You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
* ImdsV2 probe does not fire when .WithMtlsProofOfPossesstion is not used [#5579](https://github.com/AzureAD/microsoft-authentication-library-for-dotnet/pull/5579)
7
+
* Downgrade System.Formats.Asn1 to match ID web [#5583](https://github.com/AzureAD/microsoft-authentication-library-for-dotnet/pull/5583)
8
+
9
+
4.79.0
10
+
======
11
+
12
+
### Changes
13
+
* Managed Identity IMDSv2 and new support APIs (ResetForTest, GetSourceAsync) in https://github.com/AzureAD/microsoft-authentication-library-for-dotnet/pull/5501
14
+
* Bearer Requests should Fallback to IMDS in Preview in https://github.com/AzureAD/microsoft-authentication-library-for-dotnet/pull/5562
15
+
* Updating MSAL to send client info = 2 on client credential flow in https://github.com/AzureAD/microsoft-authentication-library-for-dotnet/pull/5529
16
+
* Make `IMsalMtlsHttpClientFactory` interface public in https://github.com/AzureAD/microsoft-authentication-library-for-dotnet/pull/5559* Adjust WithExtraQueryParameters APIs and cache key behavior https://github.com/AzureAD/microsoft-authentication-library-for-dotnet/pull/5536
17
+
* Adjust WithExtraQueryParameters APIs and cache key behavior [#5536](https://github.com/AzureAD/microsoft-authentication-library-for-dotnet/pull/5536)
18
+
19
+
### Bug fixes
20
+
* Fix instance discovery bug in Fr cloud [#5549](https://github.com/AzureAD/microsoft-authentication-library-for-dotnet/pull/5549)
21
+
* Mark WithClientAssertion API as experimental [#5551](https://github.com/AzureAD/microsoft-authentication-library-for-dotnet/pull/5551)
22
+
23
+
24
+
25
+
26
+
4.78.0
27
+
======
28
+
### Changes
29
+
* Update SDK version from 8.0.404 to 8.0.415. [#5543](https://github.com/AzureAD/microsoft-authentication-library-for-dotnet/pull/5543)
30
+
* Hide / deprecate some obscure APIs. [#5484](https://github.com/AzureAD/microsoft-authentication-library-for-dotnet/pull/5484)
31
+
32
+
### Bug Fixes
33
+
* Support Android edge-to-edge. [#5499](https://github.com/AzureAD/microsoft-authentication-library-for-dotnet/pull/5499)
34
+
* Android broker does not support ADFS authority. [#5522](https://github.com/AzureAD/microsoft-authentication-library-for-dotnet/pull/5522)
Copy file name to clipboardExpand all lines: README.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -65,7 +65,7 @@ This library controls how users sign-in and access services. We recommend you al
65
65
66
66
## Security reporting
67
67
68
-
If you find a security issue with our libraries or services please report it to [[email protected]](mailto:secure@microsoft.com) in as much detail as possible. Your submission may be eligible for a bounty through the [Microsoft Bug Bounty](https://aka.ms/bugbounty) program. Please do not post security issues to GitHub Issues or any other public site. We will contact you shortly after receiving the information. We encourage you to get notifications of when security incidents occur by visiting the [Microsoft Technical Security Notifications page](https://www.microsoft.com/msrc/technical-security-notifications?rtc=1) and subscribing to Security Advisory Alerts.
68
+
If you find a security issue with our libraries or services please report it to https://msrc.microsoft.com/report/vulnerability in as much detail as possible. Your submission may be eligible for a bounty through the [Microsoft Bug Bounty](https://aka.ms/bugbounty) program. Please do not post security issues to GitHub Issues or any other public site. We will contact you shortly after receiving the information. We encourage you to get notifications of when security incidents occur by visiting the [Microsoft Technical Security Notifications page](https://www.microsoft.com/msrc/technical-security-notifications?rtc=1) and subscribing to Security Advisory Alerts.
0 commit comments