1.0 What’s New?
1.1 Security Improvements
1.2 Enhancements and Software Fixes
2.0 System Requirements
3.0 Installing or Updating SocialAccess
4.0 Verifying the Installation or Update
5.0 Known Issues
5.1 Access Connector Toolkit Does Not Provide a Logout Option
5.2 Changing from DHCP to Static IP During Initialization Causes Errors
5.3 User Authentication Fails, but Health of the Appliance Is Green
5.4 Email Must Be Specified to Enable Persistent Logins
5.5 Re-running Initialization Resets Custom Branding to Default
5.6 Upgrade Issues
6.0 Contact Information
7.0 Legal Notice

NetIQ SocialAccess 2.1.1 Release Notes

November 2014

NetIQ SocialAccess is an appliance that simplifies a customer’s experience accessing resources on the Internet. Customers can use their credentials for an existing Internet account, such as Facebook or LinkedIn, to gain access to your business’ website. SocialAccess allows you to configure multiple identity sources that customers can use to authenticate to your website. SocialAccess creates a SAML assertion using attributes obtained from the identity sources to allow SAML authentications into the resources associated with your website.

This service pack improves usability and resolves several previous issues.

Many of these improvements were made in direct response to suggestions from our customers. We thank you for your time and valuable input. We hope you continue to help us ensure that our products meet all your needs. You can post feedback in the SocialAccess forum on NetIQ Communities, our online community that also includes product information, blogs, and links to helpful resources.

The documentation for this product is available on the NetIQ website in HTML and PDF formats on a page that does not require you to log in. If you have suggestions for documentation improvements, click comment on this topic at the bottom of any page in the HTML version of the documentation posted at the SocialAccess NetIQ Documentation page. To download this product, see the NetIQ Downloads website.

1.0 What’s New?

The following sections outline the key features and functions provided by this version, as well as issues resolved in this release.

1.1 Security Improvements

In this version, SocialAccess includes OpenSSL 1.0.1j, thereby removing the vulnerability to potential POODLE (Padding Oracle On Downgraded Legacy Encryption) attacks. For more information, see CVE-2014-3566. (Bugs 901709 and 903125)

1.2 Enhancements and Software Fixes

SocialAccess includes enhancements and software fixes that resolve several previous issues.

Localization Improvements

SocialAccess provides improved localization of end user pages. Users can set their browsers to any of the following languages: English, Portuguese, French, Italian, German, or Spanish. Note, however, that the administration console does not currently provide support for languages other than English. (Bugs 901977 and 902539)

Usability Improvements and Cosmetic Fixes

SocialAccess includes various usability improvements, as well as fixes for cosmetic issues that did not affect product functionality.

[Return to Top]

2.0 System Requirements

To update to SocialAccess 2.1.1, you must have an existing installation of SocialAccess 2.0 or 2.1. You can update an appliance to version 2.1.1 only through the update channel. Other upgrades are not supported. For more information, see Updating the Appliance in the NetIQ® SocialAccess Installation and Configuration Guide.

For detailed information on hardware requirements and supported operating systems and browsers, see Installing SocialAccessin the NetIQ® SocialAccess Installation and Configuration Guide.

[Return to Top]

3.0 Installing or Updating SocialAccess

To install SocialAccess, see Installing SocialAccess in the NetIQ® SocialAccess Installation and Configuration Guide.

To update an appliance from SocialAccess 2.0 or 2.1 to version 2.1.1 through the update channel, see Updating the Appliance in the NetIQ® SocialAccess Installation and Configuration Guide.

[Return to Top]

4.0 Verifying the Installation or Update

Perform the following steps to verify that the installation or update was successful.

To check the installed version:

  1. Access the administration console at https://appliance_dns_name/appliance/index.html, then log in with the password specified during the initialization process.

  2. Click the appliance, then click About. Verify that the version listed in the window is 2.1.1-build number.

[Return to Top]

5.0 Known Issues

NetIQ Corporation strives to ensure our products provide quality solutions for your enterprise software needs. The following issues are currently being researched. If you need further assistance with any issue, please contact Technical Support.

5.1 Access Connector Toolkit Does Not Provide a Logout Option

Issue: The Access Connector Toolkit does not currently provide a logout option, though the session does time out after 60 minutes of inactivity. (Bug 789303)

Workaround: Close the browser after you finish working in the Access Connector Toolkit.

5.2 Changing from DHCP to Static IP During Initialization Causes Errors

Issue: During the appliance initialization process, changing the IP address from dynamic (DHCP) to static can cause an error stating that services are unavailable.

Workaround: This message can be ignored. Refresh your browser and the message disappears.

