RSA Patch Installation 7.5.2
RSA Patch Installation 7.5.2
Trademarks
RSA, RSA Security, the RSA Logo, and other trademarks, are trademarks of RSA Security LLC or its affiliates.
Other trademarks may be trademarks of their respective owners. For a list of RSA trademarks, go to
https://www.rsa.com/en-us/company/rsa-trademarks.
License agreement
This software and the associated documentation are proprietary and confidential to RSA Security LLC or its
subsidiaries, are furnished under license, and may be used and copied only in accordance with the terms of such
license and with the inclusion of the copyright notice below. This software and the documentation, and any
copies thereof, may not be provided or otherwise made available to any other person.
No title to or ownership of the software or documentation or any intellectual property rights thereto is hereby
transferred. Any unauthorized use or reproduction of this software and the documentation may be subject to
civil and/or criminal liability.
This software is subject to change without notice and should not be construed as a commitment by RSA
Security.
Third-party licenses
This product may include software developed by parties other than RSA. The text of the license agreements
applicable to third-party software in this product may be viewed by launching the RSA Identity Governance and
Lifecycle product and selecting the About menu. By using this product, a user of this product agrees to be fully
bound by terms of the license agreements.
Distribution
Use, copying, and distribution of any RSA Security software described in this publication requires an applicable
software license.
RSA Security LLC believes the information in this publication is accurate as of its publication date. The
information is subject to change without notice.
THE INFORMATION IN THIS PUBLICATION IS PROVIDED "AS IS." RSA SECURITY LLC MAKES NO
REPRESENTATIONS OR WARRANTIES OF ANY KIND WITH RESPECT TO THE INFORMATION IN THIS
PUBLICATION, AND SPECIFICALLY DISCLAIMS IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR
A PARTICULAR PURPOSE.
Copyright © 2022 RSA Security LLC or its affiliates. All Rights Reserved.
November 2022
SecurID Governance & Lifecycle Patch Installation Guide 7.5.2
Contents
Installing a Patch 4
Important 4
Upgrade JDK 15
3
SecurID Governance & Lifecycle Patch Installation Guide 7.5.2
Installing a Patch
The following procedures describe how to download and apply a patch to SecurID Governance and Lifecycle
hardware appliance and software bundle installations, and how to upgrade Access Fulfillment Express (AFX)
server and connectors. Patches are cumulative.
Important
l When upgrading from product versions older than 7.5.2, you must upgrade to version 7.5.2 before you
install any version 7.5.2 patches.
l If you are applying a patch immediately after installing or upgrading, apply the patch in a different shell
session from the one in which you ran install.sh.
l Do not attempt to install a previous version of a patch over a later version of a patch.
l When applying a patch in a WebSphere or WebLogic environment, you must uninstall the Workflow
Architect EAR before applying updates.
l Customizations made using the SecurID Governance and Lifecycle user interface are preserved during
the upgrade process. However, any customizations made directly to the EAR are overwritten during the
patching process. If you have made any customizations to the EAR, record the customizations before
performing the upgrade, and manually restore them after you complete the installation.
l The way in which SecurID Governance and Lifecycle handles business descriptions for groups has
changed from previous product versions.
If your SecurID Governance and Lifecycle deployment includes business descriptions for groups, run the
pre-migration queries for group business descriptions to identify any business descriptions that will be
automatically deleted during the update process. For more information and the queries, see Migration
Queries for Group Business Descriptions on page 5.
Note: On a deployment with an RSA-provided local database, the patch script automatically stops and
starts the database to ensure that this requirement is met.
l In a clustered environment, use only one node during the patch update process. Stop all other nodes in
the cluster to ensure that multiple nodes do not attempt a database migration. Before you patch
additional nodes or enable farming to push EAR changes to other nodes, validate that the patch is
applied and the one node is working as expected.
For additional details for WebSphere and WebLogic environments, see the SecurID Governance &
Lifecycle Installation Guide. For additional details on WildFly environments, see Chapter: Set Up WildFly
Clustering in SecurID Governance & Lifecycle Installation Guide.
Note: The created product schemas, such as AVUSER, are reserved for product database objects.
Creating additional database objects within the product schemas may affect the operation of the
systems, migration, or patch applications.
4 Installing a Patch
SecurID Governance & Lifecycle Patch Installation Guide 7.5.2
When updating or migrating SecurID Governance & Lifecycle from a previous version, SecurID Governance &
Lifecycle deletes group business descriptions that are not actively in use. Before you migrate, run the following
pre-migration queries to identify any group business descriptions that will be deleted by the migration process.
If you still need these group business descriptions, you can re-import them with an application reference in the
import file, or you can manually recreate them after migration.
Review the results of each query to determine if any of the identified business descriptions are still needed. You
must manually recreate or import the identified business descriptions in the new system after migration is
complete.
SELECT
id,
'Group' as Type,
FROM
t_av_business_description a
WHERE
NOT EXISTS (
SELECT
application_id
FROM
t_groups b
WHERE
b.filter_id = a.id
AND a.object_type = 4
SELECT
id,
'Group' as Type,
FROM
t_av_business_description a
WHERE
NOT EXISTS (
SELECT
application_id
FROM
t_groups b
WHERE
b.filter_id = a.id
AND a.object_type = 4
declare
v_tbl_count number;
Begin
from user_tab_columns
end if;
execute immediate
AS
SELECT
name,
id,
filter_id,
application_id
FROM
t_groups
WHERE
filter_id !=-1';
end;
Follow the steps below to apply the patch on various deployment types:
l WildFly Cluster
l Docker Container
Follow these steps to install the SecurID Governance & Lifecycle patch:
1. Log in to RSA Community, and from Downloads drop-down list, click SecurID Governance &
Lifecycle.
2. Click Full Product Downloads on the top right of the page.
3. You will be redirected to myRSA website after authentication.
4. Select the Downloads card, then click SecurID Governance & Lifecycle from the list of products.
6. From the Select Version drop-down list, select the version/patch you are patching to.
l Aveksa_<VersionNumber>_P<PatchNumber>.tar.gz
l ACM_Container_V<VersionAndPatchNumber>.tar
9. If you have Access Fulfillment Express (AFX), download the following AFX connector packages:
l AFX-<VersionNumber>_P<PatchNumber>-Standard-Connectors.zip
If you have Access Fulfillment Express (AFX) installed, using the AFX user account, shut down all AFX instances
before installing the patch upgrade:
<path-to-AFX_installation-directory>/AFX/afx stop
i. cd /home/oracle
2. Log in as the user who performed the base installation of SecurID Governance and Lifecycle, for example
root or the oracle user, as the patch.sh installation script will be run in the directory created in the
previous step "1".
i. cd /home/oracle/Aveksa_<VersionNumber>_P<PatchNumber>
ii. sh patch.sh
Note: With each application of a patch, previous versions of the Aveksa EAR are archived in the $AVEKSA_
HOME/archive directory. Each archive requires approximately 1 GB of disk space. For more information, see
archive/Archive_README.txt.
Note: Applying the patch as root updates the system files created during installation, such as service files and
the sudoer file.
the file:
cd /home/oracle
3. Ensure that SecurID Governance & Lifecycle is only running on the Domain/SON node and stopped on all
other nodes.
i. cd /home/oracle/Aveksa_<VersionNumber>_P<PatchNumber>
ii. sh patch.sh
5. Access the SecurID Governance & Lifecycle URL of the Domain/SON node and verify the patch
application is complete.
6. Start all the other nodes in the WildFly cluster. After start, SecurID Governance & Lifecycle application
will automatically update to the same patch level as the Domain/SON node.
Note: In case the Server Nodes page takes time to load, restart the domain node and then the host nodes.
l docker rm -f <container_name> (This step is just to be sure proper clean-up is done before
starting new container)
2. Follow the steps below to upload the patch and start SecurID Governance & Lifecycle container:
l Make a note of the image name in the output of the above command. The image name is
composed of the repository and tag identifiers, e.g. identity/rsaigl:7.5.0.180683. You can also
run the following command to obtain the repository and tag identifiers:
docker images
l Create and start the new GL Docker Container as follows. Make sure to use the same
configuration options and point to the same Docker volumes (for encryption files,
keystore/certificate files, and configuration files) that were used for the original GL Docker
Container.
4. It will ask for Migration Password, to migrate the DB to the same build version as that of Docker
container.
l Repeat the above step "1" on all nodes to stop/remove the containers on all nodes
l Follow the above step "2" to load the IGL container image on all nodes. Once the container image
is loaded on all nodes, then create and start the IGL container on domain node ONLY. Do NOT
create/start the IGL container on other nodes for now.
l Follow the above steps "3" through "5" on the domain node only.
l Once the domain node is working as expected, create and start the IGL container on all other
nodes. UI should now be accessible on all nodes.
3. Perform any necessary customizations to the Aveksa EAR file. For more information, see "Modifying the
SecurID Governance & Lifecycle Enterprise Archive" in the SecurID Governance & Lifecycle Installation
Guide.
8. In a WebSphere environment, after you deploy the patch, you must restart SecurID Governance &
Lifecycle. When you start SecurID Governance and Lifecycle after applying the patch, SQL processing is
performed. After SQL processing is complete, restart SecurID Governance & Lifecycle again, to ensure
that any patch processing takes effect.
iv. After the aveksa application has been stopped, click Start to start SecurID Governance
and Lifecycle.
9. In a WebLogic environment, you must restart SecurID Governance and Lifecycle after you install the
patch.
ii. Select the Aveksa application and click Stop and then Start to restart the application.
Note: Restarting SecurID Governance and Lifecycle also restarts the local agent.
l If your WildFly deployment includes a local Access Fulfillment Express (AFX), it will be started by the
patch script. The AFX server automatically gets upgraded on a startup after the patch is applied.
l If AFX is installed on a remote server (e.g., in WebLogic or WebSphere environment), start AFX server
using the AFX user account as follows. The AFX server automatically gets upgraded on a startup after the
patch is applied.
<path-to-AFX_installation-directory>/AFX/afx start
l If your deployment includes AFX server, you must also upgrade your AFX connectors. For instructions,
see Import AFX Connector Packages on page 14.
If your deployment includes a remote Collection Agent, download a new AveksaAgent.zip from SecurID
Governance & Lifecycle UI. Follow the steps in the SecurID Governance & Lifecycle Upgrade and Migration Guide
to re-install the agent.
If your SecurID Governance & Lifecycle deployment uses Access Fulfillment Express (AFX), use this procedure to
import the AFX connector package. Reference the instructions in Step 1 above for downloading the connector
packages from RSA Community.
Procedure
1. Copy the Connector package files to a directory local to the browser client from which you plan to
import the packages:
l AFX-<VersionNumber>_P<PatchNumber>-Standard-Connectors.zip
<path-to-AFX_installation-directory>/AFX/afx start
Upgrade JDK
If the patch includes a new JDK version, follow the steps below to upgrade JDK. This step applies to WildFly and
Virtual Application deployments.
2. Copy the file upgradeJDK<version>_<revision>.tar to the WildFly installation folder, e.g., /home/oracle.
6. After JDK is upgraded, log out of all SSH sessions (for root and oracle users). Log back in as needed.
Upgrade JDK 15