Easy and secure implementation of Azure Entra ID (previously AD) for your FastAPI APIs 🔒 B2C, single- and multi-tenant support.
Full Changelog: https://github.com/Intility/fastapi-azure-auth/compare/4.3.0...4.3.1
Full Changelog: https://github.com/Intility/fastapi-azure-auth/compare/4.2.1...4.3.1
Full Changelog: https://github.com/Intility/fastapi-azure-auth/compare/4.2.0...4.2.1
Full Changelog: https://github.com/Intility/fastapi-azure-auth/compare/4.1.3...4.2.0
Full Changelog: https://github.com/Intility/fastapi-azure-auth/compare/4.1.2...4.1.3
Full Changelog: https://github.com/Intility/fastapi-azure-auth/compare/4.1.1...4.1.2
scp
for access token by @enadeau in https://github.com/Intility/fastapi-azure-auth/pull/133
Full Changelog: https://github.com/Intility/fastapi-azure-auth/compare/4.1.0...4.1.1
All claims have now been added to the user object.
Thank you so much, both of you 😊
Full Changelog: https://github.com/Intility/fastapi-azure-auth/compare/4.0.0...4.1.0
Single- and multi-tenant applications now have a default setting that denies guest users access to the APIs. The documentation has been updated, please read it if you'd like to override this setting, or have different settings for different endpoints.
Note: B2C tenants allow guest users by default, as all users will be guest users.
Full Changelog: https://github.com/Intility/fastapi-azure-auth/compare/3.5.1...4.0.0
Full Changelog: https://github.com/Intility/fastapi-azure-auth/compare/3.5.0...3.5.1