IBM WebSphere® Transformation Extender Secure Adapter Collection, Version 8.1 Release Notes (rev. 2) © Copyright IBM Corporation 2006. All Rights Reserved. ===================================================================== CONTENTS ===================================================================== 1. About this release 2. Installation and configuration information 3. Known limitations, problems, and workarounds 4. Contacting customer support 5. Notices and trademarks ===================================================================== 1. ABOUT THIS RELEASE ===================================================================== This version of WebSphere Transformation Extender Secure Adapter Collection, formerly known as "Security Collection", uses GnuPG 1.2.4 software. As a result, the GNU register key is placed in HKEY_LOCAL_MACHINE. Some older versions of the product installed the GNU key in HKEY_CURRENT_USER. In such a case, you must remove HKEY_CURRENT_USER in order to permit OpenPGP to create public keys. ===================================================================== 2. INSTALLATION AND CONFIGURATION INFORMATION ===================================================================== OpenPGP Adapter --------------- [EC70463] On Windows operating systems, you no longer need to update and run the gnupg-w32.reg registry file. The registry keys are now automatically updated when the Secure Adapter Collection is installed. During the installation process, if the GnuPG keys already exist but point to a different directory than where the OpenPGP Adapter is currently being installed, you are prompted to select the new installation directory to be the default. If you choose 'No', the original directory remains the default. You can change the default directory later by running the installation program again. S/MIME and OpenPGP Adapters --------------------------- For additional configuration information, refer to the related adapter documentation . S/MIME Adapter on HP-UX ----------------------- [EC 101832] The underlying RSA S/MIME libraries are not supported for HP-UX 11.11, therefore the S/MIME adapter is not supported on that platform. In addition, the S/MIME adapter does not work with the version of the RSA S/MIME libraries that are shipped with this product. Contact RSA to obtain a fix for this issue. GnuPG requirement for the OpenPGP Adapter ----------------------------------------- The OpenPGP Adapter utilizes the Gnu Privacy Guard (GnuPG) third-party product to perform the functionality required by the adapter. To use the OpenPGP Adapter, you must first download and install the GNU PG libraries from the specified GNU Web site. For Windows platforms, the binary images for the GnuPG product are available for download. For UNIX platforms, the source for GnuPG must be downloaded and recompiled to generate the binary images. The download and install instruction for Windows and UNIX are presented below. This release of the Secure Adapter Collection supports GnuPG v1.4 for both Windows and UNIX platforms. To maintain the current functionality of the OpenPGP Adapter, use the following instructions for your Windows or UNIX system: Windows ------- To download and install the binary images 1) Go to the following URL: http://mirrors.rootmode.com/ftp.gnupg.org/binary 2) Select the gnupg.w32cli-1.4.1.exe file to download and click Save when prompted to save the file to your computer. 3) Enter the folder name in which the binary image will be saved and click OK. 4) Go to the folder with the saved image and run the gnupg.w32cli-1.4.1.exe file. 5) Respond to the installation prompts as necessary and click Finish to complete the install. The GnuPG is installed in the location you specified. The Transformation Extender OpenPGP Adapter requires the following change to the registry in order for it to determine the location of the GnuPG executable (gpg.exe). To specify the GnuPG gpg.exe location in the registry: 1) Select Run from the Windows Start menu. 2) At the Open prompt of the Run dialog, type regedit and click OK to launch the Registry Editor. 3) In the Registry Editor, navigate to the HKEY_LOCAL_MACHINE\SOFTWARE\GNU\GNUPG key. 4) Right click on the GNUPG key, select New > String Value from the menu and name the string value "gpgProgram". 5) Double-click "gpgProgram" to assign a value to it. 6) In the Value data field, enter the full path to the GnuPG gpg.exe file. Example: If you installed GnuPG to "C:\Program Files\GNU\GnuPG", enter C:\Program Files\GNU\GnuPG\gpg.exe. Note: Prior releases of the Secure Adapter Collection supported GnuPG v1.2.4, which relied on the HomeDir registry key to determine the directory in which to store the privacy key information for all users of that machine. GnuPG v1.4 provides alternate methods of specifying this location, which allows for multiple users of the same machine to have separate directories for privacy keys. However, if none of the alternate methods are specified, the value in HomeDir will still be used for all users. If this key is specified, the directory must exist in order for GnuPG 1.4 to function properly. If you would like GnuPG v1.4 to use your v1.2.4 directory location, make sure the value of HomeDir points to a valid directory that contains your v1.2.4 key information. If you would like to keep your GnuPG v1.2.4 key information separate from your v1.4 keys, refer to the GnuPG 1.4 documentation for an appropriate override method. 