Releases: AzureAD/microsoft-authentication-library-common-for-objc
Releases · AzureAD/microsoft-authentication-library-common-for-objc
1.7.33
Release Notes
Version 1.7.33
- Implement support for Custom URL Domains (CUD) for CIAM authorities (#1347)
- Support for QR+PIN (#1317)
Changes:
- #1349: Release 1.7.33
- #1317: QR+PIN in Common Core
- #1347: Implement support for Custom URL Domains (CUD) for CIAM authorities
- #1339: Add API copyAndReplaceObjectForKey in MSIDCache
- #1340: Calculating prtId based on accountId and deviceId
- #1345: Minor automation stability tweaks
- #1342: Main
This list of changes was auto generated.
1.7.32
Release Notes
Version 1.7.32
- Implement sign out request for browser sso #1328
Changes:
- #1336: release/1.7.32
- #1338: revert ios version for release
- #1337: Fix constants prefix
- #1328: Implement sign out request for browser sso
- #1321: Fix typo in name of MSIDBrowserNativeMessageGetCookiesResponseTests file
- #1333: Skip Account Validation based on request parameters.
- #1335: Added SDM WPJ flag name to MSIDBrokerConstants
- #1334: Added credential persistence option method for NTLM
- #1331: Fix -Wstrict-selector-match warning
- #1329: Support dual headed account hints
See More
- #1327: IdentityCore change: Optimize acquire_token_silently in broker.
- #1330: Pass back real error code when there is no matching MSID error code
- #1320: Add ccs-request-sequence to broker header
- #1326: Merge IdentityCore main(hotfix/1.7.31) to dev
- #1325: Merge Hotfix/1.7.31 to dev
This list of changes was auto generated.
1.7.31
Release Notes
Version 1.7.31
- Add additional error codes for PSSO KeyId mismatch (#1322)
Changes:
- #1323: IdentityCore Hotfix/1.7.31 release
- #1324: Fix typo in error code
- #1322: Add additional error code when keyId doesn't match
- #1319: Kasong/merge release 1730 into dev
This list of changes was auto generated.
1.0.24
1.7.30
Release Notes
Version 1.7.30
- ADD get token operation for BrowserCore (#1293)
- Add support to get Passkey assertion and credentials (#1306)
- Update key auth to use current keys on sonoma (#1312)
- Map broker version to existing token result value (#1314)
Changes:
- #1318: Release common core 1.7.30
- #1314: Mapping broker version to existing token result value
- #1306: Add support files to get passkey credential and passkey assertion
- #1311: merge hotfix 1.7.29 into dev
- #1312: Veena/psso use current keys
- #1309: Veena/device hardware type
- #1293: Get token operation for BrowserCore
- #1308: Introduce a way to inject external WKWebviewConfiguration for MSIDWebviewUIController (needed for MSAL C++)
- #1305: Merge release 1.7.28 to dev
- #1294: Feature/ciam
This list of changes was auto generated.
1.7.29
Release Notes
Version 1.7.29
- Introduce a way to inject external WKWebviewConfiguration for MSIDWebviewUIController - needed for MSAL C++ (#1308)
Changes:
- #1310: Hotfix/1.7.29
- #1308: Introduce a way to inject external WKWebviewConfiguration for MSIDWebviewUIController (needed for MSAL C++)
This list of changes was auto generated.
1.7.28
Release Notes
Version 1.7.28
- Report WPJ v2 telemetry capability. (#1297)
- Add separate error code for OneAuth telemetry purpose (#1292)
- Logging improvements (#1290)
- Rename some internal macro (#1300)
- Added ccs request id flag (#1296)
Changes:
- #1304: Merge Release/1.7.28 back to main
- #1296: Added ccs request id flag in token response to be consumed by OneAuth
- #1287: update deprecated symbol kIOMasterPortDefault
- #1303: Exclude telemetry logic from commoncore when building against MSAL cpp
- #1300: Teams having compiling issue due to no renaming on those macros, addi…
- #1286: Update verify_msalcpp_per_pr_ios.yml for Azure Pipelines
- #1290: Do not log error when checking if key supports a signing alg
- #1301: Fix for nullability annotation for
MSIDBaseWebRequestConfiguration soContextproperty. - #1292: Add new broker failed to open error
- #1297: Report WPJ v2 telemetry capability
See More
- #1299: Merge Main to dev
- #1289: Running in SSO extension helper
- #1285: Merge main to dev after 1.7.26 release
This list of changes was auto generated.
1.7.27
Release Notes
Version 1.7.27
- Expose APIs for manually setting time_Interval for request and session resource. (#1288)
Changes:
- #1295: Hotfix/1.7.27 to main
- #1298: fix build pipeline in hotfix
- #1291: Update change log
- #1288: Kaisong1990/add time interval option
This list of changes was auto generated.
1.7.26
Release Notes
Version 1.7.26
- Stop sending web auth start notifications for certain redirects. (#1280)
- Add native message sso ext request. (#1253)
- Filter expired certs in the certificate picker (#1278)
Changes:
- #1284: Release 1.7.26
- #1283: Merge main to release branch + update changelog
- #1281: Update changelog to 1.7.25 release
- #1280: Stop sending notifyWebAuthDidStart notification for "about:blank" and "about:srcdoc"
- #1265: Refactor MSIDBrowserNativeMessageGetCookiesRequest
- #1273: Updating readme with master branch deprecation
- #1279: Master
- #1278: Filter expired certs in the certificate picker
- #1270: Enhancing broker redirect_uri validation
- #1276: Merge main changes back to dev
See More
- #1272: Merge main to dev
- #1269: Master to main
- #1264: Enhance broker redirect validation
- #1253: Add native message sso ext request.
- #1263: Replace deprecated NSProgressIndicatorSpinningStyle with NSProgressIndicatorStyleSpinning
- #1261: merge master/hotfix for OneAuth removeExpiredAccessTokensCredentialsWithQuery to dev
- #1255: Release 1.7.22
- #1256: Merge release 1.7.22 into dev
- #1252: Remove deprecated api
- #1248: Removing metadata but keeping Primary Entry crashes app
- #1250: Update CI/CD and automation to use Xcode 14 instead of Xcode 13 (IdentityCore)
- #1251: Add properties for PRT refresh and sso seeding in common-core test re…
- #1249: Add isCallerAppManaged to extraDeviceInfoDict
- #1244: Veena/add json utils
- #1245: Merge release 1.7.21 back into dev
- #1239: Adding property to use most secure storage for WPJ in broker automation request
This list of changes was auto generated.
1.7.25
- Enhance broker redirect_uri validation