Release Notes for Oracle Health Insurance Authorizations Release 3.22.1.0.0

This document contains the release notes for Oracle Health Insurance Authorizations Release 3.22.1.0.0.

Version compatibility: Oracle Health Insurance Authorizations Release 3.22.1.x is only compatible with other Oracle Health Insurance applications release version 3.22.1.x unless explicitly stated otherwise.
OHI applications expose the technical ID (created by sequence generator) in HTTP API and IP. This might be changed to an alternate technical ID (the data type might not be an integer) in a future release. Hence, it is advised to follow the generated HATEOAS links instead of hard-coding/bookmarking the IDs in the external integrations.
In accordance with the OHI error correction policy (Document 1494031.1 on My Oracle Support), error correction support will be provided for this release and the previous two releases.

Enhancements

ID Summary Description Included in Patch

AUT-2077

New User Provisioning Features

This enhancement

  • Introduces a new auditing table User Role History

  • Makes it possible to remove a user even after the user has logged in

  • Introduces a new access restriction type 'User Credentials Acl Type(USRCRD)' for accessing user credentials

  • Updates the generic HTTP API and provisioning integration point to provide access to the new auditing information

NXT-20655

Invalidate and re-populate non-entity cache

The application keeps non-entity caches for extensibility configuration. In some scenarios it is possible for the cached content and the database to be out of sync. This situation can be resolved by restarting the server.

This enhancement introduces new web service that provides an alternative to restarting the server. Calling this web service clears the non-entity cache.

NXT-21416

Use Vault as alternative secrets store with WebLogic deployments

Next to Fusion Middleware / WebLogic Oracle Platform Security Services (OPSS), OHI applications also support HashiCorp Vault as alternative secrets store. See the Installation Guide for details.

3.21.3.0.0

NXT-22299

RestClient Connection Pool

This enhancement introduces a REST client connection pool. Any application invoking REST calls now consume the connections from a shared connection pool, instead of creating a new connection every time. The parameters for using connection pool, e.g. Number of connections, etc, are configurable.

NXT-22428

Provide support in the installer to set insurable entity type

This enhancement introduces the ability to create insurable entity type of type Person. This is an optional feature for a fresh installation of the application. The options in the configuration file for the user to input the required values are:

  • Code - Inserted code will be in the uppercase

  • Singular display name - Required field for insurable entity type table.

  • Plural display name - Required field for insurable entity type table.

  • Usage name - The usage name must be composed of letters, numbers, and the underscore _, and must begin with a letter.

The default values for the type and resource name are:

  • Type - PERSON

  • Resource name - persons

NXT-22658

Overview of External End-Points

This enhancement introduces a new integration point that generates an overview of all defined end-points to which the application sends messages.

NXT-22730

Increase Dynamic Field Length

This enhancement introduces the ability to update the Field on a Flex Code Field Usage. The new Field must have the same datatype and the length value cannot be smaller than the previous Field. For numbers, the number of decimals cannot be smaller than the previous Field.

NXT-23006

The TaskProcessingResource exposes the current AQ queue depth

This allows customers to monitor the backlog of work stored in the queue.

NXT-23199

Update Dynamic Record Definitions

This enhancement introduces the ability to add required fields to dynamic record definitions and flex code definition that are already in use.

Changing a field from optional to required will require the user to set a value for that field the very next time when that either the record or flex code is updated, or the extended entity itself is updated.

In the scenario that the user adds a new required field to a dynamic record that is linked to configuration, the user must ensure that both source and target environment are aligned in their dynamic record configuration before using the configuration migration tool to migrate the actual dynamic records.

NXT-23455

Generic API Patch Operation

This enhancement extends the existing PATCH operation in the generic API so that resources can be called by their functional key (CODE), rather than their technical ID. This eliminates the need for a query before patching.

NXT-23648

Application Owner Schema Change

The privilege SELECT ON SYS.V_$PARAMETER is no longer required in the application and is removed from the installer. This change impacts only fresh installations.

NXT-24203

New Integration Point to Retrieve Configuration Migration Sets

This enhancement introduces a new integration point that retrieves the list of available configuration migration sets from a specific source environment. This service enables the UI page that shows inbound data sets to include configuration migration data sets on other environments.

NXT-24452

Extensibility: Additional Fields on Provider Identifier

This enhancement extends the number of supported single-value non-time-valid dynamic fields on the Provider Identifier entity to:

  • 20 Char fields

  • 5 Number fields

  • 20 Date fields

  • 50 Flex fields

  • 5 Provider fields

NXT-24489

JSON Re-Indexing Package

This enhancement introduces the package OHI_REFERENCE_SHEET_LINES_INDEX_MAINTENANCE_PKG, that creates an oracle text index OHI_REF_SHEET_LINE_IDX1 on OHI_REFERENCE_SHEET_LINES table in Oracle 19c format with Sync frequency option. This package needs to be executed in the Post-upgrade stage.

