The hardware and bandwidth for this mirror is donated by dogado GmbH, the Webhosting and Full Service-Cloud Provider. Check out our Wordpress Tutorial.
If you wish to report a bug, or if you are interested in having us mirror your free-software or open-source project, please feel free to contact us at mirror[@]dogado.de.
get_managed_token to obtain
tokens with a user-defined identity, not just a system identity.get_azure_token help, and also in the Shiny
vignette.create_AzureR_dir function to create the caching
directory manually. This can be useful not just for non-interactive
sessions, but also Jupyter and R notebooks, which are not
technically interactive in the sense that they cannot read user
input from a console prompt.R_AZURE_DATA_DIR.clean_token_directory to actually clean the
directory (delete all files). This is because the main non-token objects
found here are AzureRMR and AzureGraph logins, which are orphaned once
their backing tokens are deleted. Deleting them as well is less
confusing, as a message will be displayed saying to create a new
login.get_azure_token arguments for some common authentication
scenarios.organizations and
consumers generic tenants, in addition to
common.is_guid, normalize_guid and
normalize_tenant now accept vector arguments.
normalize_guid throws an error if any of its argument
values is not a valid GUID.get_azure_token will now display the authentication
method it chooses if the auth_type argument is not
explicitly specified. To avoid surprises, it’s still recommended that
you specify auth_type when obtaining a token.load_azure_token function to retrieve a token from
the cache, given its hash value.utils::askYesNo if R version is 3.5 or
higher.utils::askYesNo for prompts, eg when creating the
AzureR caching directory and deleting tokens; this fixes a bug in
reading the input. As a side-effect, Windows users who are using
RGUI.exe will see a popup dialog box instead of a message in the
terminal.build_authorization_uri and
get_device_creds functions to initiate the authorization
step from within a Shiny web app. get_azure_token has new
auth_code and device_creds arguments for
passing in authorization details obtained separately. See the
“Authenticating from Shiny” vignette for a skeleton example app.use_cache argument to get_azure_token
and get_managed_token, which controls whether to cache
tokens. Set this to FALSE to skip reading cached credentials from disk,
and to skip saving credentials to the cache.decode_jwt a generic, with methods for character
strings, AzureToken objects and httr::Token
objects.extract_jwt generic to get the actual token from
within an R object, with methods for character strings,
AzureToken objects and httr::Token
objects.get_managed_token to work from within Azure
Functions.AzureTokenV1 and AzureTokenV2
classes, there are now AzureTokenAuthCode,
AzureTokenDeviceCode, AzureTokenClientCreds,
AzureTokenOnBehalfOf, AzureTokenResOwner, and
AzureTokenManaged. There should be no user-visible changes
in behaviour arising from this.get_managed_token function to obtain a token for a
managed identity. Note this only works within a VM, service or container
to which an identity has been assigned.certificate argument, specify either the name of a PEM/PFX
file, or an AzureKeyVault object representing a cert.aad_host argument, for
Azure B2C logins.token_args argument from being
passed to the token endpoint.authorization_code
flow, print the AAD error message, if possible.on_behalf_of authorization
flow.decode_jwt, a utility function to view the token
data.saveRDS ever changes.These binaries (installable software) and packages are in development.
They may not be fully stable and should be used with caution. We make no claims about them.
Health stats visible at Monitor.