NetIQ CloudAccess

Version 1.1

Release Notes

Date Published: January 2013

 
 

 

NetIQ CloudAccess (formerly NetIQ Access Gateway for Cloud) is an appliance that provides a simple, secure way to manage access to Software-as-a-Service (SaaS) applications for corporate users. It provides out-of-the box security and compliance capabilities for SaaS services including full user provisioning, dynamic credentialing, privileged user management, Single Sign-On (SSO), and compliance reporting.

This version includes new features, improves usability, and resolves several previous issues. Many of these improvements were made in direct response to suggestions from our customers. We thank you for your time and valuable input. We hope you continue to help us ensure our products meet all your needs. You can post feedback in the CloudAccess forum on Qmunity, our community Web site that also includes product notifications, blogs, and product user groups.

For more information about this release and for the latest release notes, see the CloudAccess Documentation Web site. To download this product, see the CloudAccess product Web site.

What's New?

The following sections outline the key features and functions provided by this version.

Includes New Connector for Office 365

This version of CloudAccess includes a new Connector for Office 365, which provides automated provisioning of accounts from the identity sources to Office 365. The Connector for Office 365 also provides single sign-on (SSO) to Office 365.

Adds Support for Multiple Connectors

This version adds support for multiple Connectors of the same type. For more information about the requirements for each connector, see the NetIQ CloudAccess Installation and Configuration Guide.

Adds Support for Additional SSO-Only Connectors

This version adds support for additional connectors that you can use for single sign-on (SSO) to other applications or Web services. These connectors are available for download from your Customer Center. For more information, see the Access Connector HQ Web site.

Includes New Update Channel

This version includes a new update channel for keeping your appliances up to date with the latest security fixes, bug fixes, and feature updates. CloudAccess checks the Novell Customer Center channel for updates on a regular basis, and you can choose to download and install updates immediately or wait until the default installation time to minimize network impact. For more information, see the NetIQ CloudAccess Installation and Configuration Guide.

Adds Support for eDirectory as an Identity Source

This version adds support for eDirectory as an identity source. For more information, see the NetIQ CloudAccess Installation and Configuration Guide.

Adds Support for Role-Based Administration

This version adds support for role-based administration, which enables the appliance administrator to delegate administrative functions, such as Application Owner, Approver, or Compliance Auditor, to business users. For more information, see the NetIQ CloudAccess Installation and Configuration Guide.

Improves Support for User Access on Mobile Devices

CloudAccess rendering on supported mobile devices has been improved, and support for mobile access to the Connector for Salesforce has been added. Mobile devices that do not communicate using Security Assertion Markup Language (SAML), but only user name and password for authentication, can now log in to Salesforce through CloudAccess using enterprise credentials if delegated authentication is enabled on the associated Salesforce account. For more information, see the NetIQ CloudAccess Installation and Configuration Guide.

Enhancements and Software Fixes

NetIQ CloudAccess 1.1 includes enhancements as well as software fixes that resolve several previous issues.

Includes Navigation Enhancements

This version includes enhancements to the CloudAccess console so you can easily navigate from one administration page to another.

Includes Health Status Enhancements

This version includes enhancements to the CloudAccess console that enable you to view health status and more easily manage and troubleshoot the nodes in your cluster and associated connectors. For more information, see the NetIQ CloudAccess Installation and Configuration Guide.

