Release Notes



IBM® Security Verify Governance Adapter for

Broadcom Top Secret


























Version 10.0.4

Second Edition (December 13, 2023)

This edition applies to the current release of IBM Security Verify Governance Adapter for Top Secret and to all subsequent releases and modifications until otherwise indicated in new editions.

Copyright International Business Machines Corporation 2003, 2022. All rights reserved.
US Government Users Restricted Rights -- Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp.


Contents



Table of Contents

Preface 4

Adapter Features and Purpose 4

IBM Security Verify Service Groups Management 4

License Agreement 4

Contents of this Release 5

Adapter Version 5

New Features 6

Closed Issues 8

Known Issues 12

Installation and Configuration Notes 13

Upgrading to the current release 13

Configuration 13

Communication 13

Profiles contained in this package 13

Starting and stopping the adapter 14

Customizing or Extending Adapter Features 14

Getting Started 14

Support for Customized Adapters 14

Installing the adapter language pack 14

IBM Security Verify Resources: 15

Updates to the Broadcom Top Secret for z/OS Adapter installation and Configuration Guide 16

Overview 16

Planning 16

Installing 16

Upgrading 16

Configuring 16

Configuration Notes 16

Troubleshooting 17

Reference 17

Troubleshooting Broadcom Top Secret Adapter errors 18

Troubleshooting profile issues. 18

Supported Configurations 19

Installation Platform 19

Trademarks 22



Preface

Welcome to the IBM Security Verify Governance Broadcom Top Secret Adapter.


These Release Notes contain information for the following products that was not available when the IBM Security Verify Governance Adapter manuals were created:


Adapter Features and Purpose

The Broadcom Top Secret Adapter is designed to create and manage Broadcom Top Secret accounts. The adapter runs in ”agent” mode and must be installed on z/OS. One adapter is installed per Broadcom Top Secret Database, but the Broadcom Top Secret Adapter may be configured to support a subset of the accounts through the scope of authority feature on the Broadcom Top Secret Service Form.


The deployment configuration is based, in part, on the topology of your network domain, but the primary factor is the planned structure of your Identity Provisioning Policies and Approval Workflow process. Please refer to the IBM Knowledge Center for a discussion of these topics.


The Verify Governance Adapters are powerful tools that require administrator level authority. Adapters operate much like a human system administrator, creating accounts, permissions and home directories. Operations requested from the Verify server will fail if the adapter is not given sufficient authority to perform the requested task. IBM recommends that this adapter run with administrative permissions.

IBM Security Verify Governance Service Groups Management

By service groups, IBM Security Verify Governance - Identity Manager is referring to any logical entity that can group accounts together on the managed resource.


Managing service groups implies the following:

Create service groups on the managed resource.

Modify attribute of a service group.

Delete a service group.


Note that service group name change is not supported in the current IBM Security Verify Governance

Adapter editions.

The Broadcom Top Secret Adapter does not support service groups management.




License Agreement

Review and agree to the terms of the IBM Security Verify Governance product license prior to using this product. The license can be viewed from the "license" folder included in the product package.

Contents of this Release

Adapter Version

Component

Version

Build Date

June 13, 2022

Adapter Version

10.0.4

Component Versions

Adapter Build 10.0.004000

Profile 10.0.004.00

ADK 10.0.003.00 z/OS

Documentation

Please check out the latest documentation on the IBM Security Verify Governance Documentation Center.

Select the latest server release to navigate to the latest adapter guides.



New Features

Internal#

RFE/CASE#

Description




Items included in the current release

RTC 190581


Support for z/OS 2.5

SVGAD-1095

ADAPT-140

Support for z/OS 3.1




Items included in release 10.0.3



No items included in this release




Items included in release 10.0.2

RTC 189230


Remove APPC dependency from Top Secret adapter

RTC 189232


abort if tag is missing




Items included in release 10.0.1

RTC 187573


Rebranding IBM Security Identity to IBM Security Verify




Items included in release 7.1.21

RFE 61969

RFE 142733

Add department full name to support automated employee transfer between branches.

RTC 187271

N/A

Add managed resource version.

RTC 187270

N/A

Define full Top Secret Profile name as the Master Description for entitlement type CATSSGroupProfile in IGI.

RFE 62721

RFE 144798

Add PHRASEONLY attribute




Items included in release 7.1.20



No items included in this release




Items included in release 7.1.19



No items included in this release




Items included in release 7.1.18



No items included in this release




Items included in release 7.1.17



No items included in this release




Items included in release 7.1.16

RTC 182213


IGI 5.2.5 support -

As an adapter developer for z/OS I need to add support for supporting data and canonical values to the IGI profiles




Items included in release 7.1.15



No items included in this release




Items included in release 7.1.14



No items included in this release




Items included in release 7.1.13



No items included in this release




Items included in release 7.1.13

RTC 52661

RTC 173352

115005

As an AD for z/OS developer I need to offer the ability to explicitly disable TLS1.0 in all ADK based adapters.

RTC 173354

TS000074249

As an ADK for z/OS developer I need to add diagnostic messages to the ADK that allow troubleshooting 2-way ssl connections

RTC 173351


As an ADK for z/OS developer I need to upgrade to OpenSSL 1.0.2n




Items included in release 7.1.12

RTC163066


As a Top Secret adapter customer, I would like to use the adapter in an IBM Security Verify Governance and Intelligence (IGI) environment.




Items included in release 7.0.11

RTC166462

32451

TSS access FACILITIES as supporting data

RTC71407


MATCHLIM support

RTC163356


Enable SSL by default in the ISPF installation panels





Items included in release 7.0.10

RTC154238


Update OpenSSL to release 1.0.2j

RTC154263

PMR 42182,122,000

Disable SSLV3 and RC4 ciphers and certify TLS 1.1 / 1.2 is supported by the ADK

RTC156347

32546


Adapter appears to be running while it was unable to connect to the socket.

RTC149041



Add two initial lines to CustomLabels.properties which are required for translation and update the profile version to match the adapter version.




Items included in release 7.0.9



No items included in this release




Items included in release 7.0.8



User lookup APPC configuration (see Configuration notes section below)

RTC 115559

35062

21865

ertopzdivisionacid, ertopzdepartmtacid and ertopzzoneacid attributes modification


RTC 125711


33906


ISIM Top Secret Adapter compatibility with Passphrase



ISIM 6.0.2 release


Closed Issues

Internal#

APAR/CASE#

Description





Items closed in the current release

RTC 190566

TS008810700

Top Secret TSS0598E errors in the adapter log


RTC 190565

TS008810700

Top Secret Accounts out of sync in ISIM







Items included in release 10.0.3

RTC 189819

TS006522378

Add _CEE_RUNOPTS to adapter start script

RTC 189820


To remove an ERTOPZSECLABEL we need to specify the label too, not just REM(acid) SECLABEL




Items included in release 10.0.2

RTC 189233

TS005561111

invalid servicegroup mapping results in CTGIMU551E/CTGIMF007E directory server error

RTC 189234

TS005537447

CEE3204S The system detected a protection exception (System Completion Code=0C4).

From entry point _adkRegistryGetSubFolderString at compile unit offset +000001F0 at entry offset +000001F0 at

address 121B4110.

RTC 189235

TS004946716

CEE3204S The system detected a protection exception (System Completion Code=0C4)
From entry point _payloadFree at compile unit offset +00000060 at entry  offset +00000060 at address 33E4DE70.