7) Click OK. 8) Select File > Exit to exit the Registry Editor. The GnuPG gpg.exe location has been changed in the registry. UNIX ---- To download and generate the GnuPG source, and install the binary images: 1) Go to the following URL: http://mirrors.rootmode.com/ftp.gnupg.org/gnupg 2) Select the gnupg-1.4.1.tar.gz file to download and click Save when prompted to save the file to your computer. 3) Enter the folder name in which the binary image will be saved and click OK. 4) Go to the folder with the saved image and uncompress the image using the UNIX gunzip command. 5) Untar the resulting gnupg-1.4.1.tar file using the UNIX untar command. 6) Navigate to the root GnuPG directory, gnupg-1.4.1 and open (edit or view) the README file. 7) Search for the "Installation" section and follow the instructions to build and install the necessary files. The GnuPG is installed into the location you specified. The Transformation Extender OpenPGP Adapter requires the GPG_PATH environment variable to be set to the directory of the GnuPG executable gpg. You can set it through either of the following methods: - add the setting of this variable to the user login profile so that it is always set, or - add it to the bottom of the setup script that contains all the environment variables needed by Transformation Extender If you use the /usr/local/bin default installation location, the line to add to setup would be: export GPG_PATH=/usr/local/bin ===================================================================== 3. KNOWN LIMITATIONS, PROBLEMS, AND WORKAROUNDS ===================================================================== No known issues exist at the time of release. ===================================================================== 4. CONTACTING CUSTOMER SUPPORT ===================================================================== Contact Customer Support at 1-800-IBM-SERV or from the product page of the IBM Web site: www.ibm.com/software/integration/wtx ===================================================================== 5. NOTICES AND TRADEMARKS ===================================================================== This information was developed for products and services offered in the U.S.A. IBM may not offer the products, services, or features discussed in this document in other countries. Consult your local IBM representative for information on the products and services currently available in your area. Any reference to an IBM product, program, or service is not intended to state or imply that only that IBM product, program, or service may be used. Any functionally equivalent product, program, or service that does not infringe any IBM intellectual property right may be used instead. However, it is the user's responsibility to evaluate and verify the operation of any non-IBM product, program, or service. IBM may have patents or pending patent applications covering subject matter described in this document. The furnishing of this document does not grant you any license to these patents. You can send license inquiries, in writing, to: IBM Director of Licensing IBM Corporation North Castle Drive Armonk, NY 10504-1785 U.S.A. For license inquiries regarding double-byte (DBCS) information, contact the IBM Intellectual Property Department in your country or send inquiries, in writing, to: IBM World Trade Asia Corporation Licensing 2-31 Roppongi 3-chome, Minato-ku Tokyo 106-0032, Japan The following paragraph does not apply to the United Kingdom or any other country where such provisions are inconsistent with local law: INTERNATIONAL BUSINESS MACHINES CORPORATION PROVIDES THIS PUBLICATION "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF NON-INFRINGEMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE Some states do not allow disclaimer of express or implied warranties in certain transactions, therefore, this statement may not apply to you. This information could include technical inaccuracies or typographical errors. Changes are periodically made to the information herein; these changes will be incorporated in new editions of the publication. IBM may make improvements and/or changes in the product(s) and/or the program(s) described in this publication at any time without notice. Any references in this information to non-IBM Web sites are provided for convenience only and do not in any manner serve as an endorsement of those Web sites. The materials at those Web sites are not part of the materials for this IBM product and use of those Web sites is at your own risk. IBM may use or distribute any of