Overview
This page identifies the package contents for all Universal Agent 7.1.x for z/OS maintenance releases, including the initial release, and the maintenance level of every component in each package.
For each release, changes made to individual components for z/OS only, and for z/OS and one or more other platforms, are identified. Maintenance level changes to a component for non-z/OS platforms are not shown.
For a list of all changes in a release - all platforms, all components - see All Platforms Package Maintenance Levels - Agent 7.1.x.
For a list of all changes in a release - all platforms, specific components - see Component Maintenance Levels - Agent 7.1.x.
Universal Agent 7.1.x for z/OS Packages
The following table identifies the maintenance level of all components contained in each Universal Agent 7.1.x for z/OS package.
Release | Release Date | SMP/E | Universal | Universal | Universal | Controller | Universal | Universal | Universal | Universal | Universal | Universal | Universal | Universal | Universal | Universal | Universal | Universal | Universal | Universal |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
7.1.0.3 | November 18, 2022 | 7.1.0.0 | 7.1.0.0 | 7.1.0.1 | 7.1.0.0 | 7.1.0.0 | 7.1.0.2 | 7.1.0.0 | 6.1.0.0 | 7.1.0.0 | 7.1.0.0 | 7.1.0.1 | 7.1.0.1 | 7.1.0.0 | 7.1.0.0 | 7.1.0.0 | 7.1.0.0 | 7.1.0.0 | ||
July 12, 2022 | 7.1.0.0 | 7.1.0.0 | 7.1.0.1 | 7.1.0.0 | 7.1.0.0 | 7.1.0.0 | 7.1.0.0 | 6.1.0.0 | 7.1.0.0 | 7.1.0.0 | 7.1.0.1 | 7.1.0.1 | 7.1.0.0 | 7.1.0.0 | 7.1.0.0 | 7.1.0.0 | 7.1.0.0 | |||
October 4, 2021 | 7.1.0.0 | 7.1.0.0 | 7.1.0.0 | 7.1.0.0 | 7.1.0.0 | 7.1.0.0 | 7.1.0.0 | 6.1.0.0 | 7.1.0.0 | 7.1.0.0 | 7.1.0.0 | 7.1.0.0 | 7.1.0.0 | 7.1.0.0 | 7.1.0.0 | 7.1.0.0 | 7.1.0.0 |
Note
Install changes refer to changes to the programs, scripts, or supporting files used to install the package. There are no changes to the actual product components.
Agent 7.1.0.3 - November 18, 2022
D-10726 | z/OS | UCMD | PS31004 | Fix a problem in which passwords that contain spaces are not parsed correctly. |
Agent 7.1.0.1 - July 12, 2022
Change ID | Platforms | Component | PTF | Description |
---|---|---|---|---|
D-10707 | All | UAGSRV | PS31003 | Prevent a deadlock that may occur when a CHANGE File Monitor instance detects new matching files. Note This item may be identified in other UA releases as D-10587 or D-10716. |
D-10718 | All | UDM | PS31001 PS31002 | Prevent an authentication error for a File Transfer task when the following conditions exist:
For example: Starting with UA 7.0.0.0, this will cause the resolved $(ops_primary_cred_pwd) value in the Note This item was originally delivered in UA 7.2.0.0 as D-10523. |
D-10733 | All | UAGSRV | PS31003 | Prevent a CHANGE File Monitor that specifies a stable period from incorrectly generating multiple events. Note This item may be identified in other UA releases as D-10544 or D-10732. |
Agent 7.1.0.0 - October 4, 2021
Change ID | Platforms | Component | Description |
---|---|---|---|
B-10691 | All | UAGSRV | Add explicit FTPS (FTPES) support to UFTP. Enables transfers using TLS/SSL over connection to standard FTP port 21, provided the FTP server supports it. To request TLS/SSL from a Remote File Transfer or Remote File Monitor task, select the FTP protocol and prepend ftpes:// to the FTP server host name or IP address (e.g., ftpes://somehost). If the FTP server has enabled TLS/SSL support, the connection will proceed using encrypted communication. If TLS/SSL support is NOT enabled, a plain text session/transfer is done. The UFTP ENABLE_SSL configuration option (default:no) is provided to always request a TLS/SSL session, eliminating the need to specify the ftpes:// prefix. The UFTP AUTHENTICATE_PEER configuration option (default: no) is provided to control FTP server certificate authentication. When set to “yes”, the UFTP CA_CERTIFICATES configuration option must specify a CA certificate that can authenticate the FTP server’s certificate. |
B-12809 | All | USAP | Update USAP to support the RSPARAMSL_255 data type for variants. The following USAP operations may now take advantage of this change:
These changes are supported for XBP 2.0 and XBP 3.0, but full 255-character support ultimately depends on the SAP function module implementation. Note For the most consistent RSPARAMSL_255 support, Stonebranch recommends using SAP NW RFC library version 7.5.x and XBP 3.0 (controlled via the USAP XBP_MAX configuration option). |
B-13282 | z/OS | UAGSRV | Add automatic failover support for Agents configured to execute in a sysplex environment. The following items were delivered for UA 7.1.0.0 to support this feature:
Note To ensure proper accounting for z/OS licenses, we recommend that all UAG Servers configured to run in a sysplex environment use the same value for the UAG Server’s NETNAME configuration option. |
B-13885 | z/OS | UBROKER | Suppress ICH408I messages in the RACF log when running the Broker with a user without BPX.SUPERUSER access. This message is an expected response to a check of authority level, but repeated checks result in several instances of the ICH408I message appear in the log. |
D-08997 | z/OS | UDM | Prevent a S0C4 when executing transfers of UTF16-encoded datasets. |
D-09852 | Unix | UDM | Ensure that the message that shows the result of the CD command displays correctly. This issue was most visible on zOS, but could occur on any Linux/Unix system whose default locale is not UTF8. |
D-10189 | z/OS | PKG | Fix a problem that prevented the installation of hlq.SUNVSAMP(UBRDBSPZ). |
D-10210 | All | UDM | Scrubs any password specified with the OPEN statement from trace file output. |
D-10256 | All | UDM | Fixes a crash that could occur if the UDM Manager message level was set to “trace” from the command line. |
D-10346 | z/OS | UAGSRV
| Fixes a problem that prevented a zOS CHANGE File Monitor task from storing a renamed dataset’s new name in Universal Control variables. |
D-10426 | z/OS | UBROKER | Fixes a problem that prevented UBROKER startup while loading the UNVACTRT SMF exit. |
D-10474 | z/OS | UCMD
| Prevent a situation in which command line parameters provided via a SYSIN statement were ignored if they followed a password on the same line. For example, given the following:
The -level option would be ignored unless moved to a separate line: |