Release notes - IBM® Security Identity Manager UNIX and Linux Adapter 6.0.44
IBM Security Identity Manager UNIX and Linux Adapter 6.0.44 is available. Compatibility, installation, and other getting-started issues are addressed.
Installation and Configuration Notes
Customizing or Extending Adapter Features
These Release Notes contain information for the following products that was not available when the IBM Security Identity Manager manuals were printed:
· UNIX and Linux Adapter Installation and Configuration Guide
· UNIX and Linux Adapter User Guide
The UNIX and Linux Adapter is designed to create and manage accounts on AIX, HP-UX, Solaris, RedHat and SUSE Linux systems. The adapter runs in "agentless" mode and communicates using Secure Shell (SSH) to the systems being managed.
IBM recommends this adapter (and the prerequisite Tivoli Directory Integrator) be installed on each node of an IBM Security Identity Manager WebSphere cluster. A single copy of the adapter can handle multiple IBM Security Identity Manager services. The deployment configuration is based, in part, on the topology of your network domain, but the primary factor is the planned structure of your IBM Security Identity Manager Provisioning Policies and Approval Workflow process. Please refer to IBM Knowledge Center for a discussion of these topics.
IBM Security Identity Manager adapters are powerful tools that require Administrator Level authority. Adapters operate much like a human system administrator, creating accounts, permissions and home directories. Operations requested from IBM Security Identity Manager server will fail if the adapter is not given sufficient authority to perform the requested task. IBM recommends that this adapter run with administrative (root) permissions.
The ability to manage service groups is a new feature introduced in Tivoli Identity Manager 5.1. By service groups, IBM Security Identity Manager is referring to any logical entity that can group accounts together on the managed resource.
Managing service groups implies the following:
· Create service groups on the managed resource.
· Modify attribute of a service group.
· Delete a service group.
Note: Modify service group name is not supported.
· This adapter supports LDAP as a user registry on AIX only.
· This adapter does not support Network Information Service (NIS).
|
Component |
Version |
|
Release Date |
2019 June 13 05.09.59 |
|
Adapter Version |
6.0.44 |
|
Component Versions |
Adapter build: 6.0.44.167 Profile: 6.0.44.167 Connector: 6.0.44.167 Dispatcher: 6.1007 or higher (packaged separately). Dispatcher version 6.0.27 or higher is required to take advantage of the adapter timeout feature. |
|
Documentation |
The following guides are available in the IBM Knowledge Center · UNIX and Linux Adapter Installation and Configuration Guide · UNIX and Linux Adapter User Guide |
|
Enhancement # (FITS) |
Description |
|
|
Items included in current release (6.0.44) |
|
RTC 183246 |
50336: Don't create private group on user creation although additional attributes can not be set |
|
|
Items included in the release (6.0.43) |
|
RTC 177521 |
Adapter certification on RHEL7.4 |
|
RTC 177521 |
Adapter certification on RHEL7.5 |
|
|
Items included in the release (6.0.42) |
|
RTC 174565 Bug 2591 |
Verify and Certify Suse 12.3 Suse 12. Fixpack 3 is supported or not |
|
DFDFDF |
Items included in the release (6.0.41) |
|
|
None |
|
|
Items included in the release (6.0.40) |
|
|
None |
|
|
Items included in the release (6.0.39) |
|
RTC 158753 |
US - As a UnixLinux adapter developer, I should remove the <replaceMultiValue> tag in service.def |
|
RTC 156577 |
Adapter certification on following new Linux
releases SUSE 12.2 |
|
|
Items included in the release (6.0.38) |
|
PMR 04119,67E,760 Bugz 2174 |
Adapter certification on AIX 7.2 |
|
|
Items included in the release (6.0.37) |
|
40870 (82030) RTC 142443 |
Password change automation for PIM Solaris Profile |
|
|
Items included in the release (6.0.36) |
|
42052 (84783) RTC 142442 |
ISIM v6.0 Unix and Linux Adapter support for Oracle Linux 6.6 |
|
RTC 142444 |
Adapter certification on RHEL7.2 |
|
RTC 142445 |
Adapter certification on SuSE12.1 |
|
|
Items included in the release (6.0.35) |
|
RTC138252 |
Adapter certification on Oracle Linux 7.1 |
|
|
Items included in the release (6.0.34) |
|
76587 (38540) |
Support for Dormant accounts on Linux |
|
|
Items included in the release (6.0.33) |
|
RTC 127027 |
Adapter certification on Oracle Linux 7 |
|
RTC 124805 |
Adapter certification on RHEL7.1 |
|
RTC 127026
|
Adapter certification on SLES 12 |
|
RTC 127028 |
Adapter certification on AIX 7.1 TL3 |
|
Items included in the 6.0.32 release |
|
|
None |
|
|
|
Items included in the 6.0.31 release |
|
|
Added ‘self-password change’ support for IBM Security Privileged Identity Manager (ISPIM). |
|
|
Items included in the release (6.0.30) |
|
RTC 107091 |
Support for RHEL 7 |
|
|
Items included in the 6.0.29 release |
|
RFE 48769 RTC 107131
|
Support for RHEL 6.5 |
|
RTC 107094 |
Support for RHEL 5.10 |
|
RFE 48768 RTC 107132 |
Support for RHEL 5.7 |
|
RTC 105557
|
SunSSH server support for Solaris endpoint.
