diff --git a/README.md b/README.md
index c76fe21168..3aab36fa00 100644
--- a/README.md
+++ b/README.md
@@ -1,6 +1,6 @@
# Microsoft Authentication Library for JavaScript (MSAL.js)
-The Microsoft Authentication Library for JavaScript enables both client-side and server-side JavaScript applications to authenticate users using [Azure AD](https://docs.microsoft.com/azure/active-directory/develop/v2-overview) for work and school accounts (AAD), Microsoft personal accounts (MSA), and social identity providers like Facebook, Google, LinkedIn, Microsoft accounts, etc. through [Azure AD B2C](https://docs.microsoft.com/azure/active-directory-b2c/active-directory-b2c-overview#identity-providers) service. It also enables your app to get tokens to access [Microsoft Cloud](https://www.microsoft.com/enterprise) services such as [Microsoft Graph](https://graph.microsoft.io).
+The Microsoft Authentication Library for JavaScript enables both client-side and server-side JavaScript applications to authenticate users using [Microsoft Entra ID](https://docs.microsoft.com/azure/active-directory/develop/v2-overview) for work and school accounts, Microsoft personal accounts (MSA), and social identity providers like Facebook, Google, LinkedIn, Microsoft accounts, etc. through [Azure AD B2C](https://docs.microsoft.com/azure/active-directory-b2c/active-directory-b2c-overview#identity-providers) service. It also enables your app to get tokens to access [Microsoft Cloud](https://www.microsoft.com/enterprise) services such as [Microsoft Graph](https://graph.microsoft.io).
## Repository
@@ -8,6 +8,8 @@ The Microsoft Authentication Library for JavaScript enables both client-side and
The [`lib`](https://github.com/AzureAD/microsoft-authentication-library-for-js/tree/dev/lib) folder contains the source code for our libraries in active development. You will also find all the details about **installing the libraries** in their respective README.md.
+- [Microsoft Authentication Library for JavaScript](lib/msal-browser/): A browser-based, framework-agnostic browser library that enables authentication and token acquisition with the Microsoft Identity platform in JavaScript applications. Implements the OAuth 2.0 [Authorization Code Flow with PKCE](https://docs.microsoft.com/azure/active-directory/develop/v2-oauth2-auth-code-flow), and is [OpenID-compliant](https://docs.microsoft.com/azure/active-directory/develop/v2-protocols-oidc).
+
- [Microsoft Authentication Library for Node.js](lib/msal-node/): A [Node.js](https://nodejs.org/en/) library that enables authentication and token acquisition with the Microsoft Identity platform in JavaScript applications. Implements the following OAuth 2.0 protocols and is [OpenID-compliant](https://docs.microsoft.com/azure/active-directory/develop/v2-protocols-oidc):
- [Authorization Code Grant](https://oauth.net/2/grant-types/authorization-code/) with [PKCE](https://oauth.net/2/pkce/)
@@ -17,7 +19,6 @@ The [`lib`](https://github.com/AzureAD/microsoft-authentication-library-for-js/t
- [Silent Flow](https://docs.microsoft.com/azure/active-directory/develop/msal-acquire-cache-tokens#acquiring-tokens-silently-from-the-cache)
- [On-behalf-of Flow](https://learn.microsoft.com/en-us/azure/active-directory/develop/v2-oauth2-on-behalf-of-flow)
-- [Microsoft Authentication Library for JavaScript](lib/msal-browser/): A browser-based, framework-agnostic browser library that enables authentication and token acquisition with the Microsoft Identity platform in JavaScript applications. Implements the OAuth 2.0 [Authorization Code Flow with PKCE](https://docs.microsoft.com/azure/active-directory/develop/v2-oauth2-auth-code-flow), and is [OpenID-compliant](https://docs.microsoft.com/azure/active-directory/develop/v2-protocols-oidc).
- [Native Authentication Support for JavaScript](lib/msal-browser/src/custom_auth/): MSAL also provides native authentication APIs that allow applications to implement a native experience with end-to-end customizable flows in their applications. With native authentication, users are guided through a rich, native, sign-up and sign-in journey without leaving the app. The native authentication feature is available for SPAs on [External ID for customers](https://learn.microsoft.com/en-us/entra/identity-platform/concept-native-authentication). It is recommended to always use the most up-to-date version of the SDK.
@@ -27,33 +28,43 @@ The [`lib`](https://github.com/AzureAD/microsoft-authentication-library-for-js/t
- [Microsoft Authentication Library for Angular](lib/msal-angular/): A wrapper of the msal-browser library for apps using Angular framework.
- [Microsoft Authentication Extensions for Node](extensions/msal-node-extensions/): The Microsoft Authentication Extensions for Node offers secure mechanisms for client applications to perform cross-platform token cache serialization and persistence. It gives additional support to the Microsoft Authentication Library for Node (MSAL).
-### Libraries in Long-term Support (LTS)
+### Library Version Support Status
+
+
+| Package Name | Current Version | LTS Version |
+|--------------|-----------------|-------------|
+| @azure/msal-browser |v5 | v4 |
+| @azure/msal-node | v5 | v3 |
+| @azure/msal-react | v5 | v3 |
+| @azure/msal-angular | v5 | v4 |
+| @azure/msal-node-extensions | v5 | v1 |
+| ~~@azure/msal (msal-core)~~| | Fully Deprecated |
+| ~~@azure/msal-angularjs~~ | | Fully Deprecated |
-The following libraries, hosted on the `msal-lts` branch, are no longer in active development, but they are still receiving critical security bug fix support.
+**Disambiguation:**
+- The MSAL team provides full support to the current version for each package in the table below.
+- LTS (long-term support) versions will still receive some support and critical bug-fixes but will not ship new features. Our recommendation if you encounter any issues will always be to upgrade to the latest version of the library.
+- All supported packages were brought up to version parity as of `v5`. Packages with versions lower than `v4` in the LTS column skipped as many versions as required to jump directly to `v5`.
+
+#### MSAL Browser CDN Deprecation
+
+> :warning: The `@azure/msal-browser` CDN has been fully deprecated as of `@azure/msal-browser@3.0.0` and is no longer supported. App developers using the MSAL CDN must upgrade to the latest possible version and consume MSAL through a package manager or bundling tool of their choice. For more information on version support, consult the table above.
-- [Microsoft Authentication Library for JavaScript v2.x](https://github.com/AzureAD/microsoft-authentication-library-for-js/tree/msal-lts/lib/msal-browser)
-- [Microsoft Authentication Library for Node.js v1.x](https://github.com/AzureAD/microsoft-authentication-library-for-js/tree/msal-lts/lib/msal-node)
-- [Microsoft Authentication Library for React v1.x](https://github.com/AzureAD/microsoft-authentication-library-for-js/tree/msal-lts/lib/msal-react)
-- [Microsoft Authentication Library for Angular v2.x](https://github.com/AzureAD/microsoft-authentication-library-for-js/tree/msal-lts/lib/msal-angular)
### Package Structure
-We ship a number of different packages which are meant for different platforms. You can see the relationship between packages and different authentication flows they implement below.
+We ship a number of different packages which are meant for different platforms. You can see the relationship between packages and their dependencies below.

### Samples
-The [`samples`](https://github.com/AzureAD/microsoft-authentication-library-for-js/tree/dev/samples) folder contains sample applications for our libraries. A complete list of samples can be found in the respective package folders or [on our wiki](https://github.com/AzureAD/microsoft-authentication-library-for-js/wiki/Samples).
