Bump the all-dependencies group with 4 updates#2074
Closed
dependabot[bot] wants to merge 1 commit into
Closed
Conversation
Bumps Azure.Identity from 1.8.0 to 1.21.0 Bumps Microsoft.AspNetCore.SpaServices from 3.1.31 to 3.1.32 Bumps Microsoft.AspNetCore.SpaServices.Extensions from 6.0.11 to 6.0.36 Bumps Microsoft.Identity.Client from 4.48.0 to 4.84.0 --- updated-dependencies: - dependency-name: Azure.Identity dependency-version: 1.21.0 dependency-type: direct:production update-type: version-update:semver-minor dependency-group: all-dependencies - dependency-name: Microsoft.AspNetCore.SpaServices dependency-version: 3.1.32 dependency-type: direct:production update-type: version-update:semver-patch dependency-group: all-dependencies - dependency-name: Microsoft.AspNetCore.SpaServices.Extensions dependency-version: 6.0.36 dependency-type: direct:production update-type: version-update:semver-patch dependency-group: all-dependencies - dependency-name: Microsoft.Identity.Client dependency-version: 4.84.0 dependency-type: direct:production update-type: version-update:semver-minor dependency-group: all-dependencies ... Signed-off-by: dependabot[bot] <support@github.com>
Author
|
Superseded by #2110. |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
Updated Azure.Identity from 1.8.0 to 1.21.0.
Release notes
Sourced from Azure.Identity's releases.
1.16.0
1.16.0 (2026-05-01)
Features Added
NetAppBucketResourceand related bucket models, including credential generation and Key Vault integration support.NetAppCacheResourcefor NetApp cache scenarios.NetAppSecretPasswordmodel and Key Vault-backed credential models (e.g.,CertificateKeyVaultDetails,CredentialsKeyVaultDetails,EntraIdKeyVaultConfig,EntraIdKeyVaultConfigPatch).NetAppDayOfWeekenum and additional supporting models and enums (e.g., file system user, NFS user, SMB settings, peering passphrases, origin cluster information, change-zone content; policy/encryption/credential/breakthrough/volume-size/snapshot/Kerberos/global-file-locking/large-volume/SMB-encryption/CIFS-change-notify/write-back/LDAP/certificate-conflict/snapshot-directory-visibility/external-replication enums).1.12.0
1.12.0 (2026-05-12)
Features Added
CredentialSettings.this[string key]indexer for reading custom properties from the credential configuration section.Other Changes
AuthenticationPolicy.Createno longer throws when an ApiKey credential section carries aScopevalue;Scopeis ignored for ApiKey auth.1.11.0
1.11.0 (2026-05-05)
Features Added
CredentialResolverabstract class — an extensibility hook that lets credential providers participate in the configuration-driven credential resolution pipeline. Resolvers are invoked in registration order until one produces anAuthenticationTokenProviderfor a given configuration section.IConfiguration.GetCredential(...)extension overloads onConfigurationExtensionsthat walk a chain ofCredentialResolverinstances against a named credential section, with optionalconfigureOverridesto mutate the section in-flight.IConfiguration.GetClientSettings<T>(...)extension overloads that bind aClientSettings-derived type and resolve itsCredentialvia the resolver chain.AddCredentialResolver<T>extension methods onIServiceCollectionandIHostApplicationBuilderthat register aCredentialResolveronce per implementation type (idempotent).AddClient<TClient, TSettings>/AddKeyedClient<TClient, TSettings>paths now auto-resolve credentials from the registered resolver chain, so callers no longer need to wire up provider-specific helpers likeWithAzureCredentialexplicitly when a resolver is registered.AuthenticationTokenProviderinstance.Breaking Changes
IClientBuilderno longer inherits fromIHostApplicationBuilder. The internalClientBuilderimplementation now uses composition instead of inheritance.PostConfigurereturn type changed fromIHostApplicationBuildertoIClientBuilder.AddClientandAddKeyedClientcontinue to returnIClientBuilder.Commits viewable in compare view.
Updated Microsoft.AspNetCore.SpaServices from 3.1.31 to 3.1.32.
Release notes
Sourced from Microsoft.AspNetCore.SpaServices's releases.
No release notes found for this version range.
Commits viewable in compare view.
Updated Microsoft.AspNetCore.SpaServices.Extensions from 6.0.11 to 6.0.36.
Release notes
Sourced from Microsoft.AspNetCore.SpaServices.Extensions's releases.
