SlideShare a Scribd company logo
1 of 20
What I Did 
Over Summer Vacation 
(In Hursley) 
T.Rob Wyatt 
Managing Partner, IoPT Consulting 
704-443-TROB (8762) 
t.rob@ioptconsulting.com 
https://ioptconsulting.com 
Capitalware's MQ Technical Conference v2.0.1.4
End of WebSphere MQ v8.0 EAP 
 Early Access Program closed out shortly after v8.0 was released. 
 Workshop held at Hursley to review the final feature set in the release. 
 Covered much territory including security, performance, compatibility, 
Capitalware's MQ Technical Conference v2.0.1.4 
upgrades, documentation, and more. 
This session is my summary of the highlights of that session. 
Some of the results and findings may impact how you use the product 
and/or your plans for migration. 
Look for a download on the MQTC site and/or my site at 
https://t-rob.net/links
You Are (Not) Here 
Capitalware's MQ Technical Conference v2.0.1.4
Knowledge Center: Love it or hate it? 
 All of the MQ documentation for current versions has been ported to 
Capitalware's MQ Technical Conference v2.0.1.4 
the Knowledge Center format. 
 I had the opportunity to have an in-depth meeting with the manager of 
the tech writers who manage the KC. 
 Note that the people who *program* the KC are a different group. 
 Some of the things you will learn here REQUIRE your participation to 
get fixed. These generally fall into the categories of content defects, 
indexing and tagging. 
 Some we hope will be resolved on their own. These generally fall into 
the category of mechanical and software defects. 
idcrf@hursley.ibm.com 
(Because sometimes the built-in reporting fails.)
Capitalware's MQ Technical Conference v2.0.1.4 
KC Love: Sharing links 
The URL for any page is always 
available from the address bar.
Capitalware's MQ Technical Conference v2.0.1.4 
KC Love: Sharing links
Capitalware's MQ Technical Conference v2.0.1.4 
KC Hate: Sharing links 
 No more right-click on a TOC link to get the URL. 
 All TOC links are Javascript 
 Right click to new tab always opens to Infocenter home page. 
 You must render the page to get its URL from the TOC. 
 URLs embedded in page content are (all?) hard-coded URLs 
 These actually do work with right-click or open to new tab. 
 The value in the status bar lets you know what kind of URL it is. 
 Javascript? Either blank status or void(). 
 Entire URL? Copy away!
KC Ambivalence: Sharing links 
 The slug at the bottom of each content page has been unreliable. 
Capitalware's MQ Technical Conference v2.0.1.4 
 Missing 
 Wrong URL 
 Mostly with content migrated from Infocenters. 
 Manually inserted by page author. 
 Candidate to be generated dynamically so always correct. 
 Now that the URL is in the address bar, not as critical. 
 Appears to have been fixed. 
If you find this, please report it!
KC Love: Search enhancements 
 Now possible to search across multiple collections. 
Capitalware's MQ Technical Conference v2.0.1.4 
 Narrow search by platform, keyword. 
 Search results find sections within a page. 
 Large result sets are paginated. (OK, this is more of a “like”.) 
 Keyword type-ahead
KC Hate: Search enhancements 
 Filtering entirely dependent on manual authoring to add tags, 
Capitalware's MQ Technical Conference v2.0.1.4 
keywords. 
 Total number of search results not displayed. 
 No sort of search results. 
 Search results return duplicate pages. 
 Search results return same page under different titles. 
 Pages often do not sync to TOC. Sync button removed. Damn. 
 Search results do not provide enough context. 
 Multiple pages with same heading, no way to tell which section they are in. 
Running into these issues? Please send in corrections!
Security Love: ID & Password 
 Now possible to natively authenticate an ID & Password on connect. 
 ID & Password encrypted if client & server are BOTH >= v8.0. 
 Encryption is session-based, not replayable. 
 Does not require TLS channels to keep credentials confidential. 
Capitalware's MQ Technical Conference v2.0.1.4
Security Hate: ID & Pwd may be plaintext 
 The only case in which the ID & password are encrypted is when both 
client & server are at v8.0. 
 Older version of client does not encrypt the password. 
 Possible to set WMQ to not connect if password in the clear. 
 Need to use TLS channels if any client < v8.0. 
Capitalware's MQ Technical Conference v2.0.1.4 
 Potentially use server-only authentication. 
 Make sure to use TLS/SHA ciphers. 
 Alternatively, use MQAUSX from Capitalware 
 (i.e. the folks running this conference.) 
 Unsolicited, unpaid endorsement.
Security Love: SSLCERTI 
 SSLCERTI is now available in CHLAUTH rules. 
 Formerly only available to exits. 
 Filters on the Distinguished name of the issuer of the cert. 
 CA-signed certs the issuer is the CA who signed the cert. 
 Self-signed certs are their own issuer. (IssuerDN=SubjectDN) 
 Ensures that cert originates with the intended CA or entity. 
 Needed when there are multiple root certs in the KDB, especially when 
one or more of them is from a business partner or internal CA. 
 Prior to SSLCERTI, the Distinguished Name could only be guaranteed 
to be globally unique if the KDB contained only one trusted cert. 
 With SSLCERTI, the combination of Subject DN within Issuer DN 
creates a globally unique name. 
 Assuming, of course, that all trusted certs in the KDB are from reliable sources. 
 Does not address problem of admins accepting non-authoritative signer certs. 
Capitalware's MQ Technical Conference v2.0.1.4
Capitalware's MQ Technical Conference v2.0.1.4 
New features – Love! 
 64-Bit on all platforms. 
 Windows 7 or better. 
 AMS & MFT now integrated on z/OS & iSeries. 
 Delete ACL record based on Windows SID 
 No more orphaned ACLs when an ID or group is deleted. 
 Topic hosting in a cluster 
 Control routing of publications in a cluster. 
 Design topology to prevent netstorm of publications in a large cluster. 
 All participating nodes must be v8 or higher. 
 Detects hierarchy & proxy subscription loops.
Capitalware's MQ Technical Conference v2.0.1.4 
New features - Hate 
 Possible to configure OAM to use user ID rather than group. 
 Requires QM.ini stanza edit, or crtmqm switch. 
 Once set, no longer gets primary group during setmqaut. 
 Use DNS names instead of IP addresses in CHLAUTH records. 
 DNS subject to DOS, spoofing, poisoning attacks. 
 Even legitimate DNS may resolve to different addresses, FQDNs, etc. 
 DNS lookup latency – which can be very long. 
 The paradox of using unsecure (in most cases) DNS to make a security control 
easier, thereby weakening the achieved security to less than without the control.
JMS Enhancements - Love 
Capitalware's MQ Technical Conference v2.0.1.4 
 WMQ Now supports JMS 2.0! 
 Very highly requested features: 
 Delayed message delivery. 
 Shared subscriptions. Messages round-robin across multiple consumers sharing 
a single subscription. 
 Prior to JMS 2.0, lots of code and configuration contortions were 
required to achieve these behaviors. 
 Increased skill requirement. 
 Lots of moving parts. 
 Brittle. 
 As of JMS 2.0, these are now native behaviors. 
 Slightly increased skill requirement but… 
 Few moving parts. 
 Reliable. Fully supported functionality of the product.
JMS Enhancements - Hate 
THIS PAGE 
INTENTIONALLY 
LEFT BLANK 
Capitalware's MQ Technical Conference v2.0.1.4
Capitalware's MQ Technical Conference v2.0.1.4 
Old features - Hate 
 The setmqipw command remains unchanged. 
 Subject to replay attack. 
 Limited, normally 1-time use during unattended Windows install. 
 And how often does that happen, really. Generally either zero or a whole lot.
Per-channel certificates - Love 
 Allows the QMgr to present different personal certificates depending 
Capitalware's MQ Technical Conference v2.0.1.4 
on which inbound channel is used. 
 For example, internal channels present an internally signed certificate 
whilst external channels present a cert signed by a commercial CA. 
 Uses the TLS Server Name Indication extension. 
 Which means the cipher used *must* be a TLS variant. SSL ciphers don’t work. 
 Improved error messages. Since the channel name is passed with the 
connection request the QMgr can display it rather than ???????. 
 Requires both ends of the connection to be at MQ v8.0 or above. 
 The channel name is sent in the clear. 
 Previously, channel names not exposed on the wire. 
 A case of balancing pros/cons of two security controls. 
 Ability to use multiple personal certs offsets exposure of channel name.
Capitalware's MQ Technical Conference v2.0.1.4 
Questions & Answers