Items included in release 10.0.1

RTC 187968


Upgrade to Expat 2.2.10

RTC 187969


DEFECT - remove profile() returns warning




Items included in release 7.1.21

RTC 187269

N/A

Error in canonical value mapping for erTopzOPCLASS




Items included in release 7.1.20

RTC 186767

TS003554276

ISIM_ADAPTER_CIPHER_LIST variable is not having any effect with RACF adapter 6.0.39

RTC 186768

TS003680545

Error when processing unmodified values in reply message

RTC 186769

TS003568847

Abend when processing reconciliation request xmls




Items included in release 7.1.19

RTC 186218

TS003341275

Adapter STC does not abort when running out of memory required for

new connection pthreads.

RTC 186213

TS003405510

vulnerability CVE-2016-2183(SWEET32) reported on ISIM V6.0

RTC 186214

DT040780/TS0

01615497

Memory leak in ConnectionTest operations.




Items included in release 7.1.18

RTC 184015

TS002309740

Adapter abend 40D, RC10 with the below messages in the CEEDUMP

5 _ermAlloc +00000076 libErmApi.dll Call

6 ErmSBCSStrtoUCS2Str

+000000C0 libErmApi.dll


RTC 184017

TS002309740

Excessive non-ISIM server connections causing abend

Starting SSL handshake (OpenSSL)...

Handshake failed. Error code: 1

SD_SEND to socket

Start SSL cleanup

Shutting down SSL server...

Received a segmentation violation...

RTC 183205

TS000891911

Debug output in agentCfg tool causes DAML protocol configuration issues.

RTC 183798

TS001862044

Small ListNew allocations result in abend when receiving unexpected results in account Modify output.

RTC 184032

TS002211805

APPC class defined as hardcoded A in AGTSJB06 for single account lookup transaction




Items included in release 7.1.17

RTC 182687


Disallow external calls to agentCfg port

RTC 182516

IJ12296

Reconciliation doesn't return all accounts.

RTC 182686


Upgrade to OpenSSL 1.0.2.q




Items included in release 7.1.16

RTC 182224

TS001778432

As an adapter for Top Secret adapter developer I need to add service groups definitions for ISIGADI

RTC 181308


Upgrade to ICU 3.6

RTC 181309

TS000891911

Hebrew writing direction

RTC 181310


Upgrade to Expat 2.2.6

RTC 181303


Upgrade to z/OS ADK 6.0.6




Items included in release 7.1.15

RTC 179043


Upgrade to OpenSSL 1.0.2p




Items included in release 7.1.14

RTC 174696


As an ADK for z/OS developer I need to upgrade to OpenSSL 1.0.2o to address PSIRT CVE-2018-0739

RTC 176722

TS000113385

TS 7.1.12 throws "java.lang.NullPointerException"





Items included in release 7.1.13

RTC 173353

TS000114491

As an ADK for z/OS developer I need to ensure that manually dropping the DAML_PORT socket doesn't result in a loop

RTC 173360

TS000013259

Since installing 6.0.29 customer cannot longer change the DAML password

RTC 173723


Attempt to destroy context for invalid socket results in dump in _ermListFree




Items included in release 7.1.12

RTC169659


PSIRT Malformed X.509 IPAddressFamily could cause OOB read (CVE-2017-3735)




Items included in release 7.0.11

RTC166463

PMR 22742,003,756

RSA key length used by certTool increased from 1024 to 4096, which allows it to be NIST compliant beyond 2021.

RTC166463


Unmodified attribute values for failed add/remove profile operations not returned to the server




Items included in release 7.0.10

RTC156346


Attribute values following the string PASSWORD are masked in the adapter log

RTC156842

PMR 17895,001,862

Heap storage problem in RACF agent

CEE3204S The system detected a protection exception (System Completion Code=0C4).

From entry point _ermFree at compile unit offset +0000008A at entry offset +0000008A at address 2500BF4A.




Items included in release 7.0.9

RTC

149789


ICN 1469 - UNIX File Directory Usage for N/A N/A

RTC 147988

PMR 30634,082,000

ACID Profiles numbering sequence gets changed on reconciliation


RTC 149790

PMR 14970,082,000

TopSecret support for Z/OS V2.2, R16





Items included in release 7.0.8



No items included in this release

Known Issues

INTERNAL#

APAR/CASE#

Description

RTC67316


Earlier releases of the Broadcom Top Secret Adapter do not place a password on the Broadcom Top Secret ACID adapter when created. IBM supports the use of a password on this account. Please note that adding a password to the Verify Governance Adapter ACID may result in the console prompting for the password at adapter start up.



N/A

This release of the Broadcom Top Secret Adapter does not support FIPS.



N/A

User-defined ACID fields are supported for a data length of up to 249 bytes. Field data containing characters other than letters, numbers, or national characters (@, #, $) may have unpredictable results.



N/A

When changing profile assignments in Verify - Governance, the ISVG server will send two requests to the adapter. One for the rights value or permission that was deleted and one for the rights value or permission that was added.


Installation and Configuration Notes

Upgrading to the current release

Upgrading to the current release requires a full installation. Refer to the Installing and configuring section of the Broadcom Top Secret adapter guide for detailed instructions.


Configuration


Communication

ADK version 6.06.0027 and higher offer a DAML PROTOCOL setting that allows you to disable TLSv1.1.

ADK version 6.04 and higher offer a DAML PROTOCOL setting that allows you to disable TLSv1.0.

ADK version 6.0.3 and higher no longer support SSLV3 and RC4 ciphers. The Identity server should be configured to use TLS 1.1 or higher. This is done by adding the $ITIM/data/enRole.properties parameter. For example:


com.ibm.daml.jndi.DAMLContext.SSL_PROTOCOL=TLSv1.1


Possible values are:


TLSv1.1

TLS v1.1 protocol (defined by RFC 4346).

TLSv1.2

TLS v1.2 protocol (defined by RFC 5246).



Profiles contained in this package

In the V7.1.15 and later installation package three profiles are included, one specific for ISVG, one specific for Governance Data Integration and one specific for Identity Manager (SVI).

Installing the ISVI specific version on an Identity Manager server removes the requirement to install the Complex Attribute Handler. This can be of interest when you have defined policies on the Identity Manager server that manage ertopzprofile related processing.

If no customization has been done to the Identity Manager server that involves the ertopzprofile attribute, the ISVG-specific profile can be used in combination with the Complex Attribute Handler on Identity Manager servers.


For the Governance Data Integration profile the complex attribute handler is not required. It merely defines the Top Secret Profile object class as a Service Group for ISVG compatibility.This profile can be used if Top Secret profile assignments are being made from ISVG.

If you want to be able to make changes in Top Secret profile assignments in both ISVG and Identity Manager, you will have to modify the resource.def file that is included in the profile jar to define the ertopzprofile attribute as complex attribute and the complex attribute handler properties as depicted below.  Then include the complex attribute handler jar file in the ITIM_LIB shared library on ISVI/WAS server and with ISIGADI include it in the jars of SDI running ISIGADI.  With ISIQ, the handler is already included in the ISIQ side code.

Required additions to the <ProtocollProperties> section of the resource.def when using ISIGADI and managing Top Secret profile assignments from both ISVI and ISVG.

      <Property Name  = "ercomplexattributes"
                Value    = "ertopzprofile" />
      <Property Name  = "erattributehandler"
                Value    = "com.ibm.isim.util.complexattribute.TopSecretComplexAttributeHandler" />



Starting and stopping the adapter

Before you start the adapter, ensure that TCP/IP is active.

Starting ADK release 6.0.3 the adapter will write a message to SYSLOG and shutdown if it can not connect to the IP communications port. In previous releases the adapter would write an error to the adapter log and remain active without an indication that it could not communicate with the server in the SYSLOG.


Customizing or Extending Adapter Features

The Verify Governance Adapters can be customized and/or extended. The type and method of this customization may vary from adapter to adapter.