NXT-24611

Light Deployment (without ADF, with Vault)

This enhancement introduces an alternative, light deployment EAR file, in addition to the standard EAR. This new light EAR file deploys on Weblogic slim middleware and is placed under the lightApplication directory of the release zip. This deployment do not use Oracle Platform Security Services (OPSS) and does not support ADF pages.

POL-7230

Dynamic Logic Test Integration Point

This enhancement introduces a new integration point that enables dynamic logic unit tests within the application, without having to invoke the entire core process to trigger an invocation of the logic.

POL-9190

Immediate Primary Date Format Changes

This enhancement introduces the ability to change the primary date format on the default country without having to restart the server to effectuate the change.

POL-9643

IETF RFC2882 Email Format Support

This enhancement enables the use of email addresses according to the IETF RFC2882 standard in Relations and Providers

POL-9775

Enhance Flexcode LOV template to show "additional" fields other than value and descriptor

With this enhancement, it will be possible to show additional flex code fields in addition to the value and descriptor in the JET UI.

Upgrade Steps for Installation

To perform the upgrade, perform the following steps:

  1. Perform any pre-upgrade steps.

  2. Stop all the managed nodes running the .existing version of the application.

  3. Perform any pre-undeploy steps.

  4. Undeploy the existing version of the application.

  5. Back up the database.

  6. Perform any post-undeploy steps.

  7. Unpack the release bundle into a directory that we refer to as OHI_ROOT from now on.

  8. Change Installation Configuration: In <OHI_ROOT>/util/install, make a copy of ohi_install.cfg.template and name it ohi_install.cfg.

  9. Edit ohi_install.cfg to contain your specific database connection data and other configuration settings. The settings are explained in the file itself.

  10. Make sure NO connections are present to the database using the OHI_xxx_USER account (where xxx is the abbreviation of the application)

  11. Run the Upgrade script:

    1. Open a command window and browse to <OHI_ROOT>/util/install.

    2. Run the upgrade by executing ./ohi-update.sh .

  12. Make the required changes to the ohi properties file

  13. Perform any post-upgrade steps

  14. Start WebLogic application server

  15. Deploy the Application

  16. Perform any post-deploy steps

Additional Upgrade Steps for Installation

The following phases are defined:

  1. pre-upgrade: Application is still running

  2. pre-undeploy: Application is stopped, but not undeployed.

  3. post-undeploy: Application is undeployed. Database is backed up

  4. post-upgrade: Released upgrade script has run.

  5. post-deploy: New application is deployed and is up and running.

Stage: pre-upgrade

Action: execute the following query to find future duplicates

select usrs.login_name
,      dupes.alias
from   ohi_users usrs
,      ohi_user_preferences uspr
,      (select uspr_id
        ,      alias
        from   ohi_bookmarks
        group  by uspr_id
        ,      alias
        having count(*) > 1
       ) dupes
where  uspr.id = dupes.uspr_id
and    usrs.id = uspr.usrs_id

This query lists bookmark aliases per user that have more than one occurrence and will violate the new unique constraint. Update the alias of the violations such that there are no more duplicates

Stage: post-undeploy

Action: Apply mandatory WebLogic patches

The following are the mandatory (minimal required) patches. Please apply them in the order listed below:

  • 33416868: WLS PATCH SET UPDATE 12.2.1.4.210930 (OCT 2021 PSU)

  • 32211968: ECLIPSELINK - ALL VERSIONS - GOES INTO DEAD LOCK DOING OBJECT BUILDING

After applying the above patch(es), if the managed server fails to start due to coherence errors, please follow the solution described in Doc ID 2634266.1

Stage: post-undeploy

The following steps are to be performed before running the upgrade script:

Action: Privilege changes to SYSTEM user, the below commands should be executed as SYSDBA:

GRANT SELECT ON sys.gv_$aq TO system WITH GRANT OPTION;
REVOKE SELECT ON sys.v_$parameter FROM system;
REVOKE EXECUTE ON sys.dbms_system FROM system;

Action: Privilege changes to USER schema, below command should be executed as SYSTEM user

GRANT SELECT ON sys.gv_$aq TO OHI_AUTHS_USER;

Action: Privilege changes to OWNER schema, below commands should be executed as SYSTEM user

GRANT CREATE TRIGGER TO OHI_AUTHS_OWNER;

Stage: post-upgrade

A new OHI_REFERENCE_SHEET_LINES_INDEX_MAINTENANCE_PKG has been provided as part of the patch. Post upgrade of the patch login as ohi_<app>_owner and execute the below command to recreate the index.

begin
  ohi_reference_sheet_lines_index_maintenance_pkg.create_index (1);
end;
/

Configuration Properties

Ref Action Subject Description

AUT-2293

Added

ohi.eclipselink.concurrency.manager.waittime

A value larger than 0 (milliseconds) enables internal persistence deadlock detection and related extended logging; effectively driving org.eclipse.persistence.internal.helper.ConcurrencyManager. This is an optional property. Default value is 1 millisecond.

AUT-2293

Added

ohi.eclipselink.concurrency.manager.maxsleeptime

Related to ohi.eclipselink.concurrency.manager.waittime. Controls the time interval (in milliseconds) for the system to throw an exception after a deadlock was detected. This is an optional property. Default value is 40000 milliseconds.

AUT-2336

Removed

ohi.datasetoperations.notification.common.structure

The property ohi.datasetoperations.notification.common.structure is removed. From this release onwards, the notification will be sent only in the new/common format.

NXT-21416

Added

ohi.vault.environment.identifier

To distinguish secrets on a per OHI application instance basis

NXT-21416

Added

ohi.vault.token

Vault token

NXT-21416

Added

ohi.vault.pem.url

Resource URL to Vault pem

NXT-21416

Added

ohi.vault.clientkeypem.url

Resource URL to Vault Client Key pem

NXT-21416

Added

ohi.vault.clientpem.url

Resource URL to Vault Client pem

NXT-21416

Added

ohi.secure.secrets.store

The type of store the OHI application uses for secrets

NXT-21416

Added

ohi.vault.kv.secrets.engine

By default, OHI applications assume that Vault’s Key-Value secrets engine is enabled at root path "secret"

NXT-21416

Added

ohi.vault.address

Vault address. Must use HTTPS

NXT-21416

Added

ohi.vault.namespace

OHI specific Vault namespace section, under the path determined by properties ohi.vault.kv.secrets.engine/ohi.vault.namespace to look for secrets

NXT-22299

Added

ohi.service.{0}.client.pool.timeout.idle

The max time, in milliseconds, a connection can be idle. This property is specific to client {0}. Effective immediately for non-cached clients.

NXT-22299

Added

ohi.service.{0}.client.pool.timeout.addressresolution

The max time, in milliseconds, to resolve the host address. This property is specific to client {0}. Effective immediately for non-cached clients.

NXT-22299

Added

ohi.service.{0}.client.pool.destination.maxqueued

The maximum number of connections in the pool allowed to be queued per destination for client {0}. Effective immediately for non-cached clients.

NXT-22299

Added

ohi.service.{0}.client.pool.destination.maxconnections

The maximum number of connections in the pool per destination for client {0}. Effective immediately for non-cached clients.

NXT-22299

Added

ohi.service.client.pool.timeout.connection

The time in milliseconds before the attempt to connect to an outbound service times out. Effective immediately for non-cached clients.

NXT-22299

Added

ohi.service.{0}.client.pool.timeout.connection

The max time, in milliseconds, a connection can take to connect to destinations. A value of 0 means never timeout. This property is specific to clientId {0}. Effective immediately for non-cached clients.

NXT-22299

Added

ohi.service.client.pool.timeout.idle

The max time, in milliseconds, a connection can be idle. Effective immediately for non-cached clients.

NXT-22299

Added

ohi.service.client.pool.timeout.addressresolution

The max time, in milliseconds, to resolve the host address. Effective immediately for non-cached clients.

NXT-22299

Added

ohi.service.client.pool.destination.maxconnections

The maximum number of connections in the pool per destination. Effective immediately for non-cached clients

NXT-22299

Added

ohi.service.client.pool.destination.maxqueued

The maximum number of connections in the pool allowed to be queued per destination. Effective immediately for non-cached clients.

NXT-22299

Added

ohi.service.client.pool.active

Enable or disable to leverage connection pool functionality

NXT-22299

Added

ohi.service.client.response.content.maxsize

Maximum allowed response content size in MegaBytes (MB).

Web Services

Ref Action Subject Description

NXT-20655

Added

Non-Entity Cache Integration Point

'/api/nonentitycache/invalidateall' IP invalidates all the non entity caches. It supports POST HTTP request. Successful response returned by this IP is 204.

