Revision as of 16:30, June 8, 2018 by Pmcknigh (talk | contribs) (Update with the copy of version: 8.5.1Draft)
Jump to: navigation, search

throttle-updates-interval

Section: system
Default Value: 0 (zero)
Valid Values: 0, 1–2147483647
Changes Take Effect: Immediately
Dependencies: serialize-write-transactions=true
Introduced: 8.5.101.20
Related Options: serialize-write-transactions deferred-requests-expiration

Enables transaction throttling and specifies, in milliseconds, the time interval used to throttle data update (transactional) requests. If a data update request is received before this time interval expires, the request is deferred until the interval expires. Any non-transactional requests received from the same client are also deferred and processed in FIFO (first-in, first-out) order after the deferred request is processed. A value of 0 (zero) disables this option.

Notes: When configuring this option, keep in mind that if actual load consistently exceeds the rate specified by this option for a significant time, deferred unprocessed requests will accumulate in the input queue and will be eventually cancelled as defined by the value of the deferred-requests-expiration option. To avoid this happening, consider adjusting the throttle-updates-interval option accordingly, to account for the expected actual load.

skip-annex-validation

Section: system
Default Value: 0 (zero)
Valid Values: 0 (zero), 1, 16
Changes Take Effect: Immediately
Introduced: 8.5.101.21

Specifies if Configuration Server validates the Annex of an object, checking for an empty or duplicate object section. By default, Configuration Server performs a full validation and rejects modifications that can potentially affect data integrity or cannot be displayed properly by Genesys Administrator.

Valid values are:
0 (zero, the default)—Full validation is performed, and changes are rejected if an empty section and/or a duplicate section are found.
1—Partial validation is performed, and changes are rejected if a duplicate section is found.
16—Disables validation completely.

Warning: Set this option to 16 only when requested by Customer Care.

serialize-write-transactions

Section: system
Default Value: false
Valid Values: true, false
Changes Take Effect: Immediately
Introduced: 8.5.101.20
Related Options: deferred-requests-expiration, proxy-load-max, proxy-load-timeout, throttle-updates-interval

Enables (true) or disables (false, default) the following functionality:

  • Transaction serialization
  • Transactions deferral at proxy/backup startup/data (re)load
  • Limiting of the number of proxies concurrently loading/reloading data (requires additional option proxy-load-max)
  • Throttling of data updates (requires an additional option throttle-updates-interval)

Transaction serialization is the mode of Configuration Server operation that prevents data change transactions from overlapping and potentially causing a loss of data integrity. It involves the deferral of data change requests so that each request can be processed completely, without impacting or being impacted by other requests.

Transaction serialization mode also defers processing of data change requests for the time when Configuration Server Proxies or backup instance of master Configuration Server are in progress of loading/reloading data from the master primary Configuration Server. At that time, Configuration Server Proxies cannot always correctly process notifications on the data change. These notifications cannot always be correctly applied to partially loaded and not yet fully reconciled dataset. They could be missed or incorrectly applied, resulting in outdated or corrupt data in the proxy's memory. Deferring data changes for the time of data reload prevents this from happening.

Note: This option must be enabled in order for the options proxy-load-max and throttle-updates-interval to take effect.

For a detailed description of this functionality, refer to "Transaction Serialization" section in Framework Deployment Guide.

proxy-load-timeout

Section: system
Default Value: 600
Valid Values: 0, 1–2147483647
Changes Take Effect: Immediately
Dependencies: serialize-write-transactions=true
Introduced: 8.5.101.20
Related Options: serialize-write-transactions proxy-load-max

For transaction serialization mode (see serialize-write-transactions option), specifies the time limit during which transactional requests are deferred to avoid interference with a data load by a single Configuration Server Proxy. If set to 0 (zero), there is no limit.

If a proxy server fails to complete its data load within the specified time interval since it was authorized, it is allowed to continue loading. However, transaction deferral mode is exited and deferred transactions are processed. If the proxy-load-max option is specified, expiration of this interval allows the next proxy server waiting in the queue to start loading its data.

