get_manual_token function to create a token object
from an external token string. Thanks to @falbukrek.get_managed_token to obtain
tokens with a user-defined identity, not just a system identity.get_azure_token help, and also in the Shiny
vignette.create_AzureR_dir function to create the caching
directory manually. This can be useful not just for non-interactive
sessions, but also Jupyter and R notebooks, which are not
technically interactive in the sense that they cannot read user
input from a console prompt.R_AZURE_DATA_DIR.clean_token_directory to actually clean the
directory (delete all files). This is because the main non-token objects
found here are AzureRMR and AzureGraph logins, which are orphaned once
their backing tokens are deleted. Deleting them as well is less
confusing, as a message will be displayed saying to create a new
login.get_azure_token arguments for some common authentication
scenarios.organizations and
consumers generic tenants, in addition to
common.is_guid, normalize_guid and
normalize_tenant now accept vector arguments.
normalize_guid throws an error if any of its argument
values is not a valid GUID.get_azure_token will now display the authentication
method it chooses if the auth_type argument is not
explicitly specified. To avoid surprises, it’s still recommended that
you specify auth_type when obtaining a token.load_azure_token function to retrieve a token from
the cache, given its hash value.utils::askYesNo if R version is 3.5 or
higher.utils::askYesNo for prompts, eg when creating the
AzureR caching directory and deleting tokens; this fixes a bug in
reading the input. As a side-effect, Windows users who are using
RGUI.exe will see a popup dialog box instead of a message in the
terminal.build_authorization_uri and
get_device_creds functions to initiate the authorization
step from within a Shiny web app. get_azure_token has new
auth_code and device_creds arguments for
passing in authorization details obtained separately. See the
“Authenticating from Shiny” vignette for a skeleton example app.use_cache argument to get_azure_token
and get_managed_token, which controls whether to cache
tokens. Set this to FALSE to skip reading cached credentials from disk,
and to skip saving credentials to the cache.decode_jwt a generic, with methods for character
strings, AzureToken objects and httr::Token
objects.extract_jwt generic to get the actual token from
within an R object, with methods for character strings,
AzureToken objects and httr::Token
objects.get_managed_token to work from within Azure
Functions.AzureTokenV1 and AzureTokenV2
classes, there are now AzureTokenAuthCode,
AzureTokenDeviceCode, AzureTokenClientCreds,
AzureTokenOnBehalfOf, AzureTokenResOwner, and
AzureTokenManaged. There should be no user-visible changes
in behaviour arising from this.get_managed_token function to obtain a token for a
managed identity. Note this only works within a VM, service or container
to which an identity has been assigned.certificate argument, specify either the name of a PEM/PFX
file, or an AzureKeyVault object representing a cert.aad_host argument, for
Azure B2C logins.token_args argument from being
passed to the token endpoint.authorization_code
flow, print the AAD error message, if possible.on_behalf_of authorization
flow.decode_jwt, a utility function to view the token
data.saveRDS ever changes.
Need a high-speed mirror for your open-source project?
Contact our mirror admin team at info@clientvps.com.
This archive is provided as a free public service to the community.
Proudly supported by infrastructure from VPSPulse , RxServers , BuyNumber , UnitVPS , OffshoreName and secure payment technology by ArionPay.