NXT-22658

Added

Outbound Integration Point

A new IP that shows all the outbound integration points and their endpoints

NXT-23006

Modified

Control Task Processing

The existing status response is extended with information about the number of items in the task processing queue

NXT-24203

Added

Fetch Available Datasets Integration Point

'api/dataexchange/datasets/fetchavailabledatasets/<dataSetDefinitionCode>/<dataSetVersion>' IP fetches all the datasets from the configured source environments. It supports GET HTTP request. Successful response returned by this IP is 200.

POL-7230

Added

Test Dynamic Logic Integration Point

New Integration Point

POL-9643

Modified

persons API

Relation email address now allows IETF RFC2882 Email Format

POL-9643

Modified

providers API

Provider email address now allows IETF RFC2882 Email Format

Data Conversion

This section intentionally left blank.

Dynamic Logic

Ref Action Subject Description

POL-7230

Added

Test Unit

New signature

UI Changes

This section intentionally left blank.

Deprecated items (to be removed in future release)

This section intentionally left blank.

Breaking Changes

Ref Action Subject Description

AUT-2336

Removed

ohi.datasetoperations.notification.common.structure

The property ohi.datasetoperations.notification.common.structure is removed. From this release onwards, the notification will be sent only in the new/common format.

Bug Fixes

BugDB SR Internal BP Summary

33248062

3-26443621271

AUT-2184

NullPointerException should be replaced with an user friendly error message in ConfigMigrationItemReader

Description:

Nullpointer received when an entity name in the import file doesn’t exist in the application

Resolution:

GEN-MIGR-016 will be shown with the missing entity name in the application

33574038

AUT-2258

Importing flex code with date field using cmt fails with GEN-FIEL-008 error

Description:

Import of flexcodes with date field as a part of configmigration set fails.

Resolution:

Successful import of flexcodes with date field as a part of configmigration set.

33552380

AUT-2252

Removing column URI from OHI_BOOKMARK_UK1

Description:

In 3.21.3.0.0 unique constraint OHI_BOOKMARK_UK1 was created on the combination of user preferences, alias and URI of the bookmark. The URI column should be removed from the constraint.

Resolution:

The attribute URI is removed from the Unique Key on Bookmarks

33620849

AUT-2269

Query on generic API with a condition on child list and order by nulls first returns an error message

Description:

When making a query on any generic API, when a condition on a child list is made and also an "order by" clause with "nulls first" is added, invalid SQL is formed, so an error is returned, rather than performing the requested query.

Resolution:

The generic API no longer creates invalid SQL and performs the requested query as expected.

33476876

AUT-2234

QueryAPI with EQ operator returning 204 response when value has leading zeros

Description:

QueryAPI with EQ operator returns 204 response when the field value has leading zeros. It works fine with LIKE operator

Resolution:

QueryAPI with EQ operator returns expected response when the field value has leading zeros.

33727924

AUT-2293

CMT export is stuck when deadlock occurs in Eclipselink

Description:

CMT export process is stuck when deadlock occurs in Eclipselink code. This happens, for example when a HTTP-API PATCH operation on a configuration entity is performed while CMT (which includes that configuration entity) export process is running in parallel.

Resolution:

Install the mandatory WebLogic patches 33416868 (WLS PATCH SET UPDATE 12.2.1.4.210930) and 32211968 (ECLIPSELINK - ALL VERSIONS - GOES INTO DEAD LOCK DOING OBJECT BUILDING)

34165418

AUT-2403

Getting a large data file using data file set integration point fails with java.sql.SQLRecoverableException error

Description:

Sending a GET request to the data file set integration point for a large data file (about 1.5 GB) fails with java.sql.SQLRecoverableException

Resolution:

With this bug fix, it is now possible to download a large data file without getting an error

33669694

AUT-2280

CMT import stops when a Dynamic Logic contains regexp character(s) fails

Description:

When import of dynamic logic containing regexp character(s) fails (for example if the dynamic logic referenced in that dynamic logic could not be found), then CMT stops importing any other entities and the result is shown as success.

Resolution:

CMT import is shown as failure when import of dynamic logic with regexp character(s) fails. And all the other entities are imported.

Issues that were backported in previous Release / Patch

No backports.

Known Issues

BugDB SR Internal Summary

26392920

AUT-1041

ACCESS - Focus does not reach the overflow icon

Description:

On navigating via the keyboard on persons page, the focus does not reach the overflow icon for existing records.

26392938

AUT-1042

ACCESS : Unopened child sections are not accessible using keyboard

Description:

The user is not able to access unopened child sections using only the keyboard. The user should be able to use all the links, sections and functionalities just by a keyboard.

