Release notes - IBM® Security Verify Governance Adapter 10.0.7 for Oracle Database

IBM Security Verify Governance Adapter 10.0.7 for Oracle Database is available. Compatibility, installation, and other getting-started issues are addressed.

Copyright International Business Machines Corporation 2022, 2025. All rights reserved.

US Government Users Restricted Rights -- Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp.

Contents

 

Preface

Welcome to the IBM Security Verify Governance Adapter for Oracle Database.

These Release Notes contain information for the following products that was not available when the IBM Security Verify Governance Adapter manuals were printed:

·       IBM Security Verify Governance Adapter for Oracle Database Installation and Configuration Guide

Adapter Features and Purpose

The Oracle Database Adapter is designed to create and manage accounts on an Oracle Database. The adapter runs in "agentless" mode and communicates using JDBC to the systems being managed. 

The IBM Security Verify Governance adapters are powerful tools that require Administrator Level authority. Adapters operate much like a human system administrator, creating accounts, permissions and home directories. Operations requested from the IBM Security Verify Governance and/or IBM Security Verify Governance Identity Manager will fail if the Adapter is not given sufficient authority to perform the requested task. IBM recommends that this Adapter run with administrative (root) permissions.

Service Groups Management

IBM Security Verify Governance Identity Manager Server has the ability to manage service groups. By service groups, IBM Security Verify Governance Identity Manager Server is referring to any logical entity that can group accounts together on the managed resource.
Managing service groups implies the following:

     Create service groups on the managed resource.
      Modify attribute of a service group.
      Delete a service group.

Note: Service group name change is not supported.

The Oracle Database Adapter does not support management of service groups.

License Agreement

Review and agree to the terms of the IBM Security Verify Governance Adapter license prior to using this product. The license can be viewed from the "license" folder included in the product package.

Contents of this Release

Refer to the KC link IBM Security Verify Governance Adapter Development and Customization Guide 

Adapter Version

Component

Version

Build Date

2025 September 19 02.35.29

Adapter Version

10.0.7

Component Versions

Adapter build: 10.0.7.1

Profile:  10.0.7.1

Connector:  10.0.7.1

Dispatcher 7.1.39 or higher (packaged separately)

Documentation

The following guides are available in the IBM Security Verify Adapters Knowledge Center

  Oracle Database Adapter Installation and Configuration Guide

New Features

Internal

Enhancement # (RFE)

Description

 

 

Items included in current release 10.0.7

 SVGAD-4783

 ADAPT-205

Update Default SSL Version in Oracle Adapter Configuration

SVGAD-5068

 

Certify the adapter for use with IBM Security Verify Directory Integrator version 10.0.0

 

 

Items included in release (10.0.6)

 

 

None

Items included in release (10.0.5)

RTC 191004

Oracle Database 21c Certification

RTC 191297

ADAPT-I-160

Oracle Adapter support for Kerberos authentication

RTC 191296

ADAPT-I-159

Oracle adapter external authentication

 

Items included in release (10.0.4)

 

None

 

Items included in release (10.0.3)

 

None

 

Items included in release (10.0.2)

RTC 188054


Add tooltip labels for Oracle adapter

 

Items included in release (10.0.1)

RTC 187756


Added supporting data changes for IBM Security Verify - Governance Oracle DB adapter

 

Items included in current release (7.1.28)

RTC 186614

 

Oracle Database 19c Certification

 

Items included in release (7.1.27)

 

None

 

Items included in release (7.1.26)

RTC 177624

Bug 2641 / RFE 123794

Added functionality to display last Login time on IGI

 

Items included in release(7.1.25)

 

None

 

Items included in release(7.1.24)

RTC 167831

US - As an Oracle DB adapter developer, I must support the latest Oracle 12.2 features

 

Items included in release(7.1.23)

RTC 151773

Add support for IGI 5.2.2

This adapter is now designed for use with IBM Security Identity Manager, Privileged Identity Manager, and Identity Governance and Intelligence.