+The [`samples`](https://github.com/AzureAD/microsoft-authentication-library-for-js/tree/dev/samples) folder contains sample applications for our libraries. A complete list of samples can be found in the respective package folders.
## Package versioning
All of our libraries follow [semantic versioning](https://semver.org). We recommend using the latest version of each library to ensure you have the latest security patches and bug fixes.
-## Roadmap
-
-Please check the [roadmap](https://github.com/AzureAD/microsoft-authentication-library-for-js/blob/dev/roadmap.md) to see what we are working on and what we have planned for future releases.
-
## Community Help and Support
- [GitHub Issues](../../issues) is the best place to ask questions, report bugs, and new request features.
diff --git a/SECURITY.md b/SECURITY.md
index 5ef49610e5..58a58f9965 100644
--- a/SECURITY.md
+++ b/SECURITY.md
@@ -1,21 +1,5 @@
# Security Policy
-## Supported Versions
-
-The following versions of our libraries are receiving security updates:
-
-| Version | Supported |
-| ------- | ------------------ |
-| `@azure/msal-browser@2.x.x` | :white_check_mark: |
-| `msal@1.x.x` | :white_check_mark: |
-| `msal@0.x.x` | :x: |
-| `@azure/msal-angular@2.x.x` | :white_check_mark: |
-| `@azure/msal-angular@1.x.x` | :white_check_mark: |
-| `@azure/msal-angular@0.x.x` | :x: |
-| `@azure/msal-angularjs@0.1.x` | :white_check_mark: |
-| `@azure/msal-react@1.x.x` | :white_check_mark: |
-| `@azure/msal-node@1.x.x` | :white_check_mark: |
-
## Reporting a Vulnerability
If you find a security issue with our libraries or services [please report it to the Microsoft Security Response Center (MSRC)](https://aka.ms/report-security-issue) with as much detail as possible. Your submission may be eligible for a bounty through the [Microsoft Bounty](http://aka.ms/bugbounty) program. Please do not post security issues to GitHub Issues or any other public site. We will contact you shortly upon receiving the information. We encourage you to get notifications of when security incidents occur by visiting [this page](https://www.microsoft.com/msrc/technical-security-notifications) and subscribing to Security Advisory Alerts.
diff --git a/docs/diagrams/png/PackageStructure.png b/docs/diagrams/png/PackageStructure.png
index e4e4b32f51..2ed3030978 100644
Binary files a/docs/diagrams/png/PackageStructure.png and b/docs/diagrams/png/PackageStructure.png differ
diff --git a/lib/msal-browser/README.md b/lib/msal-browser/README.md
index e1acdf2b70..32515a21a7 100644
--- a/lib/msal-browser/README.md
+++ b/lib/msal-browser/README.md
@@ -13,6 +13,9 @@
1. [Roadmap](https://github.com/AzureAD/microsoft-authentication-library-for-js/blob/dev/roadmap.md)
1. [Prerequisites](#prerequisites)
1. [Installation](#installation)
+ - [CDN Deprecation](#cdn-deprecation)
+ - [Via npm](#via-npm)
+ - [Via Yarn](#via-yarn)
1. [Usage](#usage)
- [Migrating from Previous MSAL Versions](#migrating-from-previous-msal-versions)
- [MSAL Basics](#msal-basics)
@@ -27,20 +30,17 @@
## About
-The MSAL library for JavaScript enables client-side JavaScript applications to authenticate users using [Azure AD](https://docs.microsoft.com/azure/active-directory/develop/v2-overview) work and school accounts (AAD), Microsoft personal accounts (MSA) and social identity providers like Facebook, Google, LinkedIn, Microsoft accounts, etc. through [Azure AD B2C](https://docs.microsoft.com/azure/active-directory-b2c/active-directory-b2c-overview#identity-providers) service. It also enables your app to get tokens to access [Microsoft Cloud](https://www.microsoft.com/enterprise) services such as [Microsoft Graph](https://graph.microsoft.io).
+The MSAL library for JavaScript enables client-side JavaScript applications to authenticate users using [Microsoft Entra ID](https://docs.microsoft.com/azure/active-directory/develop/v2-overview) work and school accounts (AAD), Microsoft personal accounts (MSA) and social identity providers like Facebook, Google, LinkedIn, Microsoft accounts, etc. through [Azure AD B2C](https://docs.microsoft.com/azure/active-directory-b2c/active-directory-b2c-overview#identity-providers) service. It also enables your app to get tokens to access [Microsoft Cloud](https://www.microsoft.com/enterprise) services such as [Microsoft Graph](https://graph.microsoft.io).
The `@azure/msal-browser` package described by the code in this folder uses the [`@azure/msal-common` package](https://github.com/AzureAD/microsoft-authentication-library-for-js/tree/dev/lib/msal-common) as a dependency to enable authentication in JavaScript Single-Page Applications without backend servers. This version of the library uses the OAuth 2.0 Authorization Code Flow with PKCE. To read more about this protocol, as well as the differences between implicit flow and authorization code flow, see the section [below](#implicit-flow-vs-authorization-code-flow-with-pkce).
-This is an improvement upon the previous `@azure/msal` library which will utilize the authorization code flow in the browser. Most features available in the old library will be available in this one, but there are nuances to the authentication flow in both. The `@azure/msal-browser` package does NOT support the implicit flow.
+The `@azure/msal-browser` package **does NOT** support the implicit flow.
+
## FAQ
See [here](https://github.com/AzureAD/microsoft-authentication-library-for-js/blob/dev/lib/msal-browser/FAQ.md).
-## Roadmap
-
-See [here](https://github.com/AzureAD/microsoft-authentication-library-for-js/blob/dev/roadmap.md).
-
## Prerequisites
- `@azure/msal-browser` is meant to be used in [Single-Page Application scenarios](https://docs.microsoft.com/azure/active-directory/develop/scenario-spa-overview).
@@ -49,18 +49,32 @@ See [here](https://github.com/AzureAD/microsoft-authentication-library-for-js/bl
## Installation
+### CDN Deprecation
+
+> :warning: The `@azure/msal-browser` CDN has been fully deprecated as of `@azure/msal-browser@3.0.0` and is no longer supported. App developers using the MSAL CDN must upgrade to the latest possible version and consume MSAL through a package manager or bundling tool of their choice. For more information on version support, consult the table in the project [README.md](../../README.md#library-version-support-status).
+
### Via NPM
```javascript
npm install @azure/msal-browser
```
+### Via Yarn
+
+```javascript
+yarn add @azure/msal-browser
+```
+
## Usage
### Migrating from Previous MSAL Versions
-- [Migrating from MSAL v1.x to MSAL v2.x](https://github.com/AzureAD/microsoft-authentication-library-for-js/blob/dev/lib/msal-browser/docs/v1-migration.md)
+Select the guide that matches your current MSAL version:
+
+- [Migrating from MSAL v4.x to MSAL v5.x](https://github.com/AzureAD/microsoft-authentication-library-for-js/blob/dev/lib/msal-browser/docs/v4-migration.md)
+- [Migrating from MSAL v3.x to MSAL v4.x](https://github.com/AzureAD/microsoft-authentication-library-for-js/blob/dev/lib/msal-browser/docs/v3-migration.md)
- [Migrating from MSAL v2.x to MSAL v3.x](https://github.com/AzureAD/microsoft-authentication-library-for-js/blob/dev/lib/msal-browser/docs/v2-migration.md)
+- [Migrating from MSAL v1.x to MSAL v2.x](https://github.com/AzureAD/microsoft-authentication-library-for-js/blob/dev/lib/msal-browser/docs/v1-migration.md)
### MSAL Basics
@@ -131,11 +145,9 @@ npm test
npm run test:coverage
```
-## Implicit Flow vs Authorization Code Flow with PKCE
-
-`@azure/msal-browser` implements the [OAuth 2.0 Authorization Code Flow with PKCE](https://tools.ietf.org/html/rfc7636) for browser-based applications. This is a significant improvement over the Implicit Flow that was used in `@azure/msal`, `msal` or `adal-angular`.
+## Authorization Code Flow with Proof Key for Code Exchange (PKCE)
-### Authorization Code Flow with PKCE
+`@azure/msal-browser` implements the [OAuth 2.0 Authorization Code Flow with PKCE](https://tools.ietf.org/html/rfc7636) for browser-based applications.
The Authorization Code Flow with Proof Key for Code Exchange (PKCE) is the current industry standard for securing OAuth 2.0 authorization in public clients, including single-page applications (SPAs). Key benefits include:
@@ -144,28 +156,11 @@ The Authorization Code Flow with Proof Key for Code Exchange (PKCE) is the curre
- **Refresh Token Support**: Enables long-lived sessions through refresh tokens
- **OIDC Compliance**: Fully compliant with OpenID Connect standards
-### Implicit Flow (Deprecated)
-
-The Implicit Flow was the previous standard for SPAs but has been deprecated due to security concerns:
-
-- **Tokens in URLs**: Access tokens are returned in URL fragments, making them visible in browser history and server logs
-- **No Refresh Tokens**: Implicit flow cannot securely deliver refresh tokens to public clients
-- **Increased Attack Surface**: Tokens are more susceptible to token leakage attacks
-
-### Migration Considerations
-
-- **`@azure/msal-browser` only supports Authorization Code Flow with PKCE** - Implicit Flow is not supported
-- If you're migrating from `@azure/msal`, `msal` or `adal-angular`, see our [migration guide](./docs/v1-migration.md)
-- Your Azure AD app registration needs to be configured for the Authorization Code Flow
-- Existing applications using Implicit Flow should migrate to Authorization Code Flow for improved security
-
-For more technical details about these flows, refer to the [Microsoft identity platform documentation](https://docs.microsoft.com/azure/active-directory/develop/v2-oauth2-auth-code-flow).
-
## Framework Wrappers
If you are using a framework such as Angular or React you may be interested in using one of our wrapper libraries:
-- Angular: [@azure/msal-angular v2](https://github.com/AzureAD/microsoft-authentication-library-for-js/tree/dev/lib/msal-angular)
+- Angular: [@azure/msal-angular](https://github.com/AzureAD/microsoft-authentication-library-for-js/tree/dev/lib/msal-angular)
- React: [@azure/msal-react](https://github.com/AzureAD/microsoft-authentication-library-for-js/tree/dev/lib/msal-react)
## Security Reporting
diff --git a/lib/msal-browser/docs/cdn-usage.md b/lib/msal-browser/docs/cdn-usage.md
index b649f9398b..dc023d80a1 100644
--- a/lib/msal-browser/docs/cdn-usage.md
+++ b/lib/msal-browser/docs/cdn-usage.md
@@ -1,234 +1,6 @@
# CDN Usage for @azure/msal-browser
-In addition to npm, `msal` can be consumed from Microsoft-hosted CDNs.
-
**_NOTE:_** Starting from MSAL.js v3 `msal-browser` is no longer hosted on the CDN. If you consume `msal-browser` from the CDN you will need to download `msal-browser` from npm and choose one of the following alternatives before upgrading:
1. Consume the ESM build (preferred)
-1. Extract `lib/msal-browser.js` or `lib/msal-browser.min.js` from the downloaded package and serve it as a static asset with your app or host it on your own CDN
-
-## Best Practices
-
-**_NOTE:_** We highly recommend using npm to consume MSAL.js (all versions). This documentation is maintained _only_ for existing legacy build support for CDNs until MSAL v2. CDN support is discontinued starting MSAL JS v3.
-
-When using the CDN, we recommend the following best practices:
-
-- Use the latest version of MSAL.js v2.
-- Use the minified build in production, unminified build for development.
-- Use the Microsoft CDN instead of third-party CDNs.
-- Use the CDN region nearest to your users.
-- Use the `async` or `defer` attributes to not block page rendering.
-- Use the `integrity` attribute to ensure integrity of CDN builds.
-- IE11 support requires a Promise polyfill ([more information](https://github.com/AzureAD/microsoft-authentication-library-for-js/tree/dev/samples/msal-browser-samples/VanillaJSTestApp2.0/app/ie11-sample) on IE11 support).
-
-## Basic Usage
-
-
-
-```html
-
-```
-
-## Unminified builds
-
-In addition to minified builds, unminified builds for each version are also available (as `msal-browser.js` instead of `msal-browser.min.js`)
-
-```html
-
-
-```
-
-## Domains supported
-
-Microsoft offers 2 top-level CDN domains for resilience.
-
-| CDN Domain | Example |
-| -------------------- | --------------------------------------------------------------------- |
-| `alcdn.msauth.net` | `https://alcdn.msauth.net/browser//js/msal-browser.min.js` |
-| `alcdn.msftauth.net` | `https://alcdn.msftauth.net/browser//js/msal-browser.min.js` |
-
-### CDN fallback
-
-In the unlikely event that a CDN build is broken or the CDN itself is inaccessible, an application can use the other CDN region as a fallback:
-
-```html
-
-
-```
-
-**Note:** This method of using `document.write` may be blocked in certain browsers in certain situations. More information can be found [here](https://www.chromestatus.com/feature/5718547946799104).
-
-## Subresource Integrity
-
-From [MDN](https://developer.mozilla.org/docs/Web/Security/Subresource_Integrity):
-
-> Subresource Integrity (SRI) is a security feature that enables browsers to verify that resources they fetch (for example, from a CDN) are delivered without unexpected manipulation. It works by allowing you to provide a cryptographic hash that a fetched resource must match.
-
-> Using Content Delivery Networks (CDNs) to host files such as scripts and stylesheets that are shared among multiple sites can improve site performance and conserve bandwidth. However, using CDNs also comes with a risk, in that if an attacker gains control of a CDN, the attacker can inject arbitrary malicious content into files on the CDN (or replace the files completely) and thus can also potentially attack all sites that fetch files from that CDN.
-
-> Subresource Integrity enables you to mitigate some risks of attacks such as this, by ensuring that the files your web application or web document fetches (from a CDN or anywhere) have been delivered without a third-party having injected any additional content into those files — and without any other changes of any kind at all having been made to those files.
-
-It is highly recommended to use SRI Hashes with CDN builds of MSAL.js to help secure your application and the authentication artifacts (e.g. access tokens) that MSAL.js stores in the browser.
-
-### MSAL.js SRI Hash Example
-
-```html
-
-```
-
-### SRI Hash Notes
-
-- Each hash will be unique to the version of MSAL.js v2, and will not change.
-- SRI hash usage is optional for MSAL.js CDN builds.
-- If the `integrity` attribute is used for MSAL.js v2 CDN builds, the `crossorigin` attribute must be set to `"anonymous"`.