More Related Content

What's hot

Whats new in IBM MQ; V9 LTS, V9.0.1 CD and V9.0.2 CD
Whats new in IBM MQ; V9 LTS, V9.0.1 CD and V9.0.2 CDWhats new in IBM MQ; V9 LTS, V9.0.1 CD and V9.0.2 CD
Whats new in IBM MQ; V9 LTS, V9.0.1 CD and V9.0.2 CDDavid Ware
 
HHM 6887 Managing Your Scalable Applications in an MQ Hybrid Cloud World
HHM 6887 Managing Your Scalable Applications in an MQ Hybrid Cloud WorldHHM 6887 Managing Your Scalable Applications in an MQ Hybrid Cloud World
HHM 6887 Managing Your Scalable Applications in an MQ Hybrid Cloud Worldmatthew1001
 
IBM MQ: Managing Workloads, Scaling and Availability with MQ Clusters
IBM MQ: Managing Workloads, Scaling and Availability with MQ ClustersIBM MQ: Managing Workloads, Scaling and Availability with MQ Clusters
IBM MQ: Managing Workloads, Scaling and Availability with MQ ClustersDavid Ware
 
Continuous intrusion: Why CI tools are an attacker’s best friends
Continuous intrusion: Why CI tools are an attacker’s best friendsContinuous intrusion: Why CI tools are an attacker’s best friends
Continuous intrusion: Why CI tools are an attacker’s best friendsNikhil Mittal
 
DCHQ Cloud Application Platform | Linux Containers | Docker PaaS
DCHQ Cloud Application Platform | Linux Containers | Docker PaaSDCHQ Cloud Application Platform | Linux Containers | Docker PaaS
DCHQ Cloud Application Platform | Linux Containers | Docker PaaSdchq
 
BlueHat 2014 - The Attacker's View of Windows Authentication and Post Exploit...
BlueHat 2014 - The Attacker's View of Windows Authentication and Post Exploit...BlueHat 2014 - The Attacker's View of Windows Authentication and Post Exploit...
BlueHat 2014 - The Attacker's View of Windows Authentication and Post Exploit...Benjamin Delpy
 
New Tools and Interfaces for Managing IBM MQ
New Tools and Interfaces for Managing IBM MQNew Tools and Interfaces for Managing IBM MQ
New Tools and Interfaces for Managing IBM MQMatt Leming
 
Web services, WCF services and Multi Threading with Windows Forms
Web services, WCF services and Multi Threading with Windows FormsWeb services, WCF services and Multi Threading with Windows Forms
Web services, WCF services and Multi Threading with Windows FormsPeter Gfader
 
MQ Security Overview
MQ Security OverviewMQ Security Overview
MQ Security OverviewMarkTaylorIBM
 
What's New in IBM MQ - Version 8
What's New in IBM MQ - Version 8What's New in IBM MQ - Version 8
What's New in IBM MQ - Version 8MarkTaylorIBM
 
Connecting Applications Everywhere with ActiveMQ
Connecting Applications Everywhere with ActiveMQConnecting Applications Everywhere with ActiveMQ
Connecting Applications Everywhere with ActiveMQRob Davies
 
IBM WebSphere MQ: Using Publish/Subscribe in an MQ Network
IBM WebSphere MQ: Using Publish/Subscribe in an MQ NetworkIBM WebSphere MQ: Using Publish/Subscribe in an MQ Network
IBM WebSphere MQ: Using Publish/Subscribe in an MQ NetworkDavid Ware
 
What's new in IBM MQ Messaging
What's new in IBM MQ MessagingWhat's new in IBM MQ Messaging
What's new in IBM MQ MessagingMarkTaylorIBM
 
Deep Dive: Amazon Virtual Private Cloud
Deep Dive: Amazon Virtual Private CloudDeep Dive: Amazon Virtual Private Cloud
Deep Dive: Amazon Virtual Private CloudAmazon Web Services
 
