Release notes - IBM® Security Identity Manager UNIX and Linux Adapter 6.0.44

 

IBM Security Identity Manager UNIX and Linux Adapter 6.0.44 is available. Compatibility, installation, and other getting-started issues are addressed.

 

Contents

 

Preface

Adapter Features and Purpose

Contents of this Release

Installation and Configuration Notes

Customizing or Extending Adapter Features

Supported Configurations

Notices

 

Preface

 

These Release Notes contain information for the following products that was not available when the IBM Security Identity Manager manuals were printed:

 

·         UNIX and Linux Adapter Installation and Configuration Guide

·         UNIX and Linux Adapter User Guide

 

 

Adapter Features and Purpose

The UNIX and Linux Adapter is designed to create and manage accounts on AIX, HP-UX, Solaris, RedHat and SUSE Linux systems. The adapter runs in "agentless" mode and communicates using Secure Shell (SSH) to the systems being managed.

 

IBM recommends this adapter (and the prerequisite Tivoli Directory Integrator) be installed on each node of an IBM Security Identity Manager WebSphere cluster. A single copy of the adapter can handle multiple IBM Security Identity Manager services. The deployment configuration is based, in part, on the topology of your network domain, but the primary factor is the planned structure of your IBM Security Identity Manager Provisioning Policies and Approval Workflow process. Please refer to IBM Knowledge Center for a discussion of these topics.

 

IBM Security Identity Manager adapters are powerful tools that require Administrator Level authority. Adapters operate much like a human system administrator, creating accounts, permissions and home directories. Operations requested from IBM Security Identity Manager server will fail if the adapter is not given sufficient authority to perform the requested task. IBM recommends that this adapter run with administrative (root) permissions.

 

Service Groups Management

The ability to manage service groups is a new feature introduced in Tivoli Identity Manager 5.1.  By service groups, IBM Security Identity Manager is referring to any logical entity that can group accounts together on the managed resource.

 

Managing service groups implies the following:

 

· Create service groups on the managed resource.

· Modify attribute of a service group.

· Delete a service group.

 

Note:  Modify service group name is not supported.

 

Directory Service Support

·         This adapter supports LDAP as a user registry on AIX only.

·         This adapter does not support Network Information Service (NIS).

 

Contents of this Release

Adapter Version

Component

Version

Release Date

2019 June 13 05.09.59

Adapter Version

6.0.44

Component Versions

Adapter build: 6.0.44.167

Profile:  6.0.44.167

Connector:  6.0.44.167

Dispatcher:  6.1007 or higher (packaged separately). Dispatcher version 6.0.27 or higher is required to take advantage of the adapter timeout feature.

Documentation

The following guides are available in the IBM Knowledge Center

·         UNIX and Linux Adapter Installation and Configuration Guide

·         UNIX and Linux Adapter User Guide

 

New Features

Enhancement # (FITS)

Description

 

Items included in current release (6.0.44)

RTC 183246

50336: Don't create private group on user creation although additional attributes can not be set

 

Items included in the release (6.0.43)

RTC 177521

Adapter certification on RHEL7.4

RTC 177521

Adapter certification on RHEL7.5

 

Items included in the release (6.0.42)

RTC 174565

Bug 2591

 Verify and Certify Suse 12.3

 Suse 12. Fixpack 3 is supported or not  

 DFDFDF

Items included in the release (6.0.41)

 

None

 

Items included in the release (6.0.40)

 

None

 

Items included in the release (6.0.39)

RTC 158753

US - As a UnixLinux adapter developer, I should remove the <replaceMultiValue> tag in service.def

RTC 156577

Adapter certification on following new Linux releases
RHEL 7.3
Oracle Linux 7.3
Oracle Linux 7.2

SUSE 12.2

 

Items included in the release (6.0.38)

PMR 04119,67E,760

Bugz 2174

Adapter certification on AIX 7.2

 

Items included in the release (6.0.37)

40870 (82030)

RTC 142443

Password change automation for PIM Solaris Profile

 

Items included in the release (6.0.36)

42052 (84783)

RTC 142442

ISIM v6.0 Unix and Linux Adapter support for Oracle Linux 6.6

RTC 142444

Adapter certification on RHEL7.2

RTC 142445

Adapter certification on SuSE12.1

 

Items included in the release (6.0.35)

RTC138252

Adapter certification on Oracle Linux 7.1

 

Items included in the release (6.0.34)

76587 (38540)
RTC 131797

Support for Dormant accounts on Linux

 

Items included in the release (6.0.33)

RTC 127027

Adapter certification on Oracle Linux 7

RTC 124805

Adapter certification on RHEL7.1

RTC 127026

 

Adapter certification on SLES 12

RTC 127028

Adapter certification on AIX 7.1 TL3

Items included in the 6.0.32 release

None

 

Items included in the 6.0.31 release

 

Added ‘self-password change’ support for IBM Security Privileged Identity Manager (ISPIM).

 

Items included in the release (6.0.30)

RTC 107091

Support for RHEL 7

 

Items included in the 6.0.29 release

RFE 48769

RTC 107131

 

Support for RHEL 6.5

RTC 107094

Support for RHEL 5.10

RFE 48768

RTC 107132

Support for RHEL 5.7

RTC 105557

 

SunSSH server support for Solaris endpoint.

 

This version of the POSIX adapter is supports Sun SSH server on Solaris.

 

RTC 105578

Support for SDI 7.2

RFE 40182

Manage Linux server with Tectia SSH server

 

This version of the POSIX adapter supports Tectia SSH server on Linux.

 

 

Items included in the 6.0.28 release

RFE 41074

 

RTC 24302

 

Tectia 6.4 SSH server support for AIX 7 endpoint.

 

This version of the POSIX adapter is enhanced to support Tectia 6.4 SSH server on AIX.

 

 

Items included in the 6.0.27 release

 

None

 

Items included in the 6.0.26 release

PMR 06691,122,000

PMR 47616,122,000

PMR 58647,122,000

Bugz 1025

Bugz 1032

Bugz 1073

Enable timeout feature in the UNIX and Linux Adapter

 

This feature allows the Dispatcher to end an operation that the adapter is running if the operation takes too long to complete.  This feature requires Dispatcher version 6.0.27 or higher.

 

Remote operations performed by the UNIX and Linux Adapter can hang for a variety of reasons: for example, network delays, configuration errors for SSH or sudo configuration files on the target system, or configuration errors for password prompts on the service definition. In large environments, an accumulation of hanging operations can cause functional and performance problems for both the IBM Tivoli Directory Integrator and the IBM Security Identity Manager server.

 

For Dispatcher versions prior to 6.0.27, stop and restart the Dispatcher service to clear hanging adapters.  In version 6.0.27, you can configure the Dispatcher to detect an operation that has been running too long and interrupt it.  An interrupted UNIX and Linux Adapter will clean up its state (including closing connections to the target system) before the Dispatcher ends the operation.

 

For information on enabling and configuring the timeout feature, see the Dispatcher documentation.

 

 

Items included in the 6.0.25 release

 

None

 

Items included in the 6.0.24 release

RFE 31713

 

RTC 78308

 

The erPosixMaxConnectionCnt attribute has a default value in all service.def files to limit the number of concurrent requests of a given type to a service.

 

See the IBM Security Identity Manager documentation for additional information.

 

 

RFE 31222 (18219)

 

RTC 78795

Request for support of following Login Shell other than /bin/sh by TIM 5.1 UNIXLinux adapter

AIX: /usr/bin/ksh
 HP-UX: /sbin/sh
 RHEL: /bin/bash
 SUSE: /bin/bash
 Solaris: /sbin/sh

RFE 33755

Adapter certification on RHEL 6.4

 

Items included in the 6.0.23 release

RFE 9853

 

RTC 74564

 

Add support to manage AIX LDAP groups

The adapter manages AIX groups if the user registry is set to LDAP.

RFE 12884

RTC 67379

Adapter certification on SLES11 on zSeries

MR0606115532

RTC 67190

 

Documentation change for at/cron attribute support on Linux

The documentation should read that the /bin/mkdir and /bin/rm commands are required in the sudoers entry on a Linux system which has a sudo administrative user.  It should also state that the grep command is not needed in the sudoers entry.

 

RFE 16913

 

RTC 74562

Add Last Access Date support for HP-UX and Linux

 

The adapter now returns account last access date when recon’ing HP-UX and Linux systems.

