CA Privileged Identity Manager
Endpoint Platform Classification and SLA Guidelines
Last Updated: December 16, 2011
This document provides guidelines for platform support of CA Access Control.
CA strives to improve its software and services to meet its customers' needs in the best possible way. To effectively support the current computing environments and those that are expected in the future, we regularly evaluate our products to determine their strategic direction.
This document describes the different tier-based classification and SLA guidelines of CA Access Control Premium Edition. This platform support policy is derived from the CA Technologies Security Products Platform Support Policy (https://support.ca.com/phpdocs/7/common/securityproducts_SLA.pdf).
CA Access Control End-Point / CA Access Control Unix Authentication Broker End-Point
Tier Classification and SLA Guidelines
SLA GUIDELINES - TIER 1 PLATFORMS
- Port to new Tier 1 major OS releases within 4-6 months of the formal GA date of the OS release. CA Access Control will be supported on the 2 latest supported versions. Support of new platform releases may be initially provided in compatibility mode*
- Completion of quality assurance testing and validation of support for new service packs, and scheduled updates for Tier 1 OS releases within 1-2 months of the formal GA date of the service pack or scheduled update.
- The availability of intermediate OS updates or patches does not affect the level of support offered by CA for the underlying supported OS releases and service packs (as specified above). Intermediate OS patches released by the OS vendor for an OS version or service pack that is supported by CA Access Control are also supported.
The SLA guidelines above apply to the latest GA version of CA Access Control and only to the 2 Latest service packs of this release if more are available. The platforms supported with the GA-1 version of CA Access Control continue to be supported and updated for new OS service packs but the certification schedule may extend beyond the above SLA guidelines.
Support for new platforms or new major OS releases for the GA-1 version would generally not be provided and customers would be encouraged to upgrade to the latest AC version.
CA may provide Tier 1 platform support with respect to prior CA Access Control releases or as exceptions to the above policy, in its discretion and in response to specific customer requests.
CA's ability to provide Tier 1 platform support is dependent upon many variables, including the timing when the OS vendor elects to make new releases, service packs, patches and updates available. CA is not liable for any delay in meeting the above timetables.
As OS vendors drop standard support of prior operating system versions according to their products' lifecycle, platform support for CA Access Control will change accordingly. No Tier 1 platform support with respect to CA Access Control will be available after the date on which the vendor ceases standard support of its operating system. Customers who have requirements for such platform support beyond the vendor's drop support date should submit a request for such support through their CA representatives.
TIER 1 CLASSIFICATION TABLE - CA Access Control End-Point and CA UNAB End-Point
|Operating System ||Architecture |
|Solaris ||SPARC |
|Red Hat Enterprise Linux (RHEL) ||s390x |
|Red Hat Enterprise Linux (RHEL) ||X86 |
|Red Hat Enterprise Linux (RHEL) ||X64 |
|Novell SuSE Linux (SLES) ||S390x |
|Novell SuSE Linux (SLES) ||X86 |
|Novell SuSE Linux (SLES) ||X64 |
|HP-UX ||IA 64 |
|AIX ||Power |
|Windows Server ||X86 |
|Windows Server ||X64 |
SLA GUIDELINES - TIER 2
- Port to new Tier 2 major OS releases within 6-12 months of the formal GA date of the OS release. CA Access Control will be supported on the latest supported version only. Support of new platform releases may be initially provided in compatibility mode*
- Completion of quality assurance testing and validation of support for new service packs, and scheduled updates for Tier 2 OS releases will be provided on a case by case basis, as determined by CA in its discretion and in response to specific customer requests
TIER 2 CLASSIFICATION TABLE - CA ACCESS CONTROL End-Point and CA UNAB End-Point
|Operating System ||Architecture |
|Solaris ||X64 |
|Red Hat Enterprise Linux (RHEL) ||IA 64 |
|Novell SuSE Linux (SLES) ||IA 64 |
|HP-UX ||PA-RISC |
|Windows Server ||IA 64 |
|VMware ESX ||X86 |
|VMware ESX ||X64 |
|IBM VIO Server ||Power |
|RHEL, SuSE Linux ||S390 **(Please see note below) |
|Oracle Enterprise Linux Server ||X86,x64 |
(*) Compatibility mode refers to the operation of CA Access Control with the functionality common between the immediately prior and new OS versions, without supporting the new features added by the new version. For new features that were added in a new OS version that may require product architecture enhancements and further development, CA retains its discretion regarding such support and the support timeframes for new features, which may vary from the guidance stated here.