the information you supply in any way it believes appropriate without incurring any obligation to you. Licensees of this program who wish to have information about it for the purpose of enabling: (i) the exchange of information between independently created programs and other programs (including this one) and (ii) the mutual use of the information which has been exchanged, should contact: IBM Corporation 577 Airport Blvd., Suite 800 Burlingame, CA 94010 U.S.A. Such information may be available, subject to appropriate terms and conditions, including in some cases, payment of a fee. The licensed program described in this document and all licensed material available for it are provided by IBM under terms of the IBM Customer Agreement, IBM International Program License Agreement or any equivalent agreement between us. Any performance data contained herein was determined in a controlled environment. Therefore, the results obtained in other operating environments may vary significantly. Some measurements may have been made on development-level systems and there is no guarantee that these measurements will be the same on generally available systems. Furthermore, some measurements may have been estimated through extrapolation. Actual results may vary. Users of this document should verify the applicable data for their specific environment. Information concerning non-IBM products was obtained from the suppliers of those products, their published announcements or other publicly available sources. IBM has not tested those products and cannot confirm the accuracy of performance, compatibility or any other claims related to non-IBM products. Questions on the capabilities of non-IBM products should be addressed to the suppliers of those products. All statements regarding IBM's future direction or intent are subject to change or withdrawal without notice, and represent goals and objectives only. This information contains examples of data and reports used in daily business operations. To illustrate them as completely as possible, the examples include the names of individuals, companies, brands, and products. All of these names are fictitious and any similarity to the names and addresses used by an actual business enterprise is entirely coincidental. COPYRIGHT LICENSE: This information contains sample application programs in source language, which illustrate programming techniques on various operating platforms. You may copy, modify, and distribute these sample programs in any form without payment to IBM, for the purposes of developing, using, marketing or distributing application programs conforming to the application programming interface for the operating platform for which the sample programs are written. These examples have not been thoroughly tested under all conditions. IBM, therefore, cannot guarantee or imply reliability, serviceability, or function of these programs. If you are viewing this information softcopy, the photographs and color illustrations may not appear. Programming interface information --------------------------------- Programming interface information, if provided, is intended to help you create application software using this program. General-use programming interfaces allow you to write application software that obtain the services of this program's tools. However, this information may also contain diagnosis, modification, and tuning information. Diagnosis, modification and tuning information is provided to help you debug your application software. Warning: Do not use this diagnosis, modification, and tuning information as a programming interface because it is subject to change. Trademarks and service marks ---------------------------- The following terms are trademarks or registered trademarks of International Business Machines Corporation in the United States or other countries, or both: i5/OS IBM the IBM logo AIX AIX 5L CICS DB2 DB2 Universal Database Domino HelpNow IMS Informix iSeries Lotus Lotus Notes MQIntegrator MQSeries MVS Notes OS/400 Passport Advantage pSeries Redbooks SupportPac WebSphere z/OS Java and all Java-based trademarks are trademarks of Sun Microsystems, Inc. in the United States, other countries, or both. Microsoft, Windows, Windows NT, and the Windows logo are trademarks of Microsoft Corporation in the United States, other countries, or both. Intel, Intel logo, Intel Inside, Intel Inside logo, Intel Centrino, Intel Centrino logo, Celeron, Intel Xeon, Intel SpeedStep, Itanium, and Pentium are trademarks or registered trademarks of Intel Corporation or its subsidiaries in the United States and other countries. UNIX is a registered trademark of The Open Group in the United States and other countries. Linux is a trademark of Linus Torvalds in the United States, other countries, or both. Other company, product, or service names may be trademarks or service marks of others. This product includes software developed by the Eclipse Project (http://www.eclipse.org/). WebSphere Transformation Extender, Version 8.1