Asib27's picture
try 1
065fee7 verified
raw
history blame
3.01 kB
# Format https://setuptools.pypa.io/en/latest/userguide/declarative_config.html
[bdist_wheel]
universal=0
[metadata]
name = msal
version = attr: msal.__version__
description = The Microsoft Authentication Library (MSAL) for Python library enables your app to access the Microsoft Cloud by supporting authentication of users with Microsoft Azure Active Directory accounts (AAD) and Microsoft Accounts (MSA) using industry standard OAuth2 and OpenID Connect.
long_description = file: README.md
long_description_content_type = text/markdown
license = MIT
author = Microsoft Corporation
author_email = nugetaad@microsoft.com
url = https://github.com/AzureAD/microsoft-authentication-library-for-python
classifiers =
Development Status :: 5 - Production/Stable
Programming Language :: Python
Programming Language :: Python :: 3 :: Only
Programming Language :: Python :: 3
Programming Language :: Python :: 3.7
Programming Language :: Python :: 3.8
Programming Language :: Python :: 3.9
Programming Language :: Python :: 3.10
Programming Language :: Python :: 3.11
Programming Language :: Python :: 3.12
License :: OSI Approved :: MIT License
Operating System :: OS Independent
project_urls =
Changelog = https://github.com/AzureAD/microsoft-authentication-library-for-python/releases
Documentation = https://msal-python.readthedocs.io/
Questions = https://stackoverflow.com/questions/tagged/azure-ad-msal+python
Feature/Bug Tracker = https://github.com/AzureAD/microsoft-authentication-library-for-python/issues
[options]
include_package_data = False # We used to ship LICENSE, but our __init__.py already mentions MIT
packages = find:
# Our test pipeline currently still covers Py37
python_requires = >=3.7
install_requires =
requests>=2.0.0,<3
# MSAL does not use jwt.decode(),
# therefore is insusceptible to CVE-2022-29217 so no need to bump to PyJWT 2.4+
PyJWT[crypto]>=1.0.0,<3
# load_key_and_certificates() is available since 2.5
# https://cryptography.io/en/latest/hazmat/primitives/asymmetric/serialization/#cryptography.hazmat.primitives.serialization.pkcs12.load_key_and_certificates
#
# And we will use the cryptography (X+3).0.0 as the upper bound,
# based on their latest deprecation policy
# https://cryptography.io/en/latest/api-stability/#deprecation
cryptography>=2.5,<45
[options.extras_require]
broker =
# The broker is defined as optional dependency,
# so that downstream apps can opt in. The opt-in is needed, partially because
# most existing MSAL Python apps do not have the redirect_uri needed by broker.
# MSAL Python uses a subset of API from PyMsalRuntime 0.13.0+,
# but we still bump the lower bound to 0.13.2+ for its important bugfix (https://github.com/AzureAD/microsoft-authentication-library-for-cpp/pull/3244)
pymsalruntime>=0.13.2,<0.17; python_version>='3.6' and platform_system=='Windows'
[options.packages.find]
exclude =
tests