26393635

AUT-1044

ACCESS - ALT text is missing for all the images in the documentation. And hence the images are not recognized by JAWS screen reader.

Description:

ALT text is missing for all the images in the document. And hence the images are not recognized by JAWS screen reader.

31533939

AUT-1764

ACCESS : Application does not support the portrait mode of the screen.

Description:

The application needs to support portrait mode as well as landscape mode. Currently, the application does not support when the application is used in portrait mode of the screen.

32477606

AUT-2029

No Base View generated for Reference Sheet Lines

Description:

Reference sheet(line)s use a different storage structure (JSON) for the dynamic fields. The base view generator does not support that yet. So the reference sheet line columns can’t be queried using base views.

32555703

AUT-2057

Baseview generation sometimes might result in error: ORA-01461

Description:

This happens occasionally when generating baseviews.

An error similar to the one described below is emitted to the application logfile:

java.sql.SQLException: ORA-12801: error signaled in parallel query server P007 ORA-01461: can bind a LONG value only for insert into a LONG column

32992615

3-25236236261

AUT-2141

When Auth In IP sends in an update , the authorization processing should start from the first step and not from the last

Description:

When an Auth pends and subsequently, an update to the auth comes in through the Authorization In IP, this resets the authorization to the CHANGE status, but as soon as it is resubmitted it seems to skip all processing steps.

33054876

AUT-2155

ACCESS : DOCUMENT TESTING : Expand buttons do not have discernible text

Description:

Expand buttons do not have discernible text

33054874

AUT-2156

ACCESS : DOCUMENT TESTING : Search form element at the home page does not have a label

Description:

Search form element at the home page does not have a label

33054879

AUT-2157

ACCESS : DOCUMENT TESTING : Link for home button do not have discernible text

Description:

Link for home button do not have discernible text

33054881

AUT-2158

ACCESS : DOCUMENT TESTING : Focus doesn’t reach to the menu to select different guides

Description:

Focus doesn’t reach to the menu to select different guides through keyboard

33054884

AUT-2159

ACCESS : DOCUMENT TESTING : Data table / grid do not have accessible text

Description:

Data table / grid do not have accessible text

34169459

AUT-2406

TestDynamicLogic IP - Failure response Code is 418 instead of 400

Description:

Testdynamiclogic IP doesn’t have correct response code for unsuccessful execution of test unit. It should be 400 as it is in the implementation, but it is 418.

34169847

AUT-2407

Execution of callout rule dynamic logic fails from test unit

Description:

For callout rule dynamic logic, the endpoint placeholder is set on callout rule code and not dynamic logic code (ohi.{0}.endpoint.request), This leads to execution error in unit test.

26391698

AUT-680

Access : Documentation : No summary was defined for data table

Description:

No summary defined for the data table in the documents.

26391717

AUT-681

Access - Documentation - Header cell is not the First row and not scoped

Description:

The header cell is not the first row/column and is not scoped for the documents

25437440

AUT-690

ACCESS : Focus should first come to the left hand side menu

Description:

When using the tab the focus should come to the left-hand side menu first instead It’s going towards the right

25437457

AUT-691

ACCESS : CTRL+INS+I shortcut for list items does not work

Description:

List items on the page are not displayed using the CTRIL+INS+I shortcut.

25466241

AUT-716

ACCESS: The Close tab 'X' icon is not accessible via keyboard navigation

Description:

The 'x' icon of any opened page is not accessible if using only Tab (keyboard) navigation.

25466259

AUT-721

ACCESS: Jump to line functionality of JAWS (Screen reader) doesn’t work.

Description:

The user is not able to use the Jump to line functionality of JAWS which enables the user to navigate to a specific line/attribute based on its unique number.

25466274

AUT-722

ACCESS: DOCUMENT TESTING: The page address link is read as page title using assistive technology (JAWS)

Description:

The assistive technology (JAWS) should read 'OHI Authorizations' as the title instead it’s reading the page address link as the title.

25466289

AUT-725

ACCESS: Persons and Organizations page overflow icon is not accessible

Description:

Persons and organizations page overflow icon is not accessible using only a keyboard.

25466288

AUT-726

ACCESS : DOCUMENTATION TESTING : The table is showing rows with the headers

Description:

The documents are showing the rows without the headers for a table. For some of the tables, a header is not defined.

25466283

AUT-727

ACCESS : Documentation testing : Graphical images are not detected by assistive technology (JAWS)

Description:

Assistive technology (JAWS) is not able to detect available graphical images on any page in the documents.