You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: sdk/identity/azure-identity/CHANGELOG.md
+1-1Lines changed: 1 addition & 1 deletion
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@
5
5
### Features Added
6
6
7
7
- Expanded the set of acceptable values for environment variable `AZURE_TOKEN_CREDENTIALS` to allow for selection of a specific credential in the `DefaultAzureCredential` chain. At runtime, only the specified credential will be used when acquiring tokens with `DefaultAzureCredential`. For example, setting `AZURE_TOKEN_CREDENTIALS=WorkloadIdentityCredential` will make `DefaultAzureCredential` use only `WorkloadIdentityCredential`.
8
-
- Valid values are `EnvironmentCredential`, `WorkloadIdentityCredential`, `ManagedIdentityCredential`, `AzureCliCredential`, `AzurePowershellCredential`, `AzureDeveloperCliCredential`, and `InteractiveBrowserCredential`. ([#41709](https://github.com/Azure/azure-sdk-for-python/pull/41709))
8
+
- Valid values are `EnvironmentCredential`, `WorkloadIdentityCredential`, `ManagedIdentityCredential`, `AzureCliCredential`, `AzurePowershellCredential`, `AzureDeveloperCliCredential`, and `InteractiveBrowserCredential`. ([#41709](https://github.com/Azure/azure-sdk-for-python/pull/41709))
Copy file name to clipboardExpand all lines: sdk/identity/azure-identity/README.md
-25Lines changed: 0 additions & 25 deletions
Original file line number
Diff line number
Diff line change
@@ -297,31 +297,6 @@ variables:
297
297
298
298
Configuration is attempted in the preceding order. For example, if values for a client secret and certificate are both present, the client secret is used.
299
299
300
-
### Configuring DefaultAzureCredential
301
-
302
-
`DefaultAzureCredential` supports an additional environment variable to customize its behavior:
303
-
304
-
|Variable name|Value
305
-
|-|-
306
-
|`AZURE_TOKEN_CREDENTIALS`|Credential name or group
307
-
308
-
#### AZURE_TOKEN_CREDENTIALS values
309
-
310
-
You can set `AZURE_TOKEN_CREDENTIALS` to one of the following values to control which credentials `DefaultAzureCredential` attempts to use:
311
-
312
-
**Individual Credentials:**
313
-
-`EnvironmentCredential` - Only use environment variables for service principal authentication
314
-
-`WorkloadIdentityCredential` - Only use workload identity for Kubernetes authentication
315
-
-`ManagedIdentityCredential` - Only use managed identity authentication
316
-
-`AzureCliCredential` - Only use Azure CLI authentication
317
-
-`AzurePowerShellCredential` - Only use Azure PowerShell authentication
318
-
-`AzureDeveloperCliCredential` - Only use Azure Developer CLI authentication
319
-
-`InteractiveBrowserCredential` - Only use interactive browser authentication
320
-
321
-
**Credential Groups:**
322
-
-`prod` - Use deployed service credentials: `EnvironmentCredential`, `WorkloadIdentityCredential`, and `ManagedIdentityCredential`
323
-
-`dev` - Use developer credentials: `SharedTokenCacheCredential`, `AzureCliCredential`, `AzurePowerShellCredential`, and `AzureDeveloperCliCredential`
324
-
325
300
## Continuous Access Evaluation
326
301
327
302
As of version 1.14.0, accessing resources protected by [Continuous Access Evaluation (CAE)][cae] is possible on a per-request basis. This behavior can be enabled by setting the `enable_cae` keyword argument to `True` in the credential's `get_token` method. CAE isn't supported for developer and managed identity credentials.
0 commit comments