 

Items included in release(7.0.22)

42054 (84786) 

ISIM v6.0 Oracle Database adapter support of Oracle 12c CDB databases

 

 

Items included in 7.0.21 release

39182 (77959)

Oracle Database account Provisioning in ISIM 6.0 (Default Profile)

Adapter will now assign the profile during user creation.

 

 

Items included in 7.0.20 release

71947 (36726)

Include an option to enable/disable the use of cascade when removing a oracle user

71039 (36376)

Oracle adapter jdbc:thin client should support Oracle network encryption

 

Items included in 7.0.19 release

 

None

 

Items included in 7.0.18 release

 

None


Closed Issues

Internal#

KnownIssue# / Case#

Description

Items included in current release 10.0.7

Bug 4508 / SVGAD-4039

DT435462 / TS018455670

Oracle DB Adapter prints excessive logs in ibmdi.log file

Bug 4538 / SVGAD-4416

DT439409 / TS019201827

 
Oracle Adapter Unable to Retrieve Last Password Change Information for 19c Oracle

Items included in release 10.0.6

Bug 4252 / SVGAD 1619

DT257601 / TS014847380

eroraauthenticationtype is set to Local for accounts that have value None

Items included in release (10.0.5)

Bugz 3774/RTC 190869

IJ42338 / TS008455971

The Oracle DB adapter doesn't use the default consumer group value if this is specified in ISIM

RTC 190640

OracleDB eroraconvertusernametouppercase not honored

 

 

Items included in release (10.0.4)

Bugz 3689/RTC 190107

IJ36971

Trying to figure out NPE ISIM server side failure from different types of Oracle adapter request failures

 

 

Items included in release (10.0.3)

Bugz 3509/RTC 188908

IJ32424

information about the last login time of an Oracle account

 

 

Items included in release (10.0.2)

 

 

None

 

 

Items closed in release (10.0.1)

Bugz 3305/RTC 187874

IJ28159

Error ACCESS_ANY_WORKSPACE : ERROR: java.sql.SQLException: ORA-06550 on modify

 

 

Items closed in current release (7.1.28)

 

 

None

 

 

Items closed in release (7.1.27)

RTC 183248

 

 

Internal - save all the ALs in TDI 7.1.1

Bugz 2854/RTC 183249

 

 

Internal - Trailing spaces in erlockdate attribute's definition must be removed

 

 

Items closed in release (7.1.26)

Bug 2642

RTC 177623

APAR IJ06996

 

Mapping all users of Oracle end resource to IGI user

 

 

Items closed in release (7.1.25)

Bugz 2472/RTC 174802

IJ05419

Error ORA-01741 on modify request

 

 

Items closed in release.(7.1.24)

 

 

 

None

 

 

Items closed in release.(7.1.23)

Bugz 2152/ 2202 RTC153511/ 153512

IV90163

Connect credential / Search operation fails for Oracle 11G

Test connection and Reconciliation fail on 11g

Bugz 2194 RTC153513

IV90344

Oracle profile does not contain RMI status attributes for service form

RTC152426

 

Missing value for conEmpty leads to NullPointerException on FP14

 

 

Items closed in release (7.0.22)

Bugz 2041/ 2066
RTC 145427

IV84414

Oracle adapter Tablespace quota not reconciled

ISPIM Oracle DB adapter not retrieving Tablespace quotas

 

 

Items closed in 7.0.21 release

Bug1960,

RTC 137359

 

 

 

Oracle DB Adapter - encryption issue.

The JDBC Thin Client Properties File, OraASO.properties follows a standard format, the first line is always comment line or a blank newline , followed by each property set on new line;  comment line begins with #

 

 

Items closed in 7.0.20 release

Internal

 

Number of attributes completely failed and partially completed

In some cases of change operation, like adding a role which does not exist, the log may have inconsistent update of number of attributes completely failed and number of attributes partially completed. In this scenario, ISIM may show incorrect status code but ISIM LDAP is updated correctly.

 

 

Items closed in 7.0.19 release

IV72523

 

Warning on erroraroles adds still causes ITIM Server LDAP to update.

