Open
Conversation
ae26753 to
17bfb5b
Compare
17bfb5b to
746fa79
Compare
746fa79 to
7d5f7b7
Compare
7d5f7b7 to
fbcf92c
Compare
fbcf92c to
9d3c791
Compare
9d3c791 to
0c323ab
Compare
0c323ab to
a3ddd2d
Compare
a3ddd2d to
b4759fd
Compare
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
This PR contains the following updates:
1.18.0→1.35.1Release Notes
AzureAD/microsoft-authentication-library-for-python (msal)
v1.35.1Compare Source
What's Changed
Full Changelog: AzureAD/microsoft-authentication-library-for-python@1.35.0...1.35.1
v1.35.0Compare Source
What's Changed
Full Changelog: AzureAD/microsoft-authentication-library-for-python@1.34.0...1.35.0
v1.34.0: MSAL Python 1.34.0Compare Source
This release includes:
cryptographyupper bound, which also drops Python 3.7 support.What's Changed
New Contributors
Full Changelog: AzureAD/microsoft-authentication-library-for-python@1.32.3...1.34.0
v1.33.0: MSAL Python 1.33.0Compare Source
Re-shipping beta release 1.33.0b1 as stable 1.33.0
Highlights
client_capabilitiesandclaims_challenge(#791)v1.32.3: MSAL Python 1.32.3Compare Source
Fix a regression on Azure Arc / on-prem servers. (#814, #815)
v1.32.2: MSAL Python 1.32.2Compare Source
Bugfix for Authentication Failed: MsalResponse object has no attribute 'headers' #812
v1.32.1: MSAL Python 1.32.1Compare Source
Optimization on cache.
v1.32.0: MSAL Python 1.32.0Compare Source
Noticeable Changes
ClientApplication(..., authority="https://...example.com/dstsv2/...")(#767, #772)AZURE_POD_IDENTITY_AUTHORITY_HOST=http://ip:port(#794, #795)More details
allow MI endpoint changing through environment variable by @jimdigriz in #754SystemAssignedmanaged identity by @jiasli in #764New Contributors
Full Changelog: AzureAD/microsoft-authentication-library-for-python@1.31.1...1.32.0
v1.31.1Compare Source
Full Changelog: AzureAD/microsoft-authentication-library-for-python@1.31.0...1.31.1
v1.31.0Compare Source
Highlight
The Broker-on-Mac feature is also blogged here
What's Changed
Full Changelog: AzureAD/microsoft-authentication-library-for-python@1.30.0...1.31.0
v1.30.0Compare Source
What's Changed
refresh_on(if any) to fresh or cached response, so that caller may choose to proactively callacquire_token_silent()early. #723Full Changelog: AzureAD/microsoft-authentication-library-for-python@1.29.0...1.30.0
v1.29.0: MSAL Python 1.29.0Compare Source
Highlight
The Managed Identity feature is also blogged here
What's Changed
ConfidentialClientApplication's cert from a pfx file (#684, #699)search()method which will return a generator of tokens. The oldfind()method still exists and returns a list, but MSAL 1.27+ will not callfind()anymore. (#693, #644)New Contributors
Full Changelog: AzureAD/microsoft-authentication-library-for-python@1.28.1...1.29.0
v1.28.1: MSAL Python 1.28.1Compare Source
pip install msal[broker]will now pick up the latest PyMsalRuntime 0.16.x which contains a bugfix for being run as administrator. This release fixes #707.v1.28.0: MSAL Python 1.28.0Compare Source
PublicClientApplicationandConfidentialClientApplicationhave a newoidc_authorityparameter that can be used to specify authority of any generic OpenID Connect authority, typically the customized domain for CIAM. (#676, #678)v1.27.0: MSAL Python 1.27.0Compare Source
What's Changed
Release Notes:
remove_tokens_for_client()will remove tokens acquired byacquire_token_for_client()(#640, #650, #666)exceptclause (#667)Note:
1.27.0b2requires more beta testing, so they did NOT make it to1.27.0. If you want to beta test1.27.0b2, follow its own instruction.New Contributors
Full Changelog: AzureAD/microsoft-authentication-library-for-python@1.26.0...1.27.0
v1.26.0: MSAL Python 1.26.0Compare Source
v1.25.0: MSAL Python 1.25.0Compare Source
allow_brokerwill be replaced byenable_broker_on_windows(#613)acquire_token_interactive()supports running inside Dockertoken_sourcefield to indicate where the token was obtained from:identity_provider,cacheorbroker. (#610)v1.24.1: MSAL Python 1.24.1Compare Source
Includes minor adjustments on handling acquire_token_interactive(). The scope of the issue being addressed was limited to a short-lived sign-in attempt. The potential misuse vector complexity was high, therefore it is unlikely to be reproduced in standard usage scenarios; however, out of abundance of caution, this fix is shipped to align ourselves with Microsoft's policy of secure-by-default.
v1.24.0: MSAL Python 1.24.0Compare Source
msal_telemetrykey available in MSAL's acquire token response, currently observed when broker is enabled. Its content and format are opaque to caller. This telemetry blob allows participating apps to collect them via telemetry, and it may help future troubleshooting. (#575)enable_pii_logparameter is added intoClientApplicationconstructor. When enabled, the broker component may include PII (Personal Identifiable Information) in logs. This may help troubleshooting. (#568, #590)v1.23.0: MSAL Python 1.23.0Compare Source
Improvements:
acquire_token_for_client()will automatically look up tokens from cache (#577). (But all otheracquire_token_...()methods still require an explicitacquire_token_silent()in order to utilize token cache.)v1.22.0: MSAL Python 1.22.0Compare Source
New feature:
Known issue:
The following issues were discovered after this version's release: #563
v1.21.0: MSAL Python 1.21.0Compare Source
The API in this new version remains the same as the previous version.
Enhancements:
Known issue:
The following issues were discovered after this version's release: #563
v1.20.0: MSAL Python 1.20.0Compare Source
New feature:
If your app uses MSAL's
acquire_token_interactive(), you can now opt in to use broker on Windows platform to achieve Single-Sign-On (SSO) and also obtain more secure tokens, all without switching the log-in experience to a browser. See details in this online doc, and try it out from this sample. (#451, #415)For example, after utilizing this new feature, a command-line (CLI) app's login experience would look like this:

Known issue:
The following issues were discovered after this version's release: #563
v1.19.0: MSAL Python 1.19.0Compare Source
ClientApplication(..., instance_discovery=False)parameter to turn off MSAL's Instance Discovery behavior. See more details in its full documentation. Also, ADFS authority will no longer trigger Instance Discovery. (#496)Configuration
📅 Schedule: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined).
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR was generated by Mend Renovate. View the repository job log.