1. Packages
  2. Grafana Cloud
  3. API Docs
  4. oss
  5. SsoSettings
Grafana v0.16.3 published on Monday, Apr 7, 2025 by pulumiverse

grafana.oss.SsoSettings

Explore with Pulumi AI

Manages Grafana SSO Settings for OAuth2, SAML and LDAP. Support for LDAP is currently in preview, it will be available in Grafana starting with v11.3.

Example Usage

import * as pulumi from "@pulumi/pulumi";
import * as grafana from "@pulumiverse/grafana";

// Configure SSO for GitHub using OAuth2
const githubSsoSettings = new grafana.oss.SsoSettings("github_sso_settings", {
    providerName: "github",
    oauth2Settings: {
        name: "Github",
        clientId: "<your GitHub app client id>",
        clientSecret: "<your GitHub app client secret>",
        allowSignUp: true,
        autoLogin: false,
        scopes: "user:email,read:org",
        teamIds: "150,300",
        allowedOrganizations: "[\"My Organization\", \"Octocats\"]",
        allowedDomains: "mycompany.com mycompany.org",
    },
});
// Configure SSO using generic OAuth2
const genericSsoSettings = new grafana.oss.SsoSettings("generic_sso_settings", {
    providerName: "generic_oauth",
    oauth2Settings: {
        name: "Auth0",
        authUrl: "https://<domain>/authorize",
        tokenUrl: "https://<domain>/oauth/token",
        apiUrl: "https://<domain>/userinfo",
        clientId: "<client id>",
        clientSecret: "<client secret>",
        allowSignUp: true,
        autoLogin: false,
        scopes: "openid profile email offline_access",
        usePkce: true,
        useRefreshToken: true,
    },
});
// Configure SSO using SAML
const samlSsoSettings = new grafana.oss.SsoSettings("saml_sso_settings", {
    providerName: "saml",
    samlSettings: {
        allowSignUp: true,
        certificatePath: "devenv/docker/blocks/auth/saml-enterprise/cert.crt",
        privateKeyPath: "devenv/docker/blocks/auth/saml-enterprise/key.pem",
        idpMetadataUrl: "https://nexus.microsoftonline-p.com/federationmetadata/saml20/federationmetadata.xml",
        signatureAlgorithm: "rsa-sha256",
        assertionAttributeLogin: "login",
        assertionAttributeEmail: "email",
        nameIdFormat: "urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress",
    },
});
// Configure SSO using LDAP
const ldapSsoSettings = new grafana.oss.SsoSettings("ldap_sso_settings", {
    providerName: "ldap",
    ldapSettings: {
        enabled: true,
        config: {
            servers: [{
                host: "127.0.0.1",
                port: 389,
                searchFilter: "(cn=%s)",
                bindDn: "cn=admin,dc=grafana,dc=org",
                bindPassword: "grafana",
                searchBaseDns: ["dc=grafana,dc=org"],
                attributes: {
                    name: "givenName",
                    surname: "sn",
                    username: "cn",
                    member_of: "memberOf",
                    email: "email",
                },
                groupMappings: [
                    {
                        groupDn: "cn=superadmins,dc=grafana,dc=org",
                        orgRole: "Admin",
                        orgId: 1,
                        grafanaAdmin: true,
                    },
                    {
                        groupDn: "cn=users,dc=grafana,dc=org",
                        orgRole: "Editor",
                    },
                    {
                        groupDn: "*",
                        orgRole: "Viewer",
                    },
                ],
            }],
        },
    },
});
Copy
import pulumi
import pulumiverse_grafana as grafana

# Configure SSO for GitHub using OAuth2
github_sso_settings = grafana.oss.SsoSettings("github_sso_settings",
    provider_name="github",
    oauth2_settings={
        "name": "Github",
        "client_id": "<your GitHub app client id>",
        "client_secret": "<your GitHub app client secret>",
        "allow_sign_up": True,
        "auto_login": False,
        "scopes": "user:email,read:org",
        "team_ids": "150,300",
        "allowed_organizations": "[\"My Organization\", \"Octocats\"]",
        "allowed_domains": "mycompany.com mycompany.org",
    })
# Configure SSO using generic OAuth2
generic_sso_settings = grafana.oss.SsoSettings("generic_sso_settings",
    provider_name="generic_oauth",
    oauth2_settings={
        "name": "Auth0",
        "auth_url": "https://<domain>/authorize",
        "token_url": "https://<domain>/oauth/token",
        "api_url": "https://<domain>/userinfo",
        "client_id": "<client id>",
        "client_secret": "<client secret>",
        "allow_sign_up": True,
        "auto_login": False,
        "scopes": "openid profile email offline_access",
        "use_pkce": True,
        "use_refresh_token": True,
    })
# Configure SSO using SAML
saml_sso_settings = grafana.oss.SsoSettings("saml_sso_settings",
    provider_name="saml",
    saml_settings={
        "allow_sign_up": True,
        "certificate_path": "devenv/docker/blocks/auth/saml-enterprise/cert.crt",
        "private_key_path": "devenv/docker/blocks/auth/saml-enterprise/key.pem",
        "idp_metadata_url": "https://nexus.microsoftonline-p.com/federationmetadata/saml20/federationmetadata.xml",
        "signature_algorithm": "rsa-sha256",
        "assertion_attribute_login": "login",
        "assertion_attribute_email": "email",
        "name_id_format": "urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress",
    })
# Configure SSO using LDAP
ldap_sso_settings = grafana.oss.SsoSettings("ldap_sso_settings",
    provider_name="ldap",
    ldap_settings={
        "enabled": True,
        "config": {
            "servers": [{
                "host": "127.0.0.1",
                "port": 389,
                "search_filter": "(cn=%s)",
                "bind_dn": "cn=admin,dc=grafana,dc=org",
                "bind_password": "grafana",
                "search_base_dns": ["dc=grafana,dc=org"],
                "attributes": {
                    "name": "givenName",
                    "surname": "sn",
                    "username": "cn",
                    "member_of": "memberOf",
                    "email": "email",
                },
                "group_mappings": [
                    {
                        "group_dn": "cn=superadmins,dc=grafana,dc=org",
                        "org_role": "Admin",
                        "org_id": 1,
                        "grafana_admin": True,
                    },
                    {
                        "group_dn": "cn=users,dc=grafana,dc=org",
                        "org_role": "Editor",
                    },
                    {
                        "group_dn": "*",
                        "org_role": "Viewer",
                    },
                ],
            }],
        },
    })
Copy
package main

import (
	"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
	"github.com/pulumiverse/pulumi-grafana/sdk/go/grafana/oss"
)

func main() {
	pulumi.Run(func(ctx *pulumi.Context) error {
		// Configure SSO for GitHub using OAuth2
		_, err := oss.NewSsoSettings(ctx, "github_sso_settings", &oss.SsoSettingsArgs{
			ProviderName: pulumi.String("github"),
			Oauth2Settings: &oss.SsoSettingsOauth2SettingsArgs{
				Name:                 pulumi.String("Github"),
				ClientId:             pulumi.String("<your GitHub app client id>"),
				ClientSecret:         pulumi.String("<your GitHub app client secret>"),
				AllowSignUp:          pulumi.Bool(true),
				AutoLogin:            pulumi.Bool(false),
				Scopes:               pulumi.String("user:email,read:org"),
				TeamIds:              pulumi.String("150,300"),
				AllowedOrganizations: pulumi.String("[\"My Organization\", \"Octocats\"]"),
				AllowedDomains:       pulumi.String("mycompany.com mycompany.org"),
			},
		})
		if err != nil {
			return err
		}
		// Configure SSO using generic OAuth2
		_, err = oss.NewSsoSettings(ctx, "generic_sso_settings", &oss.SsoSettingsArgs{
			ProviderName: pulumi.String("generic_oauth"),
			Oauth2Settings: &oss.SsoSettingsOauth2SettingsArgs{
				Name:            pulumi.String("Auth0"),
				AuthUrl:         pulumi.String("https://<domain>/authorize"),
				TokenUrl:        pulumi.String("https://<domain>/oauth/token"),
				ApiUrl:          pulumi.String("https://<domain>/userinfo"),
				ClientId:        pulumi.String("<client id>"),
				ClientSecret:    pulumi.String("<client secret>"),
				AllowSignUp:     pulumi.Bool(true),
				AutoLogin:       pulumi.Bool(false),
				Scopes:          pulumi.String("openid profile email offline_access"),
				UsePkce:         pulumi.Bool(true),
				UseRefreshToken: pulumi.Bool(true),
			},
		})
		if err != nil {
			return err
		}
		// Configure SSO using SAML
		_, err = oss.NewSsoSettings(ctx, "saml_sso_settings", &oss.SsoSettingsArgs{
			ProviderName: pulumi.String("saml"),
			SamlSettings: &oss.SsoSettingsSamlSettingsArgs{
				AllowSignUp:             pulumi.Bool(true),
				CertificatePath:         pulumi.String("devenv/docker/blocks/auth/saml-enterprise/cert.crt"),
				PrivateKeyPath:          pulumi.String("devenv/docker/blocks/auth/saml-enterprise/key.pem"),
				IdpMetadataUrl:          pulumi.String("https://nexus.microsoftonline-p.com/federationmetadata/saml20/federationmetadata.xml"),
				SignatureAlgorithm:      pulumi.String("rsa-sha256"),
				AssertionAttributeLogin: pulumi.String("login"),
				AssertionAttributeEmail: pulumi.String("email"),
				NameIdFormat:            pulumi.String("urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress"),
			},
		})
		if err != nil {
			return err
		}
		// Configure SSO using LDAP
		_, err = oss.NewSsoSettings(ctx, "ldap_sso_settings", &oss.SsoSettingsArgs{
			ProviderName: pulumi.String("ldap"),
			LdapSettings: &oss.SsoSettingsLdapSettingsArgs{
				Enabled: pulumi.Bool(true),
				Config: &oss.SsoSettingsLdapSettingsConfigArgs{
					Servers: oss.SsoSettingsLdapSettingsConfigServerArray{
						&oss.SsoSettingsLdapSettingsConfigServerArgs{
							Host:         pulumi.String("127.0.0.1"),
							Port:         pulumi.Int(389),
							SearchFilter: pulumi.String("(cn=%s)"),
							BindDn:       pulumi.String("cn=admin,dc=grafana,dc=org"),
							BindPassword: pulumi.String("grafana"),
							SearchBaseDns: pulumi.StringArray{
								pulumi.String("dc=grafana,dc=org"),
							},
							Attributes: pulumi.StringMap{
								"name":      pulumi.String("givenName"),
								"surname":   pulumi.String("sn"),
								"username":  pulumi.String("cn"),
								"member_of": pulumi.String("memberOf"),
								"email":     pulumi.String("email"),
							},
							GroupMappings: oss.SsoSettingsLdapSettingsConfigServerGroupMappingArray{
								&oss.SsoSettingsLdapSettingsConfigServerGroupMappingArgs{
									GroupDn:      pulumi.String("cn=superadmins,dc=grafana,dc=org"),
									OrgRole:      pulumi.String("Admin"),
									OrgId:        pulumi.Int(1),
									GrafanaAdmin: pulumi.Bool(true),
								},
								&oss.SsoSettingsLdapSettingsConfigServerGroupMappingArgs{
									GroupDn: pulumi.String("cn=users,dc=grafana,dc=org"),
									OrgRole: pulumi.String("Editor"),
								},
								&oss.SsoSettingsLdapSettingsConfigServerGroupMappingArgs{
									GroupDn: pulumi.String("*"),
									OrgRole: pulumi.String("Viewer"),
								},
							},
						},
					},
				},
			},
		})
		if err != nil {
			return err
		}
		return nil
	})
}
Copy
using System.Collections.Generic;
using System.Linq;
using Pulumi;
using Grafana = Pulumiverse.Grafana;

return await Deployment.RunAsync(() => 
{
    // Configure SSO for GitHub using OAuth2
    var githubSsoSettings = new Grafana.Oss.SsoSettings("github_sso_settings", new()
    {
        ProviderName = "github",
        Oauth2Settings = new Grafana.Oss.Inputs.SsoSettingsOauth2SettingsArgs
        {
            Name = "Github",
            ClientId = "<your GitHub app client id>",
            ClientSecret = "<your GitHub app client secret>",
            AllowSignUp = true,
            AutoLogin = false,
            Scopes = "user:email,read:org",
            TeamIds = "150,300",
            AllowedOrganizations = "[\"My Organization\", \"Octocats\"]",
            AllowedDomains = "mycompany.com mycompany.org",
        },
    });

    // Configure SSO using generic OAuth2
    var genericSsoSettings = new Grafana.Oss.SsoSettings("generic_sso_settings", new()
    {
        ProviderName = "generic_oauth",
        Oauth2Settings = new Grafana.Oss.Inputs.SsoSettingsOauth2SettingsArgs
        {
            Name = "Auth0",
            AuthUrl = "https://<domain>/authorize",
            TokenUrl = "https://<domain>/oauth/token",
            ApiUrl = "https://<domain>/userinfo",
            ClientId = "<client id>",
            ClientSecret = "<client secret>",
            AllowSignUp = true,
            AutoLogin = false,
            Scopes = "openid profile email offline_access",
            UsePkce = true,
            UseRefreshToken = true,
        },
    });

    // Configure SSO using SAML
    var samlSsoSettings = new Grafana.Oss.SsoSettings("saml_sso_settings", new()
    {
        ProviderName = "saml",
        SamlSettings = new Grafana.Oss.Inputs.SsoSettingsSamlSettingsArgs
        {
            AllowSignUp = true,
            CertificatePath = "devenv/docker/blocks/auth/saml-enterprise/cert.crt",
            PrivateKeyPath = "devenv/docker/blocks/auth/saml-enterprise/key.pem",
            IdpMetadataUrl = "https://nexus.microsoftonline-p.com/federationmetadata/saml20/federationmetadata.xml",
            SignatureAlgorithm = "rsa-sha256",
            AssertionAttributeLogin = "login",
            AssertionAttributeEmail = "email",
            NameIdFormat = "urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress",
        },
    });

    // Configure SSO using LDAP
    var ldapSsoSettings = new Grafana.Oss.SsoSettings("ldap_sso_settings", new()
    {
        ProviderName = "ldap",
        LdapSettings = new Grafana.Oss.Inputs.SsoSettingsLdapSettingsArgs
        {
            Enabled = true,
            Config = new Grafana.Oss.Inputs.SsoSettingsLdapSettingsConfigArgs
            {
                Servers = new[]
                {
                    new Grafana.Oss.Inputs.SsoSettingsLdapSettingsConfigServerArgs
                    {
                        Host = "127.0.0.1",
                        Port = 389,
                        SearchFilter = "(cn=%s)",
                        BindDn = "cn=admin,dc=grafana,dc=org",
                        BindPassword = "grafana",
                        SearchBaseDns = new[]
                        {
                            "dc=grafana,dc=org",
                        },
                        Attributes = 
                        {
                            { "name", "givenName" },
                            { "surname", "sn" },
                            { "username", "cn" },
                            { "member_of", "memberOf" },
                            { "email", "email" },
                        },
                        GroupMappings = new[]
                        {
                            new Grafana.Oss.Inputs.SsoSettingsLdapSettingsConfigServerGroupMappingArgs
                            {
                                GroupDn = "cn=superadmins,dc=grafana,dc=org",
                                OrgRole = "Admin",
                                OrgId = 1,
                                GrafanaAdmin = true,
                            },
                            new Grafana.Oss.Inputs.SsoSettingsLdapSettingsConfigServerGroupMappingArgs
                            {
                                GroupDn = "cn=users,dc=grafana,dc=org",
                                OrgRole = "Editor",
                            },
                            new Grafana.Oss.Inputs.SsoSettingsLdapSettingsConfigServerGroupMappingArgs
                            {
                                GroupDn = "*",
                                OrgRole = "Viewer",
                            },
                        },
                    },
                },
            },
        },
    });

