Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Bump Microsoft.Identity.Client from 4.10.0 to 4.35.1 in /src/02-Corporate #94

Open
wants to merge 1 commit into
base: master
Choose a base branch
from

Conversation

dependabot-preview[bot]
Copy link
Contributor

Bumps Microsoft.Identity.Client from 4.10.0 to 4.35.1.

Release notes

Sourced from Microsoft.Identity.Client's releases.

4.35.1

Bug Fixes:

Fixed a race condition in confidential client requests when an authority with a different tenant is specified for each request. See issue #2798.
Fix to correctly propagate EnableCacheSynchronization flag from ConfidentialClientApplicationOptions. See pull request #2801.

4.35.0

Bug Fixes:

  • AcquireTokenByIntegratedWindowsAuth against ADFS provides clearer error message Error messages have been udpated. See issue #2752

  • MSAL no longer performs instance discovery on well known authorities. This will improve performance for customers in regional scenarios See issue #2777

  • MSAL uses preferred_network name on sovereign clouds. Skipping discovery will improve the performance. See issue #2778

  • Error messages in Integrated Windows Authentication are now clearer. The following message related issues are fixed

  • ConfidentialClientApplicationBuilder with auto region discovery no longer throws UriFormatException. This has been fixed by validating region string. See issue #2772

  • Memory leak in AuthorityEndpoint caching has been fixed. This will reduce memory leaks in the apps. See issue #2770

  • ADFS now has consistent values for UserName between STS and cache.. Tenant profiles will provide the consistency. #1559

  • MSAL.NET would throw an ArgumentNullException if the provided CcsRoutingHint was null, now authentication will proceed forward as providing the hint is for resiliency and should not prevent sign-in. See issue #2755

  • The mismtached authorities were throwing exceptions. MSAL now does instance discovery to find the right match. See issue #2736

  • WebView2 was throwing error when KeyDown was handled. This error has been removed. See issue #2685

  • Instance discovery was being performed multiple times on non-public non-sovereign clouds. You will get better performance as now it does discovery only if it is not in the cache. See issue #2701

  • RemoveAsync(account) in confidential client apps now returns suggested web cache key. Empty key is no longer returned. #2643

  • Invalid syntax in XML comments for NoPromptFailedError and NoTokensFoundError has now been fixed. See issue #2756

New Features

  • Limits on URL length in embedded browsers was causing errors with auth code. Applications will not fail on the embedded browers due to the limitation. See issue #2743

  • IAccount now provides Tenant profile for each ID token. This will enable customers to get ID tokens in the authentication results. See issue #2583

4.34.0

Bug Fixes:

MSAL now has WithCcsRoutingHint() to enable developers to more easily provide the CCS routing hint during authentication. See issue 2725

... (truncated)

Changelog

Sourced from Microsoft.Identity.Client's changelog.

4.35.1

Bug Fixes:

Fixed a race condition in confidential client requests when an authority with a different tenant is specified for each request. See issue #2798.
Fix to correctly propagate EnableCacheSynchronization flag from ConfidentialClientApplicationOptions. See pull request #2801.

4.35.0

Bug Fixes:

AcquireTokenByIntegratedWindowsAuth provides better error messages. Error messages are now more actionable. See issue #2752

MSAL no longer performs instance discovery on well known authorities. This will improve performance for customers in regional scenarios See issue #2777

MSAL uses preferred_network name on sovereign clouds. Skipping discovery will improve the performance. See issue #2778

Error messages in Integrated Windows Authentication are now clearer. The following message related issues are fixed - #2731 - #2752

ConfidentialClientApplicationBuilder with auto region discovery no longer throws UriFormatException. This has been fixed by validating region string. See issue #2772

Memory leak in AuthorityEndpoint caching has been fixed. This will reduce memory leaks in the apps. See issue #2770

ADFS now has consistent values for UserName between STS and cache.. Tenant profiles will provide the consistency. #1559

MSAL.NET no longer throws ArgumentNullException when the parameters for WithCcsRoutingHint() are null. Authentication will now proceed as if not hint was provided. See issue #2755

MSAL no longer throws exceptions for mismatched authorities if they are known aliases. MSAL now ensures authorities configured in the application and request are not aliased before throwing. See issue #2736

WebView2 was throwing error when KeyDown was handled. This error has been removed. See issue #2685

Instance discovery was performed multiple times on non-public non-sovereign clouds. MSAL provides improved performance as it now only performs discovery when needed. See issue #2701

RemoveAsync(account) in confidential client apps now returns suggested web cache key. Empty key is no longer returned. #2643

Invalid syntax in XML comments for NoPromptFailedError and NoTokensFoundError has now been fixed. See issue #2756

New Features

Limits on URL length in embedded browsers was causing errors with auth code. Applications will not fail on the embedded browers due to the limitation. See issue #2743

IAccount now provides Tenant profile for each ID token. This will enable customers to get ID tokens in the authentication results. See issue #2583

4.34.0

Bug Fixes:

MSAL now has WithCcsRoutingHint() to enable developers to more easily provide the CCS routing hint during authentication. See issue 2725

New Features

MSAL.NET provides helper methods to extract the authentication parameters from the WWW-Authenticate headers. This allows for dynamic scenarios such as claim challenge, Conditional Access Evaluation and Conditional Access authentication context scenarios. See https://aka.ms/msal-net/wwwAuthenticate and issue #2679 for details. WAM support is now generally available in MSAL.NET. WithExperimentalFeatures() is no longer required to authenticate with WAM. See https://aka.ms/msal-net-wam for more details

... (truncated)

Commits

Dependabot compatibility score

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options

You can trigger Dependabot actions by commenting on this PR:

  • @dependabot rebase will rebase this PR
  • @dependabot recreate will recreate this PR, overwriting any edits that have been made to it
  • @dependabot merge will merge this PR after your CI passes on it
  • @dependabot squash and merge will squash and merge this PR after your CI passes on it
  • @dependabot cancel merge will cancel a previously requested merge and block automerging
  • @dependabot reopen will reopen this PR if it is closed
  • @dependabot close will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually
  • @dependabot ignore this major version will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this minor version will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this dependency will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)
  • @dependabot use these labels will set the current labels as the default for future PRs for this repo and language
  • @dependabot use these reviewers will set the current reviewers as the default for future PRs for this repo and language
  • @dependabot use these assignees will set the current assignees as the default for future PRs for this repo and language
  • @dependabot use this milestone will set the current milestone as the default for future PRs for this repo and language
  • @dependabot badge me will comment on this PR with code to add a "Dependabot enabled" badge to your readme

Additionally, you can set the following in your Dependabot dashboard:

  • Update frequency (including time of day and day of week)
  • Pull request limits (per update run and/or open at any time)
  • Out-of-range updates (receive only lockfile updates, if desired)
  • Security updates (receive only security updates, if desired)

@dependabot-preview dependabot-preview bot added the dependencies Pull requests that update a dependency file label Aug 2, 2021
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
dependencies Pull requests that update a dependency file
Projects
None yet
Development

Successfully merging this pull request may close these issues.

0 participants