Skip to content

Commit 8a3aa34

Browse files
Merge pull request #5641 from himeshsiriwardana/is-7.2.0-release-note-2
Improved release note and added extra content
2 parents 8f973e7 + 82a1c62 commit 8a3aa34

File tree

1 file changed

+60
-72
lines changed

1 file changed

+60
-72
lines changed

en/identity-server/next/docs/get-started/about-this-release.md

Lines changed: 60 additions & 72 deletions
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
# About this Release
1+
# About this release
22

33
WSO2 Identity Server 7.2.0 is the latest release, succeeding WSO2 Identity Server 7.1.0, with enhanced features, improvements, and fixes.
44

@@ -28,16 +28,6 @@ The flow builder supports the following use cases:
2828

2929
- **Invited user registration** - Build invitation-based registration flows that collect necessary information and set up user accounts. Learn about building an [invited user registration flow using the flow builder]({{base_path}}/guides/flows/invited-user-registration/).
3030

31-
### OpenTelemetry-based LDAP operation tracing
32-
33-
WSO2 Identity Server introduces OpenTelemetry-based tracing for LDAP operations such as search, bind, and modifyAttributes. Previously, even though database calls were traced, LDAP interactions were not visible in tracing tools like Datadog.
34-
35-
This feature gives full visibility into LDAP activity, making it easier to track and troubleshoot authentication and user management workflows.
36-
37-
Admins can enable tracing via a configuration toggle, gaining rich telemetry without affecting existing LDAP logic. This improves troubleshooting and performance insights in complex identity deployments
38-
39-
Learn more about [OpenTelemetry-based LDAP tracing]({{base_path}}/deploy/monitor/work-with-product-observability/#opentelemetry-based-tracing-in-wso2-identity-server).
40-
4131
### AI agent identity management
4232

4333
WSO2 Identity Server now provides first-class identity management for AI agents, enabling organizations to manage them securely and at scale. Each AI agent is assigned a unique identity with attributes, credentials, and metadata, allowing auditing, lifecycle management, and trusted operation within the organization.
@@ -65,7 +55,7 @@ This capability enables real-time integrations, improves automation, and allows
6555

6656
Learn more about [webhooks]({{base_path}}/guides/webhooks/understanding-webhooks/).
6757

68-
### Support for granular role sharing with B2B Applications
58+
### Support for granular role sharing with B2B applications
6959

7060
WSO2 Identity Server now lets admins control which roles are shared when delegating applications to organizations. Previously, application sharing automatically granted all associated roles, which could lead to over-permissive access.
7161

@@ -231,7 +221,7 @@ This update ensures compatibility with Microsoft Exchange Online, ahead of the p
231221

232222
Learn more about [configuring email providers]({{base_path}}/guides/notification-channels/configure-email-provider/).
233223

234-
### Preconfigured React and Next.js application templates
224+
### Pre-configured React and Next.js application templates
235225

236226
WSO2 Identity Server now provides ready-to-use templates for React and Next.js applications.
237227

@@ -265,6 +255,16 @@ Currently supported actions include:
265255

266256
Learn more about [service extensions]({{base_path}}/guides/organization-management/service-extensions/service-extensions/).
267257

258+
### OpenTelemetry-based LDAP operation tracing
259+
260+
WSO2 Identity Server introduces OpenTelemetry-based tracing for LDAP operations such as search, bind, and modifyAttributes. Previously, even though database calls were traced, LDAP interactions were not visible in tracing tools like Datadog.
261+
262+
This feature gives full visibility into LDAP activity, making it easier to track and troubleshoot authentication and user management workflows.
263+
264+
Admins can enable tracing via a configuration toggle, gaining rich telemetry without affecting existing LDAP logic. This improves troubleshooting and performance insights in complex identity deployments
265+
266+
Learn more about [OpenTelemetry-based LDAP tracing]({{base_path}}/deploy/monitor/work-with-product-observability/#opentelemetry-based-tracing-in-wso2-identity-server).
267+
268268
## Improvements
269269

270270
WSO2 Identity Server 7.2.0 improves a number of existing features to enhance your experience.
@@ -289,14 +289,24 @@ Learn more about [encryption for outbound communications]({{base_path}}/deploy/s
289289