Adding a New Node to the Cluster While an Existing Node is Down Causes the Initialization Page to Stop Responding

As a best practice, you should verify that all of the nodes in your cluster are healthy and communicating properly before adding a new node to the cluster. However, the initialization process now completes successfully when you add a new node to the cluster even if an existing node is not running. (757812)

After a Switch Master, Cluster Nodes or Active Directory Connectors are Red

CloudAccess no longer falsely displays the health of Active Directory connectors or nodes in the cluster as red after you perform a switch master. (756486, 756894, 75689)

Mobile Access for the Connector for Google Apps for Business Appears Disabled in the Interface

CloudAccess now correctly displays the state of the mobile access feature when you delete an existing Connector for Google Apps for Business and add a new connector. (753184)

The Appliance Fails to Provision All Users in Overlapping Groups

CloudAccess now properly supports and executes policy mappings on groups with overlapping users. (734642)

Duplicate sAMAccountNames across Identity Sources Cause Issues

Duplicate sAMAccountNames across multiple identity sources no longer allow users to impersonate one another. (754860)

Login Loop Occurs when Accessing the Admin and Policy Mapping Pages from the Same Session

CloudAccess now opens Admin and Policy Mapping pages as expected from the same session. (751846)

"Problem Applying Changes" Error Appears on the Policy Mapping Page

CloudAccess no longer displays an error on the Policy Mapping page if you modify a mapping without selecting the approval check box. (744333)

Cannot Access the Approval Page after Creating Large Numbers of Approvals Simultaneously

As a best practice, consider adding a maximum number of 2,000 approval requests simultaneously. However, CloudAccess now correctly displays new approvals as expected. (757417, 757423)

Enabling Show Descriptions While Running Reports Loses the Report Status

Enabling the Show Descriptions option while running reports no longer causes the report status to disappear. (748142)

Chrome Does Not Display the Policy Mapping Page Properly

When you use Google Chrome to access the Policy Mapping page, the icons and the name of the connector in the drop-down list are rendered properly. (713154)

Return to Top

System Requirements

This version of the product does not support upgrades from NetIQ Access Gateway for Cloud 1.0. If you currently have Access Gateway for Cloud 1.0 installed in your environment, you must uninstall it before you install this version.

For detailed information about hardware and software requirements, see Chapter 2 "Installing CloudAccess" in the NetIQ CloudAccess Installation and Configuration Guide.

Return to Top

Known Issues

NetIQ Corporation strives to ensure our products provide quality solutions for your enterprise software needs. The following issues are currently being researched. If you need further assistance with any issue, please contact Technical Support.

Initialization Issues

Time Not Synchronized on the ESX or ESXi Server Causes Intermittent Problems

Issue:

If time is not synchronized on the ESX and ESXi servers, intermittent issues can occur, such as roles not being granted to the administrative account for the appliance. (757873)

Solution:

Configure NTP on the ESX or ESXi server.

Initialization Takes a Long Time to Display

Issue:

The initialization page takes a long time to display if there is no DHCP server in your environment. The initialization page eventually appears and assigns a 192.xxx.xxx IP address to the appliance.

Workaround:

Edit the VMX file for the appliance before the first boot. For more information, see “Configuring the Appliance without a DHCP Server” in the NetIQ CloudAccess Installation and Configuration Guide.

Changes to the Preferred DNS Server During Initialization Result in a Static IP Address

Issue:

If you want to change the preferred DNS server, you must select Use the following IP address in Step 1 on the initialization page, which assigns a static IP address to the appliance. (754137)

Workaround:

After the initialization process completes, on the Admin page, change the IP address from static to DHCP.

Administration Issues

Deleting a Node from the Cluster Removes the Node from the Interface, but the VMware Image Still Runs

Leaving the VMware image running allows users to authenticate to a node that does not exist on the Admin page. When you delete a node from the cluster, the appliance deletes the node from the interface, but the VMware image still exists and is running. (755006)

Use the following procedure to delete a node from a cluster:

  1. Remove the node from the L4 switch.
  2. Delete the node from the cluster on the Admin page.
  3. Stop the VMware image on the ESX server.
  4. Delete the VMware image on the ESX server.

Adding a Node Results in a Command Failure

Issue:

After adding a new node to the cluster, the node is red on the Admin page and the status of the node is Command Failure. This issue is intermittent.

Workaround:

Restart the new node.