5.3 User Authentication Fails, but Health of the Appliance Is Green

Issue: Appliance health might be green while user authentications fail. Basic network connectivity is working, but the identity source is not available. (Bug 798835)

Workaround: If user authentications fail, verify that you can access the social networking site outside of SocialAccess. If you cannot, the social networking site is down, and user authentications will continue to fail until the social networking site is available.

5.4 Email Must Be Specified to Enable Persistent Logins

Issue: The connector definition fields in the Access Connector Toolkit include an Email check box for the persistent email attribute. You cannot currently change the persistent attribute to a different format, and SocialAccess does not attempt to map the persistent attribute unless you select the Email check box.

Workaround: To enable persistent logins, ensure that you select the Email check box in the connector definition.

5.5 Re-running Initialization Resets Custom Branding to Default

Issue: If you implement custom branding in your SocialAccess environment and then re-run the initialization process to modify the DNS server or make other changes to an existing cluster, branding is reset to the default settings. (Bug 852663)

Workaround: This is the intended behavior in SocialAccess. Before you re-run the initialization process on an existing SocialAccess cluster, ensure that you back up your customized branding files so that you can reuse them.

5.6 Upgrade Issues

Manually Configure the DNS Names and Keypairs for Dual NICs After You Update the Cluster

Issue: In a version 2.0 cluster, nodes with dual NICs can have only a single DNS name and SSL keypair. In a version 2.1 cluster, nodes with dual NICs must have two DNS names and matching keypairs: one for the public network and one for the administration network. However, you must not configure the additional DNS name and associated keypairs for the two NICs until after you update all nodes in the cluster to version 2.1. After an update, in the Cluster Configuration window for a node, the Public Interface section shows the cluster’s old DNS name and the Administration Interface section is blank.

Workaround: After you update all nodes in the cluster from version 2.0 to version 2.1, you must manually configure the cluster DNS names and keypairs.

To configure the Public and Administration DNS names and keypairs for the cluster:

  1. Log in as administrator to the administration console.

  2. Click a cluster icon, then click Configure to open the Configure Cluster window.

  3. In the Public Interface section, verify the Public DNS name and keypairs, or modify them as desired.

  4. In the Administration Interface section, enter the Administration DNS name, then import the SSL keypair.

  5. Click OK to save the new settings.

  6. Click Apply to apply the settings to the cluster.

  7. Repeat Step 2 through Step 6 for each node in the cluster.

SAML-Based Single Sign-On Fails for Some Connectors After You Update a Cluster with Dual NICs

Issue: After you update a cluster from version 2.0 to version 2.1 and configure the DNS names and keypairs for the public and administration networks, users might not be able to access applications for connectors that use SAML-based single sign-on if the connector does not provide automatic configuration. Changing the Public DNS name or keypair can affect your existing connectors that provide SAML single sign-on.

Workaround: You must manually re-configure the affected SaaS applications to use the new URL and SAML certificate for the new Public DNS name and its associated keypair.

Simple Proxy Users See an SSL Handshake Error After You Update a Cluster with Dual NICs

Issue: After you update a cluster from version 2.0 to version 2.1 and configure dual NICS to use two different DNS names and certificates for the public and administration networks, users might see the following SSL Handshake error when they click an appmark for a connector for Simple Proxy:

Server error! Error during SSL handshake.

Workaround: For each configured instance of the connector for Simple Proxy, you must open its Configuration page to allow it to detect the new settings for DNS names and certificates. After you update the connectors for Simple Proxy, users should no longer encounter the SSL Handshake error when they click the related appmarks.

To update the connectors for Simple Proxy:

  1. Log in as administrator to the administration console for the appliance.

  2. In the Applications panel, click the icon for an instance of the connector for Simple Proxy, then click Configure.

  3. In the connector’s Configuration window, click OK.

  4. Repeat Step 2 through Step 3 for each connector for Simple Proxy.

  5. On the Admin page, click Apply to apply the changes for all connectors for Simple Proxy.

  6. Wait to perform other administrative tasks until the configuration changes have been applied on each node of the cluster.

[Return to Top]

6.0 Contact Information

Our goal is to provide documentation that meets your needs. If you have suggestions for improvements, please email Documentation-Feedback@netiq.com. We value your input and look forward to hearing from you.

For detailed contact information, see the Support Contact Information Web site.

For general corporate and product information, see the NetIQ Corporate Web site.

For interactive conversations with your peers and NetIQ experts, become an active member of our community. The NetIQ online community provides product information, useful links to helpful resources, blogs, and social media channels.

[Return to Top]