290290
WSO2 Identity Server now provides out-of-the-box support for Unicode characters in user attributes. User attributes such as names, addresses, and custom claims can now include characters from multiple languages seamlessly.
291291

292-
Prior to IS 7.2.0, Unicode support was limited for MySQL and MS SQL databases. Starting from this release, Unicode is supported across all supported database types.
292+
Prior to WSO2 Identity Server 7.2.0, Unicode support was limited for MySQL and MS SQL databases. Starting from this release, Unicode is supported across all supported database types.
293293

294294
!!! note
295295

296296
Usernames cannot use Unicode characters in MySQL and MS SQL databases.
297297

298298
Learn more about enabling unicode support for [MS SQL]({{base_path}}/deploy/configure/databases/carbon-database/change-to-mssql/).
299299

300+
### Operation-wise access control in SCIM bulk API
301+
302+
WSO2 Identity Server now allows fine-grained access control for each operation in the SCIM2 bulk API.
303+
304+
Previously, the `internal_bulk_resource_create` scope was required to perform any operation on the bulk endpoint. Starting with WSO2 Identity Server 7.2, each operation in a bulk request executes only if the corresponding operation-specific scope is available.
305+
306+
For backward compatibility, the API still supports the `internal_bulk_resource_create` scope and allows performing all operations through the bulk endpoint.
307+
308+
Learn more about the [SCIM bulk API]({{base_path}}/apis/scim2/scim2-batch-operations/#scopepermission-required-for-batch-operations).
309+
300310
### Pre-update password extension support for user registration
301311

302312
WSO2 Identity Server now supports executing pre-update password action during user registration. With this enhancement, organizations can plug in custom password validation logic whenever a user sets or updates a password. This ensures consistent enforcement of password policies across all password operations in the WSO2 Identity Server, including user onboarding and password changes.
@@ -356,60 +366,6 @@ Learn more about:
356366
- [Resending account verification emails]({{base_path}}/guides/account-configurations/user-onboarding/self-registration/#resend-account-verification-email).
357367
- [Displaying banner in the My Account portal]({{base_path}}/guides/user-self-service/self-register/).
358368

359-
360-
361-
362-
363-
364-
365-
366-
367-
368-
369-
370-
371-
372-
373-
### Enhanced language and locale support for My Account & Console
374-
375-
Previously, My Account and Console supported only a limited set of languages. With this release, users can add or remove locales to customize the applications in their preferred languages, providing greater flexibility and improved localization.
376-
377-
Learn more about [adding and removing locales]({{base_path}}/guides/branding/localization/#add-or-remove-locales).
378-
379-
### OAuth-based authentication support for email providers
380-
381-
The Email Provider template now supports OAuth-based authentication for SMTP servers. In addition to the existing Basic authentication, you can now configure SMTP using client credentials, meeting modern authentication standards.
382-
383-
This update ensures compatibility with Microsoft Exchange Online, ahead of the planned retirement of Basic authentication (SMTP AUTH) in April 2026, helping maintain uninterrupted email delivery and compliance with current security best practices.
384-
385-
Learn more about [configuring email providers]({{base_path}}/guides/notification-channels/configure-email-provider/).
386-
387-
### Seamless user impersonation for business applications
388-
389-
WSO2 Identity Server now allows initiating user impersonation without modifying business applications. Previously, impersonation required source code changes in an impersonation-authorized client. With this update, impersonation can be started directly from the Console, enabling seamless Single Sign-On (SSO) to any authorized business application.
390-
391-
Learn more about [user impersonation]({{base_path}}/guides/authorization/user-impersonation/).
392-
393-
### Granular application discoverability in My Account
394-
395-
WSO2 Identity Server now gives administrators enhanced control over application discoverability in the My Account portal. Previously, any application marked as discoverable was visible to all users in the organization.
396-
397-
With this update, administrators can assign specific user groups as discoverable groups, ensuring that applications are visible only to intended audiences. This allows for a more tailored and convenient experience for users.
398-
399-
If no groups are assigned, applications marked as discoverable will continue to be visible to all users in the organization.
400-
401-
Learn more about [discoverable applications]({{base_path}}/guides/applications/#make-an-application-discoverable).
402-
403-
### Protocol-specific keystores for root organizations
404-
405-
WSO2 Identity Server now offers more flexibility in keystore management. In addition to customizing the SAML keystore, you can now set up separate keystores for OAuth, WS-Trust, and WS-Fed.
406-
407-
By default, the server continues to use the primary and tenant keystores for signing and encryption. With this update, organizations can assign dedicated keystores for each protocol, improving security and simplifying compliance management.
408-
409-
Keystores can be configured for all tenants or specifically for the super tenant through deployment settings.
410-
411-
Learn more about [configuring protocol-specific keystores]({{base_path}}/deploy/security/keystores/configure-custom-keystores/).
412-
413369
### Support for email OTP-based password recovery
414370

