You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: en/identity-server/next/docs/get-started/about-this-release.md
+60-72Lines changed: 60 additions & 72 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,4 +1,4 @@
1
-
# About this Release
1
+
# About this release
2
2
3
3
WSO2 Identity Server 7.2.0 is the latest release, succeeding WSO2 Identity Server 7.1.0, with enhanced features, improvements, and fixes.
4
4
@@ -28,16 +28,6 @@ The flow builder supports the following use cases:
28
28
29
29
-**Invited user registration** - Build invitation-based registration flows that collect necessary information and set up user accounts. Learn about building an [invited user registration flow using the flow builder]({{base_path}}/guides/flows/invited-user-registration/).
30
30
31
-
### OpenTelemetry-based LDAP operation tracing
32
-
33
-
WSO2 Identity Server introduces OpenTelemetry-based tracing for LDAP operations such as search, bind, and modifyAttributes. Previously, even though database calls were traced, LDAP interactions were not visible in tracing tools like Datadog.
34
-
35
-
This feature gives full visibility into LDAP activity, making it easier to track and troubleshoot authentication and user management workflows.
36
-
37
-
Admins can enable tracing via a configuration toggle, gaining rich telemetry without affecting existing LDAP logic. This improves troubleshooting and performance insights in complex identity deployments
38
-
39
-
Learn more about [OpenTelemetry-based LDAP tracing]({{base_path}}/deploy/monitor/work-with-product-observability/#opentelemetry-based-tracing-in-wso2-identity-server).
40
-
41
31
### AI agent identity management
42
32
43
33
WSO2 Identity Server now provides first-class identity management for AI agents, enabling organizations to manage them securely and at scale. Each AI agent is assigned a unique identity with attributes, credentials, and metadata, allowing auditing, lifecycle management, and trusted operation within the organization.
@@ -65,7 +55,7 @@ This capability enables real-time integrations, improves automation, and allows
65
55
66
56
Learn more about [webhooks]({{base_path}}/guides/webhooks/understanding-webhooks/).
67
57
68
-
### Support for granular role sharing with B2B Applications
58
+
### Support for granular role sharing with B2B applications
69
59
70
60
WSO2 Identity Server now lets admins control which roles are shared when delegating applications to organizations. Previously, application sharing automatically granted all associated roles, which could lead to over-permissive access.
71
61
@@ -231,7 +221,7 @@ This update ensures compatibility with Microsoft Exchange Online, ahead of the p
231
221
232
222
Learn more about [configuring email providers]({{base_path}}/guides/notification-channels/configure-email-provider/).
233
223
234
-
### Preconfigured React and Next.js application templates
224
+
### Pre-configured React and Next.js application templates
235
225
236
226
WSO2 Identity Server now provides ready-to-use templates for React and Next.js applications.
237
227
@@ -265,6 +255,16 @@ Currently supported actions include:
265
255
266
256
Learn more about [service extensions]({{base_path}}/guides/organization-management/service-extensions/service-extensions/).
267
257
258
+
### OpenTelemetry-based LDAP operation tracing
259
+
260
+
WSO2 Identity Server introduces OpenTelemetry-based tracing for LDAP operations such as search, bind, and modifyAttributes. Previously, even though database calls were traced, LDAP interactions were not visible in tracing tools like Datadog.
261
+
262
+
This feature gives full visibility into LDAP activity, making it easier to track and troubleshoot authentication and user management workflows.
263
+
264
+
Admins can enable tracing via a configuration toggle, gaining rich telemetry without affecting existing LDAP logic. This improves troubleshooting and performance insights in complex identity deployments
265
+
266
+
Learn more about [OpenTelemetry-based LDAP tracing]({{base_path}}/deploy/monitor/work-with-product-observability/#opentelemetry-based-tracing-in-wso2-identity-server).
267
+
268
268
## Improvements
269
269
270
270
WSO2 Identity Server 7.2.0 improves a number of existing features to enhance your experience.
@@ -289,14 +289,24 @@ Learn more about [encryption for outbound communications]({{base_path}}/deploy/s
289
289
290
290
WSO2 Identity Server now provides out-of-the-box support for Unicode characters in user attributes. User attributes such as names, addresses, and custom claims can now include characters from multiple languages seamlessly.
291
291
292
-
Prior to IS 7.2.0, Unicode support was limited for MySQL and MS SQL databases. Starting from this release, Unicode is supported across all supported database types.
292
+
Prior to WSO2 Identity Server 7.2.0, Unicode support was limited for MySQL and MS SQL databases. Starting from this release, Unicode is supported across all supported database types.
293
293
294
294
!!! note
295
295
296
296
Usernames cannot use Unicode characters in MySQL and MS SQL databases.
297
297
298
298
Learn more about enabling unicode support for [MS SQL]({{base_path}}/deploy/configure/databases/carbon-database/change-to-mssql/).
299
299
300
+
### Operation-wise access control in SCIM bulk API
301
+
302
+
WSO2 Identity Server now allows fine-grained access control for each operation in the SCIM2 bulk API.
303
+
304
+
Previously, the `internal_bulk_resource_create` scope was required to perform any operation on the bulk endpoint. Starting with WSO2 Identity Server 7.2, each operation in a bulk request executes only if the corresponding operation-specific scope is available.
305
+
306
+
For backward compatibility, the API still supports the `internal_bulk_resource_create` scope and allows performing all operations through the bulk endpoint.
307
+
308
+
Learn more about the [SCIM bulk API]({{base_path}}/apis/scim2/scim2-batch-operations/#scopepermission-required-for-batch-operations).
309
+
300
310
### Pre-update password extension support for user registration
301
311
302
312
WSO2 Identity Server now supports executing pre-update password action during user registration. With this enhancement, organizations can plug in custom password validation logic whenever a user sets or updates a password. This ensures consistent enforcement of password policies across all password operations in the WSO2 Identity Server, including user onboarding and password changes.
-[Displaying banner in the My Account portal]({{base_path}}/guides/user-self-service/self-register/).
358
368
359
-
360
-
361
-
362
-
363
-
364
-
365
-
366
-
367
-
368
-
369
-
370
-
371
-
372
-
373
-
### Enhanced language and locale support for My Account & Console
374
-
375
-
Previously, My Account and Console supported only a limited set of languages. With this release, users can add or remove locales to customize the applications in their preferred languages, providing greater flexibility and improved localization.
376
-
377
-
Learn more about [adding and removing locales]({{base_path}}/guides/branding/localization/#add-or-remove-locales).
378
-
379
-
### OAuth-based authentication support for email providers
380
-
381
-
The Email Provider template now supports OAuth-based authentication for SMTP servers. In addition to the existing Basic authentication, you can now configure SMTP using client credentials, meeting modern authentication standards.
382
-
383
-
This update ensures compatibility with Microsoft Exchange Online, ahead of the planned retirement of Basic authentication (SMTP AUTH) in April 2026, helping maintain uninterrupted email delivery and compliance with current security best practices.
384
-
385
-
Learn more about [configuring email providers]({{base_path}}/guides/notification-channels/configure-email-provider/).
386
-
387
-
### Seamless user impersonation for business applications
388
-
389
-
WSO2 Identity Server now allows initiating user impersonation without modifying business applications. Previously, impersonation required source code changes in an impersonation-authorized client. With this update, impersonation can be started directly from the Console, enabling seamless Single Sign-On (SSO) to any authorized business application.
390
-
391
-
Learn more about [user impersonation]({{base_path}}/guides/authorization/user-impersonation/).
392
-
393
-
### Granular application discoverability in My Account
394
-
395
-
WSO2 Identity Server now gives administrators enhanced control over application discoverability in the My Account portal. Previously, any application marked as discoverable was visible to all users in the organization.
396
-
397
-
With this update, administrators can assign specific user groups as discoverable groups, ensuring that applications are visible only to intended audiences. This allows for a more tailored and convenient experience for users.
398
-
399
-
If no groups are assigned, applications marked as discoverable will continue to be visible to all users in the organization.
400
-
401
-
Learn more about [discoverable applications]({{base_path}}/guides/applications/#make-an-application-discoverable).