Adding a Node Never Completes

Issue:

After adding a new node to the cluster, the progress goes to 100%, but the Initialization page displays a message stating you must restart the new node and try again to complete the initialization process. Restarting the new node does not fix the problem.

Workaround:

You must completely remove the new node and try again.

  1. Log in to the Admin page.
  2. Delete the new node that is red.
  3. Remove the VMware image for the failed node from your VMware server.
  4. Deploy the image to the VMware server again. For more information, see “Deploying the Appliance” in the NetIQ CloudAccess Installation and Configuration Guide.
  5. From the Initialization page, add the new node to the cluster. For more information, see “Adding a Node to the Cluster” in the NetIQ CloudAccess Installation and Configuration Guide.

Progress Bar is Not Accurate During Updates

Issue:

During an update, the progress bar is not representative of the actual download progress. For example, if the download is large, the progress bar stays at 2% until the file is downloaded, and then the progress bar jumps to 80%. (792997)

Workaround:

No workaround is available at this time. The time to complete an update depends on the size of the download and your Internet connection. It could take over an hour for an update to download.

Error When Adding a Node to a Cluster

Issue:

When you add a node to an existing cluster, CloudAccess may display the following error: Join Cluster. Failed to Join cluster. Check settings and try again. A request timeout has expired after 30000 ms. (799978)

Workaround:

It is possible that CloudAccess added the node successfully despite the error message. Navigate to the Admin page and check whether the icon for the new node is now present. If so, wait for the spinner on the node to stop and then verify that the health and command status indicators on all nodes are green. If they are green, you can close the browser session in which you were running the Initialization process when the error occurred. If the icon for the new node is not present on the Admin page, restart the failed node and run the Initialization process again.

Provisioning Issues

User Email Address Changes in Active Directory Are Not Provisioned to Salesforce

Issue:

User email address changes in Active Directory are not provisioned to Salesforce. (717153)

Workaround:

No workaround is available at this time.

Approval-Based Provisioning Continues Despite Removing the User from a Mapped Group

Issue:

If a user is removed from a mapped group when there is an outstanding approval request, CloudAccess provisions the deleted user to the SaaS application when the administrator grants the approval. (752527)

Workaround:

Verify that the user is a member of the group before granting approval, or deny the request after removing the user from the group.

Re-enabled User Has Role That Was Previously Assigned

Issue:

If you assign a user to a role in CloudAccess and then remove that user from the identity source, CloudAccess does not automatically remove the role assignment. So, if the user's context in the identity source is later restored, CloudAccess shows that user as having the same role that was previously assigned. (765609)

Workaround:

To work around this issue, before you remove a user in the identity source, ensure that you have revoked all roles from that user on the Roles page in CloudAccess.

Policy Mapping Issues

No Connectors Are Displayed on the Policy Mapping Page

Issue:

The Policy Mapping page does not display the connectors for the SaaS applications.

Solution:

There are two possible solutions:

  • Verify that the connectors are configured properly and enabled. For more information, see the appropriate sections for configuring connectors in the NetIQ CloudAccess Installation and Configuration Guide.
  • Click the Refresh List icon in the upper-right corner of the Policy Mapping page.

The Policy Mapping Page Returns a 500 Internal Server Error

Issue:

If the master node is not running, the Policy Mapping page returns a 500 Internal Server Error. (755282)

Workaround:

Solve the problem that caused the master node to stop running, or promote another healthy node to master. The Policy Mapping page is dependent on the master node.

Renaming Groups in an Identity Source May Disable Users in SaaS Applications

Issue:

When you rename or move a group in an identity source, and that group has role mappings with approvals in CloudAccess, group members are disabled in the SaaS applications and CloudAccess generates new approval requests for those users. When you rename or move a mapped group without approvals, group members are temporarily disabled in the SaaS applications and then re-enabled. Renaming or moving groups without mappings has no adverse effects. (798639, 800128)

Workaround:

For the scenario where CloudAccess generates new approval requests, accounts in the SaaS applications will be active again once the new requests have been approved.

