Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Entra access token authentication policies such as BearerTokenAuthenticationPolicy should respect refresh_on information #43836

Closed
christothes opened this issue May 3, 2024 · 0 comments · Fixed by #43812
Assignees
Labels
Azure.Core Azure.Identity blocking-release Blocks release Client This issue points to a problem in the data-plane of the library.
Milestone

Comments

@christothes
Copy link
Member

Long lived credentials such as those received from managed identity authentication include additional metadata concerning when a token can/should be refreshed. Our authentication policies should take this information into account when refreshing access tokens.

This involves:

  • Modifying relevant authentication policies
  • Modifying the AccessToken type to include this optional information
  • Modifying Azure.Identity credential implementations to populate the refresh_on information in the AccessToken
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
Azure.Core Azure.Identity blocking-release Blocks release Client This issue points to a problem in the data-plane of the library.
Projects
3 participants