- Release date: (January, 8 2025)
- Supported Terraform version: v1.x
- PR #513 - Upgraded Provider to SDK v2.74.2 to address Double encoding of special characters during GET operations.
- PR #513 -Fixed attribute
app_server_groups
onzpa_policy_access_rule
resource to prevent innadivertent drifts during plan and apply. Issue #512 - PR #513 - Deprecated previous
3.331.0
version due to missconfigured semversioning hash calculation.
NOTE v3.331.0 and v3.332.0 was a versioning mistake due to backend issues and does not represent hundreds of new features Either version can be safely used without concerns on breaking changes. This will be corrected in the next major version release 4.0.0 upcoming in the next few weeks. We apologize for the confusion and incovenience caused."
- Release date: (January, 5 2025)
- Supported Terraform version: v1.x
- PR #509 - Upgraded Provider to SDK v2.74.2 to address Double encoding of special characters during GET operations.
- Release date: (October, 31 2024)
- Supported Terraform version: v1.x
- PR #500 - Implemented a fix to the update function across all specialized application segment resources:
zpa_application_segment_browser_access
- The fix now automatically includes the attributesapp_id
andba_app_id
in the payload during updateszpa_application_segment_inspection
- The fix now automatically includes the attributesapp_id
andinspect_app_id
in the payload during updateszpa_application_segment_pra
- The fix now automatically includes the attributesapp_id
andpra_app_id
in the payload during updates. NOTE: This update/fix is required to ensure the ZPA API can properly identify the Browser Access, Inspection App and PRA App, based on its specific custom ID. The fix also includes the removal of theForceNew
option previously included in the schema to force the resource replacement in case of changes. Issue PR #498
- Release date: (October, 29 2024)
- Supported Terraform version: v1.x
- PR #499 - Fixed
zpa_application_segment_pra
import function and normalization of computed attributes. - PR #499 - Fixed drift with attribute
health)check_type
in the resourceszpa_application_segment
,zpa_application_segment_pra
,zpa_application_segment_inspection
andzpa_application_segment_browser_access
- PR #499 - Added new
zpa_application_segment
attributeinspect_traffic_with_zia
- Release date: (October, 3 2024)
- Supported Terraform version: v1.x
- PR #496 - Added new
object_type
RISK_FACTOR_TYPE
to the following ZPA access policy resources:zpa_policy_access_rule
, andzpa_policy_access_rule_v2
NOTE RISK_FACTOR_TYPE
is the Risk Score criteria equivalent in the ZPA UI and supports the following values:
UNKNOWN
, LOW
, MEDIUM
, HIGH
, CRITICAL
- PR #496 - Fixed issue with attribute
tcp_port_range
/udp_port_range
andtcp_port_ranges
/udp_port_ranges
withinzpa_application_segment
. The fix ensure that both port configuration formats are supported interchangeably. The fix also ensure the port configuration order is maintained during configuration. This fix does not impact exist configuration. Issue #490.
- PR #496 Consolidated multiple functions supported common/cross-shared resources. The following new common functions were introduced for simplicity:
expandCommonServerGroups
expandCommonAppConnectorGroups
expandCommonServiceEdgeGroups
flattenCommonAppConnectorGroups
flattenCommonAppServerGroups
flattenCommonServiceEdgeGroups
- Release date: (October, 1 2024)
- Supported Terraform version: v1.x
- PR #495 - Fixed issue with attribute
tcp_port_range
andudp_port_range
within the resourcezpa_application_segment
- Release date: (September, 30 2024)
- Supported Terraform version: v1.x
- PR #493 - Added plan stage validation for attributes
select_connector_close_to_app
andbypass_type
in the resourcezpa_application_segment
. - PR #493 - Added new attribute
use_in_dr_mode
in the resourcezpa_service_edge_group
.
- Release date: (September, 23 2024)
- Supported Terraform version: v1.x
- PR #492 - Fixed drift within attribute
zpa_policy_credential_access_rule
. - PR #492 - Fixed detachement function within
zpa_segment_group
~> NOTE This fix does not affect existing configurations.
- Release date: (September, 18 2024)
- Supported Terraform version: v1.x
- PR #489 - Fixed drift within attribute
common_apps_dto
andpra_apps
in thezpa_application_segment_pra
resource. - PR #489 - Fixed drift within attribute
common_apps_dto
andpra_apps
in thezpa_application_segment_inspection
resource. ~> NOTE This fix does not affect existing configurations.
- Release date: (September, 10 2024)
- Supported Terraform version: v1.x
- PR #486 - Fixed drift related to common flattening and expand functions for all v2 Access policy resources.
~> NOTE This fix does not affect existing configurations using the
v2
policy type.
- Release date: (September, 8 2024)
- Supported Terraform version: v1.x
- PR #484 - Fixed drift within the resource
zpa_application_segment
related to the attributemicrotenant_id
when setting the microtenant ID via environment variable.
- Release date: (September, 5 2024)
- Supported Terraform version: v1.x
- PR #483 Updated
resourceSegmentGroupUpdate
function in the resourcezpa_segment_group
to use the new GO SDK functionUpdateV2
. TheUpdateV2
function offers a newly enhanced v2 ZPA API endpoint.
- PR #483 - Fixed drift issue within all policy access rule v2 resources.
- PR #483 - Fixed drift within the resource
zpa_provisioning_key
related to the attributemicrotenant_id
when setting the microtenant ID via environment variable.
- Release date: (August, 28 2024)
- Supported Terraform version: v1.x
- PR #481 - Fixed drift issue within the attribute
tcp_port_ranges
andudp_port_ranges
for the resourcezpa_application_segment
to ignore the order which the port numbers are configured.
- Release date: (August, 26 2024)
- Supported Terraform version: v1.x
- PR #478 - Fixed drift within the attribute
service_edge
for the resourcezpa_service_edge_group
to ignore the order of IDs - PR #478 - Fixed drift within the attribute
tcp_port_ranges
andudp_port_ranges
for the resourcezpa_application_segment
to ignore the order which the port numbers are configured.
- PR #478 Added new attributes to
privileged_approvals_enabled
to resource:zpa_microtenant_controller
. The attribute indicates if Privileged Approvals is enabled (true) for the Microtenant.
- Release date: (August, 22 2024)
- Supported Terraform version: v1.x
- PR #476 - Fixed validation for the
match_style
attribute in the resourcezpa_application_segment
.
- Release date: (August, 16 2024)
- Supported Terraform version: v1.x
- PR #476 - Fixed validation for the
match_style
attribute in the resourcezpa_application_segment
. NOTE: Notice thatmatch_style
also known as Multimatch cannot be configured whenip_anchored
is enabled. Also,match_style
is NOT supported for the following application segment resources:zpa_application_segment_browser_access
,zpa_application_segment_inspection
orzpa_application_segment_pra
. - PR #476 - Added support to attribute:
bypass_on_reauth
to the following application segment resources:zpa_application_segment
,zpa_application_segment_inspection
andzpa_application_segment_pra
- NOTE
bypass_on_reauth
attribute is not currently supported when configuringzpa_application_segment_browser_access
as it is not supported by the ZPA API.
- NOTE
- PR #476 - Added documentation for resource and datasource:
zpa_service_edge_assistant_schedule
- Release date: (July, 31 2024)
- Supported Terraform version: v1.x
-
PR #473 Removed unsupported attributes
microtenant_id
andmicrotenant_name
fromzpa_application_segment_inspection
resource and data source. ~> NOTE Although that's a safe change, it may cause a temporary drift in order to update the statefile. Microtenant is not currently supported for Inspection Application Segments -
PR #473 Added missing
microtenant_id
attribute to nested blockcommon_apps_dto.apps_config
in the resource and data sourcezpa_application_segment_pra
. ~> NOTE Although that's a safe change, it may cause a temporary drift in order to update the statefile. -
PR #473 Added missing
microtenant_id
attribute to nested blockclientless_apps
in the resource and data sourcezpa_application_segment_browser_access
. ~> NOTE Although that's a safe change, it may cause a temporary drift in order to update the statefile. -
PR #473 Fixed drift related to common flattening and expand functions for all v2 Access policy resources. ~> NOTE This fix does not affect existing configurations using the
v2
policy type.
- PR #473 Added documentation examples for the following resources and datasources:
zpa_service_edge_assistant_schedule
zpa_policy_credential_rule
- Release date: (July, 24 2024)
- Supported Terraform version: v1.x
- PR #473 Fixed drift issues with the following resources:
zpa_inspection_profile
zpa_policy_access_inspection_rule_v2
zpa_pra_approval
- PR #473 Added documentation for the following resource:
zpa_policy_redirection_rule
- Release date: (July, 11 2024)
- Supported Terraform version: v1.x
- PR #471 The following attributes are not deprecated:
zpa_application_segment_browser_access
:cname
,hidden
,local_name
,path
zpa_application_segment_pra
:cname
,segment_group_name
- PR #471 Fixed
zpa_application_segment_inspection
drift issues withincommon_apps_dto
andtcp_port_range
- PR #471 Fixed
zpa_inspection_custom_controls
drift issuesprotocol_type
attribute - PR #471 Fixed
zpa_inspection_custom_controls
import issues.
-
PR #471 Added new attributes to
zpa_cloud_browser_isolation_external_profile
:-
flattened_pdf
- Enable to allow downloading of flattened files from isolation container to your local computer.NOTE
flattened_pdf
must be set tofalse
whenupload_download
is set toall
-
-
security_controls
- The CBI security controls enabled for the profile-
copy_paste:
- Enable or disable copy & paste for local computer to isolation. Supported values are:none
orall
-
document_viewer:
- Enable or disable to view Microsoft Office files in isolation. -
local_render:
- Enables non-isolated hyperlinks to be opened on the user's native browser. -
upload_download
- Enable or disable file transfer from local computer to isolation. Supported values are:none
,all
,upstream
NOTE
upload_download
must be set tonone
orupstream
whenflattened_pdf
is set totrue
-
deep_link:
- Enter applications that are allowed to launch outside of the Isolation sessionenabled:
- Enable or disable to view Microsoft Office files in isolation.applications:
- List of deep link applications
-
watermark:
- Enable to display a custom watermark on isolated web pages.enabled:
- Enable to display a custom watermark on isolated web pages.show_user_id:
- Display the user ID on watermark isolated web pages.show_timestamp:
- Display the timestamp on watermark isolated web pages.show_message:
- Enable custom message on watermark isolated web pages.message:
- Display custom message on watermark isolated web pages.
-
-
user_experience
- The CBI security controls enabled for the profileforward_to_zia:
- Enable to forward non-ZPA Internet traffic via ZIA.enabled:
- Enable to forward non-ZPA Internet traffic via ZIA.organization_id:
- Use the ZIA organization ID from the Company Profile section.cloud_name:
- The ZIA cloud name on which the organization exists i.ezscalertwo
pac_file_url:
- Enable to have the PAC file be configured on the Isolated browser to forward traffic via ZIA.
-
debug_mode
- Enable to allow starting isolation sessions in debug mode to collect troubleshooting information.allowed:
- Enable to allow starting isolation sessions in debug mode to collect troubleshooting information.file_password:
- Set an optional password to debug files when this mode is enabled.
- Release date: (June, 14 2024)
- Supported Terraform version: v1.x
- PR #464 Upgraded to Zscaler-SDK-GO. The upgrade supports easier ZPA API Client instantiation for existing and new resources.
- PR #464 Upgraded
releaser.yml
to GoReleaser v6
- Release date: (May, 31 2024)
- Supported Terraform version: v1.x
Upgraded to Zscaler SDK GO v2.5.31 to address new ZPA error handling to retry on new 400
and 409
error format message:
"id" : "api.concurrent.access.error",
"reason" : "Unable to modify the resource due to concurrent change requests. Try again"
- Release date: (May, 24 2024)
- Supported Terraform version: v1.x
- PR #459 Fixed panic issue with attribute
trusted_networks
within the resourcezpa_service_edge_group
.
- Release date: (May, 18 2024)
- Supported Terraform version: v1.x
- PR #455 Added new data source
zpa_application_segment_by_type
. The data source allows for querying of application segments by type. Theapplication_type
attribute supports the following values:BROWSER_ACCESS
,INSPECT
, andSECURE_REMOTE_ACCESS
- PR #455 Fixed resource
zpa_service_edge_group
due to misconfiguration in the importing function.
- PR #454 - Added Support to arbitrary clouds for testing purposes
- Release date: (May, 18 2024)
- Supported Terraform version: v1.x
- PR #455 Added new data source
zpa_application_segment_by_type
. The data source allows for querying of application segments by type. Theapplication_type
attribute supports the following values:BROWSER_ACCESS
,INSPECT
, andSECURE_REMOTE_ACCESS
- PR #455 Fixed resource
zpa_service_edge_group
due to misconfiguration in the importing function.
- PR #454 - Added Support to arbitrary clouds for testing purposes
- Release date: (May, 18 2024)
- Supported Terraform version: v1.x
- PR #455 Added new data source
zpa_application_segment_by_type
. The data source allows for querying of application segments by type. Theapplication_type
attribute supports the following values:BROWSER_ACCESS
,INSPECT
, andSECURE_REMOTE_ACCESS
- PR #455 Fixed resource
zpa_service_edge_group
due to misconfiguration in the importing function.
- PR #454 - Added Support to arbitrary clouds for testing purposes
- Release date: (May, 17 2024)
- Supported Terraform version: v1.x
- PR #455 Added new data source
zpa_application_segment_by_type
. The data source allows for querying of application segments by type. Theapplication_type
attribute supports the following values:BROWSER_ACCESS
,INSPECT
, andSECURE_REMOTE_ACCESS
- PR #455 Fixed resource
zpa_service_edge_group
due to misconfiguration in the importing function.
