This repository has been archived by the owner on Jun 30, 2023. It is now read-only.
Releases: AzureAD/azure-activedirectory-library-for-dotnet
Releases · AzureAD/azure-activedirectory-library-for-dotnet
MSAL.NET Version 2.5.0-preview
2.5.0-preview
- Improved the testability of apps using MSAL.NET: MSAL.NET was not easily mockable because the AuthenticationResult was an immutable sealed class with no public constructors. AuthenticationResult now has a public constructor for testing. MSAL issue #682
- Improved support for Azure AD B2C: apps constructors now understand to b2clogin.com based authorities, Developer no longer needs to set ValidateAuthority=false, as the library handles this now. MSAL issue #686
- GetAccountsAsync() can now be called when the device / computer is offline. It was making a network call to the instance discovery endpoint to determine the environments (equivalent clouds base URLs) for caching, which meant GetAccountsAsync() did not work off-line. This has been fixed and GetAccountsAsync() is not dependent on a network call and works off-line. MSAL issue #630
MSAL.NET Version 2.4.1-preview
Fix performance issue [1406] for degredation in .NET Framework compared to .NET Core
ADAL.NET Version 4.4.0
Version 4.4.0
-Improvements and fixes to the token cache
- The serialized token cache can now be shared by different applications, therefore providing SSO if the same user signs-in in both applications
- See PR and MSAL Issue #653
- On .NET Core, the Token cache was shared by all instances of applications in memory. This is now fixed (See MSAL.NET issue #656 and PR)
- Fixes consistency issues for advanced token cache migration scenarios from ADAL v3.x to ADAL v4.x to MSAL v2.x
- Cache lookups were optimized. Work done in conjunction with ADAL.iOS and MSAL.iOS native) PR
- The ExtraQueryParameter environment variable is now read on ADAL for the .NET Core platform, as was already the case in the .NET Framework case ADAL issue #1362
- A Client credential API which should not be used on Xamarin.iOS, Xamarin.Android and UWP is now marked as obsolete
MSAL.NET Version 2.4.0-preview
2.4.0-preview
Improvements and fixes to the token cache
- The serialized token cache can now be shared by different applications, therefore providing SSO if the same user signs-in in both applications
- See PR and MSAL Issue #653
- On .NET Core, the Token cache was shared by all instances of applications in memory. This is now fixed (See MSAL.NET issue #656 and PR)
- Fixes consistency issues for advanced token cache migration scenarios from ADAL v3.x to ADA v4.x to MSAL v2.x
- Cache lookups were optimized. Work done in conjunction with ADAL.iOS and MSAL.iOS native) PR
More browsers are now supported on Xamarin.Android when you choose to use system web browsers.
- Removed chrome dependency for system browser on Android devices. See https://aka.ms/msal-net-system-browsers for more information. MSAL issue #664
Azure AD B2C improvement
- Add support for b2clogin.com for b2c authorities MSAL issue #669 #632
MSAL.NET Version 2.3.1-preview
2.3.1-preview
This hotfix release includes:
- Fix for device code flow where server is now expecting device_code as the body parameter. MSAL issue #658
ADAL.NET Version 4.3.0
Version 4.3.0
This release includes:
- Fix for cross-thread exception when setting the ownerWindow in PlatformParameters ADAL issue #1277
- Ensure error codes are public MSAL issue
- Device code flow enabled for ADFS
MSAL.NET Version 2.3.0-preview
2.3.0-preview
This release includes:
- Fix for cross-thread exception when setting the ownerWindow ADAL issue #1277
- Ensure error codes are public MSAL issue #638
- Add device code flow api to iOS and Android platforms MSAL issue #642
MSAL.NET Version 2.2.1-preview
2.2.1-preview
This release contains bug fixes on top of MSAL 2.2.0-preview:
- Due to static initialization, there was a race condition which appeared randomly. MSAL issue #629
- For iOS, TeamId is now accessible when the device is locked. MSAL issue #626
- For iOS, MSAL returns a useful error message, and an aka.ms link, when keychain access groups have not been set in the Entitlements.plist. MSAL issue #633
- Cache serialization for .NetCore
- Improve logging for device code flow to handle "authorization_pending" exceptions as info messages MSAL issue #631
ADAL.NET Version 4.2.0-preview
Version 4.2.0-preview
This release includes:
- Due to static initialization, there was a race condition which appeared randomly. MSAL issue #629
- Improved error messages and inclusion of an aka.ms link for broker redirect error. ADAL issue #601
- For iOS, a clear exception message is now returned when the application is not able to access keychain, with instructions. See https://aka.ms/msal-net-enable-keychain-access for details. MSAL issue #611
- For iOS, TeamId is now accessible when the device is locked. MSAL issue #626
- For iOS, MSAL returns a useful error message, and an aka.ms link, when keychain access groups have not been set in the Entitlements.plist. MSAL issue #633
- UWP cache fix. The key of the storage on UWP should be 255 characters or less. When using several scopes the key could exceed 255 characters. Now hashing scopes and environment on UWP. 612
- Removal of double-logging in log files and callbacks. #1289
MSAL.NET Version 2.2.0-preview
MSAL.NET Version 2.2.0-preview
- MSAL.NET 2.2.0 now supports Device Code Flow. For details see https://aka.ms/msal-device-code-flow
- Xamarin.iOS applications using the system web view now benefit from the integration with SFAuthenticationSession for iOS11 and ASWebAuthenticationSession for iOS12+ MSAL issue 489
- A clear MsalClientException message is now returned when the application is not able to access keychain, with instructions. See https://aka.ms/msal-net-enable-keychain-access for details.
- Removed double-logging in log files and callbacks. #1289
- Improved 429 server error handling by exposing the Http Response headers in MsalServiceException. See https://aka.ms/msal-net-retry-after
- UWP cache fix. The key of the storage on UWP should be 255 characters or less. When using several scopes the key could exceed 255 characters. Now hashing scopes and environment on UWP. 612