RTC 123371

 

Stored procedures not installed/updated correctly by adapter

From this version of adapter, New store procedure will get installed and old stored procedures will get uninstalled from the database.

 

Note: - The adapter appends the adapter version to the name of the procedure when installing. While uninstalling the adapter will first check whether the isim versions of the new and old stored procedures are same and then will uninstall only those stored procedures whose version is lower than the version currently being installed.

Once you have installed store procedures on resource, you can remove store procedure of that version from timsol folder.

 

 

Items included in 7.0.18 release

 

 

None.

Known Limitations

Internal#

APAR#

PMR# / Description

 

N/A

 

N/A

Converting between Default and Non-default Roles

It is a two-step process to make a role as a non-default role.

1.     Assign a role to a user by the "GRANT" statement.

2.     Assign the role as non-default by "ALTER USER".

If the "ALTER USER" command fails, then that role will become the default role on the resource. However it will not reflect on the IBM Security Identity Manager side in any of the role lists. You are required to submit the recon operation, so it will appear in the default list or you can submit the request again.

Error on SendOnly Attributes

If the Oracle adapter fails to set the send-only attribute "erOraExpirePwd" on the Oracle database resource for an ADD Operation, then the Oracle Database Adapter will return this attribute in the failed attribute list and the IBM Security Identity Manager will generate an "Object Class Violation" error. This is an IBM Security Identity Manager server defect and will be addressed in the next server fix pack.

 

 

Restoring Local Authenticated Accounts

Restoring an account for local authentication is a two-step process.

1.     Change the password for the user.

2.     Restore the account on the resource.

If the step 1 executes successfully and step 2 fails then the password is changed on the resource without the account being restored.

Workaround: the user remains suspended and the account can be restored with a new password.

 

 

In IGI, eroraglobalname target attribute is not being deleted properly.

 

 

With SSL v3.0 connection can not be established

 

 

-------------------

Installation and Configuration Notes

             See the IBM Security Verify Governance Application Adapters for Oracle Adapter Installation and Configuration guide.

 

Corrections and/or additions to the Installation and Configuration sections of the adapter guide

 

 

Chapter 1: Overview

             No updates for the current release

 

 

Chapter 2: Planning

             No updates for the current release

 

Chapter 3: Installing

 

  è Service/Target form details

 

     On the Oracle Connection tab: (Add new point)

-       Oracle SSL Version

       Specify oracle SSL version required to configure in the service to establish SSL connection.



      è  Installing in the Verify Governance Virtual Appliance


  Installing in Virtual Appliance (Chapter present under ISVG only)

For Verify Governance target management, you can install an IBM Security Verify Governance Adapters or a custom adapter on the built-in Security Directory Integrator in the virtual appliance instead of installing the adapter externally. As such, there is no need to manage a separate virtual machine or system.

About this task

This procedure is applicable to install this adapter on the virtual appliance.

Procedure

1.     Download the adapter package from the IBM Passport Advantage.
For example, Adapter-<Adaptername>.zip.
The adapter package includes the following files:

Table 1. Adapter package contents

Files

Descriptions

bundledefinition.json

The adapter definition file. It specifies the content of the package, and the adapter installation and configuration properties that are required to install and update the adapter.

Adapter JAR profile

A Security Directory Integrator adapter always include a JAR profile which contains:

       targetProfile.json

o   Service provider configuration

o   Resource type configuration

o   List of assembly lines

       A set of assembly lines in XML files

       A set of forms in XML files

       Custom properties that include labels and messages for supported languages.

 

Use the Target Administration module to import the target profile.

Additional adapter specific files

Examples of adapter specific files:

       Connector jar files

       Configuration files

       Script files

       Properties files

 The file names are specified in the adapter definition file along with the destination directory in the virtual appliance.

 

 

2.     From the top-level menu of the Appliance Dashboard, click Configure > SDI Management.

 

3.     Select the instance of the Security Directory Integrator for which you want to manage the adapters and click Manage > SDI Adapters
The SDI Adapters window is displayed with a table that list the name, version, and any comments about the installed adapters.

