Azure Active Directory Provider
The Azure Provider can be used to congure infrastructure in Azure Active Directory (https://azure.microsoft.com/en- us/services/active-directory/) using the Azure Resource Manager API's. Documentation regarding the Data Sources (/docs/conguration/data-sources.html) and Resources (/docs/conguration/resources.html) supported by the Azure Active Directory Provider can be found in the navigation to the left. Interested in the provider's latest features, or want to make sure you're up to date? Check out the changelog (https://github.com/terraform-providers/terraform-provider-azuread/blob/master/CHANGELOG.md) for version information and release notes.
Authenticating to Azure Active Directory
Terraform supports a number of dierent methods for authenticating to Azure Active Directory: Authenticating to Azure Active Directory using the Azure CLI (/docs/providers/azuread/auth/azure_cli.html) Authenticating to Azure Active Directory using Managed Service Identity (/docs/providers/azuread/auth/managed_service_identity.html) Authenticating to Azure Active Directory using a Service Principal and a Client Certicate (/docs/providers/azuread/auth/service_principal_client_certicate.html) Authenticating to Azure Active Directory using a Service Principal and a Client Secret (/docs/providers/azuread/auth/service_principal_client_secret.html) We recommend using either a Service Principal or Managed Service Identity when running Terraform non-interactively (such as when running Terraform in a CI server) - and authenticating using the Azure CLI when running Terraform locally.
Example Usage
provider "azuread" { version = = "=0.3.0" } resource "azuread_application" "example" { name = = "ExampleApp" } resource "azuread_service_principal" "example" { application_id = = "${azuread_application.example.application_id}" }