6.0.36
Release
What's Changed
ecc4e18to9511905by @dependabot in [release/6.0] (deps): Bump src/submodules/MessagePack-CSharp fromecc4e18to9511905dotnet/aspnetcore#58186ff233bdto6dae7ebby @dependabot in [release/6.0] (deps): Bump src/submodules/googletest fromff233bdto6dae7ebdotnet/aspnetcore#58185Full Changelog: dotnet/aspnetcore@v6.0.35...v6.0.36
6.0.35
Release
6.0.33
Release
6.0.32
Release
6.0.31
Release
6.0.30
Release
6.0.29
Release
6.0.28
Release
6.0.26
Release
6.0.25
Release
What's Changed
8a6feabtoe47544aby @dependabot in [release/6.0] (deps): Bump src/submodules/googletest from8a6feabtoe47544adotnet/aspnetcore#51049DragDrop_CanTrigger()flakiness by @MackinnonBuck in [release/6.0] FixDragDrop_CanTrigger()flakiness dotnet/aspnetcore#51142Full Changelog: dotnet/aspnetcore@v6.0.24...v6.0.25
6.0.24
Release
6.0.23
Release
6.0.22
Release
6.0.21
Release
Commits viewable in compare view.
Updated Microsoft.Identity.Client from 4.48.0 to 4.84.0.
Release notes
Sourced from Microsoft.Identity.Client's releases.
4.83.3
New Features
IByUserFederatedIdentityCredentialinterface anduser_ficgrant type. #5802Changes
Bug Fixes
HttpListenerInterceptor.csto ensure the full response is properly closed. #5478Infrastructure & Dependencies
Microsoft.Identity.Lab.API. #58644.83.1
Bug Fixes
4.83.0
New Features
Changes
Bug Fixes
GetManagedIdentitySourceAsync()is explicitly invoked #5815expires_onfield in attestation tokens for better token lifecycle management #5741ValidateCachedTokenAsyncto work properly with multiple APIs beyond the initial scope #5764IAuthenticationOperationandWithAuthenticationExtension#5699ICustomWebUidocumentation #5704Infrastructure & Dependencies
4.82.1
Bug Fixes
Changes
4.82.0
4.82.0
Highlights
This release expands extensibility for confidential-client authentication (certificates + client assertions), adds additional sovereign cloud environments, and hardens security-sensitive flows (mTLS PoP and system browser auth) with clearer validation and safer defaults.
Features
CertificateOptionsand updatedWithCertificateextensibility APIs to accept it, including support for passingsendX5Cconfiguration through the options model. (#5655)WithExtraClientAssertionClaimsonAcquireTokenForClientParameterBuilderto enable supplying additional signed claims in client assertions (intended for advanced scenarios and higher-level libraries). (#5650)login.*hosts. (#5684)response_mode=form_postsupport for the default system browser (loopback) flow. MSAL will enforceform_postand process the authorization response from POST data. (#5678)Changes
Microsoft.Identity.Client.MtlsPoprenamed toMicrosoft.Identity.Client.KeyAttestation(assembly/package naming update). (#5653)4.81.0
What's Changed
Full Changelog: AzureAD/microsoft-authentication-library-for-dotnet@4.80.0...4.81.0
4.80.0
Features
Changes
Bug Fixes
4.79.2
What's Changed
Full Changelog: AzureAD/microsoft-authentication-library-for-dotnet@4.79.0...4.79.2
4.79.0
What's Changed
IMsalMtlsHttpClientFactoryinterface public by @cpp11nullptr in MakeIMsalMtlsHttpClientFactoryinterface public AzureAD/microsoft-authentication-library-for-dotnet#5559Full Changelog: AzureAD/microsoft-authentication-library-for-dotnet@4.78.0...4.79.0
4.78.0
Changes
Bug Fixes
4.77.1
What's Changed
Full Changelog: AzureAD/microsoft-authentication-library-for-dotnet@4.77.0...4.77.1
4.77.0
Features
Changes
x-client-osas a query parameter in the authorization URI. Remove passing x-client-os as query param in authorization uri AzureAD/microsoft-authentication-library-for-dotnet#5456Microsoft.IdentityModel.Abstractionsto a supported version. Bump Microsoft.IdentityModel.Abstractions as current version is out o… AzureAD/microsoft-authentication-library-for-dotnet#5452Bug fixes
4.76.0
What's Changed
ExperimentalFeaturesflag onWithMtlsProofOfPossessionAPI: by @gladjohn in Removal ofExperimentalFeaturesflag onWithMtlsProofOfPossessionAPI: AzureAD/microsoft-authentication-library-for-dotnet#5402New Contributors
Full Changelog: AzureAD/microsoft-authentication-library-for-dotnet@4.74.1...4.76.0
4.74.1
Bug fixes
