Azure.Identity 1.8.0-beta.1

Prefix Reserved
This is a prerelease version of Azure.Identity.
There is a newer version of this package available.
See the version list below for details.
dotnet add package Azure.Identity --version 1.8.0-beta.1                
NuGet\Install-Package Azure.Identity -Version 1.8.0-beta.1                
This command is intended to be used within the Package Manager Console in Visual Studio, as it uses the NuGet module's version of Install-Package.
<PackageReference Include="Azure.Identity" Version="1.8.0-beta.1" />                
For projects that support PackageReference, copy this XML node into the project file to reference the package.
paket add Azure.Identity --version 1.8.0-beta.1                
#r "nuget: Azure.Identity, 1.8.0-beta.1"                
#r directive can be used in F# Interactive and Polyglot Notebooks. Copy this into the interactive tool or source code of the script to reference the package.
// Install Azure.Identity as a Cake Addin
#addin nuget:?package=Azure.Identity&version=1.8.0-beta.1&prerelease

// Install Azure.Identity as a Cake Tool
#tool nuget:?package=Azure.Identity&version=1.8.0-beta.1&prerelease                

Azure Identity client library for .NET

The Azure Identity library provides Azure Active Directory token authentication support across the Azure SDK. It provides a set of TokenCredential implementations which can be used to construct Azure SDK clients which support AAD token authentication.

Source code | Package (nuget) | API reference documentation | Azure Active Directory documentation

Getting started

Install the package

Install the Azure Identity client library for .NET with NuGet:

dotnet add package Azure.Identity

Prerequisites

  • An Azure subscription.
  • The Azure CLI can also be useful for authenticating in a development environment, creating accounts, and managing account roles.

Authenticate the client

When debugging and executing code locally it is typical for a developer to use their own account for authenticating calls to Azure services. There are several developer tools which can be used to perform this authentication in your development environment.

Authenticating via Visual Studio

Developers using Visual Studio 2017 or later can authenticate an Azure Active Directory account through the IDE. Applications using the DefaultAzureCredential or the VisualStudioCredential can then use this account to authenticate calls in their application when running locally.

To authenticate in Visual Studio select the Tools > Options menu to launch the Options dialog. Then navigate to the Azure Service Authentication options to sign in with your Azure Active Directory account.

Visual Studio Account Selection

Authenticating via Visual Studio Code

Developers using Visual Studio Code can use the Azure Account extension to authenticate via the editor. Applications using the DefaultAzureCredential or the VisualStudioCodeCredential can then use this account to authenticate calls in their application when running locally.

It's a known issue that VisualStudioCodeCredential doesn't work with Azure Account extension versions newer than 0.9.11. A long-term fix to this problem is in progress. In the meantime, consider authenticating via the Azure CLI.

Authenticating via the Azure CLI

Developers coding outside of an IDE can also use the Azure CLI to authenticate. Applications using the DefaultAzureCredential or the AzureCliCredential can then use this account to authenticate calls in their application when running locally.

To authenticate with the Azure CLI, users can run the command az login. For users running on a system with a default web browser, the Azure CLI will launch the browser to authenticate the user.

Azure CLI Account Sign In

For systems without a default web browser, the az login command will use the device code authentication flow. The user can also force the Azure CLI to use the device code flow rather than launching a browser by specifying the --use-device-code argument.

Azure CLI Account Device Code Sign In

Authenticating via Azure PowerShell

Developers coding outside of an IDE can also use Azure PowerShell to authenticate. Applications using the DefaultAzureCredential or the AzurePowerShellCredential can then use this account to authenticate calls in their application when running locally.

To authenticate with Azure PowerShell, users can run the command Connect-AzAccount. For users running on a system with a default web browser and version 5.0.0 or later of azure PowerShell, it will launch the browser to authenticate the user.

For systems without a default web browser, the Connect-AzAccount command will use the device code authentication flow. The user can also force Azure PowerShell to use the device code flow rather than launching a browser by specifying the UseDeviceAuthentication argument.

