-
Notifications
You must be signed in to change notification settings - Fork 2.8k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Allow refreshing the token obtained by InteractiveBrowserCredential #10278
Comments
Hi @superhrusha, thanks for opening this. We're working on improvements to caching (tracked by #9744) and user authentication that will enable the solution you'd like in an upcoming release. I'll use this issue to track work around giving applications more control over how and when |
Thank you!
Is there an ETA?
…On Thu, Mar 12, 2020, 19:46 Charles Lowell ***@***.***> wrote:
Hi @superhrusha <https://github.com/superhrusha>, thanks for opening
this. We're working on improvements to caching (tracked by #9744
<#9744>) and user
authentication that will enable the solution you'd like in an upcoming
release. I'll use this issue to track work around giving applications more
control over how and when InteractiveBrowserCredential and other user
credentials authenticate.
—
You are receiving this because you were mentioned.
Reply to this email directly, view it on GitHub
<#10278 (comment)>,
or unsubscribe
<https://github.com/notifications/unsubscribe-auth/AGRJACAZAOJNMKGJGLJBELTRHENWZANCNFSM4LGPH3XQ>
.
|
User auth changes will roll out in beta releases over the next few months. I'll update this issue when something's available for feedback. |
@chlowell, any chance you can recommend a workaround or a temporary solution, however hacky it maybe? |
The public API never returns or accepts a refresh token, and we don't intend to change that. Any workaround involving getting or using one would therefore rely on private APIs which will soon change. After rereading this issue I wonder whether I've misunderstood the problem. |
The latter - persist across executions. I am looking to provide an experience similar to how Azure CLI works. |
Then we're on the same page. That persistence is the work in progress I mentioned above. If you need to implement your own persistence today, the best way is to write your own credential (the interface is simple). If your users happen to be signed in to the CLI, there might be a workaround for you there. In the current beta of azure-identity (1.4.0b1) |
In azure-identity 1.4.0b3, released today, Today's release also includes optional caching to disk on Windows when the credential is constructed with |
The problem I am trying to solve:
The solution I'd like
I would like the mechanism to allow me to refresh an expired token without bothering the user of the app.
Alternative I considered
override the get_token method and try to implement it myself by extracting relevant code. It would be hacky
The text was updated successfully, but these errors were encountered: