ca soa security manager - supportcontent.ca.com soa security manager r12...soa security gateway...

126
Release Notes r12.1 SP3 CA SOA Security Manager Second Edition

Upload: hatram

Post on 10-Apr-2018

224 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: CA SOA Security Manager - supportcontent.ca.com SOA Security Manager R12...SOA Security Gateway Stabilization ... Upgrade an r12.1 SOA Security Gateway ... XML Digital Signature Authentication

Release Notes r12.1 SP3

CA SOA Security Manager

Second Edition

Page 2: CA SOA Security Manager - supportcontent.ca.com SOA Security Manager R12...SOA Security Gateway Stabilization ... Upgrade an r12.1 SOA Security Gateway ... XML Digital Signature Authentication

This documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the “Documentation”) is for your informational purposes only and is subject to change or withdrawal by CA at any time.

This Documentation may not be copied, transferred, reproduced, disclosed, modified or duplicated, in whole or in part, without the prior written consent of CA. This Documentation is confidential and proprietary information of CA and may not be disclosed by you or used for any purpose other than as may be permitted in (i) a separate agreement between you and CA governing your use of the CA software to which the Documentation relates; or (ii) a separate confidentiality agreement between you and CA.

Notwithstanding the foregoing, if you are a licensed user of the software product(s) addressed in the Documentation, you may print or otherwise make available a reasonable number of copies of the Documentation for internal use by you and your employees in connection with that software, provided that all CA copyright notices and legends are affixed to each reproduced copy.

The right to print or otherwise make available copies of the Documentation is limited to the period during which the applicable license for such software remains in full force and effect. Should the license terminate for any reason, it is your responsibility to certify in writing to CA that all copies and partial copies of the Documentation have been returned to CA or destroyed.

TO THE EXTENT PERMITTED BY APPLICABLE LAW, CA PROVIDES THIS DOCUMENTATION “AS IS” WITHOUT WARRANTY OF ANY KIND, INCLUDING WITHOUT LIMITATION, ANY IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, OR NONINFRINGEMENT. IN NO EVENT WILL CA BE LIABLE TO YOU OR ANY THIRD PARTY FOR ANY LOSS OR DAMAGE, DIRECT OR INDIRECT, FROM THE USE OF THIS DOCUMENTATION, INCLUDING WITHOUT LIMITATION, LOST PROFITS, LOST INVESTMENT, BUSINESS INTERRUPTION, GOODWILL, OR LOST DATA, EVEN IF CA IS EXPRESSLY ADVISED IN ADVANCE OF THE POSSIBILITY OF SUCH LOSS OR DAMAGE.

The use of any software product referenced in the Documentation is governed by the applicable license agreement and such license agreement is not modified in any way by the terms of this notice.

The manufacturer of this Documentation is CA.

Provided with “Restricted Rights.” Use, duplication or disclosure by the United States Government is subject to the restrictions set forth in FAR Sections 12.212, 52.227-14, and 52.227-19(c)(1) - (2) and DFARS Section 252.227-7014(b)(3), as applicable, or their successors.

Copyright © 2011 CA. All rights reserved. All trademarks, trade names, service marks, and logos referenced herein belong to their respective companies.

Page 3: CA SOA Security Manager - supportcontent.ca.com SOA Security Manager R12...SOA Security Gateway Stabilization ... Upgrade an r12.1 SOA Security Gateway ... XML Digital Signature Authentication

CA Technologies Product References

This document references the following CA Technologies products:

■ CA SOA Security Manager

■ CA SiteMinder®

Contact CA Technologies

Contact CA Support

For your convenience, CA Technologies provides one site where you can access the information you need for your Home Office, Small Business, and Enterprise CA Technologies products. At http://ca.com/support, you can access the following:

■ Online and telephone contact information for technical assistance and customer services

■ Information about user communities and forums

■ Product and documentation downloads

■ CA Support policies and guidelines

■ Other helpful resources appropriate for your product

Provide Feedback

If you have comments or questions about CA Technologies product documentation, you can send a message to [email protected].

If you would like to provide feedback about CA Technologies product documentation, complete our short customer survey, which is available on the CA Support website at http://ca.com/docs.

Page 4: CA SOA Security Manager - supportcontent.ca.com SOA Security Manager R12...SOA Security Gateway Stabilization ... Upgrade an r12.1 SOA Security Gateway ... XML Digital Signature Authentication
Page 5: CA SOA Security Manager - supportcontent.ca.com SOA Security Manager R12...SOA Security Gateway Stabilization ... Upgrade an r12.1 SOA Security Gateway ... XML Digital Signature Authentication

Contents 5

Contents

Chapter 1: Welcome 11

Chapter 2: New Features 13

FIPS Support ..................................................................................... 13

IPv6 TCP/IP Support............................................................................... 13

Administrative UI Installation....................................................................... 14

CA Business Intelligence ........................................................................... 14

Signing and Verification Using SHA-2 Algorithms ...................................................... 14

Data Store Certifications ........................................................................... 14

Chapter 3: Changes to Existing Features 15

CA SOA Security Manager Documentation............................................................ 15

SOA Security Gateway Stabilization ................................................................. 15

Administrative UI Installation....................................................................... 16

CA SOA Security Manager Administrator Authentication ................................................ 16

External Administrator Store Connections ............................................................ 16

Administrative UI and Policy Server Connections ...................................................... 17

Certificate Revocation List Checking ................................................................. 17

Cache Management Options ....................................................................... 18

Dynamic Host Configuration Object ................................................................. 18

Policy Server Log Messages ........................................................................ 18

PriorityThreadCount Registry Key Values Increased .................................................... 18

Chapter 4: System Requirements 19

Chapter 5: Operating System Support 21

Platform Support ................................................................................. 21

Policy Server Requirements ........................................................................ 21

Windows .................................................................................... 21

UNIX ........................................................................................ 22

Administrative UI Requirements .................................................................... 22

Windows Stand–Alone Installation .............................................................. 22

UNIX Stand–Alone Installation .................................................................. 23

Windows Existing Application Server Installation .................................................. 23

UNIX Existing Application Server Installation ...................................................... 24

Page 6: CA SOA Security Manager - supportcontent.ca.com SOA Security Manager R12...SOA Security Gateway Stabilization ... Upgrade an r12.1 SOA Security Gateway ... XML Digital Signature Authentication

6 Release Notes

Report Server Requirements ....................................................................... 24

Windows .................................................................................... 24

UNIX ........................................................................................ 25

SOA Agent Requirements .......................................................................... 25

Windows Server 2008 System Considerations ......................................................... 25

Chapter 6: Installation and Upgrade Considerations 27

Installation Media Names .......................................................................... 27

Upgrade an r12.1 SOA Security Gateway ............................................................. 29

Policy Server Upgrade Creates a New JVMOptions File ................................................. 30

Connection Between PS on UNIX and SQL Server ...................................................... 30

Character Restriction for Passwords in Installations (72360)............................................. 30

Distributed CA Directory Server Policy Store .......................................................... 31

Importing Event Handler Libraries ................................................................... 31

Report Server and the SunOne Directory Server ....................................................... 32

IPv6 Addresses and Object Store Connections (65040) ................................................. 32

Multi-Mastered LDAP Policy Stores .................................................................. 33

Multi–Mastered LDAP User Store Support Limitations (53677) .......................................... 33

Compatibility with Other Products .................................................................. 33

Updated snmptrap File ............................................................................ 34

Host registration Fails When Policy Server Has a Link-Scoped IPv6 Address When Configuring SOA Agent on Linux (136734) ................................................................................ 34

Windows Considerations .......................................................................... 34

DEP Error during Policy Server Installation ........................................................ 34

Windows Server 2008 System Considerations ..................................................... 35

Deploying CA SOA Security Manager Components ................................................. 36

Report Server Required Update ................................................................. 36

Solaris Considerations ............................................................................. 37

Required Operating System Patches on Solaris (24317, 28691) ...................................... 37

Errors in the SMPS Log due to a gethostbyname() Error (54190) ..................................... 37

Upgrading a Solaris Policy Server (57935)......................................................... 37

Report Server Required Patch Clusters ........................................................... 38

Red Hat Enterprise Linux AS and ES Considerations .................................................... 38

Red Hat Enterprise Linux AS Requires Korn Shell (28782) ........................................... 38

Apache 2.0 Web Server and ServletExec 5.0 on Red Hat Enterprise Linux AS (28447, 29518) ............. 38

Chapter 7: General Considerations 41

Application Objects Appear in the Policy Server User Interface .......................................... 41

System Management Limitations ................................................................... 41

Pop-up Blockers May Interfere with Help ......................................................... 41

Policy Server Limitations ........................................................................... 41

Page 7: CA SOA Security Manager - supportcontent.ca.com SOA Security Manager R12...SOA Security Gateway Stabilization ... Upgrade an r12.1 SOA Security Gateway ... XML Digital Signature Authentication

Contents 7

Leading Spaces in User Password May Not Be Accepted (27619) ..................................... 42

Certificate Mappings Issue with certain Policy Stores (27027, 30824, 29487) ........................... 42

Handshake Errors with Shared Secret Rollover Enabled (27406)...................................... 42

Policy Servers Sharing Policy Store Not Updated Consistently (39844) (39837) ......................... 42

Certain User Name Characters Cause Authenticating or Authorizing Problems (39832) .................. 43

Policy Server Fails to Initialize Java Virtual Machine on Red Hat AS 3.0 (44649) (44971) .................. 43

Option to Create Copies of Existing Policy Server Objects ........................................... 44

User Directory Limitations ......................................................................... 44

ODBC User Store Failover ...................................................................... 44

Chapter 8: Known Issues 47

General Issues ................................................................................... 47

Policy Server JVM Initialization Failure (61775) .................................................... 47

SOA Agents and XML Agents Use Incompatible Algorithms for Signing SAML Assertions (60678) .......... 48

SOA Security Manager Fails To Generate WS-Security Headers Using RSA-OAEP Encryption (70408) ....... 48

Signing Not Working for SAML Session Tickets in SOAP Envelope (74036) ............................. 48

"JVM - JNI code: -1(JNI_ERR)" Errors in Policy Server Log (68569) .................................... 49

Operation-Level Policy Changes Not Committed In Certain Situation When Configuring Application Policy From WSDL (69006) ..................................................................... 49

Clicking Back Button in Secure Web Services from WSDL Wizard Sometimes Causes "Array Index out of range error -1" (72176) ..................................................................... 50

Install Issues ..................................................................................... 50

Back Option Not Supported During Console Mode Install (74339) .................................... 50

SOA Agent Configuration Wizard Does Not Provide FIPS-migration Option (142521) .................... 51

Uninstaller Fails with Errors (66522) ............................................................. 53

Incomplete Uninstall Incorrectly Removes Master Uninstaller on Windows (70411) ..................... 53

Uninstaller Not Removing Administrative UI Folders and Files (74112) ................................ 54

Uninstaller Not Removing SDK (99734) ........................................................... 54

Uninstall Fails On AIX If uninstall.lax References a 6.x JRE (139730) ................................... 55

SOA Agent for Web Servers Issues .................................................................. 55

SOA Agent for Web Servers Failover to Secondary Policy Server Slow ................................. 55

SOA Agent Configuration Wizard Fails Intermittently for IIS 7.x SOA Agent on Windows Server 2008 (142248) .................................................................................... 55

SOA Agent for IBM WebSphere Issues ............................................................... 55

SOA Agent for IBM WebSphere Limitations ....................................................... 56

SOA Agent and SiteMinder Agent for IBM WebSphere Coexistence Limitation (61190) .................. 56

mustUnderstand Attribute Limitation (61018, 60551) .............................................. 56

XML Digital Signature Authentication Fails for Certain Payloads on SOA Agent for IBM WebSphere (60619) ..................................................................................... 56

SOA Agent Configuration Wizard Cannot Unconfigure SOA Agent for WebSphere (66204) ............... 57

SOA Agent for Oracle WebLogic Issues ............................................................... 57

SOA Agent for Oracle WebLogic Limitations....................................................... 57

Page 8: CA SOA Security Manager - supportcontent.ca.com SOA Security Manager R12...SOA Security Gateway Stabilization ... Upgrade an r12.1 SOA Security Gateway ... XML Digital Signature Authentication

8 Release Notes

SOA Agent Configuration Wizard Cannot Unconfigure SOA Agent for WebLogic (66204) ................. 58

CA SOA Security Manager SDK Issues ................................................................ 58

Web Service Client API XMLDocument Class signWSDocument Method Fails With Uninitialized Keystore Exception (133785) ................................................................... 58

Web Service Client API XMLDocument Class signWSDocument Method Fails to Decode DER Format Certificates (133787) .......................................................................... 58

Web Service Client API XMLDocument Class signDocument Method Produces XML Signatures with Unresolvable Reference URIs (133788) ........................................................... 59

Web Service Client API XMLDocument Class signDocument Method Throws a NullPointerException when Signing Non-SOAP XML Using an X.509 Certificate (133789).................................... 59

Chapter 9: Defects Fixed in CA SOA Security Manager Releases 61

Defects Fixed in r12.1 SP3 ......................................................................... 61

Authentication of Encrypyted Requests Intermittently Failing with Red Hat Policy Server (77348) ......... 61

Responses Configured to Generate Signed SAML Session Tickets Using Public Key Obtained from XML Digital Signature Authentication Produce Unsigned SAML Session Tickets (98865) ...................... 61

WS-Security SAML 1.1 Holder of Key Assertion Not Accepted More Than Once (97266) ................. 62

Responses Defined When Creating an Application Within Secure Web Services from WSDL Operation Are Not Immediately Usable (70468) ............................................................ 62

SOA Agent for IBM WebSphere Fails Under Load on Windows ....................................... 62

Error Logged During Administrative UI Install on WebLogic (74188) .................................. 62

Defects Fixed in r12.1 as of CR1 ..................................................................... 62

Variables Created in Admin UI Containing Expression Keywords as Variable Name Substrings Being Resolved Incorrectly (71976) ................................................................... 63

SOA Agent Configuration Wizard Fails to Make Necessary Configuration File Changes for SOA Agent for Apache Web Server (78481) ................................................................. 63

Installer Properties File Used for Unattended Install Contains Bad Entries for SOA Admin UI on Windows (73363) ............................................................................. 64

Uninstalling SOA Agent for IBM WebSphere Breaks the Application Server (72302) ..................... 64

Uninstall Does Not Remove the ETPKI Folder (72027) .............................................. 64

Uninstall Does Not Remove SDK (68885) ......................................................... 65

Failover to Second Policy Server in Cluster Fails for SOA Agent for Web Servers (73808) ................. 65

Documentation Install Does Not Remove Older Documentation in Upgrade Scenario (74629) ............ 65

Chapter 10: Guidelines for SiteMinder Customers 67

Upgrade a SiteMinder Policy Server or Web Agent ..................................................... 67

Apply SiteMinder Updates to a CA SOA Security Manager Policy Server ................................... 68

Apply SiteMinder Updates to a SOA Agent ........................................................... 68

Page 9: CA SOA Security Manager - supportcontent.ca.com SOA Security Manager R12...SOA Security Gateway Stabilization ... Upgrade an r12.1 SOA Security Gateway ... XML Digital Signature Authentication

Contents 9

Chapter 11: International Support 69

Chapter 12: Documentation 71

CA SOA Security Manager Bookshelf................................................................. 71

Appendix A: Platform Support and Installation Media 73

Locate the CA SOA Security Manager Platform Support Matrix .......................................... 73

Locate the Bookshelf .............................................................................. 73

Locate the Installation Media....................................................................... 74

Appendix B: Third-Party Acknowledgements 75

Activation 1.1.1 .................................................................................. 76

AdvantNet....................................................................................... 82

Apache ......................................................................................... 82

Boost ........................................................................................... 87

Compuware Corporation .......................................................................... 87

Eclipse Higgins v.1.0 .............................................................................. 87

ICU4C........................................................................................... 92

JAXB 2.0 ........................................................................................ 93

JWSDP 2.0 ....................................................................................... 99

PCRE 6.3 ....................................................................................... 100

Rhino .......................................................................................... 101

SAAJ 1.3........................................................................................ 112

Sun JDK 1.6.0 ................................................................................... 119

wsdl4j 1.62 ..................................................................................... 126

Page 10: CA SOA Security Manager - supportcontent.ca.com SOA Security Manager R12...SOA Security Gateway Stabilization ... Upgrade an r12.1 SOA Security Gateway ... XML Digital Signature Authentication
Page 11: CA SOA Security Manager - supportcontent.ca.com SOA Security Manager R12...SOA Security Gateway Stabilization ... Upgrade an r12.1 SOA Security Gateway ... XML Digital Signature Authentication

Chapter 1: Welcome 11

Chapter 1: Welcome

This document contains information on CA SOA Security Manager features, operating system support, installation considerations, known issues, and fixes.

Page 12: CA SOA Security Manager - supportcontent.ca.com SOA Security Manager R12...SOA Security Gateway Stabilization ... Upgrade an r12.1 SOA Security Gateway ... XML Digital Signature Authentication
Page 13: CA SOA Security Manager - supportcontent.ca.com SOA Security Manager R12...SOA Security Gateway Stabilization ... Upgrade an r12.1 SOA Security Gateway ... XML Digital Signature Authentication

Chapter 2: New Features 13

Chapter 2: New Features

This section contains the following topics:

FIPS Support (see page 13) IPv6 TCP/IP Support (see page 13) Administrative UI Installation (see page 14) CA Business Intelligence (see page 14) Signing and Verification Using SHA-2 Algorithms (see page 14) Data Store Certifications (see page 14)

FIPS Support

CA SOA Security Manager r12.1 SP3 supports FIPS-only, FIPS-migration, and FIPS-compatibility modes.

IPv6 TCP/IP Support

When configuring CA SOA Security Manager objects in the r12.1 Sp3 Administrative UI, you can enter both IPv4 and IPv6 addresses.

Note the following IPv6 considerations:

■ IPv6 support is not available when the Policy Server is operating in r6.x/r12 mixed-mode.

■ CA SOA Security Manager IPv6 support relies on operating system, web server, directory server, and database support of IPv6. If all of these components in your environment support IPv6, CA SOA Security Manager supports IPv6.

Note: More information on IPv6 support exists in the CA SOA Security Manager Platform Support Matrix for r12.1 SP3

Page 14: CA SOA Security Manager - supportcontent.ca.com SOA Security Manager R12...SOA Security Gateway Stabilization ... Upgrade an r12.1 SOA Security Gateway ... XML Digital Signature Authentication

Administrative UI Installation

14 Release Notes

Administrative UI Installation

The following Administrative UI installation options are available:

■ Stand–alone installation—This option creates the required application server infrastructure through a prerequisite installer. The prerequisite installer installs an embedded application server (JBoss) and the required JDK. Verify that the Administrative UI host system meets the minimum system requirements before starting the installation.

■ Existing application server installation—This option lets you install the Administrative UI to an existing application server infrastructure. The Administrative UI installer prompts you for application server–specific information and the location of the required JDK. Verify that the Administrative UI host system meets all system and third–party component requirements before starting the installation.

Note: For more information about installing the Administrative UI, see the Policy Server Installation Guide.

CA Business Intelligence

CA SOA Security Manager r12.1 SP3 includes CA Business Intelligence, a set of reporting and analytic software that various CA products use for the purposes of presenting information and supporting business decisions. CA products use CA Business Intelligence to integrate, analyze, and then present, through various reporting options, information required for effective enterprise IT management.

Signing and Verification Using SHA-2 Algorithms

CA SOA Security Manager can now verify and generate WS-Security tokens signed with the SHA-256 secure hash algorithm.

Data Store Certifications

For a complete list of the supported directory servers and databases, see the latest CA SOA Security Manager [insert SiteMinder version number] Platform Support Matrix on the Technical Support Site.

More information:

Locate the CA SOA Security Manager Platform Support Matrix (see page 73)

Page 15: CA SOA Security Manager - supportcontent.ca.com SOA Security Manager R12...SOA Security Gateway Stabilization ... Upgrade an r12.1 SOA Security Gateway ... XML Digital Signature Authentication

Chapter 3: Changes to Existing Features 15

Chapter 3: Changes to Existing Features

This section contains the following topics:

CA SOA Security Manager Documentation (see page 15) SOA Security Gateway Stabilization (see page 15) Administrative UI Installation (see page 16) CA SOA Security Manager Administrator Authentication (see page 16) External Administrator Store Connections (see page 16) Administrative UI and Policy Server Connections (see page 17) Certificate Revocation List Checking (see page 17) Cache Management Options (see page 18) Dynamic Host Configuration Object (see page 18) Policy Server Log Messages (see page 18) PriorityThreadCount Registry Key Values Increased (see page 18)

CA SOA Security Manager Documentation

In previous versions, you installed the CA SOA Security Manager bookshelf using the documentation installation kit.

The CA SOA Security Manager bookshelf is now available from the Support site. You no longer install the CA SOA Security Manager documentation.

SOA Security Gateway Stabilization

As part of the CA SOA Security Manager 12.1 SP3 release, the CA SOA Security Manager Gateway has been functionally stabilized.

Functionally stabilizing a product means that there will be no new releases or further enhancements to this product. However, maintenance and support for this product will continue in accordance with your active maintenance contract.

For more information and for the customer announcement, visit the CA Support site.

Page 16: CA SOA Security Manager - supportcontent.ca.com SOA Security Manager R12...SOA Security Gateway Stabilization ... Upgrade an r12.1 SOA Security Gateway ... XML Digital Signature Authentication

Administrative UI Installation

16 Release Notes

Administrative UI Installation

In previous versions, installing the Administrative UI required the following third–party components:

■ A database to function as an object store

■ A directory server or database to function as a CA SOA Security Manager administrator store

■ An application server

The Administrative UI installation no longer requires these components.

Note: For more information about installing the Administrative UI, see the Policy Server Installation Guide.

CA SOA Security Manager Administrator Authentication

In previous versions, the Administrative UI only used an external store as its source for CA SOA Security Manager administrator credentials.

By default, the Administrative UI now uses the policy store as its source for CA SOA Security Manager administrator credentials. The Administrative UI uses the policy store for administrator authentication until you use the Administrative UI to configure a connection to an external store. A connection to an external administrator store is optional.

Note: For more information about administrator store options and how to configure a connection to an external administrator store, see the Policy Server Configuration Guide.

External Administrator Store Connections

In previous versions, the Administrative UI required a directory xml file to connect to an external administrator store. You configured this file manually.

The Administrative Authentication wizard is now used to create a connection to an external administrator store. This wizard is available in the Administrative UI.

Note: For more information about configuring a connection to an external administrator store, see the Policy Server Configuration Guide.

Page 17: CA SOA Security Manager - supportcontent.ca.com SOA Security Manager R12...SOA Security Gateway Stabilization ... Upgrade an r12.1 SOA Security Gateway ... XML Digital Signature Authentication

Administrative UI and Policy Server Connections

Chapter 3: Changes to Existing Features 17

Administrative UI and Policy Server Connections

In previous versions, only the super user specified during the Administrative UI installation could register a connection between the Administrative UI and a Policy Server.

By default, any super user can register a Policy Server connection.

Note: For more information about registering a Policy Server connection, see the Policy Server Installation Guide.

Certificate Revocation List Checking

In previous versions, if the Policy Server was configured to use the CRL Distribution Point (CDP) to locate a certificate revocation list (CRL), the only supported URL type was LDAP.

If the Policy Server is configured to use the CDP, the following URL types are now supported:

■ LDAP

■ HTTP

■ HTTPS

Note: The HTTP and HTTPS URL types are only supported for distribution points in certificates.

If an HTTPS distribution point is used, be sure that a valid CA public certificate or certificate bundle file is present in policy_server_home/config or the connection to the HTTPS server fails.

policy_server_home

Specifies the Policy Server installation path.

Additionally, the certificate or certificate bundle must:

■ Be in pem format (base64 encoded). A certificate in a different format can be converted to the pem format using the OpenSSL command–line utility.

Note: For more information about the OpenSSL utility, see the OpenSSL documentation.

■ Be named cert.pem.

■ Contain the CA root certificate for each distribution point.

Page 18: CA SOA Security Manager - supportcontent.ca.com SOA Security Manager R12...SOA Security Gateway Stabilization ... Upgrade an r12.1 SOA Security Gateway ... XML Digital Signature Authentication

Cache Management Options

18 Release Notes

Note: For more information about configuring CRL checking, see the Policy Server Configuration Guide, the Programming Guide for C, or the Programming Guide for Perl.

STAR Issue: 17289899-2

Cache Management Options You can view the refresh status of Policy Server caches and disable or enable cache flushing through the FSS Admin UI or through three new smpolicysrv command-line options. By using these options to suspend and resume cache flushing, you can resolve policy evaluation issues.

Note: For more information, see the Policy Server Administration Guide.

STAR Issue: 18297048-01

Dynamic Host Configuration Object

With dynamic Host Configuration Object (HCO) updates, you can add Policy Servers to and remove them from a Policy Server cluster without needing to reboot the Web Server for the changes to take effect. The Web agent picks up the Policy Server changes dynamically and the Host Configuration Object is updated without a reboot. For more information, see the Policy Server Administration Guide.

Policy Server Log Messages

The Policy Server now logs three key rollover messages and two cache update messages to SMPS.log to facilitate troubleshooting. For more information, see the General CA SOA Security Manager Troubleshooting chapter in the Policy Server Administration Guide.

STAR Issue: 18750443-02, 18677907-02

PriorityThreadCount Registry Key Values Increased

The default value for the PriorityThreadCount registry key has been increased from two to five. The maximum value for this key has been increased from five to 20. These changes were made to address handshake errors between Web Servers and Policy Servers.

Note: For more information, see the Policy Server Management Console Help.

STAR Issue: 18312198

Page 19: CA SOA Security Manager - supportcontent.ca.com SOA Security Manager R12...SOA Security Gateway Stabilization ... Upgrade an r12.1 SOA Security Gateway ... XML Digital Signature Authentication

Chapter 4: System Requirements 19

Chapter 4: System Requirements

The following requirements must be met or exceeded for CA SOA Security Manager to install and run correctly.

This section contains the following topics:

Operating System Support (see page 21) Platform Support (see page 21) Policy Server Requirements (see page 21) Administrative UI Requirements (see page 22) Report Server Requirements (see page 24) SOA Agent Requirements (see page 25) Windows Server 2008 System Considerations (see page 25)

Page 20: CA SOA Security Manager - supportcontent.ca.com SOA Security Manager R12...SOA Security Gateway Stabilization ... Upgrade an r12.1 SOA Security Gateway ... XML Digital Signature Authentication
Page 21: CA SOA Security Manager - supportcontent.ca.com SOA Security Manager R12...SOA Security Gateway Stabilization ... Upgrade an r12.1 SOA Security Gateway ... XML Digital Signature Authentication

Chapter 5: Operating System Support 21

Chapter 5: Operating System Support

Before you install any CA SOA Security Manager components, verify that you are using a supported operating system and third-party software.

