Connect2id server 19.11
Connect2id server 19.11 introduces a small but useful
configuration improvement for service-oriented deployments, restores
interoperability following the
19.10 security update, and enhances the
jwks-gen.jar tool to support Microsoft Entra ID external MFA
provider
requirements.
Optional authorisation endpoint
The op.authz.endpoint configuration property is now optional.
This enables deployments that don’t need to handle front-channel authorisation requests to disable the OAuth 2.0 authorisation endpoint entirely. The change is relevant for setups that rely exclusively on back-channel grants, such as:
- client credentials – for service-to-service access without a user
- password – for legacy or tightly controlled environments where the client directly collects user credentials
- token exchange – to obtain tokens on behalf of another token or identity
- CIBA – for decoupled user authentication flows without browser redirects
- JWT bearer – to exchange a trusted JWT assertion for an access token
- SAML 2.0 bearer – to exchange a SAML 2.0 assertion for an access token
When the authorisation endpoint is disabled:
- The Connect2id server no longer exposes the authorisation endpoint.
- The
authorization_codegrant type is no longer advertised in the OpenID provider metadata. Related OpenID Connect metadata parameters are also omitted.
This results in a cleaner configuration and a more accurate representation of the server’s capabilities.
Nonce validation update to restore client library interop
Connect2id server 19.10 introduced validation for the
nonce parameter in OpenID authentication
requests, as part of a
broader defence strategy against browser-swap
attacks. While effective from a security
perspective, the original restriction to
BASE64 URL-safe
characters can be too strict in practice.
Following customer feedback, the validator has been updated to also accept:
- Characters from the standard BASE64 set
- The dot (
.) character
This restores compatibility with OpenID Connect client libraries that generate
nonce values outside the URL-safe subset, while still maintaining reasonable
validation boundaries.
JWK generator update for Microsoft Entra ID MFA interop
The Connect2id server JWK set generator has been updated to support deployments acting as an external MFA provider for Microsoft Entra ID.
Recent interoperability requirements from Entra ID mandate a very specific
structure for the published JWK set used
to validate ID token signatures. In particular, only RSA signing keys must be
present, each including a self-signed X.509 certificate (x5c) and its SHA-1
thumbprint (x5t).
To help with these requirements, the JWK generator now supports additional options:
-noEC -noEdDSA -noEnc— ensure only RSA signing keys are included-x5cSelfSigned— generate a self-signed X.509 certificate for each key-x5cSubject— set the certificate subject (typically the issuer domain)-x5cValidityDays— define the certificate validity period-x5t— include the SHA-1 thumbprint of the certificate
A typical command to generate a compliant JWK set:
java -jar jwks-gen.jar op \
-noEC -noEdDSA -noEnc \
-x5cSelfSigned \
-x5cSubject <domain> \
-x5cValidityDays <days> \
-x5t \
-b64 jwkSet.json.b64
The resulting BASE64URL-encoded JWK set can then be used as a static key configuration for the Connect2id server.
The release notes below have more information.
Download 19.11
For the signature validation: Public GPG key
Standard Connect2id server edition
Apache Tomcat package with Connect2id server 19.11: Connect2id-server.zip
GPG signature: Connect2id-server.zip.asc
SHA-256: af4117589205e003efc8457883cbcef092b1d7c44e08b7404c745b1fabc996d7
Connect2id server 19.11 WAR package: c2id.war
GPG signature: c2id.war.asc
SHA-256: d9dec2219070b0948fb6e91d6b90e8cae6b9d1b1ced58b6483530c078708108a
Multi-tenant edition
Apache Tomcat package with Connect2id server 19.11: Connect2id-server-mt.zip
GPG signature: Connect2id-server-mt.zip.asc
SHA-256: 1227ab89bad4f3d38a14f0781418d6295286e5b7bd67610872b59fee9eda2782
Connect2id server 19.11 WAR package: c2id-mt.war
GPG signature: c2id-mt.war.asc
SHA-256: 98db15bf3b0329d2d5f3888de0e4f799cd13cfe641e2529c64b81dd5faeec24e
Questions?
For technical questions about this new release contact Connect2id support. To purchase a production license for the Connect2id server, renew or upgrade your support and updates subscription, email our sales.
Release notes
19.11 (2026-04-18)
Summary
-
The
op.authz.endpointconfiguration property is now optional, enabling Connect2id server deployments that do not require front-channel authorisation requests to disable the OAuth 2.0 authorisation endpoint entirely. This is useful for service-oriented setups that rely solely on back-channel grants, such asclient_credentialsorurn:ietf:params:oauth:grant-type:token-exchange, simplifying configuration. When the endpoint is disabled, the server no longer advertises support for theauthorization_codegrant type and related parameters in its OpenID Provider metadata. -
The
nonceparameter validator introduced in 19.10 has been updated following customer reports of compatibility issues with certain OpenID Connect client libraries. The original validation restricted values to the BASE64 URL-safe character set, which proved too strict in practice. The updated validator now also accepts characters from the standard BASE64 set, as well as the dot (.), restoring interoperability while maintaining appropriate input validation safeguards.
Configuration
-
/WEB-INF/oidcProvider.properties
op.authz.endpoint– Made optional to allow deployments with the OAuth 2.0 authorisation endpoint disabled. When disabled, support for theauthorization_codegrant type and all related parameters is no longer advertised in the OpenID Provider metadata.
Resolved issues
-
Updates the
nonceparameter validator introduced in 19.10 to also allow characters from the BASE64 set, as well as the dot (.). Previously, only characters from the BASE64 URL-safe set were accepted, which caused compatibility issues with some OpenID Connect client libraries (issue server / 1183). -
The Connect2id server now validates that configured
*.apiAccessTokenSHA256.*token hashes are exactly 256 bits in length. If a hash has an invalid length, the server aborts startup with an error. Previously, such misconfigurations would only surface as401 Unauthorizedresponses when accessing the API. This change ensures configuration errors are detected earlier (issue common / 64). -
A client registration request with all unsupported OAuth 2.0 grant types must result in an
invalid_client_metadataerror, not in the special-case grant-less client metadata (issue server / 1185). -
Prevent registrations of clients with an OAuth 2.0 grant types consisting of
refresh_tokenonly (issue server / 1186).
Dependency changes
-
Updates to com.nimbusds:commons:3.9.1
-
Updates to commons-codec:commons-codec:1.21.0