-
Notifications
You must be signed in to change notification settings - Fork 805
Clarify BYOK token usage and limitations #402
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Changes from all commits
File filter
Filter by extension
Conversations
Jump to
Diff view
Diff view
There are no files selected for viewing
| Original file line number | Diff line number | Diff line change |
|---|---|---|
|
|
@@ -272,19 +272,23 @@ provider: { | |
| } | ||
| ``` | ||
|
|
||
| > **Note:** The `bearerToken` option accepts a **static token string** only. The SDK does not refresh this token automatically. If your token expires, requests will fail and you'll need to create a new session with a fresh token. | ||
| ## Limitations | ||
|
|
||
| When using BYOK, be aware of these limitations: | ||
|
|
||
| ### Identity Limitations | ||
|
|
||
| BYOK authentication is **key-based only**. The following identity providers are NOT supported: | ||
| BYOK authentication uses **static credentials only**. The following identity providers are NOT supported: | ||
|
|
||
| - ❌ **Microsoft Entra ID (Azure AD)** - No support for Entra managed identities or service principals | ||
| - ❌ **Third-party identity providers** - No OIDC, SAML, or other federated identity | ||
|
Comment on lines
+283
to
286
|
||
| - ❌ **Managed identities** - Azure Managed Identity is not supported | ||
|
|
||
| You must use an API key or bearer token that you manage yourself. | ||
| You must use an API key or static bearer token that you manage yourself. | ||
|
|
||
| **Why not Entra ID?** While Entra ID does issue bearer tokens, these tokens are short-lived (typically 1 hour) and require automatic refresh via the Azure Identity SDK. The `bearerToken` option only accepts a static string—there is no callback mechanism for the SDK to request fresh tokens. For long-running workloads requiring Entra authentication, you would need to implement your own token refresh logic and create new sessions with updated tokens. | ||
|
|
||
| ### Feature Limitations | ||
|
|
||
|
|
||
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
The note says expired bearer tokens require creating a new session. However, all SDKs support resuming a session with a new
providerconfig (e.g.,ResumeSessionConfig.Provider), which can be used to supply an updatedbearerTokenwithout changing the session ID. Consider rewording to say you must reconnect (create or resume) with a fresh token, rather than implying only new sessions work.This issue also appears on line 291 of the same file.