 

RFE 8467

RTC 74563

Adapter certification on Solaris 11

 

Adapter certification on RHEL 6.3

 

Adapter certification on RHEL 5.9

 

RFE 14449

Adapter certification on Oracle Linux 6.3

 

Items included in the 6.0.22 release

MR0611101655

RTC 67192

Enhance adapter so that Linux accounts can be deleted even if they are in use.

The adapter kills any active processes owned by the user before deleting the account.  This behavior is controlled by a new attribute that is set with a checkbox on the Linux account form labeled Delete user account even when it is in use.

MR0606115532

RTC 67190

 

Add support for the at/cron attributes on Linux

The adapter allows you to manage users' permissions to execute "at" or "cron" jobs on Linux systems.

 

RFE 7275

RTC 67664

 

Enable sudo user to change root password on AIX

On AIX, the adapter can change the root user's password even if the minimum password age has not elapsed. After the password change, the value of the ADMCHG flag (which requires the user to change his password on next login) is set to whatever the value was prior to the password change.

 

 

Items included in the 6.0.21 release

 

Not released

 

 

Items included in the 6.0.20 release

 

Initial release

 

 

Closed Issues

Internal#

APAR#

PMR# / Description

 

 

Items included in current release (6.0.44)

 

 

None

 

 

Items included in release (6.0.43)

RTC 177762

Bug 2644

IJ07579

Groups not returned during reconciliation, $ is escaped in sed command, sed -e 's/\$

 

 

Items included in the release (6.0.42)

 

 

None

 

 

Items included in the release (6.0.41)

  RTC 166794

 

US - As a Unix Linux adapter developer, I must ensure that '$' characters in attribute names are not subject to macro expansion

 

 

 

Items included in the release (6.0.40)

RTC 161484

 

PEN TEST - User account creation allows a rogue Linux start process command to be appended

 

RTC 161485

 

PEN TEST - Group creation allows a rogue Linux start process command to be appended

 

RTC161486

 

PEN TEST - Identity Service Center allows directory creation under /root

 

 

 

Items included in the release (6.0.39)

 

 

None.

 

 

Items included in the release (6.0.38)

 

 

None.

 

 

Items included in the release (6.0.37)

 

 

None.

 

 

Items included in the release (6.0.36)

Bugz2033

RTC142016

IV83309

 

Linux recon scripts do not handle usernames with period in them.

 

 

Items included in the release (6.0.35)

Bug 1964
RTC136970
RTC105577

 

Adding user to an AIX target with ISIM UnixLinux adapter fails.
-Handled the NPE during user creation if the registry and/or primary group was null or invalid.

 

 

 

Items included in the release (6.0.34)

RTC129909

IV76420

No need to add a user to "Security" group for creating as super user on AIX.

 

 

Items included in the release (6.0.33)

Bugz1757

RTC124805

 

UnixLinux connector claims RHEL 7 is not supported

 

 

Items included in the 6.0.32 release

RTC107865

IV59791

Adapter fails to parse sudoers files with escaped colons ("\:" strings) in alias entries; recon fails.

Items included in the 6.0.31 release

 

 

None

 

 

Items included in the 6.0.30 release

Bugz 1411

IV61321

Inquiry about default Regular Expression for password change for each platform.

 

Bugz 1387, 1401

RTC109728

 

UNIX/Linux adapter should not return prematurely without error when it hits a bad recon entry.

 

 

Items closed in the 6.0.29 release

Bugz1263

RTC105558

IV56880

Filter recon on Posix AIX adapter service using erposixhomedir attribute does not return any account.

Bugz1310

RTC105559

IV56847

 

Unix/Linux Adapter 5.1.24 unable to delete home directory on AIX.

 

 

Items closed in the 6.0.28 release

RTC103026

 

Some account attributes are not updated correctly on AIX.

Bugz1139

 

PMR 36032,616,760

 

Dispatcher seems to be hung when provisioning AIX accounts in a highly concurrent environment.

 

 

IV54867

The debug ibmdi.log file output of UnixLinux adapter shows passphrase value in cleartext.