Key concepts

Credentials

A credential is a class which contains or can obtain the data needed for a service client to authenticate requests. Service clients across Azure SDK accept credentials when they are constructed, and service clients use those credentials to authenticate requests to the service.

The Azure Identity library focuses on OAuth authentication with Azure Active directory, and it offers a variety of credential classes capable of acquiring an AAD token to authenticate service requests. All of the credential classes in this library are implementations of the TokenCredential abstract class in Azure.Core, and any of them can be used to construct service clients capable of authenticating with a TokenCredential.

See Credential Classes for a complete listing of available credential types.

DefaultAzureCredential

The DefaultAzureCredential is appropriate for most scenarios where the application is intended to ultimately be run in the Azure Cloud. This is because the DefaultAzureCredential combines credentials commonly used to authenticate when deployed, with credentials used to authenticate in a development environment.

Note: DefaultAzureCredential is intended to simplify getting started with the SDK by handling common scenarios with reasonable default behaviors. Developers who want more control or whose scenario isn't served by the default settings should use other credential types.

The DefaultAzureCredential will attempt to authenticate via the following mechanisms in order.

DefaultAzureCredential authentication flow

  1. Environment - The DefaultAzureCredential will read account information specified via environment variables and use it to authenticate.
  2. Managed Identity - If the application is deployed to an Azure host with Managed Identity enabled, the DefaultAzureCredential will authenticate with that account.
  3. Visual Studio - If the developer has authenticated via Visual Studio, the DefaultAzureCredential will authenticate with that account.
  4. Visual Studio Code - Currently excluded by default as SDK authentication via Visual Studio Code is broken due to issue #27263. The VisualStudioCodeCredential will be re-enabled in the DefaultAzureCredential flow once a fix is in place. Issue #30525 tracks this. In the meantime Visual Studio Code users can authenticate their development environment using the Azure CLI.
  5. Azure CLI - If the developer has authenticated an account via the Azure CLI az login command, the DefaultAzureCredential will authenticate with that account.
  6. Azure PowerShell - If the developer has authenticated an account via the Azure PowerShell Connect-AzAccount command, the DefaultAzureCredential will authenticate with that account.
  7. Interactive browser - If enabled, the DefaultAzureCredential will interactively authenticate the developer via the current system's default browser. By default, this credential type is disabled.

Examples

Authenticating with the DefaultAzureCredential

This example demonstrates authenticating the SecretClient from the Azure.Security.KeyVault.Secrets client library using the DefaultAzureCredential.

// Create a secret client using the DefaultAzureCredential
var client = new SecretClient(new Uri("https://myvault.vault.azure.net/"), new DefaultAzureCredential());

Enabling the interactive authentication with the DefaultAzureCredential

Interactive authentication is disabled in the DefaultAzureCredential by default. This example demonstrates two ways of enabling the interactive authentication portion of the DefaultAzureCredential. When enabled the DefaultAzureCredential will fall back to interactively authenticating the developer via the system's default browser if when no other credentials are available. This example then authenticates an EventHubProducerClient from the Azure.Messaging.EventHubs client library using the DefaultAzureCredential with interactive authentication enabled.

// the includeInteractiveCredentials constructor parameter can be used to enable interactive authentication
var credential = new DefaultAzureCredential(includeInteractiveCredentials: true);

var eventHubClient = new EventHubProducerClient("myeventhub.eventhubs.windows.net", "myhubpath", credential);

Specifying a user assigned managed identity with the DefaultAzureCredential

Many Azure hosts allow the assignment of a user assigned managed identity. This example demonstrates configuring the DefaultAzureCredential to authenticate a user assigned identity when deployed to an azure host. It then authenticates a BlobClient from the Azure.Storage.Blobs client library with credential.

