Home

enterprise Installation and Configuration

image

Contents

1. enter prise enterprise 9 0 Installation and Configuration December 2015 Groiss Informatics GmbH Groiss Informatics GmbH StrutzmannstraBe 10 4 9020 Klagenfurt Austria Tel 43 463 504694 0 Fax 43 463 504594 10 Email support groiss com Document Version 9 0 19684 Copyright 2001 2015 Groiss Informatics GmbH All rights reserved The information in this document is subject to change without notice If you find any problems in the documentation please report them to us in writing Groiss Informatics GmbH does not warrant that this document is error free No part of this document may be photocopied reproduced or translated to another language without the prior written consent of Groiss Informatics GmbH enterprise is a trademark of Groiss Informatics GmbH other names may be trademarks of their respective companies Contents 1 System Requirements 6 LL PUR see e oe ate de es wk ee Bd er ey a 6 A eee on esr aot ea Se A oe BS erry ee e 6 1 3 Database Management Systems o e e 7 LA ACUSE 0 os ado do e a a a DA A 7 2 Installation 8 2 1 Database Preparation o cso cecco 24864 da a a aaa 8 Bl RUB se ae a gat ve esa ac Ra a a a a a es we 8 21 2 M5 SUL Server sses cep ew a wh ee a ete ee we 10 le DBE a o ees ea a ee Ae E 11 CA o El A 11 Lla BAN eco reo oe a a A ew a ES 12 22 Extractand Install 0 ee eA i e e ee ee ba eee es 12 2 2 1 Bootstrap in stand al
2. The API provides the com groiss store BulkQuery class as a convenient means to utilize this fast kind of access Since database systems usually put restrictions on the textual length of SQL statements and also on the number of elements in such IN lists enterprise splits queries with long IN expressions into several queries This configuration parameter can be used to control the maximum number of elements of an IN expression The default value is 250 elements Increasing the parameter leads to fewer partial queries and fewer roundtrips to the database but also to longer statements and IN lists with the possibility to hit the limits imposed by your DBMS e Log database session ids database logdbsessionid Check this parameter to log session ids of database Oracle SQLServer To include database session ids in the log it is necessary that the database user SYS executes the following grant grant select on v_ session to ep Table 3 1 shows the recommended drivers for the databases their class names and JDBC URLs you can directly view and use this table in enterprise by clicking on the help link next to Database 3 4 Directories Here you can define some directories that enterprise will use The Directory of Form Classes and Directory for Temporary Files must exist e Home directory avw base dir This is the root directory for all relative paths if you leave it empty the current direcory of the start script is used e D
3. SEARCH Search case insensitive by default avw reporting defaultlgnoreCaseSearch If this checkbox is activated the checkbox Ignore Case on process search mask is acti vated by default Exact Id short search only avw reporting exactIdShortSearch If this checkbox is activated you have to enter the right Id to get a correct result Short search includes subject avw reporting shortSearchSubject If this check box is activated the subject will be included in shortsearch Short search includes field values avw reporting shortSearchFieldvals If this checkbox is activated fieldvals will be included in shortsearch It is necessary that full text search is activated and the checkbox Useable in DMS must be activated for each formtype which should be found Order process Ids by OID monitoring orderProcessId In worklist and Reporting processes will be sorted by OID if this checkbox is activated For more information on process relations read the corresponding chapter of the en terprise Application Development Guide Show all rows even when no view right avw reporting showNoAcces If this checkbox is activated and the user who uses search engine has no view right on DMS object he will get all rows as result Use underscore _ as SQL wildcard avw reporting underscorelsWildcard If this checkbox is activated underscores are allowed as SQL wildcard If activated it is not possible to search for _ unless you esca