402
-
403
-
### Protocol-specific keystores for root organizations
404
-
405
-
WSO2 Identity Server now offers more flexibility in keystore management. In addition to customizing the SAML keystore, you can now set up separate keystores for OAuth, WS-Trust, and WS-Fed.
406
-
407
-
By default, the server continues to use the primary and tenant keystores for signing and encryption. With this update, organizations can assign dedicated keystores for each protocol, improving security and simplifying compliance management.
408
-
409
-
Keystores can be configured for all tenants or specifically for the super tenant through deployment settings.
410
-
411
-
Learn more about [configuring protocol-specific keystores]({{base_path}}/deploy/security/keystores/configure-custom-keystores/).
412
-
413
369
### Support for email OTP-based password recovery
414
370
415
371
WSO2 Identity Server now provides enhanced flexibility in password recovery. In addition to Email link and SMS OTP methods, users can recover their accounts using Email OTP, expanding the available recovery options.
@@ -444,6 +400,8 @@ WSO2 Identity Server introduces two new JavaScript functions for conditional aut
444
400
445
401
-`removeAssociatedLocalUser` – Removes local user associations from federated accounts, simplifying account linking and unlinking scenarios.
446
402
403
+
Learn more about these [conditional authentication functions]({{base_path}}/references/conditional-auth/api-reference/#conditional-authentication-api-reference).
404
+
447
405
## Deprecated features
448
406
449
407
In WSO2 Identity Server 7.2.0, we have deprecated several features to enhance security, streamline operations, and improve overall usability. These deprecations align with our commitment to maintaining a robust and future-ready platform. Below is a list of deprecated features along with recommended actions for users.
@@ -470,12 +428,42 @@ Previously, the root organization’s tenant domain served as its display name.
470
428
471
429
This separation provides a clear distinction between the organization’s identifier and its display name.
472
430
473
-
##Fixed issues
431
+
### Legacy user registration and management flows
474
432
475
-
For a complete list of issues fixed in this release, see [WSO2 IS 7.2.0 - Fixed Issues](https://github.com/wso2/product-is/issues?q=state%3Aclosed%20project%3Awso2%2F117){:target="_blank"}.
433
+
Previously, WSO2 Identity Server offered built-in flows for user registration and management that provided basic functionality and limited customization options. These are
476
434
477
-
## Known issues
435
+
These flows are now deprecated and replaced with the new **Flow Builder**, which offers a more flexible and powerful way to design and manage user registration and management journeys.
436
+
437
+
The deprecated flows include:
438
+
439
+
-**Legacy self-registration flow**
440
+
441
+
Along with this flow, the following related features are also deprecated:
442
+
443
+
- Self-registration configurations under the **Login & Registration** tab in the Console.
478
444
479
-
For a complete list of open issues related to the WSO2 Identity Server, see [WSO2 IS - Open Issues](https://github.com/wso2/product-is/issues){:target="_blank"}.
445
+
- Self-Registration APIs used for building custom registration flows.
480
446
447
+
-**Legacy password recovery flow**
448
+
449
+
Along with this flow, the following related features are also deprecated:
450
+
451
+
- Password recovery configurations under the **Login & Registration** tab in the Console.
452
+
453
+
- Password recovery APIs under the account recovery V2 APIs.
454
+
455
+
-**Legacy invited user registration flow**
456
+
457
+
Along with this flow, the following related features are also deprecated:
458
+
459
+
- Invited user registration APIs.
460
+
461
+
**Recommended action**: Use the new [Flow Builder](#introducing-flow-builder-build-tailored-user-registration-and-management-flows) to create fully customizable end-user journeys.
462
+
463
+
## Fixed issues
464
+
465
+
For a complete list of issues fixed in this release, see [WSO2 Identity Server 7.2.0 - Fixed Issues](https://github.com/wso2/product-is/issues?q=state%3Aclosed%20project%3Awso2%2F117){:target="_blank"}.
466
+
467
+
## Known issues
481
468
469
+
For a complete list of open issues related to the WSO2 Identity Server, see [WSO2 Identity Server - Open Issues](https://github.com/wso2/product-is/issues){:target="_blank"}.
0 commit comments