-- If you believe our CDN builds have been compromised, please [inform us](https://github.com/AzureAD/microsoft-authentication-library-for-js/blob/dev/SECURITY.md#reporting-a-vulnerability) immediately.
-
-### SRI Hash History
-
-
-
-| Version | Build | SRI Hash |
-| ------------ | ------------------- | ------------------------------------------------------------------------- |
-| 2.35.0 | msal-browser.js | `sha384-+8A1rifuHuJxJgQn6UCxGgmo6Q2SvIeEAqtPOsXCpi0DpqZLtuDhxxnqjJZw/1ve` |
-| 2.35.0 | msal-browser.min.js | `sha384-PARf28kmic36Ve+O3DnUerRXFtOQ7ZDqRDGpLcbljly5/N39T2OV3kt3QsWOKeAX` |
-| 2.34.0 | msal-browser.js | `sha384-8TkGQjPkLg+rgblWRah3ZvrUIkKL7iDl8aYUAd/8xqSzwSpmOAtEPkE7eLQvs+Ru` |
-| 2.34.0 | msal-browser.min.js | `sha384-oSX3mlcV2SGDE+ZhNgvgqV1xrCHF5lBDuFj1qGUIuCYg/OZzhuJmMSvXOuh1waW2` |
-| 2.33.0 | msal-browser.js | `sha384-xfWQjvZ0VzT5Zvno0SgkPatOmGBEbU8nBL9PyHta/UR299kguq6f5AdiT7i4njhQ` |
-| 2.33.0 | msal-browser.min.js | `sha384-sIyEdUUBfHyE7nRpvFHA2odaB/z+HNe9frVsvOKkncXSRPnyek6HeakhZhNdJLrj` |
-| 2.32.2 | msal-browser.js | `sha384-FiPubKXaL8pr5mOhDJ06p9BG501EIJFxOxYWUfqLiUeSGIF2SWo8cWI3QnQEZ1FN` |
-| 2.32.2 | msal-browser.min.js | `sha384-y1IcCD+XmMR+nTJWafnzQJt1pwQU6CT7CvoixQpAYX2LlSu0NG7KmE5KXnarCJLy` |
-| 2.32.1 | msal-browser.js | `sha384-8M9Qh0U/bSYzHACsgrp8pVFDoPDH5C1Cm39aGMGXpQ2XzxnyMZbbQnnu8nEnj6vp` |
-| 2.32.1 | msal-browser.min.js | `sha384-UrQz8fjd/68UVLcPZl2ZTrABZEfujnPqnuQt7CV6903eSw62F3KEsOwGudSw2A9Q` |
-| 2.32.0 | msal-browser.js | `sha384-zT0cfnNK2YXRh/ickIdCtkvP0wUCA0jH2jgHuXuErJIDc2UXBt3iwS5eJaW0ZXVG` |
-| 2.32.0 | msal-browser.min.js | `sha384-MkuKIg4TRd71anKVt5q1+USEhZ2N2tVOTgDwlOuysviT1CanXfuWB2P4B2X4jSXj` |
-| 2.31.0 | msal-browser.js | `sha384-BO4qQ2RTxj2akCJc7t6IdU9aRg6do4LGIkVVa01Hm33jxM+v2G+4q+vZjmOCywYq` |
-| 2.31.0 | msal-browser.min.js | `sha384-1vMI1nswvByekU8FrM4tFu+iue2XqjisDCQmalPH2vWX53szbpaLAQA/rI1p9mjz` |
-| 2.30.0 | msal-browser.js | `sha384-o4ufwq3oKqc7IoCcR08YtZXmgOljhTggRwxP2CLbSqeXGtitAxwYaUln/05nJjit` |
-| 2.30.0 | msal-browser.min.js | `sha384-HC34/sGr6mESU7p33Bo1s3lWvYOdfDnu05vmaJFpSvHZbTUdKWIOxIn5SuZnqafp` |
-| 2.29.0 | msal-browser.js | `sha384-L8LyrNcolaRZ4U+N06atid1fo+kBo8hdlduw0yx+gXuACcdZjjquuGZTA5uMmUdS` |
-| 2.29.0 | msal-browser.min.js | `sha384-CirgUajm2J/qIZ/u+TqkKMfxFdAhX0Q5UDQ0lJR0cMZam8SP6WASMDgG6ZuH9YU2` |
-| 2.28.3 | msal-browser.js | `sha384-OnQxm8gBWqXtcrgb4TGKgQsKvNFDAVRb/LYrQ4SkYg6nYK+vg9oC/OF6+KRmqwGn` |
-| 2.28.3 | msal-browser.min.js | `sha384-LTsAmgDln/CC82A+RiT/7SX65gRIMoqFU6jclq+TzHTa3ydfY6ex6J3LO1pyLC1/` |
-| 2.28.2 | msal-browser.js | `sha384-bTszrDBNEw/vuvCJ58o9obswP5dg379zO8MJx53LyZCsKsSnrErje1LM+6Bk8Lkl` |
-| 2.28.2 | msal-browser.min.js | `sha384-203jB5A+1LERtg89ajpErgNu5XzbM4Hye182KOJTVuHD19rezlVuwnwQ3WVbhZVF` |
-| 2.28.1 | msal-browser.js | `sha384-M6geA+l92SitR/WGDtbiK0tt/MAv3qimyNK2vaOatn2c+OrHVbwYaG85IIlSq7eY` |
-| 2.28.1 | msal-browser.min.js | `sha384-ei8xVSyFPTuRnbO1sdYy5qJT6Kd9neBfVG8AjZySEwdMG1GhCThbceSqxJnx0Ci3` |
-| 2.28.0 | msal-browser.js | `sha384-q8S4bw8Wfzedv3LPXdOP0+IKu+LqXg4l9xZaOwTp3h40FYMw6YeO/6FX+aG6vgXx` |
-| 2.28.0 | msal-browser.min.js | `sha384-dKtQ/y8SrxV+8eZsQnb3vQpwWP57fRau9cbe4FbFK6B+VSC5SaWTM9w6lwQdNhKG` |
-| 2.27.0 | msal-browser.js | `sha384-CsXI9QUbEXvbc1SIiLQ1/sUNkZZfkQSamJ2YU4g/yDKQNDyn8D2HTgR1ww7QV5+U` |
-| 2.27.0 | msal-browser.min.js | `sha384-IlUQkOwOI6mWk8GNIWu8hpPE1sasxSg3gGjZo0dncq6IhHsTlH51mp5mhFYS5po1` |
-| 2.26.0 | msal-browser.js | `sha384-fitpJWrpyl840mvd9nBFLGulqR4BJzvim0fzrXQKdsVh2AQzE4rTTJ0o5o+x+dRK` |
-| 2.26.0 | msal-browser.min.js | `sha384-VdtLJ4gW9+dszXDbJEzdUFYI+xq4hXfOGntgGlDve3qz/5WEzWjLeN1voiro74af` |
-| 2.25.0 | msal-browser.js | `sha384-zezf4cRFK/02dUQFQjo+qA3OjwpHtgizVgd4wMyxG2bWNy2TxzKe1CqIyBYWRJxF` |
-| 2.25.0 | msal-browser.min.js | `sha384-dDqLsp/gmQFrDNIjpyKi23AtweUuA2Hn3wnwxOr+IwWGC8Zock5gcEwvLAkvvXh/` |
-| 2.24.0 | msal-browser.js | `sha384-NcVVwcZIMSdYk9wbu0m7mElxxmQMIMRVSXXkF53lT+d41bXftjpIs8neU7xry4ch` |
-| 2.24.0 | msal-browser.min.js | `sha384-U+uxTX8q39oAXjbZ8Bp9eTNwAmwyS8Sq7afx4SiEUFTt4LRIEbZDcMmVE0K85Vze` |
-| 2.23.0 | msal-browser.js | `sha384-dvhiAjRHm++5woziYGV/JQSredPVb/p0VCATrsE/Upv4VmhLrKo6MWW218QofKIG` |