4. WnTLS_ECDHE_RSA_WITH_AES 128 CBC_SHA WnTLS_ECDHE_RSA_WITH_AES 256 CBC_SHA r nTLS_ DHE_RSA_WITH_AES_128 CBC_SHA WnTLS_DHE_RSA_WITH_AES 256 CBC_SHA r nTLS_ DHE_DSS_WITH_AES_128 CBC_SHA WnTLS_DHE_DSS _WITH_AES 256 CBC_SHA r nSSL_RSA_WITH_3DES_EDE_CBC_SHA WnTLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA WnTLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA WnTLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA WnTLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA WnSSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA WnSSL_DHE_DSS _WITH_3DES_EDE_CBC_SHA WMnSSL_RSA_WITH_DES_CBC_SHA r nSSL_DHE_RSA_WITH_DES_ CBC_SHA 22 3 2 HTTP SERVER WnSSL_DHE_DSS_WITH_DES CBC_SHA WnSSL_RSA EXPORT_WITH_RC4_40 MD5 nSSL_RSA_EXPORT WITH DES40_CBC_SHA r nSSL_DHE_ RSA EXPORT WITH DES40_CBC_SHA nSSL_DHE DSS EXPORT WITH DES40_ CBC SHA WNSSL_RSA_WITH_NULL_MD5 WNSSL_RSA_WITH_NULL_SHA WAnTLS_ECDH_ECDSA WITH_NULL_SHA WnTLS_ECDH_RSA_WITH_NULL_SHA WnTLS_ECDHE_ECDSA_WITH_NULL_SHA WnTLS_ECDHE_RSA_WITH_NULL_SHA WNSSL_DH_anon_WITH_RC4 128 MD5 WAnTLS_DH_anon_WITH_AES 128 CBC_SHA WAnTLS_DH_anon_WITH_AES 256_CBC_SHA WNSSL_DH_anon_WITH_3DES_EDE_CBC_SHA WANSSL_DH_anon_WITH_DES_CBC_SHA WnTLS_ECDH_anon_WITH_RC4_128_SHA WnTLS_ECDH_anon_WITH_AES 128 CBC_SHA r nTLS_ECDH anon WITH AES 256 CBC SHA nTLS_ECDH anon WITH 3DES EDE CBC_SHA nSSL_DH_ anon EXPORT WITH RC4_40_MD5 r nSSL_DH_ anon EXPORT WITH DES40 CBC_SHA nTLS_ECDH anon WITH
5. As O nn a A A D IOP acia A a ee ee A AAL BES ei ad e a a Aa de A 4 2 Parameters for Tablespaces o oo One owns Tables and Queries o a 1 o I System Requirements 1 1 Platform enterprise 9 0 is available for several platforms For the operation of a server a Java Runtime Environment JRE of Version 1 7 or higher is required The following operating systems are supported e Windows Variants NT 2000 XP 2003 2008 Vista Win7 e Solaris e AIX e Linux The server should have at least 512MB of memory for enterprise and 200MB free disk space 1 2 Java To develop enterprise applications a Java Development Kit JDK version 1 7 or higher must be installed It is available for download from the Oracle web site http java oracle com or from another vendor At the Oracle web site a list of Java ports to other platforms is available On clients where the process editor applet is to be used we require the latest Java Plugin to be installed in the browser If the applet is blocked by the security settings of Java see http www java com en download help java_blocked xml please do following steps 1 Open Java Control Panel can be found on windows machines under Control Panel 2 Go to tab Security 3 At the bottom of that tab there is a list of exception sites Add the site of your ep server to that list 1 3 DATABASE MANAGEMENT SYSTEMS 1 3 Dat
6. Element count in IN Expressions Log database session ids Parameter change needs restart FE Pe PE Pepe e Me org apache derby jdbc EmbeddedDriver jdbc derby ep create true p90 4 4 1 250 Figure 3 1 enterprise Configuration 20 3 1 3 2 3 1 LICENSE License The first screen contains license information HTTP server License key avw license Your license key If you want to change your license key after you finished the setup you can enter the new key here This screen contains the setup of the HTTP server Server IP port httpd port HTTP port on which the server runs IP address http ip address The default behavior of multiple network interfaces the HTTP server runs on all interfaces With this parameter you can restrict the inter faces by entering an ip adress where the server should run Minimum number of threads httpd minthread Number of threads which are started on startup Maximum number of threads httpd maxthreads Maximum number of threads which will be used for HTTP requests Hint If Apple Safari is used in combination with SSL it is recommended to set an adequate high number for Minimum Number of Threads and Maximum Number of Threads Server SSL Port ssl port Port of the HTTPS server SSL IP address ssl ip address Analog to paramete
7. Set gt lt Set name configurationClasses gt lt Ref id plusConfig gt lt Set gt lt New gt lt Arg gt lt Call gt 2 Uncompress the enterprise WAR file e g using ep90 as contextpath 3 Put the JAR file of the JDBC driver into the lib directory of the web application 4 Go to the webapps ep90 WEB INF directory and put a jetty env xml file there In this file specify the datasource as a resource within a context element lt Configure class org mortbay jetty webapp WebAppContext gt lt New id DerbyDB class org mortbay jetty plus naming Resource gt lt Arg gt jdbc DerbyDB lt Arg gt lt Arg gt lt New class org apache derby jdbc ClientDataSource gt lt Set name databaseName gt ep lt Set gt lt Set name portNumber gt 1527 lt Set gt 79 8 4 CONSIDERATIONS FOR POOLED DATASOURCES lt Set name serverName gt localhost lt Set gt lt Set name user gt derby lt Set gt lt Set name password gt derby lt Set gt lt New gt lt Arg gt lt New gt lt Configure gt The value of the first Arg element must match the path of the datasource in the en terprise configuration file 5 Restart Jetty with following parameter and begin to setup enterprise java jar start jar etc myjetty xml 8 4 Considerations for pooled Datasources enterprise still uses its own connection pool even when the datasource is a pooled one We have better control over the connection this way and can