This version of the POSIX adapter is supports Sun SSH server on Solaris.
|
|
RTC 105578 |
Support for SDI 7.2 |
|
RFE 40182 |
Manage Linux server with Tectia SSH server
This version of the POSIX adapter supports Tectia SSH server on Linux.
|
|
|
Items included in the 6.0.28 release |
|
RFE 41074
RTC 24302
|
Tectia 6.4 SSH server support for AIX 7 endpoint.
This version of the POSIX adapter is enhanced to support Tectia 6.4 SSH server on AIX.
|
|
|
Items included in the 6.0.27 release |
|
|
None |
|
|
Items included in the 6.0.26 release |
|
PMR 06691,122,000 PMR 47616,122,000 PMR 58647,122,000 Bugz 1025 Bugz 1032 Bugz 1073 |
Enable timeout feature in the UNIX and Linux Adapter
This feature allows the Dispatcher to end an operation that the adapter is running if the operation takes too long to complete. This feature requires Dispatcher version 6.0.27 or higher.
Remote operations performed by the UNIX and Linux Adapter can hang for a variety of reasons: for example, network delays, configuration errors for SSH or sudo configuration files on the target system, or configuration errors for password prompts on the service definition. In large environments, an accumulation of hanging operations can cause functional and performance problems for both the IBM Tivoli Directory Integrator and the IBM Security Identity Manager server.
For Dispatcher versions prior to 6.0.27, stop and restart the Dispatcher service to clear hanging adapters. In version 6.0.27, you can configure the Dispatcher to detect an operation that has been running too long and interrupt it. An interrupted UNIX and Linux Adapter will clean up its state (including closing connections to the target system) before the Dispatcher ends the operation.
For information on enabling and configuring the timeout feature, see the Dispatcher documentation.
|
|
|
Items included in the 6.0.25 release |
|
|
None |
|
|
Items included in the 6.0.24 release |
|
RFE 31713
RTC 78308
|
The erPosixMaxConnectionCnt attribute has a default value in all service.def files to limit the number of concurrent requests of a given type to a service.
See the IBM Security Identity Manager documentation for additional information.
|
|
RFE 31222 (18219)
RTC 78795 |
Request for support of following Login Shell other than /bin/sh by TIM 5.1 UNIXLinux adapter AIX: /usr/bin/ksh |
|
RFE 33755 |
Adapter certification on RHEL 6.4 |
|
|
Items included in the 6.0.23 release |
|
RFE 9853
RTC 74564
|
Add support to manage AIX LDAP groups The adapter manages AIX groups if the user registry is set to LDAP. |
|
RFE 12884 RTC 67379 |
Adapter certification on SLES11 on zSeries |
|
MR0606115532 RTC 67190
|
Documentation change for at/cron attribute support on Linux The documentation should read that the /bin/mkdir and /bin/rm commands are required in the sudoers entry on a Linux system which has a sudo administrative user. It should also state that the grep command is not needed in the sudoers entry.
|
|
RFE 16913
RTC 74562 |
Add Last Access Date support for HP-UX and Linux
The adapter now returns account last access date when recon’ing HP-UX and Linux systems.
