-
Notifications
You must be signed in to change notification settings - Fork 3.9k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Issue Doc Review #23799
Closed
Closed
Issue Doc Review #23799
Changes from 10 commits
Commits
Show all changes
18 commits
Select commit
Hold shift + click to select a range
cfc0e59
Issue Doc Review
msJinLei baa2069
Update Call_For_Testing_Az.Accounts-Preview.md
msJinLei fe09137
Update Call_For_Testing_Az.Accounts-Preview.md
msJinLei 91b6104
Update Call_For_Testing_Az.Accounts-Preview.md
msJinLei fbc1129
Update Call_For_Testing_Az.Accounts-Preview.md
msJinLei db862a8
Update Call_For_Testing_Az.Accounts-Preview.md
msJinLei 2d30514
Update Call_For_Testing_Az.Accounts-Preview.md
msJinLei 87fbd99
Update Call_For_Testing_Az.Accounts-Preview.md
msJinLei e214763
Update Call_For_Testing_Az.Accounts-Preview.md
msJinLei 8563744
Update Call_For_Testing_Az.Accounts-Preview.md
msJinLei 9fa39a8
Update Call_For_Testing_Az.Accounts-Preview.md
msJinLei e740417
Update Call_For_Testing_Az.Accounts-Preview.md
msJinLei 567abcf
Update Call_For_Testing_Az.Accounts-Preview.md
msJinLei ec12265
Update Call_For_Testing_Az.Accounts-Preview.md
msJinLei e7a1be9
Update Call_For_Testing_Az.Accounts-Preview.md
msJinLei 03f5609
Update Call_For_Testing_Az.Accounts-Preview.md
msJinLei 8dc6222
Update Call_For_Testing_Az.Accounts-Preview.md
msJinLei a87b57a
Update Call_For_Testing_Az.Accounts-Preview.md
msJinLei File filter
Filter by extension
Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,60 @@ | ||
We have just released **Az.Accounts-2.14.0-preivew**, which contains the following important features. | ||
## Updated Az.Identity 1.6.1 to 1.10.3 to fix high vulnerability issue. | ||
Azure.Identity 1.6.1, which we currently depend on, is reported with [high vulnerability](https://github.com/advisories/GHSA-5mfx-4wcx-rv27). | ||
|
||
>Please Note: Azure-PoweShell doesn't depend on the data types of Azure.Identity that cause the vulnerabiltity. Therefore it is safe to use Azure-PowerShell even it depends on Azure.Identity 1.6.1. | ||
msJinLei marked this conversation as resolved.
Show resolved
Hide resolved
|
||
|
||
To fix the issue, we update Azure.Identity to 1.10.3. However tht new version renames the token cache file from `msal.cache` to `msal.cache.cae` (or `msal.cache.cae`). In the Az.Accounts preview, we do the migration to eliminate the influence of renaming. Our customers are not expected to depend on the token cache file directly. We emphasize here again that it is highly not recommended to do so. Currently, we use token cache only in the following login methods. | ||
- Interactive | ||
- Device Code | ||
- User name + Password | ||
- Service Principal + Federated Token | ||
|
||
If you are using any of them, please try the new version to see whether everything goes well. | ||
msJinLei marked this conversation as resolved.
Show resolved
Hide resolved
|
||
|
||
## Enabled Continuous Access Evaluation (CAE) for Service Principal login methods. | ||
In **Azure PowerShell client side**, we already enabled CAE for the following login methods | ||
- Interactive | ||
- Device Code | ||
- User name + Password | ||
|
||
In this preview version, we enable CAE when you login using Service Principal related methods, which are | ||
- Service Principal + Credential | ||
- Service Principal + Certificate | ||
- Service Principal + Federated Token. | ||
|
||
We highly recommend you try the new feature as it improves security. You need to do some configuration on your tenant. Please refer to https://learn.microsoft.com/entra/identity/conditional-access/concept-continuous-access-evaluation for more information. | ||
|
||
## Optimized output UX of cmdlets in Az.Accounts | ||
|
||
We adjusted cmdlet output format to make it more user-friendly based on the feedback of UX study of Az.Accounts. Adjustments include: | ||
- ordering and grouping output items to make items easy to find | ||
- re-prioritizing positions for output properties to highlight valuable properties | ||
|
||
Affected cmdlets include `Get-AzContext`, `Get-AzTenant`, `Get-AzSubscription` and `Invoke-AzRestMethod`. Take cmdlet `Get-AzContext` for example, we group outputs by TenantId and alphabetically order them then. | ||
|
||
**Please note** | ||
- We only adjust the visual display of output in the preview version, which means no breaking changes are introduced in output object and script will not be broken due to the lack of property even if the property is moved or hidden in display. | ||
- **Script may be broken logically** if the script assumes the certain order of outputs since we adjusted the order of output items. | ||
msJinLei marked this conversation as resolved.
Show resolved
Hide resolved
|
||
|
||
## Fixed the authentication issue when using `FederatedToken` in Sovereign Clouds | ||
In Soverign Clouds, `Connect-AzAccounts` fails when using `Service Principal + Federated Token`. The issue is currently reported on [GitHub Actions](https://github.com/Azure/login/issues/355). | ||
msJinLei marked this conversation as resolved.
Show resolved
Hide resolved
|
||
If you login Soverign Clouds using federated token, Please run the following cmdlet on powershell | ||
```pwsh | ||
Connect-AzAccount -ServicePrincipal -Application $appId -FederatedToken $token -Environment $SoverignCloudName | ||
``` | ||
Please you are using GitHub action, please refer to [how to test Az.Accounts-2.14.0-preivew in GitHub Actions](https://github.com/Azure/login/issues/355#issuecomment-1865516832) for more details. | ||
msJinLei marked this conversation as resolved.
Show resolved
Hide resolved
|
||
|
||
**Most of the customers will be affected and so we invite you to test the new version.** | ||
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. It's strange for this line to be here. In the preview page, it belongs to the section "Fixed the authentication issue when using FederatedToken in Sovereign Clouds". |
||
# How to Test | ||
Run the following cmdlet on PowerShell to install Az.Accounts-2.14.0-preivew | ||
```pwsh | ||
Install-Module -Name Az.Accounts -Repository PSGallery -AllowPrerelease –Force | ||
``` | ||
Run your script or `Connect-AzAccount` | ||
msJinLei marked this conversation as resolved.
Show resolved
Hide resolved
|
||
|
||
# When to Release the Preview features | ||
We are going to release these preview feature in next regular release in January. | ||
msJinLei marked this conversation as resolved.
Show resolved
Hide resolved
|
||
|
||
# Send Feedback | ||
Report your findings on [GitHub](https://github.com/Azure/azure-powershell/issues) | ||
msJinLei marked this conversation as resolved.
Show resolved
Hide resolved
|
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Azure-PoweShell? Azure PoweShell modules?