// When deployed to an azure host, the default azure credential will authenticate the specified user assigned managed identity.

string userAssignedClientId = "<your managed identity client Id>";
var credential = new DefaultAzureCredential(new DefaultAzureCredentialOptions { ManagedIdentityClientId = userAssignedClientId });

var blobClient = new BlobClient(new Uri("https://myaccount.blob.core.windows.net/mycontainer/myblob"), credential);

In addition to configuring the ManagedIdentityClientId via code, it can also be set using the AZURE_CLIENT_ID environment variable. These two approaches are equivalent when using the DefaultAzureCredential.

Define a custom authentication flow with the ChainedTokenCredential

While the DefaultAzureCredential is generally the quickest way to get started developing applications for Azure, more advanced users may want to customize the credentials considered when authenticating. The ChainedTokenCredential enables users to combine multiple credential instances to define a customized chain of credentials. This example demonstrates creating a ChainedTokenCredential which will attempt to authenticate using managed identity, and fall back to authenticating via the Azure CLI if managed identity is unavailable in the current environment. The credential is then used to authenticate an EventHubProducerClient from the Azure.Messaging.EventHubs client library.

// Authenticate using managed identity if it is available; otherwise use the Azure CLI to authenticate.

var credential = new ChainedTokenCredential(new ManagedIdentityCredential(), new AzureCliCredential());

var eventHubProducerClient = new EventHubProducerClient("myeventhub.eventhubs.windows.net", "myhubpath", credential);

Managed Identity Support

The Managed identity authentication is supported via either the DefaultAzureCredential or the ManagedIdentityCredential directly for the following Azure Services:

Credential Classes

Authenticating Azure Hosted Applications

Credential Usage
DefaultAzureCredential provides a simplified authentication experience to quickly start developing applications run in the Azure cloud
ChainedTokenCredential allows users to define custom authentication flows composing multiple credentials
ManagedIdentityCredential authenticates the managed identity of an azure resource
EnvironmentCredential authenticates a service principal or user via credential information specified in environment variables

Authenticating Service Principals

Credential Usage
ClientAssertionCredential authenticates a service principal using a signed client assertion
ClientCertificateCredential authenticates a service principal using a certificate
ClientSecretCredential authenticates a service principal using a secret

Authenticating Users

Credential Usage
AuthorizationCodeCredential authenticates a user with a previously obtained authorization code
DeviceCodeCredential interactively authenticates a user on devices with limited UI
InteractiveBrowserCredential interactively authenticates a user with the default system browser
OnBehalfOfCredential propagates the delegated user identity and permissions through the request chain
UsernamePasswordCredential authenticates a user with a username and password

Authenticating via Development Tools

Credential Usage
AzureCliCredential authenticates in a development environment with the Azure CLI
AzurePowerShellCredential authenticates in a development environment with the Azure PowerShell
VisualStudioCredential authenticates in a development environment with Visual Studio
VisualStudioCodeCredential authenticates in a development environment with Visual Studio Code

Note: All credential implementations in the Azure Identity library are threadsafe, and a single credential instance can be used by multiple service clients.

Environment Variables

DefaultAzureCredential and EnvironmentCredential can be configured with environment variables. Each type of authentication requires values for specific variables:

Service principal with secret
variable name value
AZURE_CLIENT_ID id of an Azure Active Directory application
AZURE_TENANT_ID id of the application's Azure Active Directory tenant
AZURE_CLIENT_SECRET one of the application's client secrets
Service principal with certificate
variable name value
AZURE_CLIENT_ID id of an Azure Active Directory application
AZURE_TENANT_ID id of the application's Azure Active Directory tenant
AZURE_CLIENT_CERTIFICATE_PATH path to a PFX or PEM-encoded certificate file including private key
AZURE_CLIENT_CERTIFICATE_PASSWORD (optional) the password protecting the certificate file (currently only supported for PFX (PKCS12) certificates)
AZURE_CLIENT_SEND_CERTIFICATE_CHAIN (optional) send certificate chain in x5c header to support subject name / issuer based authentication
Username and password
variable name value
AZURE_CLIENT_ID id of an Azure Active Directory application
AZURE_USERNAME a username (usually an email address)
AZURE_PASSWORD that user's password

Configuration is attempted in the above order. For example, if values for a client secret and certificate are both present, the client secret will be used.

