@@ -1280,13 +1280,13 @@ public AccessTokenProvider getTokenProvider() throws TokenAccessProviderExceptio
12801280 getMandatoryPasswordString (FS_AZURE_ACCOUNT_OAUTH_CLIENT_ID );
12811281
12821282 // Check if a custom ClientAssertionProvider is configured
1283- String clientAssertionProviderClassName =
1284- getPasswordString (FS_AZURE_ACCOUNT_OAUTH_CLIENT_ASSERTION_PROVIDER_CLASS );
1283+ String clientAssertionProviderType =
1284+ getPasswordString (FS_AZURE_ACCOUNT_OAUTH_CLIENT_ASSERTION_PROVIDER_TYPE );
12851285
1286- if (clientAssertionProviderClassName != null && !clientAssertionProviderClassName .trim ().isEmpty ()) {
1286+ if (clientAssertionProviderType != null && !clientAssertionProviderType .trim ().isEmpty ()) {
12871287 // Use custom ClientAssertionProvider
12881288 try {
1289- Class <?> providerClass = Class .forName (clientAssertionProviderClassName .trim ());
1289+ Class <?> providerClass = Class .forName (clientAssertionProviderType .trim ());
12901290 ClientAssertionProvider clientAssertionProvider =
12911291 (ClientAssertionProvider ) providerClass .getDeclaredConstructor ().newInstance ();
12921292
@@ -1296,10 +1296,10 @@ public AccessTokenProvider getTokenProvider() throws TokenAccessProviderExceptio
12961296 tokenProvider = new WorkloadIdentityTokenProvider (
12971297 authority , tenantGuid , clientId , clientAssertionProvider );
12981298 LOG .trace ("WorkloadIdentityTokenProvider initialized with custom ClientAssertionProvider: {}" ,
1299- clientAssertionProviderClassName );
1299+ clientAssertionProviderType );
13001300 } catch (Exception e ) {
13011301 throw new TokenAccessProviderException (
1302- "Failed to initialize custom ClientAssertionProvider: " + clientAssertionProviderClassName , e );
1302+ "Failed to initialize custom ClientAssertionProvider: " + clientAssertionProviderType , e );
13031303 }
13041304 } else {
13051305 // Use file-based approach (backward compatibility)
0 commit comments