@azure/identity 3.3.2-alpha.20231013.2 → 3.3.2-alpha.20231017.9

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.

Potentially problematic release.


This version of @azure/identity might be problematic. Click here for more details.

Files changed (71) hide show
  1. package/README.md +14 -14
  2. package/dist/index.js +87 -68
  3. package/dist/index.js.map +1 -1
  4. package/dist-esm/src/credentials/authorityValidationOptions.js.map +1 -1
  5. package/dist-esm/src/credentials/authorizationCodeCredential.js +6 -6
  6. package/dist-esm/src/credentials/authorizationCodeCredential.js.map +1 -1
  7. package/dist-esm/src/credentials/azureCliCredential.js +3 -3
  8. package/dist-esm/src/credentials/azureCliCredential.js.map +1 -1
  9. package/dist-esm/src/credentials/azureDeveloperCliCredential.js +6 -6
  10. package/dist-esm/src/credentials/azureDeveloperCliCredential.js.map +1 -1
  11. package/dist-esm/src/credentials/azurePowerShellCredential.js +3 -3
  12. package/dist-esm/src/credentials/azurePowerShellCredential.js.map +1 -1
  13. package/dist-esm/src/credentials/clientAssertionCredential.js +5 -5
  14. package/dist-esm/src/credentials/clientAssertionCredential.js.map +1 -1
  15. package/dist-esm/src/credentials/clientCertificateCredential.browser.js +1 -1
  16. package/dist-esm/src/credentials/clientCertificateCredential.browser.js.map +1 -1
  17. package/dist-esm/src/credentials/clientCertificateCredential.js +5 -5
  18. package/dist-esm/src/credentials/clientCertificateCredential.js.map +1 -1
  19. package/dist-esm/src/credentials/clientSecretCredential.browser.js +7 -7
  20. package/dist-esm/src/credentials/clientSecretCredential.browser.js.map +1 -1
  21. package/dist-esm/src/credentials/clientSecretCredential.js +7 -7
  22. package/dist-esm/src/credentials/clientSecretCredential.js.map +1 -1
  23. package/dist-esm/src/credentials/deviceCodeCredential.browser.js +1 -1
  24. package/dist-esm/src/credentials/deviceCodeCredential.browser.js.map +1 -1
  25. package/dist-esm/src/credentials/deviceCodeCredential.js +6 -6
  26. package/dist-esm/src/credentials/deviceCodeCredential.js.map +1 -1
  27. package/dist-esm/src/credentials/deviceCodeCredentialOptions.js.map +1 -1
  28. package/dist-esm/src/credentials/environmentCredential.browser.js +1 -1
  29. package/dist-esm/src/credentials/environmentCredential.browser.js.map +1 -1
  30. package/dist-esm/src/credentials/environmentCredential.js +3 -3
  31. package/dist-esm/src/credentials/environmentCredential.js.map +1 -1
  32. package/dist-esm/src/credentials/environmentCredentialOptions.js.map +1 -1
  33. package/dist-esm/src/credentials/interactiveBrowserCredential.browser.js +9 -9
  34. package/dist-esm/src/credentials/interactiveBrowserCredential.browser.js.map +1 -1
  35. package/dist-esm/src/credentials/interactiveBrowserCredential.js +8 -8
  36. package/dist-esm/src/credentials/interactiveBrowserCredential.js.map +1 -1
  37. package/dist-esm/src/credentials/interactiveBrowserCredentialOptions.js.map +1 -1
  38. package/dist-esm/src/credentials/managedIdentityCredential/imdsMsi.js +14 -4
  39. package/dist-esm/src/credentials/managedIdentityCredential/imdsMsi.js.map +1 -1
  40. package/dist-esm/src/credentials/managedIdentityCredential/index.js +11 -2
  41. package/dist-esm/src/credentials/managedIdentityCredential/index.js.map +1 -1
  42. package/dist-esm/src/credentials/onBehalfOfCredential.browser.js +1 -1
  43. package/dist-esm/src/credentials/onBehalfOfCredential.browser.js.map +1 -1
  44. package/dist-esm/src/credentials/onBehalfOfCredential.js +4 -4
  45. package/dist-esm/src/credentials/onBehalfOfCredential.js.map +1 -1
  46. package/dist-esm/src/credentials/onBehalfOfCredentialOptions.js.map +1 -1
  47. package/dist-esm/src/credentials/usernamePasswordCredential.browser.js +6 -6
  48. package/dist-esm/src/credentials/usernamePasswordCredential.browser.js.map +1 -1
  49. package/dist-esm/src/credentials/usernamePasswordCredential.js +6 -6
  50. package/dist-esm/src/credentials/usernamePasswordCredential.js.map +1 -1
  51. package/dist-esm/src/credentials/visualStudioCodeCredential.js +2 -2
  52. package/dist-esm/src/credentials/visualStudioCodeCredential.js.map +1 -1
  53. package/dist-esm/src/credentials/workloadIdentityCredential.browser.js +2 -2
  54. package/dist-esm/src/credentials/workloadIdentityCredential.browser.js.map +1 -1
  55. package/dist-esm/src/credentials/workloadIdentityCredential.js +5 -5
  56. package/dist-esm/src/credentials/workloadIdentityCredential.js.map +1 -1
  57. package/dist-esm/src/credentials/workloadIdentityCredentialOptions.js.map +1 -1
  58. package/dist-esm/src/errors.js.map +1 -1
  59. package/dist-esm/src/msal/browserFlows/msalAuthCode.js +1 -1
  60. package/dist-esm/src/msal/browserFlows/msalAuthCode.js.map +1 -1
  61. package/dist-esm/src/msal/browserFlows/msalBrowserCommon.js +2 -2
  62. package/dist-esm/src/msal/browserFlows/msalBrowserCommon.js.map +1 -1
  63. package/dist-esm/src/msal/nodeFlows/msalNodeCommon.js +2 -2
  64. package/dist-esm/src/msal/nodeFlows/msalNodeCommon.js.map +1 -1
  65. package/dist-esm/src/tokenCredentialOptions.js.map +1 -1
  66. package/dist-esm/src/util/scopeUtils.js +1 -1
  67. package/dist-esm/src/util/scopeUtils.js.map +1 -1
  68. package/dist-esm/src/util/tenantIdUtils.js +3 -3
  69. package/dist-esm/src/util/tenantIdUtils.js.map +1 -1
  70. package/package.json +1 -1
  71. package/types/identity.d.ts +70 -70
@@ -1 +1 @@
1