8. This section describes the configuration of enterprise running as web application in a jetty installation enterprise does not start jetty as embedded web server 78 8 3 CONFIGURATION OF A DATASOURCE IN JETTY 6 1 1 Create a myjetty xml file that activates the needed jetty plus features Using the jetty xml and jetty plus xml files as model Add the following lines to the server con figuration element lt Array id plusConfig type java lang String gt lt ltem gt org mortbay jetty webapp WebInfConfiguration lt Item gt lt ltem gt org mortbay jetty plus webapp EnvConfiguration lt Item gt lt ltem gt org mortbay jetty plus webapp Configuration lt Item gt lt ltem gt org mortbay jetty webapp JettyWebXmlIConfiguration lt ltem gt lt ltem gt org mortbay jetty webapp TagLibConfiguration lt Item gt lt Array gt Add the configuration classes also to the addLifeCycle call element lt Call name addLifeCycle gt lt Arg gt lt New class org mortbay jetty deployer WebAppDeployer gt lt Set name contexts gt lt Ref id Contexts gt lt Set gt lt Set name webAppDir gt lt SystemProperty name jetty home default gt webapps lt Set gt lt Set name parentLoaderPriority gt false lt Set gt lt Set name extract gt true lt Set gt lt Set name allowDuplicates gt false lt Set gt lt Set name defaultsDescriptor gt lt SystemProperty name jetty home default gt etc webdefault xml lt
9. Connector port 8080 maxThreads 150 minSpareThreads 25 maxSpareThreads 75 enableLookups false redirectPort 8443 acceptCount 100 debug 0 connectionTimeout 20000 URIEncoding UTF 8 useBodyEncodingForURI true disableUploadTimeout true gt 17 2 5 BASIC CONSIDERATIONS FOR BACKUP AND RECOVERY Hint The Servlet API 3 0 is used This can lead to compatibility problems with some application server e g Tomcat in versions less than 8 0 2 5 Basic considerations for backup and recovery According the operational apects of backup and recovery an enterprise installation com prises of the following component types e Basic enterprise software artefacts e Application specific software artefacts e Configuration data e Application Logfiles e Database content For the first two types quite ordinary backup and recovery measures are perfectly appro priate The small volume and infrequent changes to this components allow for periodic full backups of the enterprise installation directory and the application installation directory Configuration data comprises a small set of very small configuration files avw conf in the conf subdirectory of the enterprise installation directory and appl prop in the ap plication directories Changes to those files will be relatively infrequent after an initial production phase but might be critical to proper operation Frequent or even immediate backup of those files is recommende
10. Guide section Time Management in chapter The Process Editor Maximum graph size timemgmt graph maxsize Number of maximum graph size which is created by time management process mining 3 19 Other parameters In this area a various number of helpful parameters are listed Each parameter has a short description which can be displayed by activating the help icon 52 3 20 CHANGE ADMINISTRATOR PASSWORD 3 20 Change administrator password With this link you can change the password of the sysadm user The corresponding param eter in avw conf is avw syspwd The default password is digital after a default installation of enterprise 53 4 Patching and Upgrading your Installation This chapter describes the patching and upgrading mechanism of enterprise For this purpose an explanation of the used terms is necessary first e Version A version is the number of the enterprise version e g 9 0 e Build Represents a combination of a version and the revision number The revision number can be found e g in enterprise changelog Example for build number 9 0 6778 e Upgrade This term is used if the version of enterprise has been increased e g upgrade from enterprise 8 0 to 9 0 e Patch This term is used if the build number has been increased e g updating from enterprise 9 0 6770 to 9 0 6778 4 1 Patching the Installation To assure the quality and reliability of your installation bug fixes and enhancement
11. MB wrapper java maxmemory 128 e Additional parameters to the JVM Can be specified via following parameters wrapper java additional lt nr gt Configure servicename and description In the following 3 entries replace ser vicename_placeholder with the service name A different service name is rec ommended so you can keep the old service definition until you are sure the new one is working wrapper console title servicename_placeholder wrapper ntservice name servicename_placeholder wrapper ntservice displayname servicename_placeholder Give a meaningful description of the service via following parameter wrapper ntservice description Dependencies in Startup optional Via wrapper ntservice dependency lt nr gt parameters one can introduces dependencies upon other services e g databases for startup 16 2 4 USING AN APPLICATION SERVER OR SERVLET CONTAINER 3 Stop the old service Use the service manager to stop the service 4 Install the new service Execute lt epdir gt service install bat 5 Start the new service Start the new service using the service manager Check the logfile make sure the new service is running properly If there are any problems check the logfile services wrapper log and the parameters 6 Delete the old service lt epdir gt service javaservice uninstall lt oldservicename gt 7 Remove obsolete files javaservice exe and installep bat can be removed from the lt epdir gt se
12. NULL SHA nTLS_KRB5 WITH 3DES EDE CBC SHA nTLS_KRB5 WITH 3DES EDE CBC _MD5 r nTLS_KRB5 WITH DES CBC_SHA nTLS_KRB5 WITH DES CBC_MD5 nTLS_KRB5 EXPORT _WITH_RC4_40 SHA nTLS_KRB5 EXPORT WITH RC4_40 MD5 nTLS_KRB5 EXPORT WITH DES CBC_40_ SHA nTLS_KRB5 EXPORT WITH DES CBC 40 MD5 The cipher suite used by a client can be seen via the URL Servlet method com dec avw html HTMLAdmin clientinfo Dealing with sporadic SSL Handshake problems is greatly eased by setting the javax net debug system property in the java command line eg Djavax net debug ssl defaultctx sslctx handshake verbose This generates considerable amounts of log data usage is only advisable when client connection issues via HTTS arise An on line assessment of your SSL parameters can be obtained at https www ssllabs com ssldb index html Context path avw contextpath This parameter defines the context path of en terprise 23 3 2 HTTP SERVER 3 2 1 Defining Allowed and Denied Hosts or Networks To restrict access to the HTTP server to selected hosts or address ranges you can declare an allow and a deny list The evaluation is as follows If the allow list is empty access is allowed from every host except the ones in the deny list If the allow list is not empty access is allowed from the hosts and networks in the allow list minus the hosts and networks in
13. Server XMPP server port xmpp port Definition of port to XMPP Server Application Repository URLs appl repository urls A comma separated list of URL s for application repositories can be defined here With these URLs enter prise checks periodically for new versions of enterprise and if defined for in stalled applications For more details see section 4 4 To enable RMI communication you must at least enable either Allow plain com munication over RMI Use SSL for login sequence at RMI communication or Crypt RMI communication with SSL If a timer doesn t catch an exception enterprise sends a mail to the system administrator and deactivates the timer 3 9 Cluster See section 5 3 4 in the chapter about clusters for details about configuring clusters 3 10 Workflow Open form on process start avw start with form In the process start mask there is a checkbox where the user can decide to see the process form immediately after process start Here you can define the default value of this checkbox Inherit Ids to subprocesses avw inherit ids Don t create Ids for subprocesses use the parent processes Ids instead Enable application spanning process definition avw procdef appl_spamning If this option is set it is possible to define processes with application spanning elements 1 e Forms Tasks Subprocesses and Roles as Agents Allow automatic take avw autotake Allows users to take tasks automatically if
14. all means and tools which are offered by the underlying platform to check performance parameters or monitor them on a regular basis Because of the wide variety of the platforms concerning this specific area we refer the reader to the appropriate systems documentation We assume that the reader has some basic familiarity about the architecture of Oracle and is somewhat acquainted with its significant mechanisms A 2 Key Operating Parameters of the Database The following parameters are vitally important for an efficient operation of the database They all can be found in the ini ora file DB_BLOCK_SIZE States the size of the data blocks in the DB In most environments the default value is 2048 bytes For enterprise the value should be increased to 4096 or 8192 The change should reduce IO overhead and has no other significant implications Unfortunately the value can t be changed in an existing data base one would be forced to apply a complete export import cycle to apply a modification 81 A 2 KEY OPERATING PARAMETERS OF THE DATABASE DB_FILE_MULTIBLOCK_READ_COUNT Determines how many blocks are read dur ing a full table scan The value should be dimensioned in such a way that the product of DB_BLOCK_SIZE and DB_FILE_MULTIBLOCK_READ_COUNT equals the size of the operating system buffer often 64K The value can be changed during operations but is ap plied only at the next startup of the database instance DB_BLOCK_BUFFERS State
