Release 25.5
It is necessary to update development mode security settings for Designer Web and Runtime server
ACE_OIDC_ISSUER_BASE_URL is renamed to ACE_DEV_JWT_VALIDATION_OPENID_ISSUER
ACE_OIDC_AUDIENCE is renamed to ACE_DEV_JWT_VALIDATION_AUDIENCE
In this release the SAP IQ step is removed from ACE.
Configuration changes
See configuration for more details.
Runtime server
Azure Key Vault
Added following environment variables to support Azure Key Vault, see Config sources for details.
ACE_CONFIG_SOURCEACE_AZURE_KEY_VAULT_URLACE_AZURE_KEY_VAULT_PREFIX
Security
Added following environment variables for Dynamic API security:
ACE_JWT_VALIDATION_ENABLEDACE_JWT_VALIDATION_OPENID_ISSUERACE_JWT_VALIDATION_SECRETACE_JWT_VALIDATION_AUDIENCEACE_JWT_VALIDATION_ALGORITHMACE_JWT_VALIDATION_MAX_TOKEN_AGEACE_JWT_VALIDATION_CLOCK_TOLERANCEACE_JWT_VALIDATION_CACHE_MAX_AGE
Added following environment variables for development API security:
ACE_DEV_JWT_VALIDATION_ENABLEDACE_DEV_JWT_VALIDATION_OPENID_ISSUERACE_DEV_JWT_VALIDATION_SECRETACE_DEV_JWT_VALIDATION_AUDIENCEACE_DEV_JWT_VALIDATION_ALGORITHMACE_DEV_JWT_VALIDATION_MAX_TOKEN_AGEACE_DEV_JWT_VALIDATION_CLOCK_TOLERANCEACE_DEV_JWT_VALIDATION_CACHE_MAX_AGE
Removed following environment variables:
ACE_OIDC_ISSUER_BASE_URL- useACE_DEV_JWT_VALIDATION_OPENID_ISSUERwith the same value instead.ACE_OIDC_AUDIENCE- useACE_DEV_JWT_VALIDATION_AUDIENCEwith the same value instead.ACE_DEV_API_AUTH_DISABLE- useACE_DEV_JWT_VALIDATION_ENABLEDinstead if necessary
Other
ACE_FORM_FIELD_SIZE_LIMIT_MBis added to change the maximum size of form fields for file upload.
Designer Web
Security
Added following environment variables:
ACE_DEV_JWT_VALIDATION_ENABLEDACE_DEV_JWT_VALIDATION_OPENID_ISSUERACE_DEV_JWT_VALIDATION_SECRETACE_DEV_JWT_VALIDATION_AUDIENCEACE_DEV_JWT_VALIDATION_ALGORITHMACE_DEV_JWT_VALIDATION_MAX_TOKEN_AGEACE_DEV_JWT_VALIDATION_CLOCK_TOLERANCEACE_DEV_JWT_VALIDATION_CACHE_MAX_AGE
Removed following environment variables:
ACE_OIDC_SIGNING_ALGACE_OIDC_SIGNING_SECRETACE_DISABLE_TOKEN_VALIDATION
Changes for Keycloak based authentication:
ACE_OIDC_ISSUER_BASE_URLis not used for Keycloak anymore, useACE_DEV_JWT_VALIDATION_OPENID_ISSUERinstead.ACE_OIDC_AUDIENCEis not used for Keycloak anymore, useACE_DEV_JWT_VALIDATION_AUDIENCEinstead.
Azure Key Vault
Added following environment variables to support Azure Key Vault, see Config sources for details.
ACE_CONFIG_SOURCEACE_AZURE_KEY_VAULT_URLACE_AZURE_KEY_VAULT_PREFIX
Deployment server
Security
Added following environment variables:
ACE_DEPLOYMENT_JWT_VALIDATION_ENABLEDACE_DEPLOYMENT_JWT_VALIDATION_OPENID_ISSUERACE_DEPLOYMENT_JWT_VALIDATION_SECRETACE_DEPLOYMENT_JWT_VALIDATION_AUDIENCEACE_DEPLOYMENT_JWT_VALIDATION_ALGORITHMACE_DEPLOYMENT_JWT_VALIDATION_MAX_TOKEN_AGEACE_DEPLOYMENT_JWT_VALIDATION_CLOCK_TOLERANCEACE_DEPLOYMENT_JWT_VALIDATION_CACHE_MAX_AGE
Azure Key Vault
Added following environment variables to support Azure Key Vault, see Config sources for details.
