IBM Support

Tivoli Access Manager for e-Business WebSEAL, Patch 5.1.0.39-TIV-AWS-IF0040

Download


Abstract

This is a Interim Fix (IF) patch prerequing 5.1.0-TIV-TAM-FP0039 and 5.1.0-TIV-AWS-FP0039.

Download Description


1.0 ABOUT THIS PATCH
--------------------
This patch package contains fixes for problems in the various components that
comprise the Tivoli Access Manager WebSEAL software.


1.1 Patch Contents

This patch package contains:

- This README file
- Update patch packaging


1.2 Architectures

This patch package applies to the following architectures:

- IBM AIX(R) 5.1 and 5.2
- IBM AIX(R) 5.3 with
1.xlC.rte (6.0.0.0 C Set ++ Runtime)
2.xlC.aix50.rte (6.0.0.13 C Set ++ Runtime for AIX 5.0)
3.bos.rte.libc (5.3.0.0 libc Library)
- Sun Solaris Operating Environment 2.8, 2.9, and 10
- HP-UX 11 and 11i
- Red Hat Enterprise Linux 3.0 update 3 Intel
- SuSE SLES8 for IA32
- SuSE SLES8 for zSeries(R) (31-bit systems) with SP 2
- Microsoft Windows 2000 Server and Advanced Server with SP 3
- Microsoft Windows 2003 Standard Server and Enterprise Server


NOTE: SuSE Linux is one of four partner companies whose products are
based on UnitedLinux 1.0; other companies being the SCO Group,
Turbolinux, and Conectiva. When SuSe Linux Enterprise Server (SLES)
is listed as supported, other partner companies' products based on
UnitedLinux 1.0 support is implied as well. For more information,
consult the UnitedLinux Web site at:
http://www.unitedlinux.com


1.3 Patches Superseded

All patches are cumulative unless otherwise explicitly stated.

Patches superseded by this patch:

5.1.0-TIV-AWS-FP0039
5.1.0-TIV-AWS-FP0038
5.1.0-TIV-AWS-FP0036
5.1.0-TIV-AWS-FP0034
5.1.0-TIV-AWS-FP0032
5.1.0-TIV-AWS-FP0030
5.1.0-TIM-AWS-FP0026
5.1.0-TIM-AWS-FP0024
5.1.0-TIM-AWS-FP0022
5.1.0-TIM-AWS-FP0020
5.1.0-TIM-AWS-FP0017
5.1.0-TIM-AWS-FP0015
5.1.0-TIV-AWS-FP0013
5.1.0-TIV-AWS-FP0009
5.1.0-TIV-AWS-FP0006
5.1-AWS-FP04
5.1-AWS-FP02
5.1-AWS-0001


1.4 Dependencies

IBM Tivoli Access Manager Base, Version 5.1 with patch 5.1.0-TIV-TAM-FP0039
IBM Tivoli Access Manager WebSEAL, Version 5.1
GSKit Version 7.0.4.28

NOTE: IBM Tivoli Access Manager Base, Version 5.1 patch 5.1.0-TIV-TAM-FP0039
needs to be installed in the same system where this patch will
be installed as well as the above mentioned GSKit Version.
Please follow the 5.1.0-TIV-TAM-FP0039.README about how to install that
patch.


2.0 APARS AND DEFECTS FIXED
---------------------------
Because patches are cumulative, this patch corrects all the problems
outlined in the following sections.


2.1 Problems Fixed by Patch 5.1.0.39-TIV-AWS-IF0040

APAR IZ91619
Symptom: WebSEAL security update.

Prerequisites

IBM Global Security Toolkit (GSKit) version 7.0.4.28

[{"PRLabel":"GSKit Version 7.0.4.28","PRLang":"English","PRSize":"1111111","PRPlat":{"label":"Platform Independent","code":"PF025"},"PRURL":"https://www14.software.ibm.com/webapp/iwm/web/reg/pick.do?source=gskitupdt"}]

Installation Instructions


3.0 BEFORE INSTALLING THIS PATCH
--------------------------------
Before installing this patch, review the following prerequisites and
dependencies.


3.1 Back up Tivoli Access Manager data

Before applying any maintenance, be sure to back up your system. Use
the pdbackup command provided with the Tivoli Access Manager product
to back up Tivoli Access Manager-specific data. Documentation for the
pdbackup command is located in the "IBM Tivoli Access Manager Command
Reference, Version 5.1."


3.2 Upgrade GSKit to Version 7.0.4.28

Upgrade the IBM Global Security Toolkit (GSKit) to version 7.0.4.28
BEFORE installing the Tivoli Access Manager packages in this patch.

The updated GSKit installation packages may be downloaded at the URL:

https://www14.software.ibm.com/webapp/iwm/web/reg/download.do?source=gskitupdt&S_PKG=GSKit_7.0.4.28

After downloading the updated GSKit installation packages, use the
instructions located in the 5.1.0-TIV-TAM-FP0039.README to install the upgraded
GSKit packages.


4.0 INSTALLING THIS PATCH
-------------------------
Before installing this patch, be sure that you have reviewed the
prerequisites and have completed the back up procedure in section 3.0,
"BEFORE INSTALLING THIS PATCH".

If the Tivoli Access Manager product is distributed over multiple machines,
this patch must be applied to all WebSEAL systems within a secure domain.

This README assumes that $PATCH (or %PATCH% for Windows) is the path to
your temporary directory.


4.1 Installing this patch on AIX systems

1. Log in to the system as root.

2. Extract the archive into a temporary directory. For the
purpose of this README, assume that the symbol $PATCH
points to this temporary directory.

3. Stop the Tivoli Access Manager processes:

/opt/pdweb/bin/pdweb_start stop

4. At the command prompt, enter the following:

installp -a -g -X -d $PATCH <package>

where <package> is the following:

PDWeb.Web Specifies the Access Manager WebSEAL Server

5. Restart the Tivoli Access Manager processes:

/opt/pdweb/bin/pdweb_start start



4.2 Installing this patch on HP-UX systems


1. Log in to the system as root.

2. Extract the archive into a temporary directory. For the
purpose of this README, assume that the symbol $PATCH
points to this temporary directory.

3. Stop the Tivoli Access Manager processes:

/opt/pdweb/bin/pdweb_start stop

4. At the command prompt, enter the following:

swinstall -s $PATCH/<package> <patch>

where <package> and <patch> are
the following:

<package> <patch>
--------------------------------- -------------
PDWEB000510-40.depot PDWeb

5. Restart the Tivoli Access Manager processes:

/opt/pdweb/bin/pdweb_start start


4.3 Installing this patch on Linux systems


1. Log in to the system as root.

2. Extract the archive into a temporary directory. For the
purpose of this README, assume that the symbol $PATCH
points to this temporary directory.

3. Stop the Access Manager processes.

/opt/pdweb/bin/pdweb_start stop

4. At the command prompt, enter the following:

rpm -U <patchname>

where <patchname> is the following:

Linux on xSeries(R)

PDWeb-PD-5.1.0-40.i386.rpm

Linux on zSeries

PDWeb-PD-5.1.0-40.s390.rpm

Linux on pSeries(R) and iSeries

PDWeb-PD-5.1.0-40.ppc.rpm


Note:
If Tivoli Access Manager is already configured, you
might need to install with the --noscripts flag:

rpm -U --noscripts <patchname>

5. Restart the Tivoli Access Manager processes:

/opt/pdweb/bin/pdweb_start start


4.4 Installing this patch on Solaris Operating Environment systems

1. Log in to the system as root.

2. Extract the archive into a temporary directory. For the
purpose of this README, assume that the symbol $PATCH
points to this temporary directory.

3. Stop the Tivoli Access Manager processes:

/opt/pdweb/bin/pdweb_start stop

4. At the command prompt, enter the following:

cd $PATCH
patchadd <package>

where <package> is the following:


PDWEB000510-40 Specifies the TAM WebSEAL Server


5. Restart the Tivoli Access Manager processes:

/opt/pdweb/bin/pdweb_start start


4.5 Installing this patch on Windows systems

1. Log in to the Windows system as the Administrator.

2. Shut down the Tivoli Access Manager WebSEAL server:
a. From Control Panel -> Services click Access Manager
WebSEAL Server and then click Stop.
b. To confirm this action, click Yes.

3. Unpack the self-extracting archive into a temporary
directory. For the purpose of this README, assume that
%PATCH% points to this temporary directory.

4. Change to the patch directory and run the install command:

cd %PATCH%
5.1.0.39-TIV-AWS-IF0040-WIN.exe

Note: If, for any reason, you have to reboot your system to
complete this installation (for example, to overcome a
shared DLLs problem), you might subsequently encounter a
problem running the Web Portal Manager to access the console.
If this happens, confirm that the WebSphere service is
running. The WebSphere service is installed in manual startup
mode and might not be running after a reboot.

5. Restart the Tivoli Access Manager WebSEAL server:

From the Windows Start menu, click:

a. Settings -> Control Panel -> Administrative Tools -> Services
b. Click Access Manager WebSEAL Server -> Start
c. Click IBM WS AdminServer -> Start



5.0 UNINSTALLING THIS PATCH
---------------------------

NOTE: Uninstallation is not available on Microsoft Windows systems.

If the Tivoli Access Manager product is distributed over multiple machines,
uninstall this patch on those systems in the reverse order as it was applied.

To remove the patch on UNIX systems, perform the following steps.

1. Log in to the system as root.

2. Stop the Tivoli Access Manager processes:

/opt/pdweb/bin/pdweb_start stop

3. At the command prompt, enter the following:

On AIX, reject the applied patch:

installp -r <package>

where <package> is the following:

PDWeb.Web


On HP-UX, remove the patch:

swremove <patch>

where <patch> is the following:

PDWeb


On Linux, apply the previous patch level:

rpm -U --oldpackage <old_package>

where <old_package> is the following:

Linux on xSeries

PDWeb-PD-5.1.0-0.i386.rpm

Linux on zSeries

PDWeb-PD-5.1.0-0.s390.rpm


Linux on pSeries and iSeries

PDWeb-PD-5.1.0-0.ppc.rpm


On Solaris, remove the patch:

patchrm <package>

where <package> is the following:

PDWEB000510-40


4. Restart the Tivoli Access Manager processes:

/opt/pdweb/bin/pdweb_start start

[{"INLabel":"5.1.0.39-TIV-AWS-IF0040.README","INLang":"English","INSize":"147639","INURL":"http://www-933.ibm.com/support/fixcentral/"}]
On
[{"DNLabel":" 5.1.0.39-TIV-AWS-IF0040-AIX.tar.Z","DNDate":"1/15/2011","DNLang":"English","DNSize":"2215719","DNPlat":{"label":"AIX","code":"PF002"},"DNURL":"http://www.ibm.com/support/fixcentral/quickorder?source=dbluesearch&product=ibm%2FTivoli%2FIBM+Tivoli+Access+Manager+for+e-business&vrmf=5.1.0.39&fixids=5.1.0.39-TIV-TAM-IF0040-AIX","DNURL_FTP":" ","DDURL":null},{"DNLabel":"5.1.0.39-TIV-AWS-IF0040-HP.tar.Z","DNDate":"1/15/2011","DNLang":"English","DNSize":"5111517","DNPlat":{"label":"Platform Independent","code":"PF025"},"DNURL":"http://www.ibm.com/support/fixcentral/quickorder?source=dbluesearch&product=ibm%2FTivoli%2FIBM+Tivoli+Access+Manager+for+e-business&vrmf=5.1.0.39&fixids=5.1.0.39-TIV-TAM-IF0040-HP","DNURL_FTP":" ","DDURL":null},{"DNLabel":"5.1.0.39-TIV-AWS-IF0040-SOL.tar.Z","DNDate":"1/15/2011","DNLang":"English","DNSize":"3783018","DNPlat":{"label":"Solaris","code":"PF027"},"DNURL":"http://www.ibm.com/support/fixcentral/quickorder?source=dbluesearch&product=ibm%2FTivoli%2FIBM+Tivoli+Access+Manager+for+e-business&vrmf=5.1.0.39&fixids=5.1.0.39-TIV-TAM-IF0040-SOL","DNURL_FTP":" ","DDURL":null},{"DNLabel":"5.1.0.39-TIV-AWS-IF0040-WIN.exe","DNDate":"1/15/2011","DNLang":"English","DNSize":"7511924","DNPlat":{"label":"Windows Server 2003","code":""},"DNURL":"http://www.ibm.com/support/fixcentral/quickorder?source=dbluesearch&product=ibm%2FTivoli%2FIBM+Tivoli+Access+Manager+for+e-business&vrmf=5.1.0.39&fixids=5.1.0.39-TIV-TAM-IF0040-WIN","DNURL_FTP":" ","DDURL":null},{"DNLabel":"5.1.0.39-TIV-AWS-IF0040-LIN.tar","DNDate":"1/15/2011","DNLang":"English","DNSize":"2997711","DNPlat":{"label":"Linux","code":"PF016"},"DNURL":"http://www.ibm.com/support/fixcentral/quickorder?source=dbluesearch&product=ibm%2FTivoli%2FIBM+Tivoli+Access+Manager+for+e-business&vrmf=5.1.0.39&fixids=5.1.0.39-TIV-TAM-IF0040-LIN","DNURL_FTP":" ","DDURL":null},{"DNLabel":"5.1.0.39-TIV-AWS-IF0040-S390.tar","DNDate":"1/15/2011","DNLang":"English","DNSize":"2446880","DNPlat":{"label":"Linux on zSeries","code":""},"DNURL":"http://www.ibm.com/support/fixcentral/quickorder?source=dbluesearch&product=ibm%2FTivoli%2FIBM+Tivoli+Access+Manager+for+e-business&vrmf=5.1.0.39&fixids=5.1.0.39-TIV-TAM-IF0040-S390","DNURL_FTP":" ","DDURL":null}]
[{"Product":{"code":"SSPREK","label":"Tivoli Access Manager for e-business"},"Business Unit":{"code":"BU059","label":"IBM Software w\/o TPS"},"Component":"WebSEAL","Platform":[{"code":"PF002","label":"AIX"},{"code":"PF016","label":"Linux"},{"code":"PF025","label":"Platform Independent"},{"code":"PF027","label":"Solaris"},{"code":"PF033","label":"Windows"},{"code":"PF035","label":"z\/OS"}],"Version":"5.1","Edition":"","Line of Business":{"code":"LOB24","label":"Security Software"}}]