|
|
RFE 8467 RTC 74563 |
Adapter certification on Solaris 11 |
|
|
Adapter certification on RHEL 6.3 |
|
|
Adapter certification on RHEL 5.9
|
|
RFE 14449 |
Adapter certification on Oracle Linux 6.3 |
|
|
Items included in the 6.0.22 release |
|
MR0611101655 RTC 67192 |
Enhance adapter so that Linux accounts can be deleted even if they are in use. The adapter kills any active processes owned by the user before deleting the account. This behavior is controlled by a new attribute that is set with a checkbox on the Linux account form labeled Delete user account even when it is in use. |
|
MR0606115532 RTC 67190
|
Add support for the at/cron attributes on Linux The adapter allows you to manage users' permissions to execute "at" or "cron" jobs on Linux systems.
|
|
RFE 7275 RTC 67664
|
Enable sudo user to change root password on AIX On AIX, the adapter can change the root user's password even if the minimum password age has not elapsed. After the password change, the value of the ADMCHG flag (which requires the user to change his password on next login) is set to whatever the value was prior to the password change.
|
|
|
Items included in the 6.0.21 release |
|
|
Not released
|
|
|
Items included in the 6.0.20 release |
|
|
Initial release
|
|
Internal# |
APAR# |
PMR# / Description |
|
|
|
Items included in current release (6.0.44) |
|
|
|
None |
|
|
|
Items included in release (6.0.43) |
|
RTC 177762 Bug 2644 |
IJ07579 |
Groups not returned during reconciliation, $ is escaped in sed command, sed -e 's/\$ |
|
|
|
Items included in the release (6.0.42) |
|
|
|
None |
|
|
|
Items included in the release (6.0.41) |
|
RTC 166794 |
|
US - As a Unix Linux adapter developer, I must ensure that '$' characters in attribute names are not subject to macro expansion
|
|
|
|
Items included in the release (6.0.40) |
|
RTC 161484 |
|
PEN TEST - User account creation allows a rogue Linux start process command to be appended
|
|
RTC 161485 |
|
PEN TEST - Group creation allows a rogue Linux start process command to be appended
|
|
RTC161486 |
|
PEN TEST - Identity Service Center allows directory creation under /root
|
|
|
|
Items included in the release (6.0.39) |
|
|
|
None. |
|
|
|
Items included in the release (6.0.38) |
|
|
|
None. |
|
|
|
Items included in the release (6.0.37) |
|
|
|
None. |
|
|
|
Items included in the release (6.0.36) |
|
Bugz2033 RTC142016 |
IV83309
|
Linux recon scripts do not handle usernames with period in them. |
|
|
|
Items included in the release (6.0.35) |
|
Bug 1964 |
|
Adding
user to an AIX target with ISIM UnixLinux adapter fails.
|
|
|
|
Items included in the release (6.0.34) |
|
RTC129909 |
IV76420 |
No need to add a user to "Security" group for creating as super user on AIX. |
|
|
|
Items included in the release (6.0.33) |
|
Bugz1757 RTC124805 |
|
UnixLinux connector claims RHEL 7 is not supported |
|
|
|
Items included in the 6.0.32 release |
|
RTC107865 |
IV59791 |
Adapter fails to parse sudoers files with escaped colons ("\:" strings) in alias entries; recon fails. |
|
Items included in the 6.0.31 release |
||
|
|
|
None |
|
|
|
Items included in the 6.0.30 release |
|
Bugz 1411 |
IV61321 |
Inquiry about default Regular Expression for password change for each platform.
|
|
Bugz 1387, 1401 RTC109728 |
|
UNIX/Linux adapter should not return prematurely without error when it hits a bad recon entry. |
|
|
|
Items closed in the 6.0.29 release |
|
Bugz1263 RTC105558 |
IV56880 |
Filter recon on Posix AIX adapter service using erposixhomedir attribute does not return any account. |
|
Bugz1310 RTC105559 |
IV56847
|
Unix/Linux Adapter 5.1.24 unable to delete home directory on AIX. |
|
|
|
Items closed in the 6.0.28 release |
|
RTC103026 |
|
Some account attributes are not updated correctly on AIX. |
|
Bugz1139 |
|
PMR 36032,616,760
Dispatcher seems to be hung when provisioning AIX accounts in a highly concurrent environment.
