+### OIDC Userinfo Endpoint Support
+
+When OIDC authentication was in use, BookStack would previously only read claims direction from the supplied
+user ID token. While this worked fine in most cases, some auth platforms would only provide certain details
+via the userinfo endpoint. In this release we add wider support of the OIDC spec by making use of the userinfo
+endpoint where needed. If not all details are in the token, BookStack will call & use the userinfo endpoint data.
+This means existing OIDC use-cases should remain speedy and unaffected, with extra calls only being made during
+authentication when needed.
+
+The userinfo endpoint will be fetched via autodiscovery if enabled, otherwise it can also be defined via env options
+using an `OIDC_USERINFO_ENDPOINT` option. Our [OIDC documentation](/docs/admin/oidc-auth/) has been updated to include this.
+
+Thanks to [@LukeShu](https://github.com/BookStackApp/BookStack/pull/4726) for starting the implementation of this one.
+
+### Simple Registration Honeypot
+
+For instances with open registration, spam can be a problem. While we don't want get deep into the ever moving scope
+of spam prevention, this release adds a simple honeypot field to the registration to hopefully help at least
+filter some of the simplest spam bots out.
+
+Thanks to [@nesges](https://github.com/BookStackApp/BookStack/pull/4970) for contributing this addition.
+
+### Audit Log API Endpoint
+
+We continue to expand the capabilities of the API in this release with the addition of a
+list API endpoint for the audit log. This endpoint provides much the same data you'd be able
+to access when visiting the in-app Audit Log as an administrator. The endpoint requires
+the API user to have both "Manage app settings" and "Manage users" role permission since
+audit log data may contain sensitive information, and is unfiltered by item-level permissions.
+
+This addition should be helpful to those that need external insight into BookStack activities,
+and those that like to standardise & centralise such audit data.
+
+### LDAP Custom TLS CA Cert Option
+
+When using LDAP along with TLS, to encrypt connections, it could be common that custom
+certificates are used by the authentication platform. Such custom certificates could then throw
+errors due to not being issues by a trusted/known authority. While custom certificates could technically be configured
+via openldap, the methods/steps needed for this are not clear nor obvious.
+In this release, we now support a `LDAP_TLS_CA_CERT` option that can be set so BookStack will use a
+certain CA certificate, or a directory of many CA certificates.
+
+You can find further details of this option in our [updated LDAP documentation](https://www.bookstackapp.com/docs/admin/ldap-auth/).