- {"version":3,"file":"tokenCredentialOptions.js","sourceRoot":"","sources":["../../src/tokenCredentialOptions.ts"],"names":[],"mappings":"AAAA,uCAAuC;AACvC,kCAAkC","sourcesContent":["// Copyright (c) Microsoft Corporation.\n// Licensed under the MIT license.\n\nimport { CommonClientOptions } from \"@azure/core-client\";\nimport { LogPolicyOptions } from \"@azure/core-rest-pipeline\";\n\n/**\n * Provides options to configure how the Identity library makes authentication\n * requests to Azure Active Directory.\n */\nexport interface TokenCredentialOptions extends CommonClientOptions {\n /**\n * The authority host to use for authentication requests.\n * Possible values are available through {@link AzureAuthorityHosts}.\n * The default is \"https://login.microsoftonline.com\".\n */\n authorityHost?: string;\n /**\n * Allows users to configure settings for logging policy options, allow logging account information and personally identifiable information for customer support.\n */\n loggingOptions?: LogPolicyOptions & {\n /**\n * Allows logging account information once the authentication flow succeeds.\n */\n allowLoggingAccountIdentifiers?: boolean;\n /**\n * Allows logging personally identifiable information for customer support.\n */\n enableUnsafeSupportLogging?: boolean;\n };\n}\n"]}
1
+ {"version":3,"file":"tokenCredentialOptions.js","sourceRoot":"","sources":["../../src/tokenCredentialOptions.ts"],"names":[],"mappings":"AAAA,uCAAuC;AACvC,kCAAkC","sourcesContent":["// Copyright (c) Microsoft Corporation.\n// Licensed under the MIT license.\n\nimport { CommonClientOptions } from \"@azure/core-client\";\nimport { LogPolicyOptions } from \"@azure/core-rest-pipeline\";\n\n/**\n * Provides options to configure how the Identity library makes authentication\n * requests to Microsoft Entra ID.\n */\nexport interface TokenCredentialOptions extends CommonClientOptions {\n /**\n * The authority host to use for authentication requests.\n * Possible values are available through {@link AzureAuthorityHosts}.\n * The default is \"https://login.microsoftonline.com\".\n */\n authorityHost?: string;\n /**\n * Allows users to configure settings for logging policy options, allow logging account information and personally identifiable information for customer support.\n */\n loggingOptions?: LogPolicyOptions & {\n /**\n * Allows logging account information once the authentication flow succeeds.\n */\n allowLoggingAccountIdentifiers?: boolean;\n /**\n * Allows logging personally identifiable information for customer support.\n */\n enableUnsafeSupportLogging?: boolean;\n };\n}\n"]}
@@ -13,7 +13,7 @@ export function ensureScopes(scopes) {
13
13
  * @internal
14
14
  */
15
15
  export function ensureValidScopeForDevTimeCreds(scope, logger) {
16
- if (!scope.match(/^[0-9a-zA-Z-.:/]+$/)) {
16
+ if (!scope.match(/^[0-9a-zA-Z-_.:/]+$/)) {
17
17
  const error = new Error("Invalid scope was specified by the user or calling client");
18
18
  logger.getToken.info(formatError(scope, error));
19
19
  throw error;
@@ -1 +1 @@
1
- {"version":3,"file":"scopeUtils.js","sourceRoot":"","sources":["../../../src/util/scopeUtils.ts"],"names":[],"mappings":"AAAA,uCAAuC;AACvC,kCAAkC;AAElC,OAAO,EAAoB,WAAW,EAAE,MAAM,WAAW,CAAC;AAE1D;;;GAGG;AACH,MAAM,UAAU,YAAY,CAAC,MAAyB;IACpD,OAAO,KAAK,CAAC,OAAO,CAAC,MAAM,CAAC,CAAC,CAAC,CAAC,MAAM,CAAC,CAAC,CAAC,CAAC,MAAM,CAAC,CAAC;AACnD,CAAC;AAED;;;GAGG;AACH,MAAM,UAAU,+BAA+B,CAAC,KAAa,EAAE,MAAwB;IACrF,IAAI,CAAC,KAAK,CAAC,KAAK,CAAC,oBAAoB,CAAC,EAAE;QACtC,MAAM,KAAK,GAAG,IAAI,KAAK,CAAC,2DAA2D,CAAC,CAAC;QACrF,MAAM,CAAC,QAAQ,CAAC,IAAI,CAAC,WAAW,CAAC,KAAK,EAAE,KAAK,CAAC,CAAC,CAAC;QAChD,MAAM,KAAK,CAAC;KACb;AACH,CAAC;AAED;;;GAGG;AACH,MAAM,UAAU,gBAAgB,CAAC,KAAa;IAC5C,OAAO,KAAK,CAAC,OAAO,CAAC,aAAa,EAAE,EAAE,CAAC,CAAC;AAC1C,CAAC","sourcesContent":["// Copyright (c) Microsoft Corporation.\n// Licensed under the MIT license.\n\nimport { CredentialLogger, formatError } from \"./logging\";\n\n/**\n * Ensures the scopes value is an array.\n * @internal\n */\nexport function ensureScopes(scopes: string | string[]): string[] {\n return Array.isArray(scopes) ? scopes : [scopes];\n}\n\n/**\n * Throws if the received scope is not valid.\n * @internal\n */\nexport function ensureValidScopeForDevTimeCreds(scope: string, logger: CredentialLogger): void {\n if (!scope.match(/^[0-9a-zA-Z-.:/]+$/)) {\n const error = new Error(\"Invalid scope was specified by the user or calling client\");\n logger.getToken.info(formatError(scope, error));\n throw error;\n }\n}\n\n/**\n * Returns the resource out of a scope.\n * @internal\n */\nexport function getScopeResource(scope: string): string {\n return scope.replace(/\\/.default$/, \"\");\n}\n"]}
1
+ {"version":3,"file":"scopeUtils.js","sourceRoot":"","sources":["../../../src/util/scopeUtils.ts"],"names":[],"mappings":"AAAA,uCAAuC;AACvC,kCAAkC;AAElC,OAAO,EAAoB,WAAW,EAAE,MAAM,WAAW,CAAC;AAE1D;;;GAGG;AACH,MAAM,UAAU,YAAY,CAAC,MAAyB;IACpD,OAAO,KAAK,CAAC,OAAO,CAAC,MAAM,CAAC,CAAC,CAAC,CAAC,MAAM,CAAC,CAAC,CAAC,CAAC,MAAM,CAAC,CAAC;AACnD,CAAC;AAED;;;GAGG;AACH,MAAM,UAAU,+BAA+B,CAAC,KAAa,EAAE,MAAwB;IACrF,IAAI,CAAC,KAAK,CAAC,KAAK,CAAC,qBAAqB,CAAC,EAAE;QACvC,MAAM,KAAK,GAAG,IAAI,KAAK,CAAC,2DAA2D,CAAC,CAAC;QACrF,MAAM,CAAC,QAAQ,CAAC,IAAI,CAAC,WAAW,CAAC,KAAK,EAAE,KAAK,CAAC,CAAC,CAAC;QAChD,MAAM,KAAK,CAAC;KACb;AACH,CAAC;AAED;;;GAGG;AACH,MAAM,UAAU,gBAAgB,CAAC,KAAa;IAC5C,OAAO,KAAK,CAAC,OAAO,CAAC,aAAa,EAAE,EAAE,CAAC,CAAC;AAC1C,CAAC","sourcesContent":["// Copyright (c) Microsoft Corporation.\n// Licensed under the MIT license.\n\nimport { CredentialLogger, formatError } from \"./logging\";\n\n/**\n * Ensures the scopes value is an array.\n * @internal\n */\nexport function ensureScopes(scopes: string | string[]): string[] {\n return Array.isArray(scopes) ? scopes : [scopes];\n}\n\n/**\n * Throws if the received scope is not valid.\n * @internal\n */\nexport function ensureValidScopeForDevTimeCreds(scope: string, logger: CredentialLogger): void {\n if (!scope.match(/^[0-9a-zA-Z-_.:/]+$/)) {\n const error = new Error(\"Invalid scope was specified by the user or calling client\");\n logger.getToken.info(formatError(scope, error));\n throw error;\n }\n}\n\n/**\n * Returns the resource out of a scope.\n * @internal\n */\nexport function getScopeResource(scope: string): string {\n return scope.replace(/\\/.default$/, \"\");\n}\n"]}