ACE_CONFIG_SOURCEACE_AZURE_KEY_VAULT_URLACE_AZURE_KEY_VAULT_PREFIX
Bull board
Azure Key Vault
Added following environment variables to support Azure Key Vault, see Config sources for details.
ACE_CONFIG_SOURCEACE_AZURE_KEY_VAULT_URLACE_AZURE_KEY_VAULT_PREFIX
Release notes
See docker images below.
ACE 25.5.4
September 8, 2025
Bug Fixes
- DIG2022-65952Unable to use $headers directly in expressions
ACE 25.5.3
August 22, 2025
Features
- DIG2022-65345Disable built-in JWT validation by default
ACE 25.5.1
August 18, 2025
Features
- DIG2022-65023Use single value for JWT validation audience
- DIG2022-65034Diagnostics check for JWT OpenId configuration endpoints
ACE 25.5.0
August 14, 2025
ACE Azure Key Vault integration
Support for Azure Key Vault is added to ACE. It allows storing and retrieving secrets directly from Azure Key Vault without setting them in the environment variables.
- DIG2022-63782Clear environment variable cache endpoint
- DIG2022-63781ACE Bull board support for Azure Key Vault
- DIG2022-59912Configure test4201 environment to use Azure Key Vault
- DIG2022-59481Multiple environment support
- DIG2022-58578Read variables from Azure Key Vault
Built-in JWT validation
ACE now supports built-in JWT validation for APIs.
JWT validation is enabled by default, and can be disabled by setting the ACE_JWT_VALIDATION_ENABLED environment variable to false.
It is essential to protect APIs by other means, like API gateway, if JWT validation is disabled.
- DIG2022-64808Remote JWK caching
- DIG2022-64687Use _ENABLED variable naming to enable/disable JWT validation
- DIG2022-64656Access API "Public" in $api context
- DIG2022-63947Unified JWT validation for ACE development APIs
- DIG2022-60477Runtime server JWT validation
- DIG2022-64685JWT validation documentation
- DIG2022-60991Built-in Deployment API server JWT validation
Upgrade to Node 22
All ACE services are upgraded to Node.js 22.
- DIG2022-61588Upgrade to Node 22
- DIG2022-63934Update node engines and node types to latest node version
Open telemetry PoC
This ACE release has beta support for OpenTelemetry.
- DIG2022-58557Add Open Telemetry metrics
- DIG2022-58554Telemetry infrastructure in ACE dev environment
- DIG2022-58560Network call correlation
Other features
- DIG2022-62654JWT header support
- DIG2022-63783SAP IQ step removal
- DIG2022-62759Add runtime server to OpenAPI servers list automatically
- DIG2022-64126Show message if Designer is on default branch
- DIG2022-14351Typescript upgrade to 5.x
- DIG2022-62760Ability to add securityScheme through template
Bug Fixes
- DIG2022-62761Invalid securityScheme is added for every operation
- DIG2022-64132Unable to handle the errors for Non-existent Flows in case of Change flow (aceApiFlow)
- DIG2022-64004Cannot copy data from read only JSON/JSONATA fields
- DIG2022-64003Validation errors in JSONATA exerciser
- DIG2022-63850Multer throws error if field size is too long
- DIG2022-62953Open debug from APIs page doesn't populate first step
- DIG2022-62724Infinite loop check false positive on array processing
- DIG2022-62619Runtime cache is not invalidated if deployed package is deleted
- DIG2022-62456HTTP header access in ACE is case sensitive
- DIG2022-62454Previous branch flow is kept open after switching branches in ACE Designer
- DIG2022-64727Security: CVE-2025-54798 (tmp-0.0.33)
- DIG2022-63786Security: CVE-2025-7338 (multer-2.0.1)
- DIG2022-63785Security: CVE-2025-7339 (on-headers-1.0.2)
- DIG2022-63784Security: CVE-2025-7783 (form-data-4.0.0)
- DIG2022-63271Security: CVE-2025-5889 (brace-expansion 2.0.1, 1.1.11)
Docker images
Designer Web
docker pull euadigportalcoredev02acr.azurecr.io/ace-designer:25.5.4
Runtime server
docker pull euadigportalcoredev02acr.azurecr.io/ace-runtime-server:25.5.4
Deployment API server
docker pull euadigportalcoredev02acr.azurecr.io/ace-deployment-server:25.5.4
Scheduled job (BullMQ) administration
docker pull euadigportalcoredev02acr.azurecr.io/bull-board:25.5.4
Developer API portal
docker pull euadigportalcoredev02acr.azurecr.io/api-developer-portal:25.5.4
Designer Desktop
ACE Designer Desktop is available here