MQTC v2.0.1.3 Gold Sponsor: TxMQ

Capitalware would like to announce that TxMQ is a Gold Sponsor of MQ Technical Conference v2.0.1.3 (MQTC).

For more information, please go to: http://www.mqtechconference.com

Regards,
Roger Lacroix
Capitalware Inc.

Capitalware, Education, IBM MQ, MQ Technical Conference Comments Off on MQTC v2.0.1.3 Gold Sponsor: TxMQ

Free IBM e-book: The ABC’s of z/OS Traces

IBM is giving away free copies of the e-book: The ABC’s of z/OS Traces
https://www14.software.ibm.com/webapp/iwm/web/signup.do?source=swg-MultiTouch&S_PKG=ov17401&S_TACT=103GP27E

It includes: An overview of z/OS traces including GTF, component, master, GFS and SMS traces, Details on how to set-up and implement each type of z/OS trace, and Tips for using the data from these traces to optimize your z/OS environment

Regards,
Roger Lacroix
Capitalware Inc.

E-Book, Education, Programming, z/OS Comments Off on Free IBM e-book: The ABC’s of z/OS Traces

3 Weeks until MQ Technical Conference

MQ Technical Conference v2.0.1.3 (MQTC) is only 3 weeks away – September 23 to September 25, 2013.

MQTC will offer 70 sessions that are designed to enhance the skills of IT professionals who are using IBM’s WebSphere MQ on AIX, HP-UX, IBM i (OS/400), Linux, Solaris, Windows and z/OS.

The regular price for the conference is only $299.00 which includes 3 days of MQ sessions, breakfast, lunch and coffee breaks!!! That’s $100 a day to be feed and trained.

    Reasons to attend:

  • 70 total sessions – 39 unique sessions
  • 15 MQ speakers – 7 from IBM
  • MQ Sessions for all major platforms including z/OS
  • Breakfast, lunch and coffee breaks are included
  • Hor d’oeuvres served between 5:30PM and 6:30PM in the Vendor Pavilion
  • Regular price is $299.00 per attendee
  • Group pricing (5+) is $199.00 per attendee

For more information, please go to: www.mqtechconference.com

The following companies are sponsors of MQTC and will be in the Vendor Pavilion:
– Platinum Sponsor: Capitalware and MioSoft
– Gold Sponsor: Cressida Technology, Nastel Technologies, Avada Software, IBM and TxMQ

Regards,
Roger Lacroix
Capitalware Inc.

Capitalware, Education, IBM MQ, MQ Technical Conference Comments Off on 3 Weeks until MQ Technical Conference

New: MQ Authenticate User Security Exit for z/OS v2.0.0

Capitalware Inc. would like to announce the official release of MQ Authenticate User Security Exit for z/OS v2.0.0. This is a FREE upgrade for ALL licensed users of MQ Authenticate User Security Exit for z/OS. MQ Authenticate User Security Exit for z/OS is a solution that allows a company to fully authenticate a user who is accessing a WebSphere MQ for z/OS resource. It authenticates the user’s UserID and Password against the native z/OS system or an encrypted MQAUSX FBA file.

For more information about MQ Authenticate User Security Exit for z/OS go to:
https://www.capitalware.com/mqausx_zos_overview.html

Changes for MQ Authenticate User Security Exit for z/OS v2.0.0:

    Server-side:

  • z/MQAUSX server-side security exit defaults to use AES 256-bit encryption for user credentials
  • Added keyword UseAllowHostname and AllowHostname to only allow hosts by name (reverse lookup of incoming IP address)
  • Added keyword UseRejectHostname and RejectHostname to explicitly reject a hostname (reverse lookup of incoming IP address)
  • Added keyword UseAllowHostByName and AllowHostByName to only allow hosts by name
  • Added keyword UseRejectHostByName and RejectHostByName to explicitly reject a hostname
  • Added keyword SystemLogMessage to control what type of messages (‘accepted’ and/or ‘rejected’) are written to system log
  • Added keywords UseGroups, Groups & GroupFile
  • Added program CWDSPVER to display the product version number
  • Added code in the Ini parser to distinguish between ‘ABC’ and ‘ABCDEF’ keywords
  • ENCPWD program defaults to use AES 256-bit encryption
  • Added keyword UseFormFeed (z/OS only) to issue a FormFeed command once a day at midnight
  • Increased the accepted IniFile parameter length from 1024 to 2048 characters
  • Updated the “Connection accepted” log record to include the UserID set for the connection.
  • Updated MCC logic so that a command server failure does not affect the exit.
  • Changed MCCRedoCount default value from 1000 to 5000
  • Fixed a bug with ConnectionName when both IPv4 and IPv6 stacks are used
  • Fixed a bug with UseAuthOrder and AuthOrder
  • Fixed a bug in the in-memory Ini parser
  • Fixed a bug with Proxy file processing
  • Fixed a bug in the AllowSSLDN processing
  • Fixed a bug in CWCHAD when NoAuth is used
  • Fixed a bug with SSLPeerNamePtr field.
  • Tested with WMQ v7.1

Regards,
Roger Lacroix
Capitalware Inc.

