infoscale-win_x64-Patch_7_0_15303_129_3866918

 Basic information
Release type: Patch
Release date: 2017-05-15
OS update support: None
Technote: None
Documentation: None
Popularity: 744 viewed    downloaded
Download size: 10.88 MB
Checksum: 3983281888

 Applies to one or more of the following products:
InfoScale Enterprise 7.0 On Windows x64
InfoScale Foundation 7.0 On Windows x64
InfoScale Storage 7.0 On Windows x64

 Obsolete patches, incompatibilities, superseded patches, or other requirements:
None.

 Fixes the following incidents:
3866918

 Patch ID:
None.

Readme file
                          * * * READ ME * * *
                      * * * InfoScale 7.0.1 * * *
                          * * * Patch 3 * * *
                         Patch Date: 2017-05-09


This document provides the following information:

   * PATCH NAME
   * OPERATING SYSTEMS SUPPORTED BY THE PATCH
   * PACKAGES AFFECTED BY THE PATCH
   * BASE PRODUCT VERSIONS FOR THE PATCH
   * SUMMARY OF INCIDENTS FIXED BY THE PATCH
   * DETAILS OF INCIDENTS FIXED BY THE PATCH
   * INSTALLATION PRE-REQUISITES
   * INSTALLING THE PATCH
   * REMOVING THE PATCH


PATCH NAME
----------
InfoScale 7.0.1 Patch 3


OPERATING SYSTEMS SUPPORTED BY THE PATCH
----------------------------------------
Windows Server 2008 R2 X64
Windows Server 2012 R2 X64
Windows 2012 X64



BASE PRODUCT VERSIONS FOR THE PATCH
-----------------------------------
   * InfoScale Enterprise 7.0
   * InfoScale Foundation 7.0
   * InfoScale Storage 7.0


SUMMARY OF INCIDENTS FIXED BY THE PATCH
---------------------------------------
Patch ID: Patch_7_0_15303_129_3866918
* 3866918 (3854164) When the logged-on user is a nested domain user with administrative privileges, the user is not able to perform Storage Foundation for Windows (SFW) administrative tasks on the SFW server.


DETAILS OF INCIDENTS FIXED BY THE PATCH
---------------------------------------
This patch fixes the following incidents:

Patch ID: Patch_7_0_15303_129_3866918

* 3866918 (Tracking ID: 3854164)

SYMPTOM:
When the logged-on user is a nested domain user with administrative privileges, the user is not able to perform SFW administrative tasks on the SFW server.

DESCRIPTION:
When you connect to the SFW server through the logged-on user option as a nested domain user (with administrative rights on the server), you are able to connect to the VEA server but are unable to perform any SFW-related administrative operation on the server. This is due to a limitation in the existing Windows API for the nested domain user.

RESOLUTION:
This issue has been resolved by using the LDAP provider to fetch the user information from the active directory. The LDAP provider checks the nested user privileges and reports if the user has admin privileges.

FILE / VERSION:
vxvea3.dll / 3.4.951.0
OBGUI.jar / NA
ci.jar / NA
obCommon.jar / NA



INSTALLING THE PATCH
--------------------
This package contains self-extracting files that are specific to the processor architecture and operating system version. Choose the appropriate file for your computer's configuration. Download the appropriate hotfix executable to a temporary location on your system. 

You can install this hotfix using the GUI or from the command line. Instructions for both options are provided below.

To install the hotfix using the GUI
-----------------------------------
1. Double click the hotfix executable file to extract the contents to a default location on the cluster node.
The files are extracted to:
"%programfiles(x86)%\Common Files\Veritas Shared\WxRTPrivates"

The Hotfix Installer Wizard is automatically launched after the files are extracted.

2. Click "Next" on the Welcome screen. 
The 'Hotfix Installation Task' screen lists the tasks that are performed by the installer.

3. Click "Install Hotfix" to begin the hotfix installation. 
The status of each installation task is updated as it completes.

4. After the tasks are complete, click "Next" and then click "Finish" to complete the installation process.

5. If prompted to restart the server, do so.


To install the hotfix using the command line
--------------------------------------------
1. At the command prompt, run one of the following commands to extract the hotfix files to the default location:
C:\temp>  <Hotfix_BuildVersion_IncidentNumber_OS_Platform> .exe/x
or
C:\temp>  <Hotfix_BuildVersion_IncidentNumber_OS_Platform> .exe/extract

2. From the command prompt, navigate to the default location where the hotfix files are extracted.
The files are extracted to: 
"%programfiles(x86)%\Common Files\Veritas Shared\WxRTPrivates\<Hotfix_BuildVersion_IncidentNumber>  "

3. At the command prompt, run the following command to install the hotfix:
VxHF.exe /install:<Hotfix_BuildVersion_IncidentNumber> /silent

Here, <Hotfix_BuildVersion_IncidentNumber>  is the name of the hotfix file excluding the OS, platform, and .exe extension.

4. Follow the instructions displayed in the command prompt to complete the hotfix installation.

5. If prompted to restart the server, do so at this time.


REMOVING THE PATCH
------------------
Additional Notes
----------------
- To confirm the installation of a hotfix, run the following command:
vxhf.exe /list
On the system, vxhf.exe is located at:
"%programfiles(x86)%\Common Files\Veritas Shared\WxRTPrivates\<Hotfix_BuildVersion_IncidentNumber> "

The output of this command lists the hotfixes installed on a system.

- The hotfix installer (vxhf.exe) creates and stores logs at:
"%allusersprofile%\Application Data\Veritas\VxHF"

- For general information about the hotfix installer (vxhf.exe), please refer to the following technote:
http://www.veritas.com/docs/TECH73446

- To view a list of hotfixes already installed on a system, please refer to the steps mentioned in the following technote: 
http://www.veritas.com/docs/TECH73438

- For information on uninstalling a hotfix, please refer to the steps mentioned in the following technote: 
http://www.veritas.com/docs/TECH73443


SPECIAL INSTRUCTIONS
--------------------
Disclaimer
This fix is provided without warranty of any kind including the warranties of title or implied warranties of merchantability, fitness for a particular purpose and non-infringement. Veritas disclaims all liability relating to or arising out of this fix. It is recommended that the fix be evaluated in a test environment before implementing it in your production environment. When the fix is incorporated into a Storage Foundation for Windows maintenance release, the resulting Hotfix or Service Pack must be installed as soon as possible. Veritas Technical Services will notify you when the maintenance release (Hotfix or Service Pack) is available if you sign up for notifications from the Veritas support site https://www.veritas.com/support and/or 
from Veritas Services and Operations Readiness Tools (SORT) http://sort.veritas.com.


OTHERS
------
NONE