Post upgrade
Cleanup tasks
Carry out the following tasks once system-wide access is restored.
Enable Bravura Security tasks
Enable Bravura Security tasks in the operating system task scheduler
Enable auto discovery on the primary node
Enable the PSUPDATE scheduled job on the primary node:
Log into Bravura Security Fabric as an administrator with the "Maintain servers" administrative privilege.
Click Maintenance > Scheduled jobs.
Select PSUPDATE and enable it.
For Bravura Security Fabric versions 12.1.5 and 12.2.0, run psupdate.exe -schedule .
Follow up tests
After running setup to upgrade to the latest version or patch to a new build, verify that the upgrade or patch was successful; for example:
If you patched to a new build, make note of the patch build number to ensure it has been updated to reflect the new patch number.
Verify that services are started.
Verify that replication is working, and all replication nodes are replicating and are functional.
Navigate the user interface. Check whether web interface customizations were applied. You may need to reapply the customizations and reload the skin files.
Follow an upgrade plan based on the configured capability of the old version.
Verify that the following are correctly configured:
Target systems configuration
Target systems administrator credentials
Target system groups
Password policies
User classes
Authentication/identification priority
User notifications
Authentication chains
Product administrators
User access rules
Managed system policies
Import rules
Custom plugins and exit traps
Verify email configuration.
Links in emails sent prior to upgrade may no longer work.In this case users will need to manually log into Bravura Security Fabric to view request details or perform actions.
Confirm that:
Managed passwords have have been upgraded properly.
Scheduled password resets are still occurring normally for both push and local workstation service mode managed systems.
Managed accounts belong to the correct policy.
Session monitoring managed system policy and self-service rules are cleared.
Review log files
Review log files from for the last three days including 12 hours of hours of usage from all three nodes to allow for health check of system operation
Additional steps to consider
New features may be included in the upgraded version of the product that has not been enabled during the upgrade process or may require additional configuration. If you require assistance, contact support@bravurasecurity.com .
Remove old installation files
Remove old installation files to avoid confusing with new upgrade/patch files. Bravura Security recommends keeping only the last two copies of installation files (previous install and current install).
Post upgrade notes
REST API authorization policies
If you upgraded to 12.6.0 before revision 36570, run the PolicyUpgrade stored procedure manually following upgrade to add REST API authorization policies.
Access to user profiles
By default, the "View profile information" privilege is granted to Access to user profiles rules - ALLREQUESTERS, API_REQUEST, and ALL_SELF_REQUEST. However, this privilege is not granted to rules created before upgrading.
Privileged access to systems
By default, permission for users to "Request check-out to managed group sets" are granted to Privileged access to systems groups - ALLREQUESTERS and ALLRECIPIENT. However, this permission is not granted to managed system policies created before upgrading.
Import rules
Managed account import rules created before the upgrade cannot be associated with local workstation service managed system policies. All newly created managed account import rules can be associated with local workstation service managed system policies.
Local workstation service
You must uninstall the Bravura Privilege Local Workstation Service (hipamlws) and re-install and re-register a 12.x version of the service.
Managed accounts
As of 10.x, managed accounts can only belong to a single policy. Run the Managed systems and accounts -import method report to verify if accounts are attached to multiple policies:
You will need to manually select which policy managed accounts should belong to.
If accounts still belong to more than one policy at upgrade, the following rules will be applied to them:
If an account belongs to only one policy, it will be left as a member of that policy.
If an account belongs to more than one policy, it will be removed from all policies and added to its managed system’s primary policy.
In other words, 1) if you have a managed account on multiple policies, regardless of whether it’s on the primary policy, it will be moved to the primary policy, and 2) if you have an account that belongs on a single policy, it will be left on that policy, regardless of whether it’s the primary policy.
Disclosure plugins
If upgrading from 9.x or older to 12.x, you must manually update the Remote Desktop access disclosure plugin. To do this, remove the legacy Remote Desktop disclosure plugin from existing managed system policies and replace it with the new one.
If you want to continue to use the legacy Remote Desktop disclosure plugin, you must update the following disclosure attributes:
’encryption’ is now a boolean attribute type. Delete the existing ’encryption’ disclosure attribute and replace it with the new attribute type. This value should be set to ’False’ by default.
’host’ should be updated to match that of the new Remote Desktop disclosure plugin. If there are managed systems that still follow the old format of ’\\<server>’, leave this value untouched.
’multimon’ and ’smartsizing’ attributes are set to ’False’; however the values will only take effect when the Update button is clicked.
Uninstall any versions of Firefox native browser extensions 11.1.x or older on the instance server and client workstations, and install the latest version, which is located in the \<instance>\addon\idarchive directory.
Guacamole
As of 12.x, previous versions of Guacamole will no longer work. You must upgrade Guacamole with the latest RPMs in the idmunix*.tar.gz
file located in \<instance>\addon\idmunix. As well, you have the option of installing Guacamole using Docker.
When Guacamole is upgraded, you will no longer need to configure an API user or modify the guacamole.properties file.
Database encryption
If upgrading from 9.x or older, you should run update_db_crypto on relevant tables. As of Bravura Security Fabric 9.0, the database encryption key was updated from using AES-128 to AES-256 encryption. This will affect answers to security questions and other information.
See Migration for more information.
Detection of attribute names conflict
If name conflicts between resource attributes and profile attributes are detected, post upgrade steps should contain this message: "Resource attribute conflict resolution". The post-upgrade report will contain this message about the resource attribute name changes: "Resource attribute <resourceAttrName> renamed to <resourceAttrName_RESATTR>."
Language packs
The upgrade process only upgrades the US English (en-us) language pack. If other language packs are installed before the upgrade, you must install the language packs again after the upgrade.
See Supporting multiple languages and locales for more information regarding installing language packs.
Browser caching
Using the same desktop browser that was used to log in to the instance before the upgrade and then logging in again after the upgrade is complete may sometimes not render correctly. For example, the user ID in the top right may have a dot where an icon should be, and you cannot click on the user name (it does nothing).
You must refresh and reload the browser to display it properly.
Logging Service (idmlogsvc
) configuration file
When upgrading Bravura Security Fabric , the idmlogsvc.cfg
configuration file will be retained from the previous version. A new configuration file named idmlogsvc.bak
will be created and will contain the configuration settings of idmlogsvc.cfg
for the newer version of Bravura Security Fabric .
This configuration file should be reviewed for any changes between idmlogsvc.cfg
(configuration settings from the previous version) and idmlogsvc.bak
(configuration settings for new version) after the upgrade is complete.