ZStack Cloud 4.5.0

On October 21, 2022, ZStack Cloud officially released its latest version, ZStack Cloud 4.5.0, covering a number of important features described in detail below.

Overview of new features in ZStack Cloud 4.5.0

  1. ZStack Cloud Supports Single Sign On (SSO) Protocol
    • More 3rd-party authentication types are supported in Enterprise Management, including OIDC, OAuth2, and CAS.
    • Sub-Account Setting begins to support 3rd-party authentication.
  2. Enhancement of Cryptography Security Compliance
    • Provides 3rd-party cryptographic service and alarms.
  3. Enhancement of V2V Migration Service
    • Data volumes can be attached to V2V conversion hosts to store cached data.
  4. Optimization of IPsec
    • Adds more parameters and changes some original parameters on the Create IPsec Tunnel page.
    • Supports manual IPsec reconnection and automatic recovery.
    • Optimizes the IPsec status monitoring.
    • Improves the user experience of the IPsec upgrading.
    • Allows flexible IPsec configuration modifications.
  5. DRS Supports an Auto Mode.
  6. VM VNC Consoles Support Text Pasting.
  7. Enhancement of VM Storage Migration
    • Allows entire VM hot migration across SharedBlock and Ceph primary storage.
    • Change Host and Primary Storage supports autoconvergence.
  8. Optimization of Ceph Storage Pool
    • Adds a column Virtual Capacity Allocation Rate to the Storage Pool tab page.
    • Adds more alarm metrics for Ceph storage pools and improves some original alarm metrics.
    • Allows to specify a Ceph storage pool for the Ceph storage pool alarm.
    • Optimizes the Alarm Resource tab page on the details page of an alarm on Ceph storage pools.
  9. Optimization of VM Instance HA Setting (Adding a Global Setting Effective on All the VMs on the Cloud)
  10. Other Features and Improvements

ZStack Cloud Supports Single Sign On (SSO) Protocol

From 4.5.0 version, ZStack Cloud begins to support standard Single Sing On (SSO) protocol. You can access 3rd-party authentication systems through Enterprise Management and Sub-Account Setting, allowing 3rd-party users to single-sign on the Cloud via the authentication system and perform actions on the cloud resources.

More 3rd-party authentication types are supported in Enterprise Management, including OIDC, OAuth2, and CAS

Enterprise Management has supported AD and LDAP 3rd-party authentication protocols in the earlier versions. From ZStack Cloud 4.5.0, more authentication protocols can be used in Enterprise Management, including OIDC, OAuth2, and CAS. After adding a 3rd-party authentication server and configuring mapping rules, you can synchronize the 3rd-party user information to the Cloud and generate password-free login URLs for 3rd-party users to log in to the Cloud without passwords.

Figure 1. Add an OAuth2 authentication server


Sub-Account Setting begins to support 3rd-party authentication

ZStack Cloud 4.5.0 allows you to configure 3rd-Party authentication in Sub-Account Setting (OIDC protocol only). After adding a 3rd-party authentication server and configuring mapping rules, you can synchronize the 3rd-party user information to the Cloud and generate password-free login URLs for 3rd-party users to log in to the Cloud without password.
Figure 2. Add an OIDC authentication server



Enhancement of Cryptography Security Compliance

ZStack Cloud 4.5.0 provides 3rd-party cryptographic service and alarms.

ZStack Cloud 4.5.0 and later versions provide 3rd-party cryptographic service through the Cryptography Security Compliance feature. You can add a 3rd-party cryptographic service and enable the platform cryptography security compliance to get higher cryptography capabilities. 3rd-party cryptographic services can integrate with HSMs from different vendors, shielding the underlying hardware differences and reducing your hardware dependency.
Figure 1. Add 3rd-Party cryptographic service


Meanwhile, ZStack Cloud 4.5.0 begins to provide a default event alarm, 3rd-Party Cryptographic Service Error, to monitor the health states of 3rd-party cryptography services in real time, helping O&M personnel make response in time to protect the platform resources.

Figure 2. 3-rd-Party cryptographic service error default alarm



Enhancement of V2V Migration Service

In the earlier ZStack Cloud versions, the VM systems and data are cached on the local disks of hosts during V2V migration by default.

ZStack Cloud 4.5.0 and later versions allow you to attach data volumes to conversion hosts to store cached data. You can flexibly choose local disks or data volumes to cache the migrated data according to your business requirements. You can set the cache location on 3 pages, including the Add V2V Conversion Host page, the V2V Conversion Host page, and details page of the conversion host.

Figure 1. Add V2V conversion host page


Figure 2. V2V conversion host page


Figure 3. Details page of conversion host









Archives

Download Document Archives

Download

Already filled the basic info?Click here.

Enter at least 2 characters.
Invalid mobile number.
Enter at least 4 characters.
Invalid email address.
Wrong code. Try again. Send Code Resend Code (60s)

An email with a verification code will be sent to you. Make sure the address you provided is valid and correct.

同意 不同意

I have read and concur with the Site TermsPrivacy PolicyRules and Conventions on User Management of ZStack Cloud

Download

Not filled the basic info yet? Click here.

Invalid email address or mobile number.
同意 不同意

I have read and concur with the Site TermsPrivacy PolicyRules and Conventions on User Management of ZStack Cloud

Email Us

contact@zstack.io
ZStack Training and Certification
Enter at least 2 characters.
Invalid mobile number.
Enter at least 4 characters.
Invalid email address.
Wrong code. Try again. Send Code Resend Code (60s)

同意 不同意

I have read and concur with the Site TermsPrivacy PolicyRules and Conventions on User Management of ZStack Cloud

Email Us

contact@zstack.io
Request Trial
Enter at least 2 characters.
Invalid mobile number.
Enter at least 4 characters.
Invalid email address.
Wrong code. Try again. Send Code Resend Code (60s)

同意 不同意

I have read and concur with the Site TermsPrivacy PolicyRules and Conventions on User Management of ZStack Cloud

Email Us

contact@zstack.io

The download link is sent to your email address.

If you don't see it, check your spam folder, subscription folder, or AD folder. After receiving the email, click the URL to download the documentation.

The download link is sent to your email address.

If you don't see it, check your spam folder, subscription folder, or AD folder.
Or click on the URL below. (For Internet Explorer, right-click the URL and save it.)

Thank you for using ZStack products and services.

Submit successfully.

We'll connect soon.

Thank you for using ZStack products and services.