Release Notes
Host Access for the Cloud version 3.1.0.1 released June 2024. These release notes list the features, notable changes, and known issues in this release. Host Access for the Cloud provides terminal emulation for 3270, 5250, VT, ALC, UTS, and T27 host types, while requiring only an HTML 5-capable browser.
What’s New
Host Access for the Cloud version 3.1.0.1 released with Management and Security Server (MSS) 14.1.0.1.
All releases are cumulative and contain the features introduced in earlier releases. For previous versions, see HACloud Documentation.
Features and fixes include
-
Fixed a defect that caused TLS connections to fail intermittently. (3.1.0.1)
-
Fixed a defect caused by a too short HTTP timeout that prevented two appliances from being clustered. (3.1.0.1)
-
Added support for an OIDC redirect URI landing page, which is required by certain providers. (3.1.0.1)
-
Updated third-party libraries, including Java, to address security vulnerabilities. (3.1.0.1)
-
Added support for importing and exporting settings between sessions. (3.1.0)
-
The Web Client interface and documentation is now available in French. (3.1.0)
-
Options to handle trailing spaces are now supported when configuring Copy parameters. (3.1.0)
-
Support has been added for sensitive and required fields in Enterprise Server. (3.1.0)
-
You can now cordon and uncordon all nodes in the Container Services Platform (CSP). (3.1.0)
-
New SSH and SFTP sessions now default to using Elliptical Curve keys in the known hosts file. Existing sessions will continue to work using prior configurable RSA keys. (3.1.0)
-
Security updates including Java and third party libraries have been made. (3.1.0)
-
Applied security updates to address multiple CVEs. (3.1.0)
-
Added support for OpenID Connect (OIDC) based authentication via an external provider. (3.0.1)
-
The Windows Connector now supports Kerberos authentication. (3.0.1)
-
Added support for the FTP Quote command. (3.0.1)
-
Line endings for FTP transfers are now automatically managed in Host Access for Cloud. (3.0.1)
-
The MSS Administrative Console is now accessible using Host Access for the Cloud Advanced Authentication and X.509 authentication. (3.0.1)
-
Support for Automated Sign-On for Host Access has been re-introduced using the new architecture. (3.0.1)
-
Addressed vulnerability that involved the potential for MSS session hijacking. (3.0.1)
-
Addressed an issue that prevented the administrative advanced Kubernetes dashboard from loading in a deployment that was not connected to the internet. (3.0.1)
-
Strict Transport Security Headers (HSTS) added to MSS to enhance security. (3.0.1)
-
SiteMinder Agent name is now automatically replicated between nodes in MSS. (3.0.1)
-
Windows Connector updated to v2.1 which includes mitigation for CVE-2023-4863 and other CVEs (3.0.1)
Changes in Behavior
-
The SiteMinder and Single sign-on through IIS authentication methods have been deprecated and will be removed in an upcoming update release and in the next major long-term support release. If you use either of these methods, we recommend migrating to OIDC, Kerberos, or SAML, which are more secure and compatible with modern authentication standards. Please contact support with any concerns regarding this change. (3.1.0.1)
-
RSA key exchange cipher suites used in TLS connections are now disabled by default. Contact Support if re-enablement is required. (3.1.0)
-
Third-party Cookies in JavaScript Connector due to browsers becoming more restrictive. Documentation has been added. (3.1.0)
-
When pasting, the wrap to next line option skips over lines containing protected fields and will continue pasting below and to the right of the starting position. (3.1.0)
-
Web Client and Server Side Event Extensions are now enabled or disabled together from a single UI toggle. Use of the "extensions_enabled" property is no longer used to enable or disable extensions. The new toggle resides at MSS Admin Console > Host Access for the Cloud > Extensions. See the documentation for more information. (3.0.1)
-
The minimum disk space requirement for the Appliance and Linux based installers has been increased from 60GB to 100GB. (3.0.1)
-
The process for configuring X.509 authentication has changed slightly. Please see the documentation for the updated steps. (3.0.1)
-
The location for accessing the session server web client has changed from https://hostname:7443 to https://hostname/webclient. (3.0)
-
A collection of features that were believed to be unused have been deprecated and removed from the MSS Admin Console. Please contact support if a feature has been removed that you depended upon. (3.0)
-
Metering no longer requires configuration and is enabled by default. (3.0)
-
The configuration process in the Terminal ID Manager has been updated and simplified. (3.0)
-
The Terminal ID Manager Console and Metering Admin Console now share the same password as the MSS Admin Console. (3.0)
-
Support for NTLM based authentication has been removed and replaced with support for Kerberos. (3.0)
-
Microsoft has retired Internet Explorer 11, and as such, our ability to resolve IE 11 browser specific issues in older versions of HACloud is limited. Support for IE 11 has been removed from HACloud 3.0 and greater. However, we will continue to support IE 11 for older versions of HACloud that currently support it, as per the Product Support Lifecycle. (3.0)
Known Issues
Technical Support is always available to help you with any issues you may encounter in Host Access for the Cloud.
-
When joining a node to a cluster, the node shuts down before it joins the cluster. This can result in a delay of perhaps 20 minutes. Let the process continue; it will eventually complete or error-out if there is a problem. (3.1.0)
-
If the firewall status on a node changes, the pods on that node will become inaccessible. Reboot the node to make the pods accessible. (3.1.0)
-
Support for X.509 authentication through a load balancer is not currently functioning. Contact support for more information. (3.0.1)
-
Following initial installation, server node restarts, or adding new nodes to the cluster, it may take approximately 15 minutes for the cluster to stabilize and report itself as 'Healthy.' Numerous warning events may appear in the Cluster Management - Events view during startup. These are part of the normal operation and will be cleared after approximately 15 minutes. Always wait for the cluster to be reported as healthy before proceeding with cluster operations. (3.0)
-
When using the Appliance, the process of downloading a Support Zip can take several minutes, with no feedback in the user interface. After clicking "Ok", please stay on the view until the download completes (3.0)
-
When using the migration tool to migrate from a system with Terminal ID manager configured, on the new system Terminal ID manager will fail to start after migration. To work around this issue please contact support. (3.0)
Release Tracks
Host Access of the Cloud provides the following release tracks for you to choose from depending on your needs.
Long-Term Support Release
-
Recommended for all customers.
-
Only receives critical security updates. No new features.
-
Release cadence is approximately once per year.
-
Version numbering example: 3.0 or 3.1.
Incremental Release
Recommended for customers interested in the latest features.
-
Contains major changes - new features and bug fixes.
-
No patches / updates will be provided.
-
Security updates are obtained by upgrading to the next Incremental or Long-Term Support Release.
-
Release cadence is approximately four to six times per year.
-
Each Incremental Release is a step toward the next Long-Term Support Release.
-
Version numbering example: 3.1.0
Contacting Open Text
Additional technical information or advice is available from several sources:
-
Product documentation, Knowledge Base articles and videos - see Support for Host Access for the Cloud.
-
Community pages – see Communities.
Legal Notice
© 2015 - 2024 Rocket Software, Inc. or its affiliates. All Rights Reserved.