Troubleshooting

See the troubleshooting guide for details on how to diagnose various failure scenarios.

Error Handling

Errors arising from authentication can be raised on any service client method which makes a request to the service. This is because the first time the token is requested from the credential is on the first call to the service, and any subsequent calls might need to refresh the token. In order to distinguish these failures from failures in the service client Azure Identity classes raise the AuthenticationFailedException with details to the source of the error in the exception message as well as possibly the error message. Depending on the application these errors may or may not be recoverable.

using Azure.Identity;
using Azure.Security.KeyVault.Secrets;

// Create a secret client using the DefaultAzureCredential
var client = new SecretClient(new Uri("https://myvault.vault.azure.net/"), new DefaultAzureCredential());

try
{
    KeyVaultSecret secret = await client.GetSecretAsync("secret1");
}
catch (AuthenticationFailedException e)
{
    Console.WriteLine($"Authentication Failed. {e.Message}");
}

For more details on dealing with errors arising from failed requests to Azure Active Directory, or managed identity endpoints please refer to the Azure Active Directory documentation on authorization error codes.

Logging

The Azure Identity library provides the same logging capabilities as the rest of the Azure SDK.

The simplest way to see the logs to help debug authentication issues is to enable the console logging.

// Setup a listener to monitor logged events.
using AzureEventSourceListener listener = AzureEventSourceListener.CreateConsoleLogger();

All credentials can be configured with diagnostic options, in the same way as other clients in the SDK.

CAUTION: Requests and responses in the Azure Identity library contain sensitive information. Precaution must be taken to protect logs, when customizing the output, to avoid compromising account security.

DefaultAzureCredentialOptions options = new DefaultAzureCredentialOptions
{
    Diagnostics =
    {
        LoggedHeaderNames = { "x-ms-request-id" },
        LoggedQueryParameters = { "api-version" },
        IsLoggingContentEnabled = true
    }
};

When troubleshooting authentication issues, you may also want to enable logging of sensitive information. To enable this type of logging, set the IsLoggingContentEnabled property to true. To only log details about the account that was used to attempt authentication and authorization, set IsAccountIdentifierLoggingEnabled to true.

DefaultAzureCredentialOptions options = new DefaultAzureCredentialOptions
{
    Diagnostics =
    {
        LoggedHeaderNames = { "x-ms-request-id" },
        LoggedQueryParameters = { "api-version" },
        IsAccountIdentifierLoggingEnabled = true 
    }
};

Thread safety

We guarantee that all credential instance methods are thread-safe and independent of each other (guideline). This ensures that the recommendation of reusing credential instances is always safe, even across threads.

Additional concepts

Client options | Accessing the response | Diagnostics | Mocking | Client lifetime

Next steps

Client libraries supporting authentication with Azure Identity

Many of the client libraries listed here support authenticating with TokenCredential and the Azure Identity library. There you will also find links where you can learn more about their use, including additional documentation and samples.

Known Issues

This library does not currently support scenarios relating to the AAD B2C service.

Currently open issues for the Azure.Identity library can be found here.

Contributing

This project welcomes contributions and suggestions. Most contributions require you to agree to a Contributor License Agreement (CLA) declaring that you have the right to, and actually do, grant us the rights to use your contribution. For details, visit https://cla.microsoft.com.

When you submit a pull request, a CLA-bot will automatically determine whether you need to provide a CLA and decorate the PR appropriately (e.g., label, comment). Simply follow the instructions provided by the bot. You will only need to do this once across all repos using our CLA.

