Releases: zitadel/oidc
Releases · zitadel/oidc
v3.47.5
3.47.5 (2026-04-20)
Bug Fixes
- op: allow dynamic loopback ports in post_logout_redirect_uri per RFC 8252 §7.3 (#875) (fb9fbfe), closes /datatracker.ietf.org/doc/html/rfc8252#section-7 zitadel/zitadel#6615
v3.47.4
v3.47.3
v3.47.2
v3.47.1
v3.47.0
This release adds signing of opaque tokens. By secure default, all existing opaque access tokens emitted by OP implementations, will be invalid. Users will need to re-login. If you want a more gradual upgrade use the op.WithCrypto() option to pass a op.NewCompositeCrypto(). Use aop.NewAESCrypto() in the Decrypter slice with the existing master key.
This change does not affect client / RP / RS libraries.
What's Changed
- feat: use jose for bearer-token encryption by @wim07101993 in b4cf422
- chore: package upgrades by @wim07101993 in #866
Full Changelog: v3.46.0...v3.47.0