You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: sdk/identity/azure-identity/CHANGELOG.md
+6-6Lines changed: 6 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -27,7 +27,7 @@
27
27
### Features Added
28
28
29
29
- Added Windows Web Account Manager (WAM) Brokered Authentication support.
30
-
- Added `enable_msa_passthrough` suppport for `InteractiveBrowserCredential`. By default `InteractiveBrowserCredential` only lists AAD accounts. If you set `enable_msa_passthrough` to `True`, it lists both AAD accounts and MSA outlook.com accounts that are logged in to Windows.
30
+
- Added `enable_msa_passthrough` suppport for `InteractiveBrowserCredential`. By default `InteractiveBrowserCredential` only lists Microsoft Entra accounts. If you set `enable_msa_passthrough` to `True`, it lists both Microsoft Entra accounts and MSA outlook.com accounts that are logged in to Windows.
31
31
32
32
### Bugs Fixed
33
33
@@ -40,7 +40,7 @@
40
40
41
41
- Update typing of async credentials to match the `AsyncTokenCredential` protocol.
42
42
- If within `DefaultAzureCredential`, `EnvironmentCredential` will now use log level INFO instead of WARNING to inform users of an incomplete environment configuration. ([#31814](https://github.com/Azure/azure-sdk-for-python/pull/31814))
43
-
- Strengthened `AzureCliCredential` and `AzureDeveloperCliCredential` error checking when determining if a user is logged in or not. Now, if an AADSTS error exists in the error, the full error message is propagated instead of a canned error message. ([#30047](https://github.com/Azure/azure-sdk-for-python/pull/30047))
43
+
- Strengthened `AzureCliCredential` and `AzureDeveloperCliCredential` error checking when determining if a user is logged in or not. Now, if an `AADSTS` error exists in the error, the full error message is propagated instead of a canned error message. ([#30047](https://github.com/Azure/azure-sdk-for-python/pull/30047))
44
44
-`ManagedIdentityCredential` instances using IMDS will now be allowed to continue sending requests to the IMDS endpoint even after previous attempts failed. This is to prevent credential instances from potentially being permanently disabled after a temporary network failure.
45
45
- IMDS endpoint probes in `ManagedIdentityCredential` will now only occur when inside a credential chain such as `DefaultAzureCredential`. This probe request timeout has been increased to 1 second from 0.3 seconds to reduce the likelihood of false negatives.
46
46
@@ -98,7 +98,7 @@
98
98
### Features Added
99
99
100
100
- Changed parameter from `instance_discovery` to `disable_instance_discovery` to make it more explicit.
101
-
- Service principal credentials now enable support for [Continuous Access Evaluation (CAE)](https://learn.microsoft.com/azure/active-directory/conditional-access/concept-continuous-access-evaluation-workload). This indicates to Azure Active Directory that your application can handle CAE claims challenges.
101
+
- Service principal credentials now enable support for [Continuous Access Evaluation (CAE)](https://learn.microsoft.com/azure/active-directory/conditional-access/concept-continuous-access-evaluation-workload). This indicates to Microsoft Entra ID that your application can handle CAE claims challenges.
102
102
103
103
## 1.13.0b2 (2023-02-07)
104
104
@@ -826,8 +826,8 @@ its use in national clouds
826
826
## 1.0.0b4 (2019-10-07)
827
827
### New features:
828
828
-`AuthorizationCodeCredential` authenticates with a previously obtained
Copy file name to clipboardExpand all lines: sdk/identity/azure-identity/README.md
+13-13Lines changed: 13 additions & 13 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,12 +1,12 @@
1
1
# Azure Identity client library for Python
2
2
3
-
The Azure Identity library provides [Azure Active Directory (Azure AD)](https://learn.microsoft.com/azure/active-directory/fundamentals/active-directory-whatis) token authentication support across the Azure SDK. It provides a set of [`TokenCredential`](https://learn.microsoft.com/python/api/azure-core/azure.core.credentials.tokencredential?view=azure-python) implementations, which can be used to construct Azure SDK clients that support Azure AD token authentication.
3
+
The Azure Identity library provides [Microsoft Entra ID](https://learn.microsoft.com/azure/active-directory/fundamentals/active-directory-whatis)([formerly Azure Active Directory](https://learn.microsoft.com/azure/active-directory/fundamentals/new-name)) token authentication support across the Azure SDK. It provides a set of [`TokenCredential`](https://learn.microsoft.com/python/api/azure-core/azure.core.credentials.tokencredential?view=azure-python) implementations, which can be used to construct Azure SDK clients that support Microsoft Entra token authentication.
| [Azure AD documentation](https://learn.microsoft.com/azure/active-directory/)
9
+
| [Microsoft Entra ID documentation](https://learn.microsoft.com/azure/active-directory/)
10
10
11
11
## Getting started
12
12
@@ -55,7 +55,7 @@ For systems without a default web browser, the `azd auth login --use-device-code
55
55
56
56
A credential is a class that contains or can obtain the data needed for a service client to authenticate requests. Service clients across the Azure SDK accept a credential instance when they're constructed, and use that credential to authenticate requests.
57
57
58
-
The Azure Identity library focuses on OAuth authentication with Azure AD. It offers various credential classes capable of acquiring an Azure AD access token. See the [Credential classes](#credential-classes"Credential classes") section below for a list of this library's credential classes.
