Connect2id server 7.5.1
This is a maintenance release of the Connect2id server
which fixes a bug introduced in version 7.5 that
prevented the server from receiving client X.509 certificates used for
self-signed certificate authentication (self_signed_tls_client_auth
) at the
token endpoint. Further details in the release notes.
Download
To download a ZIP package of Connect2id server 7.5.1:
https://c2id-downloads.s3.eu-central-1.amazonaws.com/server/7.5.1/Connect2id-server.zip
SHA-256: 1f6c38de8ea72e5c94e32cf28d9963ff46cf3f939776e4a7d5dbabe389cf936d
As WAR package only:
https://c2id-downloads.s3.eu-central-1.amazonaws.com/server/7.5.1/c2id.war
SHA-256: 4b20b1c26a686ecaaf346e83b405f28ce70d5e6a7623b8d27f05aa1917353817
Questions?
Get in touch with Connect2id support.
Release notes
7.5.1 (2018-07-30)
Resolved issues
- Fixes a bug introduced in Connect2id server 7.5 which prevented receiving client X.509 certificates set by a TLS termination proxy via the HTTP header configured in op.tls.clientX509CertHeader. The bug affected token requests by OAuth 2.0 clients / OpenID relying parties registered for self-signed certificate mutual TLS authentication (self_signed_tls_client_auth) (issue server/390).