Commit iniziale
This commit is contained in:
32
node_modules/@azure/keyvault-common/dist/browser/keyVaultAuthenticationPolicy.d.ts
generated
vendored
Normal file
32
node_modules/@azure/keyvault-common/dist/browser/keyVaultAuthenticationPolicy.d.ts
generated
vendored
Normal file
@@ -0,0 +1,32 @@
|
||||
import { PipelinePolicy } from "@azure/core-rest-pipeline";
|
||||
import { TokenCredential } from "@azure/core-auth";
|
||||
/**
|
||||
* Additional options for the challenge based authentication policy.
|
||||
*/
|
||||
export interface KeyVaultAuthenticationPolicyOptions {
|
||||
/**
|
||||
* Whether to disable verification that the challenge resource matches the Key Vault or Managed HSM domain.
|
||||
*
|
||||
* Defaults to false.
|
||||
*/
|
||||
disableChallengeResourceVerification?: boolean;
|
||||
}
|
||||
/**
|
||||
* Name of the Key Vault authentication policy.
|
||||
*/
|
||||
export declare const keyVaultAuthenticationPolicyName = "keyVaultAuthenticationPolicy";
|
||||
/**
|
||||
* A custom implementation of the bearer-token authentication policy that handles Key Vault and CAE challenges.
|
||||
*
|
||||
* Key Vault supports other authentication schemes, but we ensure challenge authentication
|
||||
* is used by first sending a copy of the request, without authorization or content.
|
||||
*
|
||||
* when the challenge is received, it will be authenticated and used to send the original
|
||||
* request with authorization.
|
||||
*
|
||||
* Following the first request of a client, follow-up requests will get the cached token
|
||||
* if possible.
|
||||
*
|
||||
*/
|
||||
export declare function keyVaultAuthenticationPolicy(credential: TokenCredential, options?: KeyVaultAuthenticationPolicyOptions): PipelinePolicy;
|
||||
//# sourceMappingURL=keyVaultAuthenticationPolicy.d.ts.map
|
||||
Reference in New Issue
Block a user