Articles

IBM Security Access Manager Java Runtime Environment (AMJRTE) Deep Dive – Part 1 : Overview and Compatibility

Share this post:

What is the purpose of the AMJRTE?

The IBM Security Access Manager Java Runtime Environment (AMJRTE) provides a Java implementation for IBM Security Access Manager (ISAM) Administration and Authorization APIs.

Administration APIs are used to administrate the Access Manager environment with operations like :
– User Creation
– Group Creation
– ACL Administration
– POP Administration

Authorization APIs are used to access ISAM User and Group information as well as build ISAM Credentials.

More information about our Administration APIs can be found here :
IBM Knowledge Center : Introduction to the Administration API
IBM Developer Works : PDContext and PDAuthorizationContext Guidelines

How does Compatibility Work?

Compatibility support for the AMJRTE is dependent on the Policy Server version.

A supported configuration is a PD.jar version that is equal to or an earlier version than the current Policy Server version.
In other words, our Policy Server is backwards compatible with the APIs in the PD.jar as per the following documentation :
Compatibility with earlier versions of the product

We are not forward compatible.

Consider the following ‘pdversion’ output :
[root@fimlpar5:/]# pdversion
Security Access Manager Runtime 7.0.0.35
Security Access Manager Policy Server 7.0.0.35

Security Access Manager Runtime for Java 7.0.0.35

This output would indicate that a PD.jar version of 7.0.0.35 or lower is compatible with this policy server and is available for a supported configuration.

Compatibility Matrix

PD.jar Version ISAM Policy Server/Authorization Server Version WebSphere Version Java Version
6.1.0.11*+† 6.1.0.0+
6.1.1.0+
7.0.0.0 – 7.0.0.10
8.0.0.0+
8.5.0.0+
8.5.2.2
8.5.5.9
1.6.0‡
6.1.1.0+† 6.1.1.0+
6.1.0.0+
6.0.0.0+
8.0.0.0+
8.5.0.X
8.5.2.2
8.5.5.9
1.6.0‡
7.0.0.0 – 7.0.0.34† 7.0.0.0 – 7.0.0.34
6.1.1.0+
6.1.0.0+
6.0.0.0+
8.0.0.0+
8.5.0.0+
8.5.2.2
8.5.5.9+
1.6.0‡
7.0.0.35† 7.0.0.35 & (GSKit 8.0.50.82+) 8.0.0.0+
8.5.0.0+
8.5.2.2+
8.5.5.9+
1.6.0‡
1.7.0
1.7.1
1.8.0***
8.0.0.2 – 8.0.1.4 8.0.0.2 – 8.0.1.4 8.0.0.0+
8.5.0.0+
8.5.2.2+
8.5.5.0+
1.6.0‡
8.0.1.5+ 8.0.1.5+ 8.0.0.0+
8.5.0.0+
8.5.2.2
8.5.5.9+
1.6.0‡
1.7.0
1.7.1
1.8.0
9.0.0.0+ 9.0.0.0+ 8.0.0.0+
8.5.0.X
8.5.2.2
8.5.5.9
1.6.0‡
1.7.0
1.7.1
1.8.0

Notes :
* – APAR IV49797 is resolved at 6.1.1 FP11
† – These versions are out of support. Please obtain a supported PD.jar from your systems or from the EOS Version’s latest Fixpack
‡ – Please refer to the IBM Java Life-cycle for supported JVMs
*** – TAI++ was the only functionality tested with Java 1.8. The compatibility does not include Java Administration APIs.

** Disclaimer **
This matrix is complete as of Firmware Version 9.0.6.0.

Please refer to the following documents for up-to-date compatibility :

Placeholder for TAI++
Placeholder for eTAI
Placeholder for AMJACC

Click here to rate this article

Rate this article :

More Articles stories
By Jeroen Tiggelman on August 4, 2019

IBM Security zSecure Suite 2.4 announced

IBM Security zSecure suite V2.4 was announced on July 23, 2019 with a planned availability date of September 30, 2019. You can read the US announcement letter here. RACF has made new JSON Web Token functionality in support of Multi-Factor Authentication also available for z/OS V2.2 and V2.3. Details about zSecure compatibility fixes can be […]

Continue reading

By Martin Schmidt on July 11, 2019

Modernizing your B2C Portal Security – LDAP Proxy Deep Dive

In this part of our series we are taking a deeper look on how the LDAP reverse proxy works and what is needed to be done to make it work. Enable CI In this part we look at what needs to be done on the CI side and what information needs to be collected. We […]

Continue reading

By Martin Schmidt on May 4, 2019

Modernizing your B2C Portal Security – Desired End State

Proposition: As we have seen in part one of this series, managing customer identities for a portal can be a challenge and distraction for the business.  In this part of the series we will outline how a modernized solution for a portal security can simplify operations and free your team up to focus on the […]

Continue reading