Agent and NSH updates for SP3
In BMC Server Automation 8.3 SP3, Agent and NSH are updated as follows:
- Openssl version upgrade
- RSCD Agent upgrade
- Default NSH roles are not required
- User_info.dat authentication for AD
- New keepalive setting for NSH connections
- Limiting NSH access to the role on targets
- ACL Push jobs will log only errors and failures
- Ability to configure Role:* during ACL Push
Openssl version upgrade
In BMC Server Automation 8.3 SP3, the Openssl version is upgraded to 0.9.8y.
RSCD Agent upgrade
You can now upgrade the RSCD agent to the version of the Application Server, by using the BMC Server Automation built-in Agent Installer Job. The installation of RSCD agents can be done through the GUI or through the CLI. The upgrade can be performed on the following platforms:
- Solaris
- Linux
- Windows
- AIX
For more information about upgrading the RSCD Agents, see Upgrading-the-RSCD-Agent-using-an-Agent-Installer-Job.
Default NSH roles are not required
BMC Server Automation 8.3 SP3 allows you to remove a given user from showing up in NSH only ACLs, during an ACL Push job. It is no longer necessary that each user has a default NSH role and the default NSH role can be left blank.
User_info.dat authentication for AD
In earlier releases, user_info.dat could only be used for SRP authentication with blcred to authenticate without providing the password explicitly. Now, this functionality is extended to Domain authentication and LDAP authentication methods also.
New keepalive setting for NSH connections
To ensure that NSH to RSCD connection remains alive and is not killed due to connection time out, you need to configure a keepalive setting through the secure file. This setting controls the frequency that the client sends a keepalive message to the target server, and is required only on the client side (and not required at the remote target that runs the RSCD Agent).
client_keepalive_time = <value in seconds>
See the following steps to configure the client_keepalive_time field:
- Go to the RSCD folder on Client Application server.
- Open the secure file. The following sample options are displayed by default:
rscd:port=4750:protocol=5:tls_mode=encryption_only:encryption=tls
default:port=4750:protocol=5:tls_mode=encryption_only:encryption=tls - Append client_keepalive_time = <value in seconds> to the second line, where <value in seconds> is an integer greater than or equal to zero and it looks like as follows:
default:port=4750:protocol=5:tls_mode=encryption_only:encryption=tls:client_keepalive_time=10:
Limiting NSH access to the role on targets
When ACL Push option (set via blasadmin ACL Push namespace) RevokeNshAccessWhenOnlyComponentAccessGranted is set to TRUE will cause the ACL Push file to limit user access to the Configuration Manager (if that user has access to a server via components and not directly on the server itself).
ACL Push jobs will log only errors and failures
ACL Push Job can now have their Job Log messages limited to errors and failures. When the blasadmin setting ACLPush LogOnlyErrorsOrWarningOnAclPush is set to TRUE, INFO messages are eliminated and error and warning messages are retained.
Ability to configure Role:* during ACL Push
When the blasadmin setting ACLPush UserWildcardOnAclPush is set to TRUE, it causes ACL Push jobs to use a single line of <ROLE>:* instead of individual lines of <ROLE>:<USER>. This reduces the size of the user file that is pushed to each agent.