IBM AIX offers an update access key for software maintenance

IBM Europe Software Announcement ZP21-0403
September 8, 2021

Table of contents
OverviewOverviewPricesPrices
Planned availability datePlanned availability dateAnnouncement countriesAnnouncement countries
Technical informationTechnical information


Overview

Top rule

With the introduction of the Power10 server, IBM® expands upon the use of the update access key (UAK) with the addition of an AIX® Software Maintenance (SWMA) UAK. This functionality provides proactive notification of AIX SWMA expirations to ensure continued and uninterrupted software support. AIX SWMA UAKs do not limit the operability of or capability to update AIX.

The initial AIX SWMA UAK is loaded during the manufacturing process and is dated to align with the AIX SWMA end date. Clients may manage and obtain new UAKs through the IBM My Entitled Systems Support (ESS) website, which provides consolidated support for all UAKs. Clients may also activate Electronic Service Agent (ESA) via the Hardware Management Console (HMC) as a means to automate the management of the AIX SWMA UAK. For more information relating to AIX SWMA UAKs, see AIX documentation for UAKs:

For additional information, see AIX SWMA UAK support page.



Back to topBack to top

Planned availability date

Top rule

September 17, 2021



Back to topBack to top

Services

Top rule

Global Technology Services

Contact your IBM representative for the list of selected services available in your country, either as standard or customized offerings for the efficient installation, implementation, or integration of this product.



Back to topBack to top

Technical information

Top rule

IBM Support

IBM Support is your gateway to technical support tools and resources that are designed to help you save time and simplify support. IBM Support can help you find answers to questions, download fixes, troubleshoot, submit and track problem cases, and build skills. Learn and stay informed about the transformation of IBM Support, including new tools, new processes, and new capabilities, by going to the IBM Support Insider.



Back to topBack to top

Statement of good security practices

Top rule

IT system security involves protecting systems and information through intrusion prevention, detection, and response to improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed, or misappropriated or can result in misuse of your systems to attack others. Without a comprehensive approach to security, no IT system or product should be considered completely secure and no single product or security measure can be completely effective in preventing improper access. IBM systems and products are designed to be part of a regulatory compliant, comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products, or services to be most effective.

Important: IBM does not warrant that any systems, products, or services are immune from, or will make your enterprise immune from, the malicious or illegal conduct of any party.



Back to topBack to top

Prices

Top rule

There are no associated charges with this announcement.



Back to topBack to top

Announcement countries

Top rule

All European, Middle Eastern, and African countries, except Islamic Republic of Iran, Syrian Arab Republic, and the Crimea region of Ukraine (Crimea).

Trademarks

IBM, AIX and Global Technology Services are registered trademarks of IBM Corporation in the United States, other countries, or both.

Other company, product, and service names may be trademarks or service marks of others.

Terms of use

IBM products and services which are announced and available in your country can be ordered under the applicable standard agreements, terms, conditions, and prices in effect at the time. IBM reserves the right to modify or withdraw this announcement at any time without notice. This announcement is provided for your information only. Reference to other products in this announcement does not necessarily imply those products are announced, or intend to be announced, in your country. Additional terms of use are located at

Terms of use

For the most current information regarding IBM products, consult your IBM representative or reseller, or go to the IBM worldwide contacts page

IBM Directory of worldwide contacts