Security Patterns for Microservice Architectures - SpringOne 2020
Security Patterns for Microservice Architectures - SpringOne 2020Security Patterns for Microservice Architectures - SpringOne 2020
Security Patterns for Microservice Architectures - SpringOne 2020Matt Raible
 

What's hot (20)

Whats new in IBM MQ; V9 LTS, V9.0.1 CD and V9.0.2 CD
Whats new in IBM MQ; V9 LTS, V9.0.1 CD and V9.0.2 CDWhats new in IBM MQ; V9 LTS, V9.0.1 CD and V9.0.2 CD
Whats new in IBM MQ; V9 LTS, V9.0.1 CD and V9.0.2 CD
 
HHM 6887 Managing Your Scalable Applications in an MQ Hybrid Cloud World
HHM 6887 Managing Your Scalable Applications in an MQ Hybrid Cloud WorldHHM 6887 Managing Your Scalable Applications in an MQ Hybrid Cloud World
HHM 6887 Managing Your Scalable Applications in an MQ Hybrid Cloud World
 
IBM MQ: Managing Workloads, Scaling and Availability with MQ Clusters
IBM MQ: Managing Workloads, Scaling and Availability with MQ ClustersIBM MQ: Managing Workloads, Scaling and Availability with MQ Clusters
IBM MQ: Managing Workloads, Scaling and Availability with MQ Clusters
 
Continuous intrusion: Why CI tools are an attacker’s best friends
Continuous intrusion: Why CI tools are an attacker’s best friendsContinuous intrusion: Why CI tools are an attacker’s best friends
Continuous intrusion: Why CI tools are an attacker’s best friends
 
DCHQ Cloud Application Platform | Linux Containers | Docker PaaS
DCHQ Cloud Application Platform | Linux Containers | Docker PaaSDCHQ Cloud Application Platform | Linux Containers | Docker PaaS
DCHQ Cloud Application Platform | Linux Containers | Docker PaaS
 
BlueHat 2014 - The Attacker's View of Windows Authentication and Post Exploit...
BlueHat 2014 - The Attacker's View of Windows Authentication and Post Exploit...BlueHat 2014 - The Attacker's View of Windows Authentication and Post Exploit...
BlueHat 2014 - The Attacker's View of Windows Authentication and Post Exploit...
 
New Tools and Interfaces for Managing IBM MQ
New Tools and Interfaces for Managing IBM MQNew Tools and Interfaces for Managing IBM MQ
New Tools and Interfaces for Managing IBM MQ
 
WCF
WCFWCF
WCF
 
Web services, WCF services and Multi Threading with Windows Forms
Web services, WCF services and Multi Threading with Windows FormsWeb services, WCF services and Multi Threading with Windows Forms
Web services, WCF services and Multi Threading with Windows Forms
 
MQ Security Overview
MQ Security OverviewMQ Security Overview
MQ Security Overview
 
What's New in IBM MQ - Version 8
What's New in IBM MQ - Version 8What's New in IBM MQ - Version 8
What's New in IBM MQ - Version 8
 
WCF Fundamentals
WCF Fundamentals WCF Fundamentals
WCF Fundamentals
 
IBM MQ vs Apache ActiveMQ
IBM MQ vs Apache ActiveMQIBM MQ vs Apache ActiveMQ
IBM MQ vs Apache ActiveMQ
 
Connecting Applications Everywhere with ActiveMQ
Connecting Applications Everywhere with ActiveMQConnecting Applications Everywhere with ActiveMQ
Connecting Applications Everywhere with ActiveMQ
 
IBM WebSphere MQ: Using Publish/Subscribe in an MQ Network
IBM WebSphere MQ: Using Publish/Subscribe in an MQ NetworkIBM WebSphere MQ: Using Publish/Subscribe in an MQ Network
IBM WebSphere MQ: Using Publish/Subscribe in an MQ Network
 
Windows Communication Foundation (WCF) Best Practices
Windows Communication Foundation (WCF) Best PracticesWindows Communication Foundation (WCF) Best Practices
Windows Communication Foundation (WCF) Best Practices
 
What's new in IBM MQ Messaging
What's new in IBM MQ MessagingWhat's new in IBM MQ Messaging
What's new in IBM MQ Messaging
 