Note: Ensure that this interval is sufficient for the proxies to complete data load, based on the size of the database and the bandwidth of the communication channel between the master Configuration Server and Configuration Server Proxies. Premature termination of the transaction deferral mode allows data change transactions to be processed while the proxy is still loading data. This can cause data inconsistencies in the proxy's data once it completes loading.

proxy-load-max

Section: system
Default Value: 0 (zero)
Valid Values: 0, 1–2147483647
Changes Take Effect: Immediately
Dependencies: serialize-write-transactions=true
Introduced: 8.5.101.20
Related Options: serialize-write-transactions proxy-load-timeout

Enables limiting the number of proxy servers concurrently loading and reloading data and specifies the maximum number of Configuration Server Proxies allowed to (re)load data in parallel. A value of 0 (zero, the default) indicates there is no limit on the number of Configuration Server Proxies. If more than the specified number of proxy servers attempt to reload their data concurrently, only requests from the maximum number of servers are processed; requests from the rest of the servers are deferred until other servers have finished loading their data. This enables the excess Configuration Server Proxies (those with deferred requests) to continue serving their clients with unchanged (original) data and to prevent too many proxy servers from simultaneously disabling their services to reload data and overloading master Configuration Server.

deferred-requests-expiration

Section: system
Default Value: 3600
Valid Values: 0, 1–2147483647
Changes Take Effect: Immediately
Dependencies: serialize-write-transactions=true
Introduced: 8.5.101.20
Related Options: serialize-write-transactions

For transaction serialization mode (see serialize-write-transactions option), enables expiration of regular clients' deferred requests and specifies the time interval (in seconds) for which deferred requests are kept for further processing. A value of 0 means that that request never expires. If a deferred request cannot be processed within this time interval, processing of the request is cancelled and an error response is sent to the client.

This value does not apply to the requests from Configuration Server proxies deferred upon data reload and internally generated requests.

Note: Genesys recommends that you not change the default value unless instructed to do so by your Genesys representative.

Enabling New Functionality

As a rule, newer versions of Framework components by default behave in the same way and rely on the same configuration as prior versions they are replacing. This allows you to use components as drop-in replacements and continue using the software in the same way that you are used to. In some cases, when you want to activate a particular new feature or behavior, you must add or change configuration options after you have installed a new release. A list of changes in configuration options is provided in New and Changed Configuration Options by Release.

Some versions may introduce changes that require you to take action before you can launch the new component after upgrading it in the existing environment. A list of mandatory configuration changes that has to be made when upgrading certain components is provided in Mandatory Changes in Configuration of Framework Components.

New and Changed Configuration Options by Release

The tables in this section document all configuration option changes in specific Framework server components from release 7.6 through 8.5, with the most recent changes listed first. The changes are listed by component.

Configuration option reference material is currently transitioning to the Genesys Documentation wiki. The tables on this page might contain option names with links to the new wiki format. For all other Framework options, refer to the Framework Configuration Options Reference Manual for detailed descriptions, with the following exceptions:

General Configuration Option Changes

The following table lists all changes in common configuration options (that is, those that are supported by all Genesys server applications), from release 7.6 through 8.5, with the most recent changes listed first.

All Genesys server applications support the unified set of log options (called common log options) in addition to application-specific log options. The common log options are configured for each application in the following sections: log, log-extended, log-filter, and log-filter-data.

All Genesys Server applications also support a set of common options for operations that are not related to logs.

