Connect2id server 7.5.1

This is a maintenance release of the Connect2id server which fixes a bug introduced in version 7.5 that prevented the server from receiving client X.509 certificates used for self-signed certificate authentication (self_signed_tls_client_auth) at the token endpoint. Further details in the release notes.

Download

To download a ZIP package of Connect2id server 7.5.1:

https://connect2id.com/assets/products/server/download/7.5.1/Connect2id-server.zip

SHA-256: 1f6c38de8ea72e5c94e32cf28d9963ff46cf3f939776e4a7d5dbabe389cf936d

As WAR package only:

https://connect2id.com/assets/products/server/download/7.5.1/c2id.war

SHA-256: 4b20b1c26a686ecaaf346e83b405f28ce70d5e6a7623b8d27f05aa1917353817

Questions?

Get in touch with Connect2id support.


Release notes

7.5.1 (2018-07-30)

Resolved issues

  • Fixes a bug introduced in Connect2id server 7.5 which prevented receiving client X.509 certificates set by a TLS termination proxy via the HTTP header configured in op.tls.clientX509CertHeader. The bug affected token requests by OAuth 2.0 clients / OpenID relying parties registered for self-signed certificate mutual TLS authentication (self_signed_tls_client_auth) (issue server/390).