More information:

Locate the CA SOA Security Manager Platform Support Matrix (see page 73)

Platform Support

For a complete list of supported web servers, application servers, databases, directories, web browsers, and CA interoperability requirements, see the CA SOA Security Manager r12.1 SP3 Platform Support Matrix.

More information

Locate the CA SOA Security Manager Platform Support Matrix (see page 73)

Policy Server Requirements

The following minimum system requirements must be met for the CA SOA Security Manager Policy Server to install and run correctly.

Windows

The Windows system to which you are installing the Policy Server must meet the following minimum system requirements:

■ CPU—Intel Pentium III or better.

■ Memory—512 MB system RAM.

■ Available disk space:

– 270 MB free disk space in the install location.

– 180 MB of free space in the system's temporary file location.

Note: These requirements are based on a medium size policy database of approximately 1,000 policies.

Note: For additional non–system requirements, see the Policy Server Installation Guide.

Page 22: CA SOA Security Manager - supportcontent.ca.com SOA Security Manager R12...SOA Security Gateway Stabilization ... Upgrade an r12.1 SOA Security Gateway ... XML Digital Signature Authentication

Administrative UI Requirements

22 Release Notes

UNIX

The UNIX system to which you are installing the Policy Server must meet the following minimum system requirements:

■ Memory—512 MB RAM.

■ Available disk space:

– 300 MB free disk space.

– 200 MB free disk space in /tmp.

Note: Typically, 10 MB or less free disk space in /tmp is required for the daily operation of the Policy Server. The Policy Server creates files and named pipes under /tmp. The path to which these files and pipes are created cannot be changed.

Note: For additional non–system requirements, see the Policy Server Installation Guide.

Administrative UI Requirements

The minimum system requirements for the Administrative UI depend on the installation option used to install the Administrative UI.

Note: For more information about the Administrative UI installation options, see the Policy Server Installation Guide.

Windows Stand–Alone Installation

If the stand–alone installation option is used, the Windows system to which you are installing the Administrative UI must meet the following minimum system requirements:

■ CPU—Single or dual-processor, Intel Pentium III (or compatible), 700-900 MHz.

■ Memory—512 MB system RAM. We recommend 1 GB.

■ Available disk space—540 MB.

■ Temp directory space—450 MB.

Note: For additional non–system requirements, see the Policy Server Installation Guide.

Page 23: CA SOA Security Manager - supportcontent.ca.com SOA Security Manager R12...SOA Security Gateway Stabilization ... Upgrade an r12.1 SOA Security Gateway ... XML Digital Signature Authentication

Administrative UI Requirements

Chapter 5: Operating System Support 23

UNIX Stand–Alone Installation

If the stand–alone installation option is used, the UNIX system to which you are installing the Administrative UI must meet the following minimum system requirements:

■ CPU

– Solaris—Sparc Workstation 440 MHz.

– Red Hat Linux—Single or dual-processor, Intel Pentium III (or compatible), 700-900 MHz.

■ Memory—512 MB system RAM. We recommend 1 GB.

■ Available disk space—540 MB.

■ Temp directory space—450 MB.

Note: For additional non–system requirements, see the Policy Server Installation Guide.

Windows Existing Application Server Installation

If the Administrative UI is being installed to an existing application server infrastructure, the Windows system to which you are installing the Administrative UI must meet the following minimum system requirements:

■ CPU—Single or dual-processor, Intel Pentium III (or compatible), 700-900 MHz.

■ Memory—512 MB system RAM. We recommend 1 GB.

Note: If you are running WebSphere, 2 GB system RAM is required.

■ Available disk space—540 MB.

Note: If you are running WebSphere, 2 GB of available disk space is required.

■ Temp directory space—450 MB.

■ JDK—The required JDK version is installed on the system to which you are installing the Administrative UI.

Note: For additional non–system requirements, see the Policy Server Installation Guide.

Page 24: CA SOA Security Manager - supportcontent.ca.com SOA Security Manager R12...SOA Security Gateway Stabilization ... Upgrade an r12.1 SOA Security Gateway ... XML Digital Signature Authentication

Report Server Requirements

24 Release Notes

UNIX Existing Application Server Installation

If the Administrative UI is being installed to an existing application server infrastructure, the UNIX system to which you are installing the Administrative UI must meet the following minimum system requirements:

■ CPU

– Solaris—Sparc Workstation 440 MHz.

– Red Hat Linux—Single or dual-processor, Intel Pentium III (or compatible), 700-900 MHz.

■ Memory—512 MB system RAM. We recommend 1 GB.

Note: If you are running WebSphere, 2 GB system RAM is required.

■ Available disk space—540 MB.

Note: If you are running WebSphere, 2 GB of available disk space is required.

■ Temp directory space—450 MB.

■ JDK—The required JDK version is installed on the system to which you are installing the Administrative UI.

Note: Additional non-system requirements exist in the Policy Server Installation Guide.

Report Server Requirements

The following minimum system requirements must be met for the Report Server to install and run correctly.

Windows

The Windows system to which you are installing the Reports Server must meet the following minimum system requirements:

■ CPU—Single or dual-processor, Intel Pentium III (or compatible), 2.5 GHz.

■ Memory—2 GB RAM.

■ Available disk space—10 GB.

Note: This requirement is the space required to install the Report Server. This requirement does not account for the disk space required to store reports.

■ Temp directory space—1 GB.

Note: For additional non–system requirements, see the Policy Server Installation Guide.

Page 25: CA SOA Security Manager - supportcontent.ca.com SOA Security Manager R12...SOA Security Gateway Stabilization ... Upgrade an r12.1 SOA Security Gateway ... XML Digital Signature Authentication

SOA Agent Requirements

Chapter 5: Operating System Support 25

UNIX

The UNIX system to which you are installing the Reports Server must meet the following minimum system requirements:

■ CPU—Sparc Workstation 2.5 GHz.

■ Memory—2 GB RAM.

■ Available disk space—10 GB.

Note: This requirement is the space required to install the Report Server. This requirement does not account for the disk space required to store reports.

■ Temp directory space—1 GB.

Note: For additional non–system requirements, see the Policy Server Installation Guide.

SOA Agent Requirements

The following minimum system requirements must be met for SOA Agents to install and run correctly.

■ Memory—2 GB system RAM.

■ Available disk space:

– SOA Agent for Web Servers—200 MB free disk space in the install location.

– SOA Agent for Oracle WebLogic—50 MB free disk space in the install location

– SOA Agent for IBM WebSphere—50 MB free disk space in the install location

– All SOA Agents—200 MB of free space in the system temporary file location.

Note: For additional non–system requirements, see the corresponding SOA Agent Guide.

Windows Server 2008 System Considerations

For Windows Server 2008, the User Account Control feature helps prevent unauthorized changes to your system. When the User Account Control feature is enabled on the Windows Server 2008 operating environment, prerequisite steps are required before doing any of the following tasks with a CA SOA Security Manager component:

■ Installation

■ Configuration

Page 26: CA SOA Security Manager - supportcontent.ca.com SOA Security Manager R12...SOA Security Gateway Stabilization ... Upgrade an r12.1 SOA Security Gateway ... XML Digital Signature Authentication

Windows Server 2008 System Considerations

26 Release Notes

■ Administration

■ Upgrade

Note: For more information about which CA SOA Security Manager components support Windows Server 2008, see the CA SOA Security Manager Platform Support matrix.

To run CA SOA Security Manager installation or configuration wizards on a Windows Server 2008 system

1. Right–click the executable and select Run as administrator.

The User Account Control dialog appears and prompts you for permission.

2. Click Allow.

The wizard starts.

To access the CA SOA Security Manager Policy Server Management Console on a Windows Server 2008 system

1. Right–click the shortcut and select Run as administrator.

The User Account Control dialog appears and prompts you for permission.

2. Click Allow.

The Policy Server Management Console opens.

To run CA SOA Security Manager command–line tools or utilities on a Windows Server 2008 system

1. Open your Control Panel.

2. Verify that your task bar and Start Menu Properties are set to Start menu and not Classic Start menu.

3. Click Start and type the following in the Start Search field:

Cmd

4. Press Ctrl+Shift+Enter.

The User Account Control dialog appears and prompts you for permission.

5. Click Continue.

A command window with elevated privileges appears. The title bar text begins with Administrator:

6. Run the CA SOA Security Manager command.

More information:

Contact CA Technologies (see page 3)

Page 27: CA SOA Security Manager - supportcontent.ca.com SOA Security Manager R12...SOA Security Gateway Stabilization ... Upgrade an r12.1 SOA Security Gateway ... XML Digital Signature Authentication

Chapter 6: Installation and Upgrade Considerations 27

Chapter 6: Installation and Upgrade Considerations

This section contains the following topics:

Installation Media Names (see page 27) Upgrade an r12.1 SOA Security Gateway (see page 29) Policy Server Upgrade Creates a New JVMOptions File (see page 30) Connection Between PS on UNIX and SQL Server (see page 30) Character Restriction for Passwords in Installations (72360) (see page 30) Distributed CA Directory Server Policy Store (see page 31) Importing Event Handler Libraries (see page 31) Report Server and the SunOne Directory Server (see page 32) IPv6 Addresses and Object Store Connections (65040) (see page 32) Multi-Mastered LDAP Policy Stores (see page 33) Multi–Mastered LDAP User Store Support Limitations (53677) (see page 33) Compatibility with Other Products (see page 33) Updated snmptrap File (see page 34) Host registration Fails When Policy Server Has a Link-Scoped IPv6 Address When Configuring SOA Agent on Linux (136734) (see page 34) Windows Considerations (see page 34) Solaris Considerations (see page 37) Red Hat Enterprise Linux AS and ES Considerations (see page 38)

Installation Media Names

The following tables identify the installation executables for CA SOA Security Manager. The tables are organized by platform. For more information about supported operating systems, see the [insert SiteMinder version number] CA SOA Security Manager Platform Support Matrix on the Technical Support site.

To obtain the installation executables, obtain the SOA Security Manager distribution from the Technical Support site and extract the archive.

Note: Extract all files and directories in the CA SOA Security Manager distribution to a common location on a local drive and keep them together—the CA SOA Security Manager installers cannot run without the included supporting files.

Documentation

The CA SOA Security Manager bookshelf is available on the Support site. There is no documentation installer. For more information, see Locate the Bookshelf.

Page 28: CA SOA Security Manager - supportcontent.ca.com SOA Security Manager R12...SOA Security Gateway Stabilization ... Upgrade an r12.1 SOA Security Gateway ... XML Digital Signature Authentication

Installation Media Names

28 Release Notes

Policy Server, SOA Agents

Platform Installation Executable

Linux ca-soasm-12.1-sp03-cr-linux.bin

Solaris ca-soasm-12.1-sp03-cr-sol.bin

Windows ca-soasm-12.1-sp03-cr-win32.exe

cr

Specifies the cumulative release number. The base [insert SiteMinder version number] release does not include a cumulative release number.

Important! If you are running this wizard on Windows Server 2008, run the executable file with administrator permissions. Use these permissions even if you are logged in to the system as an administrator. For more information, see the release notes for your CA SOA Security Manager component.

Administrative UI

The Administrative UI install executable are located in the soa-ui subfolder of the CA SOA Security Manager distribution.

Platform Installation Executable

Linux ■ (Prerequisite) adminui-pre-req-12.1-sp03-cr-linux.bin

■ (Administrative UI) ca-soa-adminui-12.1-sp03-cr-linux.bin

Solaris ■ (Prerequisite) adminui-pre-req-12.1-sp03-cr-sol.bin

■ (Administrative UI) ca-soa-adminui-12.0-sp3-cr-sol.bin

Windows ■ (Prerequisite) adminui-pre-req-12.1-sp03-cr-win32.exe

■ (Administrative UI) ca-soa-adminui-12.1-sp03-cr-win32.exe

cr

Specifies the cumulative release number. The base [insert SiteMinder version number] release does not include a cumulative release number.

Important! If you are running this wizard on Windows Server 2008, run the executable file with Administrator permissions, even if you are logged into the system as an Administrator. For more information, see the release notes for your CA SOA Security Manager component.

Page 29: CA SOA Security Manager - supportcontent.ca.com SOA Security Manager R12...SOA Security Gateway Stabilization ... Upgrade an r12.1 SOA Security Gateway ... XML Digital Signature Authentication

Upgrade an r12.1 SOA Security Gateway

Chapter 6: Installation and Upgrade Considerations 29

Report Server

Platform Installation Executable

Solaris ■ (Report Server) cabiinstall.sh

■ (Report Server Configuration Wizard) ca-rs-config-12.0-sp3-cr-sol.bin

Windows ■ (Report Server) install.exe

■ (Report Server Configuration Wizard) ca-rs-config-12.0-sp3-cr-win32.exe

cr

Specifies the cumulative release number. The base [insert SiteMinder version number] release does not include a cumulative release number.

Important! If you are running this wizard on Windows Server 2008, run the executable file with administrator permissions. Use these permissions even if you are logged in to the system as an administrator. For more information, see the release notes for your CA SOA Security Manager component.

More information:

Locate the CA SOA Security Manager Platform Support Matrix (see page 73)

Upgrade an r12.1 SOA Security Gateway

Although the SOA Security Gateway has been stabilized (see page 15) in this release, an upgrade is available for existing users.

To upgrade an existing r12.1 SOA Security Gateway to r12.1 SP3

1. Download the appropriate archive for your operating system from the CA Support site.

2. Copy or move the archive to the directory that contains the SOA Security Gateway install folder. For example, on Windows if your SOA Security Gateway is installed in C:\Program Files\CA\SOASecurityGateway, copy the archive to C:\Program Files\CA.

3. Stop the SOA Security Gateway.

4. Back up your existing SOA Security Gateway data files.

5. Extract the contents of the archive to overwrite the existing installation.

Page 30: CA SOA Security Manager - supportcontent.ca.com SOA Security Manager R12...SOA Security Gateway Stabilization ... Upgrade an r12.1 SOA Security Gateway ... XML Digital Signature Authentication

Policy Server Upgrade Creates a New JVMOptions File

30 Release Notes

6. Patch the Java Runtime Environment (JRE) used by the SOA Security Gateway to support unlimited key strength in the Java Cryptography Extension (JCE) package.

a. Obtain patched versions of local_policy.jar and US_export_policy.jar from the Oracle website.

b. Copy the local_policy.jar and US_export_policy.jar to one of the following locations, overwriting the existing files:

■ Windows: SOASecurityGateway_Home\win32\jre\lib\security

■ UNIX: SOASecurityGateway_Home/operating_system/jre/lib/security

7. Restore backed up data files.

8. Restart the SOA Security Gateway.

Policy Server Upgrade Creates a New JVMOptions File

During a Policy Server upgrade, the existing JVMOptions.txt file is renamed to JVMOptions.txt.backup. A new JVMOptions.txt file is created.

If the original file included customized parameters, be sure to modify the newly created file to include these customized parameters.

Connection Between PS on UNIX and SQL Server

When attempting to connect a SiteMinder Policy Server on Red Hat or Solaris to a Microsoft SQL Server 2008 database, you should correctly define the paths to the TraceFile, TraceDll and InstallDir parameters specified in the [ODBC] section of the system_odbc.ini file. Failure to do so may result in connectivity errors.

Character Restriction for Passwords in Installations (72360)

When installing the Policy Server, the CA Report Server, and the Administrative UI, you are asked to specify passwords for various components. Consider the following:

Policy Server

When entering password information, do not use the following characters as they are reserved or restricted:

■ (Windows only) A percent sign (%)

■ (Reserved by InstallAnywhere) A dollar sign ($)

■ (UNIX only) An apostrophe (’)

■ (UNIX only) Quotation marks (“”)

Page 31: CA SOA Security Manager - supportcontent.ca.com SOA Security Manager R12...SOA Security Gateway Stabilization ... Upgrade an r12.1 SOA Security Gateway ... XML Digital Signature Authentication

Distributed CA Directory Server Policy Store

Chapter 6: Installation and Upgrade Considerations 31

CA Report Server

When entering password information, do not use the following characters as they are reserved or restricted:

■ (Reserved by InstallAnywhere) A dollar sign ($)

■ (UNIX only) An apostrophe (’)

■ (UNIX only) Quotation marks (“”)

Administrative UI

When entering password information, do not use the following characters as they are reserved or restricted:

■ (UNIX only) An apostrophe (’)

■ (UNIX only Quotation marks (“”)

Distributed CA Directory Server Policy Store

If you are using multiple DSAs to function as a policy store, ensure that host information of the router DSA is listed first in the Policy Server Management Console. If you do not list the router DSA host information first, an error occurs when you attempt to install the policy store data definitions.

Note: For more information on configuring CA Directory Server as a policy store, refer to the Policy Server Installation Guide.

Importing Event Handler Libraries

Consider the following before upgrading a Policy Sever to [insert SiteMinder version number]:

■ If the Policy Server Management Console Advanced tab does not contain event handler libraries, the XPSAudit event handler library (XPSAudit.dll) is added to the Event Handlers field. No further action is required.

Page 32: CA SOA Security Manager - supportcontent.ca.com SOA Security Manager R12...SOA Security Gateway Stabilization ... Upgrade an r12.1 SOA Security Gateway ... XML Digital Signature Authentication

Report Server and the SunOne Directory Server

32 Release Notes

■ If the Policy Server Management Console Advanced tab does contain event handler libraries, complete the following after upgrading the Policy Server:

1. Open the Policy Server Management Console and click the Advanced Tab.

2. In the Event Handlers field, replace the path to the current event handler library with the path to the XPSAudit event handler library.

Note: The default location of the XPSAudit event handler library is policy_server_home\bin.

policy_server_home

Specifies the Policy Server installation path.

3. Click Apply.

The path to the event handler library is saved. The Event Handlers field appears disabled.

Note: By default, the only event handler library that appears in the Advanced tab is XPSAudit.dll.

4. Use the XPSConfig utility to set additional event handler libraries, previously used or otherwise, to the XPSAudit list.

Note: More information on using the XPSConfig utility to set event handler libraries exists in the Policy Server Administration Guide.

Report Server and the SunOne Directory Server

The following installation limitations exist between the Report Server and the SunOne directory server:

■ You cannot install the Report Server on a machine where a SunOne LDAP directory server is installed.

■ You cannot install a SunOne LDAP directory server on a machine where the Report Server is installed.

IPv6 Addresses and Object Store Connections (65040)

When you specify an object store connection during the Administrative UI installation, do not enter an IPv6 address. Instead, enter a host name.

IPv6 addresses are not supported for object store connections.

Page 33: CA SOA Security Manager - supportcontent.ca.com SOA Security Manager R12...SOA Security Gateway Stabilization ... Upgrade an r12.1 SOA Security Gateway ... XML Digital Signature Authentication

Multi-Mastered LDAP Policy Stores

Chapter 6: Installation and Upgrade Considerations 33

Multi-Mastered LDAP Policy Stores

LDAP directories using multi-master technology may be used as CA SOA Security Manager policy stores. The following configuration is recommended when configuring an LDAP policy store in multi-master mode:

■ A single master should be used for all administration.

■ A single master should be used for key storage.

This master does not need to be the same as the master used for Administration. However, we recommend that you use the same master store for both keys and administration. In this configuration, all key store nodes should point to the master rather than a replica.

Note: If you use a master for key storage other than the master for administration, then all key stores must use the same key store value. No key store should be configured to function as both a policy store and a key store.

■ All other policy store masters should be set for failover mode.

Due to possible synchronization issues, other configurations may cause inconsistent results, such as policy store corruption or Agent keys that are out of sync.

Contact CA SOA Security Manager Support for assistance with other configurations.

Multi–Mastered LDAP User Store Support Limitations (53677)

The multi–mastered LDAP enhancement has the following limitations:

■ The Policy Server only supports multi–mastered user stores in a backup capacity. Because Password Services makes frequent writes to the user store, you cannot simultaneously update user information in multiple master instances. In addition, the LDAP implementation could produce out–of–date information or data loss due to delayed replication.

■ Multi–mastered support does not extend to custom code such as custom authentication schemes.

Compatibility with Other Products

To ensure interoperability if you use multiple products, such as SiteMinder, Identity Manager, and Federation Manager check the Platform Support Matrices for the required releases of each product.

More information:

Locate the CA SOA Security Manager Platform Support Matrix (see page 73)

Page 34: CA SOA Security Manager - supportcontent.ca.com SOA Security Manager R12...SOA Security Gateway Stabilization ... Upgrade an r12.1 SOA Security Gateway ... XML Digital Signature Authentication

Updated snmptrap File

34 Release Notes

Updated snmptrap File

This release includes an updated snmptrap.conf file. Before installation, back up and save the original snmptrap.conf file, located in siteminder_installation\config.

Host registration Fails When Policy Server Has a Link-Scoped IPv6 Address When Configuring SOA Agent on Linux (136734)

Linux does not support connections to link-scoped IPv6 addresses without additional information: The name of the interface on which to do the networking. This means that when registering a Linux system as a trusted host during SOA Agent configuration, it fails with the following error when the IP address of the Policy Server is link-scoped:

Registration failed (bad ipAddress[:port] or unable to connect to Authentication

server (-1)).

Workaround

Use global or site-scoped IPv6 addresses.

Windows Considerations

The following considerations apply to supported Windows operating environments:

DEP Error during Policy Server Installation

Symptom:

A Data Execution Prevention (DEP) error can prevent the Policy Server from installing on Windows 2008 SP2.

Solution:

1. Configure DEP for essential Windows programs and services only.

2. Run the Policy Server installer.

To configure DEP for essential programs and services

1. Right–click My Computer and select Properties.

The System Properties dialog appears.

2. Click Advanced.

The Advanced tab opens.

Page 35: CA SOA Security Manager - supportcontent.ca.com SOA Security Manager R12...SOA Security Gateway Stabilization ... Upgrade an r12.1 SOA Security Gateway ... XML Digital Signature Authentication

Windows Considerations

Chapter 6: Installation and Upgrade Considerations 35

3. Under Performance, click Settings.

The Performance Options dialog appears.

4. Click Data Execution Prevention and select Turn on DEP for essential Windows programs and services only.

5. Click OK.

A message prompts you to restart the system.

Note: After you have successfully installed the Policy Server, you can revert the DEP settings for all programs and services.

Windows Server 2008 System Considerations

For Windows Server 2008, the User Account Control feature helps prevent unauthorized changes to your system. When the User Account Control feature is enabled on the Windows Server 2008 operating environment, prerequisite steps are required before doing any of the following tasks with a CA SOA Security Manager component:

■ Installation

■ Configuration

■ Administration

■ Upgrade

Note: For more information about which CA SOA Security Manager components support Windows Server 2008, see the CA SOA Security Manager Platform Support matrix.

To run CA SOA Security Manager installation or configuration wizards on a Windows Server 2008 system

1. Right–click the executable and select Run as administrator.

The User Account Control dialog appears and prompts you for permission.

2. Click Allow.

The wizard starts.

To access the CA SOA Security Manager Policy Server Management Console on a Windows Server 2008 system

1. Right–click the shortcut and select Run as administrator.

The User Account Control dialog appears and prompts you for permission.

2. Click Allow.

The Policy Server Management Console opens.

Page 36: CA SOA Security Manager - supportcontent.ca.com SOA Security Manager R12...SOA Security Gateway Stabilization ... Upgrade an r12.1 SOA Security Gateway ... XML Digital Signature Authentication

Windows Considerations

36 Release Notes

To run CA SOA Security Manager command–line tools or utilities on a Windows Server 2008 system

1. Open your Control Panel.

2. Verify that your task bar and Start Menu Properties are set to Start menu and not Classic Start menu.

3. Click Start and type the following in the Start Search field:

Cmd

4. Press Ctrl+Shift+Enter.

The User Account Control dialog appears and prompts you for permission.

5. Click Continue.

A command window with elevated privileges appears. The title bar text begins with Administrator:

6. Run the CA SOA Security Manager command.

More information:

Contact CA Technologies (see page 3)

Deploying CA SOA Security Manager Components

If you are deploying CA SOA Security Manager components on Windows 2008 SP2, we recommend installing and managing the components with the same user account. For example, if you use a domain account to install a component, use the same domain account to manage it. Failure to use the same user account to install and manage a CA SOA Security Manager component can result in unexpected behavior.

Report Server Required Update

The Policy Server Installation Guide contains the system requirements required to install the Report Server. SAP BusinessObjects Enterprise requires an additional Windows update for Windows 2003 R2.

Before you install the Report Server, update the host system with the Update for Windows Server 2003 (KB925336).

Note: Although this update is for Windows 2003 SP2, the update also applies to Windows 2003 R2.

Page 37: CA SOA Security Manager - supportcontent.ca.com SOA Security Manager R12...SOA Security Gateway Stabilization ... Upgrade an r12.1 SOA Security Gateway ... XML Digital Signature Authentication

Solaris Considerations

Chapter 6: Installation and Upgrade Considerations 37

Solaris Considerations

The following considerations apply to Solaris.

Required Operating System Patches on Solaris (24317, 28691)

The following table lists required and recommended patches by version:

Version Required Recommended

Solaris 9 ■ 111722-04 or any superseding patch

■ 111711-15 or any superseding patch

none

You can find patches and their respective installation instructions at SunSolve (http://sunsolve.sun.com).

Errors in the SMPS Log due to a gethostbyname() Error (54190)

Network connectivity errors appear in the smps log when gethostbyname() is called. These errors appear even though the directories are available on the network. This was a Solaris issue, which according to Sun bug ID 4353836, has been resolved.

Sun lists the following patches for Solaris 9:

Solaris 9

■ 112874-16 (libc)

■ 113319-12 (libnsl)

■ 112970-05 (libresolv)

■ 115545-01 (nss_files)

■ 115542-01 (nss_user)

■ 115544-01 (nss_compat)

Upgrading a Solaris Policy Server (57935)

Symptom:

If your license file is older than January 2005, the Policy Server may experience problems reading the license file after an upgrade. You may receive a message stating that a valid end-user license cannot be found.

Page 38: CA SOA Security Manager - supportcontent.ca.com SOA Security Manager R12...SOA Security Gateway Stabilization ... Upgrade an r12.1 SOA Security Gateway ... XML Digital Signature Authentication

Red Hat Enterprise Linux AS and ES Considerations

38 Release Notes

Solution:

Contact Technical Support, and request a new license file.

Report Server Required Patch Clusters

The Policy Server Installation Guide contains the system requirements required to install the Report Server. SAP BusinessObjects Enterprise provides additional patch specifications. Before installing the Report Server:

1. Go to the temporary_location/docs.

temporary_location

Specifies the location to which you copied the installation media.

2. Open SAP BusinessObjects Enterprise XI 3.1 SP3 for Solaris – Supported Platforms (supported platforms SP3 - Solaris.pdf).