@@ -7,8 +7,8 @@ export { processMultiTenantRequest } from "./processMultiTenantRequest";
7
7
  * @internal
8
8
  */
9
9
  export function checkTenantId(logger, tenantId) {
10
- if (!tenantId.match(/^[0-9a-zA-Z-.:/]+$/)) {
11
- const error = new Error("Invalid tenant id provided. You can locate your tenant id by following the instructions listed here: https://docs.microsoft.com/partner-center/find-ids-and-domain-names.");
10
+ if (!tenantId.match(/^[0-9a-zA-Z-.]+$/)) {
11
+ const error = new Error("Invalid tenant id provided. You can locate your tenant id by following the instructions listed here: https://learn.microsoft.com/partner-center/find-ids-and-domain-names.");
12
12
  logger.info(formatError("", error));
13
13
  throw error;
14
14
  }
@@ -32,7 +32,7 @@ export function resolveTenantId(logger, tenantId, clientId) {
32
32
  /**
33
33
  * @internal
34
34
  */
35
- export function resolveAddionallyAllowedTenantIds(additionallyAllowedTenants) {
35
+ export function resolveAdditionallyAllowedTenantIds(additionallyAllowedTenants) {
36
36
  if (!additionallyAllowedTenants || additionallyAllowedTenants.length === 0) {
37
37
  return [];
38
38
  }
@@ -1 +1 @@
1
- {"version":3,"file":"tenantIdUtils.js","sourceRoot":"","sources":["../../../src/util/tenantIdUtils.ts"],"names":[],"mappings":"AAAA,uCAAuC;AACvC,kCAAkC;AAElC,OAAO,EAAE,WAAW,EAAE,uBAAuB,EAAE,MAAM,cAAc,CAAC;AACpE,OAAO,EAAoB,WAAW,EAAE,MAAM,WAAW,CAAC;AAC1D,OAAO,EAAE,yBAAyB,EAAE,MAAM,6BAA6B,CAAC;AAExE;;GAEG;AACH,MAAM,UAAU,aAAa,CAAC,MAAwB,EAAE,QAAgB;IACtE,IAAI,CAAC,QAAQ,CAAC,KAAK,CAAC,oBAAoB,CAAC,EAAE;QACzC,MAAM,KAAK,GAAG,IAAI,KAAK,CACrB,2KAA2K,CAC5K,CAAC;QACF,MAAM,CAAC,IAAI,CAAC,WAAW,CAAC,EAAE,EAAE,KAAK,CAAC,CAAC,CAAC;QACpC,MAAM,KAAK,CAAC;KACb;AACH,CAAC;AAED;;GAEG;AACH,MAAM,UAAU,eAAe,CAC7B,MAAwB,EACxB,QAAiB,EACjB,QAAiB;IAEjB,IAAI,QAAQ,EAAE;QACZ,aAAa,CAAC,MAAM,EAAE,QAAQ,CAAC,CAAC;QAChC,OAAO,QAAQ,CAAC;KACjB;IACD,IAAI,CAAC,QAAQ,EAAE;QACb,QAAQ,GAAG,uBAAuB,CAAC;KACpC;IACD,IAAI,QAAQ,KAAK,uBAAuB,EAAE;QACxC,OAAO,QAAQ,CAAC;KACjB;IACD,OAAO,eAAe,CAAC;AACzB,CAAC;AAED;;GAEG;AACH,MAAM,UAAU,iCAAiC,CAAC,0BAAqC;IACrF,IAAI,CAAC,0BAA0B,IAAI,0BAA0B,CAAC,MAAM,KAAK,CAAC,EAAE;QAC1E,OAAO,EAAE,CAAC;KACX;IAED,IAAI,0BAA0B,CAAC,QAAQ,CAAC,GAAG,CAAC,EAAE;QAC5C,OAAO,WAAW,CAAC;KACpB;IAED,OAAO,0BAA0B,CAAC;AACpC,CAAC","sourcesContent":["// Copyright (c) Microsoft Corporation.\n// Licensed under the MIT license.\n\nimport { ALL_TENANTS, DeveloperSignOnClientId } from \"../constants\";\nimport { CredentialLogger, formatError } from \"./logging\";\nexport { processMultiTenantRequest } from \"./processMultiTenantRequest\";\n\n/**\n * @internal\n */\nexport function checkTenantId(logger: CredentialLogger, tenantId: string): void {\n if (!tenantId.match(/^[0-9a-zA-Z-.:/]+$/)) {\n const error = new Error(\n \"Invalid tenant id provided. You can locate your tenant id by following the instructions listed here: https://docs.microsoft.com/partner-center/find-ids-and-domain-names.\"\n );\n logger.info(formatError(\"\", error));\n throw error;\n }\n}\n\n/**\n * @internal\n */\nexport function resolveTenantId(\n logger: CredentialLogger,\n tenantId?: string,\n clientId?: string\n): string {\n if (tenantId) {\n checkTenantId(logger, tenantId);\n return tenantId;\n }\n if (!clientId) {\n clientId = DeveloperSignOnClientId;\n }\n if (clientId !== DeveloperSignOnClientId) {\n return \"common\";\n }\n return \"organizations\";\n}\n\n/**\n * @internal\n */\nexport function resolveAddionallyAllowedTenantIds(additionallyAllowedTenants?: string[]): string[] {\n if (!additionallyAllowedTenants || additionallyAllowedTenants.length === 0) {\n return [];\n }\n\n if (additionallyAllowedTenants.includes(\"*\")) {\n return ALL_TENANTS;\n }\n\n return additionallyAllowedTenants;\n}\n"]}
1
+ {"version":3,"file":"tenantIdUtils.js","sourceRoot":"","sources":["../../../src/util/tenantIdUtils.ts"],"names":[],"mappings":"AAAA,uCAAuC;AACvC,kCAAkC;AAElC,OAAO,EAAE,WAAW,EAAE,uBAAuB,EAAE,MAAM,cAAc,CAAC;AACpE,OAAO,EAAoB,WAAW,EAAE,MAAM,WAAW,CAAC;AAC1D,OAAO,EAAE,yBAAyB,EAAE,MAAM,6BAA6B,CAAC;AAExE;;GAEG;AACH,MAAM,UAAU,aAAa,CAAC,MAAwB,EAAE,QAAgB;IACtE,IAAI,CAAC,QAAQ,CAAC,KAAK,CAAC,kBAAkB,CAAC,EAAE;QACvC,MAAM,KAAK,GAAG,IAAI,KAAK,CACrB,4KAA4K,CAC7K,CAAC;QACF,MAAM,CAAC,IAAI,CAAC,WAAW,CAAC,EAAE,EAAE,KAAK,CAAC,CAAC,CAAC;QACpC,MAAM,KAAK,CAAC;KACb;AACH,CAAC;AAED;;GAEG;AACH,MAAM,UAAU,eAAe,CAC7B,MAAwB,EACxB,QAAiB,EACjB,QAAiB;IAEjB,IAAI,QAAQ,EAAE;QACZ,aAAa,CAAC,MAAM,EAAE,QAAQ,CAAC,CAAC;QAChC,OAAO,QAAQ,CAAC;KACjB;IACD,IAAI,CAAC,QAAQ,EAAE;QACb,QAAQ,GAAG,uBAAuB,CAAC;KACpC;IACD,IAAI,QAAQ,KAAK,uBAAuB,EAAE;QACxC,OAAO,QAAQ,CAAC;KACjB;IACD,OAAO,eAAe,CAAC;AACzB,CAAC;AAED;;GAEG;AACH,MAAM,UAAU,mCAAmC,CACjD,0BAAqC;IAErC,IAAI,CAAC,0BAA0B,IAAI,0BAA0B,CAAC,MAAM,KAAK,CAAC,EAAE;QAC1E,OAAO,EAAE,CAAC;KACX;IAED,IAAI,0BAA0B,CAAC,QAAQ,CAAC,GAAG,CAAC,EAAE;QAC5C,OAAO,WAAW,CAAC;KACpB;IAED,OAAO,0BAA0B,CAAC;AACpC,CAAC","sourcesContent":["// Copyright (c) Microsoft Corporation.\n// Licensed under the MIT license.\n\nimport { ALL_TENANTS, DeveloperSignOnClientId } from \"../constants\";\nimport { CredentialLogger, formatError } from \"./logging\";\nexport { processMultiTenantRequest } from \"./processMultiTenantRequest\";\n\n/**\n * @internal\n */\nexport function checkTenantId(logger: CredentialLogger, tenantId: string): void {\n if (!tenantId.match(/^[0-9a-zA-Z-.]+$/)) {\n const error = new Error(\n \"Invalid tenant id provided. You can locate your tenant id by following the instructions listed here: https://learn.microsoft.com/partner-center/find-ids-and-domain-names.\"\n );\n logger.info(formatError(\"\", error));\n throw error;\n }\n}\n\n/**\n * @internal\n */\nexport function resolveTenantId(\n logger: CredentialLogger,\n tenantId?: string,\n clientId?: string\n): string {\n if (tenantId) {\n checkTenantId(logger, tenantId);\n return tenantId;\n }\n if (!clientId) {\n clientId = DeveloperSignOnClientId;\n }\n if (clientId !== DeveloperSignOnClientId) {\n return \"common\";\n }\n return \"organizations\";\n}\n\n/**\n * @internal\n */\nexport function resolveAdditionallyAllowedTenantIds(\n additionallyAllowedTenants?: string[]\n): string[] {\n if (!additionallyAllowedTenants || additionallyAllowedTenants.length === 0) {\n return [];\n }\n\n if (additionallyAllowedTenants.includes(\"*\")) {\n return ALL_TENANTS;\n }\n\n return additionallyAllowedTenants;\n}\n"]}
