Access Manager 4.3 Service Pack 2 Release Notes

June 2017

Access Manager 4.3 Service Pack 2 (4.3.2) includes enhancements, improves usability, and resolves several previous issues.

Many of these improvements are made in direct response to suggestions from our customers. We thank you for your time and valuable input. We hope you continue to help us ensure our products meet all your needs. You can post feedback in the Access Manager forum on our community website that also includes product notifications, blogs, and product user groups.

For information about the previous release, see Access Manager 4.3 Service Pack 1 Hotfix 1 Release Notes.

For more information about this release and for the latest release notes, see the Documentation page. To download this product, see the Product Upgrade page.

The general support for Access Manager 4.3 ends on 31st May 2018. For more information, see the Product Support Lifecycle page.

1.0 What’s New?

Access Manager 4.3.2 provides the following enhancement and fixes in this release:

1.1 Operating System Upgrade

In addition to the existing supported platforms, this release supports RHEL 6.9.

1.2 Updates for Dependent Components

This release adds support for the following dependent components:

  • eDirectory 8.8.8.10

  • Java 1.8.0_131

  • Tomcat 8.0.44

  • iManager 2.7.7.10 (20170428_1848)

NOTE:Access Manager 4.3.2 by default supports Tomcat 8.0.44 and OpenSSL 1.0.2k, but Administration Console uses Tomcat version 7.0.68 due to dependency on iManager.

1.3 Fixed Issues

This release includes software fixes for the following components:

Administration Console

The following issues are fixed in Administration Console:

  • When You Edit Data Entry Field in Policies Using iManager, HTTP 404 Error Occurs. (TID 7020723)

  • The Nessus Scan on NAM 4.3.1 Reports Plugin 44657 - Linux Daemons with Broken Links to Executable. (TID 7020149)

  • The Nessus Scan Reports SWEET32 Vulnerability When Running on Oracle Java SE Version (CVE-2016-2183).

    For More Information on this Issue, See TID 7020150.

Identity Server

The following issues are fixed in Identity Server:

  • Java Scripts and HTML Tags Are Allowed In OAuth Scope Description. When Scopes Containing Java Script Are Requested, XSS Attack Can Occur (CVE-2017-7419).

    For More Information about this Issue, See TID 7019893.

The OAuth GET Requests Return the HTTP 401 Error

In some environments, UserInfo Endpoint returns HTTP 401 Unauthorized when using valid tokens. [Bug 1038997]

The Fall Back Login Page for Kerberos Contract Displays Question Mark (?) in Username and Password Fields

The Kerberos fall back login page is not localized for Asian languages. [Bug 1039004]

For More Information on this Issue, See TID 7020724.

The SAML 2.0 Service Provider Login Using Kerberos As Default Contract Does Not Redirect to Service Provider

When Kerberos is used as default contract and the user accesses SAML 2.0 service provider using Identity server initiated login, the user is not redirected to the service provider. The user remains on the Identity portal page. [Bug 1039006]

Destination URL Validation Fails When URL Includes Default Port

When SAML 2.0 AuthnRequest includes the HTTPS 443 default port in the URL and not in metadata, it causes Destination URL validation failed error. [Bug 1040329]

User Is Not Provisioned Correctly When User Store Contains Multiple Replicas

LDAP replica stickiness is not configured to provision profiles. The create user requests reach different replicas during provisioning, attribute modification and authenticated principal search. [Bug 1039001]

The LDAP Query Parameters Cannot Be Changed for Kerberos Method

Issue: The Kerberos class does not allow to change LDAP query parameters. [Bug 1020879]

Fix: The LDAP query parameter of Kerberos method can be modified using SearchQuery property.

For example if you want to use the SearchQuery property for emails, perform the following steps:

  1. Navigate to Identity Servers > Edit > Local > Methods

  2. Click Kerberos Method

  3. Click Properties > New

  4. In the Add Property dialog box, specify the following:

    Property Name: SearchQuery

    Property Value: (&(objectclass=person)(mail=%Email%))

Access Gateway

The following issues are fixed in Access Gateway:

  • HTTP Requests with URL Longer than 1531 Characters Returns HTTP 403 forbidden Error While Using Access Gateway Service on Windows. (TID 7020720)

  • When You Click on Proxy Services and Configuration Pages, Access Gateway Is Marked for Update Even if the Configuration Is Not Changed. (TID 7020721)

  • The Error on DNS mismatch Does Not Work as Expected When Disabled. (TID 7020722)

  • The SSLProxyCipherSuite Directive Causes A Configuration Error While Using Domain Based Proxy. (TID 7020725)

  • When The Script Is Injected Using Browser Plugin, Referrer Link On NAGError Page Causes XSS Vulnerability (CVE-2017-5191). For More Information on this Issue, See TID 7018793.

Access to Inject Java Script Policy Enabled Resource Causes Error

When you add an Inject Java script policy and the associated resource is accessed, the browser displays an error. [Bug 1038996]

The Global Advanced Option FlushUserCache Causes Looping

When FlushUserCache advanced option is enabled and multiple resources with different contracts are accessed in the same browser session, looping occurs. [Bug 1039002]

The Syslog Server Communication Failure Reduces the Performance of Access Gateway Server

Issue: When Syslog is enabled and Access Gateway Server cannot access Syslog Server, the audit events are not sent to Access Gateway. It reduces the Access Gateway performance. [Bug 1039829]

Fix: This issue is fixed in this release.

NOTE:If you are upgrading from a previous version of Access Manager, you must update the IP address and port number of the Syslog server to receive the system and server alerts in Administration Console.

When you upgrade Access Manager to this release, you can update the IP address and port number of the Syslog server by using any of the following methods:

  • Modify the SERVERIP and SERVERPORT values of Syslog server at /etc/Auditlogging.cfg. Perform this step for all the devices, then restart the devices.

  • In Administration Console, navigate to the Auditing Administrative task and update the IP address and port number of the Syslog server. For more information, refer Specifying the Logging Server and Console Events.

2.0 Installing or Upgrading

After purchasing Access Manager 4.3.2, log in to the NetIQ Downloads page and follow the link that allows you to download the software. The following files are available:

Table 1 Files Available for Access Manager 4.3.2

Filename

Description

AM_43_SP2_AccessManagerService_Linux64.tar.gz

Contains Identity Server and Administration Console .tar file for Linux.

AM_43_SP2_AccessManagerService_Win64.exe

Contains Identity Server and Administration Console .exe file for Windows Server.

AM_43_SP2_AccessGatewayAppliance.iso

Contains Access Gateway Appliance .iso file.

AM_43_SP2_AccessGatewayAppliance.tar.gz

Contains Access Gateway Appliance .tar file.

AM_43_SP2_AccessGatewayService_Win64.exe

Contains Access Gateway Service .exe file for Windows Server.

AM_43_SP2_AccessGatewayService_Linux64.tar.gz

Contains Access Gateway Service .tar file for Linux.

AM_43_SP2_AnalyticsServerAppliance.iso

Contains Analytics Server Appliance .iso file.

AM_43_SP2_AnalyticsServerAppliance.tar.gz

Contains Analytics Server Appliance tar file.

For information about the upgrade paths, see Section 3.0, Supported Upgrade Paths. For more information about installing and upgrading, see the NetIQ Access Manager 4.3 Installation and Upgrade Guide.

3.0 Supported Upgrade Paths

To upgrade to Access Manager 4.3.2, you need to be on one of the following versions of Access Manager:

  • 4.2.x

    • 4.2 Service Pack 2

    • 4.2 Service Pack 3

    • 4.2 Service Pack 3 Hotfix 1

    • 4.2 Service Pack 4

  • 4.3.x

    • 4.3

    • 4.3 Service Pack 1

    • 4.3 Service Pack 1 Hotfix 1

For more information about upgrading Access Manager, see Upgrading Access Manager in the NetIQ Access Manager 4.3 Installation and Upgrade Guide.

4.0 Verifying Version Number After Upgrading to 4.3.2

After upgrading to Access Manager 4.3.2, verify that the version number of the component is indicated as 4.3.2.0-15. To verify the version number, perform the following steps:

  1. In Administration Console Dashboard, click Troubleshooting > Version.

  2. Verify that the Version field lists 4.3.2.0-15.

5.0 Known Issues

NetIQ Corporation strives to ensure our products provide quality solutions for your enterprise software needs. The following issue is currently being researched. If you need further assistance with any issue, please contact Technical Support.

5.1 Some .rpm Files Are Not Removed Automatically When You Uninstall The Admin Console

Issue: The uninstallation of Admin Console using option 1 fails to remove some of the .rpm files. [Bug 1042763]

Workaround: Use option 6 while uninstalling the Admin Console.

6.0 Contact Information

Our goal is to provide documentation that meets your needs. If you have suggestions for improvements, please email Documentation-Feedback@netiq.com. We value your input and look forward to hearing from you.

For detailed contact information, see the Support Contact Information Web site.

For general corporate and product information, see the NetIQ Corporate Web site.

For interactive conversations with your peers and NetIQ experts, become an active member of Qmunity, our community Web site that offers product forums, product notifications, blogs, and product user groups.