Azure AD assignment summaries now resolve Graph roles and principals
This release extends tfplan2md's Azure AD coverage for permission and role assignment resources. Instead of reviewing raw GUIDs in pull requests, you now get summary lines that resolve common Microsoft Graph app roles, reuse principal mapping data for display names, and keep Azure AD assignment icons consistent between summaries and detail tables.
✨ Features
azuread_app_role_assignmentsummaries now show who gets what on which API: summary lines follow the familiar{principal} → {role} → {resource}shape, with built-in Microsoft Graph app role resolution for commonapp_role_idvalues such asUser.Read.AllandGroup.ReadWrite.All.azuread_directory_role_assignmentgets first-class summary output: directory role assignments now render a concise principal-to-role summary instead of leaving reviewers to interpret raw attributes.azuread_service_principal_delegated_permission_grantis now summarized explicitly: delegated permission grants show the service principal, granted claims, and target resource in a single readable line.- Existing principal mapping support carries over to Azure AD assignments: if you already use
--principal-mapping/--principals, the same mapping data is used to resolve Azure AD principals and target resources. Forazuread_app_role_assignment, plan-provided display names are also used as a fallback when mappings are unavailable. - Detail-table formatting matches the summaries:
app_role_id,principal_object_id,service_principal_object_id, andresource_object_idnow use the same Azure AD-specific formatters, so the summary line and attribute table tell the same story.
🐛 Bug fixes
- Consistent Azure AD assignment icons in summary lines: Feature 116 follow-up work corrected the summary/UAT rendering so Azure AD assignment summaries use the same semantic icons as the attribute table (
👤principal,🛡️app role / directory role,🎯target resource). This makes the summaries easier to scan and keeps create/delete output visually consistent.

