Skip to content

Update dependency msal to v1.35.1#19

Open
renovate[bot] wants to merge 1 commit intomasterfrom
renovate/azure-ad-microsoft-authentication-library-for-python-monorepo
Open

Update dependency msal to v1.35.1#19
renovate[bot] wants to merge 1 commit intomasterfrom
renovate/azure-ad-microsoft-authentication-library-for-python-monorepo

Conversation

@renovate
Copy link
Contributor

@renovate renovate bot commented Jan 30, 2025

This PR contains the following updates:

Package Change Age Confidence
msal (changelog) 1.18.01.35.1 age confidence

Release Notes

AzureAD/microsoft-authentication-library-for-python (msal)

v1.35.1

Compare Source

What's Changed

Full Changelog: AzureAD/microsoft-authentication-library-for-python@1.35.0...1.35.1

v1.35.0

Compare Source

What's Changed

Full Changelog: AzureAD/microsoft-authentication-library-for-python@1.34.0...1.35.0

v1.34.0: MSAL Python 1.34.0

Compare Source

This release includes:

  • All the changes in 1.34.0b1, plus bumping the dependency cryptography upper bound, which also drops Python 3.7 support.
  • Officially support Python 3.13

What's Changed

New Contributors

Full Changelog: AzureAD/microsoft-authentication-library-for-python@1.32.3...1.34.0

v1.33.0: MSAL Python 1.33.0

Compare Source

Re-shipping beta release 1.33.0b1 as stable 1.33.0

Highlights

  • Managed Identity on Service Fabric supports specifying client_capabilities and claims_challenge (#​791)
  • Broker support on Linux and WSL. (#​766)
  • A byproduct of this is that broker on all platforms will support Python 3.13. (#​823)

v1.32.3: MSAL Python 1.32.3

Compare Source

Fix a regression on Azure Arc / on-prem servers. (#​814, #​815)

v1.32.2: MSAL Python 1.32.2

Compare Source

Bugfix for Authentication Failed: MsalResponse object has no attribute 'headers' #​812

v1.32.1: MSAL Python 1.32.1

Compare Source

Optimization on cache.

v1.32.0: MSAL Python 1.32.0

Compare Source

Noticeable Changes

  • New feature: Supports dSTS by ClientApplication(..., authority="https://...example.com/dstsv2/...") (#​767, #​772)
  • New feature: Start to support POD Identity, configured by env var AZURE_POD_IDENTITY_AUTHORITY_HOST=http://ip:port (#​794, #​795)
  • Bugfix: Support resource with the format of "GUID/.default" when running inside Cloud Shell. (#​784, #​785)

More details

New Contributors

Full Changelog: AzureAD/microsoft-authentication-library-for-python@1.31.1...1.32.0

v1.31.1

Compare Source

  • Bugfix: The Managed Identity detection logic on Arc (#​731) had a bug #​762, now fixed in PR #​763 

Full Changelog: AzureAD/microsoft-authentication-library-for-python@1.31.0...1.31.1

v1.31.0

Compare Source

Highlight

The Broker-on-Mac feature is also blogged here

What's Changed

  • Integration with Broker-on-Mac in #​596
  • Change Managed Identity detection logic on Arc in #​731
  • Managed Identity supports CAE in #​730
  • Support Managed Identity on Azure Container Instance (ACI) with Resource id in #​741
  • Other refactoring in #​740

Full Changelog: AzureAD/microsoft-authentication-library-for-python@1.30.0...1.31.0

v1.30.0

Compare Source

What's Changed

  • New feature: Support Subject Name/Issuer authentication when using .pfx certificate file. Documentation available in one of the recent purple boxes here. #​718
  • New feature: Automatically use SHA256 and PSS padding when using .pfx certificate on non-ADFS, non-OIDC authorities. #​722
  • New feature: Expose refresh_on (if any) to fresh or cached response, so that caller may choose to proactively call acquire_token_silent() early. #​723
  • Bugfix for token cache search. MSAL 1.27+ customers please upgrade to MSAL 1.30+. #​717

