Access Manager 4.2 Service Pack 1 (4.2.1) supersedes Access Manager 4.2.
For the list of software fixes and enhancements in the previous release, see Access Manager 4.2 Release Notes
This release includes the following platform updates and fixed issues:
In addition to the platforms introduced in Access Manager 4.2 release, this release adds support for the following platforms:
SLES 12 SP1
RHEL 7.2
This release adds support for the following dependent components:
eDirectory 8.8.8.7
Java 1.8.0_74
Apache 2.2.27 (This release includes fixes for CVE-2014-0231, CVE-2014-0226, CVE-2013-5704,and CVE-2015-3183)
OpenSSL 1.0.1s
Tomcat 8.0.32
iManager 2.7.7.6
NOTE:This release of Access Manager by default supports Tomcat 8.0.32 and OpenSSL 1.0.1s, but Administration Console uses Tomcat version 7.0.56 due to dependency on iManager.
This release includes software fixes for the following components:
The following issues are fixed in Administration Console:
Issue: The trusted roots are stored in an alphabetical order in eDirectory. When reading the trusted roots, if Administration Console encounters a corrupt trusted root it throws an exception and terminates the reading. It does not list any of the trusted roots that are stored after the corrupt trusted root. [Bug 940432]
Fix: The issue is resolved. The Administration Console now handles the exception and reads the next trusted root.
Issue: There is a Cross Site Scripting vulnerability issue in Administration Console risk engine. In Policies > Risk Configuration > NAT Settings, the Client IP Header Parser field displays irrelevant characters. [Bug 954474]
Fix: The issue is resolved. The irrelevant characters are removed from the Client IP Header Parser field.
The following issues are fixed in Identity Server:
Issue: The SAML tokens that contain a signature and certificates are line wrapped. This issue happens due to old XML signature library.[Bug 954912]
Fix: The XML signature library has been upgraded. By default the SAML tokens are line wrapped. To disable line wrapping, set the following option in the /opt/novell/nam/idp/conf/tomcat.conf file:
JAVA_OPTS="${JAVA_OPTS} -Dorg.apache.xml.security.ignoreLineBreaks= true
Issue: Define an attribute set with a remote attribute name and set a constant value. Save the attribute set, assign it and update Identity server. If you try to delete the constant value an exception occurs. [Bug 965912]
Issue: On an upgraded Access Manager, the Virtual Attribute option is not listed under the role policy conditions. [Bug 958724]
Issue: While defining scopes and claims for a Resource Server, if the scope is not enabled with the Require user permission option, then the OAuth identity injection does not inject this scope even when the request contains this scope. [Bug 965649]
The following issues are fixed in Access Gateway:
Issue: In a clustered environment, Access Gateway throws an exception for a policy extension template. This happens when the load balancer selects different servers for Identity Server and Access Gateway. However, when the load balancer selects the same servers for Identity Server and Access Gateway, there is no error. [Bug 876869]
Fix: This issue is resolved. The load balancer does not throw an exception and works as expected on different servers.
Issue: The URL Accessed audit event is triggered even when it is not enabled for auditing. [Bug 968219]
Issue: On Windows Access Gateway Service, Apache crashes. This is because the requested URL has long query string and the stack size is insufficient. [Bug 847731]
Fix: This issue is resolved. The stack size in Windows Access Gateway Service is increased to prevent Apache from crashing.
To upgrade to Access Manager 4.2.1, you must be on any one of the following Access Manager versions:
4.2
4.1 Service Pack 2
4.1 Service Pack 1 HF1
4.1 Service Pack 1
4.1
4.0 Service Pack 2 HF1
4.0 Service Pack 2
After purchasing Access Manager 4.2.1, log in to the NetIQ Downloads page and follow the link that allows you to download the software. The following files are available:
Table 1 Files Available for Access Manager 4.2.1
Filename |
Description |
---|---|
AM_42_SP1_AccessManagerService_Linux64.tar.gz |
Contains Identity Server and Administration Console for Linux. |
AM_42_SP1_AccessManagerService_Win64.exe |
Contains Identity Server and Administration Console for Windows Server. |
AM_42_SP1_AccessGatewayAppliance.iso |
Contains the Access Gateway Appliance iso. |
AM_42_SP1_AccessGatewayAppliance.tar.gz |
Contains the Access Gateway Appliance tar file. |
AM_42_SP1_AccessGatewayService_Win64.exe |
Contains Access Gateway Service for Windows Server. |
AM_42_SP1_AccessGatewayService_Linux64.tar.gz |
Contains the Access Gateway Service tar file. |
For more information about installing and upgrading, see the NetIQ Access Manager 4.2 Installation and Upgrade Guide.
After upgrading to Access Manager 4.2.1, verify that the version number of the component is indicated as 4.2.1.0-29. To verify the version number, perform the following steps:
In the Administration Console, click Troubleshooting > Version.
Verify that the Version field lists 4.2.1.0-29.
NetIQ Corporation strives to ensure our products provide quality solutions for your enterprise software needs. The following issue is currently being researched. If you need further assistance with any issue, please contact Technical Support.
Issue: The OAuth apps fail after you upgrade Access Manager 4.1 to 4.2. This is caused due to the expired authorization code. [Bug 966216]
Workaround: To workaround this issue, you need to upgrade both Access Gateway and Identity Provider to Access Manager 4.2 at the same time. For more information, see TID.
Issue: The dig and nslookup commands fail when you install Access Gateway Service on SLES 12. [Bug 963699]
Workaround: To workaround this issue, see TID.
Issue: On SLES 12, SLES 12 SP1 and RHEL 7.2, the Administration Console uninstallation fails because of the dependency on iManager. [Bug 971468]
Workaround: To workaround this issue, you need to forcefully uninstall all the components. For more information, see Uninstalling the Linux Administration Console.
Our goal is to provide documentation that meets your needs. If you have suggestions for improvements, please email Documentation-Feedback@netiq.com. We value your input and look forward to hearing from you.
For detailed contact information, see the Support Contact Information website.
For general corporate and product information, see the NetIQ Corporate website.
For interactive conversations with your peers and NetIQ experts, become an active member of our community. The NetIQ online community provides product information, useful links to helpful resources, blogs, and social media channels.
For information about legal notices, trademarks, disclaimers, warranties, export and other use restrictions, U.S. Government rights, patent policy, and FIPS compliance, see https://www.netiq.com/company/legal/.
Copyright © 2016 NetIQ Corporation, a Micro Focus company. All Rights Reserved.