MQ V8004 Summary
MQ V8004 SummaryMQ V8004 Summary
MQ V8004 Summary
 
Deep Dive: Amazon Virtual Private Cloud
Deep Dive: Amazon Virtual Private CloudDeep Dive: Amazon Virtual Private Cloud
Deep Dive: Amazon Virtual Private Cloud
 
Security Patterns for Microservice Architectures - SpringOne 2020
Security Patterns for Microservice Architectures - SpringOne 2020Security Patterns for Microservice Architectures - SpringOne 2020
Security Patterns for Microservice Architectures - SpringOne 2020
 

Similar to What I did on my summer vacation (in Hursley)

Kaleido Platform Overview and Full-stack Blockchain Services
Kaleido Platform Overview and Full-stack Blockchain ServicesKaleido Platform Overview and Full-stack Blockchain Services
Kaleido Platform Overview and Full-stack Blockchain ServicesPeter Broadhurst
 
Creating Secure Applications
Creating Secure Applications Creating Secure Applications
Creating Secure Applications guest879f38
 
Set your Data in Motion with Confluent & Apache Kafka Tech Talk Series LME
Set your Data in Motion with Confluent & Apache Kafka Tech Talk Series LMESet your Data in Motion with Confluent & Apache Kafka Tech Talk Series LME
Set your Data in Motion with Confluent & Apache Kafka Tech Talk Series LMEconfluent
 
Automatically Renew Certificated In Your Kubernetes Cluster
Automatically Renew Certificated In Your Kubernetes ClusterAutomatically Renew Certificated In Your Kubernetes Cluster
Automatically Renew Certificated In Your Kubernetes ClusterHungWei Chiu
 
"Running CF in a Shared Hosting Environment"
"Running CF in a Shared Hosting Environment""Running CF in a Shared Hosting Environment"
"Running CF in a Shared Hosting Environment"webhostingguy
 
Testing for infra code using test-kitchen,docker,chef
Testing for infra code using  test-kitchen,docker,chefTesting for infra code using  test-kitchen,docker,chef
Testing for infra code using test-kitchen,docker,chefkamalikamj
 
Blockcerts: The Open Standard for Blockchain Credentials
Blockcerts: The Open Standard for Blockchain CredentialsBlockcerts: The Open Standard for Blockchain Credentials
Blockcerts: The Open Standard for Blockchain CredentialsSSIMeetup
 
Securing Network Access with Open Source solutions
Securing Network Access with Open Source solutionsSecuring Network Access with Open Source solutions
Securing Network Access with Open Source solutionsNick Owen
 
IBM Cloud Pak for Integration 2020.2.1 installation
IBM Cloud Pak for Integration 2020.2.1 installation IBM Cloud Pak for Integration 2020.2.1 installation
IBM Cloud Pak for Integration 2020.2.1 installation khawkwf
 
Q&A with Confluent Professional Services: Confluent Service Mesh
Q&A with Confluent Professional Services: Confluent Service MeshQ&A with Confluent Professional Services: Confluent Service Mesh
Q&A with Confluent Professional Services: Confluent Service Meshconfluent
 
Cloudformation & VPC, EC2, RDS
Cloudformation & VPC, EC2, RDSCloudformation & VPC, EC2, RDS
Cloudformation & VPC, EC2, RDSCan Abacıgil
 
MuleSoft Meetup Vancouver 5th Virtual Event
MuleSoft Meetup Vancouver 5th Virtual EventMuleSoft Meetup Vancouver 5th Virtual Event
MuleSoft Meetup Vancouver 5th Virtual EventVikalp Bhalia
 
Learn to Add an SSL Certificate Boost Your Site's Security.pdf
Learn to Add an SSL Certificate Boost Your Site's Security.pdfLearn to Add an SSL Certificate Boost Your Site's Security.pdf
Learn to Add an SSL Certificate Boost Your Site's Security.pdfReliqusConsulting
 
[Cluj] Turn SSL ON
[Cluj] Turn SSL ON[Cluj] Turn SSL ON
[Cluj] Turn SSL ONOWASP EEE
 
Toronto Virtual Meetup #7 - Anypoint VPC, VPN and DLB Architecture
Toronto Virtual Meetup #7 - Anypoint VPC, VPN and DLB ArchitectureToronto Virtual Meetup #7 - Anypoint VPC, VPN and DLB Architecture
Toronto Virtual Meetup #7 - Anypoint VPC, VPN and DLB ArchitectureAlexandra N. Martinez
 

Similar to What I did on my summer vacation (in Hursley) (20)

Kaleido Platform Overview and Full-stack Blockchain Services
Kaleido Platform Overview and Full-stack Blockchain ServicesKaleido Platform Overview and Full-stack Blockchain Services
Kaleido Platform Overview and Full-stack Blockchain Services
 
sveltekit-en.pdf
sveltekit-en.pdfsveltekit-en.pdf
sveltekit-en.pdf
 
Creating Secure Applications
Creating Secure Applications Creating Secure Applications
Creating Secure Applications
 
Set your Data in Motion with Confluent & Apache Kafka Tech Talk Series LME
Set your Data in Motion with Confluent & Apache Kafka Tech Talk Series LMESet your Data in Motion with Confluent & Apache Kafka Tech Talk Series LME
Set your Data in Motion with Confluent & Apache Kafka Tech Talk Series LME
 
Automatically Renew Certificated In Your Kubernetes Cluster
Automatically Renew Certificated In Your Kubernetes ClusterAutomatically Renew Certificated In Your Kubernetes Cluster
Automatically Renew Certificated In Your Kubernetes Cluster
 
"Running CF in a Shared Hosting Environment"
"Running CF in a Shared Hosting Environment""Running CF in a Shared Hosting Environment"
"Running CF in a Shared Hosting Environment"
 
Windows azure overview for SharePoint Pros
Windows azure overview for SharePoint Pros Windows azure overview for SharePoint Pros
Windows azure overview for SharePoint Pros
 
Testing for infra code using test-kitchen,docker,chef
Testing for infra code using  test-kitchen,docker,chefTesting for infra code using  test-kitchen,docker,chef
Testing for infra code using test-kitchen,docker,chef
 
Blockcerts: The Open Standard for Blockchain Credentials
Blockcerts: The Open Standard for Blockchain CredentialsBlockcerts: The Open Standard for Blockchain Credentials
Blockcerts: The Open Standard for Blockchain Credentials
 
ESXpert strategies VMware vSphere
ESXpert strategies VMware vSphereESXpert strategies VMware vSphere
ESXpert strategies VMware vSphere
 
Securing Network Access with Open Source solutions
Securing Network Access with Open Source solutionsSecuring Network Access with Open Source solutions
Securing Network Access with Open Source solutions
 
IBM Cloud Pak for Integration 2020.2.1 installation
IBM Cloud Pak for Integration 2020.2.1 installation IBM Cloud Pak for Integration 2020.2.1 installation
IBM Cloud Pak for Integration 2020.2.1 installation
 
Q&A with Confluent Professional Services: Confluent Service Mesh
Q&A with Confluent Professional Services: Confluent Service MeshQ&A with Confluent Professional Services: Confluent Service Mesh
Q&A with Confluent Professional Services: Confluent Service Mesh
 
Cloudformation & VPC, EC2, RDS
Cloudformation & VPC, EC2, RDSCloudformation & VPC, EC2, RDS
Cloudformation & VPC, EC2, RDS
 
MuleSoft Meetup Vancouver 5th Virtual Event
MuleSoft Meetup Vancouver 5th Virtual EventMuleSoft Meetup Vancouver 5th Virtual Event
MuleSoft Meetup Vancouver 5th Virtual Event
 
Learn to Add an SSL Certificate Boost Your Site's Security.pdf
Learn to Add an SSL Certificate Boost Your Site's Security.pdfLearn to Add an SSL Certificate Boost Your Site's Security.pdf
Learn to Add an SSL Certificate Boost Your Site's Security.pdf
 
Developing on AWS
Developing on AWSDeveloping on AWS
Developing on AWS
 
1205 bhat pdf-ssl
1205 bhat pdf-ssl1205 bhat pdf-ssl
1205 bhat pdf-ssl
 
[Cluj] Turn SSL ON
[Cluj] Turn SSL ON[Cluj] Turn SSL ON
[Cluj] Turn SSL ON
 
Toronto Virtual Meetup #7 - Anypoint VPC, VPN and DLB Architecture
Toronto Virtual Meetup #7 - Anypoint VPC, VPN and DLB ArchitectureToronto Virtual Meetup #7 - Anypoint VPC, VPN and DLB Architecture
Toronto Virtual Meetup #7 - Anypoint VPC, VPN and DLB Architecture
 

