Skip to content

Releases: strongdm/strongdm-sdk-python

v16.8.0

19 Feb 14:56

Choose a tag to compare

v16.8.0 - Release Google Spanner Driver

v16.7.0

17 Feb 07:59

Choose a tag to compare

v16.7.0 - Add unstable Databricks SQL driver

  • added new resource type for support of Databricks SQL database

v16.6.0

11 Feb 15:14

Choose a tag to compare

v16.6.0 - Add Node Selector Support for Secret Engines

  • Added a node_selector field to secret engines that allows selecting which nodes communicate with the engine using tag-based filtering

v16.5.0

04 Feb 19:40

Choose a tag to compare

v16.5.0 - Add URL Info to Control Plane Service

  • Add additional URL Info for the Control Plane

v16.4.0

03 Feb 08:40

Choose a tag to compare

v16.4.0 - Generic MCP Gateway

  • Added support for OAuth provider's Dynamic Client Registration
  • Simplified MCP Gateway configuration

v16.3.0

29 Jan 21:18

Choose a tag to compare

v16.3.0 - Expose Employee Number

  • This release exposes the employee number for users

v16.1.0

20 Jan 12:31

Choose a tag to compare

v16.1.0 - OAuth Dynamic Client Registration URL for resources

  • Added possibility to configure provider's Dynamic Client Registration URL for resources that require OAuth

v16.0.0

14 Jan 12:59

Choose a tag to compare

v16.0.0 - Remove unused replicaSet field from Mongo drivers

  • Removed an unused replicaSet field from Mongo drivers. Replicas should be passed as a comma-separated list in a Hostname field.

v15.46.0

12 Jan 21:14

Choose a tag to compare

v15.46.0 - OAuth endpoints configuration for MCP Gateway driver

  • Renamed 'MCP Driver' to 'MCP Gateway (OAuth)'
  • Added new types of config values for resource: OAuth Authorization endpoint URL and OAuth Token endpoint URL
  • Added new fields to MCP Gateway driver settings: : OAuth Authorization endpoint URL and OAuth Token endpoint URL

v15.45.0

12 Jan 13:14

Choose a tag to compare

v15.45.0 - Managed secrets retrieve call does not require passing of ephemeral public key

  • Managed secret Retrieve call no longer requires passing of public key. Ephmemeral encryption key will be automaticall generated and used across client's lifetime.