 

4.     On the SDI Adapters window, click Install.

 

5.     On the File Upload window, click Browse to locate the adapter package and then click OK.
For example, Adapter-<Adaptername>.zip.

6.     Provide the missing 3rd party libraries when prompted.

a.      On the File Upload for Pre-requisite files window, click Select Files.
         A new File Upload window is displayed.

b.     Browse and select all the missing libraries and files. For example, httpclient-4.0.1.jar

c.      Click Open.
        The selected files are listed in the File Upload for Pre-requisite files window.

d.     Click OK.
                    The missing files are uploaded, and the adapter package is updated with the 3rd party libraries.

7.     Enable secure communication.

a.      Select the instance of the Security Directory Integrator for which you want to manage the adapter.

b.     Click Edit.

c.      Click the Enable SSL check box.

d.     Click Save Configuration.

8.     Import the SSL certificate to the IBM Security Directory Integrator server.

a.      Select the instance of the Security Directory Integrator for which you want to manage the adapter.

b.     Click Manage > Certificates.

c.      Click the Signer tab.

d.     Click Import.
     The Import Certificate window is displayed.

e.      Browse for the certificate file.

f.       Specify a label for the certificate. It can be any name.

g.     Click Save.

 

Note: While uploading the Adapter package, you may receive System Error: A file included in the SDI Adapter zip already exists on the system and the Server Message log under Appliance tab of VA will have a reference to error com.ibm.identity.sdi.SDIManagementService  File ibm.com_IBM_Verify_Identity_Governance_xxxx.swidtag found in the adapter zip at location ILMT-Tags/ already exists in system. This is because, you can install the same swidtags only once. So, if another adapter of the same type is installed, remove the swidtags.

The ibm.com_IBM_Verify_Identity_Governance_Enterprise-xxxx.swidtag file is common to all adapters. In addition to the common swidtag file, an application adapter needs ibm.com_IBM_Verify_Identity_Governance_Application_Adapters-xxxx.swidtag file and an infra adapter needs ibm.com_IBM_Verify_Identity_Governance_Lifecycle-xxxx.swidtag and ibm.com_IBM_Verify_Identity_Governance_Compliance-xxxx.swidtag files. So, if an application adapter is already installed and this is an infra adapter, then only install the infra-specific swidtags and the other way around. Please visit Security Verify Governance Adapters v10.x link to identify the adapter type of the installed adapters.

 

Installing in an IBM Security Verify Directory Dispatcher Container

Before you begin

The steps to install adapter and related files into the container can be performed using the adapterUtil.sh script, which is shipped with the dispatcher package. This script should be staged on the machine running Kubernetes cli. The adapterUtil.sh script is also readily available in the bin directory of ISIM IBM Security Verify Governance Identity Manager Container Starter Kit installation directory (If ISVDI was selected for installation during the ISIM container installation steps).

If, for any reason, the adapter util script cannot be executed or used, the below manual instructions must be followed to copy the files to the persistent volume.

Note:  The container must be restarted after installing or uninstalling the adapter and any changes to the configuration yaml. To activate changes and restart the container run the following commands:

·       <path_to_starterkit>/bin/createConfigs.sh isvdi

·       For OpenShift container:   oc -n isvgim rollout restart deployment isvdi

·       For kubernetes container: kubectl -n isvgim rollout restart deployment isvdi

Note: This document only describes the adapterUtil.sh command options that are required to install this adapter. For other command options, such as listing installed connectors and 3rd party jars, please refer to the Dispatcher10 Installation and Configuration Guide.

Installing / Upgrading / Re-installing / Downgrading the adapter

            Using Script

Use the below command to install / upgrade/ re-install / downgrade the adapter:

/path/to/adapterUtil.sh -loadAdapter "/path/to/Adapter-<Adaptername>-*.zip" accept

Where /path/to/adapterUtil.sh is the location where the adapterUtil.sh script is installed and /path/to/Adapter-<Adaptername>-*.zip is the location where the Adapter zip file is staged on the machine running Kubernetes cli.

