Changed features and feature capabilities in version 10.2.2

A list of features changed since the previous release

The following features have changed or have been introduced or removed since the previous release:
FIPS compliance temporarily not supported
FIPS compliance is not supported in the current product version. This is because OpenSSL 3.0 libraries do not provide a FIPS-compliant validation algorithm for P12 certificates. Development is in progress with the aim of supporting FIPS in upcoming releases.
A new optional parameter named enablefips is available in the serverinst and twsinst scripts to check FIPS settings before you install or upgrade. The default value in a fresh installation is false.
If you are upgrading from an environment where FIPS compliance is supported, you should disable FIPS configuration. When upgrading, a check is performed on your settings to ensure FIPS is not enabled. If it is enabled, the upgrade stops and an error message is displayed. To resume the upgrade, set the enablefips parameter to false when running the serverinst and twsinst scripts. The upgrade proceeds and the configuration files are updated accordingly. For more information, see Q: My environment is FIPS compliant. What happens if I upgrade to version 10.2.2?.
SSL FIPS enabled option removed
The SSL FIPS enabled option is no longer present in the localopts and ita.ini files and has been replaced with the new SSL FIPS compliance option.
New SSL configuration options available in localopts file
Two new options (ssl_config file and ssl_cipher_suites) are now available for configuring SSL on dynamic agents and fault-tolerant agents. Use the new options to specify a configuration file for OpenSSL and a list of encryption algorithms for TLS v 1.3. For more information, see Setting local options.