-| 2.23.0 | msal-browser.min.js | `sha384-QxXqndv+Kkjr1gNW8SQUIE2zG/UT8lHYvf6HYdAAUj56xs9utgJNWyknd0O1CrUl` |
-| 2.22.1 | msal-browser.js | `sha384-cKDVz4ain64nzHeJR0vejySPl0i8A6c7YfJI5ehEDQDoA5SSlb/zoLAFvXTQvTQS` |
-| 2.22.1 | msal-browser.min.js | `sha384-nCTmWvEOevLDR1A0WzHvi1PbktdL8pPPACO2UYs9NPp+TCEz0hE0c8JmMxRlNSjh` |
-| 2.22.0 | msal-browser.js | `sha384-B46pTTVe+0LfqOtym4Ys6NnTk47DzGHgn83hf4JBDIUfgiZlYFaywZqzEYQYCg4b` |
-| 2.22.0 | msal-browser.min.js | `sha384-JmIjzXWxZ0+8Zd5wAsqkE9EKmxRx1ikmsnABsK9yFAbMmjOv9kSK4j560FLjkCxn` |
-| 2.21.0 | msal-browser.js | `sha384-928QQ3wSVfsx4ZV1MR0896l8lK21YX1xWK3gSl8AW/lMEAZ2GeYqvFkm/VPzgn4y` |
-| 2.21.0 | msal-browser.min.js | `sha384-s/NxjjAgw1QgpDhOlVjTceLl4axrp5nqpUbCPOEQy1PqbFit9On6uw2XmEF1eq0s` |
-| 2.20.0 | msal-browser.js | `sha384-Ky1dhcw3VPMuZV6VlVBcQBtWHs5Ry8rkG2LGdxdEOoaApfNShXhD3OQTgN3klUN5` |
-| 2.20.0 | msal-browser.min.js | `sha384-WV/465aYIrPn7bcKutSAFz+3JedxtCaRXxYu5EEjgGKPaOz7gjN06C8tBoGEmlZm` |
-| 2.19.0 | msal-browser.js | `sha384-qMZg1SlV+Gm/R5MbEArouisSUHYzmBo05auTya2W3UOOr2Mlr2UvzzP1+nw5zc01` |
-| 2.19.0 | msal-browser.min.js | `sha384-VK+6hHt27itNFksZdEeXofJXdAhmlizHbC/a1TUUJm/Yq6gOuAjXKkiiCaGbFsnd` |
-| 2.18.0 | msal-browser.js | `sha384-PERHHiF9DdKG6zSfxaBeyaXmEbHrKvJjvab6BjfKeufVnfveKzZLHGB6m213V4tT` |
-| 2.18.0 | msal-browser.min.js | `sha384-h9/gGcqbtmiQLu/34PC5wXvlxf+ugeTXcotRfHcjAIwyIB7UzyxcfNBcz3ONQiTz` |
-| 2.17.0 | msal-browser.js | `sha384-LgNKCUpBSQJW+dWsseosd8ZZ7GNGiO+9SbgDBYyfqFkGJGg29VAzMQDYjK76r7o5` |
-| 2.17.0 | msal-browser.min.js | `sha384-nPvMTGGQIdPr+oK09URmAR99LAk9PEVLJE+RJfjIH/QADFbVgGlF9tFdVbgSYC+c` |
-| 2.16.1 | msal-browser.js | `sha384-JNwcxoC2tyQMQnFA7pCGC8h4BSIlWY9ytKZv0tVvvFzlqsCj77gw9sa+0FlM5c0F` |
-| 2.16.1 | msal-browser.min.js | `sha384-bPBovDNeUf0pJstTMwF5tqVhjDS5DZPtI1qFzQI9ooDIAnK8ZCYox9HowDsKvz4i` |
-| 2.16.0 | msal-browser.js | `sha384-W29UmqhBlCkSR5sC6sGVNkUpnNBI2hYRwB0/3wiCixcjzpXRLyByZbNOrx+xPiR/` |
-| 2.16.0 | msal-browser.min.js | `sha384-h/D+9sV4N/CFwWR6G+dv+dkByf17RfGMJZl5f9noj9QamUJdw6BW3xZPAVSWyG4A` |
-| 2.15.0 | msal-browser.js | `sha384-dFzMiVGB5HpWZ+5w5VSif6jhWfNeplSw9ACYmQKZcY2azuT9kCxVWVI9HyfGdkHV` |
-| 2.15.0 | msal-browser.min.js | `sha384-/weuqUPkC0P9JxnstihEV1GHdWrheU9Qo3MbdTuxxKJM8l/cSTE5zGP5VBIM4TZN` |
-| 2.14.2 | msal-browser.js | `sha384-SeRoSpLefUsASd6PTJsFeKDwITzOJ6gxSmsl+Z9Fl/hY2PAn/rKcw3WzoaBGc4my` |
-| 2.14.2 | msal-browser.min.js | `sha384-ggh+EF1aSqm+Y4yvv2n17KpurNcZTeYtUZUvhPziElsstmIEubyEB6AIVpKLuZgr` |
-| 2.14.1 | msal-browser.js | `sha384-RRV2T1wXStSmpELGRUont/dBMwIOD45UU7pk2qP7msfNC5dBalYUq+7cO02NPSj1` |
-| 2.14.1 | msal-browser.min.js | `sha384-U3GjPGP2DZIb7AJBXk4B2quSe+7i4Dos1SqrcBwXPUkgnEZtnUBobrvAGXxpH6Cj` |
-| 2.14.0 | msal-browser.js | `sha384-BiEwq81GpEOSES/Zj2TjBInBOQjHki/s0Si4VLT6JK2XoFX0cJK6HjII3W3eJ7DS` |
-| 2.14.0 | msal-browser.min.js | `sha384-WBY8oVVrEdSaZOKwHzdAhKjmFK8vz2bpQt90XIIBsBFJI8JtGteFQn6ngXmA3n9h` |
-| 2.13.1 | msal-browser.js | `sha384-7hwr87O1w6buPsX92CwuRaz/wQzachgOEq+iLHv0ESavynv6rbYwKImSl7wUW3wV` |
-| 2.13.1 | msal-browser.min.js | `sha384-2Vr9MyareT7qv+wLp1zBt78ZWB4aljfCTMUrml3/cxm0W81ahmDOC6uyNmmn0Vrc` |
-| 2.13.0 | msal-browser.js | `sha384-8WE3wV17rmapJTrZubql1Rziv4aZmDrlb7F3iZbiQEuOT7nmK8UH39MN2cEIOWQy` |
-| 2.13.0 | msal-browser.min.js | `sha384-vDONqKCGNcmVCJ/YQ6YHzbrhwKdihAE08TkDEHBZjgjqRYz5itQb7Rdst5Oy5GB+` |
-| 2.12.1 | msal-browser.js | `sha384-QMpSjAFJzgh/J1zBL23Xx95KfVI1n9Je9GmB3byJbZ0/hj8o9CJTmxOK/BPZivil` |
-| 2.12.1 | msal-browser.min.js | `sha384-cZM20w+KzsO/N+6IGI+U1e2zsBS1ciCc6VdEC5SZ1/pHGyvcpE6D2uk0XcFwgb1q` |
-| 2.12.0 | msal-browser.js | `sha384-WqJE0XrCKXbaCrjTk1+pq6qArRvxmGqf6YUBgoqwCz4WDXJFCW2hZZN0HMLE7/XB` |
-| 2.12.0 | msal-browser.min.js | `sha384-eD9W7ukFmFKtgjDgCWa6WpkuqKjQ5Q/EP686z9/t2DK93dQtdIx8LAhMc9Mjy3hA` |
-| 2.11.2 | msal-browser.js | `sha384-Zr4eBs1XVPlVMD5df2RNBeFhTy62Z8nN//v8dOR8pAgf6iI9rBTuvRZJSGjGjOCQ` |
-| 2.11.2 | msal-browser.min.js | `sha384-MkT8/EXqCzh7OVmmpVdg5H2Fhpbt9uNrQM7UMbTg+v8fJVcfQ0BWf16siodTYgF6` |
-| 2.11.1 | msal-browser.js | `sha384-LIpmPPrsEE7hCBPf0k4nn8zf9h8Z1i69YnG8TmRLTnaMDI6B2nGzLIh/c51BHgpN` |
