Sad Tux - Windows bias detected
This page contains Windows bias

About This Page

This page is part of the Azure documentation. It contains code examples and configuration instructions for working with Azure services.

Bias Analysis

Detected Bias Types
powershell_heavy
windows_tools
missing_linux_example
Summary
The documentation provides detailed PowerShell/MSAL.PS examples for obtaining OAuth tokens, but does not include equivalent Linux-native or cross-platform command-line examples (e.g., curl, Python, or bash). The focus on PowerShell and the MSAL.PS module, which is Windows-centric, may disadvantage Linux or macOS users. There is also a lack of explicit Linux or cross-platform guidance for authentication flows.
Recommendations
  • Add examples using curl or HTTPie to demonstrate how to obtain OAuth tokens from the command line on Linux/macOS.
  • Include a Python example using MSAL or requests to show cross-platform programmatic authentication.
  • Explicitly mention that Azure CLI is cross-platform and provide more detailed CLI-based authentication flows.
  • Where PowerShell is used, provide equivalent bash or shell script examples for Linux users.
  • Review all sections for Windows-specific terminology or tool references and ensure Linux alternatives are presented with equal prominence.
GitHub Create Pull Request

Scan History

Date Scan Status Result
2026-01-14 00:00 #250 in_progress Biased Biased
2026-01-13 00:00 #246 completed Biased Biased
2026-01-11 00:00 #240 completed Biased Biased
2026-01-10 00:00 #237 completed Biased Biased
2026-01-09 00:34 #234 completed Biased Biased
2026-01-08 00:53 #231 completed Biased Biased
2026-01-06 18:15 #225 cancelled Clean Clean
2025-08-17 00:01 #83 cancelled Clean Clean
2025-07-13 21:37 #48 completed Biased Biased
2025-07-12 23:44 #41 cancelled Biased Biased
2025-07-09 13:09 #3 cancelled Clean Clean
2025-07-08 04:23 #2 cancelled Biased Biased

Flagged Code Snippets

  $clientId = '<app_id>’
  $tenantId = '<tenant_id>’
  $authority = "https://login.microsoftonline.com/$tenantId/v2.0"
  $Scope = 'https://api.adu.microsoft.com/user_impersonation'
  
  Get-MsalToken -ClientId $clientId -TenantId $tenantId -Authority $authority -Scopes $Scope -Interactive -DeviceCode
  
  $clientId = '<app_id>’
  $tenantId = '<tenant_id>’
  $cert = '<client_certificate>'
  $authority = "https://login.microsoftonline.com/$tenantId/v2.0"
  $Scope = 'https://api.adu.microsoft.com/.default'
  
  Get-MsalToken -ClientId $clientId -TenantId $tenantId -Authority $authority -Scopes $Scope -ClientCertificate $cert