415371
WSO2 Identity Server now provides enhanced flexibility in password recovery. In addition to Email link and SMS OTP methods, users can recover their accounts using Email OTP, expanding the available recovery options.
@@ -444,6 +400,8 @@ WSO2 Identity Server introduces two new JavaScript functions for conditional aut
444400

445401
- `removeAssociatedLocalUser` – Removes local user associations from federated accounts, simplifying account linking and unlinking scenarios.
446402

403+
Learn more about these [conditional authentication functions]({{base_path}}/references/conditional-auth/api-reference/#conditional-authentication-api-reference).
404+
447405
## Deprecated features
448406

449407
In WSO2 Identity Server 7.2.0, we have deprecated several features to enhance security, streamline operations, and improve overall usability. These deprecations align with our commitment to maintaining a robust and future-ready platform. Below is a list of deprecated features along with recommended actions for users.
@@ -470,12 +428,42 @@ Previously, the root organization’s tenant domain served as its display name.
470428

471429
This separation provides a clear distinction between the organization’s identifier and its display name.
472430

473-
## Fixed issues
431+
### Legacy user registration and management flows
474432

475-
For a complete list of issues fixed in this release, see [WSO2 IS 7.2.0 - Fixed Issues](https://github.com/wso2/product-is/issues?q=state%3Aclosed%20project%3Awso2%2F117){:target="_blank"}.
433+
Previously, WSO2 Identity Server offered built-in flows for user registration and management that provided basic functionality and limited customization options. These are
476434

477-
## Known issues
435+
These flows are now deprecated and replaced with the new **Flow Builder**, which offers a more flexible and powerful way to design and manage user registration and management journeys.
436+
437+
The deprecated flows include:
438+
439+
- **Legacy self-registration flow**
440+
441+
Along with this flow, the following related features are also deprecated:
442+
443+
- Self-registration configurations under the **Login & Registration** tab in the Console.
478444

479-
For a complete list of open issues related to the WSO2 Identity Server, see [WSO2 IS - Open Issues](https://github.com/wso2/product-is/issues){:target="_blank"}.
445+
- Self-Registration APIs used for building custom registration flows.
480446

447+
- **Legacy password recovery flow**
448+
449+
Along with this flow, the following related features are also deprecated:
450+
451+
- Password recovery configurations under the **Login & Registration** tab in the Console.
452+
453+
- Password recovery APIs under the account recovery V2 APIs.
454+
455+
- **Legacy invited user registration flow**
456+
457+
Along with this flow, the following related features are also deprecated:
458+
459+
- Invited user registration APIs.
460+
461+
**Recommended action**: Use the new [Flow Builder](#introducing-flow-builder-build-tailored-user-registration-and-management-flows) to create fully customizable end-user journeys.
462+
463+
## Fixed issues
464+
465+
For a complete list of issues fixed in this release, see [WSO2 Identity Server 7.2.0 - Fixed Issues](https://github.com/wso2/product-is/issues?q=state%3Aclosed%20project%3Awso2%2F117){:target="_blank"}.
466+
467+
## Known issues
481468

469+
For a complete list of open issues related to the WSO2 Identity Server, see [WSO2 Identity Server - Open Issues](https://github.com/wso2/product-is/issues){:target="_blank"}.

0 commit comments

Comments
 (0)