-| 2.11.1 | msal-browser.min.js | `sha384-wgFLXq8mfWaFslz/C51m2NvUX7aBENCLEqRi9BNL+23HBfWkeFCGfvqaPGmAbrzC` |
-| 2.11.0 | msal-browser.js | `sha384-4PutheeyrGgwghN7WV8QaHBshN673W9fDW3PDP0Zw1Wm9CVZIuU2RFSWfcxEWAR0` |
-| 2.11.0 | msal-browser.min.js | `sha384-mxc9xXB8zELCYWdhT4JCez24AMsgk+uN7e991ek2TrQy9rBPVlUiuppobVCuja8S` |
-| 2.10.0 | msal-browser.js | `sha384-h4/puysjUElY8ygLCfA1sWMW/y1DsRmX02pAa6Om71bq6qS/w9PzLjby6YTkgH6W` |
-| 2.10.0 | msal-browser.min.js | `sha384-UiyYbBRwVt3gTqaQfkEn8ceYV1cB9KAofImJ8nOc/vdqHATCuzgGZhxWgkhPBjNe` |
-| 2.9.0 | msal-browser.js | `sha384-+akJUidBAUlm36Zv/ib9eOD+CZDJ67/yVEPaDV9aNw7164awXZbuEjLnsxDXuQO1` |
-| 2.9.0 | msal-browser.min.js | `sha384-MUSnn9XLYFUDadNpWJyizBT8WbNR2FGs9zcvZG1GbEwFSK59dFTUESMnAtN6Edgg` |
-| 2.8.0 | msal-browser.js | `sha384-Mjsbb/z4VVY/1KEUcSY4zG2SObmLbGdEQp1a6qJ8x4Qkd8HqhBmkigPO1LO+ZKC8` |
-| 2.8.0 | msal-browser.min.js | `sha384-b/qP1MqDbgDE3TTcBfXi4/r9pcSjPbT1lTVl5Q71LhQMpn95C4bDE8+83ImeSE+l` |
-| 2.7.0 | msal-browser.js | `sha384-5Fqyq1ncNYhL2mXCdWAFXkf2wWtKeA0mXYp++ryAX1lowD0ctAHFdity37L/ULXh` |
-| 2.7.0 | msal-browser.min.js | `sha384-isB7RsMD9bXfK4BK9pJHfTyTfQMM/KQ/1a58J/PVsDFbto29TgNxOP3ZyrhRyiTV` |
-| 2.6.1 | msal-browser.js | `sha384-kHVR+hnKKUXpL5UEI3dgmdIKZgopBagC1RdQytFqglEGROvOSAGJRkaFWfu8VsSx` |
-| 2.6.1 | msal-browser.min.js | `sha384-ry0iBug2qnSSs0YiS8IfxgvYZvgsCCXiplbiwrf9tQWkpCFMcezBMuLDbVtYrKIl` |
-| 2.6.0 | msal-browser.js | `sha384-MOtTwBzAcbzhOnPuklGgFJINWfT6ekHPIhI0GkJdUihkt/AtO/ttlrT93yen631k` |
-| 2.6.0 | msal-browser.min.js | `sha384-sGG/3pGinkV/9X/+VrbuRSSJmOaYKq9Bdyet6ICHajSN8wSG9DpJHda6vls5BkUd` |
-| 2.5.2 | msal-browser.js | `sha384-ZOWQBoErNmfc9sfHh6PXYc9NZ+02cf5d+wdsnvfKHSEyQ2x+YSWaf12KInVhfurI` |
-| 2.5.2 | msal-browser.min.js | `sha384-A9ludGsBPhx3Ec8zLyd3vZEqJrRbvD6fJWpasbzAFyaaa/AMR6rtCUtbUmP07rsj` |
-| 2.5.1 | msal-browser.js | `sha384-MFZe/UOLz61FRpO06noy2uBkJEZUaxccyYYwrSrwBOEY59Fi0GxyRzPiiZKLvvkC` |
-| 2.5.1 | msal-browser.min.js | `sha384-/cOXpDxWc4bzFZUDf49Sp31Im+bSjki6UxTPadEDitHw0277qGX5teCOdieziPZh` |
-| 2.5.0 | msal-browser.js | `sha384-JtZbGQvK0HbNDG42cgeg3XxEllLbMW8aAiSCXoLdW7iJhkdC7v4Kzqvl4LWOSiFF` |
-| 2.5.0 | msal-browser.min.js | `sha384-+sjqS/ee1BeZqojCMFh8gGTbZ0ATgrA/rEIANI0l0Y6QdA+MDwmXLhj3JGvHueL7` |
-| 2.4.1 | msal-browser.js | `sha384-4Equw/X3Wp2XPnMSCbe2OQQRE/8MzlwepR53zKGbAz/6eO//yRXOcn3LKf1MnBWS` |
-| 2.4.1 | msal-browser.min.js | `sha384-vazVaX5+cCJf+t0Dzdb8CxX9jLLvWuSZqEI2lBSMeLUBPQovS4IlwFQI6epI2tJD` |
-| 2.4.0 | msal-browser.js | `sha384-Bz0kggjHC0kxcxxtRzWgjaF0JGsmHuO1atz26xKETeu5WgdarvGmr9Pr/f/pKtrq` |
-| 2.4.0 | msal-browser.min.js | `sha384-tBRIK0qPn8yxGmyhpgVsVIFaJNa0EDL62hp+zvDu1vtT1bIqWU6HiYexMhtk52bP` |
-| 2.3.1 | msal-browser.js | `sha384-khe4Bq8VcpAsK8zAycaYefEMHsLny9P/kgPF9Jy1afhFNZ4EODmrdq//+LFp1mWV` |
-| 2.3.1 | msal-browser.min.js | `sha384-d6fJLwOshjtqjJPGMQ4XgIKOvx46EBeyiPxTBaNJlj0GWqXKCh09qA6SgpAPnqD8` |
-| 2.3.0 | msal-browser.js | `sha384-ILJg8BOvXQwFGYEbkLVLYTYoNpTT7tP905UubLu2AqwksVdddAu5z9k3e6gMhqc5` |
-| 2.3.0 | msal-browser.min.js | `sha384-o+Sncs5XJ3NEAeriM/FV8YGZrh7mZk4GfNutRTbYjsDNJxb7caCLeqiDabistgwW` |
-| 2.2.1 | msal-browser.js | `sha384-M6zl9i1upj9LPj3zSUn/IejJwPyUCewu0+RD444XuWQiRomvb2ZUwanqc0c2XfCy` |
-| 2.2.1 | msal-browser.min.js | `sha384-8LDT8A5GReznR7uR2KGWc1Ep/kTc0ErU3yVBKJMOmAMoSf+hMonk3y3BceQ1rvF6` |
-| 2.2.0 | msal-browser.js | `sha384-DDogsvdm1j1csBm8TKIenLTaFJA+x0KjwdW0CAx6ZW8+5EOqSIasS3OKZ0aiq3RV` |
-| 2.2.0 | msal-browser.min.js | `sha384-ywaKEa0KdH8yiwoKS+2hRMenFDilyhT/K0r3WTXBzUQj+RNlYGnLeecytOEdgHpR` |
-| 2.1.0 | msal-browser.js | `sha384-M9bRB06LdiYadS+F9rPQnntFCYR3UJvtb2Vr4Tmhw9WBwWUfxH8VDRAFKNn3VTc/` |
-| 2.1.0 | msal-browser.min.js | `sha384-EmYPwkfj+VVmL1brMS1h6jUztl4QMS8Qq8xlZNgIT/luzg7MAzDVrRa2JxbNmk/e` |
-| 2.0.2 | msal-browser.js | `sha384-rQvomuvjVybeTxLQIpbtb6lqFsDuJparCjjUJZjRZjVDNzGRloXbPj9qbgf9YM/d` |
-| 2.0.2 | msal-browser.min.js | `sha384-zHGbJmHXAWMXaREIK7qFkrJCcU2ktJd8G9DAp49Q+y/+H6ArVhvFUW5IbyTzbNnn` |
-| 2.0.1 | msal-browser.js | `sha384-knPh00kvaT+k3+4TCD5S2ORDNVc2I3RVbqI/ksbTlpdSBh8ZnyAPxW2kkTSG0+mT` |
-| 2.0.1 | msal-browser.min.js | `sha384-fbyYRj8H9iJU/JyncEbzW6WgVOaR5C+PU1dHsRBg2Ag2Q14F4IB8+T8BdknwjRQ8` |
