During the second half of 2025, the development of X-Road 8 “Spaceship” and X-Road 7 “Unicorn” continued in parallel. The available development resources have been divided between the two major versions, and both have made good progress.
X-Road 7.8.0 was released at the beginning of February 2026. Let’s see what the highlights of the new version are! The full release notes are available here.
Support for selecting between free and paid trust service providers
Starting from version 7.8.0, X-Road supports defining cost-related metadata for trust service providers. Central Server administrators can define OCSP and timestamping services as free or paid, which makes the cost impact of different configuration options more transparent to Security Server administrators.
The metadata is shown in the Security Server UI, and Security Server administrators can configure their Security Servers to prefer one option over another. The available strategies are:
NONE (default) - uses the same logic as earlier versions
ONLY_FREE - only use services marked as free and ignore the rest
FREE_FIRST - use free services first, fall back to paid services and then undefined ones
ONLY_PAID - only use services marked as paid and ignore the rest
PAID_FIRST - use paid services first, fall back to free services and then undefined ones.
The Security Server administrators can configure these strategies using the “message-log.timestamping-prioritization-strategy” and “signer.ocsp-prioritization-strategy” properties. By default, their value is NONE. The strategies define which trust services the Security Server uses during its operations.
Support for automatically selecting the supported Certificate Sign Request (CSR) format
Starting from version 7.8.0, X-Road supports defining the supported Certificate Signing Request (CSR) format for each trusted Certificate Authority (CA). Central Server administrators can set the supported format for each CA on the Central Server, and the format is automatically selected on the Security Server when a new CSR is generated. As a result, Security Server administrators no longer need to know which CSR format is supported by the CA they are using.
When the format is automatically selected on the Security Server, the CSR format menu becomes read-only, and its value cannot be manually changed. Automatic selection is enabled when a supported CSR format is defined for the selected CA on the Central Server. The feature applies to both manually generated CSRs and certificates ordered using ACME.
New tools for connection debugging
Version 7.8.0 provides new tools for testing connections to the Central Server, the management Security Server, and other Security Servers. These features make it easy to test connectivity between different X-Road components without any additional tools.
The Central Server connection tests support checking connectivity for downloading the global configuration and for sending authentication certificate registration requests. These tests can be used to verify that all required firewall configurations are in place between the Central Server and the source Security Server.
In addition, connection tests with other Security Servers allow Security Server administrators to verify connections to other Security Servers and clients. It is possible to select the target client and, if the target client is registered on multiple Security Servers, also the target Security Server. If a connection test fails, an error message providing more detailed information about the issue is shown in the UI. However, in some cases, it may still be necessary to consult the Security Server logs for additional details.
Support for multiple tokens in the autologin script
The autologin script enables the Security Server PIN code to be entered automatically after startup. Before version 7.8.0, the script supported only one token, which was the software token. Starting from version 7.8.0, the script supports multiple tokens, allowing both software and hardware tokens to be logged in automatically.
The original behaviour of the script is still supported: if there is only one line in the “/etc/xroad/autologin” file, it is used as the PIN code for the software token. If the file contains multiple lines in the format “token_id:pin_code”, the new behaviour is applied.
Other improvements and updates
In addition to the already mentioned features, version 7.8.0 includes several minor improvements and updates. These include, for example, support for hardware tokens with the Security Server Sidecar, the ability to customize the ACME HTTP challenge port on the Security Server, a new version of the basic certificate profile that supports ACME, updates to the Estonian and Portuguese translations, and support for defining the admin user password as a hash using an environment variable when starting a Security Server Sidecar container.
Once again, we received several contributions from members of the X-Road Community. It is great to see the number of community contributions remaining steady, and we hope this trend continues. Thank you to all the contributors—your efforts are highly appreciated!
Please review the release notes document to understand fully all the changes in version 7.8.0.
What’s next?
This is the last new-feature release for X-Road 7. In practice, this means that new feature development for X-Road 7 will stop after version 7.8.0.
In the future, X-Road 7 development will continue in maintenance mode, focusing on minor bug fixes and technical maintenance (for example, updating third-party dependencies). Naturally, additional releases addressing critical security vulnerabilities in X-Road 7 will be published if necessary.
The overall duration of the X-Road 7 maintenance period has not yet been decided. However, the intention is to continue X-Road 7 maintenance beyond 2026.
From now on, the main focus of X-Road development is on developing the next major version, X-Road 8 “Spaceship”. More news regarding X-Road 8 will be published regularly. Stay tuned!