|
|
|
IV54867 |
The debug ibmdi.log file output of UnixLinux adapter shows passphrase value in cleartext.
|
|
|
|
Items closed in the 6.0.27 release |
|
Bugz1206 |
|
PMR 33800,999,000
suspend of Solaris account does not actually update/suspend account
|
|
|
|
Items closed in the 6.0.26 release |
|
Bugz1149 |
|
PMR 72591,999,649
HPUX Trusted recon is slow
Documentation update: When a sudo user administers an HP-UX Trusted service, the "/usr/bin/test" command is required in the user's sudoers file entry.
|
|
|
|
Items closed in the 6.0.25 release |
|
Bugz1065
RTC91275 |
IV47170 |
PMR 35637,616,760
Unable to get erPosixLastAccessDate attribute value from Linux target if TDI is running on Japanese locale
|
|
Bugz1032
|
|
PMR 47616,122,000
UnixLinux connections leak issue
|
|
|
|
Items closed in the 6.0.24 release |
|
Bugz999 |
IV43378 |
PMR 21862,122,000
Key-based authentication broken in 5.1.23 and 6.0.23 adapter
|
|
Bugz903 RTC76727 |
IV36353 |
Improve error behavior when setting umask and home directory permissions attributes. |
|
RTC66506
|
|
UnixLinux restore: failed login count is not reset if password is valid. |
|
RTC72341
|
|
UNIXLinux connector loginDelete() should process at and cron files after account has been deleted, not before.
|
|
|
|
Items closed in the 6.0.23 release |
|
|
|
None |
|
|
|
Items closed in the 6.0.22 release |
|
Bugz 837 RTC71111 |
IV31939
|
Extraneous log messages removed from the search and add assembly lines.
|
|
Bugz 701 RTC68070 |
IV27986
|
UnixLinux adapter return invalid format for pwdlastchangedate – AIX LDAP.
|
|
|
|
Corrections to the profile versions in the release notes.
|
|
|
|
Items closed in the 6.0.21 release
|
|
|
|
Not released
|
|
|
|
Items closed in the 6.0.20 release
|
|
|
|
Initial release
|
|
Internal# |
APAR# |
PMR# / Description |
|
Bug 2404 RTC 165305 |
|
PIM 2.1 Adapter not working for key based SDI 7.2 must have following FP level installed for key based authentication to work correctly with the adapter - Security Directory Integrator 7.2 + FP3 |
|
Bugz 2059, RTC 145019 |
PMR 44212,082,000 |
diffie-hellman-group-exchange-sha256 SSH key exchange algorithm does not work
Successful connection between the UNIX and Linux Adapter and a managed resource depends, in part, on the SSH key exchange algorithms configured on each of the systems. The underlying Remote Execution and Access (RXA) libraries used by the adapter define which SSH algorithms are supported. The RXA libraries are packaged with ITDI. To get diffie-hellman-group-exchange-sha256 support, you must use ITDI 7.1.1 LA 0030 or later. |
|
|
|
Adding audit class value on AIX
During user add and user modify, if audit class attribute contains a valid value but some other attribute fails, then adapter returns failure instead of warning.
|
|
|
|
Deleting audit class value on AIX
Adapter returns success for deleting audit class value on AIX, but the changes do not reflect on resource. |
|
|
|
User add request with primary group value on Aix
Adapter returns failure status for useradd request if primary group contains value which does not exist on resource. |
|
|
|
Changing primary group values on AIX
When primary group and secondary groups values are updated in the same useradd or usermod request, the primary group value is added to the secondary groups list without removing the previous primary group name from the list. Example: Assume that a user is added with two attributes Primary group = gr01, Secondary Groups = gr02,gr03 Then the user is modified for the two attributes Primary group = grp1, Secondary Groups = grp2,grp3 Result: The new secondary group values are: grp1,grp2,grp3,gr01.
|
|
|
|
Password change with using LDAP registry on AIX
Configuring multiple AIX services to use the same LDAP may cause errors. If LDAP is configured to use password history checking, and IBM Security Identity Manager is configured for password synchronization, any passwords changes initiated from the IBM Security Identity Manager effectively cause IBM Security Identity Manager to send the same password to each AIX service. The result is a history violation.