When you configure MSAL with WithOidcAuthority(), the library now confirms that the issuer returned by the OIDC discovery endpoint matches the expected authority (including CIAM patterns) and throws an exception if it does not. Add issuer validation when making call to OIDC endpoint AzureAD/microsoft-authentication-library-for-dotnet#5358
Re-expose public AuthenticationResult constructor. A public, test-friendly constructor of AuthenticationResult was inadvertently hidden behind [Obsolete] and [EditorBrowsable(Never)]. The constructor is now publicly available again. [Bug] AuthenticationResult has no public constructor AzureAD/microsoft-authentication-library-for-dotnet#5392
4.74.0
Features
Bug fixes
4.73.1
What's Changed
Full Changelog: AzureAD/microsoft-authentication-library-for-dotnet@4.73.0...4.73.1
4.73.0
What's Changed
Full Changelog: AzureAD/microsoft-authentication-library-for-dotnet@4.72.1...4.73.0
4.72.1
4.72.1
Bug Fixes
Full Changelog: AzureAD/microsoft-authentication-library-for-dotnet@4.72.0...4.72.1
4.72.0
4.72.0
Features
Bug Fixes
4.71.1
Bug Fixes
Full Changelog: AzureAD/microsoft-authentication-library-for-dotnet@4.71.0...4.71.1
4.71.0
Bug Fixes
httpClientfrom the factory with ssl validation callback. See Issue #5220Full changelog: 4.70.2 .. 4.71.0
4.70.2
What's Changed
Full Changelog: AzureAD/microsoft-authentication-library-for-dotnet@4.70.1...4.70.2
4.70.1
What's Changed
Full Changelog: AzureAD/microsoft-authentication-library-for-dotnet@4.70.0...4.70.1
4.70.0
Features
TokenCacheNotificationArgs.NoDistributedCacheUseReasonin order to indicate that the configured serialized cache should not be a distributed cache to prevent issues when acquiring tokens. Issue #5199Bug Fixes
4.69.1
4.69.1
Features
WithCertificate(..., bool associateTokensWithCertificateSerialNumber)overload to enable the use of the certificate's serial number as part of the cache key for tokens. Issue #5150Bug Fixes
4.68.0
Features
Bug Fixes
UseShellExecutetofalsein OpenLinuxBrowser. See Issue #50754.67.2
Bug Fixes
4.67.1
Bug Fixes
4.67.0
New Features
Bug Fixes
AuthenticationResultMetadatadiffered from Stopwatch measurements. See Bug #4895AbstractAcquireTokenParameterBuilder<T>.WithAdfsAuthoritythrew exceptions when the tenant ID was null and the authority host URI ended in /adfs. See Bug #4860Deprecated
4.66.2
4.66.2
Bug Fixes
4.66.1
Bug Fixes
4.66.0
4.66.0
New Features
IAuthenticationOperation. This allows for custom extensions in the authentication flow by providing an authentication operation interface. See Issue #4956(e.g., MSAL_FORCE_REGION=eastus). This automatically directs MSAL to use the specified region for token acquisition. If the region is explicitly set to"DisableMsalForceRegion", MSAL will not opt-in to regional ESTS. Use of theWithAzureRegion(xyz)API takes precedence over the environment variable. See Issue #49304.65.2-Preview
4.65.0
New Features
.WithClaims()and.WithClientCapabilities()APIs are now generally available. See Issue #4921Bug Fixes
.WithTenantIdFromAuthority(). See Issue #49274.64.1
4.64.0
4.64.0
New Features
Bug Fixes
4.63.0
New Features
Bug Fixes
4.62.0
New Features
WithClientTelemetryandlast_telemetry header. See Issue #4815Bug Fixes
TotalDurationInMsfor linux platform. See Issue #47844.61.3
Bug Fixes
4.61.2
Bug Fixes
4.61.1
New Features
Bug Fixes
4.61.0
4.61.0
New Features
monoandroid12.0andxamarinios10binaries. Existing applications should migrate to modern frameworks like .NET MAUI. See 4715 and Announcing the Upcoming Deprecation of MSAL.NET for Xamarin and UWP.uap10.0.17763binary. Existing applications should migrate to modern frameworks like WinUI 3. See 4717 and Announcing the Upcoming Deprecation of MSAL.NET for Xamarin and UWP.Microsoft.Identity.Client, which will no longer includenet6.0-windows7.0binary. Existing desktop applications targetingnet6.0-windowsshould referenceMicrosoft.Identity.Client.Brokerwhen using interactive authentication with Windows Broker and callWithBroker(BrokerOptions); or referenceMicrosoft.Identity.Client.Desktopwhen authenticating with browser and callWithWindowsEmbeddedBrowserSupport(). There are no changes to the usage of the system browser. See 4468.Bug Fixes
TicketCacheWriterandTicketCacheReaderwere corrected to be internal. Public API inKerberosSupplementalTicketManagershould be used. See #4726.4.60.3
Bug Fixes
Updated Android webview attribute.