This project has adopted the Microsoft Open Source Code of Conduct. For more information see the Code of Conduct FAQ or contact opencode@microsoft.com with any additional questions or comments.

Product Compatible and additional computed target framework versions.
.NET net5.0 was computed.  net5.0-windows was computed.  net6.0 was computed.  net6.0-android was computed.  net6.0-ios was computed.  net6.0-maccatalyst was computed.  net6.0-macos was computed.  net6.0-tvos was computed.  net6.0-windows was computed.  net7.0 was computed.  net7.0-android was computed.  net7.0-ios was computed.  net7.0-maccatalyst was computed.  net7.0-macos was computed.  net7.0-tvos was computed.  net7.0-windows was computed.  net8.0 was computed.  net8.0-android was computed.  net8.0-browser was computed.  net8.0-ios was computed.  net8.0-maccatalyst was computed.  net8.0-macos was computed.  net8.0-tvos was computed.  net8.0-windows was computed. 
.NET Core netcoreapp2.0 was computed.  netcoreapp2.1 was computed.  netcoreapp2.2 was computed.  netcoreapp3.0 was computed.  netcoreapp3.1 was computed. 
.NET Standard netstandard2.0 is compatible.  netstandard2.1 was computed. 
.NET Framework net461 was computed.  net462 was computed.  net463 was computed.  net47 was computed.  net471 was computed.  net472 was computed.  net48 was computed.  net481 was computed. 
MonoAndroid monoandroid was computed. 
MonoMac monomac was computed. 
MonoTouch monotouch was computed. 
Tizen tizen40 was computed.  tizen60 was computed. 
Xamarin.iOS xamarinios was computed. 
Xamarin.Mac xamarinmac was computed. 
Xamarin.TVOS xamarintvos was computed. 
Xamarin.WatchOS xamarinwatchos was computed. 
Compatible target framework(s)
Included target framework(s) (in package)
Learn more about Target Frameworks and .NET Standard.

NuGet packages (955)

Showing the top 5 NuGet packages that depend on Azure.Identity:

Package Downloads
Microsoft.Data.SqlClient

The current data provider for SQL Server and Azure SQL databases. This has replaced System.Data.SqlClient. These classes provide access to SQL and encapsulate database-specific protocols, including tabular data stream (TDS). Commonly Used Types: Microsoft.Data.SqlClient.SqlConnection Microsoft.Data.SqlClient.SqlException Microsoft.Data.SqlClient.SqlParameter Microsoft.Data.SqlClient.SqlDataReader Microsoft.Data.SqlClient.SqlCommand Microsoft.Data.SqlClient.SqlTransaction Microsoft.Data.SqlClient.SqlParameterCollection Microsoft.Data.SqlClient.SqlClientFactory When using NuGet 3.x this package requires at least version 3.4.

Microsoft.Extensions.Azure

Azure Client SDK integration with Microsoft.Extensions libraries

Microsoft.Extensions.Caching.SqlServer

Distributed cache implementation of Microsoft.Extensions.Caching.Distributed.IDistributedCache using Microsoft SQL Server. This package was built from the source code at https://github.com/dotnet/aspnetcore/tree/c70204ae3c91d2b48fa6d9b92b62265f368421b4

Microsoft.Identity.Web.Certificate

This package brings certificate management for MSAL.NET.

WindowsAzure.ServiceBus

Please note, for Azure Service Bus, Azure Event Hubs and Azure Relay, newer packages Azure.Messaging.ServiceBus, Azure.Messaging.EventHubs and Microsoft.Azure.Relay are available as of November 2020, February 2020 and March 2017 respectively. While WindowsAzure.ServiceBus will continue to receive critical bug fixes, we strongly encourage you to upgrade. Read https://aka.ms/azsdk/blog/msging/intro for more details. It adds Microsoft.ServiceBus.dll along with related configuration files to your project. This library allows AMQP 1.0 to be used as one of the protocols for communication with Microsoft Azure Service Bus. For more information on Messaging features, please visit: http://azure.microsoft.com/en-us/documentation/services/service-bus/ For more information on Event Hub features, please visit: http://go.microsoft.com/fwlink/?LinkID=403957 Please note that this package requires at least .Net Framework 4.6.2.