3. Review the Solaris 9 or 10 patch requirements.

Use this resource for Solaris 9 and 10 patch requirements only. This document also provides supported operating system and hardware requirements that CA SOA Security Manager does not support. For supported operating systems, see the CA SOA Security Manager [insert SiteMinder version number] Platform Support Matrix. For system requirements, see the Policy Server Installation Guide.

Red Hat Enterprise Linux AS and ES Considerations

The following considerations apply to Red Hat Enterprise Linux AS and ES.

Red Hat Enterprise Linux AS Requires Korn Shell (28782)

A Policy Server installed on Red Hat AS requires the Korn shell. If you do not install a Korn shell on Red Hat AS, you cannot execute the commands that control the Policy Server from a command line, such as start-all and stop-all.

Apache 2.0 Web Server and ServletExec 5.0 on Red Hat Enterprise Linux AS (28447, 29518)

To use Apache 2.0 Web Server and ServletExec 5.0 on Red Hat AS

1. Run the ServletExec 5.0 AS installer against Apache 1.3.x.

The ServletExec AS Java instance is created.

2. Run ServletExec and Apache 1.3.x, and make sure you can run /servlet/TestServlet.

Page 39: CA SOA Security Manager - supportcontent.ca.com SOA Security Manager R12...SOA Security Gateway Stabilization ... Upgrade an r12.1 SOA Security Gateway ... XML Digital Signature Authentication

Red Hat Enterprise Linux AS and ES Considerations

Chapter 6: Installation and Upgrade Considerations 39

3. Shutdown Apache 1.3.x, but leave ServletExec running.

4. Using anonymous FTP, access ftp://ftp.newatlanta.com/public/servletexec/4_2/patches and download the latest zip.

5. Extract the following from the zip:

mod_servletexec2.c

6. Edit the httpd.conf file of your HP-Apache 2.x so that it contains the necessary ServletExec-specific directives.

Note: The directives are also present in the httpd.conf file of your Apache 1.3.x if you allowed the ServletExec installer to update the httpd.conf during installation. For more information on editing the httpd.conf file, refer to the New Atlanta Communication ServletExec documentation.

7. Start Apache 2.x.

8. Test the Web Server with ServletExec by accessing:

/servlet/TestServlet

Page 40: CA SOA Security Manager - supportcontent.ca.com SOA Security Manager R12...SOA Security Gateway Stabilization ... Upgrade an r12.1 SOA Security Gateway ... XML Digital Signature Authentication
Page 41: CA SOA Security Manager - supportcontent.ca.com SOA Security Manager R12...SOA Security Gateway Stabilization ... Upgrade an r12.1 SOA Security Gateway ... XML Digital Signature Authentication

Chapter 7: General Considerations 41

Chapter 7: General Considerations

This section contains the following topics:

Application Objects Appear in the Policy Server User Interface (see page 41) System Management Limitations (see page 41) Policy Server Limitations (see page 41) User Directory Limitations (see page 44)

Application Objects Appear in the Policy Server User Interface

If you are using Enterprise Policy Management in a 6.0 SP5 environment, application-related objects you create using the Administrative UI also appear in the Java applet-based Policy Server User Interface. Do not modify these objects from the Policy Server User Interface. You should only modify application-related objects using the Administrative UI.

System Management Limitations

The following system management limitations exist:

Pop-up Blockers May Interfere with Help

Certain pop-up blockers or Web browsers may prevent the Administrative UI help window from opening. Many pop-up blockers allow the pop-up if you press CTRL while you click the link. You can also set your Web browser to allow pop-ups from the Administrative UI.

Policy Server Limitations

The following Policy Server limitations exist:

Page 42: CA SOA Security Manager - supportcontent.ca.com SOA Security Manager R12...SOA Security Gateway Stabilization ... Upgrade an r12.1 SOA Security Gateway ... XML Digital Signature Authentication

Policy Server Limitations

42 Release Notes

Leading Spaces in User Password May Not Be Accepted (27619)

A user whose password includes leading spaces may not be able to authenticate under the following combination of circumstances:

■ The Policy Server is running on Solaris.

■ The password with leading spaces is stored in an LDAP User Store.

Note: A password policy may or may not be enabled.

Certificate Mappings Issue with certain Policy Stores (27027, 30824, 29487)

Certificate mappings do not work when the IssuerDN field is longer than 57 characters for policy stores installed on the following directories:

■ Novell eDirectory

■ Active Directory

■ Critical Path

Handshake Errors with Shared Secret Rollover Enabled (27406)

In the Policy Server error log, you may see an occasional handshake error related to the shared secret, followed by a successful connection. This may occur if the shared secret rollover feature was enabled for the Web Agent communicating with the Policy Server. This behavior is expected as part of a normal shared secret rollover. You can ignore these errors.

Policy Servers Sharing Policy Store Not Updated Consistently (39844) (39837)

If you have a frequently updated policy store shared by multiple Policy Servers, not all of the Policy Servers are updated consistently. This is caused by ServerCommand getting deleted before the Policy Servers had a chance to update their cache.

To fix this problem, increase the following DWORD registry setting:

SiteMinder\CurrentVersion\ObjectStore

Key: ServerCommandTimeDelay

Change value to 10.

Page 43: CA SOA Security Manager - supportcontent.ca.com SOA Security Manager R12...SOA Security Gateway Stabilization ... Upgrade an r12.1 SOA Security Gateway ... XML Digital Signature Authentication

Policy Server Limitations

Chapter 7: General Considerations 43

Certain User Name Characters Cause Authenticating or Authorizing Problems (39832)

When the Policy Server is using an LDAP user store, users with characters such as &, * , \, and \\ in their user names are not getting authenticated and authorized properly. For example, the Policy Server does not authenticate or authorize these sample users:

■ use&r1

■ use*r2

■ use\r3

■ use\\r4

Policy Server Fails to Initialize Java Virtual Machine on Red Hat AS 3.0 (44649) (44971)

On Red Hat Linux Enterprise AS 3.0 with Update 5, the Policy Server may fail to initialize the Java Virtual Machine when running on a multi-processor machine. As a result, the following SiteMinder functionality does not work:

■ Java authentication schemes

■ Java active rules, policies, and responses

■ SAML federation

This problem is caused by an incompatibility between the Sun JDK on Linux and Red Hat's ExecShield, a kernel-based security feature. A work-around is to disable the ExecShield in the Linux SMP kernel only.

To decide if you want to disable the ExecShield, see Red Hat's "New Security Enhancements in Red Hat Enterprise Linux v.3, update 3" at http://www.redhat.com/f/pdf/rhel/WHP0006US_Execshield.pdf.

To disable ExecShield in the Linux SMP kernel only

1. In the /etc/grub.conf file, set the noexec=off kernel parameter in the SMP kernel only, as noted in the following example:

title Red Hat Enterprise Linux AS (2.4.21-32.ELsmp)

root (hd0,0)

kernel /vmlinuz-2.4.21-32.ELsmp ro root=LABEL=/noexec=off

initrd /initrd-2.4.21-32.ELsmp.img

2. Reboot the machine.

Page 44: CA SOA Security Manager - supportcontent.ca.com SOA Security Manager R12...SOA Security Gateway Stabilization ... Upgrade an r12.1 SOA Security Gateway ... XML Digital Signature Authentication

User Directory Limitations

44 Release Notes

Option to Create Copies of Existing Policy Server Objects

When creating Policy Server objects in the Administrative UI, you have the option of creating a copy of an existing object of the same type. The copy option is not available for the following objects:

■ Agent Type

■ AuthAz Directory Mapping

■ AuthValidate Directory Mapping

■ Certificate Mapping

■ User Directory

■ Application

■ Application Resource

■ Domain

■ Policy

■ Realm

■ Response

■ Response Attribute

■ Rule

■ Global Policy

■ Global Response

■ Global Rule

■ Password Policy

■ Administrator

User Directory Limitations

The following user directory limitation exists:

ODBC User Store Failover

Given

A Policy Server is configured on Solaris to use two Oracle-based user stores: one is the primary user store and the other is the secondary user store.

Page 45: CA SOA Security Manager - supportcontent.ca.com SOA Security Manager R12...SOA Security Gateway Stabilization ... Upgrade an r12.1 SOA Security Gateway ... XML Digital Signature Authentication

User Directory Limitations

Chapter 7: General Considerations 45

Result

The time for the Policy Server to failover from the primary to the secondary, in the event of a network failure, may be as long as 8 minutes.

Solution

This time can be reduced by setting the TCP/IP setting, tcp_ip_abort_interval, to the desired time.

Page 46: CA SOA Security Manager - supportcontent.ca.com SOA Security Manager R12...SOA Security Gateway Stabilization ... Upgrade an r12.1 SOA Security Gateway ... XML Digital Signature Authentication
Page 47: CA SOA Security Manager - supportcontent.ca.com SOA Security Manager R12...SOA Security Gateway Stabilization ... Upgrade an r12.1 SOA Security Gateway ... XML Digital Signature Authentication

Chapter 8: Known Issues 47

Chapter 8: Known Issues

This section contains the following topics:

General Issues (see page 47) Install Issues (see page 50) SOA Agent for Web Servers Issues (see page 55) SOA Agent for IBM WebSphere Issues (see page 55) SOA Agent for Oracle WebLogic Issues (see page 57) CA SOA Security Manager SDK Issues (see page 58)

General Issues

The following topics describe general known issues.

Policy Server JVM Initialization Failure (61775)

The JVM required for some Policy Server features (such as the Session Server and XML key database) can sometimes fail to launch because it attempts to allocate too much memory.

Workaround

1. Navigate to the soa_home/siteminder/config directory.

soa_home

Specifies the SOA Security Manager installation location.

2. Open the JVMOptions.txt file in a text editor and add the following two lines anywhere in the file:

-Xms256M

-Xmx256M

Note: The numeric component of each entry (which specify a memory allocation value in Megabytes) can be adjusted to suit your environment; however, it is recommended that both settings be set to the same value. For example, if the JVM needs more memory, you could set both values to 512.

3. Reboot the server.

(If the settings are inappropriate, an error message will be generated in the smps.log indicating that the JVM could not be initialized.)

Page 48: CA SOA Security Manager - supportcontent.ca.com SOA Security Manager R12...SOA Security Gateway Stabilization ... Upgrade an r12.1 SOA Security Gateway ... XML Digital Signature Authentication

General Issues

48 Release Notes

SOA Agents and XML Agents Use Incompatible Algorithms for Signing SAML Assertions (60678)

Due to differences between the encryption algorithms embedded within CA SOA Security Manager r12 SOA Agents (including the SOA Security Gateway) and earlier TransactionMinder XML Agents, SAML assertions (in both SAML Session Tickets and WS-Security SAML tokens) signed by XML Agents cannot be verified in CA SOA Security Manager and SAML assertions signed within CA SOA Security Manager cannot be verified by TransactionMinder.

Normal XML signing does work between TransactionMinder and CA SOA Security Manager.

Workaround

Do not implement chain or multistep authentication service models using signed SAML assertions where all agents in the flow are not at the same product level (that is, all SOA Agents or all XML Agents).

SOA Security Manager Fails To Generate WS-Security Headers Using RSA-OAEP Encryption (70408)

SOA Security Manager fails to create an encrypted WS-Security token when a response is configured to use the RSA-OAEP algorithm to encrypt the symmetric encryption key, generating the following error in tmxmltoolkit.log:

008-05-22 14:53:10,531 [INFO] handler.response.WSSecurityUsernameResponseHandler

8A2ADA6E-3D9B-57FB-35E3-9CC05471E849 - Cannot do encryption: unsupported key

algorithm provided: rsa_oaep

Workaround

Configure the WS-Security header generating response to use the default rsa-1_5 algorithm to encrypt the symmetric encryption key.

Signing Not Working for SAML Session Tickets in SOAP Envelope (74036)

If configured to generate signed SAML Session Tickets in the SOAP envelope, CA SOA Security Manager produces the SAML Session Ticket and places it in the SOAP envelope as expected, but the message is not signed.

Signing works correctly for SAML Session Tickets placed in HTTP headers or HTTP cookies.

Page 49: CA SOA Security Manager - supportcontent.ca.com SOA Security Manager R12...SOA Security Gateway Stabilization ... Upgrade an r12.1 SOA Security Gateway ... XML Digital Signature Authentication

General Issues

Chapter 8: Known Issues 49

"JVM - JNI code: -1(JNI_ERR)" Errors in Policy Server Log (68569)

In some situations, the default JVM memory allocations can be insufficient on the Policy Server, preventing retrieval of certificates from the key store. If this happens, "JVM - JNI code: -1(JNI_ERR)" errors are written to the Policy Server log.

Workaround

Add a line specifying appropriate the minimum and maximum JVM memory allocation pool sizes to the JVMOptions.txt file in SOA_HOME\siteminder\config using the following parameters:

-Xms

Specifies the minimum size of the JVM memory allocation pool. Set this value to a multiple of 1024 that is greater than 1MB. As a general rule, set minimum heap size (-Xms) equal to the maximum heap size (-Xmx).

-Xmx

Specifies the maximum Java heap size. Set this value to a multiple of 1024 that is greater than 1MB.

For example:

-Xms128m -Xmx128m

Note: For complete information about the settings contained in the JVMOptions.txt file, see your Java documentation.

Operation-Level Policy Changes Not Committed In Certain Situation When Configuring Application Policy From WSDL (69006)

When creating an application policy from a WSDL file, operation-level policy changes in the Define Web Service Protection Policy table are lost if you return to the top level by clicking the All Web Services link and then immediately click the Next button to proceed.

Workaround

After you have specified operation-level policy changes for a particular port, if you click the All Web Services to return to the top level of the Define Web Service Protection Policy table, click any other button or link (for example, the link for that port again) before clicking Next to ensure the operation-level changes are committed.

Page 50: CA SOA Security Manager - supportcontent.ca.com SOA Security Manager R12...SOA Security Gateway Stabilization ... Upgrade an r12.1 SOA Security Gateway ... XML Digital Signature Authentication

Install Issues

50 Release Notes

Clicking Back Button in Secure Web Services from WSDL Wizard Sometimes Causes "Array Index out of range error -1" (72176)

Clicking the Back button on the Secure Web Services from WSDL: Define Policies pane of the Secure Web Services from WSDL Wizard sometimes results in an "Array Index out of range error -1". This error is non-fatal and can be ignored.

Install Issues

The following topics describe known issues related to product installation and uninstallation.

Back Option Not Supported During Console Mode Install (74339)

The option to go back to reenter incorrectly supplied information is not supported during console mode installation on UNIX.

Page 51: CA SOA Security Manager - supportcontent.ca.com SOA Security Manager R12...SOA Security Gateway Stabilization ... Upgrade an r12.1 SOA Security Gateway ... XML Digital Signature Authentication

Install Issues

Chapter 8: Known Issues 51

SOA Agent Configuration Wizard Does Not Provide FIPS-migration Option (142521)

The SOA Agent Configuration Wizard provides options to specify FIPS-compatibility and FIPS-only modes, but does not provide an option to set FIPS-migration mode.

Workaround

FIPS-migration mode is available and can set manually by using the smreghost command.

1. Open a command window.

2. Enter the smreghost command using the following required arguments:

smreghost -i policy_server_IP_address:[port] -u administrator_username -p

Administrator_password -hn hostname_for_registration -hc

host_configuration_object -cf MIGRATE -f path_to_host_config_file

Note: Separate each command argument from its value with a space. Surround any values that contain spaces with double quotes (").

Where the command arguments are as follows:

-i policy_server_IP_ address:port

Indicates the IP address of the Policy Server where you are registering this host. Specify the port of the authentication server only if you are not using the default port.

If you specify a port number, which can be a non-default port, that port is used for all three Policy Server servers (authentication, authorization, accounting), however, the unified server responds to any Agent request on any port. For example, if you specify port 55555, the policy server entry in the SmHost.conf file will show the following:

"policy_server_ip_address,55555,55555,55555"

Example: (IPv4) 127.0.0.1,55555

Example: (IPv6) [2001:DB8::/32][:55555]

-u administrator_username

Indicates the name of the CA SOA Security Manager administrator with the rights to register a trusted host.

-p Administrator_password

Indicates the password of the Administrator who is allowed to register a trusted host.

Page 52: CA SOA Security Manager - supportcontent.ca.com SOA Security Manager R12...SOA Security Gateway Stabilization ... Upgrade an r12.1 SOA Security Gateway ... XML Digital Signature Authentication

Install Issues

52 Release Notes

-hn hostname_for_registration

Indicates the name of the host to be registered. This can be any name that identifies the host, but it must be unique. After registration, this name is placed in the Trusted Host list in the Administrative UI.

-hc host_config_object

Indicates the name of the Host Configuration Object configured at the Policy Server. This object must exist on the Policy Server before you can register a trusted host.

-cf FIPS mode

Specifies one of the following FIPS modes:

■ COMPAT--Specifies non-FIPS mode, which lets the Policy Server and the Agents read and write information using the existing CA SOA Security Manager encryption algorithms. If your organization does not require the use of FIPS-compliant algorithms, the Policy Server and the Agents can operate in non-FIPS mode without further configuration.

■ MIGRATE--Specifies FIPS-migration mode, which is used when you are upgrading an earlier version of CA SOA Security Manager to full-FIPS mode. The Policy Server and the Agents continue to use the existing CA SOA Security Manager encryption algorithms as you migrate your environment to use only FIPS 140-2 approved algorithms.

■ ONLY--Specifies full-FIPS mode, which requires that the Policy Server and Web Agents read and write information using only FIPS 140-2 algorithms.

Important! A CA SOA Security Manager installation that is running in Full FIPS mode cannot interoperate with, or be backward compatible to, earlier versions of CA SOA Security Manager, including all agents, custom software using older versions of the Agent API, and custom software using PM APIs or any other API that the Policy Server exposes. You must re-link all such software with the corresponding versions of the respective SDKs to achieve the required support for Full FIPS mode.

If this switch is not used, or you use the switch without specifying a mode, the default setting is used.

Default: COMPAT

Note: More information on the FIPS Certified Module and the algorithms being used; the data that is being protected; and the CA SOA Security Manager Cryptographic Boundary exists in the Policy Server Administration Guide.

-f path_to_host_config_file

(Optional) Indicates the full path to the file that contains the registration data. The default file is SmHost.conf. If you do not specify a path, the file is installed in the location where you are running the smreghost tool.

If you use the same name as an existing host configuration file, the tool backs up the original and adds a .bk extension to the backup file name.

Page 53: CA SOA Security Manager - supportcontent.ca.com SOA Security Manager R12...SOA Security Gateway Stabilization ... Upgrade an r12.1 SOA Security Gateway ... XML Digital Signature Authentication

Install Issues

Chapter 8: Known Issues 53

Windows example:

smreghost -i 123.123.1.1 -u SiteMinder -p mypw -hn "host computer A"

-hc DefaultHostSettings -cf MIGRATE -f "C:Program Files\CA\SOA Security

Manager\bin"

UNIX example:

smreghost -i 123.123.1.1 -u SiteMinder -p mypw -hn "host computer A"

-hc DefaultHostSettings -cf MIGRATE -f "/CA/SOA_Security_Manager/bin"

The agent is reregistered in FIPS-migration mode.

3. Repeat the previous steps for each server in the environment on which a trusted host is registered.

FIPS migration strategy for a complete CA SOA Security Manager environment is documented in the CA SOA Security Manager Upgrade Guide.

Uninstaller Fails with Errors (66522)

Attempting to uninstall any CA SOA Security Manager component without the prerequisite level of JVM installed and correctly referenced in the system path causes the uninstaller to fail with one of the following errors:

■ “Could not find a valid Java virtual machine to load. You need to reinstall a supported Java virtual machine.”

■ "No Java virtual machine could be found from your PATH environment variable. You must install a VM prior to running this program."

Workaround

Make sure the JRE is in the PATH variable.

Incomplete Uninstall Incorrectly Removes Master Uninstaller on Windows (70411)

On Windows, performing an incomplete uninstall (that is, removing some but not all installed components) can result in deletion of the CA SOA Security Manager uninstaller (SOA_HOME\install_config_info\soa-uninstall.cmd), preventing its use to remove other components.

Workaround

Use individual component uninstallers to remove them.

Page 54: CA SOA Security Manager - supportcontent.ca.com SOA Security Manager R12...SOA Security Gateway Stabilization ... Upgrade an r12.1 SOA Security Gateway ... XML Digital Signature Authentication

Install Issues

54 Release Notes

Uninstaller Not Removing Administrative UI Folders and Files (74112)

The CA SOA Security Manager uninstaller fails to properly uninstall the CA SOA Security Manager Administrative UI and all its constituent components. The uninstaller does not remove the folders that were created under CA_install_dir during installation (soa-adminui, smwamui, IAM Suite) or deployed JAR files.

Workaround

To remove the SOA Admin UI and all it's constituent components, run the uninstallers for the individual components in the following order:

Windows

1. SOA_HOME\IAM Suite\siteminderWAM\iam-suite-uninstall.bat

2. SOA_HOME\smwamui\install_config_info\smwam-ui-uninstall.bat

3. SOA_HOME\soa-adminui\install_config_info\soa-adminui-uninstall.bat

4. SOA_HOME\install_config_info\soa-uninstall.bat

UNIX

1. SOA_HOME/IAM Suite/siteminderWAM/iam-suite-uninstall.sh

2. SOA_HOME/smwamui/install_config_info/smwam-ui-uninstall.sh

3. SOA_HOME/soa-adminui/install_config_info/soa-adminui-uninstall.sh

4. SOA_HOME/install_config_info/soa-uninstall.sh

Uninstaller Not Removing SDK (99734)

The CA SOA Security Manager uninstaller fails to uninstall the CA SOA Security Manager SDK files.

Workaround

To remove the CA SOA Security Manager SDK run the commands appropriate for your operating system.

Windows

1. Navigate to SOA_HOME\soa-sdk\uninstalldata

2. Execute uninstall.exe

UNIX

1. Navigate to SOA_HOME/soa-sdk/uninstalldata

2. Execute uninstall.bin.

Page 55: CA SOA Security Manager - supportcontent.ca.com SOA Security Manager R12...SOA Security Gateway Stabilization ... Upgrade an r12.1 SOA Security Gateway ... XML Digital Signature Authentication

SOA Agent for Web Servers Issues

Chapter 8: Known Issues 55

Uninstall Fails On AIX If uninstall.lax References a 6.x JRE (139730)

On AIX, if the lax.nl.current.vm variable in the uninstall.lax file points to a 6.x JRE, the CA SOA Security Manager uninstaller fails with errors.

Workaround

Modify the "lax.nl.current.vm" variable in the uninstall.lax file to reference the path to a 5.x JRE before starting the uninstaller.

SOA Agent for Web Servers Issues

The following topics describe SOA Agent for Web Servers issues.

SOA Agent for Web Servers Failover to Secondary Policy Server Slow

If configured for failover and the primary Policy Server fails, the SOA Agent for Web Servers can take up to one minute to failover to the secondary Policy Server.

SOA Agent Configuration Wizard Fails Intermittently for IIS 7.x SOA Agent on Windows Server 2008 (142248)

Unattended configuration sometimes fails when attempting to configure the SOA Agent for Web Servers to work with IIS 7.x on Windows Server 2008. In this case, the following message is written to the log:

“Unable to write to applicationHost.conf file. Please Restart the IIS Webserver and

redo the configuration.”

This issue occurs when the configuration wizard cannot stop IIS before it attempts to modify the IIS applicationHost.file and therefore cannot edit the file because it is still in use.

Workaround

Stop IIS 7.x before attempting unattended configuration of the SOA Agent.

SOA Agent for IBM WebSphere Issues

The following topics describe known issues in the SOA Agent for IBM WebSphere.

Page 56: CA SOA Security Manager - supportcontent.ca.com SOA Security Manager R12...SOA Security Gateway Stabilization ... Upgrade an r12.1 SOA Security Gateway ... XML Digital Signature Authentication

SOA Agent for IBM WebSphere Issues

56 Release Notes

SOA Agent for IBM WebSphere Limitations

The SOA Agent for IBM WebSphere has the following limitations:

■ XML Digital Signature Authentication scheme is not supported

■ WS-Security Signature and Encryption are not supported

■ mustUnderstand attribute in WS-Security header is not supported

SOA Agent and SiteMinder Agent for IBM WebSphere Coexistence Limitation (61190)

The following use case for coexistence of SOA Agent for IBM WebSphere and SiteMinder Agent for IBM WebSphere is not supported:

■ SOA Agent for IBM WebSphere and SiteMinder Agent for IBM WebSphere both configured in the same JVM instance (that is, in the same WebSphere profile)

■ SOA Agent for IBM WebSphere and SiteMinder Agent for IBM WebSphere both configured to the have the same default Agent name.

■ WebSphere Java 2 security and application security enabled

If you do configure such an environment, the SiteMinder TAI Module will intercept web service requests that should be handled by the SOA Agent.

mustUnderstand Attribute Limitation (61018, 60551)

The SOA Agent for IBM WebSphere does not support generation of WS-Security mustUnderstand attributes.

You should not therefore assign responses that generate mustUnderstand attributes to policies associated with resources protected by the SOA Agent for IBM WebSphere.

XML Digital Signature Authentication Fails for Certain Payloads on SOA Agent for IBM WebSphere (60619)

For resources protected by the SOA Agent for IBM WebSphere, XML Digital Signature authentication is failing for certain XML payloads.

Page 57: CA SOA Security Manager - supportcontent.ca.com SOA Security Manager R12...SOA Security Gateway Stabilization ... Upgrade an r12.1 SOA Security Gateway ... XML Digital Signature Authentication

SOA Agent for Oracle WebLogic Issues

Chapter 8: Known Issues 57

SOA Agent Configuration Wizard Cannot Unconfigure SOA Agent for WebSphere (66204)

The SOA Agent Configuration Wizard does not allow you to unconfigure the SOA Agent for WebSphere as it does for the SOA Agent for Web Servers.

Workaround

To unconfigure s SOA Agent for WebSphere (that is, to stop it from protecting web service resources in the WebSphere container), perform the following steps:

1. Back out all configuration changes you made to configure your web services to invoke the SOA Agent JAX-RPC Handler from deployment descriptors. For more information, see the SOA Agent Configuration Guide.

2. Uninstall the SOA Agent.

3. Restart WebSphere.

SOA Agent for Oracle WebLogic Issues

The following topics describe known issues in the SOA Agent for Oracle WebLogic.

SOA Agent for Oracle WebLogic Limitations

The SOA Agent for Oracle WebLogic has the following limitations:

■ Message-based authorization using variables is not supported

■ mustUnderstand attribute in WS-Security header is not supported

Page 58: CA SOA Security Manager - supportcontent.ca.com SOA Security Manager R12...SOA Security Gateway Stabilization ... Upgrade an r12.1 SOA Security Gateway ... XML Digital Signature Authentication

CA SOA Security Manager SDK Issues

58 Release Notes

SOA Agent Configuration Wizard Cannot Unconfigure SOA Agent for WebLogic (66204)

The SOA Agent Configuration Wizard does not allow you to unconfigure the SOA Agent for WebLogic as it does for the SOA Agent for Web Servers.