});
Copy
package generated_program;

import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.grafana.oss.SsoSettings;
import com.pulumi.grafana.oss.SsoSettingsArgs;
import com.pulumi.grafana.oss.inputs.SsoSettingsOauth2SettingsArgs;
import com.pulumi.grafana.oss.inputs.SsoSettingsSamlSettingsArgs;
import com.pulumi.grafana.oss.inputs.SsoSettingsLdapSettingsArgs;
import com.pulumi.grafana.oss.inputs.SsoSettingsLdapSettingsConfigArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;

public class App {
    public static void main(String[] args) {
        Pulumi.run(App::stack);
    }

    public static void stack(Context ctx) {
        // Configure SSO for GitHub using OAuth2
        var githubSsoSettings = new SsoSettings("githubSsoSettings", SsoSettingsArgs.builder()
            .providerName("github")
            .oauth2Settings(SsoSettingsOauth2SettingsArgs.builder()
                .name("Github")
                .clientId("<your GitHub app client id>")
                .clientSecret("<your GitHub app client secret>")
                .allowSignUp(true)
                .autoLogin(false)
                .scopes("user:email,read:org")
                .teamIds("150,300")
                .allowedOrganizations("[\"My Organization\", \"Octocats\"]")
                .allowedDomains("mycompany.com mycompany.org")
                .build())
            .build());

        // Configure SSO using generic OAuth2
        var genericSsoSettings = new SsoSettings("genericSsoSettings", SsoSettingsArgs.builder()
            .providerName("generic_oauth")
            .oauth2Settings(SsoSettingsOauth2SettingsArgs.builder()
                .name("Auth0")
                .authUrl("https://<domain>/authorize")
                .tokenUrl("https://<domain>/oauth/token")
                .apiUrl("https://<domain>/userinfo")
                .clientId("<client id>")
                .clientSecret("<client secret>")
                .allowSignUp(true)
                .autoLogin(false)
                .scopes("openid profile email offline_access")
                .usePkce(true)
                .useRefreshToken(true)
                .build())
            .build());

        // Configure SSO using SAML
        var samlSsoSettings = new SsoSettings("samlSsoSettings", SsoSettingsArgs.builder()
            .providerName("saml")
            .samlSettings(SsoSettingsSamlSettingsArgs.builder()
                .allowSignUp(true)
                .certificatePath("devenv/docker/blocks/auth/saml-enterprise/cert.crt")
                .privateKeyPath("devenv/docker/blocks/auth/saml-enterprise/key.pem")
                .idpMetadataUrl("https://nexus.microsoftonline-p.com/federationmetadata/saml20/federationmetadata.xml")
                .signatureAlgorithm("rsa-sha256")
                .assertionAttributeLogin("login")
                .assertionAttributeEmail("email")
                .nameIdFormat("urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress")
                .build())
            .build());

        // Configure SSO using LDAP
        var ldapSsoSettings = new SsoSettings("ldapSsoSettings", SsoSettingsArgs.builder()
            .providerName("ldap")
            .ldapSettings(SsoSettingsLdapSettingsArgs.builder()
                .enabled("true")
                .config(SsoSettingsLdapSettingsConfigArgs.builder()
                    .servers(SsoSettingsLdapSettingsConfigServerArgs.builder()
                        .host("127.0.0.1")
                        .port(389)
                        .searchFilter("(cn=%s)")
                        .bindDn("cn=admin,dc=grafana,dc=org")
                        .bindPassword("grafana")
                        .searchBaseDns("dc=grafana,dc=org")
                        .attributes(Map.ofEntries(
                            Map.entry("name", "givenName"),
                            Map.entry("surname", "sn"),
                            Map.entry("username", "cn"),
                            Map.entry("member_of", "memberOf"),
                            Map.entry("email", "email")
                        ))
                        .groupMappings(                        
                            SsoSettingsLdapSettingsConfigServerGroupMappingArgs.builder()
                                .groupDn("cn=superadmins,dc=grafana,dc=org")
                                .orgRole("Admin")
                                .orgId(1)
                                .grafanaAdmin(true)
                                .build(),
                            SsoSettingsLdapSettingsConfigServerGroupMappingArgs.builder()
                                .groupDn("cn=users,dc=grafana,dc=org")
                                .orgRole("Editor")
                                .build(),
                            SsoSettingsLdapSettingsConfigServerGroupMappingArgs.builder()
                                .groupDn("*")
                                .orgRole("Viewer")
                                .build())
                        .build())
                    .build())
                .build())
            .build());

    }
}
Copy
resources:
  # Configure SSO for GitHub using OAuth2
  githubSsoSettings:
    type: grafana:oss:SsoSettings
    name: github_sso_settings
    properties:
      providerName: github
      oauth2Settings:
        name: Github
        clientId: <your GitHub app client id>
        clientSecret: <your GitHub app client secret>
        allowSignUp: true
        autoLogin: false
        scopes: user:email,read:org
        teamIds: 150,300
        allowedOrganizations: '["My Organization", "Octocats"]'
        allowedDomains: mycompany.com mycompany.org
  # Configure SSO using generic OAuth2
  genericSsoSettings:
    type: grafana:oss:SsoSettings
    name: generic_sso_settings
    properties:
      providerName: generic_oauth
      oauth2Settings:
        name: Auth0
        authUrl: https://<domain>/authorize
        tokenUrl: https://<domain>/oauth/token
        apiUrl: https://<domain>/userinfo
        clientId: <client id>
        clientSecret: <client secret>
        allowSignUp: true
        autoLogin: false
        scopes: openid profile email offline_access
        usePkce: true
        useRefreshToken: true
  # Configure SSO using SAML
  samlSsoSettings:
    type: grafana:oss:SsoSettings
    name: saml_sso_settings
    properties:
      providerName: saml
      samlSettings:
        allowSignUp: true
        certificatePath: devenv/docker/blocks/auth/saml-enterprise/cert.crt
        privateKeyPath: devenv/docker/blocks/auth/saml-enterprise/key.pem
        idpMetadataUrl: https://nexus.microsoftonline-p.com/federationmetadata/saml20/federationmetadata.xml
        signatureAlgorithm: rsa-sha256
        assertionAttributeLogin: login
        assertionAttributeEmail: email
        nameIdFormat: urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress
  # Configure SSO using LDAP
  ldapSsoSettings:
    type: grafana:oss:SsoSettings
    name: ldap_sso_settings
    properties:
      providerName: ldap
      ldapSettings:
        enabled: 'true'
        config:
          servers:
            - host: 127.0.0.1
              port: 389
              searchFilter: (cn=%s)
              bindDn: cn=admin,dc=grafana,dc=org
              bindPassword: grafana
              searchBaseDns:
                - dc=grafana,dc=org
              attributes:
                name: givenName
                surname: sn
                username: cn
                member_of: memberOf
                email: email
              groupMappings:
                - groupDn: cn=superadmins,dc=grafana,dc=org
                  orgRole: Admin
                  orgId: 1
                  grafanaAdmin: true
                - groupDn: cn=users,dc=grafana,dc=org
                  orgRole: Editor
                - groupDn: '*'
                  orgRole: Viewer
Copy

Create SsoSettings Resource

Resources are created with functions called constructors. To learn more about declaring and configuring resources, see Resources.

Constructor syntax

new SsoSettings(name: string, args: SsoSettingsArgs, opts?: CustomResourceOptions);
@overload
def SsoSettings(resource_name: str,
                args: SsoSettingsArgs,
                opts: Optional[ResourceOptions] = None)

@overload
def SsoSettings(resource_name: str,
                opts: Optional[ResourceOptions] = None,
                provider_name: Optional[str] = None,
                ldap_settings: Optional[SsoSettingsLdapSettingsArgs] = None,
                oauth2_settings: Optional[SsoSettingsOauth2SettingsArgs] = None,
                saml_settings: Optional[SsoSettingsSamlSettingsArgs] = None)
func NewSsoSettings(ctx *Context, name string, args SsoSettingsArgs, opts ...ResourceOption) (*SsoSettings, error)
public SsoSettings(string name, SsoSettingsArgs args, CustomResourceOptions? opts = null)
public SsoSettings(String name, SsoSettingsArgs args)
public SsoSettings(String name, SsoSettingsArgs args, CustomResourceOptions options)
type: grafana:oss:SsoSettings
properties: # The arguments to resource properties.
options: # Bag of options to control resource's behavior.

Parameters

name This property is required. string
The unique name of the resource.
args This property is required. SsoSettingsArgs
The arguments to resource properties.
opts CustomResourceOptions
Bag of options to control resource's behavior.
resource_name This property is required. str
The unique name of the resource.
args This property is required. SsoSettingsArgs
The arguments to resource properties.
opts ResourceOptions
Bag of options to control resource's behavior.
ctx Context
Context object for the current deployment.
name This property is required. string
The unique name of the resource.
args This property is required. SsoSettingsArgs
The arguments to resource properties.
opts ResourceOption
Bag of options to control resource's behavior.
name This property is required. string
The unique name of the resource.
args This property is required. SsoSettingsArgs
The arguments to resource properties.
opts CustomResourceOptions
Bag of options to control resource's behavior.
name This property is required. String
The unique name of the resource.
args This property is required. SsoSettingsArgs
The arguments to resource properties.
options CustomResourceOptions
Bag of options to control resource's behavior.

Constructor example

The following reference example uses placeholder values for all input properties.