GitHub repositories (170)

Showing the top 5 popular GitHub repositories that depend on Azure.Identity:

Repository Stars
microsoft/semantic-kernel
Integrate cutting-edge LLM technology quickly and easily into your apps
jasontaylordev/CleanArchitecture
Clean Architecture Solution Template for ASP.NET Core
dotnet/efcore
EF Core is a modern object-database mapper for .NET. It supports LINQ queries, change tracking, updates, and schema migrations.
dotnet/AspNetCore.Docs
Documentation for ASP.NET Core
dotnet-architecture/eShopOnWeb
Sample ASP.NET Core 8.0 reference application, powered by Microsoft, demonstrating a layered application architecture with monolithic deployment model. Download the eBook PDF from docs folder.
Version Downloads Last updated
1.13.1 390,933 10/24/2024
1.13.0 810,093 10/15/2024
1.13.0-beta.2 25,053 9/17/2024
1.13.0-beta.1 63,288 7/24/2024
1.12.1 2,022,754 9/26/2024
1.12.0 20,624,759 6/17/2024
1.12.0-beta.3 13,647 6/11/2024
1.12.0-beta.2 49,310 5/7/2024
1.12.0-beta.1 17,419 4/23/2024
1.11.4 20,827,080 6/10/2024
1.11.3 11,711,608 5/7/2024 1.11.3 has at least one vulnerability with moderate severity.
1.11.2 5,109,784 4/19/2024 1.11.2 has at least one vulnerability with moderate severity.
1.11.1 4,111,133 4/16/2024 1.11.1 has at least one vulnerability with moderate severity.
1.11.0 8,727,556 4/9/2024 1.11.0 has at least one vulnerability with moderate severity.
1.11.0-beta.1 61,537 2/6/2024 1.11.0-beta.1 has at least one vulnerability with moderate severity.
1.10.4 39,581,261 11/13/2023 1.10.4 has at least one vulnerability with moderate severity.
1.10.3 66,300,239 10/18/2023 1.10.3 has at least one vulnerability with moderate severity.
1.10.2 13,051,991 10/9/2023 1.10.2 has at least one vulnerability with moderate severity.
1.10.1 2,255,841 9/13/2023 1.10.1 has at least one vulnerability with high severity.
1.10.0 3,367,641 8/15/2023 1.10.0 has at least one vulnerability with high severity.
1.10.0-beta.1 16,837 7/17/2023 1.10.0-beta.1 has at least one vulnerability with high severity.
1.9.0 16,277,865 5/11/2023 1.9.0 has at least one vulnerability with high severity.
1.9.0-beta.3 45,706 4/12/2023 1.9.0-beta.3 has at least one vulnerability with high severity.
1.9.0-beta.2 120,557 2/22/2023 1.9.0-beta.2 has at least one vulnerability with high severity.
1.9.0-beta.1 309,501 10/13/2022 1.9.0-beta.1 has at least one vulnerability with high severity.
1.8.2 18,010,236 2/8/2023 1.8.2 has at least one vulnerability with high severity.
1.8.1 4,144,652 1/13/2023 1.8.1 has at least one vulnerability with high severity.
1.8.0 12,432,604 11/9/2022 1.8.0 has at least one vulnerability with high severity.
1.8.0-beta.1 5,569 10/13/2022 1.8.0-beta.1 has at least one vulnerability with high severity.
1.7.0 79,426,503 9/19/2022 1.7.0 has at least one vulnerability with high severity.
1.7.0-beta.1 71,773 8/10/2022 1.7.0-beta.1 has at least one vulnerability with high severity.
1.6.1 7,116,216 8/8/2022 1.6.1 has at least one vulnerability with high severity.
1.6.0 84,732,112 4/5/2022 1.6.0 has at least one vulnerability with high severity.