Option Configuration Section Type of Change Changed in Release Additional Information
Changes in Common Options
compatible-output-priority log Removed 8.5
enable-thread log New 8.5
expire log Modified 8.5
message-format log Renamed 8.5 Formerly named message_format
no-memory-mapping log New 8.5
segment log Modified 8.5
snapshot log New 8.5
throttle-period log New 8.5
throttle-threshold log New 8.5
hide-tlib-sensitive-data log-filter New 8.5
sec-protocol security New 8.5
tls-mutual security New 8.5
autostart sml New 8.5
n/a dbserver Removed 8.5 Section removed
dml_retry dbserver Moved 8.5 Moved to Configuration Server
sec-protocol Transport Parameters New 8.5
enable-async-dns common Modified 8.1
cipher-list security New 8.1
tls-crl security New 8.1
tls-target-name-check security New 8.1
n/a security-authentication-rules New 8.1 New section
account-override-lockout security-authentication-rules New 8.1
last-expired-at security-authentication-rules New 8.1 Read-only
last-locked-at security-authentication-rules New 8.1 Read-only
no-change-password-at-first-login security-authentication-rules New 8.1
override-account-expiration security-authentication-rules New 8.1
heartbeat-period sml Modified 8.1
default-filter-type log-filter Modified 8.1
filtering log-filter New 8.1
<key-name> log-filter-data Modified 8.1
dml-retry dbserver New 8.1
enable-ipv6 common New 8.1
cipher-list Transport Parameters New 8.1
ip-version Transport Parameters New 8.1
expire log Modified 8.0
default-filter-type log-filter Modified 8.0
<key-name> log-filter-data Modified 8.0
n/a security New 8.0 New section
disable-rbac security New 8.0
heartbeat-period sml New 8.0
heartbeat-period-threadclass-<n> sml New 8.0
hangup-restart sml New 8.0
suspending-wait-timeout sml New 8.0
alarm log Moved 7.6 Moved from Solution Control Server.
x-conn-debug-open log New 7.6 Use only when requested by Genesys Customer Care.
x-conn-debug-select log New 7.6
x-conn-debug-timers log New 7.6
x-conn-debug-write log New 7.6
x-conn-debug-security log New 7.6
x-conn-debug-api log New 7.6
x-conn-debug-dns log New 7.6
x-conn-debug-all log New 7.6
n/a common New 7.6 New section
rebind-delay common New 7.6 Use only when requested by Genesys Customer Care.
enable-async-dns common New 7.6 Use only when requested by Genesys Customer Care.

Use only with T-Servers.

n/a extended-log New 7.6 New section
level-reassign-<eventID> extended-log New 7.6
level-reassign-disable extended-log New 7.6
address Transport Parameters New 7.6
backup-port Transport Parameters New 7.6
port Transport Parameters New 7.6

DB Server

The following table lists all configuration option changes in DB Server from release 7.6 through 8.1, with the most recent changes listed first.

Important
DB Server is not a part of Management Framework 8.5.
Option Configuration Section Type of Change Changed in Release Additional Information
Option Changes in DB Server
db-request-timeout dbserver New 8.0
dbprocess_name dbserver Modified 8.0
db2_name dbserver Modified 8.0
informix_name dbserver Modified 8.0
msql_name dbserver Modified 8.0
oracle_name dbserver Modified 8.0
postgre_name dbserver New 8.0
sybase_name dbserver Modified 8.0

Database Access Point

The following table lists all configuration option changes in Database Access Point from release 7.6 through 8.5, with the most recent changes listed first.

Option Configuration Section Type of Change Changed in Release Additional Information
Option Changes in Database Access Point
mssql-multisubnet default New 8.5.1 Set in Annex; for Log Database only
utf8-ucs2 dbclient New 8.1
db-request-timeout dbserver New 8.0

Configuration Server

The following table documents all configuration option changes in Configuration Server from release 7.6 through 8.5, with the most recent changes listed first. These options apply to Configuration Server operating in Master mode. Refer to Configuration Server Proxy for configuration option changes in Configuration Server 8.5 running in Proxy mode (also referred to as Configuration Server Proxy).