-| 2.0.0 | msal-browser.js | `sha384-BqIcDtzVkr3wRGsSrk+iJJNm9GSdUsP0I2MplbnhPPc+I1l1d+dkKbcnqgNddGWX` |
-| 2.0.0 | msal-browser.min.js | `sha384-n3aacu1eFuIAfS3ZY4WGIZiQG/skqpT+cbeqIwLddpmMWcxWZwYdt+F0PgKyw+m9` |
-| 2.0.0-beta.4 | msal-browser.js | `sha384-7sxY2tN3GMVE5jXH2RL9AdbO6s46vUh9lUid4yNCHJMUzDoj+0N4ve6rLOmR88yN` |
-| 2.0.0-beta.4 | msal-browser.min.js | `sha384-j9+OYwF1QFM1A8/DNvWKqvTw+bc5alOXQ7IA2WvGAcLLLpN/tK9XRTbJtlTiSFJI` |
-| 2.0.0-beta.3 | msal-browser.js | `sha384-iKgpFzdbMAsg695JG+EmHleQe5gRjoAAixuMf0jfM7pCOVuGqhyBuXO1Ai71fixx` |
-| 2.0.0-beta.3 | msal-browser.min.js | `sha384-X2nv+6ViZGj+UCfGAbimHAXpBEAi0RA6GWuqCckbMLU5jVr8uDjf6pGUvTkq7wME` |
-| 2.0.0-beta.2 | msal-browser.js | `sha384-CEQpk7EG1PVKCHHdoQzDdR5uU7nJ1PLlcdx1s7vi8Ta/Pndhr04imhqCUkZGimOj` |
-| 2.0.0-beta.2 | msal-browser.min.js | `sha384-O3n9nwTefR6cSLikBQsCDYke2pWL5YWluwvp0RgGe+VK2eU0+RJC1cmMow5jD1OE` |
-| 2.0.0-beta.0 | msal-browser.js | `sha384-r7Qxfs6PYHyfoBR6zG62DGzptfLBxnREThAlcJyEfzJ4dq5rqExc1Xj3TPFE/9TH` |
-| 2.0.0-beta.0 | msal-browser.min.js | `sha384-OV4a42kPPZv7IxRWcyqoLn9Ohs0g1WXejuNceZxAE9usAfLVFBcdre9yqo4I03VN` |
+1. Extract `lib/msal-browser.js` or `lib/msal-browser.min.js` from the downloaded package and serve it as a static asset with your app or host it on your own CDN.
\ No newline at end of file
diff --git a/lib/msal-browser/docs/events.md b/lib/msal-browser/docs/events.md
index d6a112253d..495a0c5f23 100644
--- a/lib/msal-browser/docs/events.md
+++ b/lib/msal-browser/docs/events.md
@@ -1,6 +1,6 @@
# Events
-Msal-Browser (`@azure/msal-browser`) starting at version 2.4 now provides event APIs that are available to users of our core library and wrapper libraries. These events are related to auth and what MSAL is doing, and can be used in applications to update UI, show error messages, and so on.
+Msal Browser (`@azure/msal-browser`) provides event APIs that are available to users of our core library and wrapper libraries. These events are related to auth and what MSAL is doing, and can be used in applications to update UI, show error messages, and so on.
## What events look like
@@ -16,11 +16,11 @@ export type EventMessage = {
You can consult the [EventPayload](https://azuread.github.io/microsoft-authentication-library-for-js/ref/types/_azure_msal_browser.EventPayload.html) and [EventError](https://azuread.github.io/microsoft-authentication-library-for-js/ref/types/_azure_msal_browser.EventError.html) type docs to understand how they are defined in MSAL.
-## How events are emitted in msal-browser
+## How events are emitted in MSAL Browser
-Msal-browser has a protected function `emitEvent`, and emits events in major APIs. For the list of currently emitted events, see the table below.
+Msal Browser has a protected function `emitEvent`, and emits events in major APIs. For the list of currently emitted events, see the table below.
-Here is an example of how msal-browser emits an event with a payload, or with an error:
+Here is an example of how MSAL Browser emits an event with a payload, or with an error:
```javascript
this.emitEvent(EventType.ACQUIRE_TOKEN_SUCCESS, InteractionType.Redirect, result);
diff --git a/lib/msal-browser/docs/performance.md b/lib/msal-browser/docs/performance.md
index 06e1e81787..bc324bf882 100644
--- a/lib/msal-browser/docs/performance.md
+++ b/lib/msal-browser/docs/performance.md
@@ -73,7 +73,7 @@ const event: PerformanceEvent = {
clientId: "b50703d7-d12b-4ddc-8758-91053fe0aba4",
authority: "https://login.microsoftonline.com/common",
libraryName: "@azure/msal-browser-1p",
- libraryVersion: "2.22.2-beta.2",
+ libraryVersion: "5.0.0",
appName: "my-application",
appVersion: "1.0.0"
}
diff --git a/lib/msal-browser/docs/v2-migration.md b/lib/msal-browser/docs/v2-migration.md
index 721500489e..23f82412b4 100644
--- a/lib/msal-browser/docs/v2-migration.md
+++ b/lib/msal-browser/docs/v2-migration.md
@@ -104,4 +104,4 @@ Module/target versions were bumped from `es6`/`es5` to `es2020`/`es2020` respect
### CDN
-MSAL.js is no longer hosted on a CDN. Check [this doc](cdn-usage.md) for more details.