Workaround

To unconfigure s SOA Agent for WebLogic (that is, to stop it from protecting web service resources in the WebLogic container), perform the following steps:

1. Back out all configuration changes you made to configure your web services to invoke the SOA Agent JAX-RPC Handler from deployment descriptors or handler chain configuration files, as applicable. For more information, see the SOA Agent Configuration Guide.

2. Uninstall the SOA Agent.

3. Restart WebLogic.

CA SOA Security Manager SDK Issues

The following topics describe known issues in the CA SOA Security Manager SDK.

Web Service Client API XMLDocument Class signWSDocument Method Fails With Uninitialized Keystore Exception (133785)

When the signWSDocument method of the XMLDocument class of the Web Service Client API is called with a PEM format X.509 file argument, it fails with an "Uninitialized keystore" error.

Web Service Client API XMLDocument Class signWSDocument Method Fails to Decode DER Format Certificates (133787)

When the signWSDocument method of the XMLDocument class of the Web Service Client API is called with a DER format X.509 file argument, it throws an exception indicating it cannot parse the certificate.

Page 59: CA SOA Security Manager - supportcontent.ca.com SOA Security Manager R12...SOA Security Gateway Stabilization ... Upgrade an r12.1 SOA Security Gateway ... XML Digital Signature Authentication

CA SOA Security Manager SDK Issues

Chapter 8: Known Issues 59

Web Service Client API XMLDocument Class signDocument Method Produces XML Signatures with Unresolvable Reference URIs (133788)

When the signDocument method of the XMLDocument class of the Web Service Client API is called to sign a SOAP document with a DER format X.509 file argument, the method produces a signature that cannot be validated by a SOA Agent. The SOAP Body element is identified with the following syntactically correct attribute:

ID="Body"

However, SOA Agents can only resolve references to "Id", not "ID" attributes (note the case: Id as opposed to ID).

Web Service Client API XMLDocument Class signDocument Method Throws a NullPointerException when Signing Non-SOAP XML Using an X.509 Certificate (133789)

When the signDocument method of the XMLDocument class of the Web Service Client API is called to sign a non-SOAP XML document with a null publicKeyFile argument and a valid X.509 file argument, the method throws a NullPointerException.

Page 60: CA SOA Security Manager - supportcontent.ca.com SOA Security Manager R12...SOA Security Gateway Stabilization ... Upgrade an r12.1 SOA Security Gateway ... XML Digital Signature Authentication
Page 61: CA SOA Security Manager - supportcontent.ca.com SOA Security Manager R12...SOA Security Gateway Stabilization ... Upgrade an r12.1 SOA Security Gateway ... XML Digital Signature Authentication

Chapter 9: Defects Fixed in CA SOA Security Manager Releases 61

Chapter 9: Defects Fixed in CA SOA Security Manager Releases

This section contains the following topics:

Defects Fixed in r12.1 SP3 (see page 61) Defects Fixed in r12.1 as of CR1 (see page 62)

Defects Fixed in r12.1 SP3

The CA SOA Security Manager r12.1 SP3 release contains the following fixes.

Authentication of Encrypyted Requests Intermittently Failing with Red Hat Policy Server (77348)

Attempts by all SOA Agent types to connect to a RedHat Policy server to authenticate an encrypted request fail intermittently.

Responses Configured to Generate Signed SAML Session Tickets Using Public Key Obtained from XML Digital Signature Authentication Produce Unsigned SAML Session Tickets (98865)

Generation of signed SAML Session Tickets using the public key obtained from a digital signature by the XML Digital Signature authentication scheme results in the generation of an unsigned rather than signed SAML Session Ticket.

That is, if a web service is protected by the XML Digital Signature authentication scheme and a SAML Session Ticket response is configured to extract the client's public key from the certificate and use it to sign the SAML assertion, the generated SAML Session Ticket is not signed as expected.

Workaround

Configure the policy to obtain the public key from a source other than the document with the digital certificate. For example, configure the response to obtain the public key from a client certificate sent over an SSL connection or from the user store.

Page 62: CA SOA Security Manager - supportcontent.ca.com SOA Security Manager R12...SOA Security Gateway Stabilization ... Upgrade an r12.1 SOA Security Gateway ... XML Digital Signature Authentication

Defects Fixed in r12.1 as of CR1

62 Release Notes

WS-Security SAML 1.1 Holder of Key Assertion Not Accepted More Than Once (97266)

SOA Security Manager does not accept a WS-Security SAML 1.1 holder of key assertion token more than once; SAML 1.1 holder of key tokens cannot therefore be used in use cases where replay is required.

Workaround

SAML 2.0 holder of key tokens work as expected and can be used in to implement use cases in which replay is required.

Responses Defined When Creating an Application Within Secure Web Services from WSDL Operation Are Not Immediately Usable (70468)

If you choose to create the application object that will define your security policy from within the Secure Web Services from WSDL wizard any Responses created from the Responses tab of the Create Application nested task are not displayed or available for assignment in the Define web service protection policy table.

Workaround

If you need to bind responses to web service ports and operations on the Define Policies page of the Secure Web Services from WSDL wizard, you must create the application and the required responses prior to running the wizard.

SOA Agent for IBM WebSphere Fails Under Load on Windows

Because of a memory leak in com/ibm/ws/security/auth/AuthCache, the SOA Agent for IBM WebSphere fails under load.

An IBM support ticket (PMR 30393,756,000) is open for this issue.

Error Logged During Administrative UI Install on WebLogic (74188)

When you install the CA SOA Security Manager Administrative UI in console mode on a Weblogic Application server, a non-fatal error “ERROR - Command failed: Installing Workflow Store Data “ is written to the install log. You can ignore this error.

Defects Fixed in r12.1 as of CR1

This CA SOA Security Manager r12.1 release contains the following fixes.

Page 63: CA SOA Security Manager - supportcontent.ca.com SOA Security Manager R12...SOA Security Gateway Stabilization ... Upgrade an r12.1 SOA Security Gateway ... XML Digital Signature Authentication

Defects Fixed in r12.1 as of CR1

Chapter 9: Defects Fixed in CA SOA Security Manager Releases 63

Variables Created in Admin UI Containing Expression Keywords as Variable Name Substrings Being Resolved Incorrectly (71976)

Symptom:

Variables created in the CA SOA Security Manager Administrative UI which contain expression keywords (or, and, and so on) as substrings of the variable name are resolved incorrectly by the expression editor. For example a variable named "RandomVariableName" will be incorrectly converted to the name "R&omVariableName" causing the expression to be evaluated incorrectly.

Solution:

This is no longer an issue.

SOA Agent Configuration Wizard Fails to Make Necessary Configuration File Changes for SOA Agent for Apache Web Server (78481)

Symptom:

The SOA Agent configuration wizard is not making required configuration changes in the httpd.conf file or creating the required webagent.conf file, preventing the SOA Agent from starting.

Solution:

This is no longer an issue.

Page 64: CA SOA Security Manager - supportcontent.ca.com SOA Security Manager R12...SOA Security Gateway Stabilization ... Upgrade an r12.1 SOA Security Gateway ... XML Digital Signature Authentication

Defects Fixed in r12.1 as of CR1

64 Release Notes

Installer Properties File Used for Unattended Install Contains Bad Entries for SOA Admin UI on Windows (73363)

Symptom:

In the SOA installer property file created during install (SOA_HOME\install_config_info\ca-soasmr12-installer.properties), required double backslashes in pathnames in entries related to the SOA Admin UI are not present. For example, rather than the following expected entry:

DEFAULT_NETE_JAVA_HOME = E:\\ProgramFiles\\Java\\jdk1.5.0_01

The following incorrect entry is written in the file:

DEFAULT_NETE_JAVA_HOME has value E:ProgramFilesJavajdk1.5.0_01

Solution:

This is no longer an issue.

Uninstalling SOA Agent for IBM WebSphere Breaks the Application Server (72302)

Symptom:

When uninstalling the SOA Agent for IBM WebSphere, the CA SOA Security Manager uninstaller incorrectly deletes the WS_HOME/java/jre/lib/ext and WS_HOME/lib/ext directories, preventing the IBM WebSphere Application Server from running.

Solution:

This is no longer an issue.

Uninstall Does Not Remove the ETPKI Folder (72027)

Symptom:

The SOA Security Manager r12.1 uninstaller does not removing the soa_home\siteminder\ETPKI folder.

Solution:

This is no longer an issue.

Page 65: CA SOA Security Manager - supportcontent.ca.com SOA Security Manager R12...SOA Security Gateway Stabilization ... Upgrade an r12.1 SOA Security Gateway ... XML Digital Signature Authentication

Defects Fixed in r12.1 as of CR1

Chapter 9: Defects Fixed in CA SOA Security Manager Releases 65

Uninstall Does Not Remove SDK (68885)

Symptom:

The CA SOA Security Manager does not uninstall files associated with the CA SOA Security Manager SDK.

Solution

This is no longer an issue.

Failover to Second Policy Server in Cluster Fails for SOA Agent for Web Servers (73808)

Symptom:

The SOA Agent for Web Servers does not failover to a secondary Policy Server in a clustered environment when the primary Policy Server fails.

Solution:

This is no longer an issue.

Documentation Install Does Not Remove Older Documentation in Upgrade Scenario (74629)

Symptom:

The CA SOA Security Manager r12.1 documentation install leaves all existing r12.0 documentation files in place when upgrading to r12.1.

Solution:

This is no longer an issue.

Page 66: CA SOA Security Manager - supportcontent.ca.com SOA Security Manager R12...SOA Security Gateway Stabilization ... Upgrade an r12.1 SOA Security Gateway ... XML Digital Signature Authentication
Page 67: CA SOA Security Manager - supportcontent.ca.com SOA Security Manager R12...SOA Security Gateway Stabilization ... Upgrade an r12.1 SOA Security Gateway ... XML Digital Signature Authentication

Chapter 10: Guidelines for SiteMinder Customers 67

Chapter 10: Guidelines for SiteMinder Customers

This section contains information for existing SiteMinder customers adding CA SOA Security Manager to their environments.

You can upgrade an existing SiteMinder Policy Server to a SOA Security Manager Policy Server. A CA SOA Security Manager Policy Servers can perform the functions of both Policy Server types.

You can upgrade an existing SiteMinder Web Agent to a SOA Agent for Web Servers. The SOA Agent can perform the functions of both agent types, handling authenticating and authorizing for both web access and web service requests.

Note: After SiteMinder Policy Server and Web Agents are converted for CA SOA Security Manager use, you can apply CA SOA Security Manager and supported SiteMinder software updates. Before applying a SiteMinder software update to a CA SOA Security Manager Policy Server or SOA Agent, check the CA SOA Security Manager r12.1 Platform Support Matrix to confirm that it has been tested for compatibility with CA SOA Security Manager.

Upgrade a SiteMinder Policy Server or Web Agent

To upgrade a SiteMinder r12.x Policy Server or Web Agent to CA SOA Security Manager r12.1, run the CA SOA Security Manager r12.1 installer. The CA SOA Security Manager installer identifies the existing SiteMinder Policy Server or Web Agent software and upgrade it appropriately. (The r12.1 CA SOA Security Manager Policy Server and SOA Agent for Web Servers are SiteMinder r12 SP1-based). For more information about running the installer, see the CA SOA Security Manager r12.1 Implementation Guide.

To upgrade SiteMinder r6.x Policy Servers and Web Agents to CA SOA Security Manager r12.1, follow the procedures for migrating from CA SOA Security Manager r12.0 in the CA SOA Security Manager r12.1 Upgrade Guide. (The r12.0 CA SOA Security Manager Policy Server and SOA Agent for Web Servers are SiteMinder r6.0 SP5-based.)

Page 68: CA SOA Security Manager - supportcontent.ca.com SOA Security Manager R12...SOA Security Gateway Stabilization ... Upgrade an r12.1 SOA Security Gateway ... XML Digital Signature Authentication

Apply SiteMinder Updates to a CA SOA Security Manager Policy Server

68 Release Notes

Apply SiteMinder Updates to a CA SOA Security Manager Policy Server

After a SiteMinder Policy Server is converted for CA SOA Security Manager use, you can apply CA SOA Security Manager and supported SiteMinder software updates. Before applying a SiteMinder software update to a CA SOA Security Manager Policy Server, review the CA SOA Security Manager r12.1 Platform Support Matrix to confirm that it has been tested for compatibility with CA SOA Security Manager.

To apply SiteMinder Policy Server software update to a CA SOA Security Manager Policy Server:

1. Back up your Policy Server data, binaries, and configuration files.

2. Install the latest supported SiteMinder Policy Server update.

3. Reinstall the Policy Server using the CA SOA Security Manager r12.1 CR1 installer.

Apply SiteMinder Updates to a SOA Agent

After a SiteMinder Web Agent is converted for CA SOA Security Manager use as a SOA Agent, you can apply CA SOA Security Manager and supported SiteMinder Web Agent software updates. Before applying a SiteMinder software update to a CA SOA Security Manager Policy Server, review the CA SOA Security Manager r12.1 Platform Support Matrix to confirm that it has been tested for compatibility with CA SOA Security Manager.

To apply SiteMinder Web Agent software update to a SOA Agent

1. Back up the SOA Agent executables.

2. Back up the SOA Agent configuration file (SOA_HOME\webagent\config\conapi.conf).

3. Install the latest supported Web Agent software update.

4. Reinstall the SOA Agent using the CA SOA Security Manager r12.1 CR1 installer.

Page 69: CA SOA Security Manager - supportcontent.ca.com SOA Security Manager R12...SOA Security Gateway Stabilization ... Upgrade an r12.1 SOA Security Gateway ... XML Digital Signature Authentication

Chapter 11: International Support 69

Chapter 11: International Support

An internationalized product is an English product that runs correctly on local language versions of the required operating system and required third-party products, and supports local language data for input and output. Internationalized products also support the ability to specify local language conventions for date, time, currency and number formats.

A translated product (sometimes referred to as a localized product) is an internationalized product that includes local language support for the product user interface, online help and other documentation, and local language default settings for date, time, currency, and number formats.

CA SOA Security Manager is not an internationalized or translated product. CA supports only the English release of this product. If you run the product in any other language environment, you can experience problems.

Page 70: CA SOA Security Manager - supportcontent.ca.com SOA Security Manager R12...SOA Security Gateway Stabilization ... Upgrade an r12.1 SOA Security Gateway ... XML Digital Signature Authentication
Page 71: CA SOA Security Manager - supportcontent.ca.com SOA Security Manager R12...SOA Security Gateway Stabilization ... Upgrade an r12.1 SOA Security Gateway ... XML Digital Signature Authentication

Chapter 12: Documentation 71

Chapter 12: Documentation

This section contains the following topics:

CA SOA Security Manager Bookshelf (see page 71)

CA SOA Security Manager Bookshelf

Complete information about CA SOA Security Manager is available from the CA SOA Security Manager bookshelf. The CA SOA Security Manager bookshelf lets you:

■ Use a single console to view all documents published for CA SOA Security Manager.

■ Use a single alphabetical index to find a topic in any document.

■ Search all documents for one or more words.

View and download the CA SOA Security Manager bookshelf from the CA Technical Support site. You do not need to log in to the site to access the bookshelf.

If you plan to download the documentation, we recommend that you download it before beginning the installation process.

Page 72: CA SOA Security Manager - supportcontent.ca.com SOA Security Manager R12...SOA Security Gateway Stabilization ... Upgrade an r12.1 SOA Security Gateway ... XML Digital Signature Authentication
Page 73: CA SOA Security Manager - supportcontent.ca.com SOA Security Manager R12...SOA Security Gateway Stabilization ... Upgrade an r12.1 SOA Security Gateway ... XML Digital Signature Authentication

Appendix A: Platform Support and Installation Media 73

Appendix A: Platform Support and Installation Media

This section contains the following topics:

Locate the CA SOA Security Manager Platform Support Matrix (see page 73) Locate the Bookshelf (see page 73) Locate the Installation Media (see page 74)

Locate the CA SOA Security Manager Platform Support Matrix

You can find a comprehensive list of the CA and third–party components supported by CA SOA Security Manager on the Technical Support site.

To locate the support matrix from the Support site

1. Log in to the Technical Support site.

2. Under Support, click Support By Product.

3. Enter CA CA SOA Security Manager in the Select a Product Page field and press Enter.

The CA CA SOA Security Manager product page appears.

4. Click Product Status, CA CA SOA Security Manager Family of Products Platform Support Matrices.

Note: You can download the latest JDK and JRE versions at the Oracle Developer Network.

Locate the Bookshelf

The CA SOA Security Manager bookshelf is available on the Technical Support site.

To locate the support matrix from the Support site

1. Go to the Technical Support site.

Note: You do not have to log in.

2. (Optional) If the Get Support tab is not pulled to the front, click Get Support.

3. Click Product Documentation.

The Support by Product page appears.

Page 74: CA SOA Security Manager - supportcontent.ca.com SOA Security Manager R12...SOA Security Gateway Stabilization ... Upgrade an r12.1 SOA Security Gateway ... XML Digital Signature Authentication

Locate the Installation Media

74 Release Notes

4. Enter CA CA SOA Security Manager in the Select a Bookshelf field and click Go.

The CA CA SOA Security Manager bookshelf main page appears.

Locate the Installation Media

You can find a comprehensive list of the CA SOA Security Manager installation media on the Technical Support site.

To locate the support matrix from the Support site

1. Log into the Technical Support site.

2. Under Support, click Download Center, Products.

The Download Center screen appears.

3. Enter CA SOA Security Manager in the Select a Product field.

4. Select a release from the Select a Release list.

5. Select a service pack from the Select a Gen Level list.

6. Click Go.

The Product Downloads screen appears. All CA SOA Security Manager installation executables are listed.

Note: Extract all files and directories in the CA SOA Security Manager distribution to a common location on a local drive and keep them together—the CA SOA Security Manager installers cannot run without the included supporting files.

Page 75: CA SOA Security Manager - supportcontent.ca.com SOA Security Manager R12...SOA Security Gateway Stabilization ... Upgrade an r12.1 SOA Security Gateway ... XML Digital Signature Authentication

Appendix B: Third-Party Acknowledgements 75

Appendix B: Third-Party Acknowledgements

This section contains the following topics:

Activation 1.1.1 (see page 76) AdvantNet (see page 82) Apache (see page 82) Boost (see page 87) Compuware Corporation (see page 87) Eclipse Higgins v.1.0 (see page 87) ICU4C (see page 92) JAXB 2.0 (see page 93) JWSDP 2.0 (see page 99) PCRE 6.3 (see page 100) Rhino (see page 101) SAAJ 1.3 (see page 112) Sun JDK 1.6.0 (see page 119) wsdl4j 1.62 (see page 126)

Page 76: CA SOA Security Manager - supportcontent.ca.com SOA Security Manager R12...SOA Security Gateway Stabilization ... Upgrade an r12.1 SOA Security Gateway ... XML Digital Signature Authentication

Activation 1.1.1

76 Release Notes

Activation 1.1.1

Activation was obtained under the CDDL v.1.0 license, the terms and conditions of which are set forth below. Activation is distributed by CA for use with this CA product in unmodified, object code form, under the CA license agreement. Any provisions in the CA license agreement that differ from the CDDL are offered by CA alone and not by any other party. Source code for Activation is available at http://ebr.springsource.com/repository/app/bundle/version/detail?name=com.springsource.javax.activation&version=1.1.1. In addition, CA makes the source code for Activation available at http://opensrcd.ca.com/ips/07111_1/ under the terms of the CDDL v.1.0. license:

1. Definitions.

1.1. Contributor means each individual or entity that creates or contributes to the creation of Modifications.

1.2. Contributor Version means the combination of the Original Software, prior Modifications used by a Contributor (if any), and the Modifications made by that particular Contributor.

1.3. Covered Software means (a) the Original Software, or (b) Modifications, or (c) the combination of files containing Original Software with files containing Modifications, in each case including portions thereof.

1.4. Executable means the Covered Software in any form other than Source Code.

1.5. Initial Developer means the individual or entity that first makes Original Software available under this License.

1.6. Larger Work means a work which combines Covered Software or portions thereof with code not governed by the terms of this License.

1.7. License means this document.

1.8. Licensable means having the right to grant, to the maximum extent possible, whether at the time of the initial grant or subsequently acquired, any and all of the rights conveyed herein.

1.9. Modifications means the Source Code and Executable form of any of the following:

A. Any file that results from an addition to, deletion from or modification of the contents of a file containing Original Software or previous Modifications;

B. Any new file that contains any part of the Original Software or previous Modification; or

Page 77: CA SOA Security Manager - supportcontent.ca.com SOA Security Manager R12...SOA Security Gateway Stabilization ... Upgrade an r12.1 SOA Security Gateway ... XML Digital Signature Authentication

Activation 1.1.1

Appendix B: Third-Party Acknowledgements 77

C. Any new file that is contributed or otherwise made available under the terms of this License.

1.10. Original Software means the Source Code and Executable form of computer software code that is originally released under this License.

1.11. Patent Claims means any patent claim(s), now owned or hereafter acquired, including without limitation, method, process, and apparatus claims, in any patent Licensable by grantor.

1.12. Source Code means (a) the common form of computer software code in which modifications are made and (b) associated documentation included in or with such code.

1.13. You (or Your) means an individual or a legal entity exercising rights under, and complying with all of the terms of, this License. For legal entities, You includes any entity which controls, is controlled by, or is under common control with You. For purposes of this definition, control means (a) the power, direct or indirect, to cause the direction or management of such entity, whether by contract or otherwise, or (b) ownership of more than fifty percent (50%) of the outstanding shares or beneficial ownership of such entity.

2. License Grants.

2.1. The Initial Developer Grant.

Conditioned upon Your compliance with Section 3.1 below and subject to third party intellectual property claims, the Initial Developer hereby grants You a world-wide, royalty-free, non-exclusive license:

(a) under intellectual property rights (other than patent or trademark) Licensable by Initial Developer, to use, reproduce, modify, display, perform, sublicense and distribute the Original Software (or portions thereof), with or without Modifications, and/or as part of a Larger Work; and

(b) under Patent Claims infringed by the making, using or selling of Original Software, to make, have made, use, practice, sell, and offer for sale, and/or otherwise dispose of the Original Software (or portions thereof).

(c) The licenses granted in Sections 2.1(a) and (b) are effective on the date Initial Developer first distributes or otherwise makes the Original Software available to a third party under the terms of this License.

(d) Notwithstanding Section 2.1(b) above, no patent license is granted: (1) for code that You delete from the Original Software, or (2) for infringements caused by: (i) the modification of the Original Software, or (ii) the combination of the Original Software with other software or devices.

2.2. Contributor Grant.

Page 78: CA SOA Security Manager - supportcontent.ca.com SOA Security Manager R12...SOA Security Gateway Stabilization ... Upgrade an r12.1 SOA Security Gateway ... XML Digital Signature Authentication

Activation 1.1.1

78 Release Notes

Conditioned upon Your compliance with Section 3.1 below and subject to third party intellectual property claims, each Contributor hereby grants You a world-wide, royalty-free, non-exclusive license:

(a) under intellectual property rights (other than patent or trademark) Licensable by Contributor to use, reproduce, modify, display, perform, sublicense and distribute the Modifications created by such Contributor (or portions thereof), either on an unmodified basis, with other Modifications, as Covered Software and/or as part of a Larger Work; and

(b) under Patent Claims infringed by the making, using, or selling of Modifications made by that Contributor either alone and/or in combination with its Contributor Version (or portions of such combination), to make, use, sell, offer for sale, have made, and/or otherwise dispose of: (1) Modifications made by that Contributor (or portions thereof); and (2) the combination of Modifications made by that Contributor with its Contributor Version (or portions of such combination).

(c) The licenses granted in Sections 2.2(a) and 2.2(b) are effective on the date Contributor first distributes or otherwise makes the Modifications available to a third party.

(d) Notwithstanding Section 2.2(b) above, no patent license is granted: (1) for any code that Contributor has deleted from the Contributor Version; (2) for infringements caused by: (i) third party modifications of Contributor Version, or (ii) the combination of Modifications made by that Contributor with other software (except as part of the Contributor Version) or other devices; or (3) under Patent Claims infringed by Covered Software in the absence of Modifications made by that Contributor.

3. Distribution Obligations.

3.1. Availability of Source Code.

Any Covered Software that You distribute or otherwise make available in Executable form must also be made available in Source Code form and that Source Code form must be distributed only under the terms of this License. You must include a copy of this License with every copy of the Source Code form of the Covered Software You distribute or otherwise make available. You must inform recipients of any such Covered Software in Executable form as to how they can obtain such Covered Software in Source Code form in a reasonable manner on or through a medium customarily used for software exchange.

3.2. Modifications.

The Modifications that You create or to which You contribute are governed by the terms of this License. You represent that You believe Your Modifications are Your original creation(s) and/or You have sufficient rights to grant the rights conveyed by this License.

3.3. Required Notices.

Page 79: CA SOA Security Manager - supportcontent.ca.com SOA Security Manager R12...SOA Security Gateway Stabilization ... Upgrade an r12.1 SOA Security Gateway ... XML Digital Signature Authentication

Activation 1.1.1

Appendix B: Third-Party Acknowledgements 79

You must include a notice in each of Your Modifications that identifies You as the Contributor of the Modification. You may not remove or alter any copyright, patent or trademark notices contained within the Covered Software, or any notices of licensing or any descriptive text giving attribution to any Contributor or the Initial Developer.

3.4. Application of Additional Terms.

You may not offer or impose any terms on any Covered Software in Source Code form that alters or restricts the applicable version of this License or the recipients rights hereunder. You may choose to offer, and to charge a fee for, warranty, support, indemnity or liability obligations to one or more recipients of Covered Software. However, you may do so only on Your own behalf, and not on behalf of the Initial Developer or any Contributor. You must make it absolutely clear that any such warranty, support, indemnity or liability obligation is offered by You alone, and You hereby agree to indemnify the Initial Developer and every Contributor for any liability incurred by the Initial Developer or such Contributor as a result of warranty, support, indemnity or liability terms You offer.

3.5. Distribution of Executable Versions.

You may distribute the Executable form of the Covered Software under the terms of this License or under the terms of a license of Your choice, which may contain terms different from this License, provided that You are in compliance with the terms of this License and that the license for the Executable form does not attempt to limit or alter the recipients rights in the Source Code form from the rights set forth in this License. If You distribute the Covered Software in Executable form under a different license, You must make it absolutely clear that any terms which differ from this License are offered by You alone, not by the Initial Developer or Contributor. You hereby agree to indemnify the Initial Developer and every Contributor for any liability incurred by the Initial Developer or such Contributor as a result of any such terms You offer.