Important
In the following table, the Configuration Server section is referred to as confserv for changes in earlier releases.
Option Configuration Section Type of Change Changed in Release Additional Information
Option Changes in Configuration Server
mssql-multisubnet <Configuration Database section> New 8.5.101.22
deferred-requests-expiration system New 8.5
proxy-load-max system New 8.5
proxy-load-timeout system New 8.5
serialize-write-transactions system New 8.5
skip-annex-validation system New 8.5
throttle-updates-interval system New 8.5
cfglib-connect-tmout Configuration Server New 8.5 Replaces cfglib-conn-async-tmout
token-tolerance system New 8.5
token-ttl system New 8.5
dbserv-conn-async-tmout Configuration Server New 8.5
langid Configuration Database Modified 8.5 Added language codes
enforce-internal-auth authentication New 8.5
allow-empty-password Configuration Server Modified 8.5 Corrected when Changes Take Effect
allow-external-empty-password Configuration Server Modified 8.5 Corrected when Changes Take Effect
cfglib-conn-async-tmout Configuration Server New/Removed 8.5 Replaced by cfglib-connnect-tmout
client-connect-timeout Configuration Server New 8.5
client-response-timeout Configuration Server Modified 8.5
dbthread Configuration Server New 8.5
decryption-key Configuration Server New 8.5
encryption Configuration Server Modified 8.5
force-offline Configuration Server New 8.5
force-connect-reload Configuration Server Moved 8.5 Moved to system section
langid Configuration Server New 8.5
license Configuration Server Removed 8.5
max-client-output-queue-size Configuration Server New 8.5
max-output-queue-size Configuration Server New 8.5
packet-size Configuration Server New 8.5
primary-startup-tmout Configuration Server New 8.5
upgrade-mode Configuration Server New 8.5
addp Configuration Database Removed 8.5
addp-timeout Configuration Database Removed 8.5
addp-trace Configuration Database Removed 8.5
dbengine Configuration Database Modified 8.5
dbname Configuration Database Added new Valid Value 8.5
dbserver Configuration Database Added new Valid Value 8.5
dml-retry Configuration Database Moved 8.5 Moved from Common Configuration Options
history-log-guid Configuration Database Removed 8.5
history-log-version Configuration Database Removed 8.5
host Configuration Database Removed 8.5 Used only if dbthread=false and with DB Server 8.1; refer to Framework 8.1 documentation.
port Configuration Database Removed 8.5
reconnect-timeout Configuration Database Removed 8.5
server Configuration Database Removed 8.5
ignore-case-username gauth-kerberos New 8.5
n/a hca Removed 8.5 Section removed
schema hca Removed 8.5
x-dblib-debug log New 8.5 Use only when requested by Genesys Customer Care.
x-dblib-sql log New 8.5
objbrief-api-permission-check security New 8.5
n/a soap Removed 8.5 Section removed
client-lifespan soap Removed 8.5
debug soap Removed 8.5
port soap Removed 8.5 Used only if dbthread=false and with DB Server 8.1; refer to Framework 8.1 documentation.
n/a system New 8.5 New section
force-connect-reload system Moved 8.5 Moved from Configuration Server section.
postgre-standard-conforming-strings system Removed 8.5
prevent-mediatype-attr-removal system New 8.5
token-authentication-mode system New 8.5
token-preambula system New }8.5
token-uuid system New 8.5
skip-environment-enum-transfer system New 8.5
write-former-value history-log New 8.5
user Application Parameters New 8.5
reconnect-timeout Configuration Database Modified 8.1
allow-mixed-encoding confserv New 8.1
enable-pre-812-security confserv New 8.1
force-md5 confserv New 8.1
multi-languages confserv New 8.1
password-change confserv New 8.1
packet-size confserv New 8.1
peer-switchover-tmout confserv New 8.1
chase-referrals gauth_ldap[_n] New 8.1
objbrief-api-permission-check security New 8.1 Added to version 8.1.300.27
port soap Modified 8.1
all history-log-section Modified 8.0 Does not apply to master Configuration Server.

