Deprecated features are IBM's way of saying: still works today, do not build new dependencies on it, and expect breakage when you upgrade to next LTS. MQ estates accumulate decades of RUNMQSC scripts, channel SSLCIPH choices, security exits, and client APIs that were fine on WebSphere MQ 7.5 but clash with IBM MQ 9.4 defaults. Upgrade weekends fail not because strmqm is hard, but because a removed command, a disabled cipher, or an unsupported authentication mode only appears when production channels bind. This tutorial teaches how to read deprecation in release notes, categories of common deprecations (protocols, commands, objects, tools), mapping alternatives, partner coordination for TLS sunsets, testing methodology, and maintaining a technical debt register tied to MQ versions—so deprecated features become planned work instead of surprise outages.
| Stage | Behavior | Your action |
|---|---|---|
| Documented deprecated | Still works; noted in release notes | Plan replacement project |
| Warning in logs/trace | May emit notices on use | Find and fix before next LTS |
| Removed | Fails at configure or runtime | Must upgrade scripts/partners first |
| End of support (EOS) | No fixes for whole version | Upgrade queue manager LTS |
SSLv3, weak ciphers, and certificate key sizes below policy minimum are frequent removal targets. CHANNEL SSLCIPH must move to suites partners support. CHLAUTH and CERTLABL changes may require new labels in keystore. Test with openssl s_client or MQ trace ssl in lab before prod cutover.
Obsolete DISPLAY formats, removed object attributes, or replaced command verbs appear in migration guides with "use X instead." Automation pipelines parsing old DISPLAY output break silently—update parsers when upgrading.
Old C headers, deprecated Java classes, or removed MQI options cause compile failures on developer laptops after client upgrade even when queue manager already upgraded. CI must build all application repos against new client before QM cutover.
Legacy tools may retire in favor of MQ Explorer, REST admin API, or cloud consoles. Operations runbooks referencing retired utilities need rewrite—train staff on replacements during non-prod upgrade.
1234# Example audit grep themes — customize per target release notes grep -i SSLCIPH QM_ALL_defs.mqsc grep -i SSLCIPH QM_ALL_defs.mqsc | grep -i 'NULL|MD5|RC4|DES' # Review partner channel tables outside MQ too
Your channel may support TLS 1.3 while partner still offers only TLS 1.0—bind fails after upgrade. Start partner outreach months early with test window and required cipher list. Document agreed SSLCIPH or TLS 1.2+ policy in integration agreements. Firewall teams must allow new ports if listeners move.
Track: item deprecated, discovery date, owning team, replacement design, target fix release, verification test. Review quarterly until closed. Link register entries to change tickets for upgrade weekend—executives see risk reduction, not only version numbers.
Deprecated is when the toy company says we still sell the old blocks this year, but next year we will not—so start building with the new blocks they sell now.
Read one target LTS release notes deprecation section and list five items relevant to your lab.
Grep dmpmqcfg export for SSLCIPH and classify against modern policy.
Create three-row technical debt register template for your team.
1. Deprecated means:
2. Find deprecations in:
3. Old TLS ciphers after upgrade:
4. Audit deprecated usage via: