Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
This PR contains the following updates:
1.18.0
->1.31.1
Release Notes
AzureAD/microsoft-authentication-library-for-python (msal)
v1.31.1
Compare Source
Full Changelog: AzureAD/microsoft-authentication-library-for-python@1.31.0...1.31.1
v1.31.0
Compare Source
What's Changed
Full Changelog: AzureAD/microsoft-authentication-library-for-python@1.30.0...1.31.0
v1.30.0
Compare Source
What's Changed
refresh_on
(if any) to fresh or cached response, so that caller may choose to proactively callacquire_token_silent()
early. https://github.com/AzureAD/microsoft-authentication-library-for-python/pull/723Full Changelog: AzureAD/microsoft-authentication-library-for-python@1.29.0...1.30.0
v1.29.0
: MSAL Python 1.29.0Compare Source
What's Changed
ConfidentialClientApplication
's cert from a pfx file (#684, #699)search()
method which will return a generator of tokens. The oldfind()
method still exists and returns a list, but MSAL 1.27+ will not callfind()
anymore. (#693, #644)New Contributors
Full Changelog: AzureAD/microsoft-authentication-library-for-python@1.28.1...1.29.0
v1.28.1
: MSAL Python 1.28.1Compare Source
pip install msal[broker]
will now pick up the latest PyMsalRuntime 0.16.x which contains a bugfix for being run as administrator. This release fixes #707.v1.28.0
: MSAL Python 1.28.0Compare Source
PublicClientApplication
andConfidentialClientApplication
have a newoidc_authority
parameter that can be used to specify authority of any generic OpenID Connect authority, typically the customized domain for CIAM. (#676, #678)v1.27.0
: MSAL Python 1.27.0Compare Source
What's Changed
Release Notes:
remove_tokens_for_client()
will remove tokens acquired byacquire_token_for_client()
(#640, #650, #666)except
clause (#667)Note:
1.27.0b2
requires more beta testing, so they did NOT make it to1.27.0
. If you want to beta test1.27.0b2
, follow its own instruction.New Contributors
Full Changelog: AzureAD/microsoft-authentication-library-for-python@1.26.0...1.27.0
v1.26.0
: MSAL Python 1.26.0Compare Source
v1.25.0
: MSAL Python 1.25.0Compare Source
allow_broker
will be replaced byenable_broker_on_windows
(#613)acquire_token_interactive()
supports running inside Dockertoken_source
field to indicate where the token was obtained from:identity_provider
,cache
orbroker
. (#610)v1.24.1
: MSAL Python 1.24.1Compare Source
Includes minor adjustments on handling acquire_token_interactive(). The scope of the issue being addressed was limited to a short-lived sign-in attempt. The potential misuse vector complexity was high, therefore it is unlikely to be reproduced in standard usage scenarios; however, out of abundance of caution, this fix is shipped to align ourselves with Microsoft's policy of secure-by-default.
v1.24.0
: MSAL Python 1.24.0Compare Source
msal_telemetry
key available in MSAL's acquire token response, currently observed when broker is enabled. Its content and format are opaque to caller. This telemetry blob allows participating apps to collect them via telemetry, and it may help future troubleshooting. (#575)enable_pii_log
parameter is added intoClientApplication
constructor. When enabled, the broker component may include PII (Personal Identifiable Information) in logs. This may help troubleshooting. (#568, #590)v1.23.0
: MSAL Python 1.23.0Compare Source
Improvements:
acquire_token_for_client()
will automatically look up tokens from cache (#577). (But all otheracquire_token_...()
methods still require an explicitacquire_token_silent()
in order to utilize token cache.)v1.22.0
: MSAL Python 1.22.0Compare Source
New feature:
Known issue:
The following issues were discovered after this version's release: #563
v1.21.0
: MSAL Python 1.21.0Compare Source
The API in this new version remains the same as the previous version.
Enhancements:
Known issue:
The following issues were discovered after this version's release: #563
v1.20.0
: MSAL Python 1.20.0Compare Source
New feature:
If your app uses MSAL's
acquire_token_interactive()
, you can now opt in to use broker on Windows platform to achieve Single-Sign-On (SSO) and also obtain more secure tokens, all without switching the log-in experience to a browser. See details in this online doc, and try it out from this sample. (#451, #415)For example, after utilizing this new feature, a command-line (CLI) app's login experience would look like this:
Known issue:
The following issues were discovered after this version's release: #563
v1.19.0
: MSAL Python 1.19.0Compare Source
ClientApplication(..., instance_discovery=False)
parameter to turn off MSAL's Instance Discovery behavior. See more details in its full documentation. Also, ADFS authority will no longer trigger Instance Discovery. (#496)Configuration
📅 Schedule: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined).
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR was generated by Mend Renovate. View the repository job log.