4.60.2
Bug Fixes
When
OnBeforeTokenRequestextensibility API is used, MSAL now correctly uses the user-providedOnBeforeTokenRequestData.RequestUrito set the token request endpoint. See 4701.4.60.1
Addressed an issue where attempts to acquire a token via certificate authentication resulted in a
Microsoft.Identity.Client.MsalServiceException (Error code: AADSTS5002730), signaling an "Invalid JWT token. Unsupported key for the signing algorithm."This was due to a known bug in Microsoft Entra ID (Azure AD) that affects the handling of JWT tokens signed with certain algorithms, specifically SHA2 and PSS. See 46904.60.0
New Features
Bug Fixes
4.59.1
Bug Fixes
Updated Android webview attribute.
4.59.0
New Features
monoandroid90andmonoandroid10.0binaries and instead includemonoandroid12.0. Xamarin.Android apps should now target framework version 12 (corresponding to Android API level 31) or above. See 3530.net45binary. Existing applications should target at least .NET 4.6.2. See 4314.Bug Fixes
MsalServiceExceptioninstead ofMsalManagedIdentityExceptionin managed identity flows. See 4483.SemaphoreFullExceptionhappening in managed identity flows. See 4472.4.58.1
New Features
WithForceRefreshsupport for silent flows using the Windows broker. See 4457.Bug Fixes
x-ms-pkeyauthHTTP header was incorrectly sent on Mac and Linux platforms. See 4445.4.58.0
New Features
net461binary. Existing .NET 4.6.1 apps will now reference .NET Standard 2.0 MSAL binary. See 4315.Bug Fixes
AcquireTokenSilentcalls. See 4395.WithAuthorityon the request builders. Set the authority on the application builders. UseWithTenantIdorWithTenantIdFromAuthorityon the request builder to update the tenant ID. See 4406.4.57.0
New Features
netcoreapp2.1binary. Existing .NET Core 2.1 apps will now reference .NET Standard 2.0 MSAL binary. See 4313.x-client-info). See 4167.Microsoft.Identity.Client.NativeInteropreference to version 0.13.12, which includes bug fixes and stability improvements. See 4374.Bug Fixes
ArgumentExceptionif an authority is in incorrect format (e.g., doesn't start with HTTPS, has spaces, etc.) See 4280.4.56.0
New Features
AuthenticationResult.AuthenticationResultMetadata.Telemetrythat currently contains telemetry from the Windows broker (WAM). See 4159.Bug Fixes
AcquireTokenForManagedIdentityandWithAppTokenProvider) to prevent the throttling exceptions thrown by the managed identity endpoints. See 4196.4.55.0
New Features
Bug Fixes
WithTenantIdnow works with CIAM authorities. See 4191.4.54.1
New Features
ITelemetryClient) is now generally available. See 3784.WithSearchInCacheForLongRunningProcess()modifier which allowsInitiateLongRunningProcessInWebApimethod to search in cache. This flag is intended only for rare legacy cases; for most cases, rely on the default behavior ofInitiateLongRunningProcessInWebApiandAcquireTokenInLongRunningProcess. See 4124.Bug Fixes
WithTenantIdcan now be used with dSTS authorities to overwrite the tenant. See 4144, 4145.oidclaim. See 4140.4.54.0
New Features
ManagedIdentityApplication. See 4114.MsalManagedIdentityExceptionclass that represents any managed identity related exceptions. It includes general exception information including the Azure source from which the exception originates. See 4041.AppTokenProviderAPI. See 4074.MsalExceptionand derived exception classes now have a propertyAdditionalExceptionData, which holds any extra error information. Currently it is only populated for exceptions coming from the Windows authentication broker (WAM). See 4106.Bug Fixes
user_mismatcherror whenWithAccountis specified when acquiring tokens interactively and selecting a different account in the account picker. See 3991.4.53.0
New Features
Bug Fixes
4.52.0
New Features
net6.0-windowsinstead ofnet6.0-windows10.0.17763.0. See 3986.WithGenericAuthority(authority). This is still an experimental API and may change in the future. See 4047, 1538.AuthenticationResult.AdditionalResponseParametersproperty bag with any extra parameters from the AAD response. This collection will also havespa_accountIdparameter which can be used in brokered hybrid single-page application (SPA) scenarios. See 3994.4.51.0
New Features
ManagedIdentityApplicationBuilderto create aIManagedIdentityApplicationand callAcquireTokenForManagedIdentity. See 3970 and wiki.StopLongRunningProcessInWebApiAsyncwhich allows to remove cached tokens based on a long-running OBO key. See 3346 and wiki.Bug Fixes
InitiateLongRunningProcessInWebApiwill now always acquire new tokens from AAD without checking the token cache first. See 3825.AcquireTokenSilentafter acquiring token using the Username/Password flow. See 3916 and See 3961.4.50.0
New Features
Bug Fixes
Description has been truncated