Full Changelog: AzureAD/microsoft-authentication-library-for-python@1.29.0...1.30.0

v1.29.0: MSAL Python 1.29.0

Compare Source

Highlight

The Managed Identity feature is also blogged here

What's Changed

  • New feature: Supports Managed Identity for Azure VM, App Service (including Azure Functions, Azure Automation), Service Fabric, Azure Machine Learning, Arc, etc.. Comes with a sample, its configuration via ENV VAR, and its API documentation. (#​58, #​480, #​634, #​674)
  • New feature: Support reading ConfidentialClientApplication's cert from a pfx file (#​684, #​699)
  • New feature: TokenCache class has a new search() method which will return a generator of tokens. The old find() method still exists and returns a list, but MSAL 1.27+ will not call find() anymore. (#​693, #​644)
  • Change: Re-enable the username password flow to go through broker, if available. (#​712)

New Contributors

Full Changelog: AzureAD/microsoft-authentication-library-for-python@1.28.1...1.29.0

v1.28.1: MSAL Python 1.28.1

Compare Source

  • Change: pip install msal[broker] will now pick up the latest PyMsalRuntime 0.16.x which contains a bugfix for being run as administrator. This release fixes #​707.

v1.28.0: MSAL Python 1.28.0

Compare Source

  • New feature: PublicClientApplication and ConfidentialClientApplication have a new oidc_authority parameter that can be used to specify authority of any generic OpenID Connect authority, typically the customized domain for CIAM. (#​676, #​678)
  • Dropping Python 2.7

v1.27.0: MSAL Python 1.27.0

Compare Source

What's Changed

Release Notes:

  • New feature: remove_tokens_for_client() will remove tokens acquired by acquire_token_for_client() (#​640, #​650, #​666)
  • Performance: Throughput of token-cache-hit happy path is roughly 2x faster (#​644)
  • Adjustment: MSAL no longer attempts to validate an ID token's time (#​656, #​657)
  • Adjustment: Bump upstream broker dependency to 0.14.x
  • Improvement: Better chance to remove accounts from broker (#​651)
  • Improvement: Cleaner console output when the http local server is visited in https protocol (#​546)
  • Improvement: Reduce a bare except clause (#​667)

Note:

  • The previous preview features in previous 1.27.0b2 requires more beta testing, so they did NOT make it to 1.27.0. If you want to beta test 1.27.0b2, follow its own instruction.
  • MSAL Python 1.27 is the last version that still runs on Python 2.7

New Contributors

Full Changelog: AzureAD/microsoft-authentication-library-for-python@1.26.0...1.27.0

v1.26.0: MSAL Python 1.26.0

Compare Source

  • Do not auto-detect region if app developer does not opt-in to region (#​629, #​630)
  • Support Proof-of-Possession (PoP) for Public Client based on broker (#​511)

v1.25.0: MSAL Python 1.25.0

Compare Source

  • Deprecation: allow_broker will be replaced by enable_broker_on_windows (#​613)
  • Bugfix: Device Code Flow (and Username Password Flow) and its subsequent silent request will automatically bypass broker and succeed. (#​569)
  • Enhancement: acquire_token_interactive() supports running inside Docker
  • Observability: Successful token response will contain a new token_source field to indicate where the token was obtained from: identity_provider, cache or broker. (#​610)

v1.24.1: MSAL Python 1.24.1

Compare Source

Includes minor adjustments on handling acquire_token_interactive(). The scope of the issue being addressed was limited to a short-lived sign-in attempt. The potential misuse vector complexity was high, therefore it is unlikely to be reproduced in standard usage scenarios; however, out of abundance of caution, this fix is shipped to align ourselves with Microsoft's policy of secure-by-default.

v1.24.0: MSAL Python 1.24.0

Compare Source

  • Enhancement: There may be a new msal_telemetry key available in MSAL's acquire token response, currently observed when broker is enabled. Its content and format are opaque to caller. This telemetry blob allows participating apps to collect them via telemetry, and it may help future troubleshooting. (#​575)
  • Enhancement: A new enable_pii_log parameter is added into ClientApplication constructor. When enabled, the broker component may include PII (Personal Identifiable Information) in logs. This may help troubleshooting. (#​568, #​590)

v1.23.0: MSAL Python 1.23.0

Compare Source

Improvements:

  • acquire_token_for_client() will automatically look up tokens from cache (#​577). (But all other acquire_token_...() methods still require an explicit acquire_token_silent() in order to utilize token cache.)

v1.22.0: MSAL Python 1.22.0

Compare Source

New feature:

  • Support CIAM authorities in the form of "tenant.ciamlogin.com/*" (#​520)

Known issue:
The following issues were discovered after this version's release: #​563

v1.21.0: MSAL Python 1.21.0

Compare Source

The API in this new version remains the same as the previous version.