3.6. Larger Works.

You may create a Larger Work by combining Covered Software with other code not governed by the terms of this License and distribute the Larger Work as a single product. In such a case, You must make sure the requirements of this License are fulfilled for the Covered Software.

4. Versions of the License.

4.1. New Versions.

Sun Microsystems, Inc. is the initial license steward and may publish revised and/or new versions of this License from time to time. Each version will be given a distinguishing version number. Except as provided in Section 4.3, no one other than the license steward has the right to modify this License.

4.2. Effect of New Versions.

Page 80: CA SOA Security Manager - supportcontent.ca.com SOA Security Manager R12...SOA Security Gateway Stabilization ... Upgrade an r12.1 SOA Security Gateway ... XML Digital Signature Authentication

Activation 1.1.1

80 Release Notes

You may always continue to use, distribute or otherwise make the Covered Software available under the terms of the version of the License under which You originally received the Covered Software. If the Initial Developer includes a notice in the Original Software prohibiting it from being distributed or otherwise made available under any subsequent version of the License, You must distribute and make the Covered Software available under the terms of the version of the License under which You originally received the Covered Software. Otherwise, You may also choose to use, distribute or otherwise make the Covered Software available under the terms of any subsequent version of the License published by the license steward.

4.3. Modified Versions.

When You are an Initial Developer and You want to create a new license for Your Original Software, You may create and use a modified version of this License if You: (a) rename the license and remove any references to the name of the license steward (except to note that the license differs from this License); and (b) otherwise make it clear that the license contains terms which differ from this License.

5. DISCLAIMER OF WARRANTY.

COVERED SOFTWARE IS PROVIDED UNDER THIS LICENSE ON AN AS IS BASIS, WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, WARRANTIES THAT THE COVERED SOFTWARE IS FREE OF DEFECTS, MERCHANTABLE, FIT FOR A PARTICULAR PURPOSE OR NON-INFRINGING. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE COVERED SOFTWARE IS WITH YOU. SHOULD ANY COVERED SOFTWARE PROVE DEFECTIVE IN ANY RESPECT, YOU (NOT THE INITIAL DEVELOPER OR ANY OTHER CONTRIBUTOR) ASSUME THE COST OF ANY NECESSARY SERVICING, REPAIR OR CORRECTION. THIS DISCLAIMER OF WARRANTY CONSTITUTES AN ESSENTIAL PART OF THIS LICENSE. NO USE OF ANY COVERED SOFTWARE IS AUTHORIZED HEREUNDER EXCEPT UNDER THIS DISCLAIMER.

6. TERMINATION.

6.1. This License and the rights granted hereunder will terminate automatically if You fail to comply with terms herein and fail to cure such breach within 30 days of becoming aware of the breach. Provisions which, by their nature, must remain in effect beyond the termination of this License shall survive.

Page 81: CA SOA Security Manager - supportcontent.ca.com SOA Security Manager R12...SOA Security Gateway Stabilization ... Upgrade an r12.1 SOA Security Gateway ... XML Digital Signature Authentication

Activation 1.1.1

Appendix B: Third-Party Acknowledgements 81

6.2. If You assert a patent infringement claim (excluding declaratory judgment actions) against Initial Developer or a Contributor (the Initial Developer or Contributor against whom You assert such claim is referred to as Participant) alleging that the Participant Software (meaning the Contributor Version where the Participant is a Contributor or the Original Software where the Participant is the Initial Developer) directly or indirectly infringes any patent, then any and all rights granted directly or indirectly to You by such Participant, the Initial Developer (if the Initial Developer is not the Participant) and all Contributors under Sections 2.1 and/or 2.2 of this License shall, upon 60 days notice from Participant terminate prospectively and automatically at the expiration of such 60 day notice period, unless if within such 60 day period You withdraw Your claim with respect to the Participant Software against such Participant either unilaterally or pursuant to a written agreement with Participant.

6.3. In the event of termination under Sections 6.1 or 6.2 above, all end user licenses that have been validly granted by You or any distributor hereunder prior to termination (excluding licenses granted to You by any distributor) shall survive termination.

7. LIMITATION OF LIABILITY.

UNDER NO CIRCUMSTANCES AND UNDER NO LEGAL THEORY, WHETHER TORT (INCLUDING NEGLIGENCE), CONTRACT, OR OTHERWISE, SHALL YOU, THE INITIAL DEVELOPER, ANY OTHER CONTRIBUTOR, OR ANY DISTRIBUTOR OF COVERED SOFTWARE, OR ANY SUPPLIER OF ANY OF SUCH PARTIES, BE LIABLE TO ANY PERSON FOR ANY INDIRECT, SPECIAL, INCIDENTAL, OR CONSEQUENTIAL DAMAGES OF ANY CHARACTER INCLUDING, WITHOUT LIMITATION, DAMAGES FOR LOST PROFITS, LOSS OF GOODWILL, WORK STOPPAGE, COMPUTER FAILURE OR MALFUNCTION, OR ANY AND ALL OTHER COMMERCIAL DAMAGES OR LOSSES, EVEN IF SUCH PARTY SHALL HAVE BEEN INFORMED OF THE POSSIBILITY OF SUCH DAMAGES. THIS LIMITATION OF LIABILITY SHALL NOT APPLY TO LIABILITY FOR DEATH OR PERSONAL INJURY RESULTING FROM SUCH PARTYS NEGLIGENCE TO THE EXTENT APPLICABLE LAW PROHIBITS SUCH LIMITATION. SOME JURISDICTIONS DO NOT ALLOW THE EXCLUSION OR LIMITATION OF INCIDENTAL OR CONSEQUENTIAL DAMAGES, SO THIS EXCLUSION AND LIMITATION MAY NOT APPLY TO YOU.

8. U.S. GOVERNMENT END USERS.

The Covered Software is a commercial item, as that term is defined in 48 C.F.R. 2.101 (Oct. 1995), consisting of commercial computer software (as that term is defined at 48 C.F.R. 252.227-7014(a)(1)) and commercial computer software documentation as such terms are used in 48 C.F.R. 12.212 (Sept. 1995). Consistent with 48 C.F.R. 12.212 and 48 C.F.R. 227.7202-1 through 227.7202-4 (June 1995), all U.S. Government End Users acquire Covered Software with only those rights set forth herein. This U.S. Government Rights clause is in lieu of, and supersedes, any other FAR, DFAR, or other clause or provision that addresses Government rights in computer software under this License.

9. MISCELLANEOUS.

Page 82: CA SOA Security Manager - supportcontent.ca.com SOA Security Manager R12...SOA Security Gateway Stabilization ... Upgrade an r12.1 SOA Security Gateway ... XML Digital Signature Authentication

AdvantNet

82 Release Notes

This License represents the complete agreement concerning subject matter hereof. If any provision of this License is held to be unenforceable, such provision shall be reformed only to the extent necessary to make it enforceable. This License shall be governed by the law of the jurisdiction specified in a notice contained within the Original Software (except to the extent applicable law, if any, provides otherwise), excluding such jurisdictions conflict-of-law provisions. Any litigation relating to this License shall be subject to the jurisdiction of the courts located in the jurisdiction and venue specified in a notice contained within the Original Software, with the losing party responsible for costs, including, without limitation, court costs and reasonable attorneys fees and expenses. The application of the United Nations Convention on Contracts for the International Sale of Goods is expressly excluded. Any law or regulation which provides that the language of a contract shall be construed against the drafter shall not apply to this License. You agree that You alone are responsible for compliance with the United States export administration regulations (and the export control laws and regulation of any other countries) when You use, distribute or otherwise make available any Covered Software.

10. RESPONSIBILITY FOR CLAIMS.

As between Initial Developer and the Contributors, each party is responsible for claims and damages arising, directly or indirectly, out of its utilization of rights under this License and You agree to work with Initial Developer and Contributors to distribute such responsibility on an equitable basis. Nothing herein is intended or shall be deemed to constitute any admission of liability.

AdvantNet

This product contains copyright material licensed from AdventNet, Inc. http://www.adventnet.com. All rights to such copyright material rest with AdventNet.

Apache

Portions of this product include software developed by the Apache Software Foundation:

■ Apache Axis 1.4

■ Apache HTTP Web Server 2.2.3

■ Apache XML Security

■ Apache Commons Beansutils 1.7.0

■ Apache Commons Chain 1.1

■ Apache Commons Codec 1.3

Page 83: CA SOA Security Manager - supportcontent.ca.com SOA Security Manager R12...SOA Security Gateway Stabilization ... Upgrade an r12.1 SOA Security Gateway ... XML Digital Signature Authentication

Apache

Appendix B: Third-Party Acknowledgements 83

■ Apache Commons Collections 2.1.1

■ Apache Commons Digester 1.7

■ Apache Commons Discovery v.0.2

■ Apache Commons FileUpload 1.2.1

■ Apache log4j 1.2.8

■ Apache Commons Logging 1.0.4, 1.1.1

■ Apache JAX RPC 1.1

■ Apache Myfaces 1.1.4

■ Apache Slide 2.1

■ Apache Tomahawk 1.1.5

■ Apache Tomcat 5.5.20

■ Apache wss4j 1.5.10

■ Apache Xalan-J 2.7.1

■ Apache xercesImpl 2.9.1

■ Apache xml-commons xml-apis 1.3.04

■ Apache xmlsec 1.4.4

■ Jakarta Commons HttpClient 2.0.2

The Apache software is distributed in accordance with the following license agreement.

Apache License

Version 2.0, January 2004

http://www.apache.org/licenses/

TERMS AND CONDITIONS FOR USE, REPRODUCTION, AND DISTRIBUTION

1. Definitions.

"License" shall mean the terms and conditions for use, reproduction, and distribution as defined by Sections 1 through 9 of this document.

"Licensor" shall mean the copyright owner or entity authorized by the copyright owner that is granting the License.

Page 84: CA SOA Security Manager - supportcontent.ca.com SOA Security Manager R12...SOA Security Gateway Stabilization ... Upgrade an r12.1 SOA Security Gateway ... XML Digital Signature Authentication

Apache

84 Release Notes

"Legal Entity" shall mean the union of the acting entity and all other entities that control, are controlled by, or are under common control with that entity. For the purposes of this definition, "control" means (i) the power, direct or indirect, to cause the direction or management of such entity, whether by contract or otherwise, or (ii) ownership of fifty percent (50%) or more of the outstanding shares, or (iii) beneficial ownership of such entity.

"You" (or "Your") shall mean an individual or Legal Entity exercising permissions granted by this License.

"Source" form shall mean the preferred form for making modifications, including but not limited to software source code, documentation source, and configuration files.

"Object" form shall mean any form resulting from mechanical transformation or translation of a Source form, including but not limited to compiled object code, generated documentation, and conversions to other media types.

"Work" shall mean the work of authorship, whether in Source or Object form, made available under the License, as indicated by a copyright notice that is included in or attached to the work (an example is provided in the Appendix below).

"Derivative Works" shall mean any work, whether in Source or Object form, that is based on (or derived from) the Work and for which the editorial revisions, annotations, elaborations, or other modifications represent, as a whole, an original work of authorship. For the purposes of this License, Derivative Works shall not include works that remain separable from, or merely link (or bind by name) to the interfaces of, the Work and Derivative Works thereof.

"Contribution" shall mean any work of authorship, including the original version of the Work and any modifications or additions to that Work or Derivative Works thereof, that is intentionally submitted to Licensor for inclusion in the Work by the copyright owner or by an individual or Legal Entity authorized to submit on behalf of the copyright owner. For the purposes of this definition, "submitted" means any form of electronic, verbal, or written communication sent to the Licensor or its representatives, including but not limited to communication on electronic mailing lists, source code control systems, and issue tracking systems that are managed by, or on behalf of, the Licensor for the purpose of discussing and improving the Work, but excluding communication that is conspicuously marked or otherwise designated in writing by the copyright owner as "Not a Contribution."

"Contributor" shall mean Licensor and any individual or Legal Entity on behalf of whom a Contribution has been received by Licensor and subsequently incorporated within the Work.

Page 85: CA SOA Security Manager - supportcontent.ca.com SOA Security Manager R12...SOA Security Gateway Stabilization ... Upgrade an r12.1 SOA Security Gateway ... XML Digital Signature Authentication

Apache

Appendix B: Third-Party Acknowledgements 85

2. Grant of Copyright License. Subject to the terms and conditions of this License, each Contributor hereby grants to You a perpetual, worldwide, non-exclusive, no-charge, royalty-free, irrevocable copyright license to reproduce, prepare Derivative Works of, publicly display, publicly perform, sublicense, and distribute the Work and such Derivative Works in Source or Object form.

3. Grant of Patent License. Subject to the terms and conditions of this License, each Contributor hereby grants to You a perpetual, worldwide, non-exclusive, no-charge, royalty-free, irrevocable (except as stated in this section) patent license to make, have made, use, offer to sell, sell, import, and otherwise transfer the Work, where such license applies only to those patent claims licensable by such Contributor that are necessarily infringed by their Contribution(s) alone or by combination of their Contribution(s) with the Work to which such Contribution(s) was submitted. If You institute patent litigation against any entity (including a cross-claim or counterclaim in a lawsuit) alleging that the Work or a Contribution incorporated within the Work constitutes direct or contributory patent infringement, then any patent licenses granted to You under this License for that Work shall terminate as of the date such litigation is filed.

4. Redistribution. You may reproduce and distribute copies of the Work or Derivative Works thereof in any medium, with or without modifications, and in Source or Object form, provided that You meet the following conditions:

(a) You must give any other recipients of the Work or Derivative Works a copy of this License; and

(b)You must cause any modified files to carry prominent notices stating that You changed the files; and

(c) You must retain, in the Source form of any Derivative Works that You distribute, all copyright, patent, trademark, and attribution notices from the Source form of the Work, excluding those notices that do not pertain to any part of the Derivative Works; and

(d) If the Work includes a "NOTICE" text file as part of its distribution, then any Derivative Works that You distribute must include a readable copy of the attribution notices contained within such NOTICE file, excluding those notices that do not pertain to any part of the Derivative Works, in at least one of the following places: within a NOTICE text file distributed as part of the Derivative Works; within the Source form or documentation, if provided along with the Derivative Works; or, within a display generated by the Derivative Works, if and wherever such third-party notices normally appear. The contents of the NOTICE file are for informational purposes only and do not modify the License. You may add Your own attribution notices within Derivative Works that You distribute, alongside or as an addendum to the NOTICE text from the Work, provided that such additional attribution notices cannot be construed as modifying the License.

Page 86: CA SOA Security Manager - supportcontent.ca.com SOA Security Manager R12...SOA Security Gateway Stabilization ... Upgrade an r12.1 SOA Security Gateway ... XML Digital Signature Authentication

Apache

86 Release Notes

You may add Your own copyright statement to Your modifications and may provide additional or different license terms and conditions for use, reproduction, or distribution of Your modifications, or for any such Derivative Works as a whole, provided Your use, reproduction, and distribution of the Work otherwise complies with the conditions stated in this License.

5. Submission of Contributions. Unless You explicitly state otherwise, any Contribution intentionally submitted for inclusion in the Work by You to the Licensor shall be under the terms and conditions of this License, without any additional terms or conditions. Notwithstanding the above, nothing herein shall supersede or modify the terms of any separate license agreement you may have executed with Licensor regarding such Contributions.

6. Trademarks. This License does not grant permission to use the trade names, trademarks, service marks, or product names of the Licensor, except as required for reasonable and customary use in describing the origin of the Work and reproducing the content of the NOTICE file.

7. Disclaimer of Warranty. Unless required by applicable law or agreed to in writing, Licensor provides the Work (and each Contributor provides its Contributions) on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied, including, without limitation, any warranties or conditions of TITLE, NON-INFRINGEMENT, MERCHANTABILITY, or FITNESS FOR A PARTICULAR PURPOSE. You are solely responsible for determining the appropriateness of using or redistributing the Work and assume any risks associated with Your exercise of permissions under this License.

8. Limitation of Liability. In no event and under no legal theory, whether in tort (including negligence), contract, or otherwise, unless required by applicable law (such as deliberate and grossly negligent acts) or agreed to in writing, shall any Contributor be liable to You for damages, including any direct, indirect, special, incidental, or consequential damages of any character arising as a result of this License or out of the use or inability to use the Work (including but not limited to damages for loss of goodwill, work stoppage, computer failure or malfunction, or any and all other commercial damages or losses), even if such Contributor has been advised of the possibility of such damages.

9. Accepting Warranty or Additional Liability. While redistributing the Work or Derivative Works thereof, You may choose to offer, and charge a fee for, acceptance of support, warranty, indemnity, or other liability obligations and/or rights consistent with this License. However, in accepting such obligations, You may act only on Your own behalf and on Your sole responsibility, not on behalf of any other Contributor, and only if You agree to indemnify, defend, and hold each Contributor harmless for any liability incurred by, or claims asserted against, such Contributor by reason of your accepting any such warranty or additional liability.

END OF TERMS AND CONDITIONS

Page 87: CA SOA Security Manager - supportcontent.ca.com SOA Security Manager R12...SOA Security Gateway Stabilization ... Upgrade an r12.1 SOA Security Gateway ... XML Digital Signature Authentication

Boost

Appendix B: Third-Party Acknowledgements 87

Boost

This product includes Boost, which is distributed in accordance with the following:

Boost Software License - Version 1.0 - August 17th, 2003

Permission is hereby granted, free of charge, to any person or organization obtaining a copy of the software and accompanying documentation covered by this license (the "Software") to use, reproduce, display, distribute, execute, and transmit the Software, and to prepare derivative works of the Software, and to permit third-parties to whom the Software is furnished to do so, all subject to the following:

The copyright notices in the Software and this entire statement, including the above license grant, this restriction and the following disclaimer, must be included in all copies of the Software, in whole or in part, and all derivative works of the Software, unless such copies or derivative works are solely in the form of machine-executable object code generated by a source language processor.

THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, TITLE AND NON-INFRINGEMENT. IN NO EVENT SHALL THE COPYRIGHT HOLDERS OR ANYONE DISTRIBUTING THE SOFTWARE BE LIABLE FOR ANY DAMAGES OR OTHER LIABILITY, WHETHER IN CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.

Compuware Corporation

Portions copyright 1991-2000 Compuware Corporation.

Eclipse Higgins v.1.0

Eclipse Higgins v.1.0 was obtained under the Eclipse Public License v.1.0, the terms and conditions of which are set forth below. Eclipse Higgins is distributed by CA for use with this CA product in unmodified, object code form, under the CA End User License Agreement. Any provisions in the CA End User License Agreement that differ from the Eclipse Public License are offered by CA alone and not by any other party. CA makes the source code for Eclipse Higgins available at http://opensrcd.ca.com under the terms of the Eclipse Public License v.1.0.

Eclipse Public License - v 1.0

THE ACCOMPANYING PROGRAM IS PROVIDED UNDER THE TERMS OF THIS ECLIPSE PUBLIC LICENSE ("AGREEMENT"). ANY USE, REPRODUCTION OR DISTRIBUTION OF THE PROGRAM CONSTITUTES RECIPIENT’S ACCEPTANCE OF THIS AGREEMENT.

Page 88: CA SOA Security Manager - supportcontent.ca.com SOA Security Manager R12...SOA Security Gateway Stabilization ... Upgrade an r12.1 SOA Security Gateway ... XML Digital Signature Authentication

Eclipse Higgins v.1.0

88 Release Notes

1. DEFINITIONS

"Contribution" means:

a) in the case of the initial Contributor, the initial code and documentation distributed under this Agreement, and b) in the case of each subsequent Contributor:

i)changes to the Program, and

ii)additions to the Program;

where such changes and/or additions to the Program originate from and are distributed by that particular Contributor. A Contribution 'originates' from a Contributor if it was added to the Program by such Contributor itself or anyone acting on such Contributor’s behalf. Contributions do not include additions to the Program which: (i) are separate modules of software distributed in conjunction with the Program under their own license agreement, and (ii) are not derivative works of the Program.

"Contributor" means any person or entity that distributes the Program.

"Licensed Patents " mean patent claims licensable by a Contributor which are necessarily infringed by the use or sale of its Contribution alone or when combined with the Program.

"Program" means the Contributions distributed in accordance with this Agreement.

"Recipient" means anyone who receives the Program under this Agreement, including all Contributors.

2. GRANT OF RIGHTS

a) Subject to the terms of this Agreement, each Contributor hereby grants Recipient a non-exclusive, worldwide, royalty-free copyright license to reproduce, prepare derivative works of, publicly display, publicly perform, distribute and sublicense the Contribution of such Contributor, if any, and such derivative works, in source code and object code form.

b) Subject to the terms of this Agreement, each Contributor hereby grants Recipient a non-exclusive, worldwide, royalty-free patent license under Licensed Patents to make, use, sell, offer to sell, import and otherwise transfer the Contribution of such Contributor, if any, in source code and object code form. This patent license shall apply to the combination of the Contribution and the Program if, at the time the Contribution is added by the Contributor, such addition of the Contribution causes such combination to be covered by the Licensed Patents. The patent license shall not apply to any other combinations which include the Contribution. No hardware per se is licensed hereunder.

Page 89: CA SOA Security Manager - supportcontent.ca.com SOA Security Manager R12...SOA Security Gateway Stabilization ... Upgrade an r12.1 SOA Security Gateway ... XML Digital Signature Authentication

Eclipse Higgins v.1.0

Appendix B: Third-Party Acknowledgements 89

c) Recipient understands that although each Contributor grants the licenses to its Contributions set forth herein, no assurances are provided by any Contributor that the Program does not infringe the patent or other intellectual property rights of any other entity. Each Contributor disclaims any liability to Recipient for claims brought by any other entity based on infringement of intellectual property rights or otherwise. As a condition to exercising the rights and licenses granted hereunder, each Recipient hereby assumes sole responsibility to secure any other intellectual property rights needed, if any. For example, if a third party patent license is required to allow Recipient to distribute the Program, it is Recipient’s responsibility to acquire that license before distributing the Program.

d) Each Contributor represents that to its knowledge it has sufficient copyright rights in its Contribution, if any, to grant the copyright license set forth in this Agreement.

3. REQUIREMENTS

A Contributor may choose to distribute the Program in object code form under its own license agreement, provided that:

a) it complies with the terms and conditions of this Agreement; and

b) its license agreement:

i) effectively disclaims on behalf of all Contributors all warranties and conditions, express and implied, including warranties or conditions of title and non-infringement, and implied warranties or conditions of merchantability and fitness for a particular purpose;

ii) effectively excludes on behalf of all Contributors all liability for damages, including direct, indirect, special, incidental and consequential damages, such as lost profits;

iii) states that any provisions which differ from this Agreement are offered by that Contributor alone and not by any other party; and

iv) states that source code for the Program is available from such Contributor, and informs licensees how to obtain it in a reasonable manner on or through a medium customarily used for software exchange.

When the Program is made available in source code form:

a) it must be made available under this Agreement; and

b) a copy of this Agreement must be included with each copy of the Program.

Page 90: CA SOA Security Manager - supportcontent.ca.com SOA Security Manager R12...SOA Security Gateway Stabilization ... Upgrade an r12.1 SOA Security Gateway ... XML Digital Signature Authentication

Eclipse Higgins v.1.0

90 Release Notes

Contributors may not remove or alter any copyright notices contained within the Program.

Each Contributor must identify itself as the originator of its Contribution, if any, in a manner that reasonably allows subsequent Recipients to identify the originator of the Contribution.

4. COMMERCIAL DISTRIBUTION

Commercial distributors of software may accept certain responsibilities with respect to end users, business partners and the like. While this license is intended to facilitate the commercial use of the Program, the Contributor who includes the Program in a commercial product offering should do so in a manner which does not create potential liability for other Contributors. Therefore, if a Contributor includes the Program in a commercial product offering, such Contributor ("Commercial Contributor") hereby agrees to defend and indemnify every other Contributor ("Indemnified Contributor") against any losses, damages and costs (collectively "Losses") arising from claims, lawsuits and other legal actions brought by a third party against the Indemnified Contributor to the extent caused by the acts or omissions of such Commercial Contributor in connection with its distribution of the Program in a commercial product offering. The obligations in this section do not apply to any claims or Losses relating to any actual or alleged intellectual property infringement. In order to qualify, an Indemnified Contributor must: a) promptly notify the Commercial Contributor in writing of such claim, and b) allow the Commercial Contributor to control, and cooperate with the Commercial Contributor in, the defense and any related settlement negotiations. The Indemnified Contributor may participate in any such claim at its own expense.

For example, a Contributor might include the Program in a commercial product offering, Product X. That Contributor is then a Commercial Contributor. If that Commercial Contributor then makes performance claims, or offers warranties related to Product X, those performance claims and warranties are such Commercial Contributor’s responsibility alone. Under this section, the Commercial Contributor would have to defend claims against the other Contributors related to those performance claims and warranties, and if a court requires any other Contributor to pay any damages as a result, the Commercial Contributor must pay those damages.

5. NO WARRANTY

EXCEPT AS EXPRESSLY SET FORTH IN THIS AGREEMENT, THE PROGRAM IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED INCLUDING, WITHOUT LIMITATION, ANY WARRANTIES OR CONDITIONS OF TITLE, NON-INFRINGEMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Each Recipient is solely responsible for determining the appropriateness of using and distributing the Program and assumes all risks associated with its exercise of rights under this Agreement , including but not limited to the risks and costs of program errors, compliance with applicable laws, damage to or loss of data, programs or equipment, and unavailability or interruption of operations.

Page 91: CA SOA Security Manager - supportcontent.ca.com SOA Security Manager R12...SOA Security Gateway Stabilization ... Upgrade an r12.1 SOA Security Gateway ... XML Digital Signature Authentication

Eclipse Higgins v.1.0

Appendix B: Third-Party Acknowledgements 91

6. DISCLAIMER OF LIABILITY

EXCEPT AS EXPRESSLY SET FORTH IN THIS AGREEMENT, NEITHER RECIPIENT NOR ANY CONTRIBUTORS SHALL HAVE ANY LIABILITY FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING WITHOUT LIMITATION LOST PROFITS), HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OR DISTRIBUTION OF THE PROGRAM OR THE EXERCISE OF ANY RIGHTS GRANTED HEREUNDER, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.

7. GENERAL

If any provision of this Agreement is invalid or unenforceable under applicable law, it shall not affect the validity or enforceability of the remainder of the terms of this Agreement, and without further action by the parties hereto, such provision shall be reformed to the minimum extent necessary to make such provision valid and enforceable.

If Recipient institutes patent litigation against any entity (including a cross-claim or counterclaim in a lawsuit) alleging that the Program itself (excluding combinations of the Program with other software or hardware) infringes such Recipient’s patent(s), then such Recipient’s rights granted under Section 2(b) shall terminate as of the date such litigation is filed.

All Recipient’s rights under this Agreement shall terminate if it fails to comply with any of the material terms or conditions of this Agreement and does not cure such failure in a reasonable period of time after becoming aware of such noncompliance. If all Recipient’s rights under this Agreement terminate, Recipient agrees to cease use and distribution of the Program as soon as reasonably practicable. However, Recipient’s obligations under this Agreement and any licenses granted by Recipient relating to the Program shall continue and survive.

Everyone is permitted to copy and distribute copies of this Agreement, but in order to avoid inconsistency the Agreement is copyrighted and may only be modified in the following manner. The Agreement Steward reserves the right to publish new versions (including revisions) of this Agreement from time to time. No one other than the Agreement Steward has the right to modify this Agreement. The Eclipse Foundation is the initial Agreement Steward. The Eclipse Foundation may assign the responsibility to serve as the Agreement Steward to a suitable separate entity. Each new version of the Agreement will be given a distinguishing version number. The Program (including Contributions) may always be distributed subject to the version of the Agreement under which it was received. In addition, after a new version of the Agreement is published, Contributor may elect to distribute the Program (including its Contributions) under the new version. Except as expressly stated in Sections 2(a) and 2(b) above, Recipient receives no rights or licenses to the intellectual property of any Contributor under this Agreement, whether expressly, by implication, estoppel or otherwise. All rights in the Program not expressly granted under this Agreement are reserved.

Page 92: CA SOA Security Manager - supportcontent.ca.com SOA Security Manager R12...SOA Security Gateway Stabilization ... Upgrade an r12.1 SOA Security Gateway ... XML Digital Signature Authentication

ICU4C

92 Release Notes

This Agreement is governed by the laws of the State of New York and the intellectual property laws of the United States of America. No party to this Agreement will bring a legal action under this Agreement more than one year after the cause of action arose. Each party waives its rights to a jury trial in any resulting litigation.

ICU4C

ICU4C is distributed in accordance with the following:

COPYRIGHT AND PERMISSION NOTICE

Copyright (c) 1995-2009 International Business Machines Corporation and others

All rights reserved.

Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, provided that the above copyright notice(s) and this permission notice appear in all copies of the Software and that both the above copyright notice(s) and this permission notice appear in supporting documentation.

Page 93: CA SOA Security Manager - supportcontent.ca.com SOA Security Manager R12...SOA Security Gateway Stabilization ... Upgrade an r12.1 SOA Security Gateway ... XML Digital Signature Authentication

JAXB 2.0

Appendix B: Third-Party Acknowledgements 93

JAXB 2.0

JAXB was obtained under the CDDL v.1.0 license, the terms and conditions of which are set forth below. JAXB is distributed by CA for use with this CA product in unmodified, object code form, under the CA End User License Agreement. Any provisions in the CA End User License Agreement that differ from the CDDL are offered by CA alone and not by any other party. Source code for JAXB is available at https://jaxb.dev.java.net/. In addition, CA makes the source code for JAXB available at http://opensrcd.ca.com/ips/06984_7/ under the terms of the CDDL v.1.0. license:

1. Definitions.

1.1. Contributor means each individual or entity that creates or contributes to the creation of Modifications.

1.2. Contributor Version means the combination of the Original Software, prior Modifications used by a Contributor (if any), and the Modifications made by that particular Contributor.

1.3. Covered Software means (a) the Original Software, or (b) Modifications, or (c) the combination of files containing Original Software with files containing Modifications, in each case including portions thereof.

1.4. Executable means the Covered Software in any form other than Source Code.

1.5. Initial Developer means the individual or entity that first makes Original Software available under this License.

1.6. Larger Work means a work which combines Covered Software or portions thereof with code not governed by the terms of this License.

1.7. License means this document.

1.8. Licensable means having the right to grant, to the maximum extent possible, whether at the time of the initial grant or subsequently acquired, any and all of the rights conveyed herein.

1.9. Modifications means the Source Code and Executable form of any of the following:

A. Any file that results from an addition to, deletion from or modification of the contents of a file containing Original Software or previous Modifications;

B. Any new file that contains any part of the Original Software or previous Modification; or

C. Any new file that is contributed or otherwise made available under the terms of this License.

Page 94: CA SOA Security Manager - supportcontent.ca.com SOA Security Manager R12...SOA Security Gateway Stabilization ... Upgrade an r12.1 SOA Security Gateway ... XML Digital Signature Authentication

JAXB 2.0

94 Release Notes

1.10. Original Software means the Source Code and Executable form of computer software code that is originally released under this License.

1.11. Patent Claims means any patent claim(s), now owned or hereafter acquired, including without limitation, method, process, and apparatus claims, in any patent Licensable by grantor.

1.12. Source Code means (a) the common form of computer software code in which modifications are made and (b) associated documentation included in or with such code.

1.13. You (or Your) means an individual or a legal entity exercising rights under, and complying with all of the terms of, this License. For legal entities, You includes any entity which controls, is controlled by, or is under common control with You. For purposes of this definition, control means (a) the power, direct or indirect, to cause the direction or management of such entity, whether by contract or otherwise, or (b) ownership of more than fifty percent (50%) of the outstanding shares or beneficial ownership of such entity.

2. License Grants.

2.1. The Initial Developer Grant.

Conditioned upon Your compliance with Section 3.1 below and subject to third party intellectual property claims, the Initial Developer hereby grants You a world-wide, royalty-free, non-exclusive license:

(a) under intellectual property rights (other than patent or trademark) Licensable by Initial Developer, to use, reproduce, modify, display, perform, sublicense and distribute the Original Software (or portions thereof), with or without Modifications, and/or as part of a Larger Work; and

(b) under Patent Claims infringed by the making, using or selling of Original Software, to make, have made, use, practice, sell, and offer for sale, and/or otherwise dispose of the Original Software (or portions thereof).

(c) The licenses granted in Sections 2.1(a) and (b) are effective on the date Initial Developer first distributes or otherwise makes the Original Software available to a third party under the terms of this License.

(d) Notwithstanding Section 2.1(b) above, no patent license is granted: (1) for code that You delete from the Original Software, or (2) for infringements caused by: (i) the modification of the Original Software, or (ii) the combination of the Original Software with other software or devices.

2.2. Contributor Grant.

Page 95: CA SOA Security Manager - supportcontent.ca.com SOA Security Manager R12...SOA Security Gateway Stabilization ... Upgrade an r12.1 SOA Security Gateway ... XML Digital Signature Authentication

JAXB 2.0

Appendix B: Third-Party Acknowledgements 95

Conditioned upon Your compliance with Section 3.1 below and subject to third party intellectual property claims, each Contributor hereby grants You a world-wide, royalty-free, non-exclusive license:

(a) under intellectual property rights (other than patent or trademark) Licensable by Contributor to use, reproduce, modify, display, perform, sublicense and distribute the Modifications created by such Contributor (or portions thereof), either on an unmodified basis, with other Modifications, as Covered Software and/or as part of a Larger Work; and

(b) under Patent Claims infringed by the making, using, or selling of Modifications made by that Contributor either alone and/or in combination with its Contributor Version (or portions of such combination), to make, use, sell, offer for sale, have made, and/or otherwise dispose of: (1) Modifications made by that Contributor (or portions thereof); and (2) the combination of Modifications made by that Contributor with its Contributor Version (or portions of such combination).

(c) The licenses granted in Sections 2.2(a) and 2.2(b) are effective on the date Contributor first distributes or otherwise makes the Modifications available to a third party.

(d) Notwithstanding Section 2.2(b) above, no patent license is granted: (1) for any code that Contributor has deleted from the Contributor Version; (2) for infringements caused by: (i) third party modifications of Contributor Version, or (ii) the combination of Modifications made by that Contributor with other software (except as part of the Contributor Version) or other devices; or (3) under Patent Claims infringed by Covered Software in the absence of Modifications made by that Contributor.

3. Distribution Obligations.

3.1. Availability of Source Code.

Any Covered Software that You distribute or otherwise make available in Executable form must also be made available in Source Code form and that Source Code form must be distributed only under the terms of this License. You must include a copy of this License with every copy of the Source Code form of the Covered Software You distribute or otherwise make available. You must inform recipients of any such Covered Software in Executable form as to how they can obtain such Covered Software in Source Code form in a reasonable manner on or through a medium customarily used for software exchange.

3.2. Modifications.

The Modifications that You create or to which You contribute are governed by the terms of this License. You represent that You believe Your Modifications are Your original creation(s) and/or You have sufficient rights to grant the rights conveyed by this License.

3.3. Required Notices.

Page 96: CA SOA Security Manager - supportcontent.ca.com SOA Security Manager R12...SOA Security Gateway Stabilization ... Upgrade an r12.1 SOA Security Gateway ... XML Digital Signature Authentication

JAXB 2.0

96 Release Notes

You must include a notice in each of Your Modifications that identifies You as the Contributor of the Modification. You may not remove or alter any copyright, patent or trademark notices contained within the Covered Software, or any notices of licensing or any descriptive text giving attribution to any Contributor or the Initial Developer.

3.4. Application of Additional Terms.

You may not offer or impose any terms on any Covered Software in Source Code form that alters or restricts the applicable version of this License or the recipients rights hereunder. You may choose to offer, and to charge a fee for, warranty, support, indemnity or liability obligations to one or more recipients of Covered Software. However, you may do so only on Your own behalf, and not on behalf of the Initial Developer or any Contributor. You must make it absolutely clear that any such warranty, support, indemnity or liability obligation is offered by You alone, and You hereby agree to indemnify the Initial Developer and every Contributor for any liability incurred by the Initial Developer or such Contributor as a result of warranty, support, indemnity or liability terms You offer.

3.5. Distribution of Executable Versions.

You may distribute the Executable form of the Covered Software under the terms of this License or under the terms of a license of Your choice, which may contain terms different from this License, provided that You are in compliance with the terms of this License and that the license for the Executable form does not attempt to limit or alter the recipients rights in the Source Code form from the rights set forth in this License. If You distribute the Covered Software in Executable form under a different license, You must make it absolutely clear that any terms which differ from this License are offered by You alone, not by the Initial Developer or Contributor. You hereby agree to indemnify the Initial Developer and every Contributor for any liability incurred by the Initial Developer or such Contributor as a result of any such terms You offer.

3.6. Larger Works.

You may create a Larger Work by combining Covered Software with other code not governed by the terms of this License and distribute the Larger Work as a single product. In such a case, You must make sure the requirements of this License are fulfilled for the Covered Software.

4. Versions of the License.

4.1. New Versions.

Sun Microsystems, Inc. is the initial license steward and may publish revised and/or new versions of this License from time to time. Each version will be given a distinguishing version number. Except as provided in Section 4.3, no one other than the license steward has the right to modify this License.

4.2. Effect of New Versions.

Page 97: CA SOA Security Manager - supportcontent.ca.com SOA Security Manager R12...SOA Security Gateway Stabilization ... Upgrade an r12.1 SOA Security Gateway ... XML Digital Signature Authentication

JAXB 2.0

Appendix B: Third-Party Acknowledgements 97

You may always continue to use, distribute or otherwise make the Covered Software available under the terms of the version of the License under which You originally received the Covered Software. If the Initial Developer includes a notice in the Original Software prohibiting it from being distributed or otherwise made available under any subsequent version of the License, You must distribute and make the Covered Software available under the terms of the version of the License under which You originally received the Covered Software. Otherwise, You may also choose to use, distribute or otherwise make the Covered Software available under the terms of any subsequent version of the License published by the license steward.

4.3. Modified Versions.

When You are an Initial Developer and You want to create a new license for Your Original Software, You may create and use a modified version of this License if You: (a) rename the license and remove any references to the name of the license steward (except to note that the license differs from this License); and (b) otherwise make it clear that the license contains terms which differ from this License.

5. DISCLAIMER OF WARRANTY.

COVERED SOFTWARE IS PROVIDED UNDER THIS LICENSE ON AN AS IS BASIS, WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, WARRANTIES THAT THE COVERED SOFTWARE IS FREE OF DEFECTS, MERCHANTABLE, FIT FOR A PARTICULAR PURPOSE OR NON-INFRINGING. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE COVERED SOFTWARE IS WITH YOU. SHOULD ANY COVERED SOFTWARE PROVE DEFECTIVE IN ANY RESPECT, YOU (NOT THE INITIAL DEVELOPER OR ANY OTHER CONTRIBUTOR) ASSUME THE COST OF ANY NECESSARY SERVICING, REPAIR OR CORRECTION. THIS DISCLAIMER OF WARRANTY CONSTITUTES AN ESSENTIAL PART OF THIS LICENSE. NO USE OF ANY COVERED SOFTWARE IS AUTHORIZED HEREUNDER EXCEPT UNDER THIS DISCLAIMER.

6. TERMINATION.

6.1. This License and the rights granted hereunder will terminate automatically if You fail to comply with terms herein and fail to cure such breach within 30 days of becoming aware of the breach. Provisions which, by their nature, must remain in effect beyond the termination of this License shall survive.

Page 98: CA SOA Security Manager - supportcontent.ca.com SOA Security Manager R12...SOA Security Gateway Stabilization ... Upgrade an r12.1 SOA Security Gateway ... XML Digital Signature Authentication

JAXB 2.0

98 Release Notes

6.2. If You assert a patent infringement claim (excluding declaratory judgment actions) against Initial Developer or a Contributor (the Initial Developer or Contributor against whom You assert such claim is referred to as Participant) alleging that the Participant Software (meaning the Contributor Version where the Participant is a Contributor or the Original Software where the Participant is the Initial Developer) directly or indirectly infringes any patent, then any and all rights granted directly or indirectly to You by such Participant, the Initial Developer (if the Initial Developer is not the Participant) and all Contributors under Sections 2.1 and/or 2.2 of this License shall, upon 60 days notice from Participant terminate prospectively and automatically at the expiration of such 60 day notice period, unless if within such 60 day period You withdraw Your claim with respect to the Participant Software against such Participant either unilaterally or pursuant to a written agreement with Participant.

6.3. In the event of termination under Sections 6.1 or 6.2 above, all end user licenses that have been validly granted by You or any distributor hereunder prior to termination (excluding licenses granted to You by any distributor) shall survive termination.

7. LIMITATION OF LIABILITY.

UNDER NO CIRCUMSTANCES AND UNDER NO LEGAL THEORY, WHETHER TORT (INCLUDING NEGLIGENCE), CONTRACT, OR OTHERWISE, SHALL YOU, THE INITIAL DEVELOPER, ANY OTHER CONTRIBUTOR, OR ANY DISTRIBUTOR OF COVERED SOFTWARE, OR ANY SUPPLIER OF ANY OF SUCH PARTIES, BE LIABLE TO ANY PERSON FOR ANY INDIRECT, SPECIAL, INCIDENTAL, OR CONSEQUENTIAL DAMAGES OF ANY CHARACTER INCLUDING, WITHOUT LIMITATION, DAMAGES FOR LOST PROFITS, LOSS OF GOODWILL, WORK STOPPAGE, COMPUTER FAILURE OR MALFUNCTION, OR ANY AND ALL OTHER COMMERCIAL DAMAGES OR LOSSES, EVEN IF SUCH PARTY SHALL HAVE BEEN INFORMED OF THE POSSIBILITY OF SUCH DAMAGES. THIS LIMITATION OF LIABILITY SHALL NOT APPLY TO LIABILITY FOR DEATH OR PERSONAL INJURY RESULTING FROM SUCH PARTYS NEGLIGENCE TO THE EXTENT APPLICABLE LAW PROHIBITS SUCH LIMITATION. SOME JURISDICTIONS DO NOT ALLOW THE EXCLUSION OR LIMITATION OF INCIDENTAL OR CONSEQUENTIAL DAMAGES, SO THIS EXCLUSION AND LIMITATION MAY NOT APPLY TO YOU.

8. U.S. GOVERNMENT END USERS.

The Covered Software is a commercial item, as that term is defined in 48 C.F.R. 2.101 (Oct. 1995), consisting of commercial computer software (as that term is defined at 48 C.F.R. 252.227-7014(a)(1)) and commercial computer software documentation as such terms are used in 48 C.F.R. 12.212 (Sept. 1995). Consistent with 48 C.F.R. 12.212 and 48 C.F.R. 227.7202-1 through 227.7202-4 (June 1995), all U.S. Government End Users acquire Covered Software with only those rights set forth herein. This U.S. Government Rights clause is in lieu of, and supersedes, any other FAR, DFAR, or other clause or provision that addresses Government rights in computer software under this License.

9. MISCELLANEOUS.

Page 99: CA SOA Security Manager - supportcontent.ca.com SOA Security Manager R12...SOA Security Gateway Stabilization ... Upgrade an r12.1 SOA Security Gateway ... XML Digital Signature Authentication

JWSDP 2.0

Appendix B: Third-Party Acknowledgements 99

This License represents the complete agreement concerning subject matter hereof. If any provision of this License is held to be unenforceable, such provision shall be reformed only to the extent necessary to make it enforceable. This License shall be governed by the law of the jurisdiction specified in a notice contained within the Original Software (except to the extent applicable law, if any, provides otherwise), excluding such jurisdictions conflict-of-law provisions. Any litigation relating to this License shall be subject to the jurisdiction of the courts located in the jurisdiction and venue specified in a notice contained within the Original Software, with the losing party responsible for costs, including, without limitation, court costs and reasonable attorneys fees and expenses. The application of the United Nations Convention on Contracts for the International Sale of Goods is expressly excluded. Any law or regulation which provides that the language of a contract shall be construed against the drafter shall not apply to this License. You agree that You alone are responsible for compliance with the United States export administration regulations (and the export control laws and regulation of any other countries) when You use, distribute or otherwise make available any Covered Software.

10. RESPONSIBILITY FOR CLAIMS.

As between Initial Developer and the Contributors, each party is responsible for claims and damages arising, directly or indirectly, out of its utilization of rights under this License and You agree to work with Initial Developer and Contributors to distribute such responsibility on an equitable basis. Nothing herein is intended or shall be deemed to constitute any admission of liability.

JWSDP 2.0

JAVA(TM) WEB SERVICES DEVELOPER PACK, VERSION 2.0

Sun Microsystems Inc. Software License Agreement

This Product is distributed with Java Web Services Developer Pack 2.0 (JWSDP). Sun Microsystems, Inc. has provided additional copyright notices and information that may be applicable to portions of the JWSDP in the files that accompanies the JWSDP.

Page 100: CA SOA Security Manager - supportcontent.ca.com SOA Security Manager R12...SOA Security Gateway Stabilization ... Upgrade an r12.1 SOA Security Gateway ... XML Digital Signature Authentication

PCRE 6.3

100 Release Notes

PCRE 6.3

Portions of this product include software developed by Philip Hazel. The University of Cambridge Computing Service software is distributed in accordance with the following license agreement.

THE BASIC LIBRARY FUNCTIONS

---------------------------

Written by: Philip Hazel

Email local part: ph10

Email domain: cam.ac.uk

University of Cambridge Computing Service,

Cambridge, England. Phone: +44 1223 334714.

Copyright (c) 1997-2006 University of Cambridge

All rights reserved.

THE C++ WRAPPER FUNCTIONS

-------------------------

Contributed by: Google Inc.

Copyright (c) 2006, Google Inc.

All rights reserved.

THE "BSD" LICENCE

-----------------

Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:

■ Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.

■ Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.

Page 101: CA SOA Security Manager - supportcontent.ca.com SOA Security Manager R12...SOA Security Gateway Stabilization ... Upgrade an r12.1 SOA Security Gateway ... XML Digital Signature Authentication

Rhino

Appendix B: Third-Party Acknowledgements 101

■ Neither the name of the University of Cambridge nor the name of Google Inc. nor the names of their contributors may be used to endorse or promote products derived from this software without specific prior written permission.

THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.

Rhino

The source code version of Rhino 1.5 Release 4.1 is licensed under the Netscape Public License Version 1.1 which can be found at http://www.mozilla.org/NPL/ and is made available for download from http://opensrcd.ca.com/ips/3039_8/

AMENDMENTS

The Netscape Public License Version 1.1 ("NPL") consists of the Mozilla Public License Version 1.1 with the following Amendments, including Exhibit A-Netscape Public License. Files identified with "Exhibit A-Netscape Public License" are governed by the Netscape Public License Version 1.1.

Additional Terms applicable to the Netscape Public License.

I. Effect.

These additional terms described in this Netscape Public License -- Amendments shall apply to the Mozilla Communicator client code and to all Covered Code under this License.

II. "Netscape's Branded Code" means Covered Code that Netscape distributes and/or permits others to distribute under one or more trademark(s) which are controlled by Netscape but which are not licensed for use under this License.

III. Netscape and logo.

This License does not grant any rights to use the trademarks "Netscape", the "Netscape N and horizon" logo or the "Netscape lighthouse" logo, "Netcenter", "Gecko", "Java" or "JavaScript", "Smart Browsing" even if such marks are included in the Original Code or Modifications.

Page 102: CA SOA Security Manager - supportcontent.ca.com SOA Security Manager R12...SOA Security Gateway Stabilization ... Upgrade an r12.1 SOA Security Gateway ... XML Digital Signature Authentication

Rhino

102 Release Notes

IV. Inability to Comply Due to Contractual Obligation.

Prior to licensing the Original Code under this License, Netscape has licensed third party code for use in Netscape's Branded Code. To the extent that Netscape is limited contractually from making such third party code available under this License, Netscape may choose to reintegrate such code into Covered Code without being required to distribute such code in Source Code form, even if such code would otherwise be considered "Modifications" under this License.

V. Use of Modifications and Covered Code by Initial Developer.

V.1. In General.

The obligations of Section 3 apply to Netscape, except to the extent specified in this Amendment, Section V.2 and V.3.

V.2. Other Products.

Netscape may include Covered Code in products other than the Netscape's Branded Code which are released by Netscape during the two (2) years following the release date of the Original Code, without such additional products becoming subject to the terms of this License, and may license such additional products on different terms from those contained in this License.

V.3. Alternative Licensing.

Netscape may license the Source Code of Netscape's Branded Code, including Modifications incorporated therein, without such Netscape Branded Code becoming subject to the terms of this License, and may license such Netscape Branded Code on different terms from those contained in this License.

VI. Litigation.

Notwithstanding the limitations of Section 11 above, the provisions regarding litigation in Section 11(a), (b) and (c) of the License shall apply to all disputes relating to this License.

EXHIBIT A-Netscape Public License.

"The contents of this file are subject to the Netscape Public License Version 1.1 (the "License"); you may not use this file except in compliance with the License. You may obtain a copy of the License at http://www.mozilla.org/NPL/

Software distributed under the License is distributed on an "AS IS" basis, WITHOUT WARRANTY OF ANY KIND, either express or implied. See the License for the specific language governing rights and limitations under the License.

The Original Code is Mozilla Communicator client code, released March 31, 1998.

Page 103: CA SOA Security Manager - supportcontent.ca.com SOA Security Manager R12...SOA Security Gateway Stabilization ... Upgrade an r12.1 SOA Security Gateway ... XML Digital Signature Authentication

Rhino

Appendix B: Third-Party Acknowledgements 103

The Initial Developer of the Original Code is Netscape Communications Corporation. Portions created by Netscape are Copyright (C) 1998-1999 Netscape Communications Corporation. All Rights Reserved.

Contributor(s): ______________________________________.

Alternatively, the contents of this file may be used under the terms of the _____ license (the "[___] License"), in which case the provisions of [______] License are applicable instead of those above. If you wish to allow use of your version of this file only under the terms of the [____] License and not to allow others to use your version of this file under the NPL, indicate your decision by deleting the provisions above and replace them with the notice and other provisions required by the [___] License. If you do not delete the provisions above, a recipient may use your version of this file under either the NPL or the [___] License."

MOZILLA PUBLIC LICENSE Version 1.1 ---------------

1. Definitions.

1.0.1. "Commercial Use" means distribution or otherwise making the Covered Code available to a third party.

1.1. "Contributor" means each entity that creates or contributes to the creation of Modifications.

1.2. "Contributor Version" means the combination of the Original Code, prior Modifications used by a Contributor, and the Modifications made by that particular Contributor.

1.3. "Covered Code" means the Original Code or Modifications or the combination of the Original Code and Modifications, in each case including portions thereof.

1.4. "Electronic Distribution Mechanism" means a mechanism generally accepted in the software development community for the electronic transfer of data.

1.5. "Executable" means Covered Code in any form other than Source Code.

1.6. "Initial Developer" means the individual or entity identified as the Initial Developer in the Source Code notice required by Exhibit A.

1.7. "Larger Work" means a work which combines Covered Code or portions thereof with code not governed by the terms of this License.

1.8. "License" means this document.

1.8.1. "Licensable" means having the right to grant, to the maximum extent possible, whether at the time of the initial grant or subsequently acquired, any and all of the rights conveyed herein.

Page 104: CA SOA Security Manager - supportcontent.ca.com SOA Security Manager R12...SOA Security Gateway Stabilization ... Upgrade an r12.1 SOA Security Gateway ... XML Digital Signature Authentication

Rhino

104 Release Notes

1.9. "Modifications" means any addition to or deletion from the substance or structure of either the Original Code or any previous Modifications. When Covered Code is released as a series of files, a Modification is:

A. Any addition to or deletion from the contents of a file containing Original Code or previous Modifications.

B. Any new file that contains any part of the Original Code or previous Modifications.

1.10. "Original Code" means Source Code of computer software code which is described in the Source Code notice required by Exhibit A as Original Code, and which, at the time of its release under this License is not already Covered Code governed by this License.

1.10.1. "Patent Claims" means any patent claim(s), now owned or hereafter acquired, including without limitation, method, process, and apparatus claims, in any patent Licensable by grantor.

1.11. "Source Code" means the preferred form of the Covered Code for making modifications to it, including all modules it contains, plus any associated interface definition files, scripts used to control compilation and installation of an Executable, or source code differential comparisons against either the Original Code or another well known, available Covered Code of the Contributor's choice. The Source Code can be in a compressed or archival form, provided the appropriate decompression or de-archiving software is widely available for no charge.

1.12. "You" (or "Your") means an individual or a legal entity exercising rights under, and complying with all of the terms of, this License or a future version of this License issued under Section 6.1. For legal entities, "You" includes any entity which controls, is controlled by, or is under common control with You. For purposes of this definition, "control" means (a) the power, direct or indirect, to cause the direction or management of such entity, whether by contract or otherwise, or (b) ownership of more than fifty percent (50%) of the outstanding shares or beneficial ownership of such entity.