1.6.0-beta.1 55,546 2/11/2022 1.6.0-beta.1 has at least one vulnerability with high severity.
1.5.0 36,690,149 10/14/2021 1.5.0 has at least one vulnerability with high severity.
1.5.0-beta.4 56,934 9/8/2021 1.5.0-beta.4 has at least one vulnerability with high severity.
1.5.0-beta.3 155,726 8/11/2021 1.5.0-beta.3 has at least one vulnerability with high severity.
1.5.0-beta.2 37,345 7/12/2021 1.5.0-beta.2 has at least one vulnerability with high severity.
1.5.0-beta.1 27,301 6/8/2021 1.5.0-beta.1 has at least one vulnerability with high severity.
1.4.1 9,212,677 8/5/2021 1.4.1 has at least one vulnerability with high severity.
1.4.0 44,143,794 5/12/2021 1.4.0 has at least one vulnerability with high severity.
1.4.0-beta.5 158,585 4/6/2021 1.4.0-beta.5 has at least one vulnerability with high severity.
1.4.0-beta.4 36,064 3/9/2021 1.4.0-beta.4 has at least one vulnerability with high severity.
1.4.0-beta.3 137,125 2/10/2021 1.4.0-beta.3 has at least one vulnerability with high severity.
1.4.0-beta.2 22,750 1/30/2021 1.4.0-beta.2 has at least one vulnerability with high severity.
1.4.0-beta.1 126,349 10/16/2020 1.4.0-beta.1 has at least one vulnerability with high severity.
1.3.0 132,752,559 11/13/2020 1.3.0 has at least one vulnerability with high severity.
1.3.0-beta.2 3,527 10/8/2020 1.3.0-beta.2 has at least one vulnerability with high severity.
1.3.0-beta.1 41,038 9/11/2020 1.3.0-beta.1 has at least one vulnerability with high severity.
1.2.3 11,027,557 9/11/2020 1.2.3 has at least one vulnerability with high severity.
1.2.2 1,304,161 8/20/2020 1.2.2 has at least one vulnerability with high severity.
1.2.1 869,315 8/18/2020 1.2.1 has at least one vulnerability with high severity.
1.2.0-preview.6 19,525 7/23/2020 1.2.0-preview.6 has at least one vulnerability with high severity.
1.2.0-preview.5 16,731 7/8/2020 1.2.0-preview.5 has at least one vulnerability with high severity.
1.2.0-preview.4 70,949 6/10/2020 1.2.0-preview.4 has at least one vulnerability with high severity.
1.2.0-preview.3 126,263 5/5/2020 1.2.0-preview.3 has at least one vulnerability with high severity.
1.2.0-preview.2 47,112 4/6/2020 1.2.0-preview.2 has at least one vulnerability with high severity.
1.2.0-preview.1 72,255 3/10/2020 1.2.0-preview.1 has at least one vulnerability with high severity.
1.1.1 13,433,062 2/11/2020 1.1.1 has at least one vulnerability with high severity.
1.1.0 908,494 11/25/2019 1.1.0 has at least one vulnerability with high severity.
1.0.0 3,059,758 10/30/2019 1.0.0 has at least one vulnerability with high severity.
1.0.0-preview.5 10,830 10/7/2019 1.0.0-preview.5 has at least one vulnerability with high severity.
1.0.0-preview.4 3,610 9/10/2019 1.0.0-preview.4 has at least one vulnerability with high severity.
1.0.0-preview.3 5,507 8/6/2019 1.0.0-preview.3 has at least one vulnerability with high severity.
1.0.0-preview.2 3,655 7/2/2019 1.0.0-preview.2 has at least one vulnerability with high severity.
1.0.0-preview.1 1,020 6/28/2019 1.0.0-preview.1 has at least one vulnerability with high severity.