-
Notifications
You must be signed in to change notification settings - Fork 3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[Feature Request] Support custom client ID #22775
Comments
Support custom client ID |
Removing CXP Attention label from this issue since this was created internally by SDK team |
We received a similar issue today that the user wants to use Azure CLI's client ID to call but Azure CLI's Directory.AccessAsUser.All delegated permission is not sufficient. This causes failure:
|
Workaround: Use service principal instead of user login
|
What if a user doesn't have permission to create a service principal? This exact same flow worked fine in October of 2022. A user could use a DeviceCodeCredential and then access the Databricks scope with their own tokens. Now I have to create an SP? |
Azure CLI's first party application
This can be observed in the access token retrieved from
The access token contains the below
|
@kthejoker, There is no
Yes.
You need to work with your tenant admin to either
|
Today I started a project to configure PIM using terraform using the azuread provider's resource |
@jiasli is there any plan to extend the permission scopes on the first party app registration |
#30149 is another issue about Azure CLI's lack of |
I retrieved an access token from Graph Explorer and decoded it at https://jwt.ms/ by clicking the The decoded claims contain:
Apparently, Graph Explorer's first party app has far more delegated permissions than Azure CLI. |
Related command
az login
Is your feature request related to a problem? Please describe.
Currently Azure CLI uses a fixed client ID to authenticate into AAD
azure-cli/src/azure-cli-core/azure/cli/core/auth/identity.py
Line 22 in 1d973cc
This client ID
04b07795-8ddb-461a-bbee-02f9e1bf7b46
is a First Party Application, registered in First Party Portal.This application is only pre-authorized for a limited set of Microsoft Graph permissions. Using Azure CLI command
az rest
to call trustFrameworkKeySet API which requires TrustFrameworkKeySet.Read.All, TrustFrameworkKeySet.ReadWrite.All will fail (#22755).Describe the solution you'd like
Support custom client ID, so that users can create their own app in their tenant, consent to that app and let Azure CLI use that app’s client ID:
Describe alternatives you've considered
Apply for those permissions in First Party Portal to support these APIs.
The text was updated successfully, but these errors were encountered: