-
Duende BFF Security Framework V3 Release Candidate 1
Today, we're happy to bring you the first Release Candidate for the next version of the Duende Backend-for-Frontend (BFF) Security Framework V3.
BFF (Backend-For-Frontend) solves security and development challenges for client-side developers using SPA frameworks like React, Angular, VueJs or Blazor by providing a dedicated backend to manage OAuth/OIDC interactions while enforcing a "no tokens in the browser" policy.
In this blog post, we’ll look at some new functionality and cover some aspects you should be aware of when upgrading.
-
Duende IdentityServer 7.1 New Year's Release
Happy New Year! Duende IdentityServer 7.1 is a new release we’re excited to share with you. In this article, we will discuss some exciting enhancements and breaking changes that software developers should be aware of when upgrading from previous versions.
-
Security hotfix for Duende.AccessTokenManagement.OpenIdConnect
We recently published Duende.AccessTokenManagement.OpenIdConnect 3.0.1, a security hotfix which addresses CVE-2024-51987, a medium-severity security issue that can cause refreshed access tokens to be cached and used for the wrong user.
We encourage everyone using Duende.AccessTokenManagement.OpenIdConnect 3.0.0 to update to version 3.0.1.
-
DPoP Package Updates
Today we are publishing two NuGet packages related to DPoP:
- Duende.IdentityServer 7.0.8, which addresses a low-severity security issue in our DPoP support for local APIs (CVE-2024-49755), and
- Duende.AspNetCore.Authentication.JwtBearer 0.1.3, the first preview of a new series of ASP.NET Core extensions that help you leverage advanced IdentityServer features - in this case DPoP support for APIs.
We encourage everyone using IdentityServer 7.0.0 and later to update to IdentityServer 7.0.8, but do note that most IdentityServer implementations are not affected. In this blog post, we'll discuss the issue in more detail and the specific circumstances where this vulnerability applies, as well as show how to use the new package to implement DPoP in your ASP.NET APIs.
-
Pushed Authorization Request (PAR) Support in ASP.NET Core
We think that PAR is one of the easiest ways to increase the security of OAuth and OpenID Connect. That's why we prioritized the implementation of the RFC and released fully featured support in IdentityServer v7.
Unfortunately, it wasn't as straightforward as it could be to add client-side PAR support to an existing ASP.NET Core application using the Microsoft OpenID Connect authentication handler.
-
Duende Software – The Next Chapter
Almost exactly four years ago we announced the big news of transitioning our free, open-source project, IdentityServer, to a commercial, source-available product.
As a part of that transition, we founded Duende Software as the new home for our products. Our main goal was to focus on IdentityServer – turning it into a sustainable product, improving the quality and reliability of our code base, and enhancing our samples, documentation and customer support.
-
Duende.AccessTokenManagement 3.0
Duende.AccessTokenManagement 3.0 is out now! Highlights of this release include:
- Improved support for Blazor Server
- Updates to dependencies
- Bug fixes and improvements
See the release notes for the full details, or read on for a quick summary.
-
Security Patch for IdentityServer (CVE-2024-39694)
Today we are publishing a hotfix for all supported versions of Duende.IdentityServer that addresses CVE-2024-39694, a moderate severity open redirect security vulnerability. We encourage everyone to update to the latest patch version. Note that by itself, this vulnerability does not allow an attacker to steal tokens or user credentials. An attacker would most likely exploit this vulnerability to make phishing attacks more likely to succeed.
We have also published a security advisory with technical details about the severity, affected versions, specific APIs involved, and work-arounds for those who can't upgrade to a patched version.
In this blog post we'll discuss open redirect vulnerabilities more generally, the process we followed to manage disclosure of the issue and patch, and lessons learned from that process.