Open christothes opened 2 months ago
This feature is blocked on MSAL support for CAE in C++.
We can handle the following in BearerTokenAuthenticationPolicy
within Azure::Core and invalidate the token in that policy whenever we see a 401:
Detects when a CAE challenge is issued (401 response with a WWW-Authenticate header)
This feature entails adding CAE support for all clients lacking a custom challenge handler i.e., everyone except Key Vault and Storage.
Adding support involves adding logic to your BearerTokenAuthenticationPolicy such that it does the following:
error
value is "insufficient_claims"claims
value and decode it from base64 encoding to a stringclaims
to theTokenCredential
via theTokenRequestContext
or equivalent for your language via theClaims
propertyExample PRs: https://github.com/Azure/azure-sdk-for-go/pull/23414 https://github.com/Azure/azure-sdk-for-net/pull/46277