Page 105: CA SOA Security Manager - supportcontent.ca.com SOA Security Manager R12...SOA Security Gateway Stabilization ... Upgrade an r12.1 SOA Security Gateway ... XML Digital Signature Authentication

Rhino

Appendix B: Third-Party Acknowledgements 105

2. Source Code License.

2.1. The Initial Developer Grant. The Initial Developer hereby grants You a world-wide, royalty-free, non-exclusive license, subject to third party intellectual property claims: (a) under intellectual property rights (other than patent or trademark) Licensable by Initial Developer to use, reproduce, modify, display, perform, sublicense and distribute the Original Code (or portions thereof) with or without Modifications, and/or as part of a Larger Work; and (b) under Patents Claims infringed by the making, using or selling of Original Code, to make, have made, use, practice, sell, and offer for sale, and/or otherwise dispose of the Original Code (or portions thereof). (c) the licenses granted in this Section 2.1(a) and (b) are effective on the date Initial Developer first distributes Original Code under the terms of this License. (d) Notwithstanding Section 2.1(b) above, no patent license is granted: 1) for code that You delete from the Original Code; 2) separate from the Original Code; or 3) for infringements caused by: i) the modification of the Original Code or ii) the combination of the Original Code with other software or devices.

2.2. Contributor Grant. Subject to third party intellectual property claims, each Contributor hereby grants You a world-wide, royalty-free, non-exclusive license (a) under intellectual property rights (other than patent or trademark) Licensable by Contributor, to use, reproduce, modify, display, perform, sublicense and distribute the Modifications created by such Contributor (or portions thereof) either on an unmodified basis, with other Modifications, as Covered Code and/or as part of a Larger Work; and (b) under Patent Claims infringed by the making, using, or selling of Modifications made by that Contributor either alone and/or in combination with its Contributor Version (or portions of such combination), to make, use, sell, offer for sale, have made, and/or otherwise dispose of: 1) Modifications made by that Contributor (or portions thereof); and 2) the combination of Modifications made by that Contributor with its Contributor Version (or portions of such combination). (c) the licenses granted in Sections 2.2(a) and 2.2(b) are effective on the date Contributor first makes Commercial Use of the Covered Code. (d) Notwithstanding Section 2.2(b) above, no patent license is granted: 1) for any code that Contributor has deleted from the Contributor Version; 2) separate from the Contributor Version; 3) for infringements caused by: i) third party modifications of Contributor Version or ii) the combination of Modifications made by that Contributor with other software (except as part of the Contributor Version) or other devices; or 4) under Patent Claims infringed by Covered Code in the absence of Modifications made by that Contributor.

Page 106: CA SOA Security Manager - supportcontent.ca.com SOA Security Manager R12...SOA Security Gateway Stabilization ... Upgrade an r12.1 SOA Security Gateway ... XML Digital Signature Authentication

Rhino

106 Release Notes

3. Distribution Obligations.

3.1. Application of License. The Modifications which You create or to which You contribute are governed by the terms of this License, including without limitation Section 2.2. The Source Code version of Covered Code may be distributed only under the terms of this License or a future version of this License released under Section 6.1, and You must include a copy of this License with every copy of the Source Code You distribute. You may not offer or impose any terms on any Source Code version that alters or restricts the applicable version of this License or the recipients' rights hereunder. However, You may include an additional document offering the additional rights described in Section 3.5.

3.2. Availability of Source Code. Any Modification which You create or to which You contribute must be made available in Source Code form under the terms of this License either on the same media as an Executable version or via an accepted Electronic Distribution Mechanism to anyone to whom you made an Executable version available; and if made available via Electronic Distribution Mechanism, must remain available for at least twelve (12) months after the date it initially became available, or at least six (6) months after a subsequent version of that particular Modification has been made available to such recipients. You are responsible for ensuring that the Source Code version remains available even if the Electronic Distribution Mechanism is maintained by a third party.

3.3. Description of Modifications. You must cause all Covered Code to which You contribute to contain a file documenting the changes You made to create that Covered Code and the date of any change. You must include a prominent statement that the Modification is derived, directly or indirectly, from Original Code provided by the Initial Developer and including the name of the Initial Developer in (a) the Source Code, and (b) in any notice in an Executable version or related documentation in which You describe the origin or ownership of the Covered Code.

3.4. Intellectual Property Matters (a) Third Party Claims. If Contributor has knowledge that a license under a third party's intellectual property rights is required to exercise the rights granted by such Contributor under Sections 2.1 or 2.2, Contributor must include a text file with the Source Code distribution titled "LEGAL" which describes the claim and the party making the claim in sufficient detail that a recipient will know whom to contact. If Contributor obtains such knowledge after the Modification is made available as described in Section 3.2, Contributor shall promptly modify the LEGAL file in all copies Contributor makes available thereafter and shall take other steps (such as notifying appropriate mailing lists or newsgroups) reasonably calculated to inform those who received the Covered Code that new knowledge has been obtained. (b) Contributor APIs. If Contributor's Modifications include an application programming interface and Contributor has knowledge of patent licenses which are reasonably necessary to implement that API, Contributor must also include this information in the LEGAL file. (c) Representations. Contributor represents that, except as disclosed pursuant to Section 3.4(a) above, Contributor believes that Contributor's Modifications are Contributor's original creation(s) and/or Contributor has sufficient rights to grant the rights conveyed by this License.

Page 107: CA SOA Security Manager - supportcontent.ca.com SOA Security Manager R12...SOA Security Gateway Stabilization ... Upgrade an r12.1 SOA Security Gateway ... XML Digital Signature Authentication

Rhino

Appendix B: Third-Party Acknowledgements 107

3.5. Required Notices. You must duplicate the notice in Exhibit A in each file of the Source Code. If it is not possible to put such notice in a particular Source Code file due to its structure, then You must include such notice in a location (such as a relevant directory) where a user would be likely to look for such a notice. If You created one or more Modification(s) You may add your name as a Contributor to the notice described in Exhibit A. You must also duplicate this License in any documentation for the Source Code where You describe recipients' rights or ownership rights relating to Covered Code. You may choose to offer, and to charge a fee for, warranty, support, indemnity or liability obligations to one or more recipients of Covered Code. However, You may do so only on Your own behalf, and not on behalf of the Initial Developer or any Contributor. You must make it absolutely clear than any such warranty, support, indemnity or liability obligation is offered by You alone, and You hereby agree to indemnify the Initial Developer and every Contributor for any liability incurred by the Initial Developer or such Contributor as a result of warranty, support, indemnity or liability terms You offer.

3.6. Distribution of Executable Versions. You may distribute Covered Code in Executable form only if the requirements of Section 3.1-3.5 have been met for that Covered Code, and if You include a notice stating that the Source Code version of the Covered Code is available under the terms of this License, including a description of how and where You have fulfilled the obligations of Section 3.2. The notice must be conspicuously included in any notice in an Executable version, related documentation or collateral in which You describe recipients' rights relating to the Covered Code. You may distribute the Executable version of Covered Code or ownership rights under a license of Your choice, which may contain terms different from this License, provided that You are in compliance with the terms of this License and that the license for the Executable version does not attempt to limit or alter the recipient's rights in the Source Code version from the rights set forth in this License. If You distribute the Executable version under a different license You must make it absolutely clear that any terms which differ from this License are offered by You alone, not by the Initial Developer or any Contributor. You hereby agree to indemnify the Initial Developer and every Contributor for any liability incurred by the Initial Developer or such Contributor as a result of any such terms You offer.

3.7. Larger Works. You may create a Larger Work by combining Covered Code with other code not governed by the terms of this License and distribute the Larger Work as a single product. In such a case, You must make sure the requirements of this License are fulfilled for the Covered Code.

4. Inability to Comply Due to Statute or Regulation. If it is impossible for You to comply with any of the terms of this License with respect to some or all of the Covered Code due to statute, judicial order, or regulation then You must: (a) comply with the terms of this License to the maximum extent possible; and (b) describe the limitations and the code they affect. Such description must be included in the LEGAL file described in Section 3.4 and must be included with all distributions of the Source Code. Except to the extent prohibited by statute or regulation, such description must be sufficiently detailed for a recipient of ordinary skill to be able to understand it.

Page 108: CA SOA Security Manager - supportcontent.ca.com SOA Security Manager R12...SOA Security Gateway Stabilization ... Upgrade an r12.1 SOA Security Gateway ... XML Digital Signature Authentication

Rhino

108 Release Notes

5. Application of this License. This License applies to code to which the Initial Developer has attached the notice in Exhibit A and to related Covered Code.

6. Versions of the License.

6.1. New Versions. Netscape Communications Corporation ("Netscape") may publish revised and/or new versions of the License from time to time. Each version will be given a distinguishing version number.

6.2. Effect of New Versions. Once Covered Code has been published under a particular version of the License, You may always continue to use it under the terms of that version. You may also choose to use such Covered Code under the terms of any subsequent version of the License published by Netscape. No one other than Netscape has the right to modify the terms applicable to Covered Code created under this License.

6.3. Derivative Works. If You create or use a modified version of this License (which you may only do in order to apply it to code which is not already Covered Code governed by this License), You must (a) rename Your license so that the phrases "Mozilla", "MOZILLAPL", "MOZPL", "Netscape", "MPL", "NPL" or any confusingly similar phrase do not appear in your license (except to note that your license differs from this License) and (b) otherwise make it clear that Your version of the license contains terms which differ from the Mozilla Public License and Netscape Public License. (Filling in the name of the Initial Developer, Original Code or Contributor in the notice described in Exhibit A shall not of themselves be deemed to be modifications of this License.)

7. DISCLAIMER OF WARRANTY. COVERED CODE IS PROVIDED UNDER THIS LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, WARRANTIES THAT THE COVERED CODE IS FREE OF DEFECTS, MERCHANTABLE, FIT FOR A PARTICULAR PURPOSE OR NON-INFRINGING. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE COVERED CODE IS WITH YOU. SHOULD ANY COVERED CODE PROVE DEFECTIVE IN ANY RESPECT, YOU (NOT THE INITIAL DEVELOPER OR ANY OTHER CONTRIBUTOR) ASSUME THE COST OF ANY NECESSARY SERVICING, REPAIR OR CORRECTION. THIS DISCLAIMER OF WARRANTY CONSTITUTES AN ESSENTIAL PART OF THIS LICENSE. NO USE OF ANY COVERED CODE IS AUTHORIZED HEREUNDER EXCEPT UNDER THIS DISCLAIMER.

8. TERMINATION.

8.1. This License and the rights granted hereunder will terminate automatically if You fail to comply with terms herein and fail to cure such breach within 30 days of becoming aware of the breach. All sublicenses to the Covered Code which are properly granted shall survive any termination of this License. Provisions which, by their nature, must remain in effect beyond the termination of this License shall survive.

Page 109: CA SOA Security Manager - supportcontent.ca.com SOA Security Manager R12...SOA Security Gateway Stabilization ... Upgrade an r12.1 SOA Security Gateway ... XML Digital Signature Authentication

Rhino

Appendix B: Third-Party Acknowledgements 109

8.2. If You initiate litigation by asserting a patent infringement claim (excluding declatory judgment actions) against Initial Developer or a Contributor (the Initial Developer or Contributor against whom You file such action is referred to as "Participant") alleging that: (a) such Participant's Contributor Version directly or indirectly infringes any patent, then any and all rights granted by such Participant to You under Sections 2.1 and/or 2.2 of this License shall, upon 60 days notice from Participant terminate prospectively, unless if within 60 days after receipt of notice You either: (i) agree in writing to pay Participant a mutually agreeable reasonable royalty for Your past and future use of Modifications made by such Participant, or (ii) withdraw Your litigation claim with respect to the Contributor Version against such Participant. If within 60 days of notice, a reasonable royalty and payment arrangement are not mutually agreed upon in writing by the parties or the litigation claim is not withdrawn, the rights granted by Participant to You under Sections 2.1 and/or 2.2 automatically terminate at the expiration of the 60 day notice period specified above. (b) any software, hardware, or device, other than such Participant's Contributor Version, directly or indirectly infringes any patent, then any rights granted to You by such Participant under Sections 2.1(b) and 2.2(b) are revoked effective as of the date You first made, used, sold, distributed, or had made, Modifications made by that Participant.

8.3. If You assert a patent infringement claim against Participant alleging that such Participant's Contributor Version directly or indirectly infringes any patent where such claim is resolved (such as by license or settlement) prior to the initiation of patent infringement litigation, then the reasonable value of the licenses granted by such Participant under Sections 2.1 or 2.2 shall be taken into account in determining the amount or value of any payment or license.

8.4. In the event of termination under Sections 8.1 or 8.2 above, all end user license agreements (excluding distributors and resellers) which have been validly granted by You or any distributor hereunder prior to termination shall survive termination.

9. LIMITATION OF LIABILITY. UNDER NO CIRCUMSTANCES AND UNDER NO LEGAL THEORY, WHETHER TORT (INCLUDING NEGLIGENCE), CONTRACT, OR OTHERWISE, SHALL YOU, THE INITIAL DEVELOPER, ANY OTHER CONTRIBUTOR, OR ANY DISTRIBUTOR OF COVERED CODE, OR ANY SUPPLIER OF ANY OF SUCH PARTIES, BE LIABLE TO ANY PERSON FOR ANY INDIRECT, SPECIAL, INCIDENTAL, OR CONSEQUENTIAL DAMAGES OF ANY CHARACTER INCLUDING, WITHOUT LIMITATION, DAMAGES FOR LOSS OF GOODWILL, WORK STOPPAGE, COMPUTER FAILURE OR MALFUNCTION, OR ANY AND ALL OTHER COMMERCIAL DAMAGES OR LOSSES, EVEN IF SUCH PARTY SHALL HAVE BEEN INFORMED OF THE POSSIBILITY OF SUCH DAMAGES. THIS LIMITATION OF LIABILITY SHALL NOT APPLY TO LIABILITY FOR DEATH OR PERSONAL INJURY RESULTING FROM SUCH PARTY'S NEGLIGENCE TO THE EXTENT APPLICABLE LAW PROHIBITS SUCH LIMITATION. SOME JURISDICTIONS DO NOT ALLOW THE EXCLUSION OR LIMITATION OF INCIDENTAL OR CONSEQUENTIAL DAMAGES, SO THIS EXCLUSION AND LIMITATION MAY NOT APPLY TO YOU.

Page 110: CA SOA Security Manager - supportcontent.ca.com SOA Security Manager R12...SOA Security Gateway Stabilization ... Upgrade an r12.1 SOA Security Gateway ... XML Digital Signature Authentication

Rhino

110 Release Notes

10. U.S. GOVERNMENT END USERS. The Covered Code is a "commercial item," as that term is defined in 48 C.F.R. 2.101 (Oct. 1995), consisting of "commercial computer software" and "commercial computer software documentation," as such terms are used in 48 C.F.R. 12.212 (Sept. 1995). Consistent with 48 C.F.R. 12.212 and 48 C.F.R. 227.7202-1 through 227.7202-4 (June 1995), all U.S. Government End Users acquire Covered Code with only those rights set forth herein.

11. MISCELLANEOUS. This License represents the complete agreement concerning subject matter hereof. If any provision of this License is held to be unenforceable, such provision shall be reformed only to the extent necessary to make it enforceable. This License shall be governed by California law provisions (except to the extent applicable law, if any, provides otherwise), excluding its conflict-of-law provisions. With respect to disputes in which at least one party is a citizen of, or an entity chartered or registered to do business in the United States of America, any litigation relating to this License shall be subject to the jurisdiction of the Federal Courts of the Northern District of California, with venue lying in Santa Clara County, California, with the losing party responsible for costs, including without limitation, court costs and reasonable attorneys' fees and expenses. The application of the United Nations Convention on Contracts for the International Sale of Goods is expressly excluded. Any law or regulation which provides that the language of a contract shall be construed against the drafter shall not apply to this License.

12. RESPONSIBILITY FOR CLAIMS. As between Initial Developer and the Contributors, each party is responsible for claims and damages arising, directly or indirectly, out of its utilization of rights under this License and You agree to work with Initial Developer and Contributors to distribute such responsibility on an equitable basis. Nothing herein is intended or shall be deemed to constitute any admission of liability.

13. MULTIPLE-LICENSED CODE. Initial Developer may designate portions of the Covered Code as "Multiple-Licensed". "Multiple-Licensed" means that the Initial Developer permits you to utilize portions of the Covered Code under Your choice of the NPL or the alternative licenses, if any, specified by the Initial Developer in the file described in Exhibit A.

EXHIBIT A -Mozilla Public License.

``The contents of this file are subject to the Mozilla Public License Version 1.1 (the "License"); you may not use this file except in compliance with the License. You may obtain a copy of the License at http://www.mozilla.org/MPL/

Page 111: CA SOA Security Manager - supportcontent.ca.com SOA Security Manager R12...SOA Security Gateway Stabilization ... Upgrade an r12.1 SOA Security Gateway ... XML Digital Signature Authentication

Rhino

Appendix B: Third-Party Acknowledgements 111

Software distributed under the License is distributed on an "AS IS" basis, WITHOUT WARRANTY OF ANY KIND, either express or implied. See the License for the specific language governing rights and limitations under the License.

The Original Code is ______________________________________. The Initial Developer of the Original Code is ________________________. Portions created by ______________________ are Copyright (C) ______ _______________________. All Rights Reserved.

Contributor(s): ______________________________________.

Alternatively, the contents of this file may be used under the terms of the _____ license (the "[___] License"), in which case the provisions of [______] License are applicable instead of those above. If you wish to allow use of your version of this file only under the terms of the [____] License and not to allow others to use your version of this file under the MPL, indicate your decision by deleting the provisions above and replace them with the notice and other provisions required by the [___] License. If you do not delete the provisions above, a recipient may use your version of this file under either the MPL or the [___] License."

[NOTE: The text of this Exhibit A may differ slightly from the text of the notices in the Source Code files of the Original Code. You should use the text of this Exhibit A rather than the text found in the Original Code Source Code for Your Modifications.]

Page 112: CA SOA Security Manager - supportcontent.ca.com SOA Security Manager R12...SOA Security Gateway Stabilization ... Upgrade an r12.1 SOA Security Gateway ... XML Digital Signature Authentication

SAAJ 1.3

112 Release Notes

SAAJ 1.3

SAAJ was obtained under the CDDL v.1.0 license, the terms and conditions of which are set forth below. SAAJ is distributed by CA for use with this CA product in unmodified, object code form, under the CA license agreement. Any provisions in the CA license agreement that differ from the CDDL are offered by CA alone and not by any other party. In addition, CA makes the source code for SAAJ available at http://opensrcd.ca.com/ips/07111_6/ under the terms of the CDDL v.1.0. license: 1. Definitions.

1.1. Contributor means each individual or entity that creates or contributes to the creation of Modifications.

1.2. Contributor Version means the combination of the Original Software, prior Modifications used by a Contributor (if any), and the Modifications made by that particular Contributor.

1.3. Covered Software means (a) the Original Software, or (b) Modifications, or (c) the combination of files containing Original Software with files containing Modifications, in each case including portions thereof.

1.4. Executable means the Covered Software in any form other than Source Code.

1.5. Initial Developer means the individual or entity that first makes Original Software available under this License.

1.6. Larger Work means a work which combines Covered Software or portions thereof with code not governed by the terms of this License.

1.7. License means this document.

1.8. Licensable means having the right to grant, to the maximum extent possible, whether at the time of the initial grant or subsequently acquired, any and all of the rights conveyed herein.

1.9. Modifications means the Source Code and Executable form of any of the following:

A. Any file that results from an addition to, deletion from or modification of the contents of a file containing Original Software or previous Modifications;

B. Any new file that contains any part of the Original Software or previous Modification; or

C. Any new file that is contributed or otherwise made available under the terms of this License.

Page 113: CA SOA Security Manager - supportcontent.ca.com SOA Security Manager R12...SOA Security Gateway Stabilization ... Upgrade an r12.1 SOA Security Gateway ... XML Digital Signature Authentication

SAAJ 1.3

Appendix B: Third-Party Acknowledgements 113

1.10. Original Software means the Source Code and Executable form of computer software code that is originally released under this License.

1.11. Patent Claims means any patent claim(s), now owned or hereafter acquired, including without limitation, method, process, and apparatus claims, in any patent Licensable by grantor.

1.12. Source Code means (a) the common form of computer software code in which modifications are made and (b) associated documentation included in or with such code.

1.13. You (or Your) means an individual or a legal entity exercising rights under, and complying with all of the terms of, this License. For legal entities, You includes any entity which controls, is controlled by, or is under common control with You. For purposes of this definition, control means (a) the power, direct or indirect, to cause the direction or management of such entity, whether by contract or otherwise, or (b) ownership of more than fifty percent (50%) of the outstanding shares or beneficial ownership of such entity.

2. License Grants.

2.1. The Initial Developer Grant.

Conditioned upon Your compliance with Section 3.1 below and subject to third party intellectual property claims, the Initial Developer hereby grants You a world-wide, royalty-free, non-exclusive license:

(a) under intellectual property rights (other than patent or trademark) Licensable by Initial Developer, to use, reproduce, modify, display, perform, sublicense and distribute the Original Software (or portions thereof), with or without Modifications, and/or as part of a Larger Work; and

(b) under Patent Claims infringed by the making, using or selling of Original Software, to make, have made, use, practice, sell, and offer for sale, and/or otherwise dispose of the Original Software (or portions thereof).

(c) The licenses granted in Sections 2.1(a) and (b) are effective on the date Initial Developer first distributes or otherwise makes the Original Software available to a third party under the terms of this License.

(d) Notwithstanding Section 2.1(b) above, no patent license is granted: (1) for code that You delete from the Original Software, or (2) for infringements caused by: (i) the modification of the Original Software, or (ii) the combination of the Original Software with other software or devices.

2.2. Contributor Grant.

Page 114: CA SOA Security Manager - supportcontent.ca.com SOA Security Manager R12...SOA Security Gateway Stabilization ... Upgrade an r12.1 SOA Security Gateway ... XML Digital Signature Authentication

SAAJ 1.3

114 Release Notes

Conditioned upon Your compliance with Section 3.1 below and subject to third party intellectual property claims, each Contributor hereby grants You a world-wide, royalty-free, non-exclusive license:

(a) under intellectual property rights (other than patent or trademark) Licensable by Contributor to use, reproduce, modify, display, perform, sublicense and distribute the Modifications created by such Contributor (or portions thereof), either on an unmodified basis, with other Modifications, as Covered Software and/or as part of a Larger Work; and

(b) under Patent Claims infringed by the making, using, or selling of Modifications made by that Contributor either alone and/or in combination with its Contributor Version (or portions of such combination), to make, use, sell, offer for sale, have made, and/or otherwise dispose of: (1) Modifications made by that Contributor (or portions thereof); and (2) the combination of Modifications made by that Contributor with its Contributor Version (or portions of such combination).

(c) The licenses granted in Sections 2.2(a) and 2.2(b) are effective on the date Contributor first distributes or otherwise makes the Modifications available to a third party.

(d) Notwithstanding Section 2.2(b) above, no patent license is granted: (1) for any code that Contributor has deleted from the Contributor Version; (2) for infringements caused by: (i) third party modifications of Contributor Version, or (ii) the combination of Modifications made by that Contributor with other software (except as part of the Contributor Version) or other devices; or (3) under Patent Claims infringed by Covered Software in the absence of Modifications made by that Contributor.

3. Distribution Obligations.

3.1. Availability of Source Code.

Any Covered Software that You distribute or otherwise make available in Executable form must also be made available in Source Code form and that Source Code form must be distributed only under the terms of this License. You must include a copy of this License with every copy of the Source Code form of the Covered Software You distribute or otherwise make available. You must inform recipients of any such Covered Software in Executable form as to how they can obtain such Covered Software in Source Code form in a reasonable manner on or through a medium customarily used for software exchange.

3.2. Modifications.

The Modifications that You create or to which You contribute are governed by the terms of this License. You represent that You believe Your Modifications are Your original creation(s) and/or You have sufficient rights to grant the rights conveyed by this License.

3.3. Required Notices.

Page 115: CA SOA Security Manager - supportcontent.ca.com SOA Security Manager R12...SOA Security Gateway Stabilization ... Upgrade an r12.1 SOA Security Gateway ... XML Digital Signature Authentication

SAAJ 1.3

Appendix B: Third-Party Acknowledgements 115

You must include a notice in each of Your Modifications that identifies You as the Contributor of the Modification. You may not remove or alter any copyright, patent or trademark notices contained within the Covered Software, or any notices of licensing or any descriptive text giving attribution to any Contributor or the Initial Developer.

3.4. Application of Additional Terms.

You may not offer or impose any terms on any Covered Software in Source Code form that alters or restricts the applicable version of this License or the recipients rights hereunder. You may choose to offer, and to charge a fee for, warranty, support, indemnity or liability obligations to one or more recipients of Covered Software. However, you may do so only on Your own behalf, and not on behalf of the Initial Developer or any Contributor. You must make it absolutely clear that any such warranty, support, indemnity or liability obligation is offered by You alone, and You hereby agree to indemnify the Initial Developer and every Contributor for any liability incurred by the Initial Developer or such Contributor as a result of warranty, support, indemnity or liability terms You offer.

3.5. Distribution of Executable Versions.

You may distribute the Executable form of the Covered Software under the terms of this License or under the terms of a license of Your choice, which may contain terms different from this License, provided that You are in compliance with the terms of this License and that the license for the Executable form does not attempt to limit or alter the recipients rights in the Source Code form from the rights set forth in this License. If You distribute the Covered Software in Executable form under a different license, You must make it absolutely clear that any terms which differ from this License are offered by You alone, not by the Initial Developer or Contributor. You hereby agree to indemnify the Initial Developer and every Contributor for any liability incurred by the Initial Developer or such Contributor as a result of any such terms You offer.

3.6. Larger Works.

You may create a Larger Work by combining Covered Software with other code not governed by the terms of this License and distribute the Larger Work as a single product. In such a case, You must make sure the requirements of this License are fulfilled for the Covered Software.

4. Versions of the License.

4.1. New Versions.

Sun Microsystems, Inc. is the initial license steward and may publish revised and/or new versions of this License from time to time. Each version will be given a distinguishing version number. Except as provided in Section 4.3, no one other than the license steward has the right to modify this License.

4.2. Effect of New Versions.

Page 116: CA SOA Security Manager - supportcontent.ca.com SOA Security Manager R12...SOA Security Gateway Stabilization ... Upgrade an r12.1 SOA Security Gateway ... XML Digital Signature Authentication

SAAJ 1.3

116 Release Notes

You may always continue to use, distribute or otherwise make the Covered Software available under the terms of the version of the License under which You originally received the Covered Software. If the Initial Developer includes a notice in the Original Software prohibiting it from being distributed or otherwise made available under any subsequent version of the License, You must distribute and make the Covered Software available under the terms of the version of the License under which You originally received the Covered Software. Otherwise, You may also choose to use, distribute or otherwise make the Covered Software available under the terms of any subsequent version of the License published by the license steward.

4.3. Modified Versions.

When You are an Initial Developer and You want to create a new license for Your Original Software, You may create and use a modified version of this License if You: (a) rename the license and remove any references to the name of the license steward (except to note that the license differs from this License); and (b) otherwise make it clear that the license contains terms which differ from this License.

