release-2026-02-28: Verified email attributes
This is Internet Identity release release-2026-02-28 for commit fde072c30605833f1783ed9f1aa6fd2743a6eafc.
The sha256 of production asset internet_identity_production.wasm.gz is fd4ecb7f579d4b3a90605c2342f105e16730f0bbae182292194ac339ccf0b66a.
This release adds support for verified email attributes that can currently be requested by apps for the Google and Microsoft scopes. For example, verified emails enable differentiating users based on their emails, not just principal IDs.
Additionally, this release prepares for the upcoming II canister split, as the new, stateless internet_identity_frontend canister is ready for reviews. Lastly, the loading screen for the 1-Click sign in flow is redesigned.
What's Changed
- feat: Update implicit OpenID attribute criteria and extend e2e tests. by @sea-snake in #3625
- chore: Split Internet Identity canister frontend by @aterga in #3536
- feat: Reduce install args for
internet_identity_frontendby @aterga in #3628 - chore: Add e2e test for split canister setup by @sea-snake in #3629
- feat: Serve synchronized II config over HTTPS by @aterga in #3632
- feat: Sync backend config with II frontend canister by @aterga in #3634
- feat: Prepare stateless II frontend canister by @aterga in #3635
- Verified email attribute by @sea-snake in #3637
- chore: Avoid hard codeing /.well-known/ic-domains by @aterga in #3638
- feat: Enable new identity attribute
verified_emailby @aterga in #3640 - feat: Redesign direct auth redirect screen by @sea-snake in #3639
Full Changelog: release-2026-02-17...release-2026-02-28
Build flavors
For more information please see the Build flavors section of the README.
Wasm Verification
To build the wasm modules yourself and verify their hashes, run the following commands from the root of the Internet Identity repository:
git pull # to ensure you have the latest changes.
git checkout fde072c30605833f1783ed9f1aa6fd2743a6eafc
./scripts/verify-hash --ii-hash fd4ecb7f579d4b3a90605c2342f105e16730f0bbae182292194ac339ccf0b66a
Make sure to compare the hashes also with the proposal payload when verifying canister upgrade proposals.