Python msrestazure.azure_active_directory.AADTokenCredentials() Examples
The following are 8
code examples of msrestazure.azure_active_directory.AADTokenCredentials().
You can vote up the ones you like or vote down the ones you don't like,
and go to the original project or source file by following the links above each example.
You may also want to check out all available functions/classes of the module
msrestazure.azure_active_directory
, or try the search function
.
Example #1
Source File: sample.py From data-lake-analytics-python-auth-options with MIT License | 6 votes |
def authenticate_device_code(): """ Authenticate the end-user using device auth. """ authority_host_uri = 'https://login.microsoftonline.com' tenant = '<TENANT_ID_OR_DOMAIN>' authority_uri = authority_host_uri + '/' + tenant resource_uri = 'https://management.core.windows.net/' client_id = '04b07795-8ddb-461a-bbee-02f9e1bf7b46' context = adal.AuthenticationContext(authority_uri, api_version=None) code = context.acquire_user_code(resource_uri, client_id) print(code['message']) mgmt_token = context.acquire_token_with_device_code(resource_uri, code, client_id) credentials = AADTokenCredentials(mgmt_token, client_id) return credentials
Example #2
Source File: sample.py From data-lake-analytics-python-auth-options with MIT License | 6 votes |
def authenticate_username_password(): """ Authenticate using user w/ username + password. This doesn't work for users or tenants that have multi-factor authentication required. """ authority_host_uri = 'https://login.microsoftonline.com' tenant = '<TENANT>' authority_uri = authority_host_uri + '/' + tenant resource_uri = 'https://management.core.windows.net/' username = '<USERNAME>' password = '<PASSWORD>' client_id = '<CLIENT_ID>' context = adal.AuthenticationContext(authority_uri, api_version=None) mgmt_token = context.acquire_token_with_username_password(resource_uri, username, password, client_id) credentials = AADTokenCredentials(mgmt_token, client_id) return credentials
Example #3
Source File: sample.py From data-lake-analytics-python-auth-options with MIT License | 6 votes |
def authenticate_client_key(): """ Authenticate using service principal w/ key. """ authority_host_uri = 'https://login.microsoftonline.com' tenant = '<TENANT>' authority_uri = authority_host_uri + '/' + tenant resource_uri = 'https://management.core.windows.net/' client_id = '<CLIENT_ID>' client_secret = '<CLIENT_SECRET>' context = adal.AuthenticationContext(authority_uri, api_version=None) mgmt_token = context.acquire_token_with_client_credentials(resource_uri, client_id, client_secret) credentials = AADTokenCredentials(mgmt_token, client_id) return credentials
Example #4
Source File: sample.py From data-lake-analytics-python-auth-options with MIT License | 6 votes |
def authenticate_client_cert(): """ Authenticate using service principal w/ cert. """ authority_host_uri = 'https://login.microsoftonline.com' tenant = '<TENANT>' authority_uri = authority_host_uri + '/' + tenant resource_uri = 'https://management.core.windows.net/' client_id = '<CLIENT_ID>' client_cert = '<CLIENT_CERT>' client_cert_thumbprint = '<CLIENT_CERT_THUMBPRINT>' context = adal.AuthenticationContext(authority_uri, api_version=None) mgmt_token = context.acquire_token_with_client_certificate(resource_uri, client_id, client_cert, client_cert_thumbprint) credentials = AADTokenCredentials(mgmt_token, client_id) return credentials
Example #5
Source File: profile.py From PowerPlatformConnectors with MIT License | 6 votes |
def authenticate_device_code(self): """ Authenticate the end-user using device auth. """ context = self._get_authentication_context() code = context.acquire_user_code( resource=self.resource, client_id=self.client_id) print(code['message']) mgmt_token = context.acquire_token_with_device_code( resource=self.resource, user_code_info=code, client_id=self.client_id) credentials = AADTokenCredentials( token=mgmt_token, client_id=self.client_id) return credentials.token
Example #6
Source File: authentication_strategy.py From ScoutSuite with GNU General Public License v2.0 | 5 votes |
def refresh_credential(self, credentials): """ Refresh credentials """ print_debug('Refreshing credentials') authority_uri = AUTHORITY_HOST_URI + '/' + self.get_tenant_id() existing_cache = self.context.cache context = adal.AuthenticationContext(authority_uri, cache=existing_cache) new_token = context.acquire_token(credentials.token['resource'], credentials.token['user_id'], credentials.token['_client_id']) new_credentials = AADTokenCredentials(new_token, credentials.token.get('_client_id')) return new_credentials
Example #7
Source File: azure_rm.py From ansible-hortonworks with Apache License 2.0 | 5 votes |
def acquire_token_with_username_password(self, authority, resource, username, password, client_id, tenant): authority_uri = authority if tenant is not None: authority_uri = authority + '/' + tenant context = AuthenticationContext(authority_uri) token_response = context.acquire_token_with_username_password(resource, username, password, client_id) return AADTokenCredentials(token_response)
Example #8
Source File: azure_rm.py From Learning_DevOps with MIT License | 5 votes |
def acquire_token_with_username_password(self, authority, resource, username, password, client_id, tenant): authority_uri = authority if tenant is not None: authority_uri = authority + '/' + tenant context = AuthenticationContext(authority_uri) token_response = context.acquire_token_with_username_password(resource, username, password, client_id) return AADTokenCredentials(token_response)