Capitalware, IBM MQ, MQ Authenticate User Security Exit, Security, z/OS Comments Off on New: MQ Authenticate User Security Exit for z/OS v2.0.0

New: MQ Standard Security Exit for z/OS v2.0.0

Capitalware Inc. would like to announce the official release of MQ Standard Security Exit for z/OS v2.0.0. This is a FREE upgrade for ALL licensed users of MQ Standard Security Exit for z/OS. MQ Standard Security Exit for z/OS is a solution that allows a MQAdmin to control and restrict who is accessing a WebSphere MQ resource.

For more information about MQ Standard Security Exit for z/OS go to:
https://www.capitalware.com/mqssx_zos_overview.html

    Changes for MQ Standard Security Exit for z/OS v2.0.0:

  • Added keyword UseAllowHostname and AllowHostname to only allow hosts by name (reverse lookup of incoming IP address)
  • Added keyword UseRejectHostname and RejectHostname to explicitly reject a hostname (reverse lookup of incoming IP address)
  • Added keyword UseAllowHostByName and AllowHostByName to only allow hosts by name
  • Added keyword UseRejectHostByName and RejectHostByName to explicitly reject a hostname
  • Added keyword SystemLogMessage to control what type of messages (‘accepted’ and/or ‘rejected’) are written to system log
  • Added keywords UseGroups, Groups & GroupFile
  • Added program CWDSPVER to display the product version number
  • Added code in the Ini parser to distinguish between ‘ABC’ and ‘ABCDEF’ keywords
  • Added keyword UseFormFeed (z/OS only) to issue a FormFeed command once a day at midnight
  • Increased the accepted IniFile parameter length from 1024 to 2048 characters
  • Updated the “Connection accepted” log record to include the UserID set for the connection.
  • Updated MCC logic so that a command server failure does not affect the exit.
  • Changed MCCRedoCount default value from 1000 to 5000
  • Fixed a bug with ConnectionName when both IPv4 and IPv6 stacks are used
  • Fixed a bug in the in-memory Ini parser
  • Fixed a bug with Proxy file processing
  • Fixed a bug in the AllowSSLDN processing
  • Fixed an issue with BackupLogFileCount (across all products)
  • Fixed a bug with SSLPeerNamePtr field.
  • Tested with WMQ v7.1

Regards,
Roger Lacroix
Capitalware Inc.

Capitalware, IBM MQ, MQ Standard Security Exit, Security, z/OS Comments Off on New: MQ Standard Security Exit for z/OS v2.0.0

New: MQ Authenticate User Security Exit v2.0.0

Capitalware Inc. would like to announce the official release of MQ Authenticate User Security Exit v2.0.0. This is a FREE upgrade for ALL licensed users of MQ Authenticate User Security Exit. MQ Authenticate User Security Exit is a solution that allows a company to fully authenticate a user who is accessing a WebSphere MQ resource. It authenticates the user’s UserID and Password (and possibly Domain Name) against the server’s native OS system, LDAP server, Microsoft’s Active Directory, Quest Authentication Services, Centrify’s DirectControl or an encrypted MQAUSX FBA file.

For more information about MQ Authenticate User Security Exit go to:
https://www.capitalware.com/mqausx_overview.html

Changes for MQ Authenticate User Security Exit v2.0.0:

    Server-side:

  • MQAUSX server-side security exit defaults to use AES 256-bit encryption for user credentials
  • Added support for authentication against Quest Authentication Services (QAS) aka Vintela Authentication Services on Unix/Linux
  • Added support for authentication against Centrify’s DirectControl (CDC) on Unix/Linux
  • Added keyword UseLDAPGroupSearchBindDN so that the bindDN and BindPswd will be used for an LDAP Search if UseLDAPBindDN is set to No
  • Added keyword UseLDAPAuthCompare so that the ldap bind will be used for authentication rather than ldap compare
  • Added keyword UseAllowHostname and AllowHostname to only allow hosts by name (reverse lookup of incoming IP address)
  • Added keyword UseRejectHostname and RejectHostname to explicitly reject a hostname (reverse lookup of incoming IP address)
  • Added keyword UseAllowHostByName and AllowHostByName to only allow hosts by name
  • Added keyword UseRejectHostByName and RejectHostByName to explicitly reject a hostname
  • Added keyword SystemLogMessage to control what type of messages (‘accepted’ and/or ‘rejected’) are written to system log
  • Added keywords UseGroups, Groups, UseGroupFile & GroupFile
  • Added program cwdspver to display the product version number
  • Added code in the Ini parser to distinguish between ‘ABC’ and ‘ABCDEF’ keywords
  • enc_pwd program defaults to use AES 256-bit encryption
  • Increased the accepted IniFile parameter length from 1024 to 2048 characters
  • Added support non-default install for WMQ v7.1 & higher multi-install feature on IBM i, Linux, Unix and Windows
  • Added 64-bit client-side security exit for Windows
  • Updated LDAPGroupSearchBase and LDAPGroupSearchFilter processing to replace all occurrences of %USERID% – not just the 1st occurrence
  • Updated the “Connection accepted” log record to include the UserID set for the connection.
  • Updated MCC logic so that a command server failure does not affect the exit.
  • Changed MCCRedoCount default value from 1000 to 5000
  • Fixed a bug with LDAP ANR processing
  • Fixed a bug with ConnectionName when both IPv4 and IPv6 stacks are used
  • Fixed a bug with UseAuthOrder and AuthOrder
  • Fixed a bug in the in-memory Ini parser
  • Fixed a bug with Proxy file processing
  • Fixed a bug in the AllowSSLDN processing
  • Fixed a bug in CWCHAD when NoAuth is used
  • Fixed a bug in AllowHostname on Linux
  • Fixed an issue with BackupLogFileCount (across all products)
  • Fixed a bug with SSLPeerNamePtr field.
  • Fixed a memory leak with LogonUser API call on Windows
  • Fixed a bug with LDAP SSL looping again when a failed authentication happens
  • Fixed weird error with dlsym on Solaris
  • Tested with WMQ v7.5
    Client-side:

  • MQAUSX client-side security exit defaults to use AES 256-bit encryption for user credentials
  • enc_clnt program defaults to use AES 256-bit encryption
  • Fixed the font for CCDTE and Encrypted Client GUI
  • Added support to explicitly reject an IP address and/or hostname (RejectConName / MQAUSX_REJECT_CONNAME)
  • Added support to explicitly reject a queue manager (RejectQMgrName / MQAUSX_REJECT_QMGR_NAME)
  • Fixed a bug in MQAUSXJ in processing SCYDATA using inline parameters (u=…;p=…)
  • Added code to get around APAR IZ69820

Regards,
Roger Lacroix
Capitalware Inc.

Capitalware, IBM i (OS/400), IBM MQ, Linux, MQ Authenticate User Security Exit, Security, Unix, Windows Comments Off on New: MQ Authenticate User Security Exit v2.0.0

New: MQ Standard Security Exit v2.0.0

Capitalware Inc. would like to announce the official release of MQ Standard Security Exit v2.0.0. This is a FREE upgrade for ALL licensed users of MQ Standard Security Exit. MQ Standard Security Exit is a solution that allows a MQAdmin to control and restrict who is accessing a WebSphere MQ resource.

For more information about MQ Standard Security Exit go to:
https://www.capitalware.com/mqssx_overview.html

    Changes for MQ Standard Security Exit v2.0.0:

  • Added keyword UseAllowHostname and AllowHostname to only allow hosts by name (reverse lookup of incoming IP address)
  • Added keyword UseRejectHostname and RejectHostname to explicitly reject a hostname (reverse lookup of incoming IP address)
  • Added keyword UseAllowHostByName and AllowHostByName to only allow hosts by name
  • Added keyword UseRejectHostByName and RejectHostByName to explicitly reject a hostname
  • Added keyword SystemLogMessage to control what type of messages (‘accepted’ and/or ‘rejected’) are written to system log
  • Added keywords UseGroups, Groups, UseGroupFile & GroupFile
  • Added program cwdspver to display the product version number
  • Added code in the Ini parser to distinguish between ‘ABC’ and ‘ABCDEF’ keywords
  • Increased the accepted IniFile parameter length from 1024 to 2048 characters
  • Added support non-default install for WMQ v7.1 & higher multi-install feature on IBM i, Linux, Unix and Windows
  • Updated the “Connection accepted” log record to include the UserID set for the connection.
  • Updated MCC logic so that a command server failure does not affect the exit.
  • Changed MCCRedoCount default value from 1000 to 5000
  • Fixed a bug with ConnectionName when both IPv4 and IPv6 stacks are used
  • Fixed a bug in the in-memory Ini parser
  • Fixed a bug with Proxy file processing
  • Fixed a bug in the AllowSSLDN processing
  • Fixed a bug in AllowHostname on Linux
  • Fixed an issue with BackupLogFileCount (across all products)
  • Fixed a bug with SSLPeerNamePtr field.
  • Tested with WMQ v7.5

Regards,
Roger Lacroix
Capitalware Inc.

Capitalware, IBM i (OS/400), IBM MQ, Linux, MQ Standard Security Exit, Security, Unix, Windows Comments Off on New: MQ Standard Security Exit v2.0.0

MQTC v2.0.1.3 Platinum Sponsor: MioSoft Corporation

Capitalware would like to announce that MioSoft Corporation is a Platinum Sponsor of MQ Technical Conference v2.0.1.3 (MQTC).

For more information, please go to: http://www.mqtechconference.com

Regards,
Roger Lacroix
Capitalware Inc.

Capitalware, Education, IBM MQ, MQ Technical Conference Comments Off on MQTC v2.0.1.3 Platinum Sponsor: MioSoft Corporation

New: MQ Auditor v2.0.0

Capitalware Inc. would like to announce the official release of MQ Auditor v2.0.0. This is a FREE upgrade for ALL licensed users of MQ Auditor. MQ Auditor is a solution that allows a company to audit/track all MQ API calls performed by MQ applications that are connected to a queue manager.

For more information about MQ Auditor go to:
https://www.capitalware.com/mqa_overview.html

    Changes for MQ Auditor v2.0.0:

  • Added a new Component: Audit Queue Off Load – read more here
  • Added ChannelName to audit record for MQConn/MQConnX API calls – only available for WMQ v7.1 or higher
  • Added Conversion for MonitorType – this causes audit records to be written for before and after conversion for MQGET API call.
  • Added support non-default install for WMQ v7.1 & higher multi-install feature on Linux, Unix and Windows
  • Increased the accepted IniFile parameter length from 1024 to 2048 characters
  • Changed the handling of rolling audit file feature
  • Changed outputting MQMD ApplIdentityData & ApplOriginData as character rather than HEX.
  • Changed how audit files are copied to the archive directory
  • Fixed an issue with all audit data going to the queue manager audit file
  • Fixed an issue with MQClose and files being left open
  • Fixed a non-threading issue on AIX
  • Fixed an issue AuditQueue truncating the MsgData value
  • Fixed a bug in MQCallback with MQGMO v4 structure
  • Fixed a bug in MQCallback where MQOPEN was not called first
  • Fixed a bug in MQCallback where Active=N and null pointer
  • Fixed GMO field name order.
  • Fixed a crash when the IniFile is invalid.
  • Updated the logger
  • Tested with WMQ v7.5

Regards,
Roger Lacroix
Capitalware Inc.

Capitalware, IBM i (OS/400), IBM MQ, Linux, MQ Auditor, Security, Unix, Windows Comments Off on New: MQ Auditor v2.0.0

New: MQ Channel Encryption v3.0.0

Capitalware Inc. would like to announce the official release of MQ Channel Encryption (MQCE) v3.0.0.

MQCE provides encryption for WebSphere MQ (WMQ) message data over WMQ channels. MQCE operates with Sender, Receiver, Server, Requestor, Cluster-Sender, Cluster-Receiver, Server Connection and Client Connection channels of the WMQ queue managers. MQCE uses Advanced Encryption Standard (AES) to encrypt the data and SHA-2 to create a digital signature.

MQCE operates with WMQ v5.3, v6.0, v7.0, v7.1 and v7.5 on Windows, IBM i (OS/400), Unix and Linux environments.

For more information about MQCE go to:
https://www.capitalware.com/mqce_overview.html

Regards,
Roger Lacroix
Capitalware Inc.

Capitalware, IBM i (OS/400), IBM MQ, Linux, MQ Channel Encryption, Security, Unix, Windows Comments Off on New: MQ Channel Encryption v3.0.0