- PR #454 - Added Support to arbitrary clouds for testing purposes
- Release date: (May, 3 2024)
- Supported Terraform version: v1.x
- PR #449 - Added
CodeCov
Support to GitHub Workflow
- PR #450 - Implemented additional validation within the resource
zpa_policy_access_rule_reorder
to ensure it accounts for the potential existence of theZscaler Deception
rule. Zscaler API Documentation for further details.
- PR #450 - The resource
zpa_service_edge_group
now supports the following new attributes:grace_distance_enabled
: Allows ZPA Private Service Edge Groups within the specified distance to be prioritized over a closer ZPA Public Service Edge.grace_distance_value
: Indicates the maximum distance in miles or kilometers to ZPA Private Service Edge groups that would override a ZPA Public Service Edge.grace_distance_value_unit
: Indicates the grace distance unit of measure in miles or kilometers. This value is only required ifgrace_distance_enabled
is set to true. Support values are:MILES
andKMS
- PR #450 - Updated documentation for
zpa_policy_access_rule_reorder
by removing deprecatedpolicy_set_id
attribute from the resource. Only thepolicy_type
is required.
- PR #450 - Updated documentation for
zpa_service_edge_group
by including detailed description of the new attributes:grace_distance_enabled
,grace_distance_value
,grace_distance_value_unit
.
- Release date: (April, 8 2024)
- Supported Terraform version: v1.x
-
PR #442 - Fixed
zpa_ba_certificate
resource and aligned withzpa_application_segment_browser_access
certificate_id
attribute.!> WARNING: Notice that updating the
cert_blob
attribute in thezpa_ba_certificate
will trigger a full replacement of both the certificate and thezpa_application_segment_browser_access
along with any access policy the application segment may be associated with.
- Release date: (April, 3 2024)
- Supported Terraform version: v1.x
- New datasource:
zpa_pra_approval_controller
retrieve Privileged Remote Access Approval PR #432 - New resource:
zpa_pra_approval_controller
manages Privileged Remote Access Approval PR #432 - New datasource:
zpa_pra_portal_controller
retrieve Privileged Remote Access Portal PR #432 - New resource:
zpa_pra_portal_controller
manages Privileged Remote Access Portal PR #432 - New datasource:
zpa_pra_credential_controller
retrieve Privileged Remote Access Credential PR #432 - New resource:
zpa_pra_credential_controller
manages Privileged Remote Access Credential PR #432 - New datasource:
zpa_pra_console_controller
retrieve Privileged Remote Access Console PR #432 - New resource:
zpa_pra_console_controller
manages Privileged Remote Access Console PR #432 - New Resources: Introduced new Policy Access resources that are managed via a new
v2
API endpoint:-
zpa_policy_access_rule_v2
manages access policy rule viav2
API endpoint PR #432 -
zpa_policy_forwarding_rule_v2
manages access policy forwarding rule viav2
API endpoint PR #432 -
zpa_policy_isolation_rule_v2
manages access policy isolation rule viav2
API endpoint PR #432 -
zpa_policy_inspection_rule_v2
manages access policy inspection rule viav2
API endpoint PR #432 -
zpa_policy_timeout_rule_v2
manages access policy timeout rule viav2
API endpoint PR #432 -
zpa_policy_redirection_rule
manages redirection access policy viav2
API endpoint PR #432 -
zpa_policy_credential_rule
manages access policy credential rule viav2
API endpoint PR #432 -
zpa_policy_capabilities_rule
manages access policy capabilities rule viav2
API endpoint PR #432⚠️ WARNING:: Notice that any Access Policyv2
is a new resource and uses a different HCL format structure. If you decide to migrate to the new v2 resources, notice that this is considered a breaking change and must be done carefully. This warning only applies for those with existingv1
Access Policy HCL format structure.
-
- New resource:
zpa_emergency_access_user
manages Emergency Access Users
- New Properties: The resource
zpa_ba_certificate
now displays the attributesvalid_from_in_epochsec
andvalid_to_in_epochsec
in human readableRFC1123
format - New Properties: The provider now includes support to
ZPATWO
cloud PR #432
- Deprecated attribute: The attributes
policy_migrated
andtcp_keep_alive_enabled
are now deprecated for the resourcezpa_segment_group
. For the attributetcp_keep_alive_enabled
use the attributetcp_keep_alive
within the resourcezpa_application_segment
", PR #432. - Deprecated attribute: The attributes
negated
within all access policy rule resource types. PR #432. - Deprecated attribute: The attributes
rule_order
within all access policy rule resource types. Please use the newly dedicated resourcezpa_policy_access_rule_reorder
PR #432.
- Attribute
policy_set_id
is now optional across all access policy rule resourcesv1
andv2
. The provider will automatically set thepolicy_set_id
according to the policy access resource being configured. This improvement removes the need to explicitly use the data sourcezpa_policy_type
PR #432 - Added new
match_style
attribute to thezpa_application_segment
resource PR #432. Issue #424. To learn more about this attribute visit Zscaler Help Portal - Update
zpa_ba_certificate
documentation PR #432 - Several ACC tests maintenance PR #432
- Release date: (February, 28 2024)
- Supported Terraform version: v1.x
- PR #423 - Fixed drift issue within
zpa_application_segment_pra
resource
- Release date: (January, 17 2024)
- Supported Terraform version: v1.x
- PR #394 - ✨ Added support for ZPA Certificate provisioning
- PR #405 - ✨ Added support for ZPA Assistant Schedule feature to configures Auto Delete for the specified disconnected App Connectors.
- PR #389 - ✨ Added support to New ZPA Bulk Reorder Policy Rule
- PR #391 - Removed
enrollment_cert_name
computed attribute from provisioning key resource
- Release date: (November, xx 2023)
- Supported Terraform version: v1.x
- PR #388 - Updated provider to zscaler-sdk-go v2.1.6 to support ZPA SCIM Group SortOrder and SortBy search criteria option
- PR #389 - Added support for new ZPA Access Policy Bulk Reorder Endpoint
- Release date: (November, 6 2023)
- Supported Terraform version: v1.x
- PR #385 - Fixed
microtenant_id
attribute for all access policy types.⚠️ WARNING:: The attributemicrotenant_id
is optional and requires the microtenant license and feature flag enabled for the respective tenant. The provider also supports the microtenant ID configuration via the environment variableZPA_MICROTENANT_ID
which is the recommended method. - PR #383 - Fixed issues with hard-coded authentication within the provider block.
- Release date: (October, 27 2023)
- Supported Terraform version: v1.x
- PR #375 - Fixed drift issues in
zpa_application_segment_pra
andzpa_application_segment_inspection
when setting upapps_config
options. - PR #375 - Upgrade to Zscaler-SDK-GO v2.1.3. The upgrade allows searches for resources in which the name include 1 or more spaces.
- PR #380 - Fixed provider authentication to accept
ZPA_CLOUD
via environment variables. - PR #381 - Included and fixed additional acceptance test cases for several resources and datasources
- Release date: (September, 30 2023)
- Supported Terraform version: v1.x
- PR #374 - Resource
zpa_lss_config_controller
now supports ability to configure granular access policies via the embbededpolicy_type
SIEM_POLICY
.
- PR #372 - Provider HTTP Header now includes enhanced
User-Agent
information for troubleshooting assistance.- i.e
User-Agent: (darwin arm64) Terraform/1.5.5 Provider/3.0.2 CustomerID/xxxxxxxxxxxxxxx
- i.e
- Release date: (September, 21 2023)
- Supported Terraform version: v1.x
-
PR #369 - Added fix to resource
zpa_policy_access_rule_reorder
to support multiple policy types. The reorder operation is now supported for the following policy types:ACCESS_POLICY or GLOBAL_POLICY
TIMEOUT_POLICY or REAUTH_POLICY
BYPASS_POLICY or CLIENT_FORWARDING_POLICY
INSPECTION_POLICY
ISOLATION_POLICY
CREDENTIAL_POLICY
CAPABILITIES_POLICY
CLIENTLESS_SESSION_PROTECTION_POLICY
-
PR #371 - Fixed
object_type
validation for all supported policy types.
- Release date: (September, 18 2023)
- Supported Terraform version: v1.x
- PR #355 - Introduced the new resource and datasource
zpa_microtenant_controller
- PR #355 - Added support to the new Microtenant Controller feature to the following resources:
zpa_app_connector_controller
,,zpa_app_connector_group
,zpa_application_segment
,zpa_application_segment_browser_access
,zpa_application_segment_inspection
,zpa_application_segment_pra
,zpa_application_server
,zpa_policy_type
,zpa_policy_access_rule
,zpa_policy_access_forwarding_rule
,zpa_policy_access_timeout_rule
,zpa_policy_access_inspection_rule
,zpa_policy_access_isolation_rule
,zpa_segment_group
,zpa_server_group
,zpa_provisioning_key
,zpa_machine_group
,zpa_service_edge_group
,zpa_service_edge_controller
microtenant_id
is optional. The provider also supports the microtenant ID configuration via the environment variable ZPA_MICROTENANT_ID
which is the recommended method.
-
PR #356 - Added support to the following new ZPA Cloud Browser Isolation resources and datasources:
-
Resources
zpa_cloud_browser_isolation_banner
- Cloud Browser Isolation Banner Controllerzpa_cloud_browser_isolation_certificate
- Cloud Browser Isolation Certificate Controllerzpa_cloud_browser_isolation_external_profile
- Cloud Browser Isolation External Profile Controller
-
Data Sources
zpa_cloud_browser_isolation_banner
- Cloud Browser Isolation Banner Controllerzpa_cloud_browser_isolation_certificate
- Cloud Browser Isolation Certificate Controllerzpa_cloud_browser_isolation_external_profile
- Cloud Browser Isolation External Profile Controllerzpa_cloud_browser_isolation_region
- Cloud Browser Isolation Regionszpa_cloud_browser_isolation_zpa_profile
- Cloud Browser Isolation ZPA Profile
⚠️ WARNING:: Cloud Browser Isolation (CBI) is a licensed feature flag. Please contact your local account team for details. -
PR #363 - Added support for
COUNTRY_CODE
object type within thezpa_policy_access_rule
resource. The provider validates the use of proper 2 letter country codes ISO3166 By Alpha2Code - Issue #361 -
PR #366 - Added ISO3166 Alpha2Code for
country_code
validation onzpa_app_connector_groups
andzpa_service_edge_group
resources
- Release date: (August, 18 2023)
- Supported Terraform version: v1.x
rule_order
is now deprecated in favor of this resource for all ZPA policy types.
- Release date: (August, 18 2023)
- Supported Terraform version: v1.x
rule_order
is now deprecated in favor of this resource for all ZPA policy types.
- Release date: (August, 17 2023)
- Supported Terraform version: v1.x
rule_order
is now deprecated in favor of this resource for all ZPA policy types.
- Release date: (August, 17 2023)
- Supported Terraform version: v1.x
- PR #345
zpa_policy_access_rule_reorder
Added check to preventorder <= 0
zpa_policy_access_rule_reorder
Added check to prevent non-contigous (gaps) in rule order numberszpa_policy_access_rule_reorder
Added check to prevent rule order number to be greater than the total number of rules being configured.
rule_order
is now deprecated in favor of this resource for all ZPA policy types.
- Release date: (August, 16 2023)
- Supported Terraform version: v1.x
- PR #344
- Implemented a new resource
zpa_policy_access_rule_reorder
to support Access policy rule reorder in a more efficient way.
- Implemented a new resource
rule_order
is now deprecated in favor of this resource for all ZPA policy types.
- Release date: (August, 13 2023)
- Supported Terraform version: v1.x
- PR #340
- Implemented a new resource
zpa_policy_access_rule_reorder
to support Access policy rule reorder in a more efficient way.
- Implemented a new resource
rule_order
is now deprecated in favor of this resource for all ZPA policy types.
- Release date: (August, 1 2023)
- Supported Terraform version: v1.x
- Release date: (July, 5 2023)
- Supported Terraform version: v1.x
- PR #325 - Added new attribute
waf_disabled
to resourcezpa_app_connector_group
- PR #326 - Added support to ZPA
QA
environment
- PR #319 - Fixed links to Zenith Community demo videos in the documentation
- PR #321 - Fixed resource
zpa_server_group
due to panic when set attributedynamic_discovery
to false. - PR #323 - Fixed attribute
server_groups
in allzpa_application_segment
resources due to server group ID reorder, which caused drift behavior. Issue #322
- Release date: (June, 10 2023)
- Supported Terraform version: v1.x
- Updated to Zscaler-SDK-GO v1.5.5. The update improves search mechanisms for ZPA resources, to ensure streamline upstream GET API requests and responses using
search
parameter. Notice that not all current API endpoints support the search parameter, in which case, all resources will be returned.
- Release date: (June, 3 2023)
- Supported Terraform version: v1.x
- PR #311 Fixed ZPA resource
Service Edge Group
andService Edge Controller
Struct to support attributepublish_ips
. - PR #314 Fixed
rhs
attribute within theGetPolicyConditionsSchema
function to prevent invalid new value inconsistency issue.
- Release date: (May, 23 2023)
- Supported Terraform version: v1.x
- PR #309 Updated provider to Zscaler SDK GO v1.5.2. The update added exception handling within the ZPA API Client to deal with simultaneous DB requests, which were affecting the ZPA Policy Access rule order creation.
zpa_policy_access_rule
zpa_policy_inspection_rule
zpa_policy_timeout_rule
zpa_policy_forwarding_rule
zpa_policy_isolation_rule
Terraform uses goroutines to speed up deployment, but the number of parallel operations it launches exceeds what is recommended. When configuring ZPA Policies we recommend to limit the number of concurrent API calls to ONE. This limit ensures that there is no performance impact during the provisioning of large Terraform configurations.