package/package.json CHANGED
@@ -1,7 +1,7 @@
1
1
  {
2
2
  "name": "@azure/identity",
3
3
  "sdk-type": "client",
4
- "version": "3.3.2-alpha.20231013.2",
4
+ "version": "3.3.2-alpha.20231017.9",
5
5
  "description": "Provides credential implementations for Azure SDK libraries that can authenticate with Azure Active Directory",
6
6
  "main": "dist/index.js",
7
7
  "module": "dist-esm/src/index.js",
@@ -113,7 +113,7 @@ export declare interface AuthenticationRequiredErrorOptions {
113
113
  /**
114
114
  * Provides options to configure how the Identity library
115
115
  * does authority validation during authentication requests
116
- * to Azure Active Directory.
116
+ * to Microsoft Entra ID.
117
117
  */
118
118
  export declare interface AuthorityValidationOptions {
119
119
  /**
@@ -127,11 +127,11 @@ export declare interface AuthorityValidationOptions {
127
127
  }
128
128
 
129
129
  /**
130
- * Enables authentication to Azure Active Directory using an authorization code
130
+ * Enables authentication to Microsoft Entra ID using an authorization code
131
131
  * that was obtained through the authorization code flow, described in more detail
132
- * in the Azure Active Directory documentation:
132
+ * in the Microsoft Entra ID documentation:
133
133
  *
134
- * https://docs.microsoft.com/en-us/azure/active-directory/develop/v2-oauth2-auth-code-flow
134
+ * https://learn.microsoft.com/azure/active-directory/develop/v2-oauth2-auth-code-flow
135
135
  */
136
136
  export declare class AuthorizationCodeCredential implements TokenCredential {
137
137
  private msalFlow;
@@ -143,7 +143,7 @@ export declare class AuthorizationCodeCredential implements TokenCredential {
143
143
  /**
144
144
  * Creates an instance of AuthorizationCodeCredential with the details needed
145
145
  * to request an access token using an authentication that was obtained
146
- * from Azure Active Directory.
146
+ * from Microsoft Entra ID.
147
147
  *
148
148
  * It is currently necessary for the user of this credential to initiate
149
149
  * the authorization code flow to obtain an authorization code to be used
@@ -151,7 +151,7 @@ export declare class AuthorizationCodeCredential implements TokenCredential {
151
151
  *
152
152
  * https://github.com/Azure/azure-sdk-for-js/blob/main/sdk/identity/identity/samples/v2/manual/authorizationCodeSample.ts
153
153
  *
154
- * @param tenantId - The Azure Active Directory tenant (directory) ID or name.
154
+ * @param tenantId - The Microsoft Entra tenant (directory) ID or name.
155
155
  * 'common' may be used when dealing with multi-tenant scenarios.
156
156
  * @param clientId - The client (application) ID of an App Registration in the tenant.
157
157
  * @param clientSecret - A client secret that was generated for the App Registration
@@ -166,7 +166,7 @@ export declare class AuthorizationCodeCredential implements TokenCredential {
166
166
  /**
167
167
  * Creates an instance of AuthorizationCodeCredential with the details needed
168
168
  * to request an access token using an authentication that was obtained
169
- * from Azure Active Directory.
169
+ * from Microsoft Entra ID.
170
170
  *
171
171
  * It is currently necessary for the user of this credential to initiate
172
172
  * the authorization code flow to obtain an authorization code to be used
@@ -174,7 +174,7 @@ export declare class AuthorizationCodeCredential implements TokenCredential {
174
174
  *
175
175
  * https://github.com/Azure/azure-sdk-for-js/blob/main/sdk/identity/identity/samples/v2/manual/authorizationCodeSample.ts
176
176
  *
177
- * @param tenantId - The Azure Active Directory tenant (directory) ID or name.
177
+ * @param tenantId - The Microsoft Entra tenant (directory) ID or name.
178
178
  * 'common' may be used when dealing with multi-tenant scenarios.
179
179
  * @param clientId - The client (application) ID of an App Registration in the tenant.
180
180
  * @param authorizationCode - An authorization code that was received from following the
@@ -186,7 +186,7 @@ export declare class AuthorizationCodeCredential implements TokenCredential {
186
186
  */
187
187
  constructor(tenantId: string | "common", clientId: string, authorizationCode: string, redirectUri: string, options?: AuthorizationCodeCredentialOptions);
188
188
  /**
189
- * Authenticates with Azure Active Directory and returns an access token if successful.
189
+ * Authenticates with Microsoft Entra ID and returns an access token if successful.
190
190
  * If authentication fails, a {@link CredentialUnavailableError} will be thrown with the details of the failure.
191
191
  *
192
192
  * @param scopes - The list of scopes for which the token will have access.
@@ -244,7 +244,7 @@ export declare class AzureCliCredential implements TokenCredential {
244
244
  */
245
245
  constructor(options?: AzureCliCredentialOptions);
246
246
  /**
247
- * Authenticates with Azure Active Directory and returns an access token if successful.
247
+ * Authenticates with Microsoft Entra ID and returns an access token if successful.
248
248
  * If authentication fails, a {@link CredentialUnavailableError} will be thrown with the details of the failure.
249
249
  *
250
250
  * @param scopes - The list of scopes for which the token will have access.