var ssoSettingsResource = new Grafana.Oss.SsoSettings("ssoSettingsResource", new()
{
    ProviderName = "string",
    LdapSettings = new Grafana.Oss.Inputs.SsoSettingsLdapSettingsArgs
    {
        Config = new Grafana.Oss.Inputs.SsoSettingsLdapSettingsConfigArgs
        {
            Servers = new[]
            {
                new Grafana.Oss.Inputs.SsoSettingsLdapSettingsConfigServerArgs
                {
                    Host = "string",
                    SearchFilter = "string",
                    SearchBaseDns = new[]
                    {
                        "string",
                    },
                    GroupSearchFilterUserAttribute = "string",
                    MinTlsVersion = "string",
                    ClientKey = "string",
                    ClientKeyValue = "string",
                    GroupMappings = new[]
                    {
                        new Grafana.Oss.Inputs.SsoSettingsLdapSettingsConfigServerGroupMappingArgs
                        {
                            GroupDn = "string",
                            OrgRole = "string",
                            GrafanaAdmin = false,
                            OrgId = 0,
                        },
                    },
                    GroupSearchBaseDns = new[]
                    {
                        "string",
                    },
                    GroupSearchFilter = "string",
                    Attributes = 
                    {
                        { "string", "string" },
                    },
                    ClientCert = "string",
                    ClientCertValue = "string",
                    Port = 0,
                    RootCaCert = "string",
                    RootCaCertValues = new[]
                    {
                        "string",
                    },
                    BindPassword = "string",
                    BindDn = "string",
                    SslSkipVerify = false,
                    StartTls = false,
                    Timeout = 0,
                    TlsCiphers = new[]
                    {
                        "string",
                    },
                    UseSsl = false,
                },
            },
        },
        AllowSignUp = false,
        Enabled = false,
        SkipOrgRoleSync = false,
    },
    Oauth2Settings = new Grafana.Oss.Inputs.SsoSettingsOauth2SettingsArgs
    {
        ClientId = "string",
        LoginAttributePath = "string",
        TlsClientCert = "string",
        AllowedGroups = "string",
        AllowedOrganizations = "string",
        ApiUrl = "string",
        AuthStyle = "string",
        AuthUrl = "string",
        AutoLogin = false,
        AllowSignUp = false,
        ClientSecret = "string",
        Custom = 
        {
            { "string", "string" },
        },
        DefineAllowedGroups = false,
        DefineAllowedTeamsIds = false,
        Name = "string",
        EmailAttributePath = "string",
        EmptyScopes = false,
        Enabled = false,
        GroupsAttributePath = "string",
        UsePkce = false,
        AllowedDomains = "string",
        EmailAttributeName = "string",
        NameAttributePath = "string",
        OrgAttributePath = "string",
        OrgMapping = "string",
        RoleAttributePath = "string",
        RoleAttributeStrict = false,
        Scopes = "string",
        SignoutRedirectUrl = "string",
        SkipOrgRoleSync = false,
        TeamIds = "string",
        TeamIdsAttributePath = "string",
        TeamsUrl = "string",
        TlsClientCa = "string",
        AllowAssignGrafanaAdmin = false,
        TlsClientKey = "string",
        TlsSkipVerifyInsecure = false,
        TokenUrl = "string",
        IdTokenAttributeName = "string",
        UseRefreshToken = false,
    },
    SamlSettings = new Grafana.Oss.Inputs.SsoSettingsSamlSettingsArgs
    {
        AllowIdpInitiated = false,
        AllowSignUp = false,
        AllowedOrganizations = "string",
        AssertionAttributeEmail = "string",
        AssertionAttributeGroups = "string",
        AssertionAttributeLogin = "string",
        AssertionAttributeName = "string",
        AssertionAttributeOrg = "string",
        AssertionAttributeRole = "string",
        AutoLogin = false,
        Certificate = "string",
        CertificatePath = "string",
        ClientId = "string",
        ClientSecret = "string",
        Enabled = false,
        EntityId = "string",
        ForceUseGraphApi = false,
        IdpMetadata = "string",
        IdpMetadataPath = "string",
        IdpMetadataUrl = "string",
        MaxIssueDelay = "string",
        MetadataValidDuration = "string",
        Name = "string",
        NameIdFormat = "string",
        OrgMapping = "string",
        PrivateKey = "string",
        PrivateKeyPath = "string",
        RelayState = "string",
        RoleValuesAdmin = "string",
        RoleValuesEditor = "string",
        RoleValuesGrafanaAdmin = "string",
        RoleValuesNone = "string",
        RoleValuesViewer = "string",
        SignatureAlgorithm = "string",
        SingleLogout = false,
        SkipOrgRoleSync = false,
        TokenUrl = "string",
    },
});
Copy
example, err := oss.NewSsoSettings(ctx, "ssoSettingsResource", &oss.SsoSettingsArgs{
	ProviderName: pulumi.String("string"),
	LdapSettings: &oss.SsoSettingsLdapSettingsArgs{
		Config: &oss.SsoSettingsLdapSettingsConfigArgs{
			Servers: oss.SsoSettingsLdapSettingsConfigServerArray{
				&oss.SsoSettingsLdapSettingsConfigServerArgs{
					Host:         pulumi.String("string"),
					SearchFilter: pulumi.String("string"),
					SearchBaseDns: pulumi.StringArray{
						pulumi.String("string"),
					},
					GroupSearchFilterUserAttribute: pulumi.String("string"),
					MinTlsVersion:                  pulumi.String("string"),
					ClientKey:                      pulumi.String("string"),
					ClientKeyValue:                 pulumi.String("string"),
					GroupMappings: oss.SsoSettingsLdapSettingsConfigServerGroupMappingArray{
						&oss.SsoSettingsLdapSettingsConfigServerGroupMappingArgs{
							GroupDn:      pulumi.String("string"),
							OrgRole:      pulumi.String("string"),
							GrafanaAdmin: pulumi.Bool(false),
							OrgId:        pulumi.Int(0),
						},
					},
					GroupSearchBaseDns: pulumi.StringArray{
						pulumi.String("string"),
					},
					GroupSearchFilter: pulumi.String("string"),
					Attributes: pulumi.StringMap{
						"string": pulumi.String("string"),
					},
					ClientCert:      pulumi.String("string"),
					ClientCertValue: pulumi.String("string"),
					Port:            pulumi.Int(0),
					RootCaCert:      pulumi.String("string"),
					RootCaCertValues: pulumi.StringArray{
						pulumi.String("string"),
					},
					BindPassword:  pulumi.String("string"),
					BindDn:        pulumi.String("string"),
					SslSkipVerify: pulumi.Bool(false),
					StartTls:      pulumi.Bool(false),
					Timeout:       pulumi.Int(0),
					TlsCiphers: pulumi.StringArray{
						pulumi.String("string"),
					},
					UseSsl: pulumi.Bool(false),
				},
			},
		},
		AllowSignUp:     pulumi.Bool(false),
		Enabled:         pulumi.Bool(false),
		SkipOrgRoleSync: pulumi.Bool(false),
	},
	Oauth2Settings: &oss.SsoSettingsOauth2SettingsArgs{
		ClientId:             pulumi.String("string"),
		LoginAttributePath:   pulumi.String("string"),
		TlsClientCert:        pulumi.String("string"),
		AllowedGroups:        pulumi.String("string"),
		AllowedOrganizations: pulumi.String("string"),
		ApiUrl:               pulumi.String("string"),
		AuthStyle:            pulumi.String("string"),
		AuthUrl:              pulumi.String("string"),
		AutoLogin:            pulumi.Bool(false),
		AllowSignUp:          pulumi.Bool(false),
		ClientSecret:         pulumi.String("string"),
		Custom: pulumi.StringMap{
			"string": pulumi.String("string"),
		},
		DefineAllowedGroups:     pulumi.Bool(false),
		DefineAllowedTeamsIds:   pulumi.Bool(false),
		Name:                    pulumi.String("string"),
		EmailAttributePath:      pulumi.String("string"),
		EmptyScopes:             pulumi.Bool(false),
		Enabled:                 pulumi.Bool(false),
		GroupsAttributePath:     pulumi.String("string"),
		UsePkce:                 pulumi.Bool(false),
		AllowedDomains:          pulumi.String("string"),
		EmailAttributeName:      pulumi.String("string"),
		NameAttributePath:       pulumi.String("string"),
		OrgAttributePath:        pulumi.String("string"),
		OrgMapping:              pulumi.String("string"),
		RoleAttributePath:       pulumi.String("string"),
		RoleAttributeStrict:     pulumi.Bool(false),
		Scopes:                  pulumi.String("string"),
		SignoutRedirectUrl:      pulumi.String("string"),
		SkipOrgRoleSync:         pulumi.Bool(false),
		TeamIds:                 pulumi.String("string"),
		TeamIdsAttributePath:    pulumi.String("string"),
		TeamsUrl:                pulumi.String("string"),
		TlsClientCa:             pulumi.String("string"),
		AllowAssignGrafanaAdmin: pulumi.Bool(false),
		TlsClientKey:            pulumi.String("string"),
		TlsSkipVerifyInsecure:   pulumi.Bool(false),
		TokenUrl:                pulumi.String("string"),
		IdTokenAttributeName:    pulumi.String("string"),
		UseRefreshToken:         pulumi.Bool(false),
	},
	SamlSettings: &oss.SsoSettingsSamlSettingsArgs{
		AllowIdpInitiated:        pulumi.Bool(false),
		AllowSignUp:              pulumi.Bool(false),
		AllowedOrganizations:     pulumi.String("string"),
		AssertionAttributeEmail:  pulumi.String("string"),
		AssertionAttributeGroups: pulumi.String("string"),
		AssertionAttributeLogin:  pulumi.String("string"),
		AssertionAttributeName:   pulumi.String("string"),
		AssertionAttributeOrg:    pulumi.String("string"),
		AssertionAttributeRole:   pulumi.String("string"),
		AutoLogin:                pulumi.Bool(false),
		Certificate:              pulumi.String("string"),
		CertificatePath:          pulumi.String("string"),
		ClientId:                 pulumi.String("string"),
		ClientSecret:             pulumi.String("string"),
		Enabled:                  pulumi.Bool(false),
		EntityId:                 pulumi.String("string"),
		ForceUseGraphApi:         pulumi.Bool(false),
		IdpMetadata:              pulumi.String("string"),
		IdpMetadataPath:          pulumi.String("string"),
		IdpMetadataUrl:           pulumi.String("string"),
		MaxIssueDelay:            pulumi.String("string"),
		MetadataValidDuration:    pulumi.String("string"),
		Name:                     pulumi.String("string"),
		NameIdFormat:             pulumi.String("string"),
		OrgMapping:               pulumi.String("string"),
		PrivateKey:               pulumi.String("string"),
		PrivateKeyPath:           pulumi.String("string"),
		RelayState:               pulumi.String("string"),
		RoleValuesAdmin:          pulumi.String("string"),
		RoleValuesEditor:         pulumi.String("string"),
		RoleValuesGrafanaAdmin:   pulumi.String("string"),
		RoleValuesNone:           pulumi.String("string"),
		RoleValuesViewer:         pulumi.String("string"),
		SignatureAlgorithm:       pulumi.String("string"),
		SingleLogout:             pulumi.Bool(false),
		SkipOrgRoleSync:          pulumi.Bool(false),
		TokenUrl:                 pulumi.String("string"),
	},
})
Copy
var ssoSettingsResource = new SsoSettings("ssoSettingsResource", SsoSettingsArgs.builder()
    .providerName("string")
    .ldapSettings(SsoSettingsLdapSettingsArgs.builder()
        .config(SsoSettingsLdapSettingsConfigArgs.builder()
            .servers(SsoSettingsLdapSettingsConfigServerArgs.builder()
                .host("string")
                .searchFilter("string")
                .searchBaseDns("string")
                .groupSearchFilterUserAttribute("string")
                .minTlsVersion("string")
                .clientKey("string")
                .clientKeyValue("string")
                .groupMappings(SsoSettingsLdapSettingsConfigServerGroupMappingArgs.builder()
                    .groupDn("string")
                    .orgRole("string")
                    .grafanaAdmin(false)
                    .orgId(0)
                    .build())
                .groupSearchBaseDns("string")
                .groupSearchFilter("string")
                .attributes(Map.of("string", "string"))
                .clientCert("string")
                .clientCertValue("string")
                .port(0)
                .rootCaCert("string")
                .rootCaCertValues("string")
                .bindPassword("string")
                .bindDn("string")
                .sslSkipVerify(false)
                .startTls(false)
                .timeout(0)
                .tlsCiphers("string")
                .useSsl(false)
                .build())
            .build())
        .allowSignUp(false)
        .enabled(false)
        .skipOrgRoleSync(false)
        .build())
    .oauth2Settings(SsoSettingsOauth2SettingsArgs.builder()
        .clientId("string")
        .loginAttributePath("string")
        .tlsClientCert("string")
        .allowedGroups("string")
        .allowedOrganizations("string")
        .apiUrl("string")
        .authStyle("string")
        .authUrl("string")
        .autoLogin(false)
        .allowSignUp(false)
        .clientSecret("string")
        .custom(Map.of("string", "string"))
        .defineAllowedGroups(false)
        .defineAllowedTeamsIds(false)
        .name("string")
        .emailAttributePath("string")
        .emptyScopes(false)
        .enabled(false)
        .groupsAttributePath("string")
        .usePkce(false)
        .allowedDomains("string")
        .emailAttributeName("string")
        .nameAttributePath("string")
        .orgAttributePath("string")
        .orgMapping("string")
        .roleAttributePath("string")
        .roleAttributeStrict(false)
        .scopes("string")
        .signoutRedirectUrl("string")
        .skipOrgRoleSync(false)
        .teamIds("string")
        .teamIdsAttributePath("string")
        .teamsUrl("string")
        .tlsClientCa("string")
        .allowAssignGrafanaAdmin(false)
        .tlsClientKey("string")
        .tlsSkipVerifyInsecure(false)
        .tokenUrl("string")
        .idTokenAttributeName("string")
        .useRefreshToken(false)
        .build())
    .samlSettings(SsoSettingsSamlSettingsArgs.builder()
        .allowIdpInitiated(false)
        .allowSignUp(false)
        .allowedOrganizations("string")
        .assertionAttributeEmail("string")
        .assertionAttributeGroups("string")
        .assertionAttributeLogin("string")
        .assertionAttributeName("string")
        .assertionAttributeOrg("string")
        .assertionAttributeRole("string")
        .autoLogin(false)
        .certificate("string")
        .certificatePath("string")
        .clientId("string")
        .clientSecret("string")
        .enabled(false)
        .entityId("string")
        .forceUseGraphApi(false)
        .idpMetadata("string")
        .idpMetadataPath("string")
        .idpMetadataUrl("string")
        .maxIssueDelay("string")
        .metadataValidDuration("string")
        .name("string")
        .nameIdFormat("string")
        .orgMapping("string")
        .privateKey("string")
        .privateKeyPath("string")
        .relayState("string")
        .roleValuesAdmin("string")
        .roleValuesEditor("string")
        .roleValuesGrafanaAdmin("string")
        .roleValuesNone("string")
        .roleValuesViewer("string")
        .signatureAlgorithm("string")
        .singleLogout(false)
        .skipOrgRoleSync(false)
        .tokenUrl("string")
        .build())
    .build());
Copy
sso_settings_resource = grafana.oss.SsoSettings("ssoSettingsResource",
    provider_name="string",
    ldap_settings={
        "config": {
            "servers": [{
                "host": "string",
                "search_filter": "string",
                "search_base_dns": ["string"],
                "group_search_filter_user_attribute": "string",
                "min_tls_version": "string",
                "client_key": "string",
                "client_key_value": "string",
                "group_mappings": [{
                    "group_dn": "string",
                    "org_role": "string",
                    "grafana_admin": False,
                    "org_id": 0,
                }],
                "group_search_base_dns": ["string"],
                "group_search_filter": "string",
                "attributes": {
                    "string": "string",
                },
                "client_cert": "string",
                "client_cert_value": "string",
                "port": 0,
                "root_ca_cert": "string",
                "root_ca_cert_values": ["string"],
                "bind_password": "string",
                "bind_dn": "string",
                "ssl_skip_verify": False,
                "start_tls": False,
                "timeout": 0,
                "tls_ciphers": ["string"],
                "use_ssl": False,
            }],
        },
        "allow_sign_up": False,
        "enabled": False,
        "skip_org_role_sync": False,
    },
    oauth2_settings={
        "client_id": "string",
        "login_attribute_path": "string",
        "tls_client_cert": "string",
        "allowed_groups": "string",
        "allowed_organizations": "string",
        "api_url": "string",
        "auth_style": "string",
        "auth_url": "string",
        "auto_login": False,
        "allow_sign_up": False,
        "client_secret": "string",
        "custom": {
            "string": "string",
        },
        "define_allowed_groups": False,
        "define_allowed_teams_ids": False,
        "name": "string",
        "email_attribute_path": "string",
        "empty_scopes": False,
        "enabled": False,
        "groups_attribute_path": "string",
        "use_pkce": False,
        "allowed_domains": "string",
        "email_attribute_name": "string",
        "name_attribute_path": "string",
        "org_attribute_path": "string",
        "org_mapping": "string",
        "role_attribute_path": "string",
        "role_attribute_strict": False,
        "scopes": "string",
        "signout_redirect_url": "string",
        "skip_org_role_sync": False,
        "team_ids": "string",
        "team_ids_attribute_path": "string",
        "teams_url": "string",
        "tls_client_ca": "string",
        "allow_assign_grafana_admin": False,
        "tls_client_key": "string",
        "tls_skip_verify_insecure": False,
        "token_url": "string",
        "id_token_attribute_name": "string",
        "use_refresh_token": False,
    },
    saml_settings={
        "allow_idp_initiated": False,
        "allow_sign_up": False,
        "allowed_organizations": "string",
        "assertion_attribute_email": "string",
        "assertion_attribute_groups": "string",
        "assertion_attribute_login": "string",
        "assertion_attribute_name": "string",
        "assertion_attribute_org": "string",
        "assertion_attribute_role": "string",
        "auto_login": False,
        "certificate": "string",
        "certificate_path": "string",
        "client_id": "string",
        "client_secret": "string",
        "enabled": False,
        "entity_id": "string",
        "force_use_graph_api": False,
        "idp_metadata": "string",
        "idp_metadata_path": "string",
        "idp_metadata_url": "string",
        "max_issue_delay": "string",
        "metadata_valid_duration": "string",
        "name": "string",
        "name_id_format": "string",
        "org_mapping": "string",
        "private_key": "string",
        "private_key_path": "string",
        "relay_state": "string",
        "role_values_admin": "string",
        "role_values_editor": "string",
        "role_values_grafana_admin": "string",
        "role_values_none": "string",
        "role_values_viewer": "string",
        "signature_algorithm": "string",
        "single_logout": False,
        "skip_org_role_sync": False,
        "token_url": "string",
    })
Copy
const ssoSettingsResource = new grafana.oss.SsoSettings("ssoSettingsResource", {
    providerName: "string",
    ldapSettings: {
        config: {
            servers: [{
                host: "string",
                searchFilter: "string",
                searchBaseDns: ["string"],
                groupSearchFilterUserAttribute: "string",
                minTlsVersion: "string",
                clientKey: "string",
                clientKeyValue: "string",
                groupMappings: [{
                    groupDn: "string",
                    orgRole: "string",
                    grafanaAdmin: false,
                    orgId: 0,
                }],
                groupSearchBaseDns: ["string"],
                groupSearchFilter: "string",
                attributes: {
                    string: "string",
                },
                clientCert: "string",
                clientCertValue: "string",
                port: 0,
                rootCaCert: "string",
                rootCaCertValues: ["string"],
                bindPassword: "string",
                bindDn: "string",
                sslSkipVerify: false,
                startTls: false,
                timeout: 0,
                tlsCiphers: ["string"],
                useSsl: false,
            }],
        },
        allowSignUp: false,
        enabled: false,
        skipOrgRoleSync: false,
    },
    oauth2Settings: {
        clientId: "string",
        loginAttributePath: "string",
        tlsClientCert: "string",
        allowedGroups: "string",
        allowedOrganizations: "string",
        apiUrl: "string",
        authStyle: "string",
        authUrl: "string",
        autoLogin: false,
        allowSignUp: false,
        clientSecret: "string",
        custom: {
            string: "string",
        },
        defineAllowedGroups: false,
        defineAllowedTeamsIds: false,
        name: "string",
        emailAttributePath: "string",
        emptyScopes: false,
        enabled: false,
        groupsAttributePath: "string",
        usePkce: false,
        allowedDomains: "string",
        emailAttributeName: "string",
        nameAttributePath: "string",
        orgAttributePath: "string",
        orgMapping: "string",
        roleAttributePath: "string",
        roleAttributeStrict: false,
        scopes: "string",
        signoutRedirectUrl: "string",
        skipOrgRoleSync: false,
        teamIds: "string",
        teamIdsAttributePath: "string",
        teamsUrl: "string",
        tlsClientCa: "string",
        allowAssignGrafanaAdmin: false,
        tlsClientKey: "string",
        tlsSkipVerifyInsecure: false,
        tokenUrl: "string",
        idTokenAttributeName: "string",
        useRefreshToken: false,
    },
    samlSettings: {
        allowIdpInitiated: false,
        allowSignUp: false,
        allowedOrganizations: "string",
        assertionAttributeEmail: "string",
        assertionAttributeGroups: "string",
        assertionAttributeLogin: "string",
        assertionAttributeName: "string",
        assertionAttributeOrg: "string",
        assertionAttributeRole: "string",
        autoLogin: false,
        certificate: "string",
        certificatePath: "string",
        clientId: "string",
        clientSecret: "string",
        enabled: false,
        entityId: "string",
        forceUseGraphApi: false,
        idpMetadata: "string",
        idpMetadataPath: "string",
        idpMetadataUrl: "string",
        maxIssueDelay: "string",
        metadataValidDuration: "string",
        name: "string",
        nameIdFormat: "string",
        orgMapping: "string",
        privateKey: "string",
        privateKeyPath: "string",
        relayState: "string",
        roleValuesAdmin: "string",
        roleValuesEditor: "string",
        roleValuesGrafanaAdmin: "string",
        roleValuesNone: "string",
        roleValuesViewer: "string",
        signatureAlgorithm: "string",
        singleLogout: false,
        skipOrgRoleSync: false,
        tokenUrl: "string",
    },
});
Copy
type: grafana:oss:SsoSettings
properties:
    ldapSettings:
        allowSignUp: false
        config:
            servers:
                - attributes:
                    string: string
                  bindDn: string
                  bindPassword: string
                  clientCert: string
                  clientCertValue: string
                  clientKey: string
                  clientKeyValue: string
                  groupMappings:
                    - grafanaAdmin: false
                      groupDn: string
                      orgId: 0
                      orgRole: string
                  groupSearchBaseDns:
                    - string
                  groupSearchFilter: string
                  groupSearchFilterUserAttribute: string
                  host: string
                  minTlsVersion: string
                  port: 0
                  rootCaCert: string
                  rootCaCertValues:
                    - string
                  searchBaseDns:
                    - string
                  searchFilter: string
                  sslSkipVerify: false
                  startTls: false
                  timeout: 0
                  tlsCiphers:
                    - string
                  useSsl: false
        enabled: false
        skipOrgRoleSync: false
    oauth2Settings:
        allowAssignGrafanaAdmin: false
        allowSignUp: false
        allowedDomains: string
        allowedGroups: string
        allowedOrganizations: string
        apiUrl: string
        authStyle: string
        authUrl: string
        autoLogin: false
        clientId: string
        clientSecret: string
        custom:
            string: string
        defineAllowedGroups: false
        defineAllowedTeamsIds: false
        emailAttributeName: string
        emailAttributePath: string
        emptyScopes: false
        enabled: false
        groupsAttributePath: string
        idTokenAttributeName: string
        loginAttributePath: string
        name: string
        nameAttributePath: string
        orgAttributePath: string
        orgMapping: string
        roleAttributePath: string
        roleAttributeStrict: false
        scopes: string
        signoutRedirectUrl: string
        skipOrgRoleSync: false
        teamIds: string
        teamIdsAttributePath: string
        teamsUrl: string
        tlsClientCa: string
        tlsClientCert: string
        tlsClientKey: string
        tlsSkipVerifyInsecure: false
        tokenUrl: string
        usePkce: false
        useRefreshToken: false
    providerName: string
    samlSettings:
        allowIdpInitiated: false
        allowSignUp: false
        allowedOrganizations: string
        assertionAttributeEmail: string
        assertionAttributeGroups: string
        assertionAttributeLogin: string
        assertionAttributeName: string
        assertionAttributeOrg: string
        assertionAttributeRole: string
        autoLogin: false
        certificate: string
        certificatePath: string
        clientId: string
        clientSecret: string
        enabled: false
        entityId: string
        forceUseGraphApi: false
        idpMetadata: string
        idpMetadataPath: string
        idpMetadataUrl: string
        maxIssueDelay: string
        metadataValidDuration: string
        name: string
        nameIdFormat: string
        orgMapping: string
        privateKey: string
        privateKeyPath: string
        relayState: string
        roleValuesAdmin: string
        roleValuesEditor: string
        roleValuesGrafanaAdmin: string
        roleValuesNone: string
        roleValuesViewer: string
        signatureAlgorithm: string
        singleLogout: false
        skipOrgRoleSync: false
        tokenUrl: string
Copy

SsoSettings Resource Properties

To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.

Inputs

In Python, inputs that are objects can be passed either as argument classes or as dictionary literals.

The SsoSettings resource accepts the following input properties:

ProviderName This property is required. string
The name of the SSO provider. Supported values: github, gitlab, google, azuread, okta, generic_oauth, saml, ldap.
LdapSettings Pulumiverse.Grafana.Oss.Inputs.SsoSettingsLdapSettings
The LDAP settings set. Required for the ldap provider.
Oauth2Settings Pulumiverse.Grafana.Oss.Inputs.SsoSettingsOauth2Settings
The OAuth2 settings set. Required for github, gitlab, google, azuread, okta, generic*oauth providers.
SamlSettings Pulumiverse.Grafana.Oss.Inputs.SsoSettingsSamlSettings
The SAML settings set. Required for the saml provider.
ProviderName This property is required. string
The name of the SSO provider. Supported values: github, gitlab, google, azuread, okta, generic_oauth, saml, ldap.
LdapSettings SsoSettingsLdapSettingsArgs
The LDAP settings set. Required for the ldap provider.
Oauth2Settings SsoSettingsOauth2SettingsArgs
The OAuth2 settings set. Required for github, gitlab, google, azuread, okta, generic*oauth providers.
SamlSettings SsoSettingsSamlSettingsArgs
The SAML settings set. Required for the saml provider.
providerName This property is required. String
The name of the SSO provider. Supported values: github, gitlab, google, azuread, okta, generic_oauth, saml, ldap.
ldapSettings SsoSettingsLdapSettings
The LDAP settings set. Required for the ldap provider.
oauth2Settings SsoSettingsOauth2Settings
The OAuth2 settings set. Required for github, gitlab, google, azuread, okta, generic*oauth providers.
samlSettings SsoSettingsSamlSettings
The SAML settings set. Required for the saml provider.
providerName This property is required. string
The name of the SSO provider. Supported values: github, gitlab, google, azuread, okta, generic_oauth, saml, ldap.
ldapSettings SsoSettingsLdapSettings
The LDAP settings set. Required for the ldap provider.
oauth2Settings SsoSettingsOauth2Settings
The OAuth2 settings set. Required for github, gitlab, google, azuread, okta, generic*oauth providers.
samlSettings SsoSettingsSamlSettings
The SAML settings set. Required for the saml provider.
provider_name This property is required. str
The name of the SSO provider. Supported values: github, gitlab, google, azuread, okta, generic_oauth, saml, ldap.
ldap_settings SsoSettingsLdapSettingsArgs
The LDAP settings set. Required for the ldap provider.
oauth2_settings SsoSettingsOauth2SettingsArgs
The OAuth2 settings set. Required for github, gitlab, google, azuread, okta, generic*oauth providers.
saml_settings SsoSettingsSamlSettingsArgs
The SAML settings set. Required for the saml provider.
providerName This property is required. String
The name of the SSO provider. Supported values: github, gitlab, google, azuread, okta, generic_oauth, saml, ldap.
ldapSettings Property Map
The LDAP settings set. Required for the ldap provider.
oauth2Settings Property Map
The OAuth2 settings set. Required for github, gitlab, google, azuread, okta, generic*oauth providers.
samlSettings Property Map
The SAML settings set. Required for the saml provider.

Outputs

All input properties are implicitly available as output properties. Additionally, the SsoSettings resource produces the following output properties:

Id string
The provider-assigned unique ID for this managed resource.
Id string
The provider-assigned unique ID for this managed resource.
id String
The provider-assigned unique ID for this managed resource.
id string
The provider-assigned unique ID for this managed resource.
id str
The provider-assigned unique ID for this managed resource.
id String
The provider-assigned unique ID for this managed resource.

Look up Existing SsoSettings Resource

Get an existing SsoSettings resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.

public static get(name: string, id: Input<ID>, state?: SsoSettingsState, opts?: CustomResourceOptions): SsoSettings
@staticmethod
def get(resource_name: str,
        id: str,
        opts: Optional[ResourceOptions] = None,
        ldap_settings: Optional[SsoSettingsLdapSettingsArgs] = None,
        oauth2_settings: Optional[SsoSettingsOauth2SettingsArgs] = None,
        provider_name: Optional[str] = None,
        saml_settings: Optional[SsoSettingsSamlSettingsArgs] = None) -> SsoSettings
func GetSsoSettings(ctx *Context, name string, id IDInput, state *SsoSettingsState, opts ...ResourceOption) (*SsoSettings, error)
public static SsoSettings Get(string name, Input<string> id, SsoSettingsState? state, CustomResourceOptions? opts = null)
public static SsoSettings get(String name, Output<String> id, SsoSettingsState state, CustomResourceOptions options)
resources:  _:    type: grafana:oss:SsoSettings    get:      id: ${id}
name This property is required.
The unique name of the resulting resource.
id This property is required.
The unique provider ID of the resource to lookup.
state
Any extra arguments used during the lookup.
opts
A bag of options that control this resource's behavior.
resource_name This property is required.
The unique name of the resulting resource.
id This property is required.
The unique provider ID of the resource to lookup.
name This property is required.
The unique name of the resulting resource.
id This property is required.
The unique provider ID of the resource to lookup.
state
Any extra arguments used during the lookup.
opts
A bag of options that control this resource's behavior.
name This property is required.
The unique name of the resulting resource.
id This property is required.
The unique provider ID of the resource to lookup.
state
Any extra arguments used during the lookup.
opts
A bag of options that control this resource's behavior.
name This property is required.
The unique name of the resulting resource.
id This property is required.
The unique provider ID of the resource to lookup.
state
Any extra arguments used during the lookup.
opts
A bag of options that control this resource's behavior.
The following state arguments are supported:
LdapSettings Pulumiverse.Grafana.Oss.Inputs.SsoSettingsLdapSettings
The LDAP settings set. Required for the ldap provider.
Oauth2Settings Pulumiverse.Grafana.Oss.Inputs.SsoSettingsOauth2Settings
The OAuth2 settings set. Required for github, gitlab, google, azuread, okta, generic*oauth providers.
ProviderName string
The name of the SSO provider. Supported values: github, gitlab, google, azuread, okta, generic_oauth, saml, ldap.
SamlSettings Pulumiverse.Grafana.Oss.Inputs.SsoSettingsSamlSettings
The SAML settings set. Required for the saml provider.
LdapSettings SsoSettingsLdapSettingsArgs
The LDAP settings set. Required for the ldap provider.
Oauth2Settings SsoSettingsOauth2SettingsArgs
The OAuth2 settings set. Required for github, gitlab, google, azuread, okta, generic*oauth providers.
ProviderName string
The name of the SSO provider. Supported values: github, gitlab, google, azuread, okta, generic_oauth, saml, ldap.
SamlSettings SsoSettingsSamlSettingsArgs
The SAML settings set. Required for the saml provider.
ldapSettings SsoSettingsLdapSettings
The LDAP settings set. Required for the ldap provider.
oauth2Settings SsoSettingsOauth2Settings
The OAuth2 settings set. Required for github, gitlab, google, azuread, okta, generic*oauth providers.
providerName String
The name of the SSO provider. Supported values: github, gitlab, google, azuread, okta, generic_oauth, saml, ldap.
samlSettings SsoSettingsSamlSettings
The SAML settings set. Required for the saml provider.
ldapSettings SsoSettingsLdapSettings
The LDAP settings set. Required for the ldap provider.
oauth2Settings SsoSettingsOauth2Settings
The OAuth2 settings set. Required for github, gitlab, google, azuread, okta, generic*oauth providers.
providerName string
The name of the SSO provider. Supported values: github, gitlab, google, azuread, okta, generic_oauth, saml, ldap.
samlSettings SsoSettingsSamlSettings
The SAML settings set. Required for the saml provider.
ldap_settings SsoSettingsLdapSettingsArgs
The LDAP settings set. Required for the ldap provider.
oauth2_settings SsoSettingsOauth2SettingsArgs
The OAuth2 settings set. Required for github, gitlab, google, azuread, okta, generic*oauth providers.
provider_name str
The name of the SSO provider. Supported values: github, gitlab, google, azuread, okta, generic_oauth, saml, ldap.
saml_settings SsoSettingsSamlSettingsArgs
The SAML settings set. Required for the saml provider.
ldapSettings Property Map
The LDAP settings set. Required for the ldap provider.
oauth2Settings Property Map
The OAuth2 settings set. Required for github, gitlab, google, azuread, okta, generic*oauth providers.
providerName String
The name of the SSO provider. Supported values: github, gitlab, google, azuread, okta, generic_oauth, saml, ldap.
samlSettings Property Map
The SAML settings set. Required for the saml provider.

Supporting Types

SsoSettingsLdapSettings
, SsoSettingsLdapSettingsArgs

Config This property is required. Pulumiverse.Grafana.Oss.Inputs.SsoSettingsLdapSettingsConfig
The LDAP configuration.
AllowSignUp bool
Whether to allow new Grafana user creation through LDAP login. If set to false, then only existing Grafana users can log in with LDAP.
Enabled bool
Define whether this configuration is enabled for LDAP. Defaults to true.
SkipOrgRoleSync bool
Prevent synchronizing users’ organization roles from LDAP.
Config This property is required. SsoSettingsLdapSettingsConfig
The LDAP configuration.
AllowSignUp bool
Whether to allow new Grafana user creation through LDAP login. If set to false, then only existing Grafana users can log in with LDAP.
Enabled bool
Define whether this configuration is enabled for LDAP. Defaults to true.
SkipOrgRoleSync bool
Prevent synchronizing users’ organization roles from LDAP.
config This property is required. SsoSettingsLdapSettingsConfig
The LDAP configuration.
allowSignUp Boolean
Whether to allow new Grafana user creation through LDAP login. If set to false, then only existing Grafana users can log in with LDAP.
enabled Boolean
Define whether this configuration is enabled for LDAP. Defaults to true.
skipOrgRoleSync Boolean
Prevent synchronizing users’ organization roles from LDAP.
config This property is required. SsoSettingsLdapSettingsConfig
The LDAP configuration.
allowSignUp boolean
Whether to allow new Grafana user creation through LDAP login. If set to false, then only existing Grafana users can log in with LDAP.
enabled boolean
Define whether this configuration is enabled for LDAP. Defaults to true.
skipOrgRoleSync boolean
Prevent synchronizing users’ organization roles from LDAP.
config This property is required. SsoSettingsLdapSettingsConfig
The LDAP configuration.
allow_sign_up bool
Whether to allow new Grafana user creation through LDAP login. If set to false, then only existing Grafana users can log in with LDAP.
enabled bool
Define whether this configuration is enabled for LDAP. Defaults to true.
skip_org_role_sync bool
Prevent synchronizing users’ organization roles from LDAP.
config This property is required. Property Map
The LDAP configuration.
allowSignUp Boolean
Whether to allow new Grafana user creation through LDAP login. If set to false, then only existing Grafana users can log in with LDAP.
enabled Boolean
Define whether this configuration is enabled for LDAP. Defaults to true.
skipOrgRoleSync Boolean
Prevent synchronizing users’ organization roles from LDAP.

SsoSettingsLdapSettingsConfig
, SsoSettingsLdapSettingsConfigArgs

Servers This property is required. List<Pulumiverse.Grafana.Oss.Inputs.SsoSettingsLdapSettingsConfigServer>
The LDAP servers configuration.
Servers This property is required. []SsoSettingsLdapSettingsConfigServer
The LDAP servers configuration.
servers This property is required. List<SsoSettingsLdapSettingsConfigServer>
The LDAP servers configuration.
servers This property is required. SsoSettingsLdapSettingsConfigServer[]
The LDAP servers configuration.
servers This property is required. Sequence[SsoSettingsLdapSettingsConfigServer]
The LDAP servers configuration.
servers This property is required. List<Property Map>
The LDAP servers configuration.

