-
Notifications
You must be signed in to change notification settings - Fork 61
client docs #851
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
client docs #851
Conversation
| However, by default we generate clients with credentials, so continue on to [Authenticating Your Client](#authenticating-your-client "Authenticating Your Client") | ||
| to find out how to input a credential. | ||
|
|
||
| ## Authenticating Your Client |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
should we mention what to do when your service has a custom credential? E.g. MetricsAdvisor uses a MetricsAdvisorKeyCredential.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Sound sgood, since we don't support generating custom credentials, I can talk about passing in yoru own and your own authentication polity. to handle it
|
|
||
| ## Authenticating Your Client | ||
|
|
||
| By default we generate our clients with an [Azure Active Directory (AAD) token credential][aad_authentication]. We always recommend |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Does it default or do you need the add credentials flag?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
(this isn't the current behavior, but this is what I think the behavior is going to be): default without specifying you want credentials. We're thinking of deprecating add-credentials, and instead encouring new flag --credential-types. Default of that being TokenCredential, can also specify AzureKeyCredential or None
…migrate * 'docs' of https://github.com/Azure/autorest.python: client docs (#851)
No description provided.