 

 

 

Items closed in the 6.0.27 release

Bugz1206

 

PMR 33800,999,000

 

suspend of Solaris account does not actually update/suspend account

 

 

 

Items closed in the 6.0.26 release

Bugz1149

 

PMR 72591,999,649

 

HPUX Trusted recon is slow

 

Documentation update:

When a sudo user administers an HP-UX Trusted service, the "/usr/bin/test" command is required in the user's sudoers file entry.

 

 

 

Items closed in the 6.0.25 release

Bugz1065

 

RTC91275

IV47170

PMR 35637,616,760

 

Unable to get erPosixLastAccessDate attribute value from Linux target if TDI is running on Japanese locale

 

Bugz1032

 

 

PMR 47616,122,000

 

UnixLinux connections leak issue

 

 

 

Items closed in the 6.0.24 release

Bugz999

IV43378

PMR 21862,122,000

 

Key-based authentication broken in 5.1.23 and 6.0.23 adapter

 

Bugz903

RTC76727

IV36353

Improve error behavior when setting umask and home directory permissions attributes.

RTC66506

 

 

UnixLinux restore: failed login count is not reset if password is valid.

RTC72341

 

 

UNIXLinux connector loginDelete() should process at and cron files after account has been deleted, not before.

 

 

 

Items closed in the 6.0.23 release

 

 

None

 

 

Items closed in the 6.0.22 release

Bugz 837

RTC71111

IV31939

 

 

Extraneous log messages removed from the search and add assembly lines.

 

 

Bugz 701

RTC68070

IV27986

 

 

UnixLinux adapter return invalid format for pwdlastchangedate – AIX LDAP.

 

 

 

 

Corrections to the profile versions in the release notes.

 

 

 

Items closed in the 6.0.21 release

 

 

 

Not released

 

 

 

Items closed in the 6.0.20 release

 

 

 

Initial release

 

 

 

 

Known Issues

Internal#

APAR#

PMR# / Description

Bug 2404

RTC 165305

 

PIM 2.1 Adapter not working for key based

SDI 7.2 must have following FP level installed for key based authentication to work correctly with the adapter  -

Security Directory Integrator 7.2 + FP3

Bugz 2059,

RTC 145019

PMR 44212,082,000

diffie-hellman-group-exchange-sha256 SSH key exchange algorithm does not work

 

Successful connection between the UNIX and Linux Adapter and a managed resource depends, in part, on the SSH key exchange algorithms configured on each of the systems.  The underlying Remote Execution and Access (RXA) libraries used by the adapter define which SSH algorithms are supported.  The RXA libraries are packaged with ITDI.  To get diffie-hellman-group-exchange-sha256 support, you must use ITDI 7.1.1 LA 0030 or later.

 

 

Adding audit class value on AIX

 

During user add and user modify, if audit class attribute contains a valid value but some other attribute fails, then adapter returns failure instead of warning.

 

 

 

Deleting audit class value on AIX

 

Adapter returns success for deleting audit class value on AIX, but the changes do not reflect on resource.

 

 

User add request with primary group value on Aix

 

Adapter returns failure status for useradd request if primary group contains value which does not exist on resource.

 

 

 

Changing primary group values on AIX

 

When primary group and secondary groups values are updated in the same useradd or usermod request, the primary group value is added to the secondary groups list without removing the previous primary group name from the list.

Example: Assume that a user is added with two attributes Primary group = gr01, Secondary Groups = gr02,gr03 

Then the user is modified for the two attributes Primary group = grp1, Secondary Groups = grp2,grp3

Result:  The new secondary group values are:  grp1,grp2,grp3,gr01.

 

 

 

Password change with using LDAP registry on AIX

 

Configuring multiple AIX services to use the same LDAP may cause errors. If LDAP is configured to use password history checking, and IBM Security Identity Manager is configured for password synchronization, any passwords changes initiated from the IBM Security Identity Manager effectively cause IBM Security Identity Manager to send the same password to each AIX service. The result is a history violation.

 

 

 

pwdadm process might be left running on AIX after root password change

 

If a failure occurs when changing root's password on AIX 7.1, the pwdadm command can consume a large number of CPU cycles. This can be resolved by installing AIX 7.1 TL3 or higher, which includes APAR IV63940.

 

Known Limitations

 

Internal#

APAR#

PMR# / Description

RTC 177762

Bug 2644

IJ07579

Groups not returned during reconciliation, $ is escaped in sed command, sed -e 's/\$

 

From this release (6.0.43), adapter does not support $ character in input values to avoid macro expansion or unwanted command execution.

 

Bug 2577

 

UNIX/Linux Adapter fails to create role on AIX 7.1 when authorization does not exist

 

On Aix 7.1, for creating a new role through adapter, make sure the authorization exists on Aix resource.

 

 

Bugz1098

IV50269

RTC96617

erPosixForcePwdChange request not working when set to 0

 

On Linux, Solaris and HPUX, the 'force password change' feature cannot be toggled. You can only set the 'force password change' option to true. The OS does not support resetting it back to false. On AIX, the 'force password change' feature can be toggled between true and false.

 

 

Supported shells

 

Only shells that support setting environment variables via "envvar = xxx; export envvar;" are supported for the service admin user. csh and tcsh in particular do not work (others might not work as well). The sh and bash shell works for the admin user. Note that on many systems, sh is a symlink to another shell.

 

Installation and Configuration Notes

See the IBM Security Identity Manager UNIX and Linux Adapter Installation Guide for detailed instructions.

 

Corrections to Installation Guide

The following corrections to the Installation Guide apply to this release: 

 

None

 

Installing the adapter language pack
The adapters use a separate language package from the IBM Security Identity Manager. See the IBM Security Identity Manager Knowledge Centre  for information about installing the adapter language pack.

IBM Security Identity Manager Knowledge Centre

 

Configuration Notes

No configuration notes apply to this release.

 

 

 

Customizing or Extending Adapter Features

IBM Security Identity Manager adapters can be customized and/or extended. The type and method of this customization may vary from adapter to adapter.

 

Getting Started

Customizing and extending adapters requires a number of additional skills. The developer must be familiar with the following concepts and skills prior to beginning the modifications:

 

·         IBM Security Identity Manager administration

·         IBM Tivoli Directory Integrator management

·         IBM Tivoli Directory Integrator Assembly Line development

·         LDAP schema management

·         Working knowledge of Java scripting language

·         Working knowledge of LDAP object classes and attributes

·         Working knowledge of XML document structure

 

Note: If the customization requires a new Tivoli Directory Integrator connector, the developer must also be familiar with Tivoli Directory Integrator connector development and working knowledge of Java programming language.

 

IBM Security Identity Manager Resources:

Check the Learn section of the IBM Knowledge Center for links to training, publications, and demos.

 

Security Directory Integrator Resources:

Check the Learn section of the IBM Security Directory Integrator Support web site for links to training, publications, and demos.

 

IBM Security Identity Manager Adapter Development:

Adapter Development Tool 

The Adapter Development Tool, ADT, is a tool used by IBM Security Identity Manager customers and consultants to create custom IBM Security Identity Manager adapters. It reduces adapter delivery time by about 50% and it helps in the development of custom adapters. The Adapter development tool is available on the IBM Open Process Automation Library (OPAL).

 

Support for Customized Adapters

The integration to the Identity Manager server – the adapter framework – is supported. However, IBM does not support the customizations, scripts, or other modifications. If you experience a problem with a customized adapter, IBM Support may require the problem to be demonstrated on the GA version of the adapter before a PMR is opened.

 

 

Supported Configurations

The IBM Security Identity Manager UNIX and Linux Adapter was built and tested on the following product versions.

 

Adapter Installation Platform: 

This adapter installs into Tivoli Directory Integrator (TDI) and may be installed on any platform supported by the TDI product and supported by the target system libraries or client, where applicable. IBM recommends installing TDI on each node of the IBM Security Identity Manager WAS Cluster and then installing this adapter on each instance of TDI.

 

IBM Tivoli Directory Integrator 7.1.1 + .17.1-TIV-TDI-FP0004 + 7.2.0-ISS-SDI-LA0008  

Security Directory Integrator 7.2 + FP4

 

Note:  The adapter supports IBM Security Directory Integrator 7.2, which is available only to customers who have the correct entitlement. Contact your IBM representative to find out if you have the entitlement to download IBM Security Directory Integrator 7.2.