@@ -272,11 +272,11 @@ export declare interface AzureCliCredentialOptions extends MultiTenantTokenCrede
272
272
  * Azure Developer CLI is a command-line interface tool that allows developers to create, manage, and deploy
273
273
  * resources in Azure. It's built on top of the Azure CLI and provides additional functionality specific
274
274
  * to Azure developers. It allows users to authenticate as a user and/or a service principal against
275
- * <a href="https://learn.microsoft.com/azure/active-directory/fundamentals/">Azure Active Directory (Azure AD)
276
- * </a>. The AzureDeveloperCliCredential authenticates in a development environment and acquires a token on behalf of
275
+ * <a href="https://learn.microsoft.com/azure/active-directory/fundamentals/">Microsoft Entra ID</a>. The
276
+ * AzureDeveloperCliCredential authenticates in a development environment and acquires a token on behalf of
277
277
  * the logged-in user or service principal in the Azure Developer CLI. It acts as the Azure Developer CLI logged in user or
278
278
  * service principal and executes an Azure CLI command underneath to authenticate the application against
279
- * Azure Active Directory.
279
+ * Microsoft Entra ID.
280
280
  *
281
281
  * <h2> Configure AzureDeveloperCliCredential </h2>
282
282
  *
@@ -307,7 +307,7 @@ export declare class AzureDeveloperCliCredential implements TokenCredential {
307
307
  */
308
308
  constructor(options?: AzureDeveloperCliCredentialOptions);
309
309
  /**
310
- * Authenticates with Azure Active Directory and returns an access token if successful.
310
+ * Authenticates with Microsoft Entra ID and returns an access token if successful.
311
311
  * If authentication fails, a {@link CredentialUnavailableError} will be thrown with the details of the failure.
312
312
  *
313
313
  * @param scopes - The list of scopes for which the token will have access.
@@ -358,7 +358,7 @@ export declare class AzurePowerShellCredential implements TokenCredential {
358
358
  */
359
359
  private getAzurePowerShellAccessToken;
360
360
  /**
361
- * Authenticates with Azure Active Directory and returns an access token if successful.
361
+ * Authenticates with Microsoft Entra ID and returns an access token if successful.
362
362
  * If the authentication cannot be performed through PowerShell, a {@link CredentialUnavailableError} will be thrown.
363
363
  *
364
364
  * @param scopes - The list of scopes for which the token will have access.
@@ -439,17 +439,17 @@ export declare class ClientAssertionCredential implements TokenCredential {
439
439
  private options;
440
440
  /**
441
441
  * Creates an instance of the ClientAssertionCredential with the details
442
- * needed to authenticate against Azure Active Directory with a client
442
+ * needed to authenticate against Microsoft Entra ID with a client
443
443
  * assertion provided by the developer through the `getAssertion` function parameter.
444
444
  *
445
- * @param tenantId - The Azure Active Directory tenant (directory) ID.
445
+ * @param tenantId - The Microsoft Entra tenant (directory) ID.
446
446
  * @param clientId - The client (application) ID of an App Registration in the tenant.
447
447
  * @param getAssertion - A function that retrieves the assertion for the credential to use.
448
448
  * @param options - Options for configuring the client which makes the authentication request.
449
449
  */
450
450
  constructor(tenantId: string, clientId: string, getAssertion: () => Promise<string>, options?: ClientAssertionCredentialOptions);
451
451
  /**
452
- * Authenticates with Azure Active Directory and returns an access token if successful.
452
+ * Authenticates with Microsoft Entra ID and returns an access token if successful.
453
453
  * If authentication fails, a {@link CredentialUnavailableError} will be thrown with the details of the failure.
454
454
  *
455
455
  * @param scopes - The list of scopes for which the token will have access.
@@ -466,11 +466,11 @@ export declare interface ClientAssertionCredentialOptions extends MultiTenantTok
466
466
  }
467
467
 
468
468
  /**
469
- * Enables authentication to Azure Active Directory using a PEM-encoded
469
+ * Enables authentication to Microsoft Entra ID using a PEM-encoded
470
470
  * certificate that is assigned to an App Registration. More information
471
471
  * on how to configure certificate authentication can be found here:
472
472
  *
473
- * https://docs.microsoft.com/en-us/azure/active-directory/develop/active-directory-certificate-credentials#register-your-certificate-with-azure-ad
473
+ * https://learn.microsoft.com/en-us/azure/active-directory/develop/active-directory-certificate-credentials#register-your-certificate-with-azure-ad
474
474
  *
475
475
  */
476
476
  export declare class ClientCertificateCredential implements TokenCredential {
@@ -479,9 +479,9 @@ export declare class ClientCertificateCredential implements TokenCredential {
479
479
  private msalFlow;
480
480
  /**
481
481
  * Creates an instance of the ClientCertificateCredential with the details
482
- * needed to authenticate against Azure Active Directory with a certificate.
482
+ * needed to authenticate against Microsoft Entra ID with a certificate.
483
483
  *
484
- * @param tenantId - The Azure Active Directory tenant (directory) ID.
484
+ * @param tenantId - The Microsoft Entra tenant (directory) ID.
485
485
  * @param clientId - The client (application) ID of an App Registration in the tenant.
486
486
  * @param certificatePath - The path to a PEM-encoded public/private key certificate on the filesystem.
487
487
  * @param options - Options for configuring the client which makes the authentication request.
@@ -489,9 +489,9 @@ export declare class ClientCertificateCredential implements TokenCredential {
489
489
  constructor(tenantId: string, clientId: string, certificatePath: string, options?: ClientCertificateCredentialOptions);
490
490
  /**
491
491
  * Creates an instance of the ClientCertificateCredential with the details
492
- * needed to authenticate against Azure Active Directory with a certificate.
492
+ * needed to authenticate against Microsoft Entra ID with a certificate.
493
493
  *
494
- * @param tenantId - The Azure Active Directory tenant (directory) ID.
494
+ * @param tenantId - The Microsoft Entra tenant (directory) ID.
495
495
  * @param clientId - The client (application) ID of an App Registration in the tenant.
496
496
  * @param configuration - Other parameters required, including the path of the certificate on the filesystem.
497
497
  * If the type is ignored, we will throw the value of the path to a PEM certificate.
@@ -500,9 +500,9 @@ export declare class ClientCertificateCredential implements TokenCredential {
500
500
  constructor(tenantId: string, clientId: string, configuration: ClientCertificatePEMCertificatePath, options?: ClientCertificateCredentialOptions);
501
501
  /**
502
502
  * Creates an instance of the ClientCertificateCredential with the details
503
- * needed to authenticate against Azure Active Directory with a certificate.
503
+ * needed to authenticate against Microsoft Entra ID with a certificate.
504
504
  *
505
- * @param tenantId - The Azure Active Directory tenant (directory) ID.
505
+ * @param tenantId - The Microsoft Entra tenant (directory) ID.
506
506
  * @param clientId - The client (application) ID of an App Registration in the tenant.
507
507
  * @param configuration - Other parameters required, including the PEM-encoded certificate as a string.
508
508
  * If the type is ignored, we will throw the value of the PEM-encoded certificate.
@@ -510,7 +510,7 @@ export declare class ClientCertificateCredential implements TokenCredential {
510
510
  */
511
511
  constructor(tenantId: string, clientId: string, configuration: ClientCertificatePEMCertificate, options?: ClientCertificateCredentialOptions);
512
512
  /**
513
- * Authenticates with Azure Active Directory and returns an access token if successful.