SsoSettingsLdapSettingsConfigServer
, SsoSettingsLdapSettingsConfigServerArgs

Host This property is required. string
The LDAP server host.
SearchBaseDns This property is required. List<string>
An array of base DNs to search through.
SearchFilter This property is required. string
The user search filter, for example "(cn=%s)" or "(sAMAccountName=%s)" or "(uid=%s)".
Attributes Dictionary<string, string>
The LDAP server attributes. The following attributes can be configured: email, member_of, name, surname, username.
BindDn string
The search user bind DN.
BindPassword string
The search user bind password.
ClientCert string
The path to the client certificate.
ClientCertValue string
The Base64 encoded value of the client certificate.
ClientKey string
The path to the client private key.
ClientKeyValue string
The Base64 encoded value of the client private key.
GroupMappings List<Pulumiverse.Grafana.Oss.Inputs.SsoSettingsLdapSettingsConfigServerGroupMapping>
For mapping an LDAP group to a Grafana organization and role.
GroupSearchBaseDns List<string>
An array of the base DNs to search through for groups. Typically uses ou=groups.
GroupSearchFilter string
Group search filter, to retrieve the groups of which the user is a member (only set if memberOf attribute is not available).
GroupSearchFilterUserAttribute string
The %s in the search filter will be replaced with the attribute defined in this field.
MinTlsVersion string
Minimum TLS version allowed. Accepted values are: TLS1.2, TLS1.3.
Port int
The LDAP server port.
RootCaCert string
The path to the root CA certificate.
RootCaCertValues List<string>
The Base64 encoded values of the root CA certificates.
SslSkipVerify bool
If set to true, the SSL cert validation will be skipped.
StartTls bool
If set to true, use LDAP with STARTTLS instead of LDAPS.
Timeout int
The timeout in seconds for connecting to the LDAP host.
TlsCiphers List<string>
Accepted TLS ciphers. For a complete list of supported ciphers, refer to: https://go.dev/src/crypto/tls/cipher_suites.go.
UseSsl bool
Set to true if LDAP server should use an encrypted TLS connection (either with STARTTLS or LDAPS).
Host This property is required. string
The LDAP server host.
SearchBaseDns This property is required. []string
An array of base DNs to search through.
SearchFilter This property is required. string
The user search filter, for example "(cn=%s)" or "(sAMAccountName=%s)" or "(uid=%s)".
Attributes map[string]string
The LDAP server attributes. The following attributes can be configured: email, member_of, name, surname, username.
BindDn string
The search user bind DN.
BindPassword string
The search user bind password.
ClientCert string
The path to the client certificate.
ClientCertValue string
The Base64 encoded value of the client certificate.
ClientKey string
The path to the client private key.
ClientKeyValue string
The Base64 encoded value of the client private key.
GroupMappings []SsoSettingsLdapSettingsConfigServerGroupMapping
For mapping an LDAP group to a Grafana organization and role.
GroupSearchBaseDns []string
An array of the base DNs to search through for groups. Typically uses ou=groups.
GroupSearchFilter string
Group search filter, to retrieve the groups of which the user is a member (only set if memberOf attribute is not available).
GroupSearchFilterUserAttribute string
The %s in the search filter will be replaced with the attribute defined in this field.
MinTlsVersion string
Minimum TLS version allowed. Accepted values are: TLS1.2, TLS1.3.
Port int
The LDAP server port.
RootCaCert string
The path to the root CA certificate.
RootCaCertValues []string
The Base64 encoded values of the root CA certificates.
SslSkipVerify bool
If set to true, the SSL cert validation will be skipped.
StartTls bool
If set to true, use LDAP with STARTTLS instead of LDAPS.
Timeout int
The timeout in seconds for connecting to the LDAP host.
TlsCiphers []string
Accepted TLS ciphers. For a complete list of supported ciphers, refer to: https://go.dev/src/crypto/tls/cipher_suites.go.
UseSsl bool
Set to true if LDAP server should use an encrypted TLS connection (either with STARTTLS or LDAPS).
host This property is required. String
The LDAP server host.
searchBaseDns This property is required. List<String>
An array of base DNs to search through.
searchFilter This property is required. String
The user search filter, for example "(cn=%s)" or "(sAMAccountName=%s)" or "(uid=%s)".
attributes Map<String,String>
The LDAP server attributes. The following attributes can be configured: email, member_of, name, surname, username.
bindDn String
The search user bind DN.
bindPassword String
The search user bind password.
clientCert String
The path to the client certificate.
clientCertValue String
The Base64 encoded value of the client certificate.
clientKey String
The path to the client private key.
clientKeyValue String
The Base64 encoded value of the client private key.
groupMappings List<SsoSettingsLdapSettingsConfigServerGroupMapping>
For mapping an LDAP group to a Grafana organization and role.
groupSearchBaseDns List<String>
An array of the base DNs to search through for groups. Typically uses ou=groups.
groupSearchFilter String
Group search filter, to retrieve the groups of which the user is a member (only set if memberOf attribute is not available).
groupSearchFilterUserAttribute String
The %s in the search filter will be replaced with the attribute defined in this field.
minTlsVersion String
Minimum TLS version allowed. Accepted values are: TLS1.2, TLS1.3.
port Integer
The LDAP server port.
rootCaCert String
The path to the root CA certificate.
rootCaCertValues List<String>
The Base64 encoded values of the root CA certificates.
sslSkipVerify Boolean
If set to true, the SSL cert validation will be skipped.
startTls Boolean
If set to true, use LDAP with STARTTLS instead of LDAPS.
timeout Integer
The timeout in seconds for connecting to the LDAP host.
tlsCiphers List<String>
Accepted TLS ciphers. For a complete list of supported ciphers, refer to: https://go.dev/src/crypto/tls/cipher_suites.go.
useSsl Boolean
Set to true if LDAP server should use an encrypted TLS connection (either with STARTTLS or LDAPS).
host This property is required. string
The LDAP server host.
searchBaseDns This property is required. string[]
An array of base DNs to search through.
searchFilter This property is required. string
The user search filter, for example "(cn=%s)" or "(sAMAccountName=%s)" or "(uid=%s)".
attributes {[key: string]: string}
The LDAP server attributes. The following attributes can be configured: email, member_of, name, surname, username.
bindDn string
The search user bind DN.
bindPassword string
The search user bind password.
clientCert string
The path to the client certificate.
clientCertValue string
The Base64 encoded value of the client certificate.
clientKey string
The path to the client private key.
clientKeyValue string
The Base64 encoded value of the client private key.
groupMappings SsoSettingsLdapSettingsConfigServerGroupMapping[]
For mapping an LDAP group to a Grafana organization and role.
groupSearchBaseDns string[]
An array of the base DNs to search through for groups. Typically uses ou=groups.
groupSearchFilter string
Group search filter, to retrieve the groups of which the user is a member (only set if memberOf attribute is not available).
groupSearchFilterUserAttribute string
The %s in the search filter will be replaced with the attribute defined in this field.
minTlsVersion string
Minimum TLS version allowed. Accepted values are: TLS1.2, TLS1.3.
port number
The LDAP server port.
rootCaCert string
The path to the root CA certificate.
rootCaCertValues string[]
The Base64 encoded values of the root CA certificates.
sslSkipVerify boolean
If set to true, the SSL cert validation will be skipped.
startTls boolean
If set to true, use LDAP with STARTTLS instead of LDAPS.
timeout number
The timeout in seconds for connecting to the LDAP host.
tlsCiphers string[]
Accepted TLS ciphers. For a complete list of supported ciphers, refer to: https://go.dev/src/crypto/tls/cipher_suites.go.
useSsl boolean
Set to true if LDAP server should use an encrypted TLS connection (either with STARTTLS or LDAPS).
host This property is required. str
The LDAP server host.
search_base_dns This property is required. Sequence[str]
An array of base DNs to search through.
search_filter This property is required. str
The user search filter, for example "(cn=%s)" or "(sAMAccountName=%s)" or "(uid=%s)".
attributes Mapping[str, str]
The LDAP server attributes. The following attributes can be configured: email, member_of, name, surname, username.
bind_dn str
The search user bind DN.
bind_password str
The search user bind password.
client_cert str
The path to the client certificate.
client_cert_value str
The Base64 encoded value of the client certificate.
client_key str
The path to the client private key.
client_key_value str
The Base64 encoded value of the client private key.
group_mappings Sequence[SsoSettingsLdapSettingsConfigServerGroupMapping]
For mapping an LDAP group to a Grafana organization and role.
group_search_base_dns Sequence[str]
An array of the base DNs to search through for groups. Typically uses ou=groups.
group_search_filter str
Group search filter, to retrieve the groups of which the user is a member (only set if memberOf attribute is not available).
group_search_filter_user_attribute str
The %s in the search filter will be replaced with the attribute defined in this field.
min_tls_version str
Minimum TLS version allowed. Accepted values are: TLS1.2, TLS1.3.
port int
The LDAP server port.
root_ca_cert str
The path to the root CA certificate.
root_ca_cert_values Sequence[str]
The Base64 encoded values of the root CA certificates.
ssl_skip_verify bool
If set to true, the SSL cert validation will be skipped.
start_tls bool
If set to true, use LDAP with STARTTLS instead of LDAPS.
timeout int
The timeout in seconds for connecting to the LDAP host.
tls_ciphers Sequence[str]
Accepted TLS ciphers. For a complete list of supported ciphers, refer to: https://go.dev/src/crypto/tls/cipher_suites.go.
use_ssl bool
Set to true if LDAP server should use an encrypted TLS connection (either with STARTTLS or LDAPS).
host This property is required. String
The LDAP server host.
searchBaseDns This property is required. List<String>
An array of base DNs to search through.
searchFilter This property is required. String
The user search filter, for example "(cn=%s)" or "(sAMAccountName=%s)" or "(uid=%s)".
attributes Map<String>
The LDAP server attributes. The following attributes can be configured: email, member_of, name, surname, username.
bindDn String
The search user bind DN.
bindPassword String
The search user bind password.
clientCert String
The path to the client certificate.
clientCertValue String
The Base64 encoded value of the client certificate.
clientKey String
The path to the client private key.
clientKeyValue String
The Base64 encoded value of the client private key.
groupMappings List<Property Map>
For mapping an LDAP group to a Grafana organization and role.
groupSearchBaseDns List<String>
An array of the base DNs to search through for groups. Typically uses ou=groups.
groupSearchFilter String
Group search filter, to retrieve the groups of which the user is a member (only set if memberOf attribute is not available).
groupSearchFilterUserAttribute String
The %s in the search filter will be replaced with the attribute defined in this field.
minTlsVersion String
Minimum TLS version allowed. Accepted values are: TLS1.2, TLS1.3.
port Number
The LDAP server port.
rootCaCert String
The path to the root CA certificate.
rootCaCertValues List<String>
The Base64 encoded values of the root CA certificates.
sslSkipVerify Boolean
If set to true, the SSL cert validation will be skipped.
startTls Boolean
If set to true, use LDAP with STARTTLS instead of LDAPS.
timeout Number
The timeout in seconds for connecting to the LDAP host.
tlsCiphers List<String>
Accepted TLS ciphers. For a complete list of supported ciphers, refer to: https://go.dev/src/crypto/tls/cipher_suites.go.
useSsl Boolean
Set to true if LDAP server should use an encrypted TLS connection (either with STARTTLS or LDAPS).

SsoSettingsLdapSettingsConfigServerGroupMapping
, SsoSettingsLdapSettingsConfigServerGroupMappingArgs

GroupDn This property is required. string
LDAP distinguished name (DN) of LDAP group. If you want to match all (or no LDAP groups) then you can use wildcard ("*").
OrgRole This property is required. string
Assign users of group_dn the organization role Admin, Editor, or Viewer.
GrafanaAdmin bool
If set to true, it makes the user of group_dn Grafana server admin.
OrgId int
The Grafana organization database id.
GroupDn This property is required. string
LDAP distinguished name (DN) of LDAP group. If you want to match all (or no LDAP groups) then you can use wildcard ("*").
OrgRole This property is required. string
Assign users of group_dn the organization role Admin, Editor, or Viewer.
GrafanaAdmin bool
If set to true, it makes the user of group_dn Grafana server admin.
OrgId int
The Grafana organization database id.
groupDn This property is required. String
LDAP distinguished name (DN) of LDAP group. If you want to match all (or no LDAP groups) then you can use wildcard ("*").
orgRole This property is required. String
Assign users of group_dn the organization role Admin, Editor, or Viewer.
grafanaAdmin Boolean
If set to true, it makes the user of group_dn Grafana server admin.
orgId Integer
The Grafana organization database id.
groupDn This property is required. string
LDAP distinguished name (DN) of LDAP group. If you want to match all (or no LDAP groups) then you can use wildcard ("*").
orgRole This property is required. string
Assign users of group_dn the organization role Admin, Editor, or Viewer.
grafanaAdmin boolean
If set to true, it makes the user of group_dn Grafana server admin.
orgId number
The Grafana organization database id.
group_dn This property is required. str
LDAP distinguished name (DN) of LDAP group. If you want to match all (or no LDAP groups) then you can use wildcard ("*").
org_role This property is required. str
Assign users of group_dn the organization role Admin, Editor, or Viewer.
grafana_admin bool
If set to true, it makes the user of group_dn Grafana server admin.
org_id int
The Grafana organization database id.
groupDn This property is required. String
LDAP distinguished name (DN) of LDAP group. If you want to match all (or no LDAP groups) then you can use wildcard ("*").
orgRole This property is required. String
Assign users of group_dn the organization role Admin, Editor, or Viewer.
grafanaAdmin Boolean
If set to true, it makes the user of group_dn Grafana server admin.
orgId Number
The Grafana organization database id.