5. DISCLAIMER OF WARRANTY.

COVERED SOFTWARE IS PROVIDED UNDER THIS LICENSE ON AN AS IS BASIS, WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, WARRANTIES THAT THE COVERED SOFTWARE IS FREE OF DEFECTS, MERCHANTABLE, FIT FOR A PARTICULAR PURPOSE OR NON-INFRINGING. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE COVERED SOFTWARE IS WITH YOU. SHOULD ANY COVERED SOFTWARE PROVE DEFECTIVE IN ANY RESPECT, YOU (NOT THE INITIAL DEVELOPER OR ANY OTHER CONTRIBUTOR) ASSUME THE COST OF ANY NECESSARY SERVICING, REPAIR OR CORRECTION. THIS DISCLAIMER OF WARRANTY CONSTITUTES AN ESSENTIAL PART OF THIS LICENSE. NO USE OF ANY COVERED SOFTWARE IS AUTHORIZED HEREUNDER EXCEPT UNDER THIS DISCLAIMER.

6. TERMINATION.

6.1. This License and the rights granted hereunder will terminate automatically if You fail to comply with terms herein and fail to cure such breach within 30 days of becoming aware of the breach. Provisions which, by their nature, must remain in effect beyond the termination of this License shall survive.

Page 117: CA SOA Security Manager - supportcontent.ca.com SOA Security Manager R12...SOA Security Gateway Stabilization ... Upgrade an r12.1 SOA Security Gateway ... XML Digital Signature Authentication

SAAJ 1.3

Appendix B: Third-Party Acknowledgements 117

6.2. If You assert a patent infringement claim (excluding declaratory judgment actions) against Initial Developer or a Contributor (the Initial Developer or Contributor against whom You assert such claim is referred to as Participant) alleging that the Participant Software (meaning the Contributor Version where the Participant is a Contributor or the Original Software where the Participant is the Initial Developer) directly or indirectly infringes any patent, then any and all rights granted directly or indirectly to You by such Participant, the Initial Developer (if the Initial Developer is not the Participant) and all Contributors under Sections 2.1 and/or 2.2 of this License shall, upon 60 days notice from Participant terminate prospectively and automatically at the expiration of such 60 day notice period, unless if within such 60 day period You withdraw Your claim with respect to the Participant Software against such Participant either unilaterally or pursuant to a written agreement with Participant.

6.3. In the event of termination under Sections 6.1 or 6.2 above, all end user licenses that have been validly granted by You or any distributor hereunder prior to termination (excluding licenses granted to You by any distributor) shall survive termination.

7. LIMITATION OF LIABILITY.

UNDER NO CIRCUMSTANCES AND UNDER NO LEGAL THEORY, WHETHER TORT (INCLUDING NEGLIGENCE), CONTRACT, OR OTHERWISE, SHALL YOU, THE INITIAL DEVELOPER, ANY OTHER CONTRIBUTOR, OR ANY DISTRIBUTOR OF COVERED SOFTWARE, OR ANY SUPPLIER OF ANY OF SUCH PARTIES, BE LIABLE TO ANY PERSON FOR ANY INDIRECT, SPECIAL, INCIDENTAL, OR CONSEQUENTIAL DAMAGES OF ANY CHARACTER INCLUDING, WITHOUT LIMITATION, DAMAGES FOR LOST PROFITS, LOSS OF GOODWILL, WORK STOPPAGE, COMPUTER FAILURE OR MALFUNCTION, OR ANY AND ALL OTHER COMMERCIAL DAMAGES OR LOSSES, EVEN IF SUCH PARTY SHALL HAVE BEEN INFORMED OF THE POSSIBILITY OF SUCH DAMAGES. THIS LIMITATION OF LIABILITY SHALL NOT APPLY TO LIABILITY FOR DEATH OR PERSONAL INJURY RESULTING FROM SUCH PARTYS NEGLIGENCE TO THE EXTENT APPLICABLE LAW PROHIBITS SUCH LIMITATION. SOME JURISDICTIONS DO NOT ALLOW THE EXCLUSION OR LIMITATION OF INCIDENTAL OR CONSEQUENTIAL DAMAGES, SO THIS EXCLUSION AND LIMITATION MAY NOT APPLY TO YOU.

8. U.S. GOVERNMENT END USERS.

The Covered Software is a commercial item, as that term is defined in 48 C.F.R. 2.101 (Oct. 1995), consisting of commercial computer software (as that term is defined at 48 C.F.R. 252.227-7014(a)(1)) and commercial computer software documentation as such terms are used in 48 C.F.R. 12.212 (Sept. 1995). Consistent with 48 C.F.R. 12.212 and 48 C.F.R. 227.7202-1 through 227.7202-4 (June 1995), all U.S. Government End Users acquire Covered Software with only those rights set forth herein. This U.S. Government Rights clause is in lieu of, and supersedes, any other FAR, DFAR, or other clause or provision that addresses Government rights in computer software under this License.

9. MISCELLANEOUS.

Page 118: CA SOA Security Manager - supportcontent.ca.com SOA Security Manager R12...SOA Security Gateway Stabilization ... Upgrade an r12.1 SOA Security Gateway ... XML Digital Signature Authentication

SAAJ 1.3

118 Release Notes

This License represents the complete agreement concerning subject matter hereof. If any provision of this License is held to be unenforceable, such provision shall be reformed only to the extent necessary to make it enforceable. This License shall be governed by the law of the jurisdiction specified in a notice contained within the Original Software (except to the extent applicable law, if any, provides otherwise), excluding such jurisdictions conflict-of-law provisions. Any litigation relating to this License shall be subject to the jurisdiction of the courts located in the jurisdiction and venue specified in a notice contained within the Original Software, with the losing party responsible for costs, including, without limitation, court costs and reasonable attorneys fees and expenses. The application of the United Nations Convention on Contracts for the International Sale of Goods is expressly excluded. Any law or regulation which provides that the language of a contract shall be construed against the drafter shall not apply to this License. You agree that You alone are responsible for compliance with the United States export administration regulations (and the export control laws and regulation of any other countries) when You use, distribute or otherwise make available any Covered Software.

10. RESPONSIBILITY FOR CLAIMS.

As between Initial Developer and the Contributors, each party is responsible for claims and damages arising, directly or indirectly, out of its utilization of rights under this License and You agree to work with Initial Developer and Contributors to distribute such responsibility on an equitable basis. Nothing herein is intended or shall be deemed to constitute any admission of liability.

Page 119: CA SOA Security Manager - supportcontent.ca.com SOA Security Manager R12...SOA Security Gateway Stabilization ... Upgrade an r12.1 SOA Security Gateway ... XML Digital Signature Authentication

Sun JDK 1.6.0

Appendix B: Third-Party Acknowledgements 119

Sun JDK 1.6.0

This Product is distributed with Sun JDK 1.6.0 (JAVA SE DEVELOPMENT KIT (JDK), VERSION 6) (Sun JDK). The Sun JDK is distributed in accordance with the Sun Microsystems, Inc. (Sun) Binary Code License Agreement set forth below. As noted in Section G of the Supplemental License Terms of this license, Sun has provided additional copyright notices and license terms that may be applicable to portions of the Sun JDK in the THIRDPARTYLICENSEREADME.txt file that accompanies the Sun JDK.

Sun Microsystems, Inc. Binary Code License Agreement for the JAVA SE DEVELOPMENT KIT (JDK), VERSION 6

SUN MICROSYSTEMS, INC. ("SUN") IS WILLING TO LICENSE THE SOFTWARE IDENTIFIED BELOW TO YOU ONLY UPON THE CONDITION THAT YOU ACCEPT ALL OF THE TERMS CONTAINED IN THIS BINARY CODE LICENSE AGREEMENT AND SUPPLEMENTAL LICENSE TERMS (COLLECTIVELY "AGREEMENT"). PLEASE READ THE AGREEMENT CAREFULLY. BY DOWNLOADING OR INSTALLING THIS SOFTWARE, YOU ACCEPT THE TERMS OF THE AGREEMENT. INDICATE ACCEPTANCE BY SELECTING THE "ACCEPT" BUTTON AT THE BOTTOM OF THE AGREEMENT. IF YOU ARE NOT WILLING TO BE BOUND BY ALL THE TERMS, SELECT THE "DECLINE" BUTTON AT THE BOTTOM OF THE AGREEMENT AND THE DOWNLOAD OR INSTALL PROCESS WILL NOT CONTINUE.

1. DEFINITIONS. "Software" means the identified above in binary form, any other machine readable materials (including, but not limited to, libraries, source files, header files, and data files), any updates or error corrections provided by Sun, and any user manuals, programming guides and other documentation provided to you by Sun under this Agreement. "Programs" mean Java applets and applications intended to run on the Java Platform, Standard Edition (Java SE) on Java-enabled general purpose desktop computers and servers.

2. LICENSE TO USE. Subject to the terms and conditions of this Agreement, including, but not limited to the Java Technology Restrictions of the Supplemental License Terms, Sun grants you a non-exclusive, non-transferable, limited license without license fees to reproduce and use internally Software complete and unmodified for the sole purpose of running Programs. Additional licenses for developers and/or publishers are granted in the Supplemental License Terms.

3. RESTRICTIONS. Software is confidential and copyrighted. Title to Software and all associated intellectual property rights is retained by Sun and/or its licensors. Unless enforcement is prohibited by applicable law, you may not modify, decompile, or reverse engineer Software. You acknowledge that Licensed Software is not designed or intended for use in the design, construction, operation or maintenance of any nuclear facility. Sun Microsystems, Inc. disclaims any express or implied warranty of fitness for such uses. No right, title or interest in or to any trademark, service mark, logo or trade name of Sun or its licensors is granted under this Agreement. Additional restrictions for developers and/or publishers licenses are set forth in the Supplemental License Terms.

Page 120: CA SOA Security Manager - supportcontent.ca.com SOA Security Manager R12...SOA Security Gateway Stabilization ... Upgrade an r12.1 SOA Security Gateway ... XML Digital Signature Authentication

Sun JDK 1.6.0

120 Release Notes

4. LIMITED WARRANTY. Sun warrants to you that for a period of ninety (90) days from the date of purchase, as evidenced by a copy of the receipt, the media on which Software is furnished (if any) will be free of defects in materials and workmanship under normal use. Except for the foregoing, Software is provided "AS IS". Your exclusive remedy and Sun's entire liability under this limited warranty will be at Sun's option to replace Software media or refund the fee paid for Software. Any implied warranties on the Software are limited to 90 days. Some states do not allow limitations on duration of an implied warranty, so the above may not apply to you. This limited warranty gives you specific legal rights. You may have others, which vary from state to state.

5. DISCLAIMER OF WARRANTY. UNLESS SPECIFIED IN THIS AGREEMENT, ALL EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT THESE DISCLAIMERS ARE HELD TO BE LEGALLY INVALID.

6. LIMITATION OF LIABILITY. TO THE EXTENT NOT PROHIBITED BY LAW, IN NO EVENT WILL SUN OR ITS LICENSORS BE LIABLE FOR ANY LOST REVENUE, PROFIT OR DATA, OR FOR SPECIAL, INDIRECT, CONSEQUENTIAL, INCIDENTAL OR PUNITIVE DAMAGES, HOWEVER CAUSED REGARDLESS OF THE THEORY OF LIABILITY, ARISING OUT OF OR RELATED TO THE USE OF OR INABILITY TO USE SOFTWARE, EVEN IF SUN HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. In no event will Sun's liability to you, whether in contract, tort (including negligence), or otherwise, exceed the amount paid by you for Software under this Agreement. The foregoing limitations will apply even if the above stated warranty fails of its essential purpose. Some states do not allow the exclusion of incidental or consequential damages, so some of the terms above may not be applicable to you.

7. TERMINATION. This Agreement is effective until terminated. You may terminate this Agreement at any time by destroying all copies of Software. This Agreement will terminate immediately without notice from Sun if you fail to comply with any provision of this Agreement. Either party may terminate this Agreement immediately should any Software become, or in either party's opinion be likely to become, the subject of a claim of infringement of any intellectual property right. Upon Termination, you must destroy all copies of Software.

8. EXPORT REGULATIONS. All Software and technical data delivered under this Agreement are subject to US export control laws and may be subject to export or import regulations in other countries. You agree to comply strictly with all such laws and regulations and acknowledge that you have the responsibility to obtain such licenses to export, re-export, or import as may be required after delivery to you.

9. TRADEMARKS AND LOGOS. You acknowledge and agree as between you and Sun that Sun owns the SUN, SOLARIS, JAVA, JINI, FORTE, and iPLANET trademarks and all SUN, SOLARIS, JAVA, JINI, FORTE, and iPLANET-related trademarks, service marks, logos and other brand designations ("Sun Marks"), and you agree to comply with the Sun Trademark and Logo Usage Requirements currently located at http://www.sun.com/policies/trademarks. Any use you make of the Sun Marks inures to Sun's benefit.

Page 121: CA SOA Security Manager - supportcontent.ca.com SOA Security Manager R12...SOA Security Gateway Stabilization ... Upgrade an r12.1 SOA Security Gateway ... XML Digital Signature Authentication

Sun JDK 1.6.0

Appendix B: Third-Party Acknowledgements 121

10. U.S. GOVERNMENT RESTRICTED RIGHTS. If Software is being acquired by or on behalf of the U.S. Government or by a U.S. Government prime contractor or subcontractor (at any tier), then the Government's rights in Software and accompanying documentation will be only as set forth in this Agreement; this is in accordance with 48 CFR 227.7201 through 227.7202-4 (for Department of Defense (DOD) acquisitions) and with 48 CFR 2.101 and 12.212 (for non-DOD acquisitions).

11. GOVERNING LAW. Any action related to this Agreement will be governed by California law and controlling U.S. federal law. No choice of law rules of any jurisdiction will apply.

12. SEVERABILITY. If any provision of this Agreement is held to be unenforceable, this Agreement will remain in effect with the provision omitted, unless omission would frustrate the intent of the parties, in which case this Agreement will immediately terminate.

13. INTEGRATION. This Agreement is the entire agreement between you and Sun relating to its subject matter. It supersedes all prior or contemporaneous oral or written communications, proposals, representations and warranties and prevails over any conflicting or additional terms of any quote, order, acknowledgment, or other communication between the parties relating to its subject matter during the term of this Agreement. No modification of this Agreement will be binding, unless in writing and signed by an authorized representative of each party.

SUPPLEMENTAL LICENSE TERMS

These Supplemental License Terms add to or modify the terms of the Binary Code License Agreement. Capitalized terms not defined in these Supplemental Terms shall have the same meanings ascribed to them in the Binary Code License Agreement . These Supplemental Terms shall supersede any inconsistent or conflicting terms in the Binary Code License Agreement, or in any license contained within the Software.

A. Software Internal Use and Development License Grant. Subject to the terms and conditions of this Agreement and restrictions and exceptions set forth in the Software "README" file incorporated herein by reference, including, but not limited to the Java Technology Restrictions of these Supplemental Terms, Sun grants you a non-exclusive, non-transferable, limited license without fees to reproduce internally and use internally the Software complete and unmodified for the purpose of designing, developing, and testing your Programs.

Page 122: CA SOA Security Manager - supportcontent.ca.com SOA Security Manager R12...SOA Security Gateway Stabilization ... Upgrade an r12.1 SOA Security Gateway ... XML Digital Signature Authentication

Sun JDK 1.6.0

122 Release Notes

B. License to Distribute Software. Subject to the terms and conditions of this Agreement and restrictions and exceptions set forth in the Software README file, including, but not limited to the Java Technology Restrictions of these Supplemental Terms, Sun grants you a non-exclusive, non-transferable, limited license without fees to reproduce and distribute the Software, provided that (i) you distribute the Software complete and unmodified and only bundled as part of, and for the sole purpose of running, your Programs, (ii) the Programs add significant and primary functionality to the Software, (iii) you do not distribute additional software intended to replace any component(s) of the Software, (iv) you do not remove or alter any proprietary legends or notices contained in the Software, (v) you only distribute the Software subject to a license agreement that protects Sun's interests consistent with the terms contained in this Agreement, and (vi) you agree to defend and indemnify Sun and its licensors from and against any damages, costs, liabilities, settlement amounts and/or expenses (including attorneys' fees) incurred in connection with any claim, lawsuit or action by any third party that arises or results from the use or distribution of any and all Programs and/or Software.

C. License to Distribute Redistributables. Subject to the terms and conditions of this Agreement and restrictions and exceptions set forth in the Software README file, including but not limited to the Java Technology Restrictions of these Supplemental Terms, Sun grants you a non-exclusive, non-transferable, limited license without fees to reproduce and distribute those files specifically identified as redistributable in the Software "README" file ("Redistributables") provided that: (i) you distribute the Redistributables complete and unmodified, and only bundled as part of Programs, (ii) the Programs add significant and primary functionality to the Redistributables, (iii) you do not distribute additional software intended to supersede any component(s) of the Redistributables (unless otherwise specified in the applicable README file), (iv) you do not remove or alter any proprietary legends or notices contained in or on the Redistributables, (v) you only distribute the Redistributables pursuant to a license agreement that protects Sun's interests consistent with the terms contained in the Agreement, (vi) you agree to defend and indemnify Sun and its licensors from and against any damages, costs, liabilities, settlement amounts and/or expenses (including attorneys' fees) incurred in connection with any claim, lawsuit or action by any third party that arises or results from the use or distribution of any and all Programs and/or Software.

D. Java Technology Restrictions. You may not create, modify, or change the behavior of, or authorize your licensees to create, modify, or change the behavior of, classes, interfaces, or subpackages that are in any way identified as "java", "javax", "sun" or similar convention as specified by Sun in any naming convention designation.

Page 123: CA SOA Security Manager - supportcontent.ca.com SOA Security Manager R12...SOA Security Gateway Stabilization ... Upgrade an r12.1 SOA Security Gateway ... XML Digital Signature Authentication

Sun JDK 1.6.0

Appendix B: Third-Party Acknowledgements 123

E. Distribution by Publishers. This section pertains to your distribution of the Software with your printed book or magazine (as those terms are commonly used in the industry) relating to Java technology ("Publication"). Subject to and conditioned upon your compliance with the restrictions and obligations contained in the Agreement, in addition to the license granted in Paragraph 1 above, Sun hereby grants to you a non-exclusive, nontransferable limited right to reproduce complete and unmodified copies of the Software on electronic media (the "Media") for the sole purpose of inclusion and distribution with your Publication(s), subject to the following terms: (i) You may not distribute the Software on a stand-alone basis; it must be distributed with your Publication(s); (ii) You are responsible for downloading the Software from the applicable Sun web site; (iii) You must refer to the Software as JavaTM SE Development Kit 6; (iv) The Software must be reproduced in its entirety and without any modification whatsoever (including, without limitation, the Binary Code License and Supplemental License Terms accompanying the Software and proprietary rights notices contained in the Software); (v) The Media label shall include the following information: Copyright 2006, Sun Microsystems, Inc. All rights reserved. Use is subject to license terms. Sun, Sun Microsystems, the Sun logo, Solaris, Java, the Java Coffee Cup logo, J2SE, and all trademarks and logos based on Java are trademarks or registered trademarks of Sun Microsystems, Inc. in the U.S. and other countries. This information must be placed on the Media label in such a manner as to only apply to the Sun Software; (vi) You must clearly identify the Software as Sun's product on the Media holder or Media label, and you may not state or imply that Sun is responsible for any third-party software contained on the Media; (vii) You may not include any third party software on the Media which is intended to be a replacement or substitute for the Software; (viii) You shall indemnify Sun for all damages arising from your failure to comply with the requirements of this Agreement. In addition, you shall defend, at your expense, any and all claims brought against Sun by third parties, and shall pay all damages awarded by a court of competent jurisdiction, or such settlement amount negotiated by you, arising out of or in connection with your use, reproduction or distribution of the Software and/or the Publication. Your obligation to provide indemnification under this section shall arise provided that Sun: (a) provides you prompt notice of the claim; (b) gives you sole control of the defense and settlement of the claim; (c) provides you, at your expense, with all available information, assistance and authority to defend; and (d) has not compromised or settled such claim without your prior written consent; and (ix) You shall provide Sun with a written notice for each Publication; such notice shall include the following information: (1) title of Publication, (2) author(s), (3) date of Publication, and (4) ISBN or ISSN numbers. Such notice shall be sent to Sun Microsystems, Inc., 4150 Network Circle, M/S USCA12-110, Santa Clara, California 95054, U.S.A , Attention: Contracts Administration.

F. Source Code. Software may contain source code that, unless expressly licensed for other purposes, is provided solely for reference purposes pursuant to the terms of this Agreement. Source code may not be redistributed unless expressly provided for in this Agreement.

Page 124: CA SOA Security Manager - supportcontent.ca.com SOA Security Manager R12...SOA Security Gateway Stabilization ... Upgrade an r12.1 SOA Security Gateway ... XML Digital Signature Authentication

Sun JDK 1.6.0

124 Release Notes

G. Third Party Code. Additional copyright notices and license terms applicable to portions of the Software are set forth in the THIRDPARTYLICENSEREADME.txt file. In addition to any terms and conditions of any third party opensource/freeware license identified in the THIRDPARTYLICENSEREADME.txt file, the disclaimer of warranty and limitation of liability provisions in paragraphs 5 and 6 of the Binary Code License Agreement shall apply to all Software in this distribution.

H. Termination for Infringement. Either party may terminate this Agreement immediately should any Software become, or in either party's opinion be likely to become, the subject of a claim of infringement of any intellectual property right.

I. Installation and Auto-Update. The Software's installation and auto-update processes transmit a limited amount of data to Sun (or its service provider) about those specific processes to help Sun understand and optimize them. Sun does not associate the data with personally identifiable information. You can find more information about the data Sun collects at http://java.com/data/.

For inquiries please contact: Sun Microsystems, Inc., 4150 Network Circle, Santa Clara, California 95054, U.S.A.

ADDITIONAL TERMS AND CONDITIONS FOR THE USE OF

Sun JDK 1.6

(JAVA 2 PLATFORM STANDARD EDITION RUNTIME ENVIRONMENT 6.0)

Licensee agrees that the following terms (in addition to the applicable provisions above) shall apply with respect to any open source code provided by Sun Microsystems, Inc. contained within the Product. Notwithstanding anything contained in the CA End User License Agreement, solely with respect to such open source, these terms are not superseded by any written agreement between CA and Licensee:

"Software" means Java' 2 Platform Standard Edition Version 1.6_X and any user manuals, programming guides and other documentation provided to Licensee.

Title to Software and all associated intellectual property rights is retained by Sun Microsystems, Inc. ('Sun') and/or its licensors. Licensee acknowledges that Software is not designed or intended for use in the design, construction, operation or maintenance of any nuclear facility. Sun disclaims any express or implied warranty of fitness for such uses. No right, title or interest in or to any trademark, service mark, logo or trade name of Sun or its licensors is granted under this agreement.

The Software is provided "AS IS". As to any claim made by Licensee against Sun respecting Software, Licensee's exclusive remedy and Sun's entire liability under this limited warranty will be at Sun's option to replace Software media or refund the fee paid for Software by Licensee to Sun which Licensee acknowledges is $0.

Page 125: CA SOA Security Manager - supportcontent.ca.com SOA Security Manager R12...SOA Security Gateway Stabilization ... Upgrade an r12.1 SOA Security Gateway ... XML Digital Signature Authentication

Sun JDK 1.6.0

Appendix B: Third-Party Acknowledgements 125

UNLESS SPECIFIED IN THIS AGREEMENT, ALL EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT THESE DISCLAIMERS ARE HELD TO BE LEGALLY INVALID. The foregoing limitations shall not affect any warranties provided in any other applicable agreement between Licensee and CA.

TO THE EXTENT NOT PROHIBITED BY LAW, IN NO EVENT WILL SUN OR ITS LICENSORS BE LIABLE FOR ANY LOST REVENUE, PROFIT OR DATA, OR FOR SPECIAL, INDIRECT, CONSEQUENTIAL, INCIDENTAL OR PUNITIVE DAMAGES, HOWEVER CAUSED REGARDLESS OF THE THEORY OF LIABILITY, ARISING OUT OF OR RELATED TO THE USE OF OR INABILITY TO USE SOFTWARE, EVEN IF SUN HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. In no event will Sun's liability to you, whether in contract, tort (including negligence), or otherwise, exceed the amount paid for Software by Licensee to Sun which Licensee acknowledges is $0. The foregoing limitations will apply even if the above stated warranty fails of its essential purpose.

Licensee acknowledges that Licensee's use of the Software will terminate immediately without notice if Licensee fails to comply with any provision of this agreement. Licensee acknowledges that Sun may terminate this agreement immediately should the Software become, or in Sun's opinion be likely to become, the subject of a claim of infringement of any intellectual property right. Upon termination, Licensee must destroy all copies of Software.

Licensee acknowledges and agrees as between Licensee and Sun that Sun owns the SUN, SOLARIS, JAVA, JINI, FORTE, and iPLANET trademarks and all SUN, SOLARIS, JAVA, JINI, FORTE, and iPLANET-related trademarks, service marks, logos and other brand designations ("Sun Marks"), and Licensee agrees to comply with the Sun Trademark and Logo Usage Requirements currently located at http://www.sun.com/policies/trademarks. Any use Licensee makes of the Sun Marks inures to Sun's benefit.

Notwithstanding anything to the contrary contained in any agreement between Licensee and CA, any action related to this agreement in which Sun is a party will be governed by California law and controlling U.S. federal law. No choice of law rules of any jurisdiction will apply.

Licensee acknowledges that additional copyright notices and license terms applicable to portions of the Software are set forth in the THIRDPARTYLICENSEREADME.txt file.

For inquiries please contact: Sun Microsystems, Inc., 4150 Network Circle, Santa Clara, California 95054, U.S.A.

Page 126: CA SOA Security Manager - supportcontent.ca.com SOA Security Manager R12...SOA Security Gateway Stabilization ... Upgrade an r12.1 SOA Security Gateway ... XML Digital Signature Authentication

wsdl4j 1.62

126 Release Notes

wsdl4j 1.62

This product includes wsdl4j 1.62 which was obtained under the Common Public License v.1.0, and is distributed by CA for use with this CA product in unmodified, object code form, under the CA license agreement. Any provisions in the CA license agreement that differ from the Common Public License are offered by CA alone and not by any other party. The third party licensors of this component provide it on an &||&AS-IS&||& BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied, including, without limitation, any warranties or conditions of TITLE, NON-INFRINGEMENT, MERCHANTABILITY, or FITNESS FOR A PARTICULAR PURPOSE, and disclaim liability for any claim or loss, including, without limitation, direct, indirect, special, punitive, exemplary or consequential damages. CA makes the source code for this component available at http://opensrcd.ca.com/ips/05944_25 under the terms of the Common Public License v.1.0. Alternatively, you may obtain the source code from http://sourceforge.net/projects/wsdl4j/ .