Problems (APARS) fixed
IZ91619;IZ18258;IZ25866;IZ28161;IZ50238;IZ70736;IZ68681;IZ63163;IZ55503;IZ50238;IZ48111;IZ25866;IZ36950;IZ35150;IZ34712;IZ31748;IZ13792;IZ14045;IZ17083;IZ14045;IZ13792;IZ17083;IZ10008;IZ11655;IZ13657;IZ10811;IZ05438;IZ04849;IZ04668;IZ04679;IZ09966;IZ09967;IZ00793;IZ03065;IY96223;IY97626;IY87771;IY90982;IY93023;IY95397;IY93446;IY91823;IY91112;IY92997;IY86737;IY91387;IY86797;IY87036;IY87133;IY87964;IY89384;IY89713;IY88062;IY82621;IY83227;IY84483;IY86832;IY87073;IY87306;IY85752;IY78998;IY79279;IY79465;IY79517;IY80570;IY80788;IY80835;IY81819;IY82093;IY82120;IY83248;IY83546;IY84156;IY84455;IY74602;IY74894;IY76359;IY77902;IY77993;IY78392;IY78462;IY79328;IY77242;IY73535;IY73720;IY74327;IY74836;IY75117;IY77513;IY75809;IY69275;IY69998;IY70002;IY70071;IY71424;IY71792;IY72206;IY72402;IY72447;IY72912;IY73240;IY73284;IY74222;IY74759;IY49655;IY54105;IY65436;IY67264;IY67376;IY67778;IY68047;IY68167;IY68337;IY68421;IY68773;IY69442;IY69993;IY70227;IY48974;IY53870;IY58363;IY62229;IY62319;IY63406;IY63700;IY63386;IY63809;IY63847;IY65131;IY65805;IY56386;IY58298;IY58325;IY58516;IY58997;IY59095;IY59640;IY59987;IY63066;IY63067;IY63068;IY63069;IY63070;IY63073;IY63074;IY56878;IY54986;IY59576;IY55367;IY56902;IY58289;IY53179;IY55117;IY55120;IY55336;IY55478;IY57662;IY57663;IY57664;IY57665;IY46618;IY46695;IY47032;IY48098;IY49645;IY49886;IY49943;IY50317;IY50332;IY51074;IY51525;IY51261;IY53464;IY53474;IY47522;IY49886;IY50317;IY51261;IY52390;IY53475;IY53637;IY53897;IY54986;IY55367;IY56542;IY56902;IY57186;IY57544;IY58348;IY58445;IY59576;IY61297;IY61959;IY64351;IY65436;IY65998;IY66932;IY67398;IY67758;IY69063;IY69993;IY70071;IY70268;IY70884;IY71685;IY71987;IY72402;IY72614;IY72745;IY73286;IY74052;IY74261;IY74618;IY74759;IY75033;IY75372;IY75809;IY77010;IY79257;IY79911;IY82093;IY82120;IY82621;IY83227;IY84076;IY85268;IY86806;IY90315;IY90379;IY57662;IY57663;IY57665;IZ70666;IZ78235;IZ73566

Document Information

Modified date:
15 June 2018

UID

swg24025790