SsoSettingsOauth2Settings
, SsoSettingsOauth2SettingsArgs

ClientId This property is required. string
The client Id of your OAuth2 app.
AllowAssignGrafanaAdmin bool
If enabled, it will automatically sync the Grafana server administrator role.
AllowSignUp bool
If not enabled, only existing Grafana users can log in using OAuth.
AllowedDomains string
List of comma- or space-separated domains. The user should belong to at least one domain to log in.
AllowedGroups string
List of comma- or space-separated groups. The user should be a member of at least one group to log in. For Generic OAuth, if you configure allowedgroups, you must also configure groupsattribute_path.
AllowedOrganizations string
List of comma- or space-separated organizations. The user should be a member of at least one organization to log in.
ApiUrl string
The user information endpoint of your OAuth2 provider. Required for okta and generic_oauth providers.
AuthStyle string
It determines how clientid and clientsecret are sent to Oauth2 provider. Possible values are AutoDetect, InParams, InHeader. Default is AutoDetect.
AuthUrl string
The authorization endpoint of your OAuth2 provider. Required for azuread, okta and generic_oauth providers.
AutoLogin bool
Log in automatically, skipping the login screen.
ClientSecret string
The client secret of your OAuth2 app.
Custom Dictionary<string, string>
Custom fields to configure for OAuth2 such as the forceusegraph_api field.
DefineAllowedGroups bool
Define allowed groups.
DefineAllowedTeamsIds bool
Define allowed teams ids.
EmailAttributeName string
Name of the key to use for user email lookup within the attributes map of OAuth2 ID token. Only applicable to Generic OAuth.
EmailAttributePath string
JMESPath expression to use for user email lookup from the user information. Only applicable to Generic OAuth.
EmptyScopes bool
If enabled, no scopes will be sent to the OAuth2 provider.
Enabled bool
Define whether this configuration is enabled for the specified provider. Defaults to true.
GroupsAttributePath string
JMESPath expression to use for user group lookup. If you configure allowedgroups, you must also configure groupsattribute_path.
IdTokenAttributeName string
The name of the key used to extract the ID token from the returned OAuth2 token. Only applicable to Generic OAuth.
LoginAttributePath string
JMESPath expression to use for user login lookup from the user ID token. Only applicable to Generic OAuth.
Name string
Helpful if you use more than one identity providers or SSO protocols.
NameAttributePath string
JMESPath expression to use for user name lookup from the user ID token. This name will be used as the user’s display name. Only applicable to Generic OAuth.
OrgAttributePath string
JMESPath expression to use for the organization mapping lookup from the user ID token. The extracted list will be used for the organization mapping (to match "Organization" in the "org_mapping"). Only applicable to Generic OAuth and Okta.
OrgMapping string
List of comma- or space-separated Organization:OrgIdOrOrgName:Role mappings. Organization can be * meaning “All users”. Role is optional and can have the following values: None, Viewer, Editor or Admin.
RoleAttributePath string
JMESPath expression to use for Grafana role lookup.
RoleAttributeStrict bool
If enabled, denies user login if the Grafana role cannot be extracted using Role attribute path.
Scopes string
List of comma- or space-separated OAuth2 scopes.
SignoutRedirectUrl string
The URL to redirect the user to after signing out from Grafana.
SkipOrgRoleSync bool
Prevent synchronizing users’ organization roles from your IdP.
TeamIds string
String list of Team Ids. If set, the user must be a member of one of the given teams to log in. If you configure teamids, you must also configure teamsurl and teamidsattribute_path.
TeamIdsAttributePath string
The JMESPath expression to use for Grafana Team Id lookup within the results returned by the teams_url endpoint. Only applicable to Generic OAuth.
TeamsUrl string
The URL used to query for Team Ids. If not set, the default value is /teams. If you configure teamsurl, you must also configure teamidsattributepath. Only applicable to Generic OAuth.
TlsClientCa string
The path to the trusted certificate authority list. Is not applicable on Grafana Cloud.
TlsClientCert string
The path to the certificate. Is not applicable on Grafana Cloud.
TlsClientKey string
The path to the key. Is not applicable on Grafana Cloud.
TlsSkipVerifyInsecure bool
If enabled, the client accepts any certificate presented by the server and any host name in that certificate. You should only use this for testing, because this mode leaves SSL/TLS susceptible to man-in-the-middle attacks.
TokenUrl string
The token endpoint of your OAuth2 provider. Required for azuread, okta and generic_oauth providers.
UsePkce bool
If enabled, Grafana will use Proof Key for Code Exchange (PKCE) with the OAuth2 Authorization Code Grant.
UseRefreshToken bool
If enabled, Grafana will fetch a new access token using the refresh token provided by the OAuth2 provider.
ClientId This property is required. string
The client Id of your OAuth2 app.
AllowAssignGrafanaAdmin bool
If enabled, it will automatically sync the Grafana server administrator role.
AllowSignUp bool
If not enabled, only existing Grafana users can log in using OAuth.
AllowedDomains string
List of comma- or space-separated domains. The user should belong to at least one domain to log in.
AllowedGroups string
List of comma- or space-separated groups. The user should be a member of at least one group to log in. For Generic OAuth, if you configure allowedgroups, you must also configure groupsattribute_path.
AllowedOrganizations string
List of comma- or space-separated organizations. The user should be a member of at least one organization to log in.
ApiUrl string
The user information endpoint of your OAuth2 provider. Required for okta and generic_oauth providers.
AuthStyle string
It determines how clientid and clientsecret are sent to Oauth2 provider. Possible values are AutoDetect, InParams, InHeader. Default is AutoDetect.
AuthUrl string
The authorization endpoint of your OAuth2 provider. Required for azuread, okta and generic_oauth providers.
AutoLogin bool
Log in automatically, skipping the login screen.
ClientSecret string
The client secret of your OAuth2 app.
Custom map[string]string
Custom fields to configure for OAuth2 such as the forceusegraph_api field.
DefineAllowedGroups bool
Define allowed groups.
DefineAllowedTeamsIds bool
Define allowed teams ids.
EmailAttributeName string
Name of the key to use for user email lookup within the attributes map of OAuth2 ID token. Only applicable to Generic OAuth.
EmailAttributePath string
JMESPath expression to use for user email lookup from the user information. Only applicable to Generic OAuth.
EmptyScopes bool
If enabled, no scopes will be sent to the OAuth2 provider.
Enabled bool
Define whether this configuration is enabled for the specified provider. Defaults to true.
GroupsAttributePath string
JMESPath expression to use for user group lookup. If you configure allowedgroups, you must also configure groupsattribute_path.
IdTokenAttributeName string
The name of the key used to extract the ID token from the returned OAuth2 token. Only applicable to Generic OAuth.
LoginAttributePath string
JMESPath expression to use for user login lookup from the user ID token. Only applicable to Generic OAuth.
Name string
Helpful if you use more than one identity providers or SSO protocols.
NameAttributePath string
JMESPath expression to use for user name lookup from the user ID token. This name will be used as the user’s display name. Only applicable to Generic OAuth.
OrgAttributePath string
JMESPath expression to use for the organization mapping lookup from the user ID token. The extracted list will be used for the organization mapping (to match "Organization" in the "org_mapping"). Only applicable to Generic OAuth and Okta.
OrgMapping string
List of comma- or space-separated Organization:OrgIdOrOrgName:Role mappings. Organization can be * meaning “All users”. Role is optional and can have the following values: None, Viewer, Editor or Admin.
RoleAttributePath string
JMESPath expression to use for Grafana role lookup.
RoleAttributeStrict bool
If enabled, denies user login if the Grafana role cannot be extracted using Role attribute path.
Scopes string
List of comma- or space-separated OAuth2 scopes.
SignoutRedirectUrl string
The URL to redirect the user to after signing out from Grafana.
SkipOrgRoleSync bool
Prevent synchronizing users’ organization roles from your IdP.
TeamIds string
String list of Team Ids. If set, the user must be a member of one of the given teams to log in. If you configure teamids, you must also configure teamsurl and teamidsattribute_path.
TeamIdsAttributePath string
The JMESPath expression to use for Grafana Team Id lookup within the results returned by the teams_url endpoint. Only applicable to Generic OAuth.
TeamsUrl string
The URL used to query for Team Ids. If not set, the default value is /teams. If you configure teamsurl, you must also configure teamidsattributepath. Only applicable to Generic OAuth.
TlsClientCa string
The path to the trusted certificate authority list. Is not applicable on Grafana Cloud.
TlsClientCert string
The path to the certificate. Is not applicable on Grafana Cloud.
TlsClientKey string
The path to the key. Is not applicable on Grafana Cloud.
TlsSkipVerifyInsecure bool
If enabled, the client accepts any certificate presented by the server and any host name in that certificate. You should only use this for testing, because this mode leaves SSL/TLS susceptible to man-in-the-middle attacks.
TokenUrl string
The token endpoint of your OAuth2 provider. Required for azuread, okta and generic_oauth providers.
UsePkce bool
If enabled, Grafana will use Proof Key for Code Exchange (PKCE) with the OAuth2 Authorization Code Grant.
UseRefreshToken bool
If enabled, Grafana will fetch a new access token using the refresh token provided by the OAuth2 provider.
clientId This property is required. String
The client Id of your OAuth2 app.
allowAssignGrafanaAdmin Boolean
If enabled, it will automatically sync the Grafana server administrator role.
allowSignUp Boolean
If not enabled, only existing Grafana users can log in using OAuth.
allowedDomains String
List of comma- or space-separated domains. The user should belong to at least one domain to log in.
allowedGroups String
List of comma- or space-separated groups. The user should be a member of at least one group to log in. For Generic OAuth, if you configure allowedgroups, you must also configure groupsattribute_path.
allowedOrganizations String
List of comma- or space-separated organizations. The user should be a member of at least one organization to log in.
apiUrl String
The user information endpoint of your OAuth2 provider. Required for okta and generic_oauth providers.
authStyle String
It determines how clientid and clientsecret are sent to Oauth2 provider. Possible values are AutoDetect, InParams, InHeader. Default is AutoDetect.
authUrl String
The authorization endpoint of your OAuth2 provider. Required for azuread, okta and generic_oauth providers.
autoLogin Boolean
Log in automatically, skipping the login screen.
clientSecret String
The client secret of your OAuth2 app.
custom Map<String,String>
Custom fields to configure for OAuth2 such as the forceusegraph_api field.
defineAllowedGroups Boolean
Define allowed groups.
defineAllowedTeamsIds Boolean
Define allowed teams ids.
emailAttributeName String
Name of the key to use for user email lookup within the attributes map of OAuth2 ID token. Only applicable to Generic OAuth.
emailAttributePath String
JMESPath expression to use for user email lookup from the user information. Only applicable to Generic OAuth.
emptyScopes Boolean
If enabled, no scopes will be sent to the OAuth2 provider.
enabled Boolean
Define whether this configuration is enabled for the specified provider. Defaults to true.
groupsAttributePath String
JMESPath expression to use for user group lookup. If you configure allowedgroups, you must also configure groupsattribute_path.
idTokenAttributeName String
The name of the key used to extract the ID token from the returned OAuth2 token. Only applicable to Generic OAuth.
loginAttributePath String
JMESPath expression to use for user login lookup from the user ID token. Only applicable to Generic OAuth.
name String
Helpful if you use more than one identity providers or SSO protocols.
nameAttributePath String
JMESPath expression to use for user name lookup from the user ID token. This name will be used as the user’s display name. Only applicable to Generic OAuth.
orgAttributePath String
JMESPath expression to use for the organization mapping lookup from the user ID token. The extracted list will be used for the organization mapping (to match "Organization" in the "org_mapping"). Only applicable to Generic OAuth and Okta.
orgMapping String
List of comma- or space-separated Organization:OrgIdOrOrgName:Role mappings. Organization can be * meaning “All users”. Role is optional and can have the following values: None, Viewer, Editor or Admin.
roleAttributePath String
JMESPath expression to use for Grafana role lookup.
roleAttributeStrict Boolean
If enabled, denies user login if the Grafana role cannot be extracted using Role attribute path.
scopes String
List of comma- or space-separated OAuth2 scopes.
signoutRedirectUrl String
The URL to redirect the user to after signing out from Grafana.
skipOrgRoleSync Boolean
Prevent synchronizing users’ organization roles from your IdP.
teamIds String
String list of Team Ids. If set, the user must be a member of one of the given teams to log in. If you configure teamids, you must also configure teamsurl and teamidsattribute_path.
teamIdsAttributePath String
The JMESPath expression to use for Grafana Team Id lookup within the results returned by the teams_url endpoint. Only applicable to Generic OAuth.
teamsUrl String
The URL used to query for Team Ids. If not set, the default value is /teams. If you configure teamsurl, you must also configure teamidsattributepath. Only applicable to Generic OAuth.
tlsClientCa String
The path to the trusted certificate authority list. Is not applicable on Grafana Cloud.
tlsClientCert String
The path to the certificate. Is not applicable on Grafana Cloud.
tlsClientKey String
The path to the key. Is not applicable on Grafana Cloud.
tlsSkipVerifyInsecure Boolean
If enabled, the client accepts any certificate presented by the server and any host name in that certificate. You should only use this for testing, because this mode leaves SSL/TLS susceptible to man-in-the-middle attacks.
tokenUrl String
The token endpoint of your OAuth2 provider. Required for azuread, okta and generic_oauth providers.
usePkce Boolean
If enabled, Grafana will use Proof Key for Code Exchange (PKCE) with the OAuth2 Authorization Code Grant.
useRefreshToken Boolean
If enabled, Grafana will fetch a new access token using the refresh token provided by the OAuth2 provider.