Getting Started

Customizing and extending adapters requires a number of additional skills. The developer must be familiar with the following concepts and skills prior to beginning the modifications:



Note: This adapter supports customization only through the use of pre-Exec and post-Exec scripting. The Broadcom Top Secret adapter has REXX scripting options. Please see the Broadcom Top Secret Installation and Configuration guide for additional details.


IBM Security Verify Resources:

Check the “Learn” section of the IBM Security Verify Governance Documentation for links to training, publications, and demos.


Support for Customized Adapters

The integration to the Verify Governance server – the adapter framework – is supported. However, IBM does not support the customization, scripts, or other modifications. If you experience a problem with a customized adapter, IBM Support may require the problem to be demonstrated on the GA version of the adapter before a case is opened.


Installing the adapter language pack



See the IBM Security Verify Install library and search for information about installing the adapter language pack.



IBM Security Verify Governance Resources:

Please check out the latest documentation on the site.

Select the latest server release to navigate to the latest version of the adapter documentation.

Updates to the Broadcom Top Secret for z/OS Adapter installation and Configuration Guide


Overview

No updates in the current release



Planning

No updates in the current release


Installing

No updates in the current release

Upgrading

No updates in the current release

Configuring

Configuration Notes


Profile entitlements and Rights


The order of profiles attached to an ACID is important and affects the checking of the profile permissions.

To add profiles in a particular order you must add the profile names in the account form in this manner. The first number indicates the order and the separator is a vertical bar character:

010|PROFA
020|PROFB

The profile names are sorted by number (if necessary) by the adapter and added to the ACID in that order.

Any request to update ertopzprofile values must have the profile values in the request sorted from the lowest sequence to the highest sequence. 
For instance: 

<Modification Operation="replace">
<attr name="ertopzprofile">
                               <value>010|T3AUTO40</value>
                               <value>020|T3AUTO20</value>
                               <value>030|T3AUTO50</value>
</attr>
</Modification>

If the profiles in the request are not ordered by sequence, this will result in inconsistency in the profile assignments.



Troubleshooting

No updates in the current release


Reference


No updates in the current release






Troubleshooting Broadcom Top Secret Adapter errors


Troubleshooting profile issues.

If you experience issues opening an account form after upgrading to the latest release , it might be required to start the design forms editor, open the Top Secret account form and select save. It is not required to make any changes to the form.






Supported Configurations

Installation Platform

The IBM Security Verify Governance Adapter supports any combination of the following product

versions.


Operating System:

z/OS V2.4

z/OS V2.5

z/OS V3.1


Managed Resource:

Broadcom CA Top Secret for z/OS R16


IBM Security Identity Manager:

Identity Manager v6.0.0-ISS-SIM-FP0011 or higher

Identity Manager v7.0.1-ISS-SIM-FP0001 or higher.



IBM Security Identity Governance and Intelligence:

Identity Governance 5.2.6.0-ISS-SIGI-FP0002 or higher



IBM Security Verify Governance:

IBM Security Verify Governance v10.x


Notices

This information was developed for products and services offered in the U.S.A. IBM may not offer the products, services, or features discussed in this document in other countries. Consult your local IBM representative for information on the products and services currently available in your area. Any reference to an IBM product, program, or service is not intended to state or imply that only that IBM product, program, or service may be used. Any functionally equivalent product, program, or service that does not infringe any IBM intellectual property right may be used instead. However, it is the user's responsibility to evaluate and verify the operation of any non-IBM product, program, or service.

IBM may have patents or pending patent applications covering subject matter described in this document. The furnishing of this document does not give you any license to these patents. You can send license inquiries, in writing, to:

IBM Director of Licensing

IBM Corporation

North Castle Drive

Armonk, NY 10504-1785 U.S.A.