Not documented in previous versions of this document.

failsafe-store-processing history-log-section Modified 8.0
protocol confserv/<application> New 8.0
addp-timeout confserv/<application> New 8.0 Same name as existing options, but placed in different configuration section.
addp-remote-timeout confserv/<application> New 8.0
addp-trace confserv/<application> New 8.0
fix_cs_version_7x confserv New 8.0
allow-external-empty-password confserv New 8.0
last-login confserv New 8.0
last-login-synchronize confserv New 8.0
objects-cache confserv New 8.0
disable-vag-calculation <application> New 7.6
all history-log Modified 7.6
history-log-file-name c confserv Obsolete 7.6 Replaced by options in history-log section.
history-log-expiration confserv Obsolete 7.6
history-log-client-expiration confserv Obsolete 7.6
history-log-max-records confserv Obsolete 7.6
history-log-active confserv Obsolete 7.6
no-default-access security New 7.6
all history-log New 7.6
expiration history-log New 7.6
client-expiration history-log New 7.6
max-records history-log New 7.6
active history-log New 7.6
failsafe-store-processing history-log New 7.6
backlog Application Parameter New 7.6 Use only when requested by Genesys Customer Care.

Configuration Server Proxy

The following table documents all configuration option changes in Configuration Server running in Proxy mode (also referred to as Configuration Server Proxy) mode from release 7.6 through 8.5, with the most recent changes listed first.

Option Configuration Section Type of Change Changed in Release Additional Information
Option Changes in Configuration Server Proxy
cfglib-connect-tmout csproxy New 8.5
token-tolerance system New 8.5 New section
token-ttl system New 8.5 New section
enforce-internal-auth authentication New 8.5
allow-empty-password csproxy New 8.5
allow-external-empty-password csproxy New 8.5
management-port csproxy New 8.5
proxy-cluster-name csproxy New 8.5
client-response-timeout csproxy Modified 8.5
max-client-output-queue-size csproxy New 8.5
max-output-queue-size csproxy New 8.5
packet-size csproxy New 8.5
proxy-cluster-name csproxy New 8.5
ignore-case-username gauth-kerberos New 8.5
active history-log Removed 8.5
all history-log Removed 8.5
expiration history-log Removed 8.5
failsafe-store-processing history-log Removed 8.5
max-records history-log Removed 8.5
n/a soap Removed 8.5 Section removed
client-lifespan soap Removed 8.5
debug soap Removed 8.5
max-records soap Removed 8.5
user Application Parameters New 8.5
n/a authentication New 8.1 New section
library authentication New 8.1
enforce-external-auth authentication New 8.1
allow-mixed-encoding csproxy New 8.1
client-response-timeout csproxy New 8.1
packet-size csproxy New 8.1
n/a gauth_ldap New 8.1 New section
ldap_url gauth_ldap New 8.1
verbose gauth_ldap New 8.1
retry_attempts gauth_ldap New 8.1
retry_interval gauth_ldap New 8.1
proxy-writable csproxy Modified 8.0
last-login csproxy New 8.0
last-login-synchronize csproxy New 8.0
objects-cache csproxy New 8.0
proxy-writable csproxy New 7.6
expiration history-log Modified 7.6
client-expiration history-log Modified 7.6
max-records history-log Modified 7.6
failsafe-store-processing history-log New 7.6
all history-log Modified 7.6
backlog Application Parameter New 7.6 Use only when requested by Genesys Customer Care.

Configuration Manager

The following table documents all configuration option changes in Configuration Manager from release 7.6 through 8.1, with the most recent changes listed first.

This table does not include configuration options for Genesys Administrator, which might have been set in the Configuration Manager Application object with which Genesys Administrator is bound, or associated, during its deployment.

Important
Configuration Manager was not updated in release 8.5.
Option Configuration Section Type of Change Changed in Release Additional Information
Option Changes in Configuration Manager
inactivity-timeout security New 7.6

Local Control Agent

Local Control Agents supports common log options which allows you to precisely configure log output for LCA. Because you do not configure an Application object for LCA, if you need to change the default log option settings, modify the configuration file called lca.cfg and specify new values for appropriate options. The file must be located in the same directory as the Local Control Agent executable file.