 

Managed Resource:

            AIX

AIX 6.1

AIX 7.1

AIX 7.1 TL 3

AIX 7.2

 

HP-UX

            HP-UX 11i

            HP-UX 11i v2

            HP-UX 11i v3

           

            Supported operating system modes: non-trusted, trusted non-secure

 

Solaris

            Solaris 10

            Solaris 11

 

Oracle Linux

Linux 6.3

Linux 6.6

Linux 7

Linux 7.1

Linux 7.2

Linux 7.3

 

Red Hat Linux

 

At the time of the adapter 6.0.44 release, the most recent Red Hat Linux Enterprise Server releases and upgrades were:

 

Red Hat Linux Enterprise Server 5.7

Red Hat Linux Enterprise Server 5.9

Red Hat Linux Enterprise Server 5.10

Red Hat Linux Enterprise Server 6.3

Red Hat Linux Enterprise Server 6.4

Red Hat Linux Enterprise Server 6.5

Red Hat Linux Enterprise Server 7

Red Hat Linux Enterprise Server 7.1

Red Hat Linux Enterprise Server 7.2

Red Hat Linux Enterprise Server 7.3

Red Hat Linux Enterprise Server 7.4

Red Hat Linux Enterprise Server 7.5

 

Red Hat Linux Enterprise Server AS 5.7

Red Hat Linux Enterprise Server AS 5.9

Red Hat Linux Enterprise Server AS 5.10

Red Hat Linux Enterprise Server AS 6.3

Red Hat Linux Enterprise Server AS 6.4

Red Hat Linux Enterprise Server AS 6.5 

 

·         Red Hat Enterprise Server supported operating system modes are standard and SE Linux

·         Red Hat Linux Enterprise Server release updates, i.e., 5.x / 6.x, have a limited support life. See the RedHat Enterprise Linux Life Cycle page for more information. At any given time the range of release updates supported by Red Hat is also the range of release updates supported by the adapter. Any exceptions are documented in these release notes.

·         Red Hat Linux Enterprise Server release updates may introduce changes and/or features that are not supported by the adapter. In such a case, support for the changes or features will be added in a future release of the adapter.

 

SUSE Enterprise Linux Server

SUSE SLES 11

SUSE SLES 11 on zSeries

SUSE SLES 12

SUSE SLES 12.1

SUSE SLES 12.2

SUSE SLES 12.3

 

 

IBM Security Identity Manager:

            IBM Security Identity Manager 6.0

 

Notices

This information was developed for products and services offered in the U.S.A. IBM may not offer the products, services, or features discussed in this document in other countries. Consult your local IBM representative for information on the products and services currently available in your area. Any reference to an IBM product, program, or service is not intended to state or imply that only that IBM product, program, or service may be used. Any functionally equivalent product, program, or service that does not infringe any IBM intellectual property right may be used instead. However, it is the user’s responsibility to evaluate and verify the operation of any non-IBM product, program, or service.

IBM may have patents or pending patent applications covering subject matter described in this document. The furnishing of this document does not give you any license to these patents. You can send license inquiries, in writing, to:

IBM Director of Licensing

IBM Corporation

North Castle Drive

Armonk, NY  10504-1785  U.S.A.

 

For license inquiries regarding double-byte (DBCS) information, contact the IBM Intellectual Property Department in your country or send inquiries, in writing, to:

 

Intellectual Property Licensing

Legal and Intellectual Property Law

IBM Japan, Ltd.

1623-14, Shimotsuruma, Yamato-shi

Kanagawa 242-8502 Japan

 

The following paragraph does not apply to the United Kingdom or any other country where such provisions are inconsistent with local law:

 

INTERNATIONAL BUSINESS MACHINES CORPORATION PROVIDES THIS PUBLICATION "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF NON-INFRINGEMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.

 

Some states do not allow disclaimer of express or implied warranties in certain transactions, therefore, this statement may not apply to you.

 

This information could include technical inaccuracies or typographical errors. Changes are periodically made to the information herein; these changes will be incorporated in new editions of the publication. IBM may make improvements and/or changes in the product(s) and/or the program(s) described in this publication at any time without notice.

 

Any references in this information to non-IBM Web sites are provided for convenience only and do not in any manner serve as an endorsement of those Web sites. The materials at those Web sites are not part of the materials for this IBM product and use of those Web sites is at your own risk.

 

IBM may use or distribute any of the information you supply in any way it believes appropriate without incurring any obligation to you.

