Open Authentication v2.0 database

New in version v2.2.28.

This database works with a oauth2 provider such as google or facebook. You are recommended to use xoauth2 or oauthbearer Authentication (SASL) Mechanisms with this. The responses from endpoints must be JSON objects.



In dovecot.conf put

auth_mechanisms = $auth_mechanisms oauthbearer xoauth2

passdb {

driver = oauth2
  mechanisms = xoauth2 oauthbearer
  args = /etc/dovecot/dovecot-oauth2.conf.ext


Configuration file example for Google

tokeninfo_url =
introspection_url =
#force_introspection = yes
username_attribute = email
tls_ca_cert_file = /etc/ssl/certs/ca-certificates.crt

Configuration file example for WSO2 Identity Server

introspection_mode = post
introspection_url =
username_attribute = username
tls_ca_cert_file = /etc/ssl/certs/ca-certificates.crt
active_attribute = active
active_value = true


If you want to forward oauth2 authentication to your backend, you can use various ways

Without proxy authentication

passdb {
  driver = static
  args = nopasssword=y proxy=y proxy_mech=%m ...

or with proxy authentication, put into dovecot-oauth2.conf.ext

pass_attrs = proxy=y proxy_mech=%m

Proxy with password grant

New in version v2.3.6.

If you want to configure proxy to get token and pass it to backend

passdb settings

passdb {
  driver = oauth2
  mechanisms = oauthbearer xoauth2
  args = /usr/local/etc/dovecot/dovecot-oauth2.token.conf.ext

passdb {
  driver = oauth2
  mechanisms = plain login
  args = /usr/local/etc/dovecot/dovecot-oauth2.plain.conf.ext

put into dovecot-oauth2.token.conf.ext

grant_url = http://localhost:8000/token
client_id = verySecretClientId
client_secret = verySecretSecret
tokeninfo_url = http://localhost:8000/oauth2?oauth=
introspection_url = http://localhost:8000/introspect
introspection_mode = post
use_grant_password = no
debug = yes
username_attribute = username
pass_attrs = pass=%{oauth2:access_token}

put into dovecot-oauth2.plain.conf.ext

grant_url = http://localhost:8000/token
client_id = verySecretClientId
client_secret = verySecretSecret
introspection_url = http://localhost:8000/introspect
introspection_mode = post
use_grant_password = yes
debug = yes
username_attribute = username
pass_attrs = host= proxy=y proxy_mech=xoauth2 pass=%{oauth2:access_token}

Local validation

New in version 2.3.11.

Local validation allows validating tokens without connecting to an oauth2 server. This requires that key issuer supports JWT tokens (RFC 7519).

You can put the validation keys into any dictionary. The lookup key used is /shared/<azp:default>/<alg>/<keyid:default>. If there is no azp element in token body, then default is used. The alg field is always uppercased by Dovecot. If there is no kid element in token header, default is used. Keys are cached into memory when they are fetched, to evict them from cache you need to restart Dovecot. If you want to do key rotation, it is recommended to use a new key id.



Would turn into


And would expect, when using fs posix, key at


Local validation can be enabled with other oauth2 options, so that if key validation fails for non-JWT keys, then online validation is performed.

You can use local validation with password grants too. This will save you introspection round to oauth2 server.

To use local validation, put into dovecot-oauth2.conf.ext

introspection_mode = local
local_validation_key_dict = fs:posix:prefix=/etc/dovecot/keys/

Currently Dovecot oauth2 library implements the following features of JWT tokens:

  • IAT checking

  • NBF checking

  • EXP checking

  • ISS checking

  • ALG checking

  • SUB support

  • AUD support (this is checked against scope, if provided)

  • AZP support

The following algorithms are supported

  • HS256, HS384, HS512

  • RS256, RS384, RS512

  • PS256, PS384, PS512

  • ES256, ES384, ES512

There is currently no support for EdDSA algorithms. ES supports any curve supported by OpenSSL for this purpose.


New in version v2.3.16.

Support for RFC 7628 OpenID Discovery (OIDC) can be achieved with openid_configuration_url setting. Setting this causes Dovecot to report OIDC configuration URL as openid-configuration element in error JSON.

Full config file

### OAuth2 password database configuration

## url for verifying token validity. Token is appended to the URL
# tokeninfo_url = http://endpoint/oauth/tokeninfo?access_token=

## introspection endpoint, used to gather extra fields and other information.
# introspection_url = http://endpoint/oauth/me

## How introspection is made, valid values are
##   auth = GET request with Bearer authentication
##   get  = GET request with token appended to URL
##   post = POST request with token=bearer_token as content
##   local = Attempt to locally validate and decode JWT token
# introspection_mode = auth

## Force introspection even if tokeninfo contains wanted fields
## Set this to yes if you are using active_attribute
# force_introspection = no

## Validation key dictionary, turns on local validation
# local_validation_key_dict =

## A space separated list of scopes of validity (optional)
# scope = something

## username attribute in response (default: email)
# username_attribute = email

## username normalization format (default: %Lu)
# username_format = %Lu

## Attribute name for checking whether account is disabled (optional)
# active_attribute =

## Expected value in active_attribute (empty = require present, but anything goes)
# active_value =

## Expected issuer(s) for the token (space separated list)
# issuers =

## URL to RFC 7628 OpenID Provider Configuration Information schema
# openid_configuration_url =

## Extra fields to set in passdb response (in passdb static style)
# pass_attrs =

## Timeout in milliseconds
# timeout_msecs = 0

## Enable debug logging
# debug = no

## Max parallel connections (how many simultaneous connections to open, increase this to
## increase performance)
# max_parallel_connections = 10

## Max pipelined requests (how many requests to send per connection, requires server-side support)
# max_pipelined_requests = 1

## HTTP request raw log directory
# rawlog_dir = /tmp/oauth2

## TLS settings
# tls_ca_cert_file = /path/to/ca-certificates.txt
# tls_ca_cert_dir = /path/to/certs/
# tls_cert_file = /path/to/client/cert
# tls_key_file = /path/to/client/key
# tls_cipher_suite = HIGH:!SSLv2
# tls_allow_invalid_cert = FALSE