SPI commands that alter system configurations
are now logged. Identity propagation is extended, and auditing of
user IDs that make requests over IP is improved. Information about
use of SSL cipher suites, with information on actual and potential
use of specialty processors, can help you to tune system performance.