-
Notifications
You must be signed in to change notification settings - Fork 280
Support managed identity for Event Grid #3183
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Changes from all commits
4675390
9d5c127
34687d3
73e46d0
6988fa5
4fc4787
38c5a14
3b14265
289bf56
c63f547
08122f6
33fa674
b756d3a
e1960d5
ba89603
8921104
4dd86a4
96f9ca1
d93e0c9
4cebc87
3e99a15
09bfd63
f9913e8
9dff577
34245b8
3500688
97d98f6
aa3644d
93248fb
3de953f
3ff8310
84447ca
4ff303d
5ec24a0
d670067
d3e30f8
c386612
File filter
Filter by extension
Conversations
Jump to
Diff view
Diff view
There are no files selected for viewing
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -70,6 +70,11 @@ public async Task<string> GetTokenAsync() | |
defaultAzureCredentialOptions.InteractiveBrowserTenantId = this.Options.TenantId; | ||
} | ||
|
||
if (!string.IsNullOrEmpty(this.Options?.ClientId)) | ||
{ | ||
defaultAzureCredentialOptions.ManagedIdentityClientId = this.Options.ClientId; | ||
} | ||
|
||
defaultCredential = this.Options == null ? new DefaultAzureCredential() : new DefaultAzureCredential(defaultAzureCredentialOptions); // CodeQL [SM05137] Use DefaultAzureCredential explicitly for local development and is decided by the user | ||
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. One change we should consider in the future is the ability to choose a credential type other than |
||
|
||
AccessToken defaultToken = await defaultCredential.GetTokenAsync(context); | ||
|
Uh oh!
There was an error while loading. Please reload this page.