Skip to content

Conversation

@chlowell
Copy link
Member

@chlowell chlowell commented Jun 4, 2020

Adds optional persistent caching to CertificateCredential and ClientSecretCredential, configured by keyword arguments enable_persistent_cache and allow_unencrypted_cache, both False by default.

Cache locations:

  • Linux: libsecret
    • schema name "msal.confidential.cache", label "MSALConfidentialCache", attribute "MsalClientID": "Microsoft.Developer.IdentityService"
    • signal file: ~/.IdentityService/msal.confidential.cache
      • plaintext fallback is the same (yes, a new encrypted cache clobbers an unencrypted one)
  • macOS: Keychain service "Microsoft.Developer.IdentityService", account "MSALConfidentialCache"
    • signal file: ~/.IdentityService/msal.confidential.cache
  • Windows: %LOCALAPPDATA%/.IdentityService/msal.confidential.cache

Closes #11347

@chlowell chlowell added Client This issue points to a problem in the data-plane of the library. Azure.Identity labels Jun 4, 2020
@chlowell chlowell requested a review from xiangyan99 June 4, 2020 18:10
@chlowell chlowell requested a review from schaabs as a code owner June 4, 2020 18:10
@chlowell chlowell requested a review from jianghaolu June 4, 2020 23:22
jianghaolu
jianghaolu previously approved these changes Jun 4, 2020
@chlowell chlowell merged commit b15cede into Azure:master Jun 5, 2020
@chlowell chlowell deleted the sp-token-cache branch June 5, 2020 18:12
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

Azure.Identity Client This issue points to a problem in the data-plane of the library.

Projects

None yet

Development

Successfully merging this pull request may close these issues.

Persistent token cache for service principals

3 participants