npm package discovery and stats viewer.

Discover Tips

  • General search

    [free text search, go nuts!]

  • Package details

    pkg:[package-name]

  • User packages

    @[username]

Sponsor

Optimize Toolset

I’ve always been into building performant and accessible sites, but lately I’ve been taking it extremely seriously. So much so that I’ve been building a tool to help me optimize and monitor the sites that I build to make sure that I’m making an attempt to offer the best experience to those who visit them. If you’re into performant, accessible and SEO friendly sites, you might like it too! You can check it out at Optimize Toolset.

About

Hi, 👋, I’m Ryan Hefner  and I built this site for me, and you! The goal of this site was to provide an easy way for me to check the stats on my npm packages, both for prioritizing issues and updates, and to give me a little kick in the pants to keep up on stuff.

As I was building it, I realized that I was actually using the tool to build the tool, and figured I might as well put this out there and hopefully others will find it to be a fast and useful way to search and browse npm packages as I have.

If you’re interested in other things I’m working on, follow me on Twitter or check out the open source projects I’ve been publishing on GitHub.

I am also working on a Twitter bot for this site to tweet the most popular, newest, random packages from npm. Please follow that account now and it will start sending out packages soon–ish.

Open Software & Tools

This site wouldn’t be possible without the immense generosity and tireless efforts from the people who make contributions to the world and share their work via open source initiatives. Thank you 🙏

© 2026 – Pkg Stats / Ryan Hefner

@crossplane-models/provider-upjet-azuread

v2.2.0-build.3

Published

Azure AD Provider

Readme

TypeScript Models for Crossplane Provider Upjet Azure AD

This package contains TypeScript models for the Crossplane Provider Upjet Azure AD, which provides Crossplane support for managing Azure Active Directory (Entra ID) resources.

The models are generated from the CRDs defined in the provider's package/crds directory.

Installation

NPM

npm install @crossplane-models/provider-upjet-azuread

Examples

Provider Configuration

ProviderConfig

import { dumpYaml } from "@kubernetes/client-node";
import { ProviderConfig } from "@crossplane-models/provider-upjet-azuread/azuread.upbound.io/v1beta1";

const providerConfig = new ProviderConfig({
  metadata: {
    name: "default",
  },
  spec: {
    credentials: {
      source: "Secret",
      secretRef: {
        name: "azure-creds",
        namespace: "crossplane-system",
        key: "credentials",
      },
    },
  },
});

providerConfig.validate();
console.log(dumpYaml(providerConfig));

Applications

Application

import { dumpYaml } from "@kubernetes/client-node";
import { Application } from "@crossplane-models/provider-upjet-azuread/applications.azuread.upbound.io/v1beta1";

const app = new Application({
  metadata: {
    name: "my-app",
  },
  spec: {
    forProvider: {
      displayName: "My Application",
      signInAudience: "AzureADMyOrg",
    },
  },
});

app.validate();
console.log(dumpYaml(app));

Application Certificate

import { dumpYaml } from "@kubernetes/client-node";
import { Certificate } from "@crossplane-models/provider-upjet-azuread/applications.azuread.upbound.io/v1beta1";

const appCert = new Certificate({
  metadata: {
    name: "my-app-cert",
  },
  spec: {
    forProvider: {
      applicationIdSelector: {
        matchLabels: {
          app: "my-app",
        },
      },
      type: "AsymmetricX509Cert",
      valueSecretRef: {
        name: "app-cert",
        namespace: "default",
        key: "certificate",
      },
    },
  },
});

appCert.validate();
console.log(dumpYaml(appCert));

Application Password

import { dumpYaml } from "@kubernetes/client-node";
import { Password } from "@crossplane-models/provider-upjet-azuread/applications.azuread.upbound.io/v1beta1";

const appPassword = new Password({
  metadata: {
    name: "my-app-password",
  },
  spec: {
    forProvider: {
      applicationIdSelector: {
        matchLabels: {
          app: "my-app",
        },
      },
      displayName: "My App Password",
    },
    writeConnectionSecretToRef: {
      name: "app-password",
      namespace: "default",
    },
  },
});

appPassword.validate();
console.log(dumpYaml(appPassword));

Federated Identity Credential

import { dumpYaml } from "@kubernetes/client-node";
import { FederatedIdentityCredential } from "@crossplane-models/provider-upjet-azuread/applications.azuread.upbound.io/v1beta1";

const fedCred = new FederatedIdentityCredential({
  metadata: {
    name: "github-federation",
  },
  spec: {
    forProvider: {
      applicationIdSelector: {
        matchLabels: {
          app: "my-app",
        },
      },
      displayName: "GitHub Actions Federation",
      audiences: ["api://AzureADTokenExchange"],
      issuer: "https://token.actions.githubusercontent.com",
      subject: "repo:my-org/my-repo:ref:refs/heads/main",
    },
  },
});

fedCred.validate();
console.log(dumpYaml(fedCred));