|
|
|
|
pwdadm process might be left running on AIX after root password change
If a failure occurs when changing root's password on AIX 7.1, the pwdadm command can consume a large number of CPU cycles. This can be resolved by installing AIX 7.1 TL3 or higher, which includes APAR IV63940. |
|
Internal# |
APAR# |
PMR# / Description |
|
RTC 177762 Bug 2644 |
IJ07579 |
Groups not returned during reconciliation, $ is escaped in sed command, sed -e 's/\$
From this release (6.0.43), adapter does not support $ character in input values to avoid macro expansion or unwanted command execution.
|
|
Bug 2577 |
|
UNIX/Linux Adapter fails to create role on AIX 7.1 when authorization does not exist
On Aix 7.1, for creating a new role through adapter, make sure the authorization exists on Aix resource.
|
|
|
Bugz1098 IV50269 RTC96617 |
erPosixForcePwdChange request not working when set to 0
On Linux, Solaris and HPUX, the 'force password change' feature cannot be toggled. You can only set the 'force password change' option to true. The OS does not support resetting it back to false. On AIX, the 'force password change' feature can be toggled between true and false.
|
|
|
Supported shells
Only shells that support setting environment variables via "envvar = xxx; export envvar;" are supported for the service admin user. csh and tcsh in particular do not work (others might not work as well). The sh and bash shell works for the admin user. Note that on many systems, sh is a symlink to another shell. |
See the IBM Security Identity Manager UNIX and Linux Adapter Installation Guide for detailed instructions.
The following corrections to the Installation Guide apply to this release:
None
Installing the adapter language
pack
The adapters use a separate language package from the IBM Security Identity
Manager. See the IBM Security Identity Manager Knowledge Centre for
information about installing the adapter language pack.
IBM Security Identity Manager Knowledge Centre
No configuration notes apply to this release.
IBM Security Identity Manager adapters can be customized and/or extended. The type and method of this customization may vary from adapter to adapter.
Customizing and extending adapters requires a number of additional skills. The developer must be familiar with the following concepts and skills prior to beginning the modifications:
· IBM Security Identity Manager administration
· IBM Tivoli Directory Integrator management
· IBM Tivoli Directory Integrator Assembly Line development
· LDAP schema management
· Working knowledge of Java scripting language
· Working knowledge of LDAP object classes and attributes
· Working knowledge of XML document structure
Note: If the customization requires a new Tivoli Directory Integrator connector, the developer must also be familiar with Tivoli Directory Integrator connector development and working knowledge of Java programming language.
IBM Security Identity Manager Resources:
Check the Learn section of the IBM Knowledge Center for links to training, publications, and demos.
Security Directory Integrator Resources:
Check the Learn section of the IBM Security Directory Integrator Support web site for links to training, publications, and demos.
IBM Security Identity Manager Adapter Development:
Adapter Development Tool
The Adapter Development Tool, ADT, is a tool used by IBM Security Identity Manager customers and consultants to create custom IBM Security Identity Manager adapters. It reduces adapter delivery time by about 50% and it helps in the development of custom adapters. The Adapter development tool is available on the IBM Open Process Automation Library (OPAL).
The integration to the Identity Manager server – the adapter framework – is supported. However, IBM does not support the customizations, scripts, or other modifications. If you experience a problem with a customized adapter, IBM Support may require the problem to be demonstrated on the GA version of the adapter before a PMR is opened.
The IBM Security Identity Manager UNIX and Linux Adapter was built and tested on the following product versions.
Adapter Installation Platform:
This adapter installs into Tivoli Directory Integrator (TDI) and may be installed on any platform supported by the TDI product and supported by the target system libraries or client, where applicable. IBM recommends installing TDI on each node of the IBM Security Identity Manager WAS Cluster and then installing this adapter on each instance of TDI.
IBM Tivoli Directory Integrator 7.1.1 + .17.1-TIV-TDI-FP0004 + 7.2.0-ISS-SDI-LA0008
Security Directory Integrator 7.2 + FP4
Note: The adapter supports IBM Security Directory Integrator 7.2, which is available only to customers who have the correct entitlement. Contact your IBM representative to find out if you have the entitlement to download IBM Security Directory Integrator 7.2.