15. are possible in classpath using com groiss component Bootstrap in ep bat or ep sh The java property Dep bootstrap path can be changed optionally so additional paths can be added to classpath with following behavior e classes all files within this folder are added to classpath e lib all files with extension jar are added to classpath e jar the corresponding file is added to classpath e all other paths are scanned for a classes and lib directory and the corresponding entries will be added to classpath If these directories are not available the entered directory will be added to the classpath Hint The first entered path leftmost of property Dep bootstrap path is loaded first the rightmost path is loaded at last The jar files of the lib directory are loaded in alphabetical order Example JAVACMD Xms16m Xmx128m Djava awt headless true Dep bootstrap path C eproot C extension classes libs lib C myjar jar com groiss component Bootstrap conflavw conf e C eproot is scanned for a classes and lib directory e C extension classes is added to the classpath e libs lib results in adding all included jar files to classpath scanned relative to root path e C myjar jar is added to the classpath e means that the root path is scanned for a classes and lib directory If these directo ries are not available all elements of the root path will be added to the classpath Hint If property Dep bootstrap path
16. bytes avw dms max_doc_size You can define a maximum size for DMS documents here Oenterprise will not allow users to create documents that are bigger than this value If you don t define a maximum size there will be no size restriction for DMS documents Anyway also databases can limit the maximum size 38 3 11 DMS Character set for text files avw dms textfile_charset Here you can enter the char acter set for text files if the content of these files is not displayed correctly e g the content of the file has ANSI charset but the server charset is UTF 8 for this pur pose set the character set for text files to the value CP 252 if client is running under Windows only Full text search avw dms textsearch state With the help of this parameter the state of the fulltext search can be determined There are three possible states Switched off No fulltext search is used at all String search in form fields The database doesn t support full text search Therefore the required string can be searched in a table containing all string values of form fields Activated The fulltext search of the current database is used Check View right on DMS folder content dms check rights on list If activated the view right is checked when folder content is read Show extensions avw dms showextensions Show the document name extension e g doc or txt Do not display hidden documents avw dms hide_hidden_
17. deadline violations per process definition Show last n instances ep cockpit recent Specifies the number of instances which are displayed in tab Runtime of table Recently Started in process cockpit Common processes ep cockpit commonproc A comma separated list of form types Formtype Id Version e g jobform_1 which contain the formfield area The forms are used to assign process instances of common processes for example project to a cockpit entry 3 18 Time management The parameters in this section are needed for setting time management specific properties Default time unit timemgmt timeunit Time unit shown in histograms duration statistics etc You can select between Seconds Minutes Hours Days Max length of time histogram timemgmt histogram length The maximum length of the time histogram can be set here in objects Prune probability timemgmt pruning prob Here you can set the range of the red area which has the default range from 0 to 95 The default value is 0 95 Process deadline probability timemgmt deadline prob You can select an appro priate deadline based on reliability requirements to new process The default value is 95 0 95 Create start histograms timemgmt create starthistos If this parameter is acti vated beside the other histograms additionally a start histogram will be created For more details about the histogram please take a look in System Administration
18. for sending mails One of the following communication types can be defined here Unencrypted The content of the mail will be transferred without encryption This is the standard communication type STARTTLS This is an extension to plain text communication protocols which offers a way to upgrade a plain text connection to an encrypted connection in stead of using a separate port for encrypted communication Encrypted The mail will be SSL encrypted The validity of the mail server certificate will not be checked Trusted with certificate To assure a secure transmission the mail server has to authenticate itself adverse enterprise This is achieved by checking the mail server certificate To add a new certificate for a mail server it has to be added to the key store of enterprise Administrator email address avw adminemail One ore more email addresses of the system administrator separated by comma Subject pattern ep mail subjpattern An email subject consists of lt subject gt lt pattern gt lt pid gt In this field only the lt pattern gt part could be entered which is needed for identification e g the text D If subject pattern is entered the email will be assigned to an existing process with given lt pid gt if available After this attempt the given Action of mailbox is executed Email notification text ep mail notification text Free text which is the notifica tion text in email for the
