Skip to content

Releases: AzureAD/microsoft-authentication-library-for-objc

1.1.8

25 Aug 19:32
824d1f4

Choose a tag to compare

New features:

  • Expose MSAL SDK Version in public client (#1051)

Fixes:

  • Disabling check for validating result Account.
  • Include redirect uri in body when redeeming refresh token at token endpoint (#1020)
  • Mark RSA public key as extractable (#1049)

Engineering changes:

  • Fix unused parameter errors and add macOS specific test mocks.
  • Move openBroswerResponse code into its operation (#392)
  • Cleanup noisy SSO extension logs (#392)
  • Cleanup main product targets from test files (#1046)
  • Replaced launch image by launch controller and update test app icon with correct size (#1048)
  • Modify MSALRedirectUri and MSALRedirectUriVerifier to use existing methods from common core (#1045)
  • Save PRT expiry interval in cache to calculate PRT refresh interval more reliably (#1019)
  • update new variable in configuration to allow user by pass URI check (#1013)
  • Refactor crypto code for cpp integration and add api to generate ephemeral asymmetric key pair (#1018)
  • update MSAL test app for SSO Seeding flow #1021
  • Update logger from Identity Core. (#1009)

1.1.7

31 Jul 21:49
5e59380

Choose a tag to compare

Added

  • New variable in configuration to allow user bypass redirect URI check (#1013)
  • New API to check if compatible AAD broker is available (#1011)

1.1.6

24 Jul 18:16
6262e98

Choose a tag to compare

Added

  • Support proof of posession for access tokens (#926)

Fixed

  • Clean up account metadata on account removal (#999)
  • Silent token lookup for guest accounts with different UPNs (#986)

1.1.5

20 Jun 00:54
a48c780

Choose a tag to compare

Added

  • Switch to PkeyAuth on macOS (common library #734)
  • Support returning additional WPJ info (#931)

Fixed

  • Fixed PkeyAuth when ADFS challenge is URL encoded (common library #750)
  • Fixed CBA handling in MSAL (common library #751)
  • Fixed failing unit tests on 10.15 (#760)
  • Include correlationID in error response (#908)

1.1.4

08 Jun 18:13
6e39ac9

Choose a tag to compare

  • Fix handling of certificate based authentication challenge.(#945)

1.1.3

22 May 19:36
25e504a

Choose a tag to compare

Added

  • Support client side telemetry in ESTS requests (#930)

Fixed

  • Add logging for enrollment id mismatch for access tokens (#932)
  • Protect legacy macOS cache when MSAL writes into ADAL cache (common core #729)
  • Fix NTLM crash when window is not key (common core #724)
  • Fixed authority validation for developer known authorities (#913)
  • Pass prompt=login for signed out accounts (#919)
  • Don't require URL scheme registration in Info.plist for app extensions (#914)

1.1.2

16 Apr 02:12
8f22e7a

Choose a tag to compare

  • Support SSO in Safari in AAD SSO extension
  • Additional automation tests for AAD national cloud scenarios
  • Convert access denied error to cancelled on MSAL side (#894)
  • Resolved conflict between initWithParentController API on App Store upload (#893)

1.1.1

29 Mar 00:36
081e94e

Choose a tag to compare

  • Fixed macOS cache on 10.15 when App Identifier Prefix is different from TeamId
  • Remove SHA-1 dependency from production library
  • Fixed SSO extension + MSIT MFA
  • Fixed SSO extension swipe down cancellation case
  • Handle http headers coming from iOS broker when it is either a NSDictionary or NSString
  • Updated readme to include information about Microsoft Enterprise SSO plug-in for Apple devices and shared device scenarios (#881)

1.1.0

19 Mar 06:43
bdbf144

Choose a tag to compare

  • iOS 13 SSO Extension support
  • Support ASWebAuthenticationSession on macOS 10.15
  • Track account sign-in and sign-out state. This makes application scenarios like first time sign-in, sign-out easier to implement.
  • Support global sign out from the device when allowed by the MDM configuration

1.0.7

28 Jan 23:43
49949c4

Choose a tag to compare

Fixed

  • Keyed unarchiver deserialization fix for iOS 11.2
  • [Broker patch] Fixed account lookups and validation with the same email (#827)