Readme file for IBM® Spectrum Symphony 7.3.1 Interim Fix 600387

Readme file for: IBM Spectrum Symphony

Product/Component release: 7.3.1

Fix ID: sym-7.3.1-build600387-jpmc

Publication date: April 30, 2021

 

This interim fix provides the latest library and header files used for building a custom security plug-in for IBM Spectrum Symphony 7.3.1.

 

Contents

1.      List of fixes

2.      Download location

3.      Products or components affected

4.      Installation and configuration

5.      Uninstallation

6.      List of files

7.      Product notifications

8.      Copyright and trademark information

1.    List of fixes

APAR: P104205

2.    Download location

Download interim fix 600387 from the following location: https://www.ibm.com/eserver/support/fixes/.

3.    Products or components affected

Component name, Platform, Fix ID:

EGO, Linux x86_64, sym-7.3.1-build600387-jpmc

4.    Installation

Follow the instructions in this section to download and build the custom security plug-in.

System requirements

Linux x86_64

Build the custom plug-in

a.     Copy the egocore-3.9.0.0_x86_64_build600387.tar.gz file to your build host and decompress the package to a directory, which is hereafter referred to as the “extract directory”.

You should see the following files in the extract directory:

·        sec_ego_ext_plugin.a: A static library used for building the custom plug-in.

·        sec.h: The header file to be included by the customized source code file.

·        libcrypto.a: The OpenSSL library used for building the custom plug-in.

·        sample/Makefile: a sample makefile.

·        sample/sec_customize_auth.c: A sample source code file.

b.     Place your customized source code file and Makefile into the extract directory and build the custom plug-in. Use the following steps as a reference to build your custom plug-in:

1.      Copy the sample source code file and sample Makefile from the sample/ subdirectory to the extract directory.

2.      Edit the Makefile in the extract directory and set the GCC value to the full path of your GCC. For example:

# Define the value of GCC to your own gcc full path, use GCC4.8.2

GCC=/usr/bin/gcc

3.      Edit the Makefile to build with the static linked OpenSSL library:

First, comment out the following command:

$(GCC) -g -fPIC -shared -nostartfiles $(SEC_EXT_PLUGIN_OBJ) $(OBJS) -o sec_ego_ext_custom.so -lstdc++ -lpthread -lcrypto -ldl

Then, uncomment the following command:

$(GCC) -g -fPIC -shared -nostartfiles $(SEC_EXT_PLUGIN_OBJ) ./libcrypto.a $(OBJS) -o sec_ego_ext_custom.so -lstdc++ -lpthread -ldl

4.      In the extract directory, run the make command to build the plug-in:

make

You have now built the plug-in, named sec_ego_ext_custom.so.

c.      Ensure that file ownership for sec_ego_ext_custom.so is set to the cluster administrator account and file permissions are set to 644.

Install the custom plug-in

a.     Log on to the primary host as the cluster administrator, disable all applications, stop all services, and shut down all management hosts in your cluster:

> egosh user logon -u Admin -x Admin

> soamcontrol app disable all -f

> egosh service stop all

> egosh ego shutdown hostname

b.     Log on to each management host and back up the following binary file:

$EGO_LIBDIR/sec_ego_ext_custom.so

c.      On each management host, copy the custom plug-in that you built previously (sec_ego_ext_custom.so), to the $EGO_LIBDIR directory.

d.     From the primary host, start each management host and enable applications:

> egosh ego start hostname

> egosh user logon -u Admin -x Admin

> soamcontrol app enable appName

5.    Uninstallation

If required, follow the instructions in this section to uninstall this interim fix from hosts in your cluster.

a.     Log on to the primary host as the cluster administrator, disable all applications, stop all services, and shut down all the management hosts in your cluster:

> egosh user logon -u Admin -x Admin

> soamcontrol app disable all -f

> egosh service stop all

> egosh ego shutdown hostname

b.     On each management host, restore the following file from your backup:

$EGO_LIBDIR/sec_ego_ext_custom.so

c.      From the primary host, start each management host, and enable applications:

> egosh ego start hostname

> egosh user logon -u Admin -x Admin

> soamcontrol app enable appName

6.    List of files

c1b7e9eb356a7bcdb2101d5b987dfe78 libcrypto.a

e105ac0609f90c29c9e63b72f3042916 sample/Makefile

a61466eea07af7c8e608ad39c5c362ce sample/sec_customize_auth.c

c373cae24cd8293cf429f39b8bee9cd5 sec_ego_ext_plugin.a

b028202d3a06a98459071c2807359ac2 sec.h

7.    Product notifications

To receive information about product solution and patch updates automatically, subscribe to product notifications on the My Notifications page http://www.ibm.com/support/mynotifications/ on the IBM Support website (http://support.ibm.com). You can edit your subscription settings to choose the types of information you want to get notification about, for example, security bulletins, fixes, troubleshooting, and product enhancements or documentation changes.

8.    Copyright and trademark information

© Copyright IBM Corporation 2021

U.S. Government Users Restricted Rights - Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp.

IBM®, the IBM logo, and ibm.com® are trademarks of International Business Machines Corp., registered in many jurisdictions worldwide. Other product and service names might be trademarks of IBM or other companies. A current list of IBM trademarks is available on the Web at "Copyright and trademark information" at www.ibm.com/legal/copytrade.shtml.