(**) RHEL, SuSE Linux - Support for S390 Architecture will only be provided upon specific customer escalation or request.
For a fully detailed list of CA Access Control end-point support, please visit the following link to CA Support online:
CA Access Control Server Components - Platform Classification and SLA Guidelines
CA Access Control Enterprise Management Server and related components supported platforms are provided under a single tier definition. The related components include:
- CA Access Control Enterprise Management
- CA Access Control End-Point Management
- CA Access Control Report Server and Portal
Port to new major OS releases within 4-6 months of the formal GA date of the OS release supporting the specified releases.
PLATFORM CLASSIFICATION - CA ACCESS CONTROL SERVER COMPONENTS
|Operating System ||Version ||Architecture |
|Windows 2003/ 2008 Server ||Enterprise / Standard Edition ||X86 |
|Solaris ||10 ||SPARC |
|Red Hat Enterprise Linux ||5.x ||X86, X64 |
For a complete and detailed list, please follow the link below:
CA Access Control Database Components
New database version support will be provided within 4-6 months of formal GA dates.
|Database ||Version ||Architecture |
|Oracle ||10g, 10g R2, 11g || |
|MS-SQL Server ||2005, 2008 ||32 Bit |
|MS-SQL Server ||2005, 2008 ||64 Bit |
CA Access Control - 3rd Party Components
SLAs for 3rd Party components such as SAP Business Objects are dependent on the vendor providing support. CA will make commercially reasonable efforts to comply with the server components platform support policy for 3rd party components pending support by the vendors.
CA Access Control PUPM Connectors - Tier Classification and SLA Guidelines
CA Access Control provides 2 types of connectors for PUPM namely:
- Integrated connectors - Which are direct PUPM connectors for Operating Systems and Databases
- CA Identity Manager Connectors - Which are based on CA Identity Manager framework / components (JCS)
CA Access Control PUPM connector supported platforms are provided under a single tier definition.
SLA GUIDELINES TIER 1 - Will be provided within 4-6 months of formal GA date of OS or database release
Other supported platforms are certified on new releases per customer demand. Please find the Identity Manager connectors platform support policy under the Identity Manager platform support policy page.
TIER 1 CLASSIFICATION TABLE - PUPM CONNECTORS
|Operating System / Application / Network Device ||Version |
|Windows 2003, 2008 Server ||X86, x64 |
|Active Directory ||2003 |
|Solaris SPARC ||9,10 |
|AIX ||5.3, 6.1 |
|HP-UX PA-RISC, IA 64 ||11.23, 11.31 |
|MS-SQL 2005, 2008 ||32 and 64 bit |
|Oracle ||10,11 |
|SuSE Linux ||9,10,11 |
|Red Hat Enterprise Linux (RHEL) ||3,4,5 |
PUPM CONNECTORS based on CA Identity Manager
|OS / Application |
|DB2 UDB |
|Top Secret |
|Novell Netware |
|CA Access Control |
For a detailed list of PUPM connectors with details on OS/release version and other information, please follow the link below:
The CA Access Control team regards supporting virtual environments on the hosting server and the virtual machine as strategic. CA Access Control is supported on the most common virtualization environments. Please find below the standard CA policy for supporting virtual environments: /us/product-content/recommended-reading/announcements/ca-support-statement-for-virtualization.html
The following link specifies the virtual platforms currently supported by CA Access Control: