NetIQ CloudAccess and MobileAccess 2.3 includes new features, improves usability, and resolves several previous issues.
Many of these improvements were made in direct response to suggestions from our customers. We thank you for your time and valuable input. We hope you continue to help us ensure that our products meet all your needs. You can post feedback in the CloudAccess forum on NetIQ Communities, our online community that also includes product information, blogs, and links to helpful resources.
The documentation for this product is available on the NetIQ website in HTML and PDF formats on a page that does not require you to log in. If you have suggestions for documentation improvements, click comment on this topic at the bottom of any page in the HTML version of the documentation posted at the NetIQ CloudAccess Documentation page. To download this product, see the NetIQ Downloads website.
The following sections outline the key features and functions provided by this version, as well as issues resolved in this release.
The appearance and functionality of the user landing page have been enhanced. Users can now add favorite appmarks.
The MobileAccess apps for Android and iOS mobile devices have an updated appearance and include various bug fixes.
In this version, CloudAccess allows you to change the default behavior of the connectors for LDAP identity sources. In previous releases, any matching or naming of user accounts was controlled by the appliance. You now have the ability to change the default behavior of the connectors. For more information, see Changing the Default Behavior of the Connectors for LDAP Identity Sources
in the NetIQ CloudAccess and MobileAccess Installation and Configuration Guide.
This version includes various software fixes.
When you use the Relaxed User Matching option with an Active Directory or eDirectory identity source, renaming user objects in the identity source now results in a rename of the corresponding user object on the appliance, and users maintain the same entitlements. (Bug 848860)
If authentications cannot be completed due to an external filter service being down, users at workstations doing Kerberos authentications now see a friendly error message. (Bug 923183)
Installing the MobileAccess app by clicking a link that points to the CloudAccess cluster DNS now works correctly. (Bug 846705)
CloudAccess is now able to handle authentication requests from the Microsoft Office native app on supported mobile devices. (Bug 923454)
CloudAccess now sets the TenantName attribute for a single tenant on events sent to Sentinel, so reporting and identity tracking functionality works properly within Sentinel. (Bug 812159)
To upgrade to CloudAccess or MobileAccess 2.3, you must have an existing installation of CloudAccess or MobileAccess 2.2.1 Hotfix 4 (2.2.1-14).
The prerequisites for the MobileAccess appliance are the same as those for CloudAccess. For detailed information about hardware requirements and supported operating systems and browsers, see Installing the Appliance
in the NetIQ CloudAccess and MobileAccess Installation and Configuration Guide.
You can update a CloudAccess or MobileAccess 2.2.1-14 appliance to version 2.3 using one of the following methods:
Through the update channel. For more information, see Updating the Appliance
in the NetIQ CloudAccess and MobileAccess Installation and Configuration Guide.
Using an OVF. For more information, see Deploying the Appliance
in the NetIQ CloudAccess and MobileAccess Installation and Configuration Guide.
IMPORTANT:To update your existing 2.2.1-14 environment using an OVF file, you must first add the new 2.3 node to your cluster and then remove the old node.
The steps for installing and configuring the appliance in a new environment are the same for CloudAccess and MobileAccess. To install CloudAccess or MobileAccess, see Installing the Appliance
in the NetIQ CloudAccess and MobileAccess Installation and Configuration Guide.
NetIQ Corporation strives to ensure our products provide quality solutions for your enterprise software needs. The following issues are currently being researched. If you need further assistance with any issue, please contact Technical Support.
Issue: If you want to change the preferred DNS server, you must select Use the following IP address in Step 1 on the initialization page, which assigns a static IP address to the appliance. (Bug 754137)
Workaround: After the initialization process completes, on the Admin page, change the IP address from static to DHCP.
Issue: If you modify a non-public SSL certificate (that is, a certificate that has not been signed by a well-known certificate authority) on the external filter server, the login service does not automatically re-read the trust store. User logins fail with a message that an external service is unavailable. However, the health status does not detect this failure and reports a healthy (green) status. This condition does not occur if you modify a certificate from a well-known certificate authority on the filter server. (Bug 895375)
Workaround: If you modify a non-public SSL certificate on a filter server, you must click Apply to restart the login services in the cluster, or reboot the appliance. A restart causes the login service to re-read the trust store and get the new certificate information. After the restart, users can log in again.
Issue: When you approve or deny a large number of workflow requests in a single action, the amount of memory that the browser uses can cause the page to become unresponsive and the browser to close. (Bug 815971)
Workaround: Ensure that you select less than 300 requests in a single accept or deny action.
Issue: Account provisioning is not supported for the users in the SAML 2.0 Inbound unmanaged internal identity store. Because these users do not have a workforceID, they cannot be provisioned for or access the SaaS applications that depend on the workforceID attribute for authentication, such as Google Apps and Salesforce. (Bug 883446)
Workaround: To access the SaaS applications, the user must log in with the corporate identity that has a workforceID attribute.
Issue: User email address changes in Active Directory are not provisioned to Salesforce. (Bug 717153)
Workaround: No workaround is available at this time.
Issue: If you assign a user to a role in CloudAccess and then remove that user from the identity source, CloudAccess does not automatically remove the role assignment. If the user's context in the identity source is later restored, CloudAccess shows that user as having the same role that was previously assigned. (Bug 765609)
Workaround: To work around this issue, before you remove a user in the identity source, ensure that you have revoked all roles from that user on the Roles page in CloudAccess.
Issue: If you use non-alphanumeric characters (such as !@#$%) in a group description, policy mapping may appear to be successful, but users in that group do not see the mapped appmarks. (Bug 922124)
Workaround: Remove any non-alphanumeric characters from the group description.
Issue: When using the SAML 2.0 Inbound connector in mode Allow access for unknown users, after the first login when the user has just been created, the landing page displays only the Public appmarks. (Bug 920022)
Workaround: Since these specific types of users are not stored locally on the appliance, the appliance cannot apply the proper roles until the user logs in a second time. If you have any users that see this problem, instruct them to log out and log back in to the landing page. The landing page properly displays all of the appmarks.
Issue: When you have enabled Kerberos and Google TOTP on the Simple Proxy and OAuth appmarks, and SAML 2 Inbound users are in the mode Allow access for unknown users or Allow access for known users, the users cannot access the appmarks. When users click the Simple Proxy or OAuth appmarks, CloudAccess presents to them a second login screen. Since the users are already authenticated, CloudAccess cannot log in the SAML 2 Inbound users again. (Bug 923207)
Workaround: Do not use Google TOTP and Kerberos with SAML 2 Inbound users.
Issue: If you set the search context on a connector for Active Directory to the root of your AD identity source, CloudAccess displays an exception error and does not import all users. (Bug 956310)
Workaround: Do not set the search context for the connector for Active Directory to the root of your AD identity source.
Issue: When using the user or group filtering option with an LDAP identity source, using case exact attributes does not work for values with any uppercase characters. (Bug 935967)
Workaround: If you are searching for a custom attribute, ensure that when you create the attribute, you create the attribute with the option Case Ignore String. Otherwise, there is no workaround at this time.
Issue: If you change the user or group filter to exclude some users from an LDAP identity source, and you change the naming attribute in the same operation, both the rename and the user filtering fail. (Bug 936298)
Workaround: Instead of performing both actions in the same operation, change the filter, wait for the sync, then change the naming attribute and wait for the sync.
Issue: After you delete connectors, reports still contain information about the deleted connectors. (Bug 756690)
Workaround: No workaround is available at this time.
Issue: The numeric value in the mapping report appears after deleting and recreating mappings for connectors. (Bug 753321)
Workaround: No workaround is available at this time.
Issue: Logging out of the landing page might not result in logging out of the SaaS accounts, depending on support and configuration for SAML Single Logout at the SaaS provider. Many SaaS providers do not support the SAML Single Logout service. The same issue exists with service provider-initiated logouts. (Bug 837076)
Workaround: Close the browser to allow the abandoned browser session to time out, so the session cannot be accessed again.
Issue: The Admin page in CloudAccess does not currently provide a means of viewing the critical content in an uploaded metadata file, such as when you configure the connector for Salesforce. (Bug 793495)
Workaround: No workaround is available at this time. Since metadata for connectors must be unique, ensure that the metadata file is correct before uploading it.
Issue: If an authorization at the Office 365 account is renamed, any existing policy mappings in CloudAccess are lost, because CloudAccess uses the account name for policy mapping rather than the underlying static ID of the authorization. If you rename an authorization in Office 365, CloudAccess sees the action as a delete and create, and removes any existing policy mappings for the authorization. (Bug 811460, 815496)
Workaround: After changing the authorization name in Office 365, use the Policy page to re-map entitlements for the renamed authorization, and then use the Approval page to re-approve, if necessary.
Issue: If you provision a user to multiple Google Apps domains and select the Enable email proxy option in the administration console, the user cannot open the mailbox for any domain except the last domain to which the user was provisioned. This issue occurs because the embedded mail proxy in the appliance uses an attribute from the user object that is single-valued, so it is set with the name of the last Google domain to which the user was provisioned. (Bug 819157)
Workaround: No workaround is available at this time.
Issue: The connector for NetIQ Access Manager tries to import the certificate to NetIQ Access Manager with the same name every time. If you remove the connector, the imported certificate to NetIQ Access Manager is not removed. So, the next time you create a connector for NetIQ Access Manager for the same Access Manager system, it fails unless the certificate is the same certificate. (Bug 923217)
Workaround: To work around this issue, before you create a new connector for NetIQ Access Manager in CloudAccess, delete the previous certificate in the Access Manager administration console.
Issue: You have configured the Advanced Authentication Framework method to work with Advanced Authentication Framework 4.2. After completing the configuration, you try to authenticate with an Advanced Authentication Framework method and it fails.
Workaround: The Advanced Authentication Framework changed with the 5.2 release. You must manually enable endpoints on the Advanced Authentication Framework system to make authentications work.
Log in to the administration console for Advanced Authentication Framework as an administrator.
From the left navigation pane, click Endpoints.
Select the Endpoint41 endpoint.
Click the Pencil to edit the endpoint, then enable the endpoint.
Save your changes.
Authentications through the Advanced Authentication Framework methods now work.
Our goal is to provide documentation that meets your needs. If you have suggestions for improvements, please email Documentation-Feedback@netiq.com. We value your input and look forward to hearing from you.
For detailed contact information, see the Support Contact Information website.
For general corporate and product information, see the NetIQ Corporate website.
For interactive conversations with your peers and NetIQ experts, become an active member of our community. The NetIQ online community provides product information, useful links to helpful resources, blogs, and social media channels.
For information about NetIQ legal notices, disclaimers, warranties, export and other use restrictions, U.S. Government restricted rights, patent policy, and FIPS compliance, see https://www.netiq.com/company/legal/.
Copyright © 2015 NetIQ Corporation. All Rights Reserved.
For information about NetIQ trademarks, see https://www.netiq.com/company/legal/. All third-party trademarks are the property of their respective owners.