 

Licensees of this program who wish to have information about it for the purpose of enabling: (i) the exchange of information between independently created programs and other programs (including this one) and (ii) the mutual use of the information which has been exchanged should contact:

 

IBM Corporation

2ZA4/101

11400 Burnet Road

Austin, TX 78758  U.S.A.

 

Such information may be available, subject to appropriate terms and conditions, including in some cases, payment of a fee.

 

The licensed program described in this information and all licensed material available for it are provided by IBM under terms of the IBM Customer Agreement, IBM International Program License Agreement, or any equivalent agreement between us.

 

Any performance data contained herein was determined in a controlled environment. Therefore, the results obtained in other operating environments may vary significantly. Some measurements may have been made on development-level systems and there is no guarantee that these measurements will be the same on generally available systems. Furthermore, some measurements may have been estimated through extrapolation. Actual results may vary. Users of this document should verify the applicable data for their specific environment.

 

Information concerning non-IBM products was obtained from the suppliers of those products, their published announcements or other publicly available sources. IBM has not tested those products and cannot confirm the accuracy of performance, compatibility or any other claims related to non-IBM products. Questions on the capabilities of non-IBM products should be addressed to the suppliers of those products.

 

This information contains examples of data and reports used in daily business operations. To illustrate them as completely as possible, the examples include the names of individuals, companies, brands, and products. All of these names are fictitious and any similarity to the names and addresses used by an actual business enterprise is entirely coincidental.

 

COPYRIGHT LICENSE:

 

This information contains sample application programs in source language, which illustrate programming techniques on various operating platforms. You may copy, modify, and distribute these sample programs in any form without payment to IBM, for the purposes of developing, using, marketing or distributing application programs conforming to the application programming interface for the operating platform for which the sample programs are written. These examples have not been thoroughly tested under all conditions. IBM, therefore, cannot guarantee or imply reliability, serviceability, or function of these programs. You may copy, modify, and distribute these sample programs in any form without payment to IBM for the purposes of developing, using, marketing, or distributing application programs conforming to IBM's application programming interfaces.

 

Each copy or any portion of these sample programs or any derivative work, must include a copyright notice as follows:

 

© (your company name) (year). Portions of this code are derived from IBM Corp. Sample Programs. © Copyright IBM Corp. _enter the year or years_. All rights reserved.

 

If you are viewing this information in softcopy form, the photographs and color illustrations might not be displayed.

 

Trademarks

IBM, the IBM logo, and ibm.com are trademarks or registered trademarks of International Business Machines Corp., registered in many jurisdictions worldwide. Other product and service names might be trademarks of IBM or other companies. A current list of IBM trademarks is available on the Web at "Copyright and trademark information" at www.ibm.com/legal/copytrade.shtml.

 

Adobe, Acrobat, PostScript and all Adobe-based trademarks are either registered trademarks or trademarks of Adobe Systems Incorporated in the United States, other countries, or both.

 

IT Infrastructure Library is a registered trademark of the Central Computer and Telecommunications Agency which is now part of the Office of Government Commerce.

 

Intel, Intel logo, Intel Inside, Intel Inside logo, Intel Centrino, Intel Centrino logo, Celeron, Intel Xeon, Intel SpeedStep, Itanium, and Pentium are trademarks or registered trademarks of Intel Corporation or its subsidiaries in the United States and other countries.

 

Linux is a trademark of Linus Torvalds in the United States, other countries, or both.

 

Microsoft, Windows, Windows NT, and the Windows logo are trademarks of Microsoft Corporation in the United States, other countries, or both. ITIL is a registered trademark, and a registered community trademark of the Office of Government Commerce, and is registered in the U.S. Patent and Trademark Office.

 

UNIX is a registered trademark of The Open Group in the United States and other countries.

 

Java and all Java-based trademarks and logos are trademarks or registered trademarks of Oracle and/or its affiliates.

 

Cell Broadband Engine is a trademark of Sony Computer Entertainment, Inc. in the United States, other countries, or both and is used under license therefrom.

 

Linear Tape-Open, LTO, the LTO Logo, Ultrium, and the Ultrium logo are trademarks of HP, IBM Corp. and Quantum in the U.S. and other countries.

 

 

 

End of Release Notes