19. full text search please ensure that MSSEARCH service is running and automatic population for creating indices of full text catalog is activated 10 2 1 DATABASE PREPARATION 2 1 3 DB2 When using DB2 you have to create an operating system user Afterwards a database user is created with the rights connect to database and create tables Set the character set of the database to UTF 8 and the standard size of the buffer pool and table space to 16 KB Then you create a database schema for which the user is authorized 2 1 4 PostgreSQL During installation of PostgreSQL choose at least the following components e Database Server Data Directory National Language Support e User interfaces psql pgAdmin III optional admin GUI e Database Drivers JDBC Driver In the initialize database cluster dialog it is advisable to use UTF 8 as encoding and to check accept connection on all interfaces if remote connections to the database are needed In the data subdirectory of the installation directory edit pg_hba conf to allow access from remote machines if desired Example host all all 10 10 10 0 24 md5 In the data subdirectory of the installation directory edit postgresql conf Make sure that parameter default_with_oids is turned off default_with_oids off It may be advisable to restrict the search path to the current user schema with search_path user After a configuration reload or restart of the
20. g SSL properties to establish a secure connection to database The value of this property is a list of property declarations separated by r n Note that the sign must be escaped by when editing directly in avw conf e g database connection properties my prop a value r nyour prop another value e Reconnect try interval sec database waitFor seconds Interval in seconds for reconnect tries to the database e Reconnect tries database waitFor count Number of reconnect tries e Query timeout sec database query timeout Number of seconds after which a query times out e DB connection reservation warning interval secs database connection busy warning secs Long lasting reservations of DB connec tions can be logged and also monitored via the Server Monitor Aged DB connec tions Information includes thread name timestamp and stacktrace at moment of 27 3 4 DIRECTORIES reservation Monitoring information in the logfile will occur in 2 minute intervals Each long lasting reservation is logged not more than once Following values can be defined 1 do not monitor default behavior like before gt 0 do monitor log report all connections being reserved longer than the specified time interval seconds e Element count in IN Expressions ep inlists splitsize enterprise uses SQL IN lists SQL expressions of the form WHERE att IN vall val2 valn as one form of optimizing database access
21. https in description user port ssl 443 use all network interfaces the pem file is a concatenation of cacert and private key bind 443 ssl crt cacertprivkey pem add X Forwarded Proto header to mark request as secure for backend 73 6 3 EXAMPLE CONFIGURATION reqadd X Forwarded Proto https all requests use the following backend the admin connector default_backend ep workers admin the nodes user connectors backend ep workers description nodes user connectors use the node with the fewest connections balance leastconn allow for redispatching a request if a designated via the cookie server is down option redispatch retries must be nonzero for redispatch to work retries 3 uses cookie lt serverid gt _EPNODEID for session affinity sticky sessions cookie epcluster_ EPNODEID nocache default options for all servers of this backend check health via tcp weight for loadbalancing default server inter 10s weight 10 for each node a line must be inserted might be better to use ip Adresses instead of hostnames lt Nodeid gt lt ip user port gt cookie lt Nodeid gt check server Node_1 n1 acme com 8001 cookie Node_1 check server Node_2 n2 acme com 8002 cookie Node_2 check server Node_3 n3 acme com 8003 cookie Node_3 check the nodes admin connectors backend ep workers admin description nodes admin connectors balance leastconn option redispatch retries 3 cookie epclu
