🚀 New Features
Computers Administration
A new Computers tab has been added to the Administration section, enabling the account owner and domain admin(s) to centrally manage all remote computers registered under their domain, including those added by other users. The page provides a complete overview and essential tools to view, organize, and control access to these computers.

Web Portal > Administration > Computers
- Overview of all computers
View all remote computers linked to your account, including those registered by users within your domain. The table includes columns such as:Alias,Computer Name,Status,Last Online,Computer Group,Owner,Shares,Tags,Platform,Agent Version,IP Address,MAC Address - Change computer group
Move computers between groups to keep them organized. - Change computer owner
Reassign ownership of a computer to another user.
Note: If a computer is added to a computer group, ownership is automatically transferred to the group owner. The group owner can be changed by users with appropriate permissions (e.g.,Group Admin,Computer(s) Manager, orComputer Owner). - Share computer
Share access to a specific computer with users or user groups in your domain.
Note: We recommend sharing via “Computer Groups“, as this allows you to set the permission level when sharing the group with other users. Additionally, when you add a new computer to an existing computer group it will automatically be shared with users and user groups with whom the computer group is already shared. - Add tags
Use tags to categorize and filter computers based on your own criteria. - Export to CSV
Export the computer list and metadata to a.csvfile. - Quick view
A quick view panel has been added to the computer list. It opens when you click any row in the table. - Computer details page
A detailed view is available and can be accessed via quick view or by clicking the computer name in the table.
⚙️ New Setting: Edit computers (domain admin only)

Web Portal > Administration > Settings > General > Edit Computers (domain admin only)
- When enabled (default):
Domain admins can manage the Computers tab — rename computers, assign groups or owners, share access, and set tags. - When disabled:
The user (domain admin) can only view the list of remote computers.
Note: The user must be an account owner or domain admin to access the Administration section (see theDomain Adminsetting).
Computer group administration
Support for managing computer groups has been added to the Administration section. You can now create and delete groups through the Computer Groups tab using Quick View. Once a group is created, computers can be added to it.

Web Portal > Administration > Computer Groups
The Quick View now includes a list of computers in the group, allowing you to easily add or remove them with confirmation prompts.
Additionally, a new Computers subtab has been introduced in the Computer Group Details page, providing a full overview of all computers assigned to the selected group.

Web Portal > Administration > Computer Groups > Computers
⚙️ New Setting: Create, edit and delete computer groups (domain admin only)

Web Portal > Administration > Settings > General > Create, edit and delete computer groups (domain admin only)
- When enabled (default), domain admins can view, create, manage members, and delete computer groups.
- When disabled, groups are read-only.
Note: The user must be an account owner or domain admin to access the Administration section (see theDomain Adminsetting).
New WebAPI methods:
domain/admin/computergroup/create/1:
Creates a new computer group with the given name, owner, and members (connect-only). Returns the public code of the new computer group.domain/admin/computergroup/delete/1:
Deletes the specified computer group. The group is not deleted if it is external or still contains computers and/or members.
ISL Light for Web (beta)
The ISL Light for Web (beta) version allows users to view a remote desktop directly from their browser, eliminating the need to download or install the desktop application. While this version offers added convenience, certain features are unavailable due to browser limitations.

Web Portal > Sessions/Computers > Session in browser
✅ Advantages of the web version:
- No installation required
Ideal for one-time sessions or situations where installation is not feasible or permitted. Access ISL Light directly from your browser without downloading or installing the application.
🚫 Features NOT supported in the web version:
- Screen sharing
Operators can view the remote desktop but cannot share their own screen. - Clipboard sharing/syncing
Copying and pasting between the local and remote machines is not supported. - File transfer
Transferring files between the local and remote machines is not supported. - Session recording
Recording a session is not available in the web client. - Multiple monitor management (explode monitors)
Opening each remote monitor in a separate window is not supported. - Simulated typing for paste operations
The Paste (Simulate Typing) feature is not supported.
Browser compatibility:
- Google Chrome: Version 95 or newer
- Mozilla Firefox: Version 90 or newer
- Microsoft Edge: Version 91 or newer
- Safari: Version 14 or newer
Accessing the web version:
You can start a web session from the Sessions page, Computers page.
Sessions page:
A new option to start/open/resume a session using ISL Light in browser was added to the Sessions pages.

Web Portal > Sessions > New Session Browser (beta)
- “Start New Session” was renamed to “New Session” and is now a split button:
New Session (default)– standard app download flowNew Session in Browser (beta)– opens in a browser tab via ISL Light
- Active sessions:
Open in App (default)Open in Browser (beta)
- Paused sessions:
Resume in App (default)Resume in Browser (beta)
⚙️ New Setting: Browser session support

/conf > Configuration > ISL Light > Browser session support
- Enabled by default
- If disabled, only
New Session(default flow) is available
Computers page:
A new option to connect to a remote computer using ISL Light in browser was added to the Computers pages.

Web Portal > Computers > Connect in Browser (beta)
- The Connect button now offers:
Connect in App (default)Connect in Browser (beta)
⚙️ New Setting: Browser connect support

/conf > Configuration > ISL AlwaysOn > Browser connect support
- If disabled, only the default flow is available
- Enabled by default
Join a session in browser:
⚠️ Limitations:
The browser version currently does not support screen sharing from the client side. This means that if the client is expected to share their screen with the operator, the browser version will not be suitable.
However, it can still be useful for viewing the operator’s shared screen (e.g., presentations, guided instructions).
⚙️ New Setting: Join session method

/conf > Configuration > ISL Light > Join session method
Options:
Ask every timeJoin in app(default)Join in browser
Behavior:
- If
Ask every timeis selected: The join page shows two buttons:Join in App(downloads app)Join in Browser(redirects to ISL Light in browser)
- If
Join in appis selected: Uses the standard app-based flow. - If
Join in browseris selected: The page shows onlyJoin in Browser.
Executable signing to prevent false virus detections
Build of Go modules was fixed to sign all .exe files. Executables now contain digital signature which should reduce the probability of being incorrectly detected as virus by antivirus programs.
Add option to upgrade PostgreSQL version on demand
Manual PostgreSQL upgrade support was added (required for major version changes, e.g., 9.3 → 16). Minor version upgrades remain automatic. Manual upgrade is required when upgrading to a major version (e.g., 9.3 → 16). Minor version updates are still performed automatically.
When a new version is available, /conf displays: A new PostgreSQL version (16) is available for installation.
This includes estimated time and disk usage (based on DB row count).
The upgrade process mimics PostgreSQL installation:
- Step 1: Click
Upgrade to PostgreSQL version 16... - Step 2: Click
Execute
Bundled PostgreSQL version upgraded from 9.3.25 to 16.8.
Use CPSESSID Cookie in WebAPI2 Handler
Web session cookie support was added to WebAPI2. Clients can now call /users/webapi2 and use the session cookie.
New request format (JSON2):
jsonCopyEdit{
"hs": "<session web token>", // optional
"pt": "<post token for current web session>",
"hedata": { ... }, // request body (old JSON1 format)
"ignore_cookie": true // optional
}
- Use of plain
hstoken in requests was removed. - All WebAPI2 requests now rely on the new JSON2 format and cookie-based session control (v2400 pages).
Password history settings
Password history controls are now exposed under:Administration > Security > Password
These settings help enforce password reuse policies and aging rules.
⚙️ New Settings:
Password history size: Number of recent passwords stored (default:24)Maximum password history size: Upper limit for history entries (default:100)Minimum password age (1w 2d 3h 4m 5s): Minimum time between password changesMaximum password age: FormerlyPassword expiration interval; users must change passwords after this time
Notes:
- Password history only updates when a user changes their own password.
- Administrative password resets do not affect history.
- Older entries are removed when the limit is exceeded.
Remove timeout from moduleapp startup
The 120s timeout exception when starting or restarting a Go moduleapp process was removed. It is now replaced with a critical log line: module app process has not started yet, logged every 10 seconds.
Support for reCAPTCHA Enterprise and automated browser detection/blocking
Support for reCAPTCHA provided by Google Cloud Services was added. Previously, only standalone reCAPTCHA v2 and v3 were supported.
⚙️ New Settings:
Project ID: Google Cloud project ID with reCAPTCHA enabled.API key: Google Cloud API key associated with the project.reCAPTCHA required: Controls if reCAPTCHA is required on protected WebAPIs.reCAPTCHA site key: The key associated with the website or application.Fail 2 ban reason codes: A list of interpreted reason codes to be flagged for fail2ban (must be prefixed withrc_).
When Google Cloud reCAPTCHA is enabled, v2 and v3 are ignored even if set up. Settings were reorganized and grouped accordingly.
Documentation for supported reason codes: Understand reason codes – Google Cloud reCAPTCHA
To enable better monitoring and abuse detection, a specific user action can now be passed via the new URL parameter: captcha_action.
Add support to send email notification when creating user account
A new email notification is sent when a user account is created. Controlled via two new settings in /conf :> Configuration > General > Mail > Templates
Account created notificationMail template for account created notification
Triggers for sending the notification:
- Server administration
- Domain administration
- Integrator
- SAML login
- External authenticator
Update confirmation and verification code emails
The appearance of confirmation and verification code emails was updated. These emails are sent when logging in with email set as the preferred 2FA method.
SSO username mapping
SSO username mapping allows mapping a username from an identity provider to a domain-specific username (case-insensitive).
Example: If your domain user is \example\joesmith and SSO username is joe.smith@example.com, you can map the two.
When logging in via SSO, the system will authenticate the user as \example\joesmith.
⚙️ New Setting: SSO username mapping
Administration > Security > Authentication > Single Sign-On (SSO)
Add Option to Send Chat Content in HTTP Events
⚙️ New Setting: Send live chat transcripts in HTTP events

/conf > Configuration > ISL Light > Send live chat transcripts in HTTP events
- Requires
Send live chat transcriptsto be set toYes - Disabled by default
New HTTP event type: CHAT_CONTENT
Transcript content is included in the text field.
Chat transfer system messages
System messages for chat transfer and takeover were added. Examples include:
"Y has taken over the chat""X wants to transfer the chat to Y"
Upgrade OpenSSL to 3.0.16
OpenSSL was upgraded to version 3.0.16.
Upgrade to libxml2 2.12.10 and libxslt 1.1.42
libxml2upgraded to2.12.10libxsltupgraded to1.1.42
Upgrade jemalloc to 5.3.0
jemalloc upgraded from 4.0.4 to 5.3.0 (Linux only)
Upgrade jQuery-UI to 1.14.1 (v2400 Pages)
jQuery-UI was upgraded to 1.14.1 for v2400 pages.
Remove v1 template and web pages v1, v2, v3, v4
Support for the v1 web template and legacy web pages (v1–v4) has been removed. The /join endpoint now redirects to join.html. Deprecated handlers and XPP expressions used exclusively in the removed pages were also removed.
🐞 Bug Fixes
Pass ciphers global map by reference on SSL accept
Previously, the ciphers global map was passed by copy, affecting performance. This was redesigned to pass the map by reference.
The defect was fixed.
Wait for user account to be replicated in loginsso handler
SSO logins could fail if the user was created on one server but not yet replicated to the Web page server. This was redesigned to wait until the user is replicated before proceeding.
The defect was fixed.
Support WebSocket upgrade of existing HTTP connection
WebSocket support was improved to allow upgrades to WebSocket even after preceding HTTP requests on the same TCP connection, and not just at the start of a TCP connection. This should also fix connection issues when ISL Conference Proxy is placed behind a load balancer.
Bulk share did not allow sharing of non-owned computers
In previous versions, bulk sharing of computers in a group failed with the message: "Some computers have been omitted – shared computers cannot be edited."
Redesigned behavior:
- Bulk Share modal now lists all computers, not just owned ones.
- Sharing/unsharing works even for entries with user groups in shares.
- Results are split between success and failure messages.
- A scroller is added when many computers are listed.
The defect was fixed.
Support certificate authorities without a Terms of Service link
Previously, SSL module raised an error: "Could not retrieve terms of service." This occurred when a certificate authority (CA) did not provide a terms link, which is optional under ACME.
Fixes:
- The checkbox to accept terms is hidden if no link is provided.
- A new message was added:
"Please install the SSL certificate to enable secure connections."
The defect was fixed.
tlsext_ticket_refresh_task should not use a static watchdog
This task was incorrectly protected by a watchdog, which triggered false alerts when the TLS ticket refresh interval setting changed. Now the task is rescheduled dynamically and no longer monitored by the static watchdog.
The defect was fixed.
Maximum password age lower than minimum caused lockout
Previously, it was possible to set the maximum password age to a lower value than the minimum password age, which could cause user lockouts. The validation logic was updated to prevent this misconfiguration.
The defect was fixed.
Other fixes and improvements
Bug fixes, security updates, missing translations, and other general improvements.
