+> :warning: The `@azure/msal-browser` CDN has been fully deprecated as of `@azure/msal-browser@3.0.0` and is no longer supported. App developers using the MSAL CDN must upgrade to the latest possible version and consume MSAL through a package manager or bundling tool of their choice. For more information on version support, consult the table in the project [README.md](../../../README.md#library-version-support-status).
diff --git a/lib/msal-common/docs/Response.md b/lib/msal-common/docs/Response.md
deleted file mode 100644
index 4b69f251f7..0000000000
--- a/lib/msal-common/docs/Response.md
+++ /dev/null
@@ -1,6 +0,0 @@
-MSAL will return an `AuthenticationResult.ts` object as a response to all acquire token APIs:
-
-#### `msal-browser` public APIs for token acquisition:
-`loginPopup`, `acquireTokenPopup`, `acquireTokenSilent` or `handleRedirectPromise`
-
-Reference docs for `AuthenticationResult` expanding on each parameter can be found [here](https://azuread.github.io/microsoft-authentication-library-for-js/ref/msal-common/classes/_src_response_authenticationresult_.authenticationresult.html).
diff --git a/lib/msal-common/docs/Throttling.md b/lib/msal-common/docs/Throttling.md
deleted file mode 100644
index c96136836c..0000000000
--- a/lib/msal-common/docs/Throttling.md
+++ /dev/null
@@ -1,28 +0,0 @@
-# Client-side throttling
-`msaljs` implements protection measures against the AAD backend through client-side throttling. It blocks requests that will only result in erroneous calls, and can often be alleviated with user interaction. It identifies a unique call based on a `RequestThumbprint` type:
-
-```ts
-export type RequestThumbprint = {
- clientId: string;
- authority: string;
- scopes: Array;
- homeAccountIdentifier?: string;
-};
-```
-
-`msaljs` will throttle a specific `RequestThumbprint` if the server returns one of the following cases after making a call:
-
-* Response contains a 429 or 5xx HTTP status.
-* Response contains a `Retry-After` header *and* does not have a 2xx HTTP status.
-* The request requires user interaction, represented in `msaljs` as `UserInteractionRequiredError`.
-
-Before making a silent call, `msaljs` checks to see if a unique `RequestThumbprint` is currently being throttled, and if so, will not make that call and return an error back to the user. Interactive calls bypass this gate as they are made to alleviate the problem. Additionally, a throttled `RequestThumbprint` will be cleared upon a successful interactive response from the server.
-
-If the server does not provide a time to throttle a `RequestThumbprint`, the default length is 60 seconds. The maximum possible length is 3600 seconds, which `msaljs` will use to override if the server provides something longer.
-
-```ts
-export const ThrottleConstants = {
- DEFAULT_THROTTLE_TIME_SECONDS: 60,
- DEFAULT_MAX_THROTTLE_TIME_SECONDS: 3600
-}
-```
\ No newline at end of file
diff --git a/lib/msal-common/docs/authority.md b/lib/msal-common/docs/authority.md
index 11909bff1a..194839254b 100644
--- a/lib/msal-common/docs/authority.md
+++ b/lib/msal-common/docs/authority.md
@@ -40,9 +40,9 @@ The correct authority URL that you need pass to MSAL is ultimately determined by
- Who are the users you want your app to sign-in?
- What are the web APIs you want your app to acquire tokens for?
-### Azure AD
+### Microsoft Entra ID
-The authority domain for the global Azure AD instance is `login.microsoftonline.com`. This domain has several aliases (e.g. `login.microsoft.com`) published on the [discovery endpoint](https://login.microsoftonline.com/common/discovery/instance?api-version=1.1&authorization_endpoint=https://login.microsoftonline.com/common/oauth2/v2.0/authorize). For resiliency and performance, MSAL keeps a record of these in cache (see: [AuthorityMetadata.ts](../src/authority/AuthorityMetadata.ts)). MSAL trusts authority URLs with any of these aliases by default.
+The authority domain for the global Entra ID instance is `login.microsoftonline.com`. This domain has several aliases (e.g. `login.microsoft.com`) published on the [discovery endpoint](https://login.microsoftonline.com/common/discovery/instance?api-version=1.1&authorization_endpoint=https://login.microsoftonline.com/common/oauth2/v2.0/authorize). For resiliency and performance, MSAL keeps a record of these in cache (see: [AuthorityMetadata.ts](../src/authority/AuthorityMetadata.ts)). MSAL trusts authority URLs with any of these aliases by default.
> :warning: The authority domain differs for national/regional Azure deployments, such as Azure China. See [National clouds](https://docs.microsoft.com/azure/active-directory/develop/authentication-national-cloud) for more.
diff --git a/roadmap.md b/roadmap.md
deleted file mode 100644
index 3a3aa1bc06..0000000000
--- a/roadmap.md
+++ /dev/null
@@ -1,23 +0,0 @@
-# Roadmap
-
-The MSAL.js team's roadmap is presented as _In Development_, _Up Next_, and _Under Consideration_ to give you a better idea of what we are currently working on, what is up next for us, and what we are considering for the future. These are not guaranteed timelines or commitments, but instead intended to provide insight into the team's current direction. As an open-source library, you can already view changes the team is actively working on. This roadmap is focused on big features or focus areas; it may not call out each individual work item that is added to the library. While we try to stay consistent with our plans, things can change quickly. Do not write code reliant on these features until they are officially shipped.
-
-If you don't see a feature listed on the roadmap, check our [Release Notes](https://github.com/AzureAD/microsoft-authentication-library-for-js/releases) to see if it has already been released. If not, please open a [Feature Request](https://github.com/AzureAD/microsoft-authentication-library-for-js/issues/new?assignees=&labels=feature-unconfirmed%2Cquestion&template=feature_request.yml).
-
-## Terminology
-- *In Development*: These items are well-defined and actively in development.
-- *Up Next*: These items are next to be picked up for development when capacity allows. The problem space and solution are known but we may still be refining design details or prioritizing capacity for other items already In Development.
-- *Under Consideration*: These are general topic areas the team is considering for future investigation but we have no timelines or prioritization. If you have thoughts or suggestions on these areas, please add them to an existing Feature Request.
-
-## Focus Areas
-
-### In Development
-
-### Up Next
-- Improve support for use in Teams Apps (Tabs) and Office Add-Ins
-
-### Under Consideration
-- Identity provider agnostic support
-- Supporting more JavaScript frameworks: [Ionic](https://github.com/AzureAD/microsoft-authentication-library-for-js/.issues/4290), [Flutter](https://github.com/AzureAD/microsoft-authentication-library-for-js/issues/5409), [React Native](https://github.com/AzureAD/microsoft-authentication-library-for-js/issues/4735)
-- Browsers' solutions to federated identity without 3p cookie access (FedCM, Storage Access API, First Party Sets, etc)
-