Manually copying files to Persistent Volume

Copy the files to the persistent volume mapped to the /opt/IBM/svgadapters directory of the container image as per the given directory structure:

ILMT-Tags

Copy below files to the <Persistent_Volume>/swidtag directory: 

ibm.com_IBM_Verify_Identity_Governance_Enterprise-xx.x.x.swidtag

ibm.com_IBM_Verify_Identity_Governance_Lifecycle-xx.x.x.swidtag  

ibm.com_IBM_Verify_Identity_Governance_Compliance-xx.x.x.swidtag  

 

Copying 3rd party libraries:

Using Script

Use the below command to copy the 3rd party jars: 

/path/to/adapterUtil.sh -copyToPatches "/path/to/ojdbc*.jar"

 

This command will copy the 3rd party jars to the <Persistent_Volume>/jars/patches directory.

 

Manually copying files to the Persistent Volume

Copy below 3rd party jar files to the <Persistent_Volume>/jars/patches directory (Refer release notes for the supported jar versions): 

-        ojdbc*.jar

 

Configuring the SSL connection between the IBM Security Verify Directory Integrator Container and the Azure AD Target

 

Refer https://www.ibm.com/docs/api/v1/content/SSCQGF_10.0.0/container/html/verify-directory-integrator.html#keyfile_trusted-certificates page from SVDI

 

If the config.yaml file which is used as the YAML_CONFIG_FILE environment variable for the container doesn't have a trusted-certificates element, follow the instructions that are provided in https://www.ibm.com/docs/api/v1/content/SSCQGF_10.0.0/container/html/verify-directory-integrator.html#keyfile_trusted-certificates to add a trusted-certificates section to the config.yaml file.

 

To add a trusted-certificates element (if it doesn't exist in current configuration) to the config.yaml file which is used as parameter for YAML_CONFIG_FILE environment variable of the container, copy SSL certificate from the oracle service and place the certificate in the certs directory of the config volume which contains the config.yaml file. The default location for this config volume is /opt/IBM/dispatcher/config.

 

Provide this path of the certificate in config.yaml file as shown in the example below:

 

keyfile:

  trusted-certificates:

- '@/opt/IBM/dispatcher/config/certs/oracle-certificate.crt'

 

Enabling TLS 1.2

Refer https://www.ibm.com/docs/api/v1/content/SSCQGF_10.0.0/container/html/verify-directory-integrator.html#advanced page from SVDI to add an advanced configuration element (if it don’t exist in current configuration) to the config.yaml file which is used as parameter for YAML_CONFIG_FILE environment variable of the container.

If the config.yaml file which is used as the YAML_CONFIG_FILE environment variable for the container doesn't have an advanced configuration element, follow the instructions that are provided in https://www.ibm.com/docs/api/v1/content/SSCQGF_10.0.0/container/html/verify-directory-integrator.html#advanced to add an advanced configuration section to the config.yaml file.

To enable TLSv1.2, add 2 attr and value key pair (as mentioned in the SVDI guide) as below: 

- attr: com.ibm.di.SSLProtocols

  value: 'TLSv1.2'

- attr: com.ibm.di.SSLServerProtocols

  value: 'TLSv1.2'

Enabling debug logs and disabling json-logging

If the config.yaml file which is used as the YAML_CONFIG_FILE environment variable for the container doesn't have root-level and json-logging configuration elements, follow the instructions that are provided in https://www.ibm.com/docs/api/v1/content/SSCQGF_10.0.0/container/html/verify-directory-integrator.html#general_logging to the add root-level and json-logging configuration elements section to the config.yaml file.

Refer https://www.ibm.com/docs/api/v1/content/SSCQGF_10.0.0/container/html/verify-directory-integrator.html#general_logging page from SVDI to add root-level and json-logging configuration elements (if they don’t exist in current configuration) to the config.yaml file which is used as parameter for YAML_CONFIG_FILE environment variable of the container.

