TIBCO Enterprise Administrator (TEA) 2.4.0 Hotfix 01 is now available.
book
Article ID: KB0101268
calendar_today
Updated On:
Products
Versions
TIBCO Enterprise Administrator (TEA)
2.4.0
Description
The customer will be able to download the Hotfix from the TIBCO Support Customer Portal Web UI using their username and password for the TIBCO Support Web page.Once logged on they can find the Hotfix under the Download Menu :
AvailableDownloads/TEA/2.4.0/hotfix-01
For instructions on "How do TIBCO customers access Hot Fixes or Engineering Builds or customer-specific files" ., you can refer to Published Article 000022290 : https://support.tibco.com/s/article/hotfix
Please contact TIBCO Support if you have any problems finding or downloading this hotfix.
Listed below is a summary of updates included. Refer to the associated readme document for any additional information.
================================================================================
Closed Issues in 2.4.0 HF-001 (This Release)
TEA-3532
TIBCO Enterprise Administrator server did not load more than 1000-1100 objects
returned from Agent code.
In the tea.conf file, set the tea.http.client.maxRequestsQueuedPerDestination
property to control the number of maximum requests queued per destination.
This property takes an Integer value as input and controls HTTP client's maximum
request per destination. The default value is 1024.
TEA-3533
TIBCO Enterprise Administrator did not enforce Origin and Referer header values.
TEA-3534
TIBCO Enterprise Administrator sign-in screen had a dummy password field which
let the browser to inject passwords from history.
TEA-3555
On configuring TIBCO Enterprise Administrator SSL properties with multi-level
certificates, the following error occurred:
"KeyStores with multiple certificates are not supported"
TEA-3556
Hotfixes could not be installed while running TIBCO Enterprise Administrator
in a Docker container. Use the docker folder under
{TIBCO_HOME}/tea/2.4/hotfix to get new changes.
TEA-3561
You can now set HTTP Strict-Transport-Security Header to avoid any security
vulnerabilities by adding tea.security.enable-http-strict-transport-support-policy
property in the tea.conf file. This property can be set to 'true' or 'false'.
By default, this property is set to 'false'.
Set it to true if you are running on HTTPS and wish to enable Strict-Transport-Security
Header. Once set to true, you cannot switch back to HTTP from HTTPS.
More details at https://en.wikipedia.org/wiki/HTTP_Strict_Transport_Security.
TEA-3562
Imported LDAP groups were not displayed on the TIBCO Enterprise Administrator GUI
if the group had non-existing members.
================================================================================
Environment
Operating System: All
Issue/Introduction
TIBCO Enterprise Administrator (TEA) 2.4.0 Hotfix 01 is now available.
Attachments
TIBCO Enterprise Administrator (TEA) 2.4.0 Hotfix 01 is now available.get_app