Skip to content
Connect2id

Roadmap

1. OpenID Connect

1.1 CIBA enhancements

Pending requests queue

Connect2id is working on a plugin that puts all successfully pre-processed CIBA requests into a queue, which native IdP apps or an IdP backend service can then poll at a web endpoint. IdP apps that have established a user session access the pending requests for the user by presenting their session ID.

Binding message scan

An initial scan of the binding_message from the IdP app, encoded in a QR code or transferred via NFC, can prevent unsolicited CIBA requests. The binding message scan, given sufficient randomness of the message, is a simple security measure to establishes both user intent and proximity. In order for the CIBA request to be cleared by the Connect2id server, the binding_message in the request must have been recently scanned by their user with their IdP app.

DPoP style binding

Access to the CIBA authorisation endpoint can be configured to require a DPoP proof of the native IdP app private key, in addition to the IdP app session ID.

Ping and push modes

The CIBA ping and push modes can be implemented, subject to customer demand.

The push (callback) mode is the most efficient and responsive of the three, because the client is able to obtain the token(s) as soon as the CIBA authorisation is given (a token request is not required). For extra confidentiality, the callback may be encrypted (JWE) to a public client key registered in the client jwks or jwks_uri metadata.

2. OAuth 2.0

2.1 OAuth 2.0 for first-party applications

In October 2024 the OAuth working group adopted a new draft to develop an alternative to the password grant, with a flexible flow that would enable the Connect2id server to use arbitrary authentication factors when signing users into mobile and desktop apps.

The new OAuth 2.0 grant for first-party apps will complement the available device SSO capability.

2.2 OAuth Incremental Authorisation

OAuth 2.0 authorisation requests from public clients that include every scope the client might ever need can result in over-scoped authorisation and a bad end-user consent experience.
draft-ietf-oauth-incremental-authz adds support for incremental authorisation, the ability to request specific authorization scopes as needed, when they’re needed, removing the requirement to request every possible scope that might be needed upfront.

2.3 OAuth 2.0 Device Authorisation Grant

Commonly known as the device flow, this OAuth grant is for designed for browserless and input constrained devices / contexts, such as smart TVs, consoles and printers. This user authorises the client on secondary device, such their smartphone or personal computer. See RFC 8628.

2.4 Support for Resource Server specific access token profiles

The Connect2id server supports a number of access token profiles, including the definition of custom profiles, there however cannot be bound to specific resources at present.

2.5 Support device session creation in the password grant

This will enable the native applications that use the resource owner password credentials grant to create device sessions for OpenID Connect native SSO.

3. JOSE

3.1 Post-quantum cryptography (PQC) support

Connect2id is working to begin the introduction of PQC signing algorithms in 2026. This will be based on the PQC specifications currently developed at the JOSE working group at the IETF.

4. PKCS#11 / HSM

4.1 HMAC HSM key support

Support for storing the hmac Connect2id server key in a PKCS#11 compliant store.

5. Monitoring

5.1 Tracing support

Tracing with Micrometer.io will be added on paths involving OpenID claims retrieval and the most widely used Connect2id server integration APIs.

Comments, suggestions?

Write to Connect2id support.

OSZAR »