The following table documents all other configuration option changes in Local Control Agent from release 7.6 through 8.5, with the most recent changes listed first. For more information about the LCA configuration file and for related instructions, see the Framework Deployment Guide.

Option Configuration Section Type of Change Changed in Release Additional Information
Option Changes in Local Control Agent
wmiquery-timeout general New 8.5
lookup_clienthost general New 8.1
upgrade security Correction 8.1 Originally documented as Host option

Genesys Deployment Agent

Starting in release 8.0, the Genesys Deployment Agent is deployed with LCA. The Genesys Deployment Agent is used by of Genesys Administrator Extension to deploy Genesys Applications and Solutions on a Host. To enable this functionality, you must identify what port on the Host that the Genesys Deployment Agent will use to communicate with Genesys Administrator Extension. You provide this information in the Host’s Annex, in the new section rdm, specifying the port number with the configuration option port.

Genesys Deployment Agent supports common log options which allows you to precisely configure log output for Genesys Deployment Agent. Because you do not configure an Application object for Genesys Deployment Agent, if you need to change the default log option settings, create a configuration file called gda.cfg (or rename and modify the gda.cfg.sample file that is located in the installation folder) and specify new values for appropriate options. The file must be located in the same directory as the Genesys Deployment Agent executable file (gda.exe).

Important
In release 8.5.1, Genesys Deployment Agent is not installed with Local Control Agent by default.

The following table lists all other configuration option changes in Genesys Deployment Agent from release 8.0 through 8.5, with the most recent changes listed first. For more information about the Genesys Deployment Agent, refer to the Framework Deployment Guide.

Option Configuration Section Type of Change Changed in Release Additional Information
Option Changes in Genesys Deployment Agent
n/a security New 8.1 New section
transport security New 8.1
n/a web New 8.0 New section
rootdir web New 8.0

Message Server

The following table lists configuration option changes in Message Server from release 7.6 through 8.5, with the most recent changes listed first.

Option Configuration Section Type of Change Changed in Release Additional Information
Option Changes in Message Server
dbthread messages New 8.5
x-dblib-debug log New 8.5
signature MessageServer New 8.0
request-queue-size messages Removed 8.0

Solution Control Server

The following table lists configuration option changes in Solution Control Server from release 7.6 through 8.5, with the most recent changes listed first.

Option Configuration Section Type of Change Changed in Release Additional Information
Option Changes in Solution Control Server
cfglib-connect-tmout general New 8.5
default-audit-username general New 8.5
disable-switchover general New 8.5
distributed_sync_timeout general New 8.5
hostinfo-load-timeout general New 8.5
max_switchover_time general Removed 8.5
ha_service_unavail_primary general New 8.1
lookup_clienthost general New 8.1
max-req-per-loop general New 8.1
alarms-port Transport Parameter New 8.1
backup-alarms-port Transport Parameter New 8.1
alarm log Moved 7.6 Moved to common configuration options.

Solution Control Interface

The following table lists configuration option changes in Solution Control Interface from release 7.6 through 8.0, with the most recent changes listed first.

Important
Solution Control Interface was not updated after release 8.0.
Option Configuration Section Type of Change Changed in Release Additional Information
Option Changes in Solution Control Interface
n/a host-status-display New 8.0 New section
critical-color host-status-display New 8.0
major-color host-status-display New 8.0
other-color host-status-display New 8.0
inactivity-timeout security New 7.6

SNMP Master Agent

The following table lists configuration option changes in Genesys SNMP Master Agent from release 7.6 through 8.1, and in SNMP Master Agent in 8.5, with the most recent changes listed first.

Note: Starting in release 8.5, you can use a 3rd-party Net-SNMP Master Agent instead of Genesys SNMP Master Agent, re-using the same configuration object. Refer to the Framework Deployment Guide for more information about Net-SNMP and Genesys SNMP Master Agent. See the instructions in Migrating to Net-SNMP to convert a Genesys SNMP Master Agent Application object to use with Net-SNMP.

