-
Notifications
You must be signed in to change notification settings - Fork 3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Unable to figure out how to grant consent for Azure CLI to an AAD application #15056
Comments
Note: I'm not not an admin on the AAD directory so I can't grant Admin Consent, but I am a User and user consent is enabled. I just need some way to actually invoke the consent. |
add to S176 |
For AAD-related questions, you may reach out to AAD support by creating a support ticket. Thanks for understanding. |
@jiasli - Appreciate the response, but is this something that has changed in the 10 months since the ticket was created? I'm not sure that this is a support request vs. a change to the CLI to allow it? Honestly, I've forgotten what the actual problem is since I created the ticket so I'm not positive. :) |
@veleek,
So there is hardly anything CLI can change to make your scenario work. Also, Azure CLI is not designed for and tested with third-party applications. On second thought, as the error indicates:
perhaps you may try interactively logging in to your application using |
Thanks, I'll give it a shot. |
I was able to make this work by going to the app registration, then 'Expose an API', and adding the Azure CLI as a client application [ID: |
Describe the bug
Command Name
az account get-access-token
Errors:
To Reproduce:
Steps to reproduce the behavior. Note that argument values have been redacted, as they may contain sensitive information.
az account get-access-token --resource <myappidhere>
Expected Behavior
I can grant user-consent to my application as the azure cli.
Environment Summary
Additional Context
The error that I'm getting is expected, but I don't know what process i need to go through in order to actually grant consent to this application for the AZ cli.
My service uses AzureServiceTokenProvider to authenticate with AAD, and by default I depend on the Azure provided identity and everything works. However when running locally I'd like to just use the logged in user's credentials which I can manage access for independently.
The text was updated successfully, but these errors were encountered: