Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[Doc]: How to get Client assertion token from Federated Credential using Az Powershell #26209

Open
xiwenchenzoey opened this issue Oct 1, 2024 · 1 comment
Assignees
Labels
Authentication Azure PS Team question The issue doesn't require a change to the product in order to be resolved. Most issues start as that

Comments

@xiwenchenzoey
Copy link

Type of issue

Missing information

Feedback

Hi,

We are attempting to access Kusto queries via an API and have set up a VM from the AME tenant. However, we need authentication from both the AME and MSFT tenants to authenticate with the Kusto cluster. We have created a Federated Credential and are looking for a way to use Kusto.Data.KustoConnectionStringBuilder with both Managed Identity and Federated Credential. Could you provide an example using AzPowershell?

Page URL

No response

Content source URL

No response

Author

No response

Document Id

No response

@xiwenchenzoey xiwenchenzoey added the needs-triage This is a new issue that needs to be triaged to the appropriate team. label Oct 1, 2024
@isra-fel isra-fel added Azure PS Team question The issue doesn't require a change to the product in order to be resolved. Most issues start as that Authentication and removed needs-triage This is a new issue that needs to be triaged to the appropriate team. labels Oct 10, 2024
@msJinLei msJinLei self-assigned this Oct 10, 2024
@isra-fel
Copy link
Member

Hi Lei, please follow up with OP thanks

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Authentication Azure PS Team question The issue doesn't require a change to the product in order to be resolved. Most issues start as that
Projects
None yet
Development

No branches or pull requests

3 participants