Readme file for IBM® Spectrum Symphony 7.3.1 Interim Fix 600387
Readme file for: IBM Spectrum Symphony
Product/Component release: 7.3.1
Fix ID: sym-7.3.1-build600387-jpmc
Publication date: April 30, 2021
This interim fix provides the latest library and header files used for
building a custom security plug-in for IBM Spectrum Symphony 7.3.1.
1.
List of fixes
2.
Download location
3.
Products or
components affected
4.
Installation and
configuration
5.
Uninstallation
6.
List of files
7.
Product notifications
8.
Copyright and
trademark information
APAR: P104205
Download
interim fix 600387 from the following location: https://www.ibm.com/eserver/support/fixes/.
Component name, Platform, Fix ID:
EGO, Linux x86_64, sym-7.3.1-build600387-jpmc
Follow the instructions in this section to download and build the custom security plug-in.
System requirements
Linux x86_64
Build the custom plug-in
a.
Copy the egocore-3.9.0.0_x86_64_build600387.tar.gz
file to your build host and decompress the package to a directory, which is
hereafter referred to as the “extract directory”.
You should see the following files in the
extract directory:
·
sec_ego_ext_plugin.a: A static library used for
building the custom plug-in.
·
sec.h: The
header file to be included by the customized source code file.
·
libcrypto.a: The OpenSSL
library used for building the custom plug-in.
·
sample/Makefile: a
sample makefile.
·
sample/sec_customize_auth.c: A
sample source code file.
b.
Place your customized source code file and Makefile into the extract
directory and build the custom plug-in. Use the following steps as a reference
to build your custom plug-in:
1.
Copy the sample source code file and sample Makefile from the sample/
subdirectory to the extract directory.
2.
Edit the Makefile in the extract
directory and set the GCC value to the full path of your GCC. For example:
# Define the
value of GCC to your own gcc full path, use GCC4.8.2
GCC=/usr/bin/gcc
3.
Edit the Makefile to build with the
static linked OpenSSL library:
First, comment
out the following command:
$(GCC) -g -fPIC -shared -nostartfiles
$(SEC_EXT_PLUGIN_OBJ) $(OBJS) -o sec_ego_ext_custom.so -lstdc++
-lpthread -lcrypto -ldl
Then, uncomment the following command:
$(GCC) -g -fPIC -shared -nostartfiles $(SEC_EXT_PLUGIN_OBJ) ./libcrypto.a $(OBJS) -o sec_ego_ext_custom.so -lstdc++ -lpthread -ldl
4.
In the extract directory, run the make
command to build the plug-in:
make
You have now built the plug-in, named sec_ego_ext_custom.so.
c.
Ensure that file ownership for sec_ego_ext_custom.so
is set to the cluster administrator account and file permissions are set to
644.
Install the custom
plug-in
a.
Log on to the primary host as the cluster
administrator, disable all applications, stop all services, and shut down all
management hosts in your cluster:
> egosh user
logon -u Admin -x Admin
> soamcontrol app disable all -f
> egosh service stop all
> egosh ego
shutdown hostname
b. Log on to each management host and back up the following binary file:
$EGO_LIBDIR/sec_ego_ext_custom.so
c.
On each management host, copy the custom plug-in
that you built previously (sec_ego_ext_custom.so), to the $EGO_LIBDIR
directory.
d.
From the primary host, start each
management host and enable applications:
> egosh ego start hostname
> egosh user logon -u Admin -x Admin
> soamcontrol app enable appName
If required, follow the instructions in this section to uninstall this
interim fix from hosts in your cluster.
a.
Log on to the primary host as the cluster
administrator, disable all applications, stop all services, and shut down all
the management hosts in your cluster:
> egosh user
logon -u Admin -x Admin
> soamcontrol app disable all -f
> egosh service stop all
> egosh ego
shutdown hostname
b.
On each management host, restore the
following file from your backup:
$EGO_LIBDIR/sec_ego_ext_custom.so
c.
From the primary host, start each management
host, and enable applications:
> egosh ego
start hostname
> egosh user
logon -u Admin -x Admin
> soamcontrol
app enable appName
c1b7e9eb356a7bcdb2101d5b987dfe78 libcrypto.a
e105ac0609f90c29c9e63b72f3042916 sample/Makefile
a61466eea07af7c8e608ad39c5c362ce sample/sec_customize_auth.c
c373cae24cd8293cf429f39b8bee9cd5 sec_ego_ext_plugin.a
b028202d3a06a98459071c2807359ac2 sec.h
To receive information
about product solution and patch updates automatically, subscribe to product
notifications on the My
Notifications page http://www.ibm.com/support/mynotifications/ on the IBM Support website
(http://support.ibm.com). You can edit your subscription settings to choose the
types of information you want to get notification about, for example, security
bulletins, fixes, troubleshooting, and product enhancements or documentation
changes.
© Copyright IBM Corporation 2021
U.S. Government Users Restricted
Rights - Use, duplication or disclosure restricted by GSA ADP Schedule Contract
with IBM Corp.
IBM®, the IBM logo, and ibm.com® are trademarks of International Business Machines Corp., registered in many jurisdictions worldwide. Other product and service names might be trademarks of IBM or other companies. A current list of IBM trademarks is available on the Web at "Copyright and trademark information" at www.ibm.com/legal/copytrade.shtml.