Skip to content

Change samples to use DefaultAzureCredential#5183

Merged
antkmsft merged 6 commits intoAzure:mainfrom
antkmsft:samples2dac
Nov 29, 2023
Merged

Change samples to use DefaultAzureCredential#5183
antkmsft merged 6 commits intoAzure:mainfrom
antkmsft:samples2dac

Conversation

@antkmsft
Copy link
Member

@antkmsft antkmsft commented Nov 24, 2023

Closes #5133.

I will make subsequent PRs to put the wording about using the DefaultAzureCredential. This PR only switches the technical part - it switches ClientSecretCredential and EnvironmentCredential to DefaultAzureCredential.
In a subsequent PR, we will forge the best possible wording to accompany the usages of DefaultAzureCredential, all the instances at once, and we will be able to discuss that wording in that separate PR.

--
UWP CI is currently blocked until microsoft/vcpkg#35279 is fixed / microsoft/vcpkg#35116 is merged (#5181 would unblock)

@antkmsft antkmsft marked this pull request as ready for review November 24, 2023 12:51
@antkmsft antkmsft added the MQ This issue is part of a "milestone of quality" initiative. label Nov 27, 2023
@antkmsft antkmsft self-assigned this Nov 27, 2023
@antkmsft antkmsft enabled auto-merge (squash) November 29, 2023 07:23
@antkmsft antkmsft merged commit 73399d7 into Azure:main Nov 29, 2023
@antkmsft antkmsft deleted the samples2dac branch November 29, 2023 16:07

The simplest way of providing a bearer token is to use the `ClientSecretCredential` authentication method by providing client secret credentials is being used in this
getting started section, but you can find more ways to authenticate with [azure-identity][azure_identity].
The simplest way of providing a bearer token is to use the `DefaultAzureCredential` authentication method is being used in this getting started section, but you can find more ways to authenticate with [azure-identity][azure_identity].
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This sentence is awkward to read, probably because of a typo.

use the DefaultAzureCredential authentication method is being used in this getting started section

Did you mean this?

Suggested change
The simplest way of providing a bearer token is to use the `DefaultAzureCredential` authentication method is being used in this getting started section, but you can find more ways to authenticate with [azure-identity][azure_identity].
The simplest way of providing a bearer token is to use the `DefaultAzureCredential` authentication method which is being used in this getting started section, but you can find more ways to authenticate with [azure-identity][azure_identity].

Key Vault Settings client for C++ currently supports the `ClientSecretCredential` for authenticating.

In the sample below, you can create a credential by setting the Tenant ID, Client ID and Client Secret as environment variables.
Key Vault Settings client for C++ currently supports any `TokenCredential` for authenticating.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
Key Vault Settings client for C++ currently supports any `TokenCredential` for authenticating.
Key Vault Settings client for C++ supports any `TokenCredential` for authenticating.

Key Vault Certificate client for C++ currently supports the `ClientSecretCredential` for authenticating.

In the sample below, you can create a credential by setting the Tenant ID, Client ID and Client Secret as environment variables.
Key Vault Certificate client for C++ currently supports any `TokenCredential` for authenticating.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
Key Vault Certificate client for C++ currently supports any `TokenCredential` for authenticating.
Key Vault Certificate client for C++ supports any `TokenCredential` for authenticating.

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Same elsewhere.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

Azure.Identity MQ This issue is part of a "milestone of quality" initiative.

Projects

Development

Successfully merging this pull request may close these issues.

Update most of our samples to use DefaultAzureCredential.

4 participants