All posts

Aquiva blog

Mandatory Security Requirements for Connected Apps and External Client Apps Required by May 11, 2026

Salesforce has set a firm May 11, 2026 deadline for five new security controls on Connected Apps and External Client Apps. Here's what AppExchange partners actually need to ship — and what comes after.

Jakub Stefaniak· Field CTO, Salesforce CTA
Mandatory security requirements for Connected Apps and External Client Apps

Overview

Salesforce has issued a mandatory deadline requiring all AppExchange partners to implement five new security controls for Connected Apps and External Client Apps by May 11, 2026. This is not a roadmap memo — it is a firm deadline with consequences for non-compliance, including potential de-listing and service suspension.

Five mandatory security controls

ControlStatusPurposeDevelopment requirements
PKCEMandatory by May 11Neutralizes authorization code interceptionCode verifier/challenge generation in OAuth flow
Refresh Token Rotation (RTR)Mandatory by May 11Single-use tokens invalidate after useNew token storage logic; race condition handling
30-day idle timeoutMandatory by May 11Dormant tokens expireHeartbeat service for infrequent integrations
IP range allowlistMandatory by May 11Restricts token usage to approved IPsStatic IP infrastructure across integration systems
IP monitoringAdditional controlAlerts on suspicious usageOperational monitoring discipline

Context: why this matters now

The 2025 threat landscape drove this urgency. Attackers didn't break Salesforce — they walked in through an OAuth connection. Notable incidents included:

  • ShinyHunters social-engineering employees to approve malicious Connected Apps
  • Salesloft supply-chain attack compromising 700+ tenants
  • Gainsight-published apps revoked after OAuth compromise
  • Cisco-attributed incident exposing 3M+ records

Each mandated control directly addresses techniques exploited in these breaches.

Two distinct projects

It's important to separate the two pieces of work the deadline forces partners to plan for.

The May 11 hotfix. For existing packaged Connected Apps, partners can enable PKCE and RTR through settings toggles, with Salesforce auto-propagating changes to subscribers. This requires application-side code updates but avoids Consumer Key changes and re-authentication.

The inevitable migration. Connected Apps and 1GP are sunset paths. Spring '26 already disabled new legacy Connected App creation. Migration to External Client Apps on 2GP (second-generation packaging) is mandatory eventually — the variable is timing.

Treat May 11 as a critical deadline for the bare minimum, not a destination.

Scope expansion points

Partners frequently underestimate scope. The requirements apply to:

  • Connected Apps within managed packages
  • Unpackaged Connected Apps installed during implementation
  • Connected Apps documented for subscriber creation post-install
  • Any Connected App living in partner org infrastructure

Additionally, the "subscriber creates the Connected App post-install" pattern is effectively deprecated for flows requiring ISV Consumer Key control.

Development complexity beyond configuration

Code changes

PKCE requires verifier/challenge handshakes on every OAuth flow. RTR demands new token storage after each exchange, creating distributed-systems challenges in multi-threaded environments.

Infrastructure requirements

Static IP binding necessitates NAT gateways, Elastic IPs, or dedicated proxy layers on cloud platforms — not Salesforce work, but integration engineering work.

Infrequent integration solutions

The 30-day idle timeout requires heartbeat services refreshing tokens every 25-28 days for rarely-used workflows, adding new monitoring infrastructure.

Origin org dependencies

Packaged ECAs make the Dev Hub org a critical dependency. Loss of access breaks every subscriber's credentials.

Implementation guidance gaps

Three patterns are showing up in early partner experiences:

  1. Inconsistent scope guidance from different Salesforce contacts
  2. Late control availability (April release for two controls, weeks before deadline)
  3. Tooling rough edges including secret rotation errors, CLI case-sensitivity issues, and packaging configuration quirks

The rollout program

Even with code complete by late April, the deployment represents roughly halfway done. Full ECA migration requires:

  • Customer communication with advance notice and downtime windows
  • Re-authentication handshake requiring action on the customer side (new Consumer Key = required re-auth)
  • Post-deployment monitoring tracking authentication success, IP mismatches, rotation failures
  • Legacy deprecation — maintaining both versions until all customers migrate

For enterprise-heavy customer bases, this multi-month coordination happens outside engineering teams.

Where we fit in

Aquiva Labs offers specialized support for:

  • Lighter PKCE/RTR enablement on existing packaged CAs
  • Full ECA migration with 1GP-to-2GP conversion
  • Static IP infrastructure in AWS/GCP
  • ECA packaging and Security Review resubmission
  • Customer rollout program management

Key takeaway for late starters

Partners who miss May 11 aren't immediately de-listed, but the conversation shifts from readiness to explaining delays. Ship the May 11 hotfix early, then plan the full ECA migration on your own roadmap rather than under pressure.

SalesforceAppExchangeSecurityOAuth