Managed Resource:
AIX
AIX 6.1
AIX 7.1
AIX 7.1 TL 3
AIX 7.2
HP-UX
HP-UX 11i
HP-UX 11i v2
HP-UX 11i v3
Supported operating system modes: non-trusted, trusted non-secure
Solaris
Solaris 10
Solaris 11
Oracle Linux
Linux 6.3
Linux 6.6
Linux 7
Linux 7.1
Linux 7.2
Linux 7.3
Red Hat Linux
At the time of the adapter 6.0.44 release, the most recent Red Hat Linux Enterprise Server releases and upgrades were:
Red Hat Linux Enterprise Server 5.7
Red Hat Linux Enterprise Server 5.9
Red Hat Linux Enterprise Server 5.10
Red Hat Linux Enterprise Server 6.3
Red Hat Linux Enterprise Server 6.4
Red Hat Linux Enterprise Server 6.5
Red Hat Linux Enterprise Server 7
Red Hat Linux Enterprise Server 7.1
Red Hat Linux Enterprise Server 7.2
Red Hat Linux Enterprise Server 7.3
Red Hat Linux Enterprise Server 7.4
Red Hat Linux Enterprise Server 7.5
Red Hat Linux Enterprise Server AS 5.7
Red Hat Linux Enterprise Server AS 5.9
Red Hat Linux Enterprise Server AS 5.10
Red Hat Linux Enterprise Server AS 6.3
Red Hat Linux Enterprise Server AS 6.4
Red Hat Linux Enterprise Server AS 6.5
· Red Hat Enterprise Server supported operating system modes are standard and SE Linux
· Red Hat Linux Enterprise Server release updates, i.e., 5.x / 6.x, have a limited support life. See the RedHat Enterprise Linux Life Cycle page for more information. At any given time the range of release updates supported by Red Hat is also the range of release updates supported by the adapter. Any exceptions are documented in these release notes.
· Red Hat Linux Enterprise Server release updates may introduce changes and/or features that are not supported by the adapter. In such a case, support for the changes or features will be added in a future release of the adapter.
SUSE Enterprise Linux Server
SUSE SLES 11
SUSE SLES 11 on zSeries
SUSE SLES 12
SUSE SLES 12.1
SUSE SLES 12.2
SUSE SLES 12.3
IBM Security Identity Manager:
IBM Security Identity Manager 6.0
This information was developed for products and services offered in the U.S.A. IBM may not offer the products, services, or features discussed in this document in other countries. Consult your local IBM representative for information on the products and services currently available in your area. Any reference to an IBM product, program, or service is not intended to state or imply that only that IBM product, program, or service may be used. Any functionally equivalent product, program, or service that does not infringe any IBM intellectual property right may be used instead. However, it is the user’s responsibility to evaluate and verify the operation of any non-IBM product, program, or service.
IBM may have patents or pending patent applications covering subject matter described in this document. The furnishing of this document does not give you any license to these patents. You can send license inquiries, in writing, to:
IBM Director of Licensing
IBM Corporation
North Castle Drive
Armonk, NY 10504-1785 U.S.A.
For license inquiries regarding double-byte (DBCS) information, contact the IBM Intellectual Property Department in your country or send inquiries, in writing, to:
Intellectual Property Licensing
Legal and Intellectual Property Law
IBM Japan, Ltd.
1623-14, Shimotsuruma, Yamato-shi
Kanagawa 242-8502 Japan
The following paragraph does not apply to the United Kingdom or any other country where such provisions are inconsistent with local law:
INTERNATIONAL BUSINESS MACHINES CORPORATION PROVIDES THIS PUBLICATION "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF NON-INFRINGEMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
Some states do not allow disclaimer of express or implied warranties in certain transactions, therefore, this statement may not apply to you.
This information could include technical inaccuracies or typographical errors. Changes are periodically made to the information herein; these changes will be incorporated in new editions of the publication. IBM may make improvements and/or changes in the product(s) and/or the program(s) described in this publication at any time without notice.
Any references in this information to non-IBM Web sites are provided for convenience only and do not in any manner serve as an endorsement of those Web sites. The materials at those Web sites are not part of the materials for this IBM product and use of those Web sites is at your own risk.