513
+ * Authenticates with Microsoft Entra ID and returns an access token if successful.
514
514
  * If authentication fails, a {@link CredentialUnavailableError} will be thrown with the details of the failure.
515
515
  *
516
516
  * @param scopes - The list of scopes for which the token will have access.
@@ -565,11 +565,11 @@ export declare interface ClientCertificatePEMCertificatePath {
565
565
  }
566
566
 
567
567
  /**
568
- * Enables authentication to Azure Active Directory using a client secret
568
+ * Enables authentication to Microsoft Entra ID using a client secret
569
569
  * that was generated for an App Registration. More information on how
570
570
  * to configure a client secret can be found here:
571
571
  *
572
- * https://docs.microsoft.com/en-us/azure/active-directory/develop/quickstart-configure-app-access-web-apis#add-credentials-to-your-web-application
572
+ * https://learn.microsoft.com/azure/active-directory/develop/quickstart-configure-app-access-web-apis#add-credentials-to-your-web-application
573
573
  *
574
574
  */
575
575
  export declare class ClientSecretCredential implements TokenCredential {
@@ -578,17 +578,17 @@ export declare class ClientSecretCredential implements TokenCredential {
578
578
  private msalFlow;
579
579
  /**
580
580
  * Creates an instance of the ClientSecretCredential with the details
581
- * needed to authenticate against Azure Active Directory with a client
581
+ * needed to authenticate against Microsoft Entra ID with a client
582
582
  * secret.
583
583
  *
584
- * @param tenantId - The Azure Active Directory tenant (directory) ID.
584
+ * @param tenantId - The Microsoft Entra tenant (directory) ID.
585
585
  * @param clientId - The client (application) ID of an App Registration in the tenant.
586
586
  * @param clientSecret - A client secret that was generated for the App Registration.
587
587
  * @param options - Options for configuring the client which makes the authentication request.
588
588
  */
589
589
  constructor(tenantId: string, clientId: string, clientSecret: string, options?: ClientSecretCredentialOptions);
590
590
  /**
591
- * Authenticates with Azure Active Directory and returns an access token if successful.
591
+ * Authenticates with Microsoft Entra ID and returns an access token if successful.
592
592
  * If authentication fails, a {@link CredentialUnavailableError} will be thrown with the details of the failure.
593
593
  *
594
594
  * @param scopes - The list of scopes for which the token will have access.
@@ -796,7 +796,7 @@ export declare interface DefaultAzureCredentialResourceIdOptions extends Default
796
796
  export declare function deserializeAuthenticationRecord(serializedRecord: string): AuthenticationRecord;
797
797
 
798
798
  /**
799
- * Enables authentication to Azure Active Directory using a device code
799
+ * Enables authentication to Microsoft Entra ID using a device code
800
800
  * that the user can enter into https://microsoft.com/devicelogin.
801
801
  */
802
802
  export declare class DeviceCodeCredential implements TokenCredential {
@@ -806,7 +806,7 @@ export declare class DeviceCodeCredential implements TokenCredential {
806
806
  private disableAutomaticAuthentication?;
807
807
  /**
808
808
  * Creates an instance of DeviceCodeCredential with the details needed
809
- * to initiate the device code authorization flow with Azure Active Directory.
809
+ * to initiate the device code authorization flow with Microsoft Entra ID.
810
810
  *
811
811
  * A message will be logged, giving users a code that they can use to authenticate once they go to https://microsoft.com/devicelogin
812
812
  *
@@ -826,7 +826,7 @@ export declare class DeviceCodeCredential implements TokenCredential {
826
826
  */
827
827
  constructor(options?: DeviceCodeCredentialOptions);
828
828
  /**
829
- * Authenticates with Azure Active Directory and returns an access token if successful.
829
+ * Authenticates with Microsoft Entra ID and returns an access token if successful.
830
830
  * If authentication fails, a {@link CredentialUnavailableError} will be thrown with the details of the failure.
831
831
  *
832
832
  * If the user provided the option `disableAutomaticAuthentication`,
@@ -839,7 +839,7 @@ export declare class DeviceCodeCredential implements TokenCredential {
839
839
  */
840
840
  getToken(scopes: string | string[], options?: GetTokenOptions): Promise<AccessToken>;
841
841
  /**
842
- * Authenticates with Azure Active Directory and returns an access token if successful.
842
+ * Authenticates with Microsoft Entra ID and returns an access token if successful.
843
843
  * If authentication fails, a {@link CredentialUnavailableError} will be thrown with the details of the failure.
844
844
  *
845
845
  * If the token can't be retrieved silently, this method will require user interaction to retrieve the token.
@@ -856,7 +856,7 @@ export declare class DeviceCodeCredential implements TokenCredential {
856
856
  */
857
857
  export declare interface DeviceCodeCredentialOptions extends InteractiveCredentialOptions, CredentialPersistenceOptions {
858
858
  /**
859
- * The Azure Active Directory tenant (directory) ID.
859
+ * The Microsoft Entra tenant (directory) ID.
860
860
  */
861
861
  tenantId?: string;
862
862
  /**
@@ -901,7 +901,7 @@ export declare interface DeviceCodeInfo {
901
901
  export declare type DeviceCodePromptCallback = (deviceCodeInfo: DeviceCodeInfo) => void;
902
902
 
903
903
  /**
904
- * Enables authentication to Azure Active Directory using a client secret or certificate, or as a user
904
+ * Enables authentication to Microsoft Entra ID using a client secret or certificate, or as a user
905
905
  * with a username and password.
906
906
  */
907
907
  export declare class EnvironmentCredential implements TokenCredential {
@@ -910,7 +910,7 @@ export declare class EnvironmentCredential implements TokenCredential {
910
910
  * Creates an instance of the EnvironmentCredential class and decides what credential to use depending on the available environment variables.
911
911
  *
912
912
  * Required environment variables:
913
- * - `AZURE_TENANT_ID`: The Azure Active Directory tenant (directory) ID.
913
+ * - `AZURE_TENANT_ID`: The Microsoft Entra tenant (directory) ID.
914
914
  * - `AZURE_CLIENT_ID`: The client (application) ID of an App Registration in the tenant.
915
915
  *
916
916
  * If setting the AZURE_TENANT_ID, then you can also set the additionally allowed tenants
@@ -932,7 +932,7 @@ export declare class EnvironmentCredential implements TokenCredential {
932
932
  */
933
933
  constructor(options?: EnvironmentCredentialOptions);
934
934
  /**
935
- * Authenticates with Azure Active Directory and returns an access token if successful.
935
+ * Authenticates with Microsoft Entra ID and returns an access token if successful.
936
936
  *
937
937
  * @param scopes - The list of scopes for which the token will have access.
938
938
  * @param options - Optional parameters. See {@link GetTokenOptions}.
@@ -941,7 +941,7 @@ export declare class EnvironmentCredential implements TokenCredential {
941
941
  }
942
942
 
943
943
  /**
944
- * Enables authentication to Azure Active Directory depending on the available environment variables.
944
+ * Enables authentication to Microsoft Entra ID depending on the available environment variables.
945
945
  * Defines options for the EnvironmentCredential class.
946
946
  */
947
947
  export declare interface EnvironmentCredentialOptions extends MultiTenantTokenCredentialOptions, AuthorityValidationOptions {
@@ -950,7 +950,7 @@ export declare interface EnvironmentCredentialOptions extends MultiTenantTokenCr
950
950
  /**
951
951
  * See the official documentation for more details:
952
952
  *
953
- * https://docs.microsoft.com/en-us/azure/active-directory/develop/v1-protocols-oauth-code#error-response-1
953
+ * https://learn.microsoft.com/en-us/azure/active-directory/develop/v1-protocols-oauth-code#error-response-1
954
954
  *
955
955
  * NOTE: This documentation is for v1 OAuth support but the same error
956
956
  * response details still apply to v2.
@@ -996,7 +996,7 @@ export { GetTokenOptions }
996
996
  export declare type IdentityPlugin = (context: unknown) => void;
997
997
 
998
998
  /**
999
- * Enables authentication to Azure Active Directory inside of the web browser
999
+ * Enables authentication to Microsoft Entra ID inside of the web browser
1000
1000
  * using the interactive login flow.
1001
1001
  */
1002
1002
  export declare class InteractiveBrowserCredential implements TokenCredential {
@@ -1007,18 +1007,18 @@ export declare class InteractiveBrowserCredential implements TokenCredential {
1007
1007
  /**
1008
1008
  * Creates an instance of InteractiveBrowserCredential with the details needed.
1009
1009
  *
1010
- * This credential uses the [Authorization Code Flow](https://docs.microsoft.com/azure/active-directory/develop/v2-oauth2-auth-code-flow).
1010
+ * This credential uses the [Authorization Code Flow](https://learn.microsoft.com/azure/active-directory/develop/v2-oauth2-auth-code-flow).
1011
1011
  * On Node.js, it will open a browser window while it listens for a redirect response from the authentication service.
1012
1012
  * On browsers, it authenticates via popups. The `loginStyle` optional parameter can be set to `redirect` to authenticate by redirecting the user to an Azure secure login page, which then will redirect the user back to the web application where the authentication started.
1013
1013
  *
1014
- * For Node.js, if a `clientId` is provided, the Azure Active Directory application will need to be configured to have a "Mobile and desktop applications" redirect endpoint.
1015
- * Follow our guide on [setting up Redirect URIs for Desktop apps that calls to web APIs](https://docs.microsoft.com/azure/active-directory/develop/scenario-desktop-app-registration#redirect-uris).
1014
+ * For Node.js, if a `clientId` is provided, the Microsoft Entra application will need to be configured to have a "Mobile and desktop applications" redirect endpoint.
1015
+ * Follow our guide on [setting up Redirect URIs for Desktop apps that calls to web APIs](https://learn.microsoft.com/azure/active-directory/develop/scenario-desktop-app-registration#redirect-uris).
1016
1016
  *
1017
1017
  * @param options - Options for configuring the client which makes the authentication requests.
1018
1018
  */
1019
1019
  constructor(options?: InteractiveBrowserCredentialNodeOptions | InteractiveBrowserCredentialInBrowserOptions);
1020
1020
  /**
1021
- * Authenticates with Azure Active Directory and returns an access token if successful.
1021
+ * Authenticates with Microsoft Entra ID and returns an access token if successful.
1022
1022
  * If authentication fails, a {@link CredentialUnavailableError} will be thrown with the details of the failure.
1023
1023
  *
1024
1024
  * If the user provided the option `disableAutomaticAuthentication`,
@@ -1031,7 +1031,7 @@ export declare class InteractiveBrowserCredential implements TokenCredential {
1031
1031
  */
1032
1032
  getToken(scopes: string | string[], options?: GetTokenOptions): Promise<AccessToken>;
1033
1033
  /**
1034
- * Authenticates with Azure Active Directory and returns an access token if successful.
1034
+ * Authenticates with Microsoft Entra ID and returns an access token if successful.
1035
1035
  * If authentication fails, a {@link CredentialUnavailableError} will be thrown with the details of the failure.
1036
1036
  *
1037
1037
  * If the token can't be retrieved silently, this method will require user interaction to retrieve the token.
@@ -1057,7 +1057,7 @@ export declare interface InteractiveBrowserCredentialInBrowserOptions extends In
1057
1057
  */
1058
1058
  redirectUri?: string | (() => string);
1059
1059
  /**
1060
- * The Azure Active Directory tenant (directory) ID.
1060
+ * The Microsoft Entra tenant (directory) ID.
1061
1061
  */
1062
1062
  tenantId?: string;
1063
1063
  /**
@@ -1090,7 +1090,7 @@ export declare interface InteractiveBrowserCredentialNodeOptions extends Interac
1090
1090
  */
1091
1091
  redirectUri?: string | (() => string);
1092
1092
  /**
1093
- * The Azure Active Directory tenant (directory) ID.
1093
+ * The Microsoft Entra tenant (directory) ID.
1094
1094
  */
1095
1095
  tenantId?: string;
1096
1096
  /**
@@ -1137,7 +1137,7 @@ export declare const logger: AzureLogger;
1137
1137
  * Azure Kubernetes Services, Azure Service Fabric instances and inside of the Azure Cloud Shell.
1138
1138
  *
1139
1139
  * More information about configuring managed identities can be found here:
1140
- * https://docs.microsoft.com/en-us/azure/active-directory/managed-identities-azure-resources/overview
1140
+ * https://learn.microsoft.com/en-us/azure/active-directory/managed-identities-azure-resources/overview
1141
1141
  */
1142
1142
  export declare class ManagedIdentityCredential implements TokenCredential {
1143
1143
  private identityClient;
@@ -1171,7 +1171,7 @@ export declare class ManagedIdentityCredential implements TokenCredential {
1171
1171
  private cachedAvailableMSI;
1172
1172
  private authenticateManagedIdentity;
1173
1173
  /**
1174
- * Authenticates with Azure Active Directory and returns an access token if successful.
1174
+ * Authenticates with Microsoft Entra ID and returns an access token if successful.
1175
1175
  * If authentication fails, a {@link CredentialUnavailableError} will be thrown with the details of the failure.
1176
1176
  * If an unexpected error occurs, an {@link AuthenticationError} will be thrown with the details of the failure.
1177
1177
  *
@@ -1228,7 +1228,7 @@ export declare interface MultiTenantTokenCredentialOptions extends TokenCredenti
1228
1228
  }
1229
1229
 
1230
1230
  /**
1231
- * Enables authentication to Azure Active Directory using the [On Behalf Of flow](https://docs.microsoft.com/azure/active-directory/develop/v2-oauth2-on-behalf-of-flow).
1231
+ * Enables authentication to Microsoft Entra ID using the [On Behalf Of flow](https://learn.microsoft.com/azure/active-directory/develop/v2-oauth2-on-behalf-of-flow).
1232
1232
  */
1233
1233
  export declare class OnBehalfOfCredential implements TokenCredential {
1234
1234
  private options;
@@ -1237,7 +1237,7 @@ export declare class OnBehalfOfCredential implements TokenCredential {
1237
1237
  private msalFlow;
1238
1238
  /**
1239
1239
  * Creates an instance of the {@link OnBehalfOfCredential} with the details
1240
- * needed to authenticate against Azure Active Directory with path to a PEM certificate,
1240
+ * needed to authenticate against Microsoft Entra ID with path to a PEM certificate,
1241
1241
  * and an user assertion.