To enable debug logs, set the value for root-level to debug. To  disable json logging, set the value for json-logging element to false

Uninstalling the adapter

Using Script

Use the below command to remove the adapter: 

/path/to/adapterUtil.sh -removeAdapter Adapter-<Adaptername> 

Manually removing files from the Persistent Volume

Remove files from the given directory structure of the persistent volume mapped to the /opt/IBM/svgadapters directory of the container image.

Note: Some 3rd party jars and ILMT-Tags files might be common with other installed adapters, and hence should not be removed while uninstalling this adapter:

ILMT-Tags

Remove below files from <Persistent_Volume>/swidtag directory:

ibm.com_IBM_Verify_Identity_Governance_Enterprise-xx.x.x.swidtag

ibm.com_IBM_Verify_Identity_Governance_Lifecycle-xx.x.x.swidtag  

ibm.com_IBM_Verify_Identity_Governance_Compliance-xx.x.x.swidtag  

                                                               3rd party jars

Remove the appropriate version of the 3rd party jar files used by this adapter as listed below from the <Persistent_Volume>/jars/patches directory:

 ojdbc*.jar

  

 

Chapter 4: Upgrading

                 No changes

 

Chapter 5: Configuring

                Configuring OCI for Transparent Application Failover

                     Configuring the OCI connection

                            Configuring the Oracle adapter

                                In the step 3 add  below line:

                                   To update ibmdisrv in Linux,
                              1.  Locate below code in ibmdisrv file

                              PATH="$TDI_HOME_DIR:$TDI_JAVA_BIN_DIR:$PATH"

                             2. Update as below

                              PATH="$TDI_HOME_DIR:$TDI_JAVA_BIN_DIR:<TDI_JAVA_LIB_DIR_PATH>:<ORACLE_HOME_BIN>:$PATH"

 

 

Chapter 6: Troubleshooting

             Enabling DEBUG Logs on SDI Server

                          Procedure:

1.     Stop the SDI Server process

 

                          Pre-7.2.0-ISS-SDI-FP0008

                          2. Edit the <SDI_Solution_Directory>/etc/log4j.properties

                          3. Modify the following line:

                                      log4j.rootCategory=INFO, Default

                                      to

                                      log4j.rootCategory=DEBUG, Default

 

                          Post-7.2.0-ISS-SDI-FP0008

                          2. Edit the <SDI_HOME_Directory>/etc/log4j2.xml

                          3. Modify the following line:

                                      <Root level="info">

                                     to

                                      <Root level="debug">

 

                          Post-7.2.0-ISS-SDI-FP0011

                          4. To enable TCB block in debug

                          5. Append the line com.ibm.di.logging.close=false in the the <SDI_HOME_Directory>/etc/global.properties file.

                          

                          6. Start the SDI Server process

                          7. Re-create the problem and collect the <SDI_Solution_Dir>/logs/ibmdi.log

 

                   Logs are not getting printed in FP13 in Windows OS:

                          To fix this issue copy log4j2.xml file from <SDI_Home_Dir>/etc and add to the <SDI_Solution_Dir>/etc (which was missing there). Then configure <SDI_Solution_Dir>/ibmdiservice.props with

                          jvmcmdoptions=-Dlog4j2.configurationFile=etc\log4j2.xml 

 

 

Chapter 7: Reference

             No updates for the current release

 

 

Supported Configurations

 

       Supported third-party client libraries:

 

·      ojdbc8.jar (https://www.oracle.com/in/database/technologies/appdev/jdbc-downloads.html)

 

        Installation Platform

        The IBM Security Verify Governance Adapter for Oracle Adapter was built and tested on the following product versions.

 

       Adapter Installation Platform:

        Due to continuous Java security updates that may be applied to your IBM Security Verify Governance server and IBM Security Verify Governance Identity Manager server, the following SDI releases are the officially supported versions:
           
-  Security Directory Integrator 7.2 + FP14
          -  Security Verify Directory Integrator 10.0.0 + LA0002*
* The Dispatcher version 10.0.2 doesn't support installation using LA0002, please install the Dispatcher10 prior to installing LA0002.
 