For license inquiries regarding double-byte (DBCS) information, contact the IBM Intellectual Property Department in your country or send inquiries, in writing, to:


IBM World Trade Asia Corporation

Licensing

2-31 Roppongi 3-chome, Minato-ku

Tokyo 106-0032, Japan


The following paragraph does not apply to the United Kingdom or any other country where such provisions are inconsistent with local law: INTERNATIONAL BUSINESS MACHINES CORPORATION PROVIDES THIS PUBLICATION "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF NON-INFRINGEMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Some states do not allow disclaimer of express or implied warranties in certain transactions, therefore, this statement may not apply to you.


This information could include technical inaccuracies or typographical errors. Changes are periodically made to the information herein; these changes will be incorporated in new editions of the publication. IBM may make improvements and/or changes in the product(s) and/or the program(s) described in this publication at any time without notice.


Any references in this information to non-IBM Web sites are provided for convenience only and do not in any manner serve as an endorsement of those Web sites. The materials at those Web sites are not part of the materials for this IBM product and use of those Web sites is at your own risk.


IBM may use or distribute any of the information you supply in any way it believes appropriate without incurring any obligation to you.


Licensees of this program who wish to have information about it for the purpose of enabling: (i) the exchange of information between independently created programs and other programs (including this one) and (ii) the mutual use of the information which has been exchanged should contact:


IBM Corporation

2ZA4/101

11400 Burnet Road

Austin, TX 78758 U.S.A.

Such information may be available, subject to appropriate terms and conditions, including in some cases, payment of a fee.


The licensed program described in this information and all licensed material available for it are provided by IBM under terms of the IBM Customer Agreement, IBM International Program License Agreement, or any equivalent agreement between us.


Any performance data contained herein was determined in a controlled environment. Therefore, the results obtained in other operating environments may vary significantly. Some measurements may have been made on development-level systems and there is no guarantee that these measurements will be the same on generally available systems. Furthermore, some measurements may have been estimated through extrapolation. Actual results may vary. Users of this document should verify the applicable data for their specific environment.


Information concerning non-IBM products was obtained from the suppliers of those products, their published announcements or other publicly available sources. IBM has not tested those products and cannot confirm the accuracy of performance, compatibility or any other claims related to non-IBM products. Questions on the capabilities of non-IBM products should be addressed to the suppliers of those products.


Trademarks

The following terms are trademarks or registered trademarks of International Business Machines Corporation in the United States, other countries, or both:

IBM
IBM logo


Adobe, Acrobat, Portable Document Format (PDF), and PostScript are either registered trademarks or trademarks of Adobe Systems Incorporated in the United States, other countries, or both.

Cell Broadband Engine and Cell/B.E. are trademarks of Sony Computer Entertainment, Inc., in the United States, other countries, or both and is used under license therefrom.



Java and all Java-based trademarks are trademarks of Sun Microsystems, Inc. in the United States, other countries, or both.



Microsoft, Windows, Windows NT®, and the Windows logo are trademarks of Microsoft Corporation in the United States, other countries, or both.


Intel®, Intel logo, Intel Inside®, Intel Inside logo, Intel Centrino™, Intel Centrino logo, Celeron®, Intel Xeon™, Intel SpeedStep®, Itanium®, and Pentium® are trademarks or registered trademarks of Intel Corporation or its subsidiaries in the United States and other countries.


CA ACF2, and CA Top Secret are trademarks of Broadcom, Inc. in the United States, other countries, or both.


UNIX is a registered trademark of The Open Group in the United States and other countries.


Linux is a trademark of Linus Torvalds in the U.S., other countries, or both.


ITIL® is a registered trademark, and a registered community trademark of the Office of Government Commerce, and is registered in the U.S. Patent and Trademark Office.


IT Infrastructure Library® is a registered trademark of the Central Computer and Telecommunications Agency which is now part of the Office of Government Commerce.


Other company, product, and service names may be trademarks or service marks of others.






End of Release Notes