Recently uploaded

From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 

Recently uploaded (20)

From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 

What I did on my summer vacation (in Hursley)

  • 1. What I Did Over Summer Vacation (In Hursley) T.Rob Wyatt Managing Partner, IoPT Consulting 704-443-TROB (8762) t.rob@ioptconsulting.com https://ioptconsulting.com Capitalware's MQ Technical Conference v2.0.1.4
  • 2. End of WebSphere MQ v8.0 EAP  Early Access Program closed out shortly after v8.0 was released.  Workshop held at Hursley to review the final feature set in the release.  Covered much territory including security, performance, compatibility, Capitalware's MQ Technical Conference v2.0.1.4 upgrades, documentation, and more. This session is my summary of the highlights of that session. Some of the results and findings may impact how you use the product and/or your plans for migration. Look for a download on the MQTC site and/or my site at https://t-rob.net/links
  • 3. You Are (Not) Here Capitalware's MQ Technical Conference v2.0.1.4
  • 4. Knowledge Center: Love it or hate it?  All of the MQ documentation for current versions has been ported to Capitalware's MQ Technical Conference v2.0.1.4 the Knowledge Center format.  I had the opportunity to have an in-depth meeting with the manager of the tech writers who manage the KC.  Note that the people who *program* the KC are a different group.  Some of the things you will learn here REQUIRE your participation to get fixed. These generally fall into the categories of content defects, indexing and tagging.  Some we hope will be resolved on their own. These generally fall into the category of mechanical and software defects. idcrf@hursley.ibm.com (Because sometimes the built-in reporting fails.)
  • 5. Capitalware's MQ Technical Conference v2.0.1.4 KC Love: Sharing links The URL for any page is always available from the address bar.
  • 6. Capitalware's MQ Technical Conference v2.0.1.4 KC Love: Sharing links
  • 7. Capitalware's MQ Technical Conference v2.0.1.4 KC Hate: Sharing links  No more right-click on a TOC link to get the URL.  All TOC links are Javascript  Right click to new tab always opens to Infocenter home page.  You must render the page to get its URL from the TOC.  URLs embedded in page content are (all?) hard-coded URLs  These actually do work with right-click or open to new tab.  The value in the status bar lets you know what kind of URL it is.  Javascript? Either blank status or void().  Entire URL? Copy away!
  • 8. KC Ambivalence: Sharing links  The slug at the bottom of each content page has been unreliable. Capitalware's MQ Technical Conference v2.0.1.4  Missing  Wrong URL  Mostly with content migrated from Infocenters.  Manually inserted by page author.  Candidate to be generated dynamically so always correct.  Now that the URL is in the address bar, not as critical.  Appears to have been fixed. If you find this, please report it!
  • 9. KC Love: Search enhancements  Now possible to search across multiple collections. Capitalware's MQ Technical Conference v2.0.1.4  Narrow search by platform, keyword.  Search results find sections within a page.  Large result sets are paginated. (OK, this is more of a “like”.)  Keyword type-ahead
  • 10. KC Hate: Search enhancements  Filtering entirely dependent on manual authoring to add tags, Capitalware's MQ Technical Conference v2.0.1.4 keywords.  Total number of search results not displayed.  No sort of search results.  Search results return duplicate pages.  Search results return same page under different titles.  Pages often do not sync to TOC. Sync button removed. Damn.  Search results do not provide enough context.  Multiple pages with same heading, no way to tell which section they are in. Running into these issues? Please send in corrections!
  • 11. Security Love: ID & Password  Now possible to natively authenticate an ID & Password on connect.  ID & Password encrypted if client & server are BOTH >= v8.0.  Encryption is session-based, not replayable.  Does not require TLS channels to keep credentials confidential. Capitalware's MQ Technical Conference v2.0.1.4