Enhancements:

  • Support getting an ssh certificate via broker (#​515)
  • Support B2C's usage pattern of using client id as a scope (#​505, #​530)
  • MSAL's token cache helper can now be used to store tokens returned by App Service's Managed Identity (#​519)
  • Switch to a new set of regional endpoints (#​513)
  • Test matrix covers Python 3.11 (#​512)

Known issue:
The following issues were discovered after this version's release: #​563

v1.20.0: MSAL Python 1.20.0

Compare Source

New feature:

If your app uses MSAL's acquire_token_interactive(), you can now opt in to use broker on Windows platform to achieve Single-Sign-On (SSO) and also obtain more secure tokens, all without switching the log-in experience to a browser. See details in this online doc, and try it out from this sample. (#​451, #​415)

For example, after utilizing this new feature, a command-line (CLI) app's login experience would look like this:
Azure CLI new login

Known issue:

The following issues were discovered after this version's release: #​563

v1.19.0: MSAL Python 1.19.0

Compare Source

  • New feature: A new ClientApplication(..., instance_discovery=False) parameter to turn off MSAL's Instance Discovery behavior. See more details in its full documentation. Also, ADFS authority will no longer trigger Instance Discovery. (#​496)
  • Enhancement: Use provided authority port when building the tenant discovery endpoint (#​484)
  • Bugfix: Fix a regression in regional endpoint which affects MSAL Python 1.14+ (#​485)
  • Enhancement: Tolerate home_account_id to be None

Configuration

📅 Schedule: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR was generated by Mend Renovate. View the repository job log.

@renovate renovate bot force-pushed the renovate/azure-ad-microsoft-authentication-library-for-python-monorepo branch from ae26753 to 17bfb5b Compare March 13, 2025 01:23
@renovate renovate bot changed the title Update dependency msal to v1.31.1 Update dependency msal to v1.32.0 Mar 13, 2025
@renovate renovate bot force-pushed the renovate/azure-ad-microsoft-authentication-library-for-python-monorepo branch from 17bfb5b to 746fa79 Compare April 24, 2025 20:42
@renovate renovate bot changed the title Update dependency msal to v1.32.0 Update dependency msal to v1.32.1 Apr 24, 2025
@renovate renovate bot force-pushed the renovate/azure-ad-microsoft-authentication-library-for-python-monorepo branch from 746fa79 to 7d5f7b7 Compare April 25, 2025 06:54
@renovate renovate bot changed the title Update dependency msal to v1.32.1 Update dependency msal to v1.32.2 Apr 25, 2025
@renovate renovate bot force-pushed the renovate/azure-ad-microsoft-authentication-library-for-python-monorepo branch from 7d5f7b7 to fbcf92c Compare April 25, 2025 19:26
@renovate renovate bot changed the title Update dependency msal to v1.32.2 Update dependency msal to v1.32.3 Apr 25, 2025
@renovate renovate bot force-pushed the renovate/azure-ad-microsoft-authentication-library-for-python-monorepo branch from fbcf92c to 9d3c791 Compare July 23, 2025 00:28
@renovate renovate bot changed the title Update dependency msal to v1.32.3 Update dependency msal to v1.33.0 Jul 23, 2025
@renovate renovate bot force-pushed the renovate/azure-ad-microsoft-authentication-library-for-python-monorepo branch from 9d3c791 to 0c323ab Compare September 23, 2025 02:22
@renovate renovate bot changed the title Update dependency msal to v1.33.0 Update dependency msal to v1.34.0 Sep 23, 2025
@renovate renovate bot force-pushed the renovate/azure-ad-microsoft-authentication-library-for-python-monorepo branch from 0c323ab to a3ddd2d Compare February 24, 2026 13:37
@renovate renovate bot changed the title Update dependency msal to v1.34.0 Update dependency msal to v1.35.0 Feb 24, 2026
@renovate renovate bot force-pushed the renovate/azure-ad-microsoft-authentication-library-for-python-monorepo branch from a3ddd2d to b4759fd Compare March 5, 2026 01:44
@renovate renovate bot changed the title Update dependency msal to v1.35.0 Update dependency msal to v1.35.1 Mar 5, 2026
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

0 participants