1242
1242
  *
1243
1243
  * Example using the `KeyClient` from [\@azure/keyvault-keys](https://www.npmjs.com/package/\@azure/keyvault-keys):
@@ -1259,7 +1259,7 @@ export declare class OnBehalfOfCredential implements TokenCredential {
1259
1259
  constructor(options: OnBehalfOfCredentialCertificateOptions & MultiTenantTokenCredentialOptions & CredentialPersistenceOptions);
1260
1260
  /**
1261
1261
  * Creates an instance of the {@link OnBehalfOfCredential} with the details
1262
- * needed to authenticate against Azure Active Directory with a client
1262
+ * needed to authenticate against Microsoft Entra ID with a client
1263
1263
  * secret and an user assertion.
1264
1264
  *
1265
1265
  * Example using the `KeyClient` from [\@azure/keyvault-keys](https://www.npmjs.com/package/\@azure/keyvault-keys):
@@ -1280,7 +1280,7 @@ export declare class OnBehalfOfCredential implements TokenCredential {
1280
1280
  */
1281
1281
  constructor(options: OnBehalfOfCredentialSecretOptions & MultiTenantTokenCredentialOptions & CredentialPersistenceOptions);
1282
1282
  /**
1283
- * Authenticates with Azure Active Directory and returns an access token if successful.
1283
+ * Authenticates with Microsoft Entra ID and returns an access token if successful.
1284
1284
  * If authentication fails, a {@link CredentialUnavailableError} will be thrown with the details of the failure.
1285
1285
  *
1286
1286
  * @param scopes - The list of scopes for which the token will have access.
@@ -1294,7 +1294,7 @@ export declare class OnBehalfOfCredential implements TokenCredential {
1294
1294
  */
1295
1295
  export declare interface OnBehalfOfCredentialCertificateOptions {
1296
1296
  /**
1297
- * The Azure Active Directory tenant (directory) ID.
1297
+ * The Microsoft Entra tenant (directory) ID.
1298
1298
  */
1299
1299
  tenantId: string;
1300
1300
  /**
@@ -1326,7 +1326,7 @@ export declare type OnBehalfOfCredentialOptions = (OnBehalfOfCredentialSecretOpt
1326
1326
  */
1327
1327
  export declare interface OnBehalfOfCredentialSecretOptions {
1328
1328
  /**
1329
- * The Azure Active Directory tenant (directory) ID.
1329
+ * The Microsoft Entra tenant (directory) ID.
1330
1330
  */
1331
1331
  tenantId: string;
1332
1332
  /**
@@ -1387,7 +1387,7 @@ export { TokenCredential }
1387
1387
 
1388
1388
  /**
1389
1389
  * Provides options to configure how the Identity library makes authentication
1390
- * requests to Azure Active Directory.
1390
+ * requests to Microsoft Entra ID.
1391
1391
  */
1392
1392
  export declare interface TokenCredentialOptions extends CommonClientOptions {
1393
1393
  /**
@@ -1441,7 +1441,7 @@ export declare interface TokenCredentialOptions extends CommonClientOptions {
1441
1441
  export declare function useIdentityPlugin(plugin: IdentityPlugin): void;
1442
1442
 
1443
1443
  /**
1444
- * Enables authentication to Azure Active Directory with a user's
1444
+ * Enables authentication to Microsoft Entra ID with a user's
1445
1445
  * username and password. This credential requires a high degree of
1446
1446
  * trust so you should only use it when other, more secure credential
1447
1447
  * types can't be used.
@@ -1452,10 +1452,10 @@ export declare class UsernamePasswordCredential implements TokenCredential {
1452
1452
  private msalFlow;
1453
1453
  /**
1454
1454
  * Creates an instance of the UsernamePasswordCredential with the details
1455
- * needed to authenticate against Azure Active Directory with a username
1455
+ * needed to authenticate against Microsoft Entra ID with a username
1456
1456
  * and password.
1457
1457
  *
1458
- * @param tenantId - The Azure Active Directory tenant (directory).
1458
+ * @param tenantId - The Microsoft Entra tenant (directory).
1459
1459
  * @param clientId - The client (application) ID of an App Registration in the tenant.
1460
1460
  * @param username - The user account's e-mail address (user name).
1461
1461
  * @param password - The user account's account password
@@ -1463,7 +1463,7 @@ export declare class UsernamePasswordCredential implements TokenCredential {
1463
1463
  */
1464
1464
  constructor(tenantId: string, clientId: string, username: string, password: string, options?: UsernamePasswordCredentialOptions);
1465
1465
  /**
1466
- * Authenticates with Azure Active Directory and returns an access token if successful.
1466
+ * Authenticates with Microsoft Entra ID and returns an access token if successful.
1467
1467
  * If authentication fails, a {@link CredentialUnavailableError} will be thrown with the details of the failure.
1468
1468
  *
1469
1469
  * If the user provided the option `disableAutomaticAuthentication`,
@@ -1551,10 +1551,10 @@ export declare interface VisualStudioCodeCredentialOptions extends MultiTenantTo
1551
1551
  * Identity authentication, you can avoid the need to manage and rotate service principals or managed identities for
1552
1552
  * each application on each VM. Additionally, because SACs are created automatically and managed by Azure, you don't
1553
1553
  * need to worry about storing and securing sensitive credentials themselves.
1554
- * The WorkloadIdentityCredential supports Azure workload identity authentication on Azure Kubernetes and acquires
1554
+ * The WorkloadIdentityCredential supports Microsoft Entra Workload ID authentication on Azure Kubernetes and acquires
1555
1555
  * a token using the SACs available in the Azure Kubernetes environment.
1556
- * Refer to <a href="https://learn.microsoft.com/azure/aks/workload-identity-overview">Azure Active Directory
1557
- * Workload Identity</a> for more information.
1556
+ * Refer to <a href="https://learn.microsoft.com/azure/aks/workload-identity-overview">Microsoft Entra
1557
+ * Workload ID</a> for more information.
1558
1558
  */
1559
1559
  export declare class WorkloadIdentityCredential implements TokenCredential {
1560
1560
  private client;
@@ -1562,13 +1562,13 @@ export declare class WorkloadIdentityCredential implements TokenCredential {
1562
1562
  private cacheDate;
1563
1563
  private federatedTokenFilePath;
1564
1564
  /**
1565
- * WorkloadIdentityCredential supports Azure workload identity on Kubernetes.
1565
+ * WorkloadIdentityCredential supports Microsoft Entra Workload ID on Kubernetes.
1566
1566
  *
1567
1567
  * @param options - The identity client options to use for authentication.
1568
1568
  */
1569
1569
  constructor(options?: WorkloadIdentityCredentialOptions);
1570
1570
  /**
1571
- * Authenticates with Azure Active Directory and returns an access token if successful.
1571
+ * Authenticates with Microsoft Entra ID and returns an access token if successful.
1572
1572
  * If authentication fails, a {@link CredentialUnavailableError} will be thrown with the details of the failure.
1573
1573
  *
1574
1574
  * @param scopes - The list of scopes for which the token will have access.
@@ -1584,11 +1584,11 @@ export declare class WorkloadIdentityCredential implements TokenCredential {
1584
1584
  */
1585
1585
  export declare interface WorkloadIdentityCredentialOptions extends MultiTenantTokenCredentialOptions, AuthorityValidationOptions {
1586
1586
  /**
1587
- * ID of the application's Azure Active Directory tenant. Also called its directory ID.
1587
+ * ID of the application's Microsoft Entra tenant. Also called its directory ID.
1588
1588
  */
1589
1589
  tenantId?: string;
1590
1590
  /**
1591
- * The client ID of an Azure AD app registration.
1591
+ * The client ID of a Microsoft Entra app registration.
1592
1592
  */
1593
1593
  clientId?: string;
1594
1594
  /**