[DO NOT MERGE] Add token revocation support for App Service #5493
+9
−4
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Fixes #5495
App Service Managed Identity Token Revocation Enabled in Public Cloud (Sovereign Clouds ETA 2–3 Weeks)
This PR enables Managed Identity Token Revocation in Azure App Service (public cloud).
👉 Sovereign cloud support is still pending (ETA ~2–3 weeks).
Fixes #5495
App Service Managed Identity Token Revocation Enabled in Public Cloud (Sovereign Clouds ETA 2–3 Weeks)
Changes proposed in this request
This change finalizes support for managed identity access token revocation behavior in Azure App Service for public cloud.
A validation was added to the
AcquireMSITokenWithClaimsAsync
test to ensure a claims challenge triggers issuance of a new access token (token with claims != cached token). This confirms cache bypass semantics required for revocation scenarios.Key points:
Assert.AreNotEqual
between initial token and claims-challenge token.Impact:
Next steps (post-merge):
Testing
Performance impact
Documentation