clientId This property is required. string
The client Id of your OAuth2 app.
allowAssignGrafanaAdmin boolean
If enabled, it will automatically sync the Grafana server administrator role.
allowSignUp boolean
If not enabled, only existing Grafana users can log in using OAuth.
allowedDomains string
List of comma- or space-separated domains. The user should belong to at least one domain to log in.
allowedGroups string
List of comma- or space-separated groups. The user should be a member of at least one group to log in. For Generic OAuth, if you configure allowedgroups, you must also configure groupsattribute_path.
allowedOrganizations string
List of comma- or space-separated organizations. The user should be a member of at least one organization to log in.
apiUrl string
The user information endpoint of your OAuth2 provider. Required for okta and generic_oauth providers.
authStyle string
It determines how clientid and clientsecret are sent to Oauth2 provider. Possible values are AutoDetect, InParams, InHeader. Default is AutoDetect.
authUrl string
The authorization endpoint of your OAuth2 provider. Required for azuread, okta and generic_oauth providers.
autoLogin boolean
Log in automatically, skipping the login screen.
clientSecret string
The client secret of your OAuth2 app.
custom {[key: string]: string}
Custom fields to configure for OAuth2 such as the forceusegraph_api field.
defineAllowedGroups boolean
Define allowed groups.
defineAllowedTeamsIds boolean
Define allowed teams ids.
emailAttributeName string
Name of the key to use for user email lookup within the attributes map of OAuth2 ID token. Only applicable to Generic OAuth.
emailAttributePath string
JMESPath expression to use for user email lookup from the user information. Only applicable to Generic OAuth.
emptyScopes boolean
If enabled, no scopes will be sent to the OAuth2 provider.
enabled boolean
Define whether this configuration is enabled for the specified provider. Defaults to true.
groupsAttributePath string
JMESPath expression to use for user group lookup. If you configure allowedgroups, you must also configure groupsattribute_path.
idTokenAttributeName string
The name of the key used to extract the ID token from the returned OAuth2 token. Only applicable to Generic OAuth.
loginAttributePath string
JMESPath expression to use for user login lookup from the user ID token. Only applicable to Generic OAuth.
name string
Helpful if you use more than one identity providers or SSO protocols.
nameAttributePath string
JMESPath expression to use for user name lookup from the user ID token. This name will be used as the user’s display name. Only applicable to Generic OAuth.
orgAttributePath string
JMESPath expression to use for the organization mapping lookup from the user ID token. The extracted list will be used for the organization mapping (to match "Organization" in the "org_mapping"). Only applicable to Generic OAuth and Okta.
orgMapping string
List of comma- or space-separated Organization:OrgIdOrOrgName:Role mappings. Organization can be * meaning “All users”. Role is optional and can have the following values: None, Viewer, Editor or Admin.
roleAttributePath string
JMESPath expression to use for Grafana role lookup.
roleAttributeStrict boolean
If enabled, denies user login if the Grafana role cannot be extracted using Role attribute path.
scopes string
List of comma- or space-separated OAuth2 scopes.
signoutRedirectUrl string
The URL to redirect the user to after signing out from Grafana.
skipOrgRoleSync boolean
Prevent synchronizing users’ organization roles from your IdP.
teamIds string
String list of Team Ids. If set, the user must be a member of one of the given teams to log in. If you configure teamids, you must also configure teamsurl and teamidsattribute_path.
teamIdsAttributePath string
The JMESPath expression to use for Grafana Team Id lookup within the results returned by the teams_url endpoint. Only applicable to Generic OAuth.
teamsUrl string
The URL used to query for Team Ids. If not set, the default value is /teams. If you configure teamsurl, you must also configure teamidsattributepath. Only applicable to Generic OAuth.
tlsClientCa string
The path to the trusted certificate authority list. Is not applicable on Grafana Cloud.
tlsClientCert string
The path to the certificate. Is not applicable on Grafana Cloud.
tlsClientKey string
The path to the key. Is not applicable on Grafana Cloud.
tlsSkipVerifyInsecure boolean
If enabled, the client accepts any certificate presented by the server and any host name in that certificate. You should only use this for testing, because this mode leaves SSL/TLS susceptible to man-in-the-middle attacks.
tokenUrl string
The token endpoint of your OAuth2 provider. Required for azuread, okta and generic_oauth providers.
usePkce boolean
If enabled, Grafana will use Proof Key for Code Exchange (PKCE) with the OAuth2 Authorization Code Grant.
useRefreshToken boolean
If enabled, Grafana will fetch a new access token using the refresh token provided by the OAuth2 provider.
client_id This property is required. str
The client Id of your OAuth2 app.
allow_assign_grafana_admin bool
If enabled, it will automatically sync the Grafana server administrator role.
allow_sign_up bool
If not enabled, only existing Grafana users can log in using OAuth.
allowed_domains str
List of comma- or space-separated domains. The user should belong to at least one domain to log in.
allowed_groups str
List of comma- or space-separated groups. The user should be a member of at least one group to log in. For Generic OAuth, if you configure allowedgroups, you must also configure groupsattribute_path.
allowed_organizations str
List of comma- or space-separated organizations. The user should be a member of at least one organization to log in.
api_url str
The user information endpoint of your OAuth2 provider. Required for okta and generic_oauth providers.
auth_style str
It determines how clientid and clientsecret are sent to Oauth2 provider. Possible values are AutoDetect, InParams, InHeader. Default is AutoDetect.
auth_url str
The authorization endpoint of your OAuth2 provider. Required for azuread, okta and generic_oauth providers.
auto_login bool
Log in automatically, skipping the login screen.
client_secret str
The client secret of your OAuth2 app.
custom Mapping[str, str]
Custom fields to configure for OAuth2 such as the forceusegraph_api field.
define_allowed_groups bool
Define allowed groups.
define_allowed_teams_ids bool
Define allowed teams ids.
email_attribute_name str
Name of the key to use for user email lookup within the attributes map of OAuth2 ID token. Only applicable to Generic OAuth.
email_attribute_path str
JMESPath expression to use for user email lookup from the user information. Only applicable to Generic OAuth.
empty_scopes bool
If enabled, no scopes will be sent to the OAuth2 provider.
enabled bool
Define whether this configuration is enabled for the specified provider. Defaults to true.
groups_attribute_path str
JMESPath expression to use for user group lookup. If you configure allowedgroups, you must also configure groupsattribute_path.
id_token_attribute_name str
The name of the key used to extract the ID token from the returned OAuth2 token. Only applicable to Generic OAuth.
login_attribute_path str
JMESPath expression to use for user login lookup from the user ID token. Only applicable to Generic OAuth.
name str
Helpful if you use more than one identity providers or SSO protocols.
name_attribute_path str
JMESPath expression to use for user name lookup from the user ID token. This name will be used as the user’s display name. Only applicable to Generic OAuth.
org_attribute_path str
JMESPath expression to use for the organization mapping lookup from the user ID token. The extracted list will be used for the organization mapping (to match "Organization" in the "org_mapping"). Only applicable to Generic OAuth and Okta.
org_mapping str
List of comma- or space-separated Organization:OrgIdOrOrgName:Role mappings. Organization can be * meaning “All users”. Role is optional and can have the following values: None, Viewer, Editor or Admin.
role_attribute_path str
JMESPath expression to use for Grafana role lookup.
role_attribute_strict bool
If enabled, denies user login if the Grafana role cannot be extracted using Role attribute path.
scopes str
List of comma- or space-separated OAuth2 scopes.
signout_redirect_url str
The URL to redirect the user to after signing out from Grafana.
skip_org_role_sync bool
Prevent synchronizing users’ organization roles from your IdP.
team_ids str
String list of Team Ids. If set, the user must be a member of one of the given teams to log in. If you configure teamids, you must also configure teamsurl and teamidsattribute_path.
team_ids_attribute_path str
The JMESPath expression to use for Grafana Team Id lookup within the results returned by the teams_url endpoint. Only applicable to Generic OAuth.
teams_url str
The URL used to query for Team Ids. If not set, the default value is /teams. If you configure teamsurl, you must also configure teamidsattributepath. Only applicable to Generic OAuth.
tls_client_ca str
The path to the trusted certificate authority list. Is not applicable on Grafana Cloud.
tls_client_cert str
The path to the certificate. Is not applicable on Grafana Cloud.
tls_client_key str
The path to the key. Is not applicable on Grafana Cloud.
tls_skip_verify_insecure bool
If enabled, the client accepts any certificate presented by the server and any host name in that certificate. You should only use this for testing, because this mode leaves SSL/TLS susceptible to man-in-the-middle attacks.
token_url str
The token endpoint of your OAuth2 provider. Required for azuread, okta and generic_oauth providers.
use_pkce bool
If enabled, Grafana will use Proof Key for Code Exchange (PKCE) with the OAuth2 Authorization Code Grant.
use_refresh_token bool
If enabled, Grafana will fetch a new access token using the refresh token provided by the OAuth2 provider.
clientId This property is required. String
The client Id of your OAuth2 app.
allowAssignGrafanaAdmin Boolean
If enabled, it will automatically sync the Grafana server administrator role.
allowSignUp Boolean
If not enabled, only existing Grafana users can log in using OAuth.
allowedDomains String
List of comma- or space-separated domains. The user should belong to at least one domain to log in.
allowedGroups String
List of comma- or space-separated groups. The user should be a member of at least one group to log in. For Generic OAuth, if you configure allowedgroups, you must also configure groupsattribute_path.
allowedOrganizations String
List of comma- or space-separated organizations. The user should be a member of at least one organization to log in.
apiUrl String
The user information endpoint of your OAuth2 provider. Required for okta and generic_oauth providers.
authStyle String
It determines how clientid and clientsecret are sent to Oauth2 provider. Possible values are AutoDetect, InParams, InHeader. Default is AutoDetect.
authUrl String
The authorization endpoint of your OAuth2 provider. Required for azuread, okta and generic_oauth providers.
autoLogin Boolean
Log in automatically, skipping the login screen.
clientSecret String
The client secret of your OAuth2 app.
custom Map<String>
Custom fields to configure for OAuth2 such as the forceusegraph_api field.
defineAllowedGroups Boolean
Define allowed groups.
defineAllowedTeamsIds Boolean
Define allowed teams ids.
emailAttributeName String
Name of the key to use for user email lookup within the attributes map of OAuth2 ID token. Only applicable to Generic OAuth.
emailAttributePath String
JMESPath expression to use for user email lookup from the user information. Only applicable to Generic OAuth.
emptyScopes Boolean
If enabled, no scopes will be sent to the OAuth2 provider.
enabled Boolean
Define whether this configuration is enabled for the specified provider. Defaults to true.
groupsAttributePath String
JMESPath expression to use for user group lookup. If you configure allowedgroups, you must also configure groupsattribute_path.
idTokenAttributeName String
The name of the key used to extract the ID token from the returned OAuth2 token. Only applicable to Generic OAuth.
loginAttributePath String
JMESPath expression to use for user login lookup from the user ID token. Only applicable to Generic OAuth.
name String
Helpful if you use more than one identity providers or SSO protocols.
nameAttributePath String
JMESPath expression to use for user name lookup from the user ID token. This name will be used as the user’s display name. Only applicable to Generic OAuth.
orgAttributePath String
JMESPath expression to use for the organization mapping lookup from the user ID token. The extracted list will be used for the organization mapping (to match "Organization" in the "org_mapping"). Only applicable to Generic OAuth and Okta.
orgMapping String
List of comma- or space-separated Organization:OrgIdOrOrgName:Role mappings. Organization can be * meaning “All users”. Role is optional and can have the following values: None, Viewer, Editor or Admin.
roleAttributePath String
JMESPath expression to use for Grafana role lookup.
roleAttributeStrict Boolean
If enabled, denies user login if the Grafana role cannot be extracted using Role attribute path.
scopes String
List of comma- or space-separated OAuth2 scopes.
signoutRedirectUrl String
The URL to redirect the user to after signing out from Grafana.
skipOrgRoleSync Boolean
Prevent synchronizing users’ organization roles from your IdP.
teamIds String
String list of Team Ids. If set, the user must be a member of one of the given teams to log in. If you configure teamids, you must also configure teamsurl and teamidsattribute_path.
teamIdsAttributePath String
The JMESPath expression to use for Grafana Team Id lookup within the results returned by the teams_url endpoint. Only applicable to Generic OAuth.
teamsUrl String
The URL used to query for Team Ids. If not set, the default value is /teams. If you configure teamsurl, you must also configure teamidsattributepath. Only applicable to Generic OAuth.
tlsClientCa String
The path to the trusted certificate authority list. Is not applicable on Grafana Cloud.
tlsClientCert String
The path to the certificate. Is not applicable on Grafana Cloud.
tlsClientKey String
The path to the key. Is not applicable on Grafana Cloud.
tlsSkipVerifyInsecure Boolean
If enabled, the client accepts any certificate presented by the server and any host name in that certificate. You should only use this for testing, because this mode leaves SSL/TLS susceptible to man-in-the-middle attacks.
tokenUrl String
The token endpoint of your OAuth2 provider. Required for azuread, okta and generic_oauth providers.
usePkce Boolean
If enabled, Grafana will use Proof Key for Code Exchange (PKCE) with the OAuth2 Authorization Code Grant.
useRefreshToken Boolean
If enabled, Grafana will fetch a new access token using the refresh token provided by the OAuth2 provider.