  • 12. Security Hate: ID & Pwd may be plaintext  The only case in which the ID & password are encrypted is when both client & server are at v8.0.  Older version of client does not encrypt the password.  Possible to set WMQ to not connect if password in the clear.  Need to use TLS channels if any client < v8.0. Capitalware's MQ Technical Conference v2.0.1.4  Potentially use server-only authentication.  Make sure to use TLS/SHA ciphers.  Alternatively, use MQAUSX from Capitalware  (i.e. the folks running this conference.)  Unsolicited, unpaid endorsement.
  • 13. Security Love: SSLCERTI  SSLCERTI is now available in CHLAUTH rules.  Formerly only available to exits.  Filters on the Distinguished name of the issuer of the cert.  CA-signed certs the issuer is the CA who signed the cert.  Self-signed certs are their own issuer. (IssuerDN=SubjectDN)  Ensures that cert originates with the intended CA or entity.  Needed when there are multiple root certs in the KDB, especially when one or more of them is from a business partner or internal CA.  Prior to SSLCERTI, the Distinguished Name could only be guaranteed to be globally unique if the KDB contained only one trusted cert.  With SSLCERTI, the combination of Subject DN within Issuer DN creates a globally unique name.  Assuming, of course, that all trusted certs in the KDB are from reliable sources.  Does not address problem of admins accepting non-authoritative signer certs. Capitalware's MQ Technical Conference v2.0.1.4
  • 14. Capitalware's MQ Technical Conference v2.0.1.4 New features – Love!  64-Bit on all platforms.  Windows 7 or better.  AMS & MFT now integrated on z/OS & iSeries.  Delete ACL record based on Windows SID  No more orphaned ACLs when an ID or group is deleted.  Topic hosting in a cluster  Control routing of publications in a cluster.  Design topology to prevent netstorm of publications in a large cluster.  All participating nodes must be v8 or higher.  Detects hierarchy & proxy subscription loops.
  • 15. Capitalware's MQ Technical Conference v2.0.1.4 New features - Hate  Possible to configure OAM to use user ID rather than group.  Requires QM.ini stanza edit, or crtmqm switch.  Once set, no longer gets primary group during setmqaut.  Use DNS names instead of IP addresses in CHLAUTH records.  DNS subject to DOS, spoofing, poisoning attacks.  Even legitimate DNS may resolve to different addresses, FQDNs, etc.  DNS lookup latency – which can be very long.  The paradox of using unsecure (in most cases) DNS to make a security control easier, thereby weakening the achieved security to less than without the control.
  • 16. JMS Enhancements - Love Capitalware's MQ Technical Conference v2.0.1.4  WMQ Now supports JMS 2.0!  Very highly requested features:  Delayed message delivery.  Shared subscriptions. Messages round-robin across multiple consumers sharing a single subscription.  Prior to JMS 2.0, lots of code and configuration contortions were required to achieve these behaviors.  Increased skill requirement.  Lots of moving parts.  Brittle.  As of JMS 2.0, these are now native behaviors.  Slightly increased skill requirement but…  Few moving parts.  Reliable. Fully supported functionality of the product.
  • 17. JMS Enhancements - Hate THIS PAGE INTENTIONALLY LEFT BLANK Capitalware's MQ Technical Conference v2.0.1.4
  • 18. Capitalware's MQ Technical Conference v2.0.1.4 Old features - Hate  The setmqipw command remains unchanged.  Subject to replay attack.  Limited, normally 1-time use during unattended Windows install.  And how often does that happen, really. Generally either zero or a whole lot.
  • 19. Per-channel certificates - Love  Allows the QMgr to present different personal certificates depending Capitalware's MQ Technical Conference v2.0.1.4 on which inbound channel is used.  For example, internal channels present an internally signed certificate whilst external channels present a cert signed by a commercial CA.  Uses the TLS Server Name Indication extension.  Which means the cipher used *must* be a TLS variant. SSL ciphers don’t work.  Improved error messages. Since the channel name is passed with the connection request the QMgr can display it rather than ???????.  Requires both ends of the connection to be at MQ v8.0 or above.  The channel name is sent in the clear.  Previously, channel names not exposed on the wire.  A case of balancing pros/cons of two security controls.  Ability to use multiple personal certs offsets exposure of channel name.
  • 20. Capitalware's MQ Technical Conference v2.0.1.4 Questions & Answers