "data.azuread_user.user (expand)" references: [var.user_emails] | |
2024-12-26T22:23:36.899+0100 [DEBUG] ReferenceTransformer: "var.user_emails" references: [] | |
2024-12-26T22:23:36.900+0100 [DEBUG] ReferenceTransformer: "azuread_group.pimapprover (expand)" references: [] | |
2024-12-26T22:23:36.900+0100 [DEBUG] ReferenceTransformer: "azuread_privileged_access_group_eligibility_schedule.example (expand)" references: [local.user_ids (expand) azuread_group.pimgroup1 (expand)] | |
2024-12-26T22:23:36.900+0100 [DEBUG] ReferenceTransformer: "local.user_ids (expand)" references: [var.user_emails data.azuread_user.user (expand)] | |
2024-12-26T22:23:36.900+0100 [DEBUG] ReferenceTransformer: "azuread_group_role_management_policy.pimpolicy1" references: [azuread_group.pimgroup1 (expand)] | |
2024-12-26T22:23:36.901+0100 [DEBUG] ReferenceTransformer: "provider[\"registry.terraform.io/hashicorp/azuread\"]" references: [] | |
2024-12-26T22:23:36.901+0100 [DEBUG] pruneUnusedNodes: azuread_group.pimapprover (expand) is no longer needed, removing | |
2024-12-26T22:23:36.901+0100 [DEBUG] pruneUnusedNodes: azuread_privileged_access_group_eligibility_schedule.example (expand) is no longer needed, removing | |
2024-12-26T22:23:36.901+0100 [DEBUG] pruneUnusedNodes: local.user_ids (expand) is no longer needed, removing | |
2024-12-26T22:23:36.901+0100 [DEBUG] pruneUnusedNodes: data.azuread_user.user (expand) is no longer needed, removing | |
2024-12-26T22:23:36.901+0100 [DEBUG] Starting graph walk: walkApply | |
2024-12-26T22:23:36.901+0100 [DEBUG] created provider logger: level=debug | |
2024-12-26T22:23:36.902+0100 [INFO] provider: configuring client automatic mTLS | |
2024-12-26T22:23:36.906+0100 [DEBUG] provider: starting plugin: path=.terraform/providers/registry.terraform.io/hashicorp/azuread/3.0.2/windows_amd64/terraform-provider-azuread_v3.0.2_x5.exe args=[".terraform/providers/registry.terraform.io/hashicorp/azuread/3.0.2/windows_amd64/terraform-provider-azuread_v3.0.2_x5.exe"] | |
2024-12-26T22:23:37.005+0100 [DEBUG] provider: plugin started: path=.terraform/providers/registry.terraform.io/hashicorp/azuread/3.0.2/windows_amd64/terraform-provider-azuread_v3.0.2_x5.exe pid=45640 | |
2024-12-26T22:23:37.005+0100 [DEBUG] provider: waiting for RPC address: plugin=.terraform/providers/registry.terraform.io/hashicorp/azuread/3.0.2/windows_amd64/terraform-provider-azuread_v3.0.2_x5.exe | |
2024-12-26T22:23:37.119+0100 [INFO] provider.terraform-provider-azuread_v3.0.2_x5.exe: configuring server automatic mTLS: timestamp="2024-12-26T22:23:37.119+0100" | |
2024-12-26T22:23:37.126+0100 [INFO] provider.terraform-provider-azuread_v3.0.2_x5.exe: 2024/12/26 22:23:37 [DEBUG] Registering Data Sources for "Applications"..: timestamp="2024-12-26T22:23:37.126+0100" | |
2024-12-26T22:23:37.126+0100 [INFO] provider.terraform-provider-azuread_v3.0.2_x5.exe: 2024/12/26 22:23:37 [DEBUG] Registering Resources for "Applications"..: timestamp="2024-12-26T22:23:37.126+0100" | |
2024-12-26T22:23:37.126+0100 [INFO] provider.terraform-provider-azuread_v3.0.2_x5.exe: 2024/12/26 22:23:37 [DEBUG] Registering Data Sources for "Directory Roles"..: timestamp="2024-12-26T22:23:37.126+0100" | |
2024-12-26T22:23:37.127+0100 [INFO] provider.terraform-provider-azuread_v3.0.2_x5.exe: 2024/12/26 22:23:37 [DEBUG] Registering Resources for "Directory Roles"..: timestamp="2024-12-26T22:23:37.126+0100" | |
2024-12-26T22:23:37.127+0100 [INFO] provider.terraform-provider-azuread_v3.0.2_x5.exe: 2024/12/26 22:23:37 [DEBUG] Registering Data Sources for "Domains"..: timestamp="2024-12-26T22:23:37.126+0100" | |
2024-12-26T22:23:37.127+0100 [INFO] provider.terraform-provider-azuread_v3.0.2_x5.exe: 2024/12/26 22:23:37 [DEBUG] Registering Resources for "Domains"..: timestamp="2024-12-26T22:23:37.126+0100" | |
2024-12-26T22:23:37.127+0100 [INFO] provider.terraform-provider-azuread_v3.0.2_x5.exe: 2024/12/26 22:23:37 [DEBUG] Registering Data Sources for "Policies"..: timestamp="2024-12-26T22:23:37.126+0100" | |
2024-12-26T22:23:37.127+0100 [INFO] provider.terraform-provider-azuread_v3.0.2_x5.exe: 2024/12/26 22:23:37 [DEBUG] Registering Resources for "Policies"..: timestamp="2024-12-26T22:23:37.126+0100" | |
2024-12-26T22:23:37.128+0100 [INFO] provider.terraform-provider-azuread_v3.0.2_x5.exe: 2024/12/26 22:23:37 [DEBUG] Registering Data Sources for "Identity Governance"..: timestamp="2024-12-26T22:23:37.126+0100" | |
2024-12-26T22:23:37.128+0100 [INFO] provider.terraform-provider-azuread_v3.0.2_x5.exe: 2024/12/26 22:23:37 [DEBUG] Registering Resources for "Identity Governance"..: timestamp="2024-12-26T22:23:37.126+0100" | |
2024-12-26T22:23:37.128+0100 [INFO] provider.terraform-provider-azuread_v3.0.2_x5.exe: 2024/12/26 22:23:37 [DEBUG] Registering Data Sources for "Service Principals"..: timestamp="2024-12-26T22:23:37.126+0100" | |
2024-12-26T22:23:37.128+0100 [INFO] provider.terraform-provider-azuread_v3.0.2_x5.exe: 2024/12/26 22:23:37 [DEBUG] Registering Resources for "Service Principals"..: timestamp="2024-12-26T22:23:37.126+0100" | |
2024-12-26T22:23:37.128+0100 [INFO] provider.terraform-provider-azuread_v3.0.2_x5.exe: 2024/12/26 22:23:37 [DEBUG] Registering Data Sources for "Administrative Units"..: timestamp="2024-12-26T22:23:37.126+0100" | |
2024-12-26T22:23:37.129+0100 [INFO] provider.terraform-provider-azuread_v3.0.2_x5.exe: 2024/12/26 22:23:37 [DEBUG] Registering Resources for "Administrative Units"..: timestamp="2024-12-26T22:23:37.126+0100" | |
2024-12-26T22:23:37.129+0100 [INFO] provider.terraform-provider-azuread_v3.0.2_x5.exe: 2024/12/26 22:23:37 [DEBUG] Registering Data Sources for "Applications"..: timestamp="2024-12-26T22:23:37.126+0100" | |
2024-12-26T22:23:37.129+0100 [INFO] provider.terraform-provider-azuread_v3.0.2_x5.exe: 2024/12/26 22:23:37 [DEBUG] Registering Resources for "Applications"..: timestamp="2024-12-26T22:23:37.126+0100" | |
2024-12-26T22:23:37.129+0100 [INFO] provider.terraform-provider-azuread_v3.0.2_x5.exe: 2024/12/26 22:23:37 [DEBUG] Registering Data Sources for "App Role Assignments"..: timestamp="2024-12-26T22:23:37.126+0100" | |
2024-12-26T22:23:37.129+0100 [DEBUG] provider: using plugin: version=5 | |
2024-12-26T22:23:37.129+0100 [INFO] provider.terraform-provider-azuread_v3.0.2_x5.exe: 2024/12/26 22:23:37 [DEBUG] Registering Resources for "App Role Assignments"..: timestamp="2024-12-26T22:23:37.126+0100" | |
2024-12-26T22:23:37.130+0100 [INFO] provider.terraform-provider-azuread_v3.0.2_x5.exe: 2024/12/26 22:23:37 [DEBUG] Registering Data Sources for "Conditional Access"..: timestamp="2024-12-26T22:23:37.126+0100" | |
2024-12-26T22:23:37.130+0100 [INFO] provider.terraform-provider-azuread_v3.0.2_x5.exe: 2024/12/26 22:23:37 [DEBUG] Registering Resources for "Conditional Access"..: timestamp="2024-12-26T22:23:37.126+0100" | |
2024-12-26T22:23:37.130+0100 [INFO] provider.terraform-provider-azuread_v3.0.2_x5.exe: 2024/12/26 22:23:37 [DEBUG] Registering Data Sources for "Directory Objects"..: timestamp="2024-12-26T22:23:37.126+0100" | |
2024-12-26T22:23:37.130+0100 [INFO] provider.terraform-provider-azuread_v3.0.2_x5.exe: 2024/12/26 22:23:37 [DEBUG] Registering Resources for "Directory Objects"..: timestamp="2024-12-26T22:23:37.126+0100" | |
2024-12-26T22:23:37.130+0100 [INFO] provider.terraform-provider-azuread_v3.0.2_x5.exe: 2024/12/26 22:23:37 [DEBUG] Registering Data Sources for "Directory Roles"..: timestamp="2024-12-26T22:23:37.126+0100" | |
2024-12-26T22:23:37.131+0100 [INFO] provider.terraform-provider-azuread_v3.0.2_x5.exe: 2024/12/26 22:23:37 [DEBUG] Registering Resources for "Directory Roles"..: timestamp="2024-12-26T22:23:37.126+0100" | |
2024-12-26T22:23:37.131+0100 [INFO] provider.terraform-provider-azuread_v3.0.2_x5.exe: 2024/12/26 22:23:37 [DEBUG] Registering Data Sources for "Domains"..: timestamp="2024-12-26T22:23:37.126+0100" | |
2024-12-26T22:23:37.131+0100 [INFO] provider.terraform-provider-azuread_v3.0.2_x5.exe: 2024/12/26 22:23:37 [DEBUG] Registering Resources for "Domains"..: timestamp="2024-12-26T22:23:37.126+0100" | |
2024-12-26T22:23:37.132+0100 [INFO] provider.terraform-provider-azuread_v3.0.2_x5.exe: 2024/12/26 22:23:37 [DEBUG] Registering Data Sources for "Groups"..: timestamp="2024-12-26T22:23:37.126+0100" | |
2024-12-26T22:23:37.132+0100 [INFO] provider.terraform-provider-azuread_v3.0.2_x5.exe: 2024/12/26 22:23:37 [DEBUG] Registering Resources for "Groups"..: timestamp="2024-12-26T22:23:37.126+0100" | |
2024-12-26T22:23:37.132+0100 [INFO] provider.terraform-provider-azuread_v3.0.2_x5.exe: 2024/12/26 22:23:37 [DEBUG] Registering Data Sources for "Identity Governance"..: timestamp="2024-12-26T22:23:37.126+0100" | |
2024-12-26T22:23:37.132+0100 [INFO] provider.terraform-provider-azuread_v3.0.2_x5.exe: 2024/12/26 22:23:37 [DEBUG] Registering Resources for "Identity Governance"..: timestamp="2024-12-26T22:23:37.127+0100" | |
2024-12-26T22:23:37.133+0100 [INFO] provider.terraform-provider-azuread_v3.0.2_x5.exe: 2024/12/26 22:23:37 [DEBUG] Registering Data Sources for "Invitations"..: timestamp="2024-12-26T22:23:37.127+0100" | |
2024-12-26T22:23:37.133+0100 [INFO] provider.terraform-provider-azuread_v3.0.2_x5.exe: 2024/12/26 22:23:37 [DEBUG] Registering Resources for "Invitations"..: timestamp="2024-12-26T22:23:37.127+0100" | |
2024-12-26T22:23:37.133+0100 [INFO] provider.terraform-provider-azuread_v3.0.2_x5.exe: 2024/12/26 22:23:37 [DEBUG] Registering Data Sources for "Policies"..: timestamp="2024-12-26T22:23:37.127+0100" | |
2024-12-26T22:23:37.133+0100 [INFO] provider.terraform-provider-azuread_v3.0.2_x5.exe: 2024/12/26 22:23:37 [DEBUG] Registering Resources for "Policies"..: timestamp="2024-12-26T22:23:37.127+0100" | |
2024-12-26T22:23:37.133+0100 [INFO] provider.terraform-provider-azuread_v3.0.2_x5.exe: 2024/12/26 22:23:37 [DEBUG] Registering Data Sources for "Service Principals"..: timestamp="2024-12-26T22:23:37.127+0100" | |
2024-12-26T22:23:37.133+0100 [INFO] provider.terraform-provider-azuread_v3.0.2_x5.exe: 2024/12/26 22:23:37 [DEBUG] Registering Resources for "Service Principals"..: timestamp="2024-12-26T22:23:37.127+0100" | |
2024-12-26T22:23:37.134+0100 [INFO] provider.terraform-provider-azuread_v3.0.2_x5.exe: 2024/12/26 22:23:37 [DEBUG] Registering Data Sources for "Synchronization"..: timestamp="2024-12-26T22:23:37.127+0100" | |
2024-12-26T22:23:37.134+0100 [INFO] provider.terraform-provider-azuread_v3.0.2_x5.exe: 2024/12/26 22:23:37 [DEBUG] Registering Resources for "Synchronization"..: timestamp="2024-12-26T22:23:37.127+0100" | |
2024-12-26T22:23:37.134+0100 [INFO] provider.terraform-provider-azuread_v3.0.2_x5.exe: 2024/12/26 22:23:37 [DEBUG] Registering Data Sources for "User Flows"..: timestamp="2024-12-26T22:23:37.127+0100" | |
2024-12-26T22:23:37.134+0100 [INFO] provider.terraform-provider-azuread_v3.0.2_x5.exe: 2024/12/26 22:23:37 [DEBUG] Registering Resources for "User Flows"..: timestamp="2024-12-26T22:23:37.127+0100" | |
2024-12-26T22:23:37.134+0100 [INFO] provider.terraform-provider-azuread_v3.0.2_x5.exe: 2024/12/26 22:23:37 [DEBUG] Registering Data Sources for "Users"..: timestamp="2024-12-26T22:23:37.127+0100" | |
2024-12-26T22:23:37.134+0100 [INFO] provider.terraform-provider-azuread_v3.0.2_x5.exe: 2024/12/26 22:23:37 [DEBUG] Registering Resources for "Users"..: timestamp="2024-12-26T22:23:37.127+0100" | |
2024-12-26T22:23:37.134+0100 [DEBUG] provider.terraform-provider-azuread_v3.0.2_x5.exe: plugin address: address=127.0.0.1:10000 network=tcp timestamp="2024-12-26T22:23:37.128+0100" | |
2024-12-26T22:23:37.139+0100 [WARN] ValidateProviderConfig from "provider[\"registry.terraform.io/hashicorp/azuread\"]" changed the config value, but that value is unused | |
2024-12-26T22:23:37.141+0100 [INFO] provider.terraform-provider-azuread_v3.0.2_x5.exe: 2024/12/26 22:23:37 [DEBUG] Configuring built-in cloud environment by name: "global": timestamp="2024-12-26T22:23:37.141+0100" | |
2024-12-26T22:23:37.142+0100 [INFO] provider.terraform-provider-azuread_v3.0.2_x5.exe: 2024/12/26 22:23:37 [DEBUG] POST https://login.microsoftonline.com/b5683b08-cb53-45a8-b4ff-1531a0ed2f38/oauth2/v2.0/token: timestamp="2024-12-26T22:23:37.142+0100" | |
2024-12-26T22:23:37.426+0100 [INFO] provider.terraform-provider-azuread_v3.0.2_x5.exe: 2024/12/26 22:23:37 [DEBUG] AzureAD Provider access token claims: {"aud":"https://graph.microsoft.com","exp":1735251817,"iat":1735247917,"iss":"https://sts.windows.net/b5683b08-cb53-45a8-b4ff-1531a0ed2f38/","idp":"https://sts.windows.net/b5683b08-cb53-45a8-b4ff-1531a0ed2f38/","oid":"27902484-a9f3-4d7d-b92d-b8fc9aa604d4","roles":["RoleManagementPolicy.Read.AzureADGroup","RoleManagementPolicy.ReadWrite.AzureADGroup","Directory.ReadWrite.All","GroupMember.Read.All","RoleManagement.ReadWrite.Directory"],"scp":"","sub":"27902484-a9f3-4d7d-b92d-b8fc9aa604d4","tenant_region_scope":"EU","tid":"b5683b08-cb53-45a8-b4ff-1531a0ed2f38","ver":"1.0","app_displayname":"TerraformCli","appid":"82008b05-3cc1-4981-8792-f5354e4c031c","idtyp":"app"}: timestamp="2024-12-26T22:23:37.426+0100" | |
2024-12-26T22:23:37.432+0100 [WARN] Provider "registry.terraform.io/hashicorp/azuread" produced an invalid plan for azuread_group_role_management_policy.pimpolicy1, but we are tolerating it because it is using the legacy plugin SDK. | |
The following problems may be the cause of any confusing errors from downstream operations: | |
- .active_assignment_rules: block count in plan (1) disagrees with count in config (0) | |
- .eligible_assignment_rules: block count in plan (1) disagrees with count in config (0) | |
- .notification_rules: block count in plan (1) disagrees with count in config (0) | |
azuread_group_role_management_policy.pimpolicy1: Modifying... [id=Group_066b5643-f931-46f1-855f-3bac0b6a95e3_eee4d9e9-b21a-4e00-a0e2-eba77233bb3a] | |
2024-12-26T22:23:37.434+0100 [INFO] Starting apply for azuread_group_role_management_policy.pimpolicy1 | |
2024-12-26T22:23:37.434+0100 [DEBUG] azuread_group_role_management_policy.pimpolicy1: applying the planned Update change | |
2024-12-26T22:23:37.440+0100 [INFO] provider.terraform-provider-azuread_v3.0.2_x5.exe: 2024/12/26 22:23:37 [DEBUG] ============================ Begin AzureAD Request ============================ | |
Request ID: 80eb21fc-c5c3-2df1-0dc8-241dc0ac6378 | |
GET /v1.0/policies/roleManagementPolicies/Group_066b5643-f931-46f1-855f-3bac0b6a95e3_eee4d9e9-b21a-4e00-a0e2-eba77233bb3a?%24expand=%2A HTTP/1.1 | |
Host: graph.microsoft.com | |
User-Agent: HashiCorp Terraform/1.9.3 (+https://www.terraform.io) Terraform Plugin SDK/2.34.0 terraform-provider-azuread/3.0.2 HashiCorp/go-azure-sdk (Go-http-Client/1.1 MicrosoftGraph-rolemanagementpolicy/v1.0) pid-222c6c49-1b0a-5959-a213-6608f9eb8820 | |
Accept: application/json; charset=utf-8; IEEE754Compatible=false | |
Content-Type: application/json; charset=utf-8 | |
Odata-Maxversion: 4.0 | |
Odata-Version: 4.0 | |
Accept-Encoding: gzip | |
============================= End AzureAD Request =============================: timestamp="2024-12-26T22:23:37.439+0100" | |
2024-12-26T22:23:37.441+0100 [INFO] provider.terraform-provider-azuread_v3.0.2_x5.exe: 2024/12/26 22:23:37 [DEBUG] GET https://graph.microsoft.com/v1.0/policies/roleManagementPolicies/Group_066b5643-f931-46f1-855f-3bac0b6a95e3_eee4d9e9-b21a-4e00-a0e2-eba77233bb3a?%24expand=%2A: timestamp="2024-12-26T22:23:37.440+0100" | |
2024-12-26T22:23:37.833+0100 [INFO] provider.terraform-provider-azuread_v3.0.2_x5.exe: 2024/12/26 22:23:37 [DEBUG] ============================ Begin AzureAD Response =========================== | |
GET https://graph.microsoft.com/v1.0/policies/roleManagementPolicies/Group_066b5643-f931-46f1-855f-3bac0b6a95e3_eee4d9e9-b21a-4e00-a0e2-eba77233bb3a?%24expand=%2A | |
Request ID: 80eb21fc-c5c3-2df1-0dc8-241dc0ac6378 | |
HTTP/2.0 200 OK | |
Cache-Control: private | |
Client-Request-Id: aed0d537-7b71-411b-b932-0245bab27da8 | |
Content-Type: application/json;odata.metadata=minimal;odata.streaming=true;IEEE754Compatible=false;charset=utf-8 | |
Date: Thu, 26 Dec 2024 21:23:37 GMT | |
Odata-Version: 4.0 | |
Request-Id: aed0d537-7b71-411b-b932-0245bab27da8 | |
Strict-Transport-Security: max-age=31536000 | |
Vary: Accept-Encoding | |
X-Ms-Ags-Diagnostic: {"ServerInfo":{"DataCenter":"Germany West Central","Slice":"E","Ring":"4","ScaleUnit":"000","RoleInstance":"FR1PEPF0000102F"}} | |
{"@odata.context":"https://graph.microsoft.com/v1.0/$metadata#policies/roleManagementPolicies(effectiveRules(),rules())/$entity","id":"Group_066b5643-f931-46f1-855f-3bac0b6a95e3_eee4d9e9-b21a-4e00-a0e2-eba77233bb3a","displayName":"Group","description":"Group","isOrganizationDefault":false,"scopeId":"066b5643-f931-46f1-855f-3bac0b6a95e3","scopeType":"Group","lastModifiedDateTime":"2024-12-26T21:23:32.477Z","lastModifiedBy":{"displayName":"TerraformCli","id":null},"[email protected]":"https://graph.microsoft.com/v1.0/$metadata#policies/roleManagementPolicies('Group_066b5643-f931-46f1-855f-3bac0b6a95e3_eee4d9e9-b21a-4e00-a0e2-eba77233bb3a')/effectiveRules","effectiveRules":[{"@odata.type":"#microsoft.graph.unifiedRoleManagementPolicyEnablementRule","id":"Enablement_Admin_Eligibility","enabledRules":[],"target":{"caller":"Admin","operations":["all"],"level":"Eligibility","inheritableSettings":[],"enforcedSettings":[]}},{"@odata.type":"#microsoft.graph.unifiedRoleManagementPolicyExpirationRule","id":"Expiration_Admin_Eligibility","isExpirationRequired":true,"maximumDuration":"P365D","target":{"caller":"Admin","operations":["all"],"level":"Eligibility","inheritableSettings":[],"enforcedSettings":[]}},{"@odata.type":"#microsoft.graph.unifiedRoleManagementPolicyNotificationRule","id":"Notification_Admin_Admin_Eligibility","notificationType":"Email","recipientType":"Admin","notificationLevel":"All","isDefaultRecipientsEnabled":true,"notificationRecipients":[],"target":{"caller":"Admin","operations":["all"],"level":"Eligibility","inheritableSettings":[],"enforcedSettings":[]}},{"@odata.type":"#microsoft.graph.unifiedRoleManagementPolicyNotificationRule","id":"Notification_Requestor_Admin_Eligibility","notificationType":"Email","recipientType":"Requestor","notificationLevel":"All","isDefaultRecipientsEnabled":true,"notificationRecipients":[],"target":{"caller":"Admin","operations":["all"],"level":"Eligibility","inheritableSettings":[],"enforcedSettings":[]}},{"@odata.type":"#microsoft.graph.unifiedRoleManagementPolicyNotificationRule","id":"Notification_Approver_Admin_Eligibility","notificationType":"Email","recipientType":"Approver","notificationLevel":"All","isDefaultRecipientsEnabled":true,"notificationRecipients":[],"target":{"caller":"Admin","operations":["all"],"level":"Eligibility","inheritableSettings":[],"enforcedSettings":[]}},{"@odata.type":"#microsoft.graph.unifiedRoleManagementPolicyEnablementRule","id":"Enablement_Admin_Assignment","enabledRules":["Justification"],"target":{"caller":"Admin","operations":["all"],"level":"Assignment","inheritableSettings":[],"enforcedSettings":[]}},{"@odata.type":"#microsoft.graph.unifiedRoleManagementPolicyExpirationRule","id":"Expiration_Admin_Assignment","isExpirationRequired":true,"maximumDuration":"P180D","target":{"caller":"Admin","operations":["all"],"level":"Assignment","inheritableSettings":[],"enforcedSettings":[]}},{"@odata.type":"#microsoft.graph.unifiedRoleManagementPolicyNotificationRule","id":"Notification_Admin_Admin_Assignment","notificationType":"Email","recipientType":"Admin","notificationLevel":"All","isDefaultRecipientsEnabled":true,"notificationRecipients":[],"target":{"caller":"Admin","operations":["all"],"level":"Assignment","inheritableSettings":[],"enforcedSettings":[]}},{"@odata.type":"#microsoft.graph.unifiedRoleManagementPolicyNotificationRule","id":"Notification_Requestor_Admin_Assignment","notificationType":"Email","recipientType":"Requestor","notificationLevel":"All","isDefaultRecipientsEnabled":true,"notificationRecipients":[],"target":{"caller":"Admin","operations":["all"],"level":"Assignment","inheritableSettings":[],"enforcedSettings":[]}},{"@odata.type":"#microsoft.graph.unifiedRoleManagementPolicyNotificationRule","id":"Notification_Approver_Admin_Assignment","notificationType":"Email","recipientType":"Approver","notificationLevel":"All","isDefaultRecipientsEnabled":true,"notificationRecipients":[],"target":{"caller":"Admin","operations":["all"],"level":"Assignment","inheritableSettings":[],"enforcedSettings":[]}},{"@odata.type":"#microsoft.graph.unifiedRoleManagementPolicyApprovalRule","id":"Approval_EndUser_Assignment","target":{"caller":"EndUser","operations":["all"],"level":"Assignment","inheritableSettings":[],"enforcedSettings":[]},"setting":{"isApprovalRequired":false,"isApprovalRequiredForExtension":false,"isRequestorJustificationRequired":true,"approvalMode":"SingleStage","approvalStages":[{"approvalStageTimeOutInDays":1,"isApproverJustificationRequired":true,"escalationTimeInMinutes":0,"isEscalationEnabled":false,"primaryApprovers":[],"escalationApprovers":[]}]}},{"@odata.type":"#microsoft.graph.unifiedRoleManagementPolicyAuthenticationContextRule","id":"AuthenticationContext_EndUser_Assignment","isEnabled":false,"claimValue":null,"target":{"caller":"EndUser","operations":["all"],"level":"Assignment","inheritableSettings":[],"enforcedSettings":[]}},{"@odata.type":"#microsoft.graph.unifiedRoleManagementPolicyEnablementRule","id":"Enablement_EndUser_Assignment","enabledRules":["Justification","Ticketing"],"target":{"caller":"EndUser","operations":["all"],"level":"Assignment","inheritableSettings":[],"enforcedSettings":[]}},{"@odata.type":"#microsoft.graph.unifiedRoleManagementPolicyExpirationRule","id":"Expiration_EndUser_Assignment","isExpirationRequired":false,"maximumDuration":"PT16H","target":{"caller":"EndUser","operations":["all"],"level":"Assignment","inheritableSettings":[],"enforcedSettings":[]}},{"@odata.type":"#microsoft.graph.unifiedRoleManagementPolicyNotificationRule","id":"Notification_Admin_EndUser_Assignment","notificationType":"Email","recipientType":"Admin","notificationLevel":"All","isDefaultRecipientsEnabled":true,"notificationRecipients":[],"target":{"caller":"EndUser","operations":["all"],"level":"Assignment","inheritableSettings":[],"enforcedSettings":[]}},{"@odata.type":"#microsoft.graph.unifiedRoleManagementPolicyNotificationRule","id":"Notification_Requestor_EndUser_Assignment","notificationType":"Email","recipientType":"Requestor","notificationLevel":"All","isDefaultRecipientsEnabled":true,"notificationRecipients":[],"target":{"caller":"EndUser","operations":["all"],"level":"Assignment","inheritableSettings":[],"enforcedSettings":[]}},{"@odata.type":"#microsoft.graph.unifiedRoleManagementPolicyNotificationRule","id":"Notification_Approver_EndUser_Assignment","notificationType":"Email","recipientType":"Approver","notificationLevel":"All","isDefaultRecipientsEnabled":true,"notificationRecipients":[],"target":{"caller":"EndUser","operations":["all"],"level":"Assignment","inheritableSettings":[],"enforcedSettings":[]}}],"[email protected]":"https://graph.microsoft.com/v1.0/$metadata#policies/roleManagementPolicies('Group_066b5643-f931-46f1-855f-3bac0b6a95e3_eee4d9e9-b21a-4e00-a0e2-eba77233bb3a')/rules","rules":[{"@odata.type":"#microsoft.graph.unifiedRoleManagementPolicyEnablementRule","id":"Enablement_Admin_Eligibility","enabledRules":[],"target":{"caller":"Admin","operations":["all"],"level":"Eligibility","inheritableSettings":[],"enforcedSettings":[]}},{"@odata.type":"#microsoft.graph.unifiedRoleManagementPolicyExpirationRule","id":"Expiration_Admin_Eligibility","isExpirationRequired":true,"maximumDuration":"P365D","target":{"caller":"Admin","operations":["all"],"level":"Eligibility","inheritableSettings":[],"enforcedSettings":[]}},{"@odata.type":"#microsoft.graph.unifiedRoleManagementPolicyNotificationRule","id":"Notification_Admin_Admin_Eligibility","notificationType":"Email","recipientType":"Admin","notificationLevel":"All","isDefaultRecipientsEnabled":true,"notificationRecipients":[],"target":{"caller":"Admin","operations":["all"],"level":"Eligibility","inheritableSettings":[],"enforcedSettings":[]}},{"@odata.type":"#microsoft.graph.unifiedRoleManagementPolicyNotificationRule","id":"Notification_Requestor_Admin_Eligibility","notificationType":"Email","recipientType":"Requestor","notificationLevel":"All","isDefaultRecipientsEnabled":true,"notificationRecipients":[],"target":{"caller":"Admin","operations":["all"],"level":"Eligibility","inheritableSettings":[],"enforcedSettings":[]}},{"@odata.type":"#microsoft.graph.unifiedRoleManagementPolicyNotificationRule","id":"Notification_Approver_Admin_Eligibility","notificationType":"Email","recipientType":"Approver","notificationLevel":"All","isDefaultRecipientsEnabled":true,"notificationRecipients":[],"target":{"caller":"Admin","operations":["all"],"level":"Eligibility","inheritableSettings":[],"enforcedSettings":[]}},{"@odata.type":"#microsoft.graph.unifiedRoleManagementPolicyEnablementRule","id":"Enablement_Admin_Assignment","enabledRules":["Justification"],"target":{"caller":"Admin","operations":["all"],"level":"Assignment","inheritableSettings":[],"enforcedSettings":[]}},{"@odata.type":"#microsoft.graph.unifiedRoleManagementPolicyExpirationRule","id":"Expiration_Admin_Assignment","isExpirationRequired":true,"maximumDuration":"P180D","target":{"caller":"Admin","operations":["all"],"level":"Assignment","inheritableSettings":[],"enforcedSettings":[]}},{"@odata.type":"#microsoft.graph.unifiedRoleManagementPolicyNotificationRule","id":"Notification_Admin_Admin_Assignment","notificationType":"Email","recipientType":"Admin","notificationLevel":"All","isDefaultRecipientsEnabled":true,"notificationRecipients":[],"target":{"caller":"Admin","operations":["all"],"level":"Assignment","inheritableSettings":[],"enforcedSettings":[]}},{"@odata.type":"#microsoft.graph.unifiedRoleManagementPolicyNotificationRule","id":"Notification_Requestor_Admin_Assignment","notificationType":"Email","recipientType":"Requestor","notificationLevel":"All","isDefaultRecipientsEnabled":true,"notificationRecipients":[],"target":{"caller":"Admin","operations":["all"],"level":"Assignment","inheritableSettings":[],"enforcedSettings":[]}},{"@odata.type":"#microsoft.graph.unifiedRoleManagementPolicyNotificationRule","id":"Notification_Approver_Admin_Assignment","notificationType":"Email","recipientType":"Approver","notificationLevel":"All","isDefaultRecipientsEnabled":true,"notificationRecipients":[],"target":{"caller":"Admin","operations":["all"],"level":"Assignment","inheritableSettings":[],"enforcedSettings":[]}},{"@odata.type":"#microsoft.graph.unifiedRoleManagementPolicyApprovalRule","id":"Approval_EndUser_Assignment","target":{"caller":"EndUser","operations":["all"],"level":"Assignment","inheritableSettings":[],"enforcedSettings":[]},"setting":{"isApprovalRequired":false,"isApprovalRequiredForExtension":false,"isRequestorJustificationRequired":true,"approvalMode":"SingleStage","approvalStages":[{"approvalStageTimeOutInDays":1,"isApproverJustificationRequired":true,"escalationTimeInMinutes":0,"isEscalationEnabled":false,"primaryApprovers":[],"escalationApprovers":[]}]}},{"@odata.type":"#microsoft.graph.unifiedRoleManagementPolicyAuthenticationContextRule","id":"AuthenticationContext_EndUser_Assignment","isEnabled":false,"claimValue":null,"target":{"caller":"EndUser","operations":["all"],"level":"Assignment","inheritableSettings":[],"enforcedSettings":[]}},{"@odata.type":"#microsoft.graph.unifiedRoleManagementPolicyEnablementRule","id":"Enablement_EndUser_Assignment","enabledRules":["Justification","Ticketing"],"target":{"caller":"EndUser","operations":["all"],"level":"Assignment","inheritableSettings":[],"enforcedSettings":[]}},{"@odata.type":"#microsoft.graph.unifiedRoleManagementPolicyExpirationRule","id":"Expiration_EndUser_Assignment","isExpirationRequired":false,"maximumDuration":"PT16H","target":{"caller":"EndUser","operations":["all"],"level":"Assignment","inheritableSettings":[],"enforcedSettings":[]}},{"@odata.type":"#microsoft.graph.unifiedRoleManagementPolicyNotificationRule","id":"Notification_Admin_EndUser_Assignment","notificationType":"Email","recipientType":"Admin","notificationLevel":"All","isDefaultRecipientsEnabled":true,"notificationRecipients":[],"target":{"caller":"EndUser","operations":["all"],"level":"Assignment","inheritableSettings":[],"enforcedSettings":[]}},{"@odata.type":"#microsoft.graph.unifiedRoleManagementPolicyNotificationRule","id":"Notification_Requestor_EndUser_Assignment","notificationType":"Email","recipientType":"Requestor","notificationLevel":"All","isDefaultRecipientsEnabled":true,"notificationRecipients":[],"target":{"caller":"EndUser","operations":["all"],"level":"Assignment","inheritableSettings":[],"enforcedSettings":[]}},{"@odata.type":"#microsoft.graph.unifiedRoleManagementPolicyNotificationRule","id":"Notification_Approver_EndUser_Assignment","notificationType":"Email","recipientType":"Approver","notificationLevel":"All","isDefaultRecipientsEnabled":true,"notificationRecipients":[],"target":{"caller":"EndUser","operations":["all"],"level":"Assignment","inheritableSettings":[],"enforcedSettings":[]}}]} | |
============================= End AzureAD Response ============================: timestamp="2024-12-26T22:23:37.832+0100" | |
2024-12-26T22:23:37.842+0100 [INFO] provider.terraform-provider-azuread_v3.0.2_x5.exe: 2024/12/26 22:23:37 [DEBUG] ============================ Begin AzureAD Request ============================ | |
Request ID: 9abdc127-45d8-1160-5a5a-fab0c0714973 | |
PATCH /v1.0/policies/roleManagementPolicies/Group_066b5643-f931-46f1-855f-3bac0b6a95e3_eee4d9e9-b21a-4e00-a0e2-eba77233bb3a HTTP/1.1 | |
Host: graph.microsoft.com | |
User-Agent: HashiCorp Terraform/1.9.3 (+https://www.terraform.io) Terraform Plugin SDK/2.34.0 terraform-provider-azuread/3.0.2 HashiCorp/go-azure-sdk (Go-http-Client/1.1 MicrosoftGraph-rolemanagementpolicy/v1.0) pid-222c6c49-1b0a-5959-a213-6608f9eb8820 | |
Content-Length: 538 | |
Accept: application/json; charset=utf-8; IEEE754Compatible=false | |
Content-Type: application/json; charset=utf-8 | |
Odata-Maxversion: 4.0 | |
Odata-Version: 4.0 | |
Accept-Encoding: gzip | |
{"@odata.type":"#microsoft.graph.unifiedRoleManagementPolicy","id":"Group_066b5643-f931-46f1-855f-3bac0b6a95e3_eee4d9e9-b21a-4e00-a0e2-eba77233bb3a","lastModifiedBy":null,"rules":[{"@odata.type":"#microsoft.graph.unifiedRoleManagementPolicyApprovalRule","id":"Approval_EndUser_Assignment","setting":{"approvalStages":[],"isApprovalRequired":false},"target":{"caller":"EndUser","enforcedSettings":[],"inheritableSettings":[],"level":"Assignment","operations":["all"]}}],"scopeId":"066b5643-f931-46f1-855f-3bac0b6a95e3","scopeType":"Group"} | |
============================= End AzureAD Request =============================: timestamp="2024-12-26T22:23:37.837+0100" | |
2024-12-26T22:23:37.844+0100 [INFO] provider.terraform-provider-azuread_v3.0.2_x5.exe: 2024/12/26 22:23:37 [DEBUG] PATCH https://graph.microsoft.com/v1.0/policies/roleManagementPolicies/Group_066b5643-f931-46f1-855f-3bac0b6a95e3_eee4d9e9-b21a-4e00-a0e2-eba77233bb3a: timestamp="2024-12-26T22:23:37.837+0100" | |
2024-12-26T22:23:38.372+0100 [INFO] provider.terraform-provider-azuread_v3.0.2_x5.exe: 2024/12/26 22:23:38 [DEBUG] ============================ Begin AzureAD Response =========================== | |
PATCH https://graph.microsoft.com/v1.0/policies/roleManagementPolicies/Group_066b5643-f931-46f1-855f-3bac0b6a95e3_eee4d9e9-b21a-4e00-a0e2-eba77233bb3a | |
Request ID: 9abdc127-45d8-1160-5a5a-fab0c0714973 | |
HTTP/2.0 200 OK | |
Cache-Control: private | |
Client-Request-Id: 49c49dfa-641e-4d98-a8ef-ba8fa67ce65a | |
Content-Type: application/json;odata.metadata=minimal;odata.streaming=true;IEEE754Compatible=false;charset=utf-8 | |
Date: Thu, 26 Dec 2024 21:23:37 GMT | |
Odata-Version: 4.0 | |
Request-Id: 49c49dfa-641e-4d98-a8ef-ba8fa67ce65a | |
Strict-Transport-Security: max-age=31536000 | |
Vary: Accept-Encoding | |
X-Ms-Ags-Diagnostic: {"ServerInfo":{"DataCenter":"Germany West Central","Slice":"E","Ring":"4","ScaleUnit":"000","RoleInstance":"FR1PEPF000007A2"}} | |
{"@odata.context":"https://graph.microsoft.com/v1.0/$metadata#policies/roleManagementPolicies/$entity","id":"Group_066b5643-f931-46f1-855f-3bac0b6a95e3_eee4d9e9-b21a-4e00-a0e2-eba77233bb3a","displayName":"Group","description":"Group","isOrganizationDefault":false,"scopeId":"066b5643-f931-46f1-855f-3bac0b6a95e3","scopeType":"Group","lastModifiedDateTime":"2024-12-26T21:23:38.263Z","lastModifiedBy":{"displayName":"TerraformCli","id":null}} | |
============================= End AzureAD Response ============================: timestamp="2024-12-26T22:23:38.372+0100" | |
2024-12-26T22:23:38.374+0100 [INFO] provider.terraform-provider-azuread_v3.0.2_x5.exe: 2024/12/26 22:23:38 [DEBUG] ============================ Begin AzureAD Request ============================ | |
Request ID: a66819d9-cea8-d11a-b6cc-b6b706e6ff03 | |
GET /v1.0/policies/roleManagementPolicyAssignments?%24filter=scopeType+eq+%27Group%27+and+scopeId+eq+%27066b5643-f931-46f1-855f-3bac0b6a95e3%27+and+roleDefinitionId+eq+%27member%27 HTTP/1.1 | |
Host: graph.microsoft.com | |
User-Agent: HashiCorp Terraform/1.9.3 (+https://www.terraform.io) Terraform Plugin SDK/2.34.0 terraform-provider-azuread/3.0.2 HashiCorp/go-azure-sdk (Go-http-Client/1.1 MicrosoftGraph-rolemanagementpolicyassignment/v1.0) pid-222c6c49-1b0a-5959-a213-6608f9eb8820 | |
Accept: application/json; charset=utf-8; IEEE754Compatible=false | |
Content-Type: application/json; charset=utf-8 | |
Odata-Maxversion: 4.0 | |
Odata-Version: 4.0 | |
Accept-Encoding: gzip | |
============================= End AzureAD Request =============================: timestamp="2024-12-26T22:23:38.372+0100" | |
2024-12-26T22:23:38.375+0100 [INFO] provider.terraform-provider-azuread_v3.0.2_x5.exe: 2024/12/26 22:23:38 [DEBUG] GET https://graph.microsoft.com/v1.0/policies/roleManagementPolicyAssignments?%24filter=scopeType+eq+%27Group%27+and+scopeId+eq+%27066b5643-f931-46f1-855f-3bac0b6a95e3%27+and+roleDefinitionId+eq+%27member%27: timestamp="2024-12-26T22:23:38.372+0100" | |
2024-12-26T22:23:38.729+0100 [INFO] provider.terraform-provider-azuread_v3.0.2_x5.exe: 2024/12/26 22:23:38 [DEBUG] ============================ Begin AzureAD Response =========================== | |
GET https://graph.microsoft.com/v1.0/policies/roleManagementPolicyAssignments?%24filter=scopeType+eq+%27Group%27+and+scopeId+eq+%27066b5643-f931-46f1-855f-3bac0b6a95e3%27+and+roleDefinitionId+eq+%27member%27 | |
Request ID: a66819d9-cea8-d11a-b6cc-b6b706e6ff03 | |
HTTP/2.0 200 OK | |
Cache-Control: private | |
Client-Request-Id: b3eb1632-3733-4d83-b260-174d7b64d004 | |
Content-Type: application/json;odata.metadata=minimal;odata.streaming=true;IEEE754Compatible=false;charset=utf-8 | |
Date: Thu, 26 Dec 2024 21:23:38 GMT | |
Odata-Version: 4.0 | |
Request-Id: b3eb1632-3733-4d83-b260-174d7b64d004 | |
Strict-Transport-Security: max-age=31536000 | |
Vary: Accept-Encoding | |
X-Ms-Ags-Diagnostic: {"ServerInfo":{"DataCenter":"Germany West Central","Slice":"E","Ring":"4","ScaleUnit":"000","RoleInstance":"FR1PEPF00000C1C"}} | |
{"@odata.context":"https://graph.microsoft.com/v1.0/$metadata#policies/roleManagementPolicyAssignments","value":[{"id":"Group_066b5643-f931-46f1-855f-3bac0b6a95e3_eee4d9e9-b21a-4e00-a0e2-eba77233bb3a_member","policyId":"Group_066b5643-f931-46f1-855f-3bac0b6a95e3_eee4d9e9-b21a-4e00-a0e2-eba77233bb3a","scopeId":"066b5643-f931-46f1-855f-3bac0b6a95e3","scopeType":"Group","roleDefinitionId":"member"}]} | |
============================= End AzureAD Response ============================: timestamp="2024-12-26T22:23:38.729+0100" | |
2024-12-26T22:23:38.731+0100 [INFO] provider.terraform-provider-azuread_v3.0.2_x5.exe: 2024/12/26 22:23:38 [DEBUG] ============================ Begin AzureAD Request ============================ | |
Request ID: 08f9f170-e355-121f-aa6f-4f09bac879eb | |
GET /v1.0/policies/roleManagementPolicies/Group_066b5643-f931-46f1-855f-3bac0b6a95e3_eee4d9e9-b21a-4e00-a0e2-eba77233bb3a?%24expand=%2A HTTP/1.1 | |
Host: graph.microsoft.com | |
User-Agent: HashiCorp Terraform/1.9.3 (+https://www.terraform.io) Terraform Plugin SDK/2.34.0 terraform-provider-azuread/3.0.2 HashiCorp/go-azure-sdk (Go-http-Client/1.1 MicrosoftGraph-rolemanagementpolicy/v1.0) pid-222c6c49-1b0a-5959-a213-6608f9eb8820 | |
Accept: application/json; charset=utf-8; IEEE754Compatible=false | |
Content-Type: application/json; charset=utf-8 | |
Odata-Maxversion: 4.0 | |
Odata-Version: 4.0 | |
Accept-Encoding: gzip | |
============================= End AzureAD Request =============================: timestamp="2024-12-26T22:23:38.729+0100" | |
2024-12-26T22:23:38.732+0100 [INFO] provider.terraform-provider-azuread_v3.0.2_x5.exe: 2024/12/26 22:23:38 [DEBUG] GET https://graph.microsoft.com/v1.0/policies/roleManagementPolicies/Group_066b5643-f931-46f1-855f-3bac0b6a95e3_eee4d9e9-b21a-4e00-a0e2-eba77233bb3a?%24expand=%2A: timestamp="2024-12-26T22:23:38.729+0100" | |
2024-12-26T22:23:39.082+0100 [INFO] provider.terraform-provider-azuread_v3.0.2_x5.exe: 2024/12/26 22:23:39 [DEBUG] ============================ Begin AzureAD Response =========================== | |
GET https://graph.microsoft.com/v1.0/policies/roleManagementPolicies/Group_066b5643-f931-46f1-855f-3bac0b6a95e3_eee4d9e9-b21a-4e00-a0e2-eba77233bb3a?%24expand=%2A | |
Request ID: 08f9f170-e355-121f-aa6f-4f09bac879eb | |
HTTP/2.0 200 OK | |
Cache-Control: private | |
Client-Request-Id: 3b1f7e5c-a6a1-494c-bc85-4a23f3b975ef | |
Content-Type: application/json;odata.metadata=minimal;odata.streaming=true;IEEE754Compatible=false;charset=utf-8 | |
Date: Thu, 26 Dec 2024 21:23:38 GMT | |
Odata-Version: 4.0 | |
Request-Id: 3b1f7e5c-a6a1-494c-bc85-4a23f3b975ef | |
Strict-Transport-Security: max-age=31536000 | |
Vary: Accept-Encoding | |
X-Ms-Ags-Diagnostic: {"ServerInfo":{"DataCenter":"Germany West Central","Slice":"E","Ring":"4","ScaleUnit":"000","RoleInstance":"FR1PEPF0000149B"}} | |
{"@odata.context":"https://graph.microsoft.com/v1.0/$metadata#policies/roleManagementPolicies(effectiveRules(),rules())/$entity","id":"Group_066b5643-f931-46f1-855f-3bac0b6a95e3_eee4d9e9-b21a-4e00-a0e2-eba77233bb3a","displayName":"Group","description":"Group","isOrganizationDefault":false,"scopeId":"066b5643-f931-46f1-855f-3bac0b6a95e3","scopeType":"Group","lastModifiedDateTime":"2024-12-26T21:23:38.263Z","lastModifiedBy":{"displayName":"TerraformCli","id":null},"[email protected]":"https://graph.microsoft.com/v1.0/$metadata#policies/roleManagementPolicies('Group_066b5643-f931-46f1-855f-3bac0b6a95e3_eee4d9e9-b21a-4e00-a0e2-eba77233bb3a')/effectiveRules","effectiveRules":[{"@odata.type":"#microsoft.graph.unifiedRoleManagementPolicyEnablementRule","id":"Enablement_Admin_Eligibility","enabledRules":[],"target":{"caller":"Admin","operations":["all"],"level":"Eligibility","inheritableSettings":[],"enforcedSettings":[]}},{"@odata.type":"#microsoft.graph.unifiedRoleManagementPolicyExpirationRule","id":"Expiration_Admin_Eligibility","isExpirationRequired":true,"maximumDuration":"P365D","target":{"caller":"Admin","operations":["all"],"level":"Eligibility","inheritableSettings":[],"enforcedSettings":[]}},{"@odata.type":"#microsoft.graph.unifiedRoleManagementPolicyNotificationRule","id":"Notification_Admin_Admin_Eligibility","notificationType":"Email","recipientType":"Admin","notificationLevel":"All","isDefaultRecipientsEnabled":true,"notificationRecipients":[],"target":{"caller":"Admin","operations":["all"],"level":"Eligibility","inheritableSettings":[],"enforcedSettings":[]}},{"@odata.type":"#microsoft.graph.unifiedRoleManagementPolicyNotificationRule","id":"Notification_Requestor_Admin_Eligibility","notificationType":"Email","recipientType":"Requestor","notificationLevel":"All","isDefaultRecipientsEnabled":true,"notificationRecipients":[],"target":{"caller":"Admin","operations":["all"],"level":"Eligibility","inheritableSettings":[],"enforcedSettings":[]}},{"@odata.type":"#microsoft.graph.unifiedRoleManagementPolicyNotificationRule","id":"Notification_Approver_Admin_Eligibility","notificationType":"Email","recipientType":"Approver","notificationLevel":"All","isDefaultRecipientsEnabled":true,"notificationRecipients":[],"target":{"caller":"Admin","operations":["all"],"level":"Eligibility","inheritableSettings":[],"enforcedSettings":[]}},{"@odata.type":"#microsoft.graph.unifiedRoleManagementPolicyEnablementRule","id":"Enablement_Admin_Assignment","enabledRules":["Justification"],"target":{"caller":"Admin","operations":["all"],"level":"Assignment","inheritableSettings":[],"enforcedSettings":[]}},{"@odata.type":"#microsoft.graph.unifiedRoleManagementPolicyExpirationRule","id":"Expiration_Admin_Assignment","isExpirationRequired":true,"maximumDuration":"P180D","target":{"caller":"Admin","operations":["all"],"level":"Assignment","inheritableSettings":[],"enforcedSettings":[]}},{"@odata.type":"#microsoft.graph.unifiedRoleManagementPolicyNotificationRule","id":"Notification_Admin_Admin_Assignment","notificationType":"Email","recipientType":"Admin","notificationLevel":"All","isDefaultRecipientsEnabled":true,"notificationRecipients":[],"target":{"caller":"Admin","operations":["all"],"level":"Assignment","inheritableSettings":[],"enforcedSettings":[]}},{"@odata.type":"#microsoft.graph.unifiedRoleManagementPolicyNotificationRule","id":"Notification_Requestor_Admin_Assignment","notificationType":"Email","recipientType":"Requestor","notificationLevel":"All","isDefaultRecipientsEnabled":true,"notificationRecipients":[],"target":{"caller":"Admin","operations":["all"],"level":"Assignment","inheritableSettings":[],"enforcedSettings":[]}},{"@odata.type":"#microsoft.graph.unifiedRoleManagementPolicyNotificationRule","id":"Notification_Approver_Admin_Assignment","notificationType":"Email","recipientType":"Approver","notificationLevel":"All","isDefaultRecipientsEnabled":true,"notificationRecipients":[],"target":{"caller":"Admin","operations":["all"],"level":"Assignment","inheritableSettings":[],"enforcedSettings":[]}},{"@odata.type":"#microsoft.graph.unifiedRoleManagementPolicyApprovalRule","id":"Approval_EndUser_Assignment","target":{"caller":"EndUser","operations":["all"],"level":"Assignment","inheritableSettings":[],"enforcedSettings":[]},"setting":{"isApprovalRequired":false,"isApprovalRequiredForExtension":false,"isRequestorJustificationRequired":true,"approvalMode":"SingleStage","approvalStages":[{"approvalStageTimeOutInDays":1,"isApproverJustificationRequired":true,"escalationTimeInMinutes":0,"isEscalationEnabled":false,"primaryApprovers":[],"escalationApprovers":[]}]}},{"@odata.type":"#microsoft.graph.unifiedRoleManagementPolicyAuthenticationContextRule","id":"AuthenticationContext_EndUser_Assignment","isEnabled":false,"claimValue":null,"target":{"caller":"EndUser","operations":["all"],"level":"Assignment","inheritableSettings":[],"enforcedSettings":[]}},{"@odata.type":"#microsoft.graph.unifiedRoleManagementPolicyEnablementRule","id":"Enablement_EndUser_Assignment","enabledRules":["Justification","Ticketing"],"target":{"caller":"EndUser","operations":["all"],"level":"Assignment","inheritableSettings":[],"enforcedSettings":[]}},{"@odata.type":"#microsoft.graph.unifiedRoleManagementPolicyExpirationRule","id":"Expiration_EndUser_Assignment","isExpirationRequired":false,"maximumDuration":"PT16H","target":{"caller":"EndUser","operations":["all"],"level":"Assignment","inheritableSettings":[],"enforcedSettings":[]}},{"@odata.type":"#microsoft.graph.unifiedRoleManagementPolicyNotificationRule","id":"Notification_Admin_EndUser_Assignment","notificationType":"Email","recipientType":"Admin","notificationLevel":"All","isDefaultRecipientsEnabled":true,"notificationRecipients":[],"target":{"caller":"EndUser","operations":["all"],"level":"Assignment","inheritableSettings":[],"enforcedSettings":[]}},{"@odata.type":"#microsoft.graph.unifiedRoleManagementPolicyNotificationRule","id":"Notification_Requestor_EndUser_Assignment","notificationType":"Email","recipientType":"Requestor","notificationLevel":"All","isDefaultRecipientsEnabled":true,"notificationRecipients":[],"target":{"caller":"EndUser","operations":["all"],"level":"Assignment","inheritableSettings":[],"enforcedSettings":[]}},{"@odata.type":"#microsoft.graph.unifiedRoleManagementPolicyNotificationRule","id":"Notification_Approver_EndUser_Assignment","notificationType":"Email","recipientType":"Approver","notificationLevel":"All","isDefaultRecipientsEnabled":true,"notificationRecipients":[],"target":{"caller":"EndUser","operations":["all"],"level":"Assignment","inheritableSettings":[],"enforcedSettings":[]}}],"[email protected]":"https://graph.microsoft.com/v1.0/$metadata#policies/roleManagementPolicies('Group_066b5643-f931-46f1-855f-3bac0b6a95e3_eee4d9e9-b21a-4e00-a0e2-eba77233bb3a')/rules","rules":[{"@odata.type":"#microsoft.graph.unifiedRoleManagementPolicyEnablementRule","id":"Enablement_Admin_Eligibility","enabledRules":[],"target":{"caller":"Admin","operations":["all"],"level":"Eligibility","inheritableSettings":[],"enforcedSettings":[]}},{"@odata.type":"#microsoft.graph.unifiedRoleManagementPolicyExpirationRule","id":"Expiration_Admin_Eligibility","isExpirationRequired":true,"maximumDuration":"P365D","target":{"caller":"Admin","operations":["all"],"level":"Eligibility","inheritableSettings":[],"enforcedSettings":[]}},{"@odata.type":"#microsoft.graph.unifiedRoleManagementPolicyNotificationRule","id":"Notification_Admin_Admin_Eligibility","notificationType":"Email","recipientType":"Admin","notificationLevel":"All","isDefaultRecipientsEnabled":true,"notificationRecipients":[],"target":{"caller":"Admin","operations":["all"],"level":"Eligibility","inheritableSettings":[],"enforcedSettings":[]}},{"@odata.type":"#microsoft.graph.unifiedRoleManagementPolicyNotificationRule","id":"Notification_Requestor_Admin_Eligibility","notificationType":"Email","recipientType":"Requestor","notificationLevel":"All","isDefaultRecipientsEnabled":true,"notificationRecipients":[],"target":{"caller":"Admin","operations":["all"],"level":"Eligibility","inheritableSettings":[],"enforcedSettings":[]}},{"@odata.type":"#microsoft.graph.unifiedRoleManagementPolicyNotificationRule","id":"Notification_Approver_Admin_Eligibility","notificationType":"Email","recipientType":"Approver","notificationLevel":"All","isDefaultRecipientsEnabled":true,"notificationRecipients":[],"target":{"caller":"Admin","operations":["all"],"level":"Eligibility","inheritableSettings":[],"enforcedSettings":[]}},{"@odata.type":"#microsoft.graph.unifiedRoleManagementPolicyEnablementRule","id":"Enablement_Admin_Assignment","enabledRules":["Justification"],"target":{"caller":"Admin","operations":["all"],"level":"Assignment","inheritableSettings":[],"enforcedSettings":[]}},{"@odata.type":"#microsoft.graph.unifiedRoleManagementPolicyExpirationRule","id":"Expiration_Admin_Assignment","isExpirationRequired":true,"maximumDuration":"P180D","target":{"caller":"Admin","operations":["all"],"level":"Assignment","inheritableSettings":[],"enforcedSettings":[]}},{"@odata.type":"#microsoft.graph.unifiedRoleManagementPolicyNotificationRule","id":"Notification_Admin_Admin_Assignment","notificationType":"Email","recipientType":"Admin","notificationLevel":"All","isDefaultRecipientsEnabled":true,"notificationRecipients":[],"target":{"caller":"Admin","operations":["all"],"level":"Assignment","inheritableSettings":[],"enforcedSettings":[]}},{"@odata.type":"#microsoft.graph.unifiedRoleManagementPolicyNotificationRule","id":"Notification_Requestor_Admin_Assignment","notificationType":"Email","recipientType":"Requestor","notificationLevel":"All","isDefaultRecipientsEnabled":true,"notificationRecipients":[],"target":{"caller":"Admin","operations":["all"],"level":"Assignment","inheritableSettings":[],"enforcedSettings":[]}},{"@odata.type":"#microsoft.graph.unifiedRoleManagementPolicyNotificationRule","id":"Notification_Approver_Admin_Assignment","notificationType":"Email","recipientType":"Approver","notificationLevel":"All","isDefaultRecipientsEnabled":true,"notificationRecipients":[],"target":{"caller":"Admin","operations":["all"],"level":"Assignment","inheritableSettings":[],"enforcedSettings":[]}},{"@odata.type":"#microsoft.graph.unifiedRoleManagementPolicyApprovalRule","id":"Approval_EndUser_Assignment","target":{"caller":"EndUser","operations":["all"],"level":"Assignment","inheritableSettings":[],"enforcedSettings":[]},"setting":{"isApprovalRequired":false,"isApprovalRequiredForExtension":false,"isRequestorJustificationRequired":true,"approvalMode":"SingleStage","approvalStages":[{"approvalStageTimeOutInDays":1,"isApproverJustificationRequired":true,"escalationTimeInMinutes":0,"isEscalationEnabled":false,"primaryApprovers":[],"escalationApprovers":[]}]}},{"@odata.type":"#microsoft.graph.unifiedRoleManagementPolicyAuthenticationContextRule","id":"AuthenticationContext_EndUser_Assignment","isEnabled":false,"claimValue":null,"target":{"caller":"EndUser","operations":["all"],"level":"Assignment","inheritableSettings":[],"enforcedSettings":[]}},{"@odata.type":"#microsoft.graph.unifiedRoleManagementPolicyEnablementRule","id":"Enablement_EndUser_Assignment","enabledRules":["Justification","Ticketing"],"target":{"caller":"EndUser","operations":["all"],"level":"Assignment","inheritableSettings":[],"enforcedSettings":[]}},{"@odata.type":"#microsoft.graph.unifiedRoleManagementPolicyExpirationRule","id":"Expiration_EndUser_Assignment","isExpirationRequired":false,"maximumDuration":"PT16H","target":{"caller":"EndUser","operations":["all"],"level":"Assignment","inheritableSettings":[],"enforcedSettings":[]}},{"@odata.type":"#microsoft.graph.unifiedRoleManagementPolicyNotificationRule","id":"Notification_Admin_EndUser_Assignment","notificationType":"Email","recipientType":"Admin","notificationLevel":"All","isDefaultRecipientsEnabled":true,"notificationRecipients":[],"target":{"caller":"EndUser","operations":["all"],"level":"Assignment","inheritableSettings":[],"enforcedSettings":[]}},{"@odata.type":"#microsoft.graph.unifiedRoleManagementPolicyNotificationRule","id":"Notification_Requestor_EndUser_Assignment","notificationType":"Email","recipientType":"Requestor","notificationLevel":"All","isDefaultRecipientsEnabled":true,"notificationRecipients":[],"target":{"caller":"EndUser","operations":["all"],"level":"Assignment","inheritableSettings":[],"enforcedSettings":[]}},{"@odata.type":"#microsoft.graph.unifiedRoleManagementPolicyNotificationRule","id":"Notification_Approver_EndUser_Assignment","notificationType":"Email","recipientType":"Approver","notificationLevel":"All","isDefaultRecipientsEnabled":true,"notificationRecipients":[],"target":{"caller":"EndUser","operations":["all"],"level":"Assignment","inheritableSettings":[],"enforcedSettings":[]}}]} | |
============================= End AzureAD Response ============================: timestamp="2024-12-26T22:23:39.081+0100" | |
2024-12-26T22:23:39.090+0100 [INFO] provider.terraform-provider-azuread_v3.0.2_x5.exe: 2024/12/26 22:23:39 [DEBUG] ============================ Begin AzureAD Request ============================ | |
Request ID: 79ec2b66-6d80-8c86-2a5d-5685bad68be3 | |
GET /v1.0/policies/roleManagementPolicyAssignments?%24filter=scopeType+eq+%27Group%27+and+scopeId+eq+%27066b5643-f931-46f1-855f-3bac0b6a95e3%27+and+policyId+eq+%27Group_066b5643-f931-46f1-855f-3bac0b6a95e3_eee4d9e9-b21a-4e00-a0e2-eba77233bb3a%27 HTTP/1.1 | |
Host: graph.microsoft.com | |
User-Agent: HashiCorp Terraform/1.9.3 (+https://www.terraform.io) Terraform Plugin SDK/2.34.0 terraform-provider-azuread/3.0.2 HashiCorp/go-azure-sdk (Go-http-Client/1.1 MicrosoftGraph-rolemanagementpolicyassignment/v1.0) pid-222c6c49-1b0a-5959-a213-6608f9eb8820 | |
Accept: application/json; charset=utf-8; IEEE754Compatible=false | |
Content-Type: application/json; charset=utf-8 | |
Odata-Maxversion: 4.0 | |
Odata-Version: 4.0 | |
Accept-Encoding: gzip | |
============================= End AzureAD Request =============================: timestamp="2024-12-26T22:23:39.082+0100" | |
2024-12-26T22:23:39.090+0100 [INFO] provider.terraform-provider-azuread_v3.0.2_x5.exe: 2024/12/26 22:23:39 [DEBUG] GET https://graph.microsoft.com/v1.0/policies/roleManagementPolicyAssignments?%24filter=scopeType+eq+%27Group%27+and+scopeId+eq+%27066b5643-f931-46f1-855f-3bac0b6a95e3%27+and+policyId+eq+%27Group_066b5643-f931-46f1-855f-3bac0b6a95e3_eee4d9e9-b21a-4e00-a0e2-eba77233bb3a%27: timestamp="2024-12-26T22:23:39.082+0100" | |
2024-12-26T22:23:39.565+0100 [INFO] provider.terraform-provider-azuread_v3.0.2_x5.exe: 2024/12/26 22:23:39 [DEBUG] ============================ Begin AzureAD Response =========================== | |
GET https://graph.microsoft.com/v1.0/policies/roleManagementPolicyAssignments?%24filter=scopeType+eq+%27Group%27+and+scopeId+eq+%27066b5643-f931-46f1-855f-3bac0b6a95e3%27+and+policyId+eq+%27Group_066b5643-f931-46f1-855f-3bac0b6a95e3_eee4d9e9-b21a-4e00-a0e2-eba77233bb3a%27 | |
Request ID: 79ec2b66-6d80-8c86-2a5d-5685bad68be3 | |
HTTP/2.0 200 OK | |
Cache-Control: private | |
Client-Request-Id: 33fc9cac-119d-40d3-ae1d-7341672aec52 | |
Content-Type: application/json;odata.metadata=minimal;odata.streaming=true;IEEE754Compatible=false;charset=utf-8 | |
Date: Thu, 26 Dec 2024 21:23:39 GMT | |
Odata-Version: 4.0 | |
Request-Id: 33fc9cac-119d-40d3-ae1d-7341672aec52 | |
Strict-Transport-Security: max-age=31536000 | |
Vary: Accept-Encoding | |
X-Ms-Ags-Diagnostic: {"ServerInfo":{"DataCenter":"Germany West Central","Slice":"E","Ring":"4","ScaleUnit":"000","RoleInstance":"FR1PEPF000007AC"}} | |
{"@odata.context":"https://graph.microsoft.com/v1.0/$metadata#policies/roleManagementPolicyAssignments","value":[{"id":"Group_066b5643-f931-46f1-855f-3bac0b6a95e3_eee4d9e9-b21a-4e00-a0e2-eba77233bb3a_member","policyId":"Group_066b5643-f931-46f1-855f-3bac0b6a95e3_eee4d9e9-b21a-4e00-a0e2-eba77233bb3a","scopeId":"066b5643-f931-46f1-855f-3bac0b6a95e3","scopeType":"Group","roleDefinitionId":"member"}]} | |
============================= End AzureAD Response ============================: timestamp="2024-12-26T22:23:39.565+0100" | |
2024-12-26T22:23:39.566+0100 [WARN] Provider "provider[\"registry.terraform.io/hashicorp/azuread\"]" produced an unexpected new value for azuread_group_role_management_policy.pimpolicy1, but we are tolerating it because it is using the legacy plugin SDK. | |
The following problems may be the cause of any confusing errors from downstream operations: | |
- .activation_rules[0].approval_stage: block count changed from 0 to 1 | |
azuread_group_role_management_policy.pimpolicy1: Modifications complete after 3s [id=Group_066b5643-f931-46f1-855f-3bac0b6a95e3_eee4d9e9-b21a-4e00-a0e2-eba77233bb3a] | |
2024-12-26T22:23:39.570+0100 [DEBUG] State storage *statemgr.Filesystem declined to persist a state snapshot | |
2024-12-26T22:23:39.572+0100 [DEBUG] provider.stdio: received EOF, stopping recv loop: err="rpc error: code = Unavailable desc = error reading from server: EOF" | |
2024-12-26T22:23:39.578+0100 [INFO] provider: plugin process exited: plugin=.terraform/providers/registry.terraform.io/hashicorp/azuread/3.0.2/windows_amd64/terraform-provider-azuread_v3.0.2_x5.exe id=45640 | |
2024-12-26T22:23:39.579+0100 [DEBUG] provider: plugin exited | |
Apply complete! Resources: 0 added, 1 changed, 0 destroyed. | |
Pipeline execution completed. | |
PS C:\Users\DEBESURBHA\OneDrive - SWISS KRONO GROUP\Documents\PIMGroups> |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment