Closed rajdhandus closed 1 year ago
Thank you for your feedback. Tagging and routing to the team member best able to assist.
Hi @rajdhandus - Would the ClientCertificiateCredential work for you in this scenario? If not, could you explain a bit more about what you are trying to do?
I'm also curious - is there a reason you need to use a custom handler other than to trust the identity endpoint's certificate root?
Hi @christothes - thanks for the link. ClientCertificiateCredential looks like it needs clientId and TenantId ? And also - its minting a token at the end?
I am trying to authenticate with Azure Confidential Ledger directly with certificates that were used while creating the ledger. These certificates are not necessarily uploaded to AAD.
Ah - OK, I understand now - Unfortunately, we are missing the self-signed client certificate auth support in this client. We currently only support TokenCredential
auth. We'll look at adding this in an upcoming release.
thanks! this seems to be available in Python SDK
https://github.com/Azure/azure-sdk-for-python/blob/main/sdk/core/azure-core/README.md?plain=1#L181
tracking this in #28147
Library name and version
Azure.Security.ConfidentialLedger 1.0.0-beta.2
Describe the bug
Expected behavior
Actual behavior
Reproduction Steps
Run the below code where the TokenCredentials is not present.
Environment
No response