Only 1500 Members of an Active Directory Group Can Be Mapped to Roles

Issue:

When translating Active Directory group memberships to role memberships, CloudAccess retrieves only the first 1500 members of the group. (792582)

Workaround:

To work around this issue, change the appropriate setting on the Active Directory server as outlined in the following and other Microsoft support articles: "How to view and set LDAP policy in Active Directory by using Ntdsutil.exe" (http://support.microsoft.com/kb/315071).

CloudAccess Does Not Reconcile Pending Approvals with Changes to Policy Mappings

Issue:

CloudAccess does not reconcile pending approvals with changes to policy mappings. Users with pending approvals are granted the pending requests even if the mappings were removed after the requests were launched. (787938)

Workaround:

No workaround is available at this time.

Fatal Error Logged When Policy Mapping Page is Accessed

Issue:

Whenever the Policy Mapping page in CloudAccess is accessed, the /var/log/catalina.out log file on the master node logs the following event: [Fatal Error] :-1:-1: Premature end of file. (797102)

Workaround:

This error is cosmetic only and can be ignored. CloudAccess successfully displays the Policy Mapping page despite this error.

Approval Issues

The Approval Page Is Blank

Issue:

If the master node is not running, the Approval page is blank. (755282)

Workaround:

Solve the problem that caused the master node to stop running, or promote another healthy node to master. The Approval page is dependent on the master node.

Reporting Issues

Reports Display Information from Deleted Connectors

Issue:

After you delete connectors, reports still contain information about the deleted connectors. (756690, 745937)

Workaround:

No workaround is available at this time.

Mapping Report Displays Numeric Values Appended to Data in the Authorization Name Column

Issue:

The numeric value in the mapping report appears after deleting and recreating mappings for connectors. (753321)

Workaround:

No workaround is available at this time.

The Reporting Page Is Blank

Issue:

If the master node is not running, the Reporting page is blank. (755282)

Workaround:

Solve the problem that caused the master node to stop running. The Reporting page is dependent on the master node.

Reports May Not Accurately Show Approvals

Issue:

When you use policy mapping to map an Active Directory group to a Google Apps resource with approval required, the Overview report, the Resource by Resource report, and the Resource by User report may not show the actual current state of the user's resource allocation. If you do not use approvals, mappings work as expected and are shown correctly in the report. (789437)

Workaround:

No workaround is available at this time.

User Issues

Authentication to SaaS Application Fails in Internet Explorer 9 if Kerberos is Enabled, but the User is not Authenticated to Active Directory

Issue:

Login to the SaaS applications using Internet Explorer 9 fails if Kerberos is enabled, but the user is not authenticated to the Active Directory domain. (713247)

Workaround:

This is a known Internet Explorer issue and the Microsoft incident number is 687000. The user must be authenticated to Active Directory to log in.

Google Users Can No Longer Log in After Enabling Single Sign-On

Issue:

After implementing CloudAccess, you might have some issues with existing Google Apps for Business accounts. Any users that either do not exist in the identity store, or are not merged with the existing Google account, can no longer log in to the Google domain. For example, user jsmith has an account in Google Apps for Business. You implement CloudAccess with single sign-on. User jsmith attempts to log in to the Google domain and fails. Google Apps for Business does not allow direct login and single sign-on to the domain.

Solution:

Give users authorization to access the Google Apps for Business resource through CloudAccess.

  1. (Conditional) If the matching account exists in Active Directory, skip to Step 2. Otherwise, create a matching account in the identity store (Active Directory).
  2. Grant the user authorization to the Google Apps for Business resource by adding the user to the proper group in Active Directory. Or, map the Active Directory group to the Google Apps for Business group through the Policy Mapping page. For more information, see “Loading Google Apps for Business Authorizations” in the NetIQ CloudAccess Installation and Configuration Guide. The two accounts merge when the user receives authorization for Google Apps for Business through the Policy Mapping page. CloudAccess automatically generates a new password and resets the Google Apps for Business password. When users access the resource after the merge occurs, they automatically log in to Google Apps for Business through single sign-on.

With Prompt Before Provisioning, Claiming Existing Salesforce Account May Be Slow, and User May See SSO Error

Issue:

When using the Prompt Before Provisioning option to claim an existing Salesforce account, single sign-on (SSO) fails intermittently and the browser shows the generic Salesforce error page stating that single sign-on using an identity provider's certificate failed. (775133)

Workaround:

If the user waits a few minutes, then goes back to the OSP welcome page and clicks the Salesforce auth card again, SSO is typically successful. SSO failure of a claimed account may persist for as long as two or three minutes, but usually SSO is successful on the first browser redirect.

Users See Unhelpful Error During Sign-On if Connector for Office 365 is Disabled or Deleted

Issue:

If the Connector for Office 365 is disabled or deleted in CloudAccess, when users try to sign in to Office 365, the following error message appears: "An undetermined problem in the message format has occurred." The error message is technically correct, but it does not indicate the source of the error or how to resolve it. (789105)

Workaround:

To work around this issue, configure the Connector for Office 365 correctly (disable or fix the single sign-on configuration).

Time Synchronization Issues

CloudAccess depends on timestamps to function properly. Time must be synchronized between the VMware host, each CloudAccess node in the cluster, and the workstations administering CloudAccess.

Issue:

If time is not synchronized, provisioning fails, configurations fail, and authentication for users fails.

Solution:

Use the following items to resolve time synchronization issues:

  • Ensure that all nodes in the cluster reside in the same time zone.
  • Configure NTP on the ESX or ESXi server.
  • If you convert the OVF file to a VMX file, deselect the default option Edit Settings > Options > VMware Tools > Synchronize guest time with host. (748923)

Connector Issues

Logging Out of Identity Provider Welcome Page Does Not Result in Logout from SaaS Connectors

Issue:

Logging out of the Identity Provider welcome page does not result in logout from any of the SaaS connectors. The same issue exists with service provider-initiated logouts. (753156)

Workaround:

No workaround is available at this time. However, you can close the browser to allow the abandoned browser session to time out, so the session cannot be accessed again.

Admin Page Does Not Provide a Way to View SaaS Metadata

Issue:

The Admin page in CloudAccess does not currently provide a means of viewing the critical content in an uploaded metadata file, such as when configuring the Connector for Salesforce. (793495)

Workaround:

No workaround is available at this time. Since metadata for connectors must be unique, ensure that the metadata file is correct before uploading it.

Office 365 Installer May Fail During CloudAccess Credential Validation or Login

Issue:

When you install the Office 365 connector on the ADFS host, the installer prompts you for login credentials and the DNS name for the CloudAccess cluster. When you click Next, the installer validates your credentials against the CloudAccess appliance. Intermittently, the installer displays an error message incorrectly stating that the credentials are invalid. After the installer has gathered the remaining information required for installation, another failure may occur and the installer may display the following message: An error occurred while communicating with the AG4C server. Incorrect username or password provided. Please verify the AG4C credentials. (775245)

Workaround:

Click Next repeatedly without modifying the credentials you entered. Validation eventually succeeds and the installer advances to the next step.

Simultaneous Logout from Office 365 Does Not Work Correctly

Issue:

Users that have authenticated to Office 365 through CloudAccess do not get logged out properly when clicking the Sign Out link on the Office 365 pages. An error message similar to the following appears: Error. dsm-ad115.cloudtest2.info There was a problem accessing the site. Try to browse to the site again. Reference number: 58e4c4ab-29b7-4fbd-95c1-4db02a722892 Users are not actually logged out of CloudAccess unless the user session has timed out in CloudAccess, so they can still use single sign-on to access Office 365. (775884)

Workaround:

No workaround is available at this time. Users should ensure that they close the browser when they are finished with their Office 365 session. Closing the browser removes the session, so users are required to enter their credentials the next time they attempt to access Office 365.

Uninstalling Connector for Office 365 on Windows Server May Not Remove Connector from CloudAccess

Issue:

If you uninstall the Connector for Office 365 on the Windows server while it is unable to communicate with the CloudAccess appliance, the connector is uninstalled from the Windows server, but it remains on the CloudAccess appliance and CloudAccess displays its status as green. (792280)

Workaround:

Ensure that the Windows server where the Connector for Office 365 is installed can communicate with the CloudAccess appliance before you attempt to uninstall the connector on the Windows server. If you encounter this issue, you can manually uninstall the connector from CloudAccess so it no longer appears in the console as follows:

  1. On the Admin page, click the Connector for Microsoft Office 365, then click Disable.
  2. Click the Connector for Microsoft Office 365 again, then click Remove.
  3. Click Apply to commit the changes to the appliance.

Display Name Does Not Change in Office 365 after Changing in Identity Source

Issue:

If you change the display name of a user in Active Directory or eDirectory, the display name in Office 365 is not updated accordingly. CloudAccess constructs the display name from the first and last name and does not synchronize the display name and full name from the identity source. (794602)

Workaround:

To work around this issue, change the user's first and last name in the identity source instead of the display name.

The Connector for Office 365 Does Not Detect When You Change the DNS Name or the Key Pairs for the CloudAccess Cluster

Issue:

The Connector for Office 365 does not automaticlly detect when you change the DNS name or the key pairs for the CloudAccess cluster. (784293)

Workaround:

Run the installer for the Connector for Office 365 in the Repair mode, then the Connector for Office 365 can detect the new DNS name or the new key pairs.

Removing Mappings Does Not Fully Deprovision Office 365 Accounts

Issue:

In a configuration where multiple Office 365 authorizations (for example, user account, license, and two group memberships) have been mapped to a single eDirectory group, when you delete the mapping on the Policy Mapping page, only the first user account is properly deprovisioned at the Office 365 account. The remaining user accounts in Office 365 are set to a "Single Sign-in status" of blocked, but the user's licenses are not revoked nor is the user removed from assigned groups. (801825)

Workaround:

Manually remove user licenses and group memberships for Office 365 users that are not correctly deprovisioned.

Access Connector Toolkit Does Not Provide a Logout Function

Issue:

The Access Connector Toolkit does not contain a logout option, and the session does not time out after a period of inactivity. (789303)

Workaround:

Close the browser after you finish working in the Access Connector Toolkit.

First and Last Names Are Not Updated When a User Uses Single Sign-on to Google Apps with an Existing Account

Issue:

After CloudAccess provisions a user with an existing account, the user is provisioned correctly, but when the user uses single sign-on with an existing account, the First Name and Last Name are not updated to match the values from the identity source. This issue does not affect users with new accounts. (796583)

Workaround:

No workaround is available at this time.

Navigation Through the Connector for Google Apps in Internet Explorer 9 Does Not Work Correctly

Issue:

When you use the Tab key to navigate through the Connector for Google Apps configuration options in Internet Explorer 9, if you use the space bar to select a check box, the tab navigation stops working. This issue occurs when you click a connector on the Admin page and click Configure, then configure the connector details. (787762)

Workaround:

To work around this issue, use the mouse to navigate once the tab navigation no longer works.

Return to Top

Contact Information

Our goal is to provide documentation that meets your needs. If you have suggestions for improvements, please email Documentation-Feedback@netiq.com. We value your input and look forward to hearing from you.

For detailed contact information, see the Support Contact Information Web site.

For general corporate and product information, see the NetIQ Corporate Web site.

For interactive conversations with your peers and NetIQ experts, become an active member of Qmunity, our community Web site that offers product forums, product notifications, blogs, and product user groups.

Return to Top

Legal Notice

Return to Top