Option Configuration Section Type of Change Changed in Release Additional Information
Option Changes in SNMP Master Agent
netsnmp-enable snmp New 8.5
n/a snmp-v3-auth New 8.1 New section
password snmp-v3-auth New 8.1
n/a snmp-v3-priv New 8.1 New section
password snmp-v3-priv New 8.1
v3priv_protocol snmp Modified 8.0

Tenant

The following table lists Tenant- and User-level configuration option changes from release 7.6 through 8.5, with the most recent changes listed first.

Option Configuration Section Type of Change Changed in Release Additional Information
Tenant and User Option Changes
account-override-lockout security-authentication-rules Modified 8.5 User-level option

Corrected description of when set to false

force-password-reset security-authentication-rules New 8.1
max-account-sessions security-authentication-rules New 8.1
password-expiration security-authentication-rules New 8.1
password-expiration-notify security-authentication-rules New 8.1
password-no-repeats security-authentication-rules New 8.1
password-req-punctuation security-authentication-rules New 8.1
tenant-override-section security-authentication-rules New 8.1
password-req-number security-authentication-rules New 8.0 Not documented in previous releases of this document.
password-req-mixed-case security-authentication-rules New 8.0
password-req-alpha security-authentication-rules New 8.0
account-lockout-threshold security-authentication-rules New 8.0
account-lockout-duration security-authentication-rules New 8.0
account-lockout-attempts-period security-authentication-rules New 8.0
password-min-length security-authentication-rules New 8.0

Host

The following table lists Host-level configuration option changes from release 7.6 through 8.5, with the most recent changes listed first.

Option Configuration Section Type of Change Changed in Release Additional Information
Host-Level Option Changes
addp-trace addp New 8.5 Not documented in previous releases of this document.
sec-protocol security New 8.5
n/a ntp-service-control New 8.1 New section
signature ntp-service-control New 8.1
cipher-list security New 8.1
lca-upgrade security New 8.1
n/a transport New 8.1 New section
ip-version transport New 8.1
n/a rdm New 8.0 New section
port rdm New 8.0 Not documented in previous releases of this document.
n/a security New 8.0 New section
gda-tls security New 8.0 Not documented in previous releases of this document.
n/a addp New 7.6 New section
addp-remote-timeout addp New 7.6 Not documented in previous releases of this document.
addp-timeout addp New 7.6

Mandatory Changes in Configuration of Framework Components

When upgrading Configuration Server to release 8.5, you must modify the existing configuration file to include the [<name of conf server app>]dbthread=false option to continue using your existing DB Server. Alternatively, consider installing and configuring DBMS client software on the same host where the Configuration Server instance resides (to make it available to Configuration Server) and set connection parameters in the configuration file to access the DBMS from that host (see the Framework Deployment Guide for details). In this case, you no longer need a separate DB Server for Configuration Server to access the database.

When updating the Configuration Database schema version to 8.5, and newer, in an environment where Configuration Server 8.5 is already being used (against a database schema of a prior version), you have to specify the [<name of config server app>]langid option. Set this option to 1033 when upgrading an English environment. See Localized Environments for details on how to set the option for other languages.

When upgrading Configuration Server from release 8.0 or older in environment where Configuration Server Proxies are being deployed, make sure you set the force-md5 option to true on the master Configuration Server until you have completed upgrading all Configuration Server Proxies in your environment to the latest version.

Mandatory Changes in Secure Protocol Configuration

When you upgrade your Genesys applications that are configured to communicate securely using Genesys Security Pack on UNIX (or Linux), versions 8.5.1 or later, or you upgrade your Windows operating system to the latest version or Service pack, make sure you are using certificates that are signed using SHA1 or higher across all server applications with which new or updated components have to communicate. If you have previously generated MD5 signed certificates using tools provided with Genesys Security Pack, re-issue them as soon as possible using Security Pack 8.5.1 or later. MD5 certificates are no longer accepted by the latest secure protocol implemenations.

Comments or questions about this documentation? Contact us for support!