 

       Note:  Earlier versions of SDI that are still supported may function properly, however to resolve any communication errors, you must upgrade your SDI releases to the officially supported versions by the adapters. Please refer to the adapter's installation and configuration guides for the latest update on IBM Security Directory Integrator versions and fix packs

 

 Managed Resource:

·       Oracle 19c (non-container database)

·       Oracle 19c (Container database)

·       Oracle 21c (Container database)

Supported IBM Security Verify servers

     ·       IBM Verify Identity Governance v11.0

     ·        IBM Security Verify Governance Identity Manager v10.0*

     ·       IBM Security Verify Governance v10.0

* Unless this document specifies a specific fix pack version of ISVG Identity Manager v10, we expect the adapter to work with ISIM 6 as well. However, it will only be debugged and fixed from the perspective of ISVG-IM v10.

 

Notices

This information was developed for products and services offered in the U.S.A. IBM may not offer the products, services, or features discussed in this document in other countries. Consult your local IBM representative for information on the products and services currently available in your area. Any reference to an IBM product, program, or service is not intended to state or imply that only that IBM product, program, or service may be used. Any functionally equivalent product, program, or service that does not infringe any IBM intellectual property right may be used instead. However, it is the user's responsibility to evaluate and verify the operation of any non-IBM product, program, or service.

IBM may have patents or pending patent applications covering subject matter described in this document. The furnishing of this document does not give you any license to these patents. You can send license inquiries, in writing, to:

 

IBM Director of Licensing

IBM Corporation

North Castle Drive

Armonk, NY  10504-1785  U.S.A.

For license inquiries regarding double-byte (DBCS) information, contact the IBM Intellectual Property Department in your country or send inquiries, in writing, to:

Intellectual Property Licensing

Legal and Intellectual Property Law

IBM Japan, Ltd.

1623-14, Shimotsuruma, Yamato-shi

Kanagawa 242-8502 Japan

 

This information could include technical inaccuracies or typographical errors. Changes are periodically made to the information herein; these changes will be incorporated in new editions of the publication. IBM may make improvements and/or changes in the product(s) and/or the program(s) described in this publication at any time without notice.

Any references in this information to non-IBM Web sites are provided for convenience only and do not in any manner serve as an endorsement of those Web sites. The materials at those Web sites are not part of the materials for this IBM product and use of those Web sites is at your own risk.

IBM may use or distribute any of the information you supply in any way it believes appropriate without incurring any obligation to you.

Licensees of this program who wish to have information about it for the purpose of enabling: (i) the exchange of information between independently created programs and other programs (including this one) and (ii) the mutual use of the information which has been exchanged should contact:

 

IBM Corporation
2ZA4/101
11400 Burnet Road
Austin, TX 78758  U.S.A.

 

Such information may be available, subject to appropriate terms and conditions, including in some cases, payment of a fee.

The licensed program described in this information and all licensed material available for it are provided by IBM under terms of the IBM Customer Agreement, IBM International Program License Agreement, or any equivalent agreement between us.

Any performance data contained herein was determined in a controlled environment. Therefore, the results obtained in other operating environments may vary significantly. Some measurements may have been made on development-level systems and there is no guarantee that these measurements will be the same on generally available systems. Furthermore, some measurements may have been estimated through extrapolation. Actual results may vary. Users of this document should verify the applicable data for their specific environment.

Information concerning non-IBM products was obtained from the suppliers of those products, their published announcements or other publicly available sources. IBM has not tested those products and cannot confirm the accuracy of performance, compatibility or any other claims related to non-IBM products. Questions on the capabilities of non-IBM products should be addressed to the suppliers of those products.

Trademarks

 

IBM, the IBM logo, and ibm.com are trademarks or registered trademarks of International Business Machines Corp., registered in many jurisdictions worldwide. Other product and service names might be trademarks of IBM or other companies. A current list of IBM trademarks is available on the Web at "Copyright and trademark information" at www.ibm.com/legal/copytrade.shtml.

Microsoft, Windows, and the Windows logo are trademarks of Microsoft Corporation in the United States, other countries, or both.

Java and all Java-based trademarks and logos are trademarks or registered trademarks of Oracle and/or its affiliates.