You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
description: This article explains the syntax and parameters for the various Azure Developer CLI commands.
4
4
author: alexwolfmsft
5
5
ms.author: alexwolf
6
-
ms.date: 06/05/2025
6
+
ms.date: 07/17/2025
7
7
ms.service: azure-dev-cli
8
-
ms.topic: how-to
8
+
ms.topic: conceptual
9
9
ms.custom: devx-track-azdevcli
10
10
---
11
11
@@ -131,7 +131,7 @@ azd auth login [flags]
131
131
--client-id string The client id for the service principal to authenticate with.
132
132
--client-secret string The client secret for the service principal to authenticate with. Set to the empty string to read the value from the console.
133
133
--docs Opens the documentation for azd auth login in your web browser.
134
-
--federated-credential-provider string The provider to use to acquire a federated token to authenticate with.
134
+
--federated-credential-provider string The provider to use to acquire a federated token to authenticate with. Supported values: github, azure-pipelines, oidc
135
135
-h, --help Gets help for login.
136
136
--managed-identity Use a managed identity to authenticate.
137
137
--redirect-port int Choose the port to be used as part of the redirect URI during interactive login.
--docs Opens the documentation for azd env set in your web browser.
740
744
-e, --environment string The name of the environment to use.
745
+
--file string Path to .env formatted file to load environment values from.
741
746
-h, --help Gets help for set.
742
747
```
743
748
@@ -756,7 +761,7 @@ azd env set <key> <value> [flags]
756
761
757
762
## azd env set-secret
758
763
759
-
Set a `<name>` as a reference to a Key Vault secret in the environment.
764
+
Set a name as a reference to a Key Vault secret in the environment.
760
765
761
766
### Synopsis
762
767
@@ -915,6 +920,7 @@ azd init [flags]
915
920
--from-code Initializes a new application from your existing code.
916
921
-h, --help Gets help for init.
917
922
-l, --location string Azure location for the new environment
923
+
-m, --minimal Initializes a minimal project.
918
924
-s, --subscription string Name or ID of an Azure subscription to use for the new environment
919
925
-t, --template string Initializes a new application from a template. You can use Full URI, <owner>/<repository>, or <repository> if it's part of the azure-samples organization.
920
926
--up Provision and deploy to Azure after initializing the project from a template.
@@ -1067,7 +1073,7 @@ azd provision [flags]
1067
1073
--docs Opens the documentation for azd provision in your web browser.
1068
1074
-e, --environment string The name of the environment to use.
1069
1075
-h, --help Gets help for provision.
1070
-
--no-state Do not use latest Deployment State (bicep only).
1076
+
--no-state (Bicep only) Forces a fresh deployment based on current Bicep template files, ignoring any stored deployment state.
Copy file name to clipboardExpand all lines: articles/cpp/sdk/authentication/credential-chains.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -159,7 +159,7 @@ Successful creation does not guarantee further successful token retrieval.
159
159
INFO : Identity: DefaultAzureCredential: Created with the following credentials: EnvironmentCredential, WorkloadIdentityCredential, ManagedIdentityCredential, AzureCliCredential.
160
160
DEBUG : Identity: DefaultAzureCredential: Failed to get token from EnvironmentCredential: GetToken(): error response: 400 Bad Request
161
161
162
-
{"error":"invalid_grant","error_description":"AADSTS53003: Access has been blocked by Conditional Access policies. The access policy does not allow token issuance. Trace ID: 11223344-5566-7788-9900-aabbccddeeff Correlation ID: ffeeddcc-bbaa-9988-7766-554433221100 Timestamp: 2025-03-07 21:25:44Z","error_codes":[53003],"timestamp":"2025-03-07 21:25:44Z","trace_id":"11223344-5566-7788-9900-aabbccddeeff","correlation_id":"ffeeddcc-bbaa-9988-7766-554433221100","error_uri":"https://login.microsoftonline.com/error?code=53003","suberror":"message_only","claims":"{\"access_token\":{\"capolids\":{\"essential\":true,\"values\":[\"01234567-89ab-cdef-fedc-ba9876543210\"]}}}"}
162
+
{"error":"invalid_grant","error_description":"AADSTS53003: Access has been blocked by Conditional Access policies. The access policy does not allow token issuance. Trace ID: 0000aaaa-11bb-cccc-dd22-eeeeee333333 Correlation ID: aaaa0000-bb11-2222-33cc-444444dddddd Timestamp: 2025-03-07 21:25:44Z","error_codes":[53003],"timestamp":"2025-03-07 21:25:44Z","trace_id":"0000aaaa-11bb-cccc-dd22-eeeeee333333","correlation_id":"aaaa0000-bb11-2222-33cc-444444dddddd","error_uri":"https://login.microsoftonline.com/error?code=53003","suberror":"message_only","claims":"{\"access_token\":{\"capolids\":{\"essential\":true,\"values\":[\"cccc2222-dd33-4444-55ee-666666ffffff\"]}}}"}
163
163
WARN : Identity: WorkloadIdentityCredential authentication unavailable. See earlier WorkloadIdentityCredential log messages for details.
164
164
DEBUG : Identity: DefaultAzureCredential: Failed to get token from WorkloadIdentityCredential: WorkloadIdentityCredential authentication unavailable. Azure Kubernetes environment is not set up correctly.
165
165
INFO : Identity: DefaultAzureCredential: Successfully got token from ManagedIdentityCredential. This credential will be reused for subsequent calls.
0 commit comments