What's new in 6.3.2
This topic describes the features and enhancements introduced in Deployment Automation 6.3.2.
We have updated our Help Center with a new fresh look, an improved structure, and a powerful search functionality.
Let us know what you think: Send Help Center Feedback.
User interface and usability
The following features are now available from the user interface:
|JRE upgrade from the DA user interface||You can now upgrade JREs from the Deployment Automation user interface. Upgrade them separately or together with the agents on which they're installed. For details, see Upgrade agents and JREs.
You can also add custom JREs to be used by agents. For details, see Configure custom JREs for agents.
|Time zone in schedules||
When scheduling deployments, blackouts, or cleanups, you can now set the time zone to which Deployment Automation will bind your schedule.
|The Most Recent section||The Most Resent section is back in the menu.
From this section, you can access up to 10 most recently used entities (applications, components, component templates, global processes, deployment runs, global environments, pipelines, agents, agent pools, agent relays, resources, and resource groups).
To view the Most Recent section, click the navigation button in the main menu.
The following integrations enhancements are available:
|PostgreSQL support||DA now supports the PostgreSQL open-source relational database management system.
For details, see Prepare your database.
|Improved DA integration with TeamCity||We improved the process of publishing and deploying versions into Deployment Automation from TeamCity.
Now the system verifies the name of a component you specified. If a component is inactive or doesn't exist, the system displays an error when you try to save the build step.
For details, see Deployment Automation plugin for TeamCity.
Security and access
The following security and access improvements are available:
|Passwordless SSH impersonation||Agents on UNIX and Linux can use passwordless SSH impersonation.
For details, see Use passwordless SSH impersonation on UNIX/Linux.
|Security upgrades||Many third-party libraries with identified vulnerabilities are upgraded to the most recent and secure versions.|
For a list of defect fixes in each release, see the Knowledge Base: