Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

TF cannot pass a value in rsa "provider_user_name_template" field #2072

Open
rluo2024 opened this issue Aug 22, 2024 · 2 comments
Open

TF cannot pass a value in rsa "provider_user_name_template" field #2072

rluo2024 opened this issue Aug 22, 2024 · 2 comments
Labels
bug triaged Triaged into internal Jira

Comments

@rluo2024
Copy link

Hi Folks,

When I try to create RSA authenticators in Okta by TF, I got the error below:

│ Error: failed to update authenticator: the API returned an error: Api validation failed: provider.configuration.userNameTemplate.template. Causes: errorSummary: provider.configuration.userNameTemplate.template: The field cannot be left blank

with okta_authenticator.okta_rsa1,
on [authenticators.tf] line 86, in resource "okta_authenticator" "okta_rsa1":
86: resource "okta_authenticator" "okta_rsa1" {

Here is the resource in [authenticators.tf]:

resource "okta_authenticator" "okta_rsa1" {
key = "rsa_token"
name = "RSA SecurID"
provider_auth_port = 1645
provider_hostname = "[xxx.xxxx.xxxl.ca]
provider_user_name_template = "global.assign.userName.ad.sam"
provider_shared_secret = "${var.rsa_password}"
status = "ACTIVE"
}

does anyone know how to fix it?
Thanks,
Ray

@duytiennguyen-okta duytiennguyen-okta added triaged Triaged into internal Jira bug labels Aug 27, 2024
@duytiennguyen-okta
Copy link
Contributor

Yeah this is a bug that is need to be fixed

@duytiennguyen-okta
Copy link
Contributor

OKTA internal reference https://oktainc.atlassian.net/browse/OKTA-797524

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
bug triaged Triaged into internal Jira
Projects
None yet
Development

No branches or pull requests

2 participants