Service Principals

Service Principal

import { dumpYaml } from "@kubernetes/client-node";
import { Principal } from "@crossplane-models/provider-upjet-azuread/serviceprincipals.azuread.upbound.io/v1beta1";

const sp = new Principal({
  metadata: {
    name: "my-service-principal",
  },
  spec: {
    forProvider: {
      clientIdSelector: {
        matchLabels: {
          app: "my-app",
        },
      },
      appRoleAssignmentRequired: false,
    },
  },
});

sp.validate();
console.log(dumpYaml(sp));

Service Principal Password

import { dumpYaml } from "@kubernetes/client-node";
import { Password } from "@crossplane-models/provider-upjet-azuread/serviceprincipals.azuread.upbound.io/v1beta1";

const spPassword = new Password({
  metadata: {
    name: "sp-password",
  },
  spec: {
    forProvider: {
      servicePrincipalIdSelector: {
        matchLabels: {
          app: "my-app",
        },
      },
    },
    writeConnectionSecretToRef: {
      name: "sp-credentials",
      namespace: "default",
    },
  },
});

spPassword.validate();
console.log(dumpYaml(spPassword));

Groups

Group

import { dumpYaml } from "@kubernetes/client-node";
import { Group } from "@crossplane-models/provider-upjet-azuread/groups.azuread.upbound.io/v1beta1";

const group = new Group({
  metadata: {
    name: "developers",
  },
  spec: {
    forProvider: {
      displayName: "Developers",
      securityEnabled: true,
      mailEnabled: false,
      description: "Development team group",
    },
  },
});

group.validate();
console.log(dumpYaml(group));

Group Member

import { dumpYaml } from "@kubernetes/client-node";
import { Member } from "@crossplane-models/provider-upjet-azuread/groups.azuread.upbound.io/v1beta1";

const groupMember = new Member({
  metadata: {
    name: "add-user-to-developers",
  },
  spec: {
    forProvider: {
      groupObjectIdSelector: {
        matchLabels: {
          group: "developers",
        },
      },
      memberObjectIdSelector: {
        matchLabels: {
          user: "john-doe",
        },
      },
    },
  },
});

groupMember.validate();
console.log(dumpYaml(groupMember));

Users

User

import { dumpYaml } from "@kubernetes/client-node";
import { User } from "@crossplane-models/provider-upjet-azuread/users.azuread.upbound.io/v1beta1";

const user = new User({
  metadata: {
    name: "john-doe",
  },
  spec: {
    forProvider: {
      displayName: "John Doe",
      userPrincipalName: "[email protected]",
      mailNickname: "john.doe",
      passwordSecretRef: {
        name: "user-password",
        namespace: "default",
        key: "password",
      },
    },
  },
});

user.validate();
console.log(dumpYaml(user));

Directory Roles

Directory Role Assignment

import { dumpYaml } from "@kubernetes/client-node";
import { RoleAssignment } from "@crossplane-models/provider-upjet-azuread/directoryroles.azuread.upbound.io/v1beta1";

const roleAssignment = new RoleAssignment({
  metadata: {
    name: "sp-reader-role",
  },
  spec: {
    forProvider: {
      roleIdSelector: {
        matchLabels: {
          role: "directory-readers",
        },
      },
      principalObjectIdSelector: {
        matchLabels: {
          app: "my-service-principal",
        },
      },
    },
  },
});

roleAssignment.validate();
console.log(dumpYaml(roleAssignment));

Conditional Access

Conditional Access Policy

import { dumpYaml } from "@kubernetes/client-node";
import { AccessPolicy } from "@crossplane-models/provider-upjet-azuread/conditionalaccess.azuread.upbound.io/v1beta1";

const caPolicy = new AccessPolicy({
  metadata: {
    name: "require-mfa",
  },
  spec: {
    forProvider: {
      displayName: "Require MFA for all users",
      state: "enabled",
      conditions: [
        {
          users: [
            {
              includeUsers: ["All"],
            },
          ],
          applications: [
            {
              includeApplications: ["All"],
            },
          ],
        },
      ],
      grantControls: [
        {
          operator: "OR",
          builtInControls: ["mfa"],
        },
      ],
    },
  },
});

caPolicy.validate();
console.log(dumpYaml(caPolicy));

Validation

All models include built-in JSON Schema validation. Call .validate() on any instance to validate against the provider's CRD schema. Validation will throw an error if the object doesn't match the schema.

For more information about the Azure AD provider and available resources, see the official provider documentation.