58
+
The Azure Identity library focuses on OAuth authentication with Microsoft Entra ID. It offers various credential classes capable of acquiring a Microsoft Entra access token. See the [Credential classes](#credential-classes"Credential classes") section below for a list of this library's credential classes.
Credentials default to authenticating to the Azure AD endpoint for Azure Public Cloud. To access resources in other clouds, such as Azure Government or a private cloud, configure credentials with the `authority` argument. [AzureAuthorityHosts](https://aka.ms/azsdk/python/identity/docs#azure.identity.AzureAuthorityHosts) defines authorities for well-known clouds:
215
+
Credentials default to authenticating to the Microsoft Entra endpoint for Azure Public Cloud. To access resources in other clouds, such as Azure Government or a private cloud, configure credentials with the `authority` argument. [AzureAuthorityHosts](https://aka.ms/azsdk/python/identity/docs#azure.identity.AzureAuthorityHosts) defines authorities for well-known clouds:
216
216
217
217
```python
218
218
from azure.identity import AzureAuthorityHosts
@@ -244,7 +244,7 @@ Not all credentials require this configuration. Credentials that authenticate th
|[`EnvironmentCredential`][environment_cred_ref]| Authenticates a service principal or user via credential information specified in environment variables.
246
246
|[`ManagedIdentityCredential`][managed_id_cred_ref]| Authenticates the managed identity of an Azure resource.
247
-
|[`WorkloadIdentityCredential`][workload_id_cred_ref]| Supports [Azure AD workload identity](https://learn.microsoft.com/azure/aks/workload-identity-overview) on Kubernetes.
247
+
|[`WorkloadIdentityCredential`][workload_id_cred_ref]| Supports [Microsoft Entra Workload ID](https://learn.microsoft.com/azure/aks/workload-identity-overview) on Kubernetes.
248
248
249
249
### Authenticate service principals
250
250
@@ -282,24 +282,24 @@ variables:
282
282
283
283
|Variable name|Value
284
284
|-|-
285
-
|`AZURE_CLIENT_ID`|ID of an Azure AD application
286
-
|`AZURE_TENANT_ID`|ID of the application's Azure AD tenant
285
+
|`AZURE_CLIENT_ID`|ID of a Microsoft Entra application
286
+
|`AZURE_TENANT_ID`|ID of the application's Microsoft Entra tenant
287
287
|`AZURE_CLIENT_SECRET`|one of the application's client secrets
288
288
289
289
### Service principal with certificate
290
290
291
291
|Variable name|Value
292
292
|-|-
293
-
|`AZURE_CLIENT_ID`|ID of an Azure AD application
294
-
|`AZURE_TENANT_ID`|ID of the application's Azure AD tenant
293
+
|`AZURE_CLIENT_ID`|ID of a Microsoft Entra application
294
+
|`AZURE_TENANT_ID`|ID of the application's Microsoft Entra tenant
295
295
|`AZURE_CLIENT_CERTIFICATE_PATH`|path to a PEM or PKCS12 certificate file including private key
296
296
|`AZURE_CLIENT_CERTIFICATE_PASSWORD`|password of the certificate file, if any
297
297
298
298
### Username and password
299
299
300
300
|Variable name|Value
301
301
|-|-
302
-
|`AZURE_CLIENT_ID`|ID of an Azure AD application
302
+
|`AZURE_CLIENT_ID`|ID of a Microsoft Entra application
303
303
|`AZURE_USERNAME`|a username (usually an email address)
304
304
|`AZURE_PASSWORD`|that user's password
305
305
@@ -314,7 +314,7 @@ As of version 1.14.0, accessing resources protected by [Continuous Access Evalua
314
314
Token caching is a feature provided by the Azure Identity library that allows apps to:
315
315
- Cache tokens in memory (default) or on disk (opt-in).
316
316
- Improve resilience and performance.
317
-
- Reduce the number of requests made to Azure AD to obtain access tokens.
317
+
- Reduce the number of requests made to Microsoft Entra ID to obtain access tokens.
318
318
319
319
The Azure Identity library offers both in-memory and persistent disk caching. For more details, see the [token caching documentation](https://github.com/Azure/azure-sdk-for-python/blob/main/sdk/identity/azure-identity/TOKEN_CACHING.md).
320
320
@@ -329,7 +329,7 @@ Credentials raise `CredentialUnavailableError` when they're unable to attempt au
329
329
330
330
Credentials raise `azure.core.exceptions.ClientAuthenticationError` when they fail to authenticate. `ClientAuthenticationError` has a `message` attribute, which describes why authentication failed. When raised by `DefaultAzureCredential` or `ChainedTokenCredential`, the message collects error messages from each credential in the chain.
331
331
332
-
For more information on handling specific Azure AD errors, see the Azure AD [error code documentation](https://learn.microsoft.com/azure/active-directory/develop/reference-aadsts-error-codes).
332
+
For more information on handling specific Microsoft Entra ID errors, see the Microsoft Entra ID [error code documentation](https://learn.microsoft.com/azure/active-directory/develop/reference-error-codes).
Client and management libraries listed on the [Azure SDK release page](https://azure.github.io/azure-sdk/releases/latest/python.html) that support Azure AD authentication accept credentials from this library. You can learn more about using these libraries in their documentation, which is linked from the release page.
351
+
Client and management libraries listed on the [Azure SDK release page](https://azure.github.io/azure-sdk/releases/latest/python.html) that support Microsoft Entra authentication accept credentials from this library. You can learn more about using these libraries in their documentation, which is linked from the release page.
0 commit comments