Update dependency Azure.Identity to 1.16.0 #48
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
This PR contains the following updates:
1.11.4
->1.16.0
Release Notes
Azure/azure-sdk-for-net (Azure.Identity)
v1.16.0
Compare Source
1.16.0 (2025-09-09)
Features Added
DefaultAzureCredential
constructor that accepts a custom environment variable name for credential configuration. This provides flexibility beyond the defaultAZURE_TOKEN_CREDENTIALS
environment variable. The constructor accepts any environment variable name and uses the same credential selection logic as the existingAZURE_TOKEN_CREDENTIALS
processing.DefaultAzureCredential.DefaultEnvironmentVariableName
constant property that returns"AZURE_TOKEN_CREDENTIALS"
for convenience when referencing the default environment variable name.AzureCliCredential
,AzurePowerShellCredential
, andAzureDeveloperCliCredential
now throw anAuthenticationFailedException
when theTokenRequestContext
includes claims, as these credentials do not support claims challenges. The exception message includes guidance for handling such scenarios.AZURE_TOKEN_CREDENTIALS
or the equivalent custom environment variable is configured toManagedIdentityCredential
, theDefaultAzureCredential
does not issue a probe request and performs retries with exponential backoff.Bugs Fixed
AzureDeveloperCliCredential
hanging when theAZD_DEBUG
environment variable is set by adding the--no-prompt
flag to prevent interactive prompts (#52005).BrokerCredential
is now included in the chain whenAZURE_TOKEN_CREDENTIALS
is set todev
.DefaultAzureCredential
that caused the credential chain to be constructed incorrectly when using AZURE_TOKEN_CREDENTIALS in combination withDefaultAzureCredentialOptions
.Other Changes
BrokerCredential
is now always included in theDefaultAzureCredential
chain. If theAzure.Identity.Broker
package is not referenced, an exception will be thrown whenGetToken
is called, making its behavior consistent with the rest of the credentials in the chain.Microsoft.Identity.Client
dependency to version 4.76.0.Microsoft.Identity.Client.Extensions.Msal
dependency to version 4.76.0.v1.15.0
Compare Source
1.15.0 (2025-08-07)
Breaking Changes
Behavioral Breaking Changes
SharedTokenCacheCredential
. The supporting credential (SharedTokenCacheCredential
) was a legacy mechanism for authenticating clients using credentials provided to Visual Studio. For brokered authentication, consider usingInteractiveBrowserCredential
instead. The following changes have been made:SharedTokenCacheCredential
class is marked as[Obsolete]
and[EditorBrowsable(EditorBrowsableState.Never)]
SharedTokenCacheCredentialOptions
class is marked as[Obsolete]
and[EditorBrowsable(EditorBrowsableState.Never)]
DefaultAzureCredentialOptions.ExcludeSharedTokenCacheCredential
property is marked as[Obsolete]
and[EditorBrowsable(EditorBrowsableState.Never)]
SharedTokenCacheUsername
property is marked as[Obsolete]
and[EditorBrowsable(EditorBrowsableState.Never)]
SharedTokenCacheCredential
is no longer included in theDefaultAzureCredential
authentication flowBugs Fixed
AdditionallyAllowedTenants
values which will now be matched against tenant IDs without case sensitivity, making the authentication more resilient to case differences in tenant IDs returned from WWW-Authenticate challenges (#51693).Other Changes
BrokerAuthenticationCredential
has been renamed asBrokerCredential
.Added the
EditorBrowsable(Never)
attribute to propertyVisualStudioCodeTenantId
asTenantId
is preferred. TheVisualStudioCodeTenantId
property exists only to provide backwards compatibility.v1.14.2
Compare Source
1.14.2 (2025-07-10)
Other changes
Microsoft.Identity.Client
dependency to version 4.73.1v1.14.1
Compare Source
1.14.1 (2025-07-08)
Bugs Fixed
v1.14.0
Compare Source
1.14.0 (2025-05-13)
Other Changes
Username
,Password
,AZURE_USERNAME
, andAZURE_PASSWORD
in XML comments fromEnvironmentCredentialOptions
andEnvironmentCredential
due to lack of MFA support. See MFA enforcement details.AZURE_USERNAME
andAZURE_PASSWORD
as obsolete due to lack of MFA support. See MFA enforcement details.AZURE_TOKEN_CREDENTIALS
environment variable toDefaultAzureCredential
, which allows for choosing between 'deployed service' and 'developer tools' credentials. Valid values are 'dev' for developer tools and 'prod' for deployed service.v1.13.2
Compare Source
1.13.2 (2025-01-14)
Bugs Fixed
DefaultAzureCredentialOptions.TenantId
twice throws anInvalidOperationException
(#47035)ManagedIdentityCredential
does not honor theCancellationToken
passed toGetToken
andGetTokenAsync
. (#47156)DefaultAzureCredential
would not fall through to the next credential in the chain under certain exception conditions.ManagedIdentityCredential
when used in aChainedTokenCredential
where the invalid json responses do not fall through to the next credential in the chain. (#47470)v1.13.1
Compare Source
1.13.1 (2024-10-24)
Bugs Fixed
ManagedIdentityCredential
from attempting to detect if Workload Identity is enabled in the current environment. #46653DefaultAzureCredential
from progressing pastManagedIdentityCredential
in some scenarios where the identity was not available. #46709v1.13.0
Compare Source
1.13.0 (2024-10-14)
Features Added
ManagedIdentityCredential
now supports specifying a user-assigned managed identity by object ID.Bugs Fixed
DefaultAzureCredential
attempts to authenticate with theMangagedIdentityCredential
and it receives either a failed response that is not json, it will now fall through to the next credential in the chain. #45184AzurePipelinesCredential
so it doesn't result in a redirect response when an invalid system access token is provided.Other Changes
AzureEventSourceListener
. Previously, the log level was always set toMicrosoft.Identity.Client.LogLevel.Info
.AzurePowerShellCredential
now utilizes the AsSecureString parameter to Get-AzAccessToken for version 2.17.0 and greater of the Az.Accounts module.AzurePipelinesCredential
.v1.12.1
Compare Source
1.12.1 (2024-09-26)
Bugs Fixed
v1.12.0
Compare Source
1.12.0 (2024-06-17)
Features Added
AzurePipelinesCredential
for authenticating with Azure Pipelines service connections.OnBehalfOfCredential
now supports client assertion callbacks for acquiring tokens on behalf of a user.ClientAssertionCredentialOptions
now supportsTokenCachePersistenceOptions
for configuring token cache persistence.Configuration
📅 Schedule: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined).
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR has been generated by Renovate Bot.
Commands to ignore dependencies
You can trigger dependency actions by commenting on this PR:
@particularbot ignore this major version
@particularbot ignore this minor version
@particularbot ignore this dependency