IBM may use or distribute any of the information you supply in any way it believes appropriate without incurring any obligation to you.
Licensees of this program who wish to have information about it for the purpose of enabling: (i) the exchange of information between independently created programs and other programs (including this one) and (ii) the mutual use of the information which has been exchanged should contact:
IBM Corporation
2ZA4/101
11400 Burnet Road
Austin, TX 78758 U.S.A.
Such information may be available, subject to appropriate terms and conditions, including in some cases, payment of a fee.
The licensed program described in this information and all licensed material available for it are provided by IBM under terms of the IBM Customer Agreement, IBM International Program License Agreement, or any equivalent agreement between us.
Any performance data contained herein was determined in a controlled environment. Therefore, the results obtained in other operating environments may vary significantly. Some measurements may have been made on development-level systems and there is no guarantee that these measurements will be the same on generally available systems. Furthermore, some measurements may have been estimated through extrapolation. Actual results may vary. Users of this document should verify the applicable data for their specific environment.
Information concerning non-IBM products was obtained from the suppliers of those products, their published announcements or other publicly available sources. IBM has not tested those products and cannot confirm the accuracy of performance, compatibility or any other claims related to non-IBM products. Questions on the capabilities of non-IBM products should be addressed to the suppliers of those products.
This information contains examples of data and reports used in daily business operations. To illustrate them as completely as possible, the examples include the names of individuals, companies, brands, and products. All of these names are fictitious and any similarity to the names and addresses used by an actual business enterprise is entirely coincidental.
COPYRIGHT LICENSE:
This information contains sample application programs in source language, which illustrate programming techniques on various operating platforms. You may copy, modify, and distribute these sample programs in any form without payment to IBM, for the purposes of developing, using, marketing or distributing application programs conforming to the application programming interface for the operating platform for which the sample programs are written. These examples have not been thoroughly tested under all conditions. IBM, therefore, cannot guarantee or imply reliability, serviceability, or function of these programs. You may copy, modify, and distribute these sample programs in any form without payment to IBM for the purposes of developing, using, marketing, or distributing application programs conforming to IBM's application programming interfaces.
Each copy or any portion of these sample programs or any derivative work, must include a copyright notice as follows:
© (your company name) (year). Portions of this code are derived from IBM Corp. Sample Programs. © Copyright IBM Corp. _enter the year or years_. All rights reserved.
If you are viewing this information in softcopy form, the photographs and color illustrations might not be displayed.
Trademarks
IBM, the IBM logo, and ibm.com are trademarks or registered trademarks of International Business Machines Corp., registered in many jurisdictions worldwide. Other product and service names might be trademarks of IBM or other companies. A current list of IBM trademarks is available on the Web at "Copyright and trademark information" at www.ibm.com/legal/copytrade.shtml.
Adobe, Acrobat, PostScript and all Adobe-based trademarks are either registered trademarks or trademarks of Adobe Systems Incorporated in the United States, other countries, or both.
IT Infrastructure Library is a registered trademark of the Central Computer and Telecommunications Agency which is now part of the Office of Government Commerce.
Intel, Intel logo, Intel Inside, Intel Inside logo, Intel Centrino, Intel Centrino logo, Celeron, Intel Xeon, Intel SpeedStep, Itanium, and Pentium are trademarks or registered trademarks of Intel Corporation or its subsidiaries in the United States and other countries.
Linux is a trademark of Linus Torvalds in the United States, other countries, or both.
Microsoft, Windows, Windows NT, and the Windows logo are trademarks of Microsoft Corporation in the United States, other countries, or both. ITIL is a registered trademark, and a registered community trademark of the Office of Government Commerce, and is registered in the U.S. Patent and Trademark Office.
UNIX is a registered trademark of The Open Group in the United States and other countries.
Java and all Java-based trademarks and logos are trademarks or registered trademarks of Oracle and/or its affiliates.
Cell Broadband Engine is a trademark of Sony Computer Entertainment, Inc. in the United States, other countries, or both and is used under license therefrom.
Linear Tape-Open, LTO, the LTO Logo, Ultrium, and the Ultrium logo are trademarks of HP, IBM Corp. and Quantum in the U.S. and other countries.
End of Release Notes