This recommendation applies to the following resources:
zpa_policy_access_rule
zpa_policy_inspection_rule
zpa_policy_timeout_rule
zpa_policy_forwarding_rule
zpa_policy_isolation_rule
In order to accomplish this, make sure you set the parallelism value at or below this limit to prevent performance impacts.
- Release date: (May, 20 2023)
- Supported Terraform version: v1.x
- PR #306 Fix resource
zpa_policy_forwarding_rule
to ensure updates are executed during resource rule modifications. - PR #307 Fix resource
zpa_policy_timeout_rule
to ensure updates are executed during resource rule modifications. - PR #308 Fix the following access rule resources to ensure updates are executed during resource rule modifications:
zpa_policy_inspection_rule
zpa_policy_isolation_rule
- Release date: (May, 18 2023)
- Supported Terraform version: v1.x
- PR #304 Fix attribute
select_connector_close_to_app
by setting schema attribute toForceNew
across all application segments to ensure proper resource update when UDP port is set andselect
_connector_close_to_app`` is switched to false.
- Release date: (May, 13 2023)
- Supported Terraform version: v1.x
- PR #301 Improve scim values searching
- Release date: (May, 11 2023)
- Supported Terraform version: v1.x
- PR #298 Fixed issue with empty IDs in the resource
zpa_service_edge_groups
- PR #298 Fix Service Edge Group Trusted Networks for resource
zpa_service_edge_groups
- Release date: (April, 28 2023)
- Supported Terraform version: v1.x
- PR #285 Allow empty server group attribute in
server_group
attribute within an application segment - PR #291 Added function to support detaching objects from all policy types prior to destroy operation.
- PR #292 Added validation to application segments on attributes
select_closest_app_connector
to ensure no UDP port configuration is submitted. By default only TCP ports are supported when this attribute is set totrue
.
- Release date: (April, 11 2023)
- Supported Terraform version: v1.x
- PR #279 Update to Zscaler-SDK-GO 1.4.0 to support long Terraform runs and improve exponential backoff mechanism.
- PR #280 Added function to support detaching objects from all policy types prior to destroy operation.
- PR #281 Fixed browser access acceptance test to prevent port overlap and lingering resources
- PR #285 Make
server_group
attribute in the application segment optional to support UI behavior Issue#283
zpa_application_segment
resource, the Provider no longer performs pre-check on port overlaps. For this reason, we advise that Terraform configuration is checked properly during coding to ensure application segments with the same domain and ports are not conflicting. The port overlap pre-check remains in place for all other application segment types.
- Release date: (March, 23 2023)
- Supported Terraform version: v1.x
-
PR #272 The ZPA Terraform Provider API Client, will now support long runs, that exceeds the 3600 seconds token validity. Terraform will automatically request a new API bearer token at that time in order to continue the resource provisioning. This enhacement will prevent long pipeline runs from being interrupted.
-
PR #272 Update provider to Zscaler-SDK-GO v1.3.0
-
PR #272 The SDK now supports authentication to ZPA DEV environment.
-
PR #271 Added deprecate message to
zpa_segment_group
under the following attributes:policy_migrated
: "Thepolicy_migrated
field is now deprecated for the resourcezpa_segment_group
, please remove this attribute to prevent configuration drifts"tcp_keep_alive_enabled
: "Thetcp_keep_alive_enabled
field is now deprecated for the resourcezpa_segment_group
, please replace all uses of this within thezpa_application_segment
resources with the attributetcp_keep_alive
".
Both the above attributes can be safely removed without impact to production configuration; however, they are still supported for backwards compatibity purposes. #270
- Release date: (March, 20 2023)
- Supported Terraform version: v1.x
-
PR #268 Fixed provider crashing when flattening IDP controller user metadata function Issue #267
-
PR #268 Added new ZPA IDP Controller attributes to data source. The following new attributes have been added:
login_hint
force_auth
enable_arbitrary_auth_domains
- Release date: (March, 19 2023)
- Supported Terraform version: v1.x
- PR #262 SCIM Group Search Pagination Issue affecting the following resource:
zpa_scim_groups
- Release date: (March, 19 2023)
- Supported Terraform version: v1.x
- PR #262 SCIM Group Search Pagination Issue affecting the following resource:
zpa_scim_groups
- Release date: (March, 16 2023)
- Supported Terraform version: v1.x
- PR #263 (fix) Added missing new object_type
PLATFORM
validation for access policy resources
- Release date: (March, 7 2023)
- Supported Terraform version: v1.x
- PR #257 Added the new ZPA Application Segment attributes for the following resources:
-
zpa_application_segment
,zpa_application_segment_browser_access
,zpa_application_segment_inspection
,zpa_application_segment_pra
tcp_keep_alive
is_incomplete_dr_config
use_in_dr_mode
select_connector_close_to_app
-
zpa_app_connector_group
use_in_dr_mode
-
- Release date: (March, 1 2023)
- Supported Terraform version: v1.x
- Release date: (February, 15 2023)
- Supported Terraform version: v1.x
- PR #242 - Added new data source and resources below:
zpa_isolation_profile
- This data source gets all isolation profiles for the specified customer. The Isolation Profile ID can then be referenced in azpa_policy_isolation_rule
when theaction
is set toISOLATE
zpa_policy_isolation_rule
- This resource, creates an Isolation Rule. Notice that in order to create an isolation policy the ZPA tenant must be licensed accordingly.zpa_policy_isolation_rule
when theaction
is set toISOLATE
- PR #244 - Fixed
zpa_server_groups
resourceservers
attribute to support typeSet instead of typeList. - PR #244 - Fixed
zpa_app_connector_group
resourceconnectors
attribute to support typeSet instead of typeList.
- Release date: (February, 15 2023)
- Supported Terraform version: v1.x
- PR #242 - Added new data source and resources below:
zpa_isolation_profile
- This data source gets all isolation profiles for the specified customer. The Isolation Profile ID can then be referenced in azpa_policy_isolation_rule
when theaction
is set toISOLATE
zpa_policy_isolation_rule
- This resource, creates an Isolation Rule. Notice that in order to create an isolation policy the ZPA tenant must be licensed accordingly.zpa_policy_isolation_rule
when theaction
is set toISOLATE
- PR #244 - Fixed
zpa_server_groups
resourceservers
attribute to support typeSet instead of typeList. - PR #244 - Fixed
zpa_app_connector_group
resourceconnectors
attribute to support typeSet instead of typeList.
- Release date: (January, 24 2023)
- Supported Terraform version: v1.x
- PR #238 - Added new log_type (
zpn_pbroker_comprehensive_stats
) attribute tozpa_lss_config_log_type_formats
andzpa_lss_config_controller
.
- Release date: (January, 16 2023)
- Supported Terraform version: v1.x
-
PR #232 - Added new ZPA Inspection control parameters
- ZPA Inspection Profile:
web_socket_controls
- ZPA Custom Inspection Control:
-
control_type
: The following values are supported:WEBSOCKET_PREDEFINED
,WEBSOCKET_CUSTOM
,ZSCALER
,CUSTOM
,PREDEFINED
-
protocol_type
: The following values are supported:HTTP
,WEBSOCKET_CUSTOM
,ZSCALER
,CUSTOM
,PREDEFINED
-
- ZPA Inspection Profile:
- PR #234 - Removed Segment Group detachment function, so it can use the new
force_delete
parameter when removing application segments from a segment group.
- Release date: (January, 2 2023)
- Supported Terraform version: v1.x
- PR #224 Implemented longitude/latitude math function validation for more accurancy when configuring
zpa_app_connector_group
resources.
- Release date: (December, 02 2022)
- Supported Terraform version: v1.x
- PR #223 Fixed pagination issue with ZPA endpoints
- Release date: (November, 30 2022)
- Supported Terraform version: v1.x
- PR #219 Added ForceNew helper to
zpa_policy_timeout_rule
parametersreauth_idle_timeout
andreauth_timeout
. Changing the values will cause the resource to be recreated on the fly. - PR #219 Added missing
ip_anchored
parameter toresource_zpa_application_segment_browser_access
- PR #220 Udated provider to Zscaler-SDK-Go v0.3.2 to ensure pagination works correctly when more than 500 items on a list.
- Release date: (November, 30 2022)
- Supported Terraform version: v1.x
- PR #217 Fixed Read/Update/Delete functions to allow automatic recreation of resources, that have been manually deleted via the UI.
- PR #217 Updated provider to zscaler-sdk-go v0.2.2
- Release date: (November 9 2022)
- Supported Terraform version: v1.x
- PR #208 - Implemented TCP/UDP Port overlap check and duplicated domain validation for
zpa_application_segment_browser_access
- PR #209 - Implemented TCP/UDP Port overlap check and duplicated domain validation for
zpa_application_segment_pra
. - PR #210 - Implemented TCP/UDP Port overlap check and duplicated domain validation for
zpa_application_segment_inspection
.
-
PR #206 - Fix TCP/UDP port overlap check issue
-
PR #207 - Fix duplicated domain_name entries during TCP/UDP port overlap issues
- Release date: (October 24 2022)
- Supported Terraform version: v1.x
- PR #188 - feat(new parameters added to App Connector Group resource TCPQuick*
- The following new App Connector Group parameters have been added:
- tcpQuickAckApp - Whether TCP Quick Acknowledgement is enabled or disabled for the application.
- tcpQuickAckAssistant - Whether TCP Quick Acknowledgement is enabled or disabled for the application.
- tcpQuickAckReadAssistant - Whether TCP Quick Acknowledgement is enabled or disabled for the application.
- UseInDrMode
- PR #188 - Upgrade to zscaler-sdk-go v0.0.12 to support new App Connector Group parameters
TCPQuick*
andUseInDrMode
- PR #190 - Added ZPA Terraform Provider Video Series link in the documentation, leading to Zenith Community Portal
- PR #194 - Updated Provider to Zscaler-SDK-GO v0.1.1
- PR #196 - Renamed
zpa_browser_access
resource and data source tozpa_application_segment_browser_access
for better distinction with other application segment resources. The use of the previous resource name is still supported; however, a warning message will be displayed after the apply process to inform about the change. - PR #196 - Fixed
zpa_application_segment_browser_access
clientless_apps
inner parameters, which were not being updated during PUT method. - PR #197 - Updated
zpa_service_edge_group
parameteris_public
to accept a value of Bool (true or false) instead of the current String values of (DEFAULT, TRUE or FALSE) for easier configuration. The Provider will convert the input value to string during run-time. - PR #201 - Added
zpa_app_connector_controller
resource to allow app connector resource management and bulk delete action for app connector deproviosioning. - PR #202 - Included validation function in the
zpa_app_connector_group
resource for the parametersversion_profile_name
andversion_profile_id
. Users can now useversion_profile_name
with one of the following values:Default
,Previous Default
,New Release
- PR #181 - Added Support to ZPA Preview Cloud and updated to zscaler-sdk-go v0.0.9
- PR #193 - Fixed rule order in access policies, when Zscaler Deception rule exists.
- PR #198 - Due to Golang update the function
ConfigureFunc
used to configure the provider was deprecated; hence, the ZPA Terraform Provider was updated to use theConfigureContextFunc
instead. - PR #199 - Fix application segment tcp/udp port conflict. The provider will issue an error message when 2 application segments have conflicting domain_name, tcp/udp ports
- PR #200 - Implemented new application segment parameter
force_delete
to ensure dependency removal prior to delete action.
- Release date: (September 2 2022)
- Supported Terraform version: v1.x
Fixed authentication issue when specifying zpa_cloud="PRODUCTION"
- Release date: (August 30 2022)
- Supported Terraform version: v1.x
- PR #169 Fixed policy rule order, where the rule order in the UI didn't correspond to the desired order set in HCL. Issue [#166]
- PR #170 Fixed special character encoding, where certain symbols caused Terraform to indicate potential configuration drifts. Issue [#149]
- PR #171 Fixed policy configuration attributes where i.e SCIM_GROUPs were causing drifts without changes have been performed. Issue [#165]
- PR #175 Fixed application segment drifts caused by tcp & udp ports.
- PR #176 Fixed application segment PRA drifts caused by tcp & udp ports.
- PR #177 Fixed application segment Inspection drifts caused by tcp & udp ports.
- Release date: (August 17 2022)
- Supported Terraform version: v1.x
- PR #161 Integrated newly created Zscaler GO SDK. Models are now centralized in the repository zscaler-sdk-go
- Release date: (July 19 2022)
- Supported Terraform version: v1.x
- PR #159 Added Terraform UserAgent for Backend API tracking
- Release date: (July 6 2022)
- Supported Terraform version: v1.x
- Fix: Fixed authentication mechanism variables for ZPA Beta and GOV
- Fixed application segment documentation and examples
- Supported Terraform version: v1.x
- The provider now supports the following ZPA Privileged Remote Access (PRA) features:
zpa_application_segment_pra - The resource supports enabling SECURE_REMOTE_ACCESS
for RDP and SSH via the app_types
parameter. PR #133
-
The provider now supports the following ZPA Inspection features: zpa_inspection_custom_controls PR#134 zpa_inpection_predefined_controls PR#134 zpa_inspection_profile PR#134 zpa_policy_access_inspection_rule PR#134 zpa_application_segment_inspection - The resource supports enabling
INSPECT
for HTTP and HTTPS via theapp_types
parameter. PR #135 -
Implemented a new Application Segment resource parameter
select_connector_close_to_app
. The parameter can only be set for TCP based applications. PR #137
-
Added support to
scim_attribute_header
to support policy access SCIM criteria based on SCIM attribute values. Issue #146 / PR #147 -
ZPA Beta Cloud: The provider now supports authentication via environment variables or static credentials to ZPA Beta Cloud. For authentication instructions please refer to the documentation page here PR #136
-
ZPA Gov Cloud: The provider now supports authentication via environment variables or static credentials to ZPA Gov Cloud. For authentication instructions please refer to the documentation page here PR #145
- Fix: Fixed update function on zpa_app_server_controller resource to ensure desired state is enforced in the upstream resource. Issue #128
- Fix: Fixed Golangci linter
- Added release notes guide to documentation PR #140
- Fixed documentation misspellings
- Supported Terraform version: v1.x
The Terraform Provider for Zscaler Private Access (ZPA) is now officially hosted under Zscaler's GitHub account and published in the Terraform Registry. For more details, visit the Zscaler Community Article Here Administrators who used previous versions of the provider, and followed instructions to install the binary as a custom provider, must update their provider block as such:
terraform {
required_providers {
zpa = {
source = "zscaler/zpa"
version = "2.1.5"
}
}
}
provider "zpa" {}
- Documentation: Updated documentation to comply with Terraform registry formatting. #125
zpa_posture_profile
Updated search mechanism to support posture profile name search without the Zscaler cloud name. PR #123zpa_trusted_network
Updated search mechanism to support trusted network name search without the Zscaler cloud name. PR #123
- Fixed
zpa_application_segment
to support updates ontcp_port_ranges
,udp_port_ranges
andtcp_port_range
,udp_port_range
Issue #103
- Supported Terraform version: v1.x
The Terraform Provider for Zscaler Private Access (ZPA) is now officially hosted under Zscaler's GitHub account and published in the Terraform Registry. For more details, visit the Zscaler Community Article Here Administrators who used previous versions of the provider, and followed instructions to install the binary as a custom provider, must update their provider block as such:
terraform {
required_providers {
zpa = {
source = "zscaler/zpa"
version = "2.1.3"
}
}
}
provider "zpa" {}
- Supported Terraform version: v1.x
- Fix: tcp and udp ports were not being updated during changes, requiring the application segment resource to be fully destroyed and rebuilt. Implemented
ForceNew
in the thezpa_application_segment
resource parameters:tcp_port_range
,udp_port_range
,tcp_port_ranges
,udp_port_ranges
. This behavior instructs Terraform to first destroy and then recreate the resource if any of the attributes change in the configuration, as opposed to trying to update the existing resource. The destruction of the resource does not impact attached resources such as server groups, segment groups or policies.
- Supported Terraform version: v1.x
-
Refactored and added new acceptance tests for better statement coverage. These tests are considered best practice and were added to routinely verify that the ZPA Terraform Plugin produces the expected outcome. [PR#88], [PR#96], [PR#98], [PR#99]
-
Support explicitly empty port ranges. Allow optional use of Attributes as Blocks syntax for
zpa_application_segment
{tcp,udp}_port_range blocks, allowing clean specification of "no port ranges" in dynamic contexts. PR#97 Thanks @isometry
-
Deprecated all legacy policy set controller endpoints:
/policySet/global
,/policySet/reauth
,/policySet/bypass
PR#88 -
Deprecated all references to ZPA private API gateway. PR#87
- Supported Terraform version: v1.x
- Refactored and added new acceptance tests. These tests are considered best practice and were added to routinely verify that the ZPA Terraform Plugin produces the expected outcome. PR#xx
data_source_zpa_app_connector_controller_test
data_source_zpa_app_connector_group_test
data_source_zpa_app_server_controller_test
data_source_zpa_application_segment_test
data_source_zpa_ba_certificate_test
data_source_zpa_browser_access_test
data_source_zpa_cloud_connector_group_test
data_source_zpa_customer_version_profile_test
data_source_zpa_enrollement_cert_test
data_source_zpa_idp_controller_test
data_source_zpa_lss_config_client_types_test
data_source_zpa_lss_config_log_types_formats_test
data_source_zpa_lss_config_status_codes_test
data_source_zpa_machine_group_test
data_source_zpa_posture_profile_test
data_source_zpa_segment_group_test
data_source_zpa_server_group_test
data_source_zpa_trusted_network_test
resource_zpa_app_connector_group_test
resource_zpa_app_server_controller_test
resource_zpa_application_segment_test
resource_zpa_segment_group_test
resource_zpa_server_group_test
resource_zpa_service_edge_group_test
resource_zpa_policy_access_rule_test
resource_zpa_policy_access_timeout_rule_test
resource_zpa_policy_access_forwarding_rule_test
- Fix: Acceptance Tests for
zpa_browser_access_test
- Fix: Consolidate Policy Type resources
- Fix: Refactor ZPA API Client
- Supported Terraform version: v1.x
- ZPA-50: Fixed and removed deprecated arguments from
zpa_application_segments
data source and resource 🔧 - ZPA-50: Fixed
zpa_posture_profile
andzpa_trusted_networks
acceptance tests to include ZIA cloud name 🔧
- ZPA-51: Updated common
NetworkPorts
flatten and expand functions for better optimization and global use across multiple application segment resources. This update affects the following resources:data_source_zpa_application_segment
,data_source_zpa_browser_access
andresource_zpa_application_segment
,resource_source_zpa_browser_access
🚀
- Supported Terraform version: v1.x
- Added new data source for
zpa_app_connector_controller
resource. PR#62 - Added new data source for
zpa_service_edge_controller
resource. PR#63
These tests are considered best practice and were added to routinely verify that the ZPA Terraform Plugin produces the expected outcome. PR#64
data_source_zpa_app_connector_controller_test
data_source_zpa_app_connector_group_test
data_source_zpa_app_server_controller_test
data_source_zpa_application_segment_test
data_source_zpa_ba_certificate_test
data_source_zpa_browser_access_test
data_source_zpa_cloud_connector_group_test
data_source_zpa_customer_version_profile_test
data_source_zpa_enrollement_cert_test
data_source_zpa_idp_controller_test
data_source_zpa_lss_config_client_types_test
data_source_zpa_lss_config_log_types_formats_test
data_source_zpa_lss_config_status_codes_test
data_source_zpa_machine_group_test
data_source_zpa_posture_profile_test
data_source_zpa_segment_group_test
data_source_zpa_server_group_test
data_source_zpa_trusted_network_test
resource_zpa_app_connector_group_test
resource_zpa_app_server_controller_test
resource_zpa_application_segment_test
resource_zpa_segment_group_test
resource_zpa_server_group_test
resource_zpa_service_edge_group_test
- Supported Terraform version: v1.x
-
The provider now supports the ability to import policy access resources via its
name
and/orid
property to support easier migration of existing ZPA resources viaterraform import
command. -
The following policy access resources are supported:
-
The provider now supports policy access creation to be associated with Cloud Connector Group resource
- resource_zpa_policy_access_rule - PR#54 🚀
- Added new
client_type
to support access, forward, and timeout policy creation. The following new types have been added: - zpn_client_type_ip_anchoring, zpn_client_type_browser_isolation, zpn_client_type_machine_tunnel and zpn_client_type_edge_connector. PR#57] 🚀
-
Updated the following examples for more accuracy:
- resource_zpa_policy_access_rule
- resource_zpa_app_connector_group
- Fixed pagination issues with all resources where only the default pagesize was being returned. PR#52 🔧
- Fixed issue where Terraform showed that resources had been modified even though nothing had been changed in the upstream resources.PR#54 🔧
- Supported Terraform version: v1.x
- Added new data source for
zpa_browser_access
resource.
- The provider now supports the ability to import resources via its
name
and/orid
property to support easier migration of existing ZPA resources viaterraform import
command. This capability is currently available to the following resources: - resource_zpa_app_connector_group - Issue (#29)
- resource_zpa_app_server_controller - PR#42 🚀
- resource_zpa_application_segment - PR#42 🚀
- resource_zpa_segment_group - PR#42 🚀
- resource_zpa_server_group - PR#42 🚀
- resource_zpa_service_edge_group - PR#42 🚀
- resource_zpa_provisioning_key - PR#45 🚀
- resource_zpa_browser_access - PR#48 🚀
- zpa_lss_config_controller - PR#48 🚀
Note: To import resources not currently supported, the resource numeric ID is required.
- Fixed [INFO] and [Error] message in
data_source_zpa_lss_config_controller
PR#43 🔧
- Supported Terraform version: v1.x
- Dependabot updates PR#33 Bump github.com/hashicorp/terraform-plugin-docs from 0.5.0 to 0.5.1 #33
- Dependabot updates PR#34 Bump github.com/hashicorp/terraform-plugin-sdk/v2 from 2.8.0 to 2.9.0
- Supported Terraform version: v1.x
- Added custom validation function
ValidateStringFloatBetween
toresource_zpa_app_connector_group
to validatelongitude
andlatitude
parameters. ZPA-17. - Added custom validation function
ValidateStringFloatBetween
toresource_zpa_service_edge_group
to validatelongitude
andlatitude
parameters. ZPA-18.
- Supported Terraform version: v1.x
- Fixed issue where provider authentication parameters for hard coded credentials was not working:
- Changed the following variable names:
client_id
,client_secret
andcustomerid
tozpa_client_id
,zpa_client_secret
andzpa_customer_id
.
-
Supported Terraform version: v1.x
-
New management APIs are now available to manage App Connectors, App Connector Groups, Service Edges, Service Edge Groups, and Log Streaming Service (LSS) configurations.
-
New prerequisite APIs for enrollment certificates, provisioning keys, and to get version profiles, client types, status codes, and LSS formats are added.
-
A new API to reorder policy rules is added.
-
The endpoints to get all browser access (BA) certificates, IdPs, posture profiles, trusted networks, and SAML attributes are now deprecated, and new APIs with pagination are provided.
-
API endpoints specific to a policy (global/reauth/bypass) are deprecated and replaced by a generic API that takes policyType as a parameter.
-
The port range configuration for the application segment has been enhanced for more readability. The tcpPortRanges and udpPortRanges fields are deprecated and replaced with tcpPortRange and udpPortRange.
- New Resource:
resource_zpa_app_connector_group
🆕 - New Resource:
resource_zpa_service_edge_group
🆕 - New Resource:
resource_zpa_provisioning_key
🆕 - New Resource:
resource_zpa_lss_config_controller
🆕
- New Data Source:
data_source_zpa_enrollement_cert
🆕 - New Data Source:
data_source_zpa_customer_version_profile
🆕 - New Data Source:
data_source_zpa_lss_config_controller
🆕 - New Data Source:
data_source_zpa_lss_config_log_types_formats
🆕 - New Data Source:
data_source_zpa_lss_config_status_codes
🆕 - New Data Source:
data_source_zpa_lss_config_client_types
🆕 - New Data Source:
data_source_zpa_policy_type
🆕
- A new API to reorder policy rules is added. This update affects the following resources:
resource_zpa_policy_access_rule
🚀resource_zpa_policy_access_timeout_rule
🚀resource_zpa_policy_access_forwarding_rule
🚀
- Updated the following data sources to V2 API to support pagination:
data_source_zpa_idp_controller
🚀data_source_zpa_saml_attribute
🚀data_source_zpa_scim_attribute_header
🚀data_source_zpa_trusted_network
🚀data_source_zpa_posture_profile
🚀data_source_zpa_ba_certificate
🚀data_source_zpa_machine_group
🚀
- Added additional validations to
bypass_type
parameter inresource_zpa_browser_access
. 🚀 - The port range configuration for the application segment has been enhanced for more readability. This update affects the following resources:
resource_zpa_application_segment
🚀resource_zpa_browser_access
🚀
- API endpoints specific to a policy (global/reauth/bypass) are deprecated and replaced by a generic API that takes policyType as a parameter.
-
Deprecated
data_source_zpa_global_forwarding_policy
anddata_source_zpa_global_timeout_policy
and replaced withdata_source_zpa_policy_type
💥 -
Deprecated
data_source_zpa_global_access_policy
and renamed withdata_source_zpa_policy_type
💥 -
Deprecated
tcp_port_ranges
andudp_port_ranges
fields are deprecated and replaced withtcp_port_range
andudp_port_range
. The values will be kept in Terraform schema until next provider update for backwards compatibility. 💥
- Supported Terraform version: v1.x
- New Resource:
resource_zpa_app_server_controller
🆕 - New Resource:
resource_zpa_application_segment
🆕 - New Resource:
resource_zpa_browser_access
🆕 - New Resource:
resource_zpa_policy_access_forwarding_rule
🆕 - New Resource:
resource_zpa_policy_access_rule
🆕 - New Resource:
resource_zpa_policy_access_timeout_rule
🆕 - New Resource:
resource_zpa_segment_group
🆕 - New Resource:
resource_zpa_server_group
🆕
- New Data Source:
data_source_zpa_app_connector_group
🆕 - New Data Source:
data_source_zpa_app_server_controller
🆕 - New Data Source:
data_source_zpa_application_segment
🆕 - New Data Source:
data_source_zpa_ba_certificate
🆕 - New Data Source:
data_source_zpa_cloud_connector_group
🆕 - New Data Source:
data_source_zpa_global_access_policy
🆕 - New Data Source:
data_source_zpa_global_forwarding_policy
🆕 - New Data Source:
data_source_zpa_global_timeout_policy
🆕 - New Data Source:
data_source_zpa_idp_controller
🆕 - New Data Source:
data_source_zpa_machine_group
🆕 - New Data Source:
data_source_zpa_posture_profile
🆕 - New Data Source:
data_source_zpa_saml_attribute
🆕 - New Data Source:
data_source_zpa_scim_attribute_header
🆕 - New Data Source:
data_source_zpa_scim_group
🆕 - New Data Source:
data_source_zpa_segment_group
🆕 - New Data Source:
data_source_zpa_server_group
🆕 - New Data Source:
data_source_zpa_trusted_network
🆕