SsoSettingsSamlSettings
, SsoSettingsSamlSettingsArgs

AllowIdpInitiated bool
Whether SAML IdP-initiated login is allowed.
AllowSignUp bool
Whether to allow new Grafana user creation through SAML login. If set to false, then only existing Grafana users can log in with SAML.
AllowedOrganizations string
List of comma- or space-separated organizations. User should be a member of at least one organization to log in.
AssertionAttributeEmail string
Friendly name or name of the attribute within the SAML assertion to use as the user email.
AssertionAttributeGroups string
Friendly name or name of the attribute within the SAML assertion to use as the user groups.
AssertionAttributeLogin string
Friendly name or name of the attribute within the SAML assertion to use as the user login handle.
AssertionAttributeName string
Friendly name or name of the attribute within the SAML assertion to use as the user name. Alternatively, this can be a template with variables that match the names of attributes within the SAML assertion.
AssertionAttributeOrg string
Friendly name or name of the attribute within the SAML assertion to use as the user organization.
AssertionAttributeRole string
Friendly name or name of the attribute within the SAML assertion to use as the user roles.
AutoLogin bool
Whether SAML auto login is enabled.
Certificate string
Base64-encoded string for the SP X.509 certificate.
CertificatePath string
Path for the SP X.509 certificate.
ClientId string
The client Id of your OAuth2 app.
ClientSecret string
The client secret of your OAuth2 app.
Enabled bool
Define whether this configuration is enabled for SAML. Defaults to true.
EntityId string
The entity ID is a globally unique identifier for the service provider. It is used to identify the service provider to the identity provider. Defaults to the URL of the Grafana instance if not set.
ForceUseGraphApi bool
If enabled, Grafana will fetch groups from Microsoft Graph API instead of using the groups claim from the ID token.
IdpMetadata string
Base64-encoded string for the IdP SAML metadata XML.
IdpMetadataPath string
Path for the IdP SAML metadata XML.
IdpMetadataUrl string
URL for the IdP SAML metadata XML.
MaxIssueDelay string
Duration, since the IdP issued a response and the SP is allowed to process it. For example: 90s, 1h.
MetadataValidDuration string
Duration, for how long the SP metadata is valid. For example: 48h, 5d.
Name string
Name used to refer to the SAML authentication.
NameIdFormat string
The Name ID Format to request within the SAML assertion. Defaults to urn:oasis:names:tc:SAML:2.0:nameid-format:transient
OrgMapping string
List of comma- or space-separated Organization:OrgId:Role mappings. Organization can be * meaning “All users”. Role is optional and can have the following values: Viewer, Editor or Admin.
PrivateKey string
Base64-encoded string for the SP private key.
PrivateKeyPath string
Path for the SP private key.
RelayState string
Relay state for IdP-initiated login. Should match relay state configured in IdP.
RoleValuesAdmin string
List of comma- or space-separated roles which will be mapped into the Admin role.
RoleValuesEditor string
List of comma- or space-separated roles which will be mapped into the Editor role.
RoleValuesGrafanaAdmin string
List of comma- or space-separated roles which will be mapped into the Grafana Admin (Super Admin) role.
RoleValuesNone string
List of comma- or space-separated roles which will be mapped into the None role.
RoleValuesViewer string
List of comma- or space-separated roles which will be mapped into the Viewer role.
SignatureAlgorithm string
Signature algorithm used for signing requests to the IdP. Supported values are rsa-sha1, rsa-sha256, rsa-sha512.
SingleLogout bool
Whether SAML Single Logout is enabled.
SkipOrgRoleSync bool
Prevent synchronizing users’ organization roles from your IdP.
TokenUrl string
The token endpoint of your OAuth2 provider. Required for Azure AD providers.
AllowIdpInitiated bool
Whether SAML IdP-initiated login is allowed.
AllowSignUp bool
Whether to allow new Grafana user creation through SAML login. If set to false, then only existing Grafana users can log in with SAML.
AllowedOrganizations string
List of comma- or space-separated organizations. User should be a member of at least one organization to log in.
AssertionAttributeEmail string
Friendly name or name of the attribute within the SAML assertion to use as the user email.
AssertionAttributeGroups string
Friendly name or name of the attribute within the SAML assertion to use as the user groups.
AssertionAttributeLogin string
Friendly name or name of the attribute within the SAML assertion to use as the user login handle.
AssertionAttributeName string
Friendly name or name of the attribute within the SAML assertion to use as the user name. Alternatively, this can be a template with variables that match the names of attributes within the SAML assertion.
AssertionAttributeOrg string
Friendly name or name of the attribute within the SAML assertion to use as the user organization.
AssertionAttributeRole string
Friendly name or name of the attribute within the SAML assertion to use as the user roles.
AutoLogin bool
Whether SAML auto login is enabled.
Certificate string
Base64-encoded string for the SP X.509 certificate.
CertificatePath string
Path for the SP X.509 certificate.
ClientId string
The client Id of your OAuth2 app.
ClientSecret string
The client secret of your OAuth2 app.
Enabled bool
Define whether this configuration is enabled for SAML. Defaults to true.
EntityId string
The entity ID is a globally unique identifier for the service provider. It is used to identify the service provider to the identity provider. Defaults to the URL of the Grafana instance if not set.
ForceUseGraphApi bool
If enabled, Grafana will fetch groups from Microsoft Graph API instead of using the groups claim from the ID token.
IdpMetadata string
Base64-encoded string for the IdP SAML metadata XML.
IdpMetadataPath string
Path for the IdP SAML metadata XML.
IdpMetadataUrl string
URL for the IdP SAML metadata XML.
MaxIssueDelay string
Duration, since the IdP issued a response and the SP is allowed to process it. For example: 90s, 1h.
MetadataValidDuration string
Duration, for how long the SP metadata is valid. For example: 48h, 5d.
Name string
Name used to refer to the SAML authentication.
NameIdFormat string
The Name ID Format to request within the SAML assertion. Defaults to urn:oasis:names:tc:SAML:2.0:nameid-format:transient
OrgMapping string
List of comma- or space-separated Organization:OrgId:Role mappings. Organization can be * meaning “All users”. Role is optional and can have the following values: Viewer, Editor or Admin.
PrivateKey string
Base64-encoded string for the SP private key.
PrivateKeyPath string
Path for the SP private key.
RelayState string
Relay state for IdP-initiated login. Should match relay state configured in IdP.
RoleValuesAdmin string
List of comma- or space-separated roles which will be mapped into the Admin role.
RoleValuesEditor string
List of comma- or space-separated roles which will be mapped into the Editor role.
RoleValuesGrafanaAdmin string
List of comma- or space-separated roles which will be mapped into the Grafana Admin (Super Admin) role.
RoleValuesNone string
List of comma- or space-separated roles which will be mapped into the None role.
RoleValuesViewer string
List of comma- or space-separated roles which will be mapped into the Viewer role.
SignatureAlgorithm string
Signature algorithm used for signing requests to the IdP. Supported values are rsa-sha1, rsa-sha256, rsa-sha512.
SingleLogout bool
Whether SAML Single Logout is enabled.
SkipOrgRoleSync bool
Prevent synchronizing users’ organization roles from your IdP.
TokenUrl string
The token endpoint of your OAuth2 provider. Required for Azure AD providers.
allowIdpInitiated Boolean
Whether SAML IdP-initiated login is allowed.
allowSignUp Boolean
Whether to allow new Grafana user creation through SAML login. If set to false, then only existing Grafana users can log in with SAML.
allowedOrganizations String
List of comma- or space-separated organizations. User should be a member of at least one organization to log in.
assertionAttributeEmail String
Friendly name or name of the attribute within the SAML assertion to use as the user email.
assertionAttributeGroups String
Friendly name or name of the attribute within the SAML assertion to use as the user groups.
assertionAttributeLogin String
Friendly name or name of the attribute within the SAML assertion to use as the user login handle.
assertionAttributeName String
Friendly name or name of the attribute within the SAML assertion to use as the user name. Alternatively, this can be a template with variables that match the names of attributes within the SAML assertion.
assertionAttributeOrg String
Friendly name or name of the attribute within the SAML assertion to use as the user organization.
assertionAttributeRole String
Friendly name or name of the attribute within the SAML assertion to use as the user roles.
autoLogin Boolean
Whether SAML auto login is enabled.
certificate String
Base64-encoded string for the SP X.509 certificate.
certificatePath String
Path for the SP X.509 certificate.
clientId String
The client Id of your OAuth2 app.
clientSecret String
The client secret of your OAuth2 app.
enabled Boolean
Define whether this configuration is enabled for SAML. Defaults to true.
entityId String
The entity ID is a globally unique identifier for the service provider. It is used to identify the service provider to the identity provider. Defaults to the URL of the Grafana instance if not set.
forceUseGraphApi Boolean
If enabled, Grafana will fetch groups from Microsoft Graph API instead of using the groups claim from the ID token.
idpMetadata String
Base64-encoded string for the IdP SAML metadata XML.
idpMetadataPath String
Path for the IdP SAML metadata XML.
idpMetadataUrl String
URL for the IdP SAML metadata XML.
maxIssueDelay String
Duration, since the IdP issued a response and the SP is allowed to process it. For example: 90s, 1h.
metadataValidDuration String
Duration, for how long the SP metadata is valid. For example: 48h, 5d.
name String
Name used to refer to the SAML authentication.
nameIdFormat String
The Name ID Format to request within the SAML assertion. Defaults to urn:oasis:names:tc:SAML:2.0:nameid-format:transient
orgMapping String
List of comma- or space-separated Organization:OrgId:Role mappings. Organization can be * meaning “All users”. Role is optional and can have the following values: Viewer, Editor or Admin.
privateKey String
Base64-encoded string for the SP private key.
privateKeyPath String
Path for the SP private key.
relayState String
Relay state for IdP-initiated login. Should match relay state configured in IdP.
roleValuesAdmin String
List of comma- or space-separated roles which will be mapped into the Admin role.
roleValuesEditor String
List of comma- or space-separated roles which will be mapped into the Editor role.
roleValuesGrafanaAdmin String
List of comma- or space-separated roles which will be mapped into the Grafana Admin (Super Admin) role.
roleValuesNone String
List of comma- or space-separated roles which will be mapped into the None role.
roleValuesViewer String
List of comma- or space-separated roles which will be mapped into the Viewer role.
signatureAlgorithm String
Signature algorithm used for signing requests to the IdP. Supported values are rsa-sha1, rsa-sha256, rsa-sha512.
singleLogout Boolean
Whether SAML Single Logout is enabled.
skipOrgRoleSync Boolean
Prevent synchronizing users’ organization roles from your IdP.
tokenUrl String
The token endpoint of your OAuth2 provider. Required for Azure AD providers.
allowIdpInitiated boolean
Whether SAML IdP-initiated login is allowed.
allowSignUp boolean
Whether to allow new Grafana user creation through SAML login. If set to false, then only existing Grafana users can log in with SAML.
allowedOrganizations string
List of comma- or space-separated organizations. User should be a member of at least one organization to log in.
assertionAttributeEmail string
Friendly name or name of the attribute within the SAML assertion to use as the user email.
assertionAttributeGroups string
Friendly name or name of the attribute within the SAML assertion to use as the user groups.
assertionAttributeLogin string
Friendly name or name of the attribute within the SAML assertion to use as the user login handle.
assertionAttributeName string
Friendly name or name of the attribute within the SAML assertion to use as the user name. Alternatively, this can be a template with variables that match the names of attributes within the SAML assertion.
assertionAttributeOrg string
Friendly name or name of the attribute within the SAML assertion to use as the user organization.
assertionAttributeRole string
Friendly name or name of the attribute within the SAML assertion to use as the user roles.
autoLogin boolean
Whether SAML auto login is enabled.
certificate string
Base64-encoded string for the SP X.509 certificate.
certificatePath string
Path for the SP X.509 certificate.
clientId string
The client Id of your OAuth2 app.
clientSecret string
The client secret of your OAuth2 app.
enabled boolean
Define whether this configuration is enabled for SAML. Defaults to true.
entityId string
The entity ID is a globally unique identifier for the service provider. It is used to identify the service provider to the identity provider. Defaults to the URL of the Grafana instance if not set.
forceUseGraphApi boolean
If enabled, Grafana will fetch groups from Microsoft Graph API instead of using the groups claim from the ID token.
idpMetadata string
Base64-encoded string for the IdP SAML metadata XML.
idpMetadataPath string
Path for the IdP SAML metadata XML.
idpMetadataUrl string
URL for the IdP SAML metadata XML.
maxIssueDelay string
Duration, since the IdP issued a response and the SP is allowed to process it. For example: 90s, 1h.
metadataValidDuration string
Duration, for how long the SP metadata is valid. For example: 48h, 5d.
name string
Name used to refer to the SAML authentication.
nameIdFormat string
The Name ID Format to request within the SAML assertion. Defaults to urn:oasis:names:tc:SAML:2.0:nameid-format:transient
orgMapping string
List of comma- or space-separated Organization:OrgId:Role mappings. Organization can be * meaning “All users”. Role is optional and can have the following values: Viewer, Editor or Admin.
privateKey string
Base64-encoded string for the SP private key.
privateKeyPath string
Path for the SP private key.
relayState string
Relay state for IdP-initiated login. Should match relay state configured in IdP.
roleValuesAdmin string
List of comma- or space-separated roles which will be mapped into the Admin role.
roleValuesEditor string
List of comma- or space-separated roles which will be mapped into the Editor role.
roleValuesGrafanaAdmin string
List of comma- or space-separated roles which will be mapped into the Grafana Admin (Super Admin) role.
roleValuesNone string
List of comma- or space-separated roles which will be mapped into the None role.
roleValuesViewer string
List of comma- or space-separated roles which will be mapped into the Viewer role.
signatureAlgorithm string
Signature algorithm used for signing requests to the IdP. Supported values are rsa-sha1, rsa-sha256, rsa-sha512.
singleLogout boolean
Whether SAML Single Logout is enabled.
skipOrgRoleSync boolean
Prevent synchronizing users’ organization roles from your IdP.
tokenUrl string
The token endpoint of your OAuth2 provider. Required for Azure AD providers.
allow_idp_initiated bool
Whether SAML IdP-initiated login is allowed.
allow_sign_up bool
Whether to allow new Grafana user creation through SAML login. If set to false, then only existing Grafana users can log in with SAML.
allowed_organizations str
List of comma- or space-separated organizations. User should be a member of at least one organization to log in.
assertion_attribute_email str
Friendly name or name of the attribute within the SAML assertion to use as the user email.
assertion_attribute_groups str
Friendly name or name of the attribute within the SAML assertion to use as the user groups.
assertion_attribute_login str
Friendly name or name of the attribute within the SAML assertion to use as the user login handle.
assertion_attribute_name str
Friendly name or name of the attribute within the SAML assertion to use as the user name. Alternatively, this can be a template with variables that match the names of attributes within the SAML assertion.
assertion_attribute_org str
Friendly name or name of the attribute within the SAML assertion to use as the user organization.
assertion_attribute_role str
Friendly name or name of the attribute within the SAML assertion to use as the user roles.
auto_login bool
Whether SAML auto login is enabled.
certificate str
Base64-encoded string for the SP X.509 certificate.
certificate_path str
Path for the SP X.509 certificate.
client_id str
The client Id of your OAuth2 app.
client_secret str
The client secret of your OAuth2 app.
enabled bool
Define whether this configuration is enabled for SAML. Defaults to true.
entity_id str
The entity ID is a globally unique identifier for the service provider. It is used to identify the service provider to the identity provider. Defaults to the URL of the Grafana instance if not set.
force_use_graph_api bool
If enabled, Grafana will fetch groups from Microsoft Graph API instead of using the groups claim from the ID token.
idp_metadata str
Base64-encoded string for the IdP SAML metadata XML.
idp_metadata_path str
Path for the IdP SAML metadata XML.
idp_metadata_url str
URL for the IdP SAML metadata XML.
max_issue_delay str
Duration, since the IdP issued a response and the SP is allowed to process it. For example: 90s, 1h.
metadata_valid_duration str
Duration, for how long the SP metadata is valid. For example: 48h, 5d.
name str
Name used to refer to the SAML authentication.
name_id_format str
The Name ID Format to request within the SAML assertion. Defaults to urn:oasis:names:tc:SAML:2.0:nameid-format:transient
org_mapping str
List of comma- or space-separated Organization:OrgId:Role mappings. Organization can be * meaning “All users”. Role is optional and can have the following values: Viewer, Editor or Admin.
private_key str
Base64-encoded string for the SP private key.
private_key_path str
Path for the SP private key.
relay_state str
Relay state for IdP-initiated login. Should match relay state configured in IdP.
role_values_admin str
List of comma- or space-separated roles which will be mapped into the Admin role.
role_values_editor str
List of comma- or space-separated roles which will be mapped into the Editor role.
role_values_grafana_admin str
List of comma- or space-separated roles which will be mapped into the Grafana Admin (Super Admin) role.
role_values_none str
List of comma- or space-separated roles which will be mapped into the None role.
role_values_viewer str
List of comma- or space-separated roles which will be mapped into the Viewer role.
signature_algorithm str
Signature algorithm used for signing requests to the IdP. Supported values are rsa-sha1, rsa-sha256, rsa-sha512.
single_logout bool
Whether SAML Single Logout is enabled.
skip_org_role_sync bool
Prevent synchronizing users’ organization roles from your IdP.
token_url str
The token endpoint of your OAuth2 provider. Required for Azure AD providers.
allowIdpInitiated Boolean
Whether SAML IdP-initiated login is allowed.
allowSignUp Boolean
Whether to allow new Grafana user creation through SAML login. If set to false, then only existing Grafana users can log in with SAML.
allowedOrganizations String
List of comma- or space-separated organizations. User should be a member of at least one organization to log in.
assertionAttributeEmail String
Friendly name or name of the attribute within the SAML assertion to use as the user email.
assertionAttributeGroups String
Friendly name or name of the attribute within the SAML assertion to use as the user groups.
assertionAttributeLogin String
Friendly name or name of the attribute within the SAML assertion to use as the user login handle.
assertionAttributeName String
Friendly name or name of the attribute within the SAML assertion to use as the user name. Alternatively, this can be a template with variables that match the names of attributes within the SAML assertion.
assertionAttributeOrg String
Friendly name or name of the attribute within the SAML assertion to use as the user organization.
assertionAttributeRole String
Friendly name or name of the attribute within the SAML assertion to use as the user roles.
autoLogin Boolean
Whether SAML auto login is enabled.
certificate String
Base64-encoded string for the SP X.509 certificate.
certificatePath String
Path for the SP X.509 certificate.
clientId String
The client Id of your OAuth2 app.
clientSecret String
The client secret of your OAuth2 app.
enabled Boolean
Define whether this configuration is enabled for SAML. Defaults to true.
entityId String
The entity ID is a globally unique identifier for the service provider. It is used to identify the service provider to the identity provider. Defaults to the URL of the Grafana instance if not set.
forceUseGraphApi Boolean
If enabled, Grafana will fetch groups from Microsoft Graph API instead of using the groups claim from the ID token.
idpMetadata String
Base64-encoded string for the IdP SAML metadata XML.
idpMetadataPath String
Path for the IdP SAML metadata XML.
idpMetadataUrl String
URL for the IdP SAML metadata XML.
maxIssueDelay String
Duration, since the IdP issued a response and the SP is allowed to process it. For example: 90s, 1h.
metadataValidDuration String
Duration, for how long the SP metadata is valid. For example: 48h, 5d.
name String
Name used to refer to the SAML authentication.
nameIdFormat String
The Name ID Format to request within the SAML assertion. Defaults to urn:oasis:names:tc:SAML:2.0:nameid-format:transient
orgMapping String
List of comma- or space-separated Organization:OrgId:Role mappings. Organization can be * meaning “All users”. Role is optional and can have the following values: Viewer, Editor or Admin.
privateKey String
Base64-encoded string for the SP private key.
privateKeyPath String
Path for the SP private key.
relayState String
Relay state for IdP-initiated login. Should match relay state configured in IdP.
roleValuesAdmin String
List of comma- or space-separated roles which will be mapped into the Admin role.
roleValuesEditor String
List of comma- or space-separated roles which will be mapped into the Editor role.
roleValuesGrafanaAdmin String
List of comma- or space-separated roles which will be mapped into the Grafana Admin (Super Admin) role.
roleValuesNone String
List of comma- or space-separated roles which will be mapped into the None role.
roleValuesViewer String
List of comma- or space-separated roles which will be mapped into the Viewer role.
signatureAlgorithm String
Signature algorithm used for signing requests to the IdP. Supported values are rsa-sha1, rsa-sha256, rsa-sha512.
singleLogout Boolean
Whether SAML Single Logout is enabled.
skipOrgRoleSync Boolean
Prevent synchronizing users’ organization roles from your IdP.
tokenUrl String
The token endpoint of your OAuth2 provider. Required for Azure AD providers.

Import

$ pulumi import grafana:oss/ssoSettings:SsoSettings name "{{ provider }}"
Copy
$ pulumi import grafana:oss/ssoSettings:SsoSettings name "{{ orgID }}:{{ provider }}"
Copy

To learn more about importing existing cloud resources, see Importing resources.

Package Details

Repository
grafana pulumiverse/pulumi-grafana
License
Apache-2.0
Notes
This Pulumi package is based on the grafana Terraform Provider.