Skip to content

Commit c362e24

Browse files
committed
Update managed-identity.md
1 parent b33355f commit c362e24

File tree

1 file changed

+4
-0
lines changed

1 file changed

+4
-0
lines changed

msal-python-conceptual/advanced/managed-identity.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -25,6 +25,7 @@ MSAL Python supports acquiring tokens through the managed identity service when
2525
- [Azure Arc](/azure/azure-arc/overview)
2626
- [Azure Cloud Shell](/azure/cloud-shell/overview)
2727
- [Azure Service Fabric](/azure/service-fabric/service-fabric-overview)
28+
- [Azure ML](/azure/machine-learning/how-to-identity-based-service-authentication)
2829

2930
For a complete list, refer to [Azure services that can use managed identities to access other services](/azure/active-directory/managed-identities-azure-resources/managed-identities-status).
3031

@@ -102,6 +103,9 @@ if "access_token" in result:
102103
print("Token obtained!")
103104
```
104105

106+
>[!NOTE]
107+
>MSAL Python's [built-in Managed Identity (MI) sample](https://github.com/AzureAD/microsoft-authentication-library-for-python/blob/1.29.0/sample/managed_identity_sample.py#L38-L42) showcases how user-assigned managed identity can be inferred from environment variables. It's an advanced usage pattern that can be used instead of explicit definition of the client ID in code.
108+
105109
>[!IMPORTANT]
106110
>You need to attach a user-assigned identity for the resource where the Python code runs; otherwise, no token will be returned. If an incorrect identifier is used for the user-assigned managed identity, no token will be returned as well.
107111

0 commit comments

Comments
 (0)