Nothing
get_managed_token to obtain tokens with a user-defined identity, not just a system identity.get_azure_token help, and also in the Shiny vignette.create_AzureR_dir function to create the caching directory manually. This can be useful not just for non-interactive sessions, but also Jupyter and R notebooks, which are not technically interactive in the sense that they cannot read user input from a console prompt.R_AZURE_DATA_DIR.clean_token_directory to actually clean the directory (delete all files). This is because the main non-token objects found here are AzureRMR and AzureGraph logins, which are orphaned once their backing tokens are deleted. Deleting them as well is less confusing, as a message will be displayed saying to create a new login.get_azure_token arguments for some common authentication scenarios.organizations and consumers generic tenants, in addition to common.is_guid, normalize_guid and normalize_tenant now accept vector arguments. normalize_guid throws an error if any of its argument values is not a valid GUID.get_azure_token will now display the authentication method it chooses if the auth_type argument is not explicitly specified. To avoid surprises, it's still recommended that you specify auth_type when obtaining a token.load_azure_token function to retrieve a token from the cache, given its hash value.utils::askYesNo if R version is 3.5 or higher.utils::askYesNo for prompts, eg when creating the AzureR caching directory and deleting tokens; this fixes a bug in reading the input. As a side-effect, Windows users who are using RGUI.exe will see a popup dialog box instead of a message in the terminal.build_authorization_uri and get_device_creds functions to initiate the authorization step from within a Shiny web app. get_azure_token has new auth_code and device_creds arguments for passing in authorization details obtained separately. See the "Authenticating from Shiny" vignette for a skeleton example app.use_cache argument to get_azure_token and get_managed_token, which controls whether to cache tokens. Set this to FALSE to skip reading cached credentials from disk, and to skip saving credentials to the cache.decode_jwt a generic, with methods for character strings, AzureToken objects and httr::Token objects.extract_jwt generic to get the actual token from within an R object, with methods for character strings, AzureToken objects and httr::Token objects.get_managed_token to work from within Azure Functions.AzureTokenV1 and AzureTokenV2 classes, there are now AzureTokenAuthCode, AzureTokenDeviceCode, AzureTokenClientCreds, AzureTokenOnBehalfOf, AzureTokenResOwner, and AzureTokenManaged. There should be no user-visible changes in behaviour arising from this.get_managed_token function to obtain a token for a managed identity. Note this only works within a VM, service or container to which an identity has been assigned.certificate argument, specify either the name of a PEM/PFX file, or an AzureKeyVault object representing a cert.aad_host argument, for Azure B2C logins.token_args argument from being passed to the token endpoint.authorization_code flow, print the AAD error message, if possible.on_behalf_of authorization flow.decode_jwt, a utility function to view the token data.saveRDS ever changes.Any scripts or data that you put into this service are public.
Add the following code to your website.
For more information on customizing the embed code, read Embedding Snippets.