You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
validate that the error value is "insufficient_claims"
capture the claims value and decode it from base64 encoding to a string
Pass the string value of the un-encoded claims to the TokenCredential via the TokenRequestContext or equivalent for your language via the Claims property
Ensure that any local token caching is bypassed in the policy when the claims are populated from a CAE challenge
Authorize the original request with the new token and send it through the pipeline again
Return any response to the caller (don't try to handle a second challenge)
#31185
This PR adds `enableCAE: true` by default. The updated logic for
`BearerAuthenticationPolicy` is as follows:
- Check if initial response returns a challenge
- If CAE challenge, handle it and return whatever response received next
- If not CAE challenge and a custom challenge handler is provided
through `authorizeRequestOnChallenge`, use custom handler to handle the
challenge. If there is another CAE challenge after, handle it and return
whatever response next. At max, the policy will resolve 2 challenges (1
non-CAE and 1 CAE challenge)
This feature entails adding CAE support for all clients lacking a custom challenge handler i.e., everyone except Key Vault and Storage.
Adding support involves adding logic to your BearerTokenAuthenticationPolicy such that it does the following:
error
value is "insufficient_claims"claims
value and decode it from base64 encoding to a stringclaims
to theTokenCredential
via theTokenRequestContext
or equivalent for your language via theClaims
propertyExample PRs:
Azure/azure-sdk-for-go#23414
Azure/azure-sdk-for-net#46277
The text was updated successfully, but these errors were encountered: