Access Manager 4.0 Service Pack 2 (4.0 SP2) includes enhancements, improves usability, and resolves several previous issues.
Many of these improvements are made in direct response to suggestions from our customers. We thank you for your time and valuable input. We hope you continue to help us ensure our products meet all your needs. You can post feedback in the Access Manager forum on Qmunity, our community Web site that also includes product notifications, logs, and product user groups.
For information about the previous release, see Access Manager 4.0 SP1 Hotfix 3 Release Notes.
Access Manager 4.0 SP2 provides the following platform updates and fixed issues:
In addition to the platforms introduced in the previous Access Manager release, this release adds support for the following platform:
This release adds support for the following dependent components:
This release includes software fixes for the following components:
The following issues are fixed in the Administration Console component:
Issue: Multiple cross-site vulnerabilities exist in debug.jsp page. The affected URLs are:
Fix: This issue is resolved by sanitizing .jsp pages in the affected URLs. [Bug 906241][CVE-2014-5214]
Issue: If you have selected to install the NMAS SAML method in the eDirectory tree, upgrading from Access Manager 3.2.x to 4.0.x fails with an error. This happens because the eDirectory schema is not successfully extended with NMAS objects. [Bug 888263]
Fix: This issue is now fixed and upgrading to Access Manager 4.0.x does not fail even when NMAS SAML method is installed.
Issue: When you restore the Administration Console from backup, the previous configuration is lost. This is because the restored Administration Console is configured on a different hostname under the same IP address. [Bug 905684]
Fix: This issue is resolved now as you can restore the Administration Console with a different hostname under the same IP address.
The following issues are fixed in the Access Gateway component:
Issue: When a SAP Application server is protected by the Access Gateway, SAP Application Server returns 500 internal error after POST request. This happens because the Access Gateway corrupts the ZNPCQ. [Bug 872117]
Fix: The Access Gateway no longer corrupts the ZNPCQ (session stickiness cookie).
Issue: When both Enable SSL with Embedded Service Provider (ESP) and Behind Third Party SSL Terminator are enabled and both Enable SSL between browser and Access Gateway are disabled, the cookie broker option is not properly populated. This results in 405 error. [Bug 915987]
Fix: This issue is resolved now as the cookie broker option is properly populated.
Issue: When LDAP server replicas are used, Access Manager does not write shared secrets consistently to the eDirectory. [Bug 917508]
Fix: Now, the shared secrets are written consistently.
Issue: Rewriter does not rewrite the location header with the URL in the query string. [Bug 915839]
Fix: Now, the rewriter rewrites the location header with the URL in the query string.
Issue: The Form Fill policy fails intermittently due to heavy load. [Bug 880083]
Fix: This issue is now resolved by adding conditions to re-evaluate the Form Fill policy during null response under load conditions.
Issue: The Access Gateway session cookie is sent as a query parameter during the cross-domain authentication without encryption. That in turn causes security concerns. [Bug 928875]
Fix: Now, the Access Gateway session cookie sent as a query parameter during the cross-domain authentication is encrypted to prevent security issues. For additional security, you can change the default key used for this encryption by using the NAGSessionKey advanced option.
Issue: The HTTPd crashes due to frequent graceful restarts. This is due to the increase in the size of the memory leaks that occurs during each graceful restart. [Bug 896935]
Fix: This issue is resolved now as the HTTPd does not crash due to frequent graceful restarts.
Issue: Platform Agent creates multiple connections when it is set to ForceCache mode. [Bug 905373]
Fix: A newer version of Platform Agent is bundled with Access Manager 4.0 SP2 that resolves this issue.
Issue: At the parent and child proxy service level, you cannot turn on/off the Cookie Mangle advanced option. [Bug 924285]
Fix: This issue is resolved now as you can turn on/off the Cookie Mangle advanced option.
Issue: When you add a secondary IP address to the Access Gateway Appliance, it removes the Loopback Interface Configuration file. [Bug 883503]
Fix: This issue is now resolved.
Issue: When Form Fill masking is enabled, the Access Gateway fails to re-calculate content length after the data is unmasked. This leads to single sign-on failure. [Bug 915988]
Fix: This issue is resolved now as the Access Gateway re-calculates content length correctly.
The following issues are fixed in the Identity Server component:
Issue: In a clustered environment, secure flag is not set on the server cluster cookie UrnNovellNidpClusterMemberId. [Bug 919960]
Fix: This issue is fixed and by default, the secure flag is set on the UrnNovellNidpClusterMemberId cookie.
Issue: Single sign-on to Office 365 fails when you upgrade to the latest version of the Office 365 iOS apps. [Bug 916003]
Fix: This issue is resolved now. You can single sign-on from latest version of the Office 365 iOS apps. To establish single sign-on from iOS apps to Office 365 services, perform the following steps:
In the Administration Console, click Devices > Identity Servers > Edit > Local > Contract.
Specify a name to identity the contract.
Specify the URI as http://schemas.microsoft.com/ws/2008/06/identity/authenticationmethod/password.
Select Name/Password - Form - WebService method.
Issue: When you modify the SAML authentication request and append the XML with specific strings of data and encode it, the Identity Server becomes non-responsive. This is due to the Billion Laugh Attack. [Bug 914449]
Fix: This issue is fixed now as the Identity Server can handle the modified XML and discard the request. Also, you can log the reason in the server logs now.
After purchasing Access Manager 4.0 SP2, log in to the NetIQ Downloads page and follow the link that allows you to download the software. Ensure that you are currently on any one of the following Access Manager versions, before upgrading to Access Manager 4.0 SP2:
3.2 SP2: All versions
3.2 SP3: All versions
4.0: All versions
4.0 SP1: All versions
Before upgrading, verify the version number of the existing Access Manager components and ensure that you have the correct version of files on your system.
After upgrading to Access Manager 4.0 SP2, verify that the version number of the component is indicated as 4.0.2-34 in the Version field.
NetIQ Corporation strives to ensure our products provide quality solutions for your enterprise software needs. The following issues are currently being researched. If you need further assistance with any issue, please contact Technical Support.
Issue: If you attempt to upgrade from 4.0 SP2 to 4.1, the upgrade process terminates abruptly. [Bug 928302]
Workaround: If you are planning an upgrade from 4.0 SP2 to 4.1, perform the following steps:
Extract the 4.1 installer files and locate upgrade_utility_functions.sh file.
Locate the section that includes the following line: supportedVersions="3.2.2\|3.2.3\|4.0.0\|4.0.1\|220.127.116.11"
Modify the supportedVersion section by adding 4.0.2 as the supported upgrade platform in the following manner: supportedVersions="3.2.2\|3.2.3\|4.0.0\|4.0.1\|4.0.2\|18.104.22.168"
Upgrade the components using the information in Upgrading Access Manager.
Issue: When you attempt to access a proxy service on the RHEL Access Gateway Service and the Accelerated web server has a self-signed certificate, it results in an SSL handshake error. [Bug 929662]
Our goal is to provide documentation that meets your needs. If you have suggestions for improvements, please email Documentation-Feedback@netiq.com. We value your input and look forward to hearing from you.
For detailed contact information, see the Support Contact Information Web site.
For general corporate and product information, see the NetIQ Corporate Web site.
For interactive conversations with your peers and NetIQ experts, become an active member of Qmunity, our community Web site that offers product forums, product notifications, blogs, and product user groups.
THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS OF A LICENSE AGREEMENT OR A NON-DISCLOSURE AGREEMENT. EXCEPT AS EXPRESSLY SET FORTH IN SUCH LICENSE AGREEMENT OR NON-DISCLOSURE AGREEMENT, NETIQ CORPORATION PROVIDES THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. SOME STATES DO NOT ALLOW DISCLAIMERS OF EXPRESS OR IMPLIED WARRANTIES IN CERTAIN TRANSACTIONS; THEREFORE, THIS STATEMENT MAY NOT APPLY TO YOU.
For purposes of clarity, any module, adapter or other similar material ("Module") is licensed under the terms and conditions of the End User License Agreement for the applicable version of the NetIQ product or software to which it relates or inter operates with, and by accessing, copying or using a Module you agree to be bound by such terms. If you do not agree to the terms of the End User License Agreement you are not authorized to use, access or copy a Module and you must destroy all copies of the Module and contact NetIQ for further instructions.
893 Windows Vista Enhanced Cryptographic Provider (RSAENH)
894 Windows Vista Enhanced DSS and Diffie-Hellman Cryptographic Provider (DSSENH)
989 Windows XP Enhanced Cryptographic Provider (RSAENH)
990 Windows XP Enhanced DSS and Diffie-Hellman Cryptographic Provider (DSSENH)
997 Microsoft Windows XP
1000 Microsoft Windows Vista Kernel Mode Security Support Provider Interface (ksecdd.sys)
1001 Microsoft Windows Vista Cryptographic Primitives Library (bcrypt.dll)
1002 Windows Vista Enhanced Cryptographic Provider (RSAENH)
1003 Windows Vista Enhanced DSS and Diffie-Hellman Cryptographic Provider (DSSENH)
1006 Windows Server 2008 Code Integrity (ci.dll)
1007 Microsoft Windows Server 2008 Kernel Mode Security Support Provider Interface (ksecdd.sys)
1008 Microsoft Windows Server 2008
1009 Windows Server 2008 Enhanced DSS and Diffie-Hellman Cryptographic Provider (DSSENH)
1010 Windows Server 2008 Enhanced Cryptographic Provider
1012 Windows Server 2003 Enhanced Cryptographic Provider (RSAENH)
This document and the software described in this document may not be lent, sold, or given away without the prior written permission of NetIQ Corporation, except as otherwise permitted by law. Except as expressly set forth in such license agreement or non-disclosure agreement, no part of this document or the software described in this document may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, or otherwise, without the prior written consent of NetIQ Corporation. Some companies, names, and data in this document are used for illustration purposes and may not represent real companies, individuals, or data.
This document could include technical inaccuracies or typographical errors. Changes are periodically made to the information herein. These changes may be incorporated in new editions of this document. NetIQ Corporation may make improvements in or changes to the software described in this document at any time.
U.S. Government Restricted Rights: If the software and documentation are being acquired by or on behalf of the U.S. Government or by a U.S. Government prime contractor or subcontractor (at any tier), in accordance with 48 C.F.R. 227.7202-4 (for Department of Defense (DOD) acquisitions) and 48 C.F.R. 2.101 and 12.212 (for non-DOD acquisitions), the government's rights in the software and documentation, including its rights to use, modify, reproduce, release, perform, display or disclose the software or documentation, will be subject in all respects to the commercial license rights and restrictions provided in the license agreement.
© 2015 NetIQ Corporation. All Rights Reserved.
For information about NetIQ trademarks, see http://www.netiq.com/company/legal/.