-
Notifications
You must be signed in to change notification settings - Fork 3.9k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[Call For Action] Testing Az.Accounts-2.14.0-preivew release #23805
Comments
There's no |
What's your PowerShell and PowerShellGet version $PSVersionTable
Get-Module -ListAvailable -Name PowerShellGet I cannot reproduce your issue |
Thanks for checking :) Here you go: PS C:\azp> $PSVersionTable
Name Value
---- -----
PSVersion 5.1.20348.2110
PSEdition Desktop
PSCompatibleVersions {1.0, 2.0, 3.0, 4.0...}
BuildVersion 10.0.20348.2110
CLRVersion 4.0.30319.42000
WSManStackVersion 3.0
PSRemotingProtocolVersion 2.3
SerializationVersion 1.1.0.1
PS C:\azp> Get-Module -ListAvailable -Name PowerShellGet
Directory: C:\Program Files\WindowsPowerShell\Modules
ModuleType Version Name ExportedCommands
---------- ------- ---- ----------------
Script 1.0.0.1 PowerShellGet {Install-Module, Find-Module, Save-Module, Update-Module...} It looks like we also have powershell core 7.2.9 installed in the same image and that can install Az.Accounts just fine, but unfortunately I need it working in the old powershell and typically that's the one that's broken. |
Hi @dribblor , you can update PowerShellGet by |
Description
We have just released Az.Accounts-2.14.0-preivew, which contains the following important updates.
Updated Azure.Identity 1.6.1 to 1.10.3
Note
The vulnerability within Azure.Identity 1.6.1 did not apply to Azure PowerShell. Therefore, the latest stable version of Azure PowerShell is safe to use.
1.10.3 had a breaking change that it renamed the token cache file from
msal.cache
tomsal.cache.cae
(ormsal.cache.nocae
in case CAE is disabled). We implemented best-effort token cache migration so your sign-in state won't be lost. Again, it is discouraged to consume the token cache file directly. Token cache is enabled in the following sign-in methods:If you are using any of them, feel free to try the preview.
Enabled Continuous Access Evaluation (CAE) for Service Principal login methods.
As of today, we already enabled CAE for the following login methods
In this preview version, we enabled CAE when you login using Service Principal related methods, which are
We highly recommend you try this since CAE enhances security by protecting tokens. Pre-configuration may be required. Please refer to https://learn.microsoft.com/entra/identity/conditional-access/concept-continuous-access-evaluation for more information.
Updated output format of cmdlets in Az.Accounts
We adjusted cmdlet output format to make it more user-friendly based on the feedback of UX study of Az.Accounts, including
Affected cmdlets include
Get-AzContext
,Get-AzTenant
,Get-AzSubscription
andInvoke-AzRestMethod
. Take cmdletGet-AzContext
for example, we group outputs by TenantId and alphabetically order them then.Note
Fixed the authentication issue when using
FederatedToken
in Sovereign CloudsIn Soverign Clouds,
Connect-AzAccounts
fails when usingService Principal + Federated Token
. The issue is currently reported on Azure Login Action.If you login Soverign Clouds using federated token, Please run the following cmdlet on powershell
Please you are using GitHub Actions, please refer to how to test Az.Accounts-2.14.0-preivew in GitHub Actions for more details.
Most of the customers will be affected and so we invite you to test the new version.
How to Test
Run the following cmdlet on PowerShell to install Az.Accounts-2.14.0-preivew
Run your script or
Connect-AzAccount
.Next Step
We are going to release these preview features in the next regular release in January.
Feedback
Please share your thoughts or suggestions by commenting on this issue directly.
Thank you!
The text was updated successfully, but these errors were encountered: