SignServer 7.4 Release Notes
OCTOBER 2025
The SignServer team is pleased to announce the release of SignServer 7.4.0.
This release of SignServer brings new integrations for signing macOS and iOS binaries through the new Mac Agent, support for signing RPM packages as well as extended support for PQ HSMs. The release also adds support for OAuth for Administration Web access.
The SignServer 7.4 release is available for only container-based deployments. For available deployment types and associated versions, refer to Supported Versions.
Highlights
Mac Agent Integration for macOS and iOS Binary Signing
This release adds a new integration with our Signum product. This integration allows you to configure the signum-util agent to use SignServer as the backend. The new feature also supports using the Signum Mac Agent with any SignServer deployment type. This enables the use of macOS platform signing tools like codesign and productsign using SignServer Enterprise. See macOS Agent.
Support for Red Hat Package Manager (RPM) Packages
This release adds support for RPM signing with our OpenPGP Signer. The standard RPM tool is used to request signing by using the SignWrapper-GPG and SignClient. See Code Signing with RPM Signatures.
Enables HSM-backed PQ Signing
This release continues to expand on the product support for PQ signing. SignServer 7.4.0 supports Thales and Utimaco HSM in production environments. For the full list of supported HSMs, see Interoperability.
Adds Support for OAuth
This release adds support for OAuth to configure and access the Administration Web of your deployment. A new login page has been added for choosing OAuth to access the Administration Web. See Set up OpenID Connect (OIDC) using Auth0.
Announcements
New Login Page
This release introduces support for OAuth authentication for accessing the Administration Web, while retaining the option to use Client Certificate authentication. A new login page has been added and is available across all deployments. See Login and Logout.
Upgrade Information
Review the SignServer Upgrade Notes for important information about this release.
Change Log: Resolved Issues
The following lists implemented features and fixed issues in SignServer 7.4.0.
Issues Resolved in 7.4.0
Released October 2025
New Features
DSS-3036 Add OIDC support in SignServer container
DSS-3230 Remove requirement for Crypto Workers to have a default key to be active
DSS-3234 Option to remove cmsAlgorithmProtect in ExtendedCMSSigner
DSS-3266 SignClient option for reading input from stdin \(working with rpmsign\)
DSS-3267 Support for RPM signing using SignWrapper-GPG
DSS-3279 Implement REST endpoints for listing workers/certificates supporting Signum MacOS Agent use case
DSS-3280 Add property to choose to use CRL or OCSP as priority in AdESSigner
Improvements
DSS-1814 PlainSigner should not require certificate
DSS-3025 Disable client certificate-based authorization in Admin web when OIDC is enabled \(by adding the oidc.properties file\)
DSS-3026 Error handling - oidc.properties file
DSS-3107 Add tests for OIDC implementation
DSS-3114 Remove EU repository cefdigital not needed anymore from pom.xml
DSS-3123 Issue with different provider rules
DSS-3124 Add visibility of authentication type in UI and style login/logout pages
DSS-3125 Add login/logout for client cert auth
DSS-3126 Add login/logout for OAuth
DSS-3147 Add validation of audience and configuration of it in oidc.properties
DSS-3160 Add support for Client side hashing for CAdES signer
DSS-3176 Add examples to OpenAPI and document the form-data fields
DSS-3202 Improve REST documentation
DSS-3224 Move hard coded callerGroupsClaim to oidc.properties
DSS-3226 Support Fortanix RSA with pre computed hash
DSS-3236 Allow caller to customize what's checked in healthcheck
DSS-3264 Change OpenPGPSigners to use RSA\_GENERAL instead of RSA\_SIGN or make it configurable
DSS-3265 Make OpenPGPSigner generated certificates with ECDSA work for RPM signing
DSS-3274 Change default signature algorithms in PlainSigner when client-side hashing is used
DSS-3294 Upgrade commons-lang3 to 3.18 or later due to CVE
DSS-3316 Change naming of managed key to be supported by AKV
DSS-3374 Upgrade commons-lang3 to 3.18 or later due to CVE
DSS-3392 OIDC callback servlet should not process callbacks when already logged in
DSS-3397 Improve list cert Ids test to not assume a specific order is returned
DSS-3400 Improve oidc.properties.sample
DSS-3402 Security hardening of legacy WS redirects
Bugs
DSS-3088 Documentation for enabling OpenAPI endpoint not working with WildFly 32/35 and EAP 8
DSS-3134 Incorrect "-" instead of "\_" in INTERNALLY-DETACHED/INTERNALLY\_DETACHED in template and docs
DSS-3146 cspPolicies cause to OIDC logout doesn't work properly in Chrome
DSS-3250 Admin web changes in the OIDC epic introduced new test failures
DSS-3255 Test keystore dss10\_signer1.p12 certificate expired Sun Jun 01 16:04:41 CEST 2025
DSS-3276 Authorization rule only imported for one worker when adding multiple using AdminCLI setproperties command
DSS-3345 Regression: Signing with PlainSigner always throws NullPointerException when NOCERTIFICATES=true and debug logging enabled
DSS-3361 PlainSigner set with NOCERTIFICATES=true with a Non existing DEFAULTKEY has Active status but throws an error when signing
DSS-3389 Regression: Status of worker is shown as OFFLINE if NOCERTIFICATES is used but key usage counter is not disabled and the key did not exist when the worker was loaded
DSS-3391 Regression: User name missing in top-right area in AdminWeb when client cert is used
DSS-3403 Regression: x509-common-util pom file breaks container build / pipeline that does not use JFrog repository
DSS-3410 Regression: Worker status reports error about missing key even when key has not been specified