22. mail queue without sending attempt The mails are sent when MailQueueTimer is executed see System Administration Guide section Timers for more details Send without mail queue If this option is selected mails will be sent imme diately without using the mail queue This is the default setting e Max time for mail queue item minutes ep mail queue maxtime minutes The MailQueueTimer iterates over the mail queue and handle each entry which has a creation date This creation date is used for this configuration parameter and if max time is exceeded the administrator will be informed and a appropriate status message will be written for this mail queue entry The default value is 24 hours 1440 minutes e SMTP default properties ep mail smtp defaultprops Define default properties for SMTP mail communication see http javamail java net nonav docs api In par ticular the following properties are useful in dealing with network problems mail smtp connectiontimeout and mail smtp timeout e IMAP default properties ep mail imap defaultprops Define default properties for IMAP mail communication see http javamail java net nonav docs api In par ticular the following properties are useful in dealing with network problems mail imap connectiontimeout and mail imap timeout e POP3 default properties ep mail pop3 defaultprops Define default properties for POP3 mail communication see http javamail java net nonav docs api
23. oe acs a ee ee CAME lt lt Gk ee o a eh ee ee a eH aa Process cockpit lt ea oc i g ee eee dee ed de es Time man geme nt o os ca ed oba eh ee ea eR e ed ha Other PATAS o es kA RA eaa a A AGE a ew Change administrator password ooo a Patching and Upgrading your Installation Patching the Installation o o e 4 1 1 Manual Patch Method ooo 64 ee heehee ed da ed 4 1 2 Automatic Patch Method ooo Upgrading Patching an enterprise Application Performing an Upgrade of enterprise Application repository oo se ee ee gdl Intefa oo aio e e ke ee a a ae a ee a Migration of deprecated DBMS data types oaoa a 4 5 1 Migration of Oracle data type LONG 4 5 2 Migration of deprecated MS SQL Server datatypes Clustered enterprise System Overview and Principles of the Clustered Architecture Cluster and INGO ES cs a Se wr Ge Be Ee a a de al a 8 Configuring a clustered enterprise System 531 Platform Configuration lt s lt s o sa 4b end ee a 5 3 2 Installation of a nonclustered System 5 3 3 Transport Mechanisms for Cache Coherence Service 5 3 4 Adapting the enterprise Configuration Operation of a clustered SYSTEM o os ee ee ba ee ee es IL Mint coloca ed Se ee a ee ee 342 load Dale 24 4 kaa RE EE Se Se EE oe oO 34 9 Event Handling cocoa AE ae enter
24. the deny list Both lists contain pairs of IP Addresses and net mask separated by spaces commas or new lines Both IPV4 and IPV6 addresses are permissible A net mask should be given in the CIDR style in form of an integer specifying the number of bits of the network part For IPV4 addresses the traditional dotted notation is also permitted See the following exam ple 10 205 112 0 255 255 255 0 P10 205 113 0 255 255 255 0 10 205 224 0 24 2001 0db8 0010 48 This entries in the allow list means access from the networks 10 205 112 proxy address 10 205 113 0 10 205 224 and 2001 0db8 0010 is allowed When entering IPV6 ad dresses directly in the config file bear in mind that each colon must be escaped by preceding it with a backslash The following list used for the allow list causes that access from hosts 10 205 112 4 10 205 224 8 and 2001 DB8 0010 0 8 800 200C 417A is allowed 10 205 112 4 32 10 205 224 8 255 255 255 255 2001 DB8 0010 0 8 800 200C 417A 128 3 2 2 Access Control The access control mechanism affects only the Dispatcher which serves URLs targeting java methods Rules can be specified which restrict access to certain URLs based on a combination of IP address and enterprise rights To activate the access control the corresponding service must be added to the services in Classes gt Services com groiss avw contrib URLChecker uc Configuration The access control property consists of a comma s
25. they perform a function directly on an entry in the role worklist or suspension work list This will only work 1f you add additional functions to the GUI of these worklists e g the finish function If the process form of such a task is edited the current edi tor is written in table avw_currenteditor and is visible in the process instance history Show choice selection when single path ep choice showsingle If this checkbox is not activated no choice mask is displayed anymore when one branch of a choice object is active only If activated the choice mask is displayed always 37 3 11 DMS 3 11 DMS Versioning avw dms versioning_ strategy Not automatically disables automatic version creation On agent change creates a version if a different user edits the docu ment so if the same user edits a document multiple times no documents are created On every change creates a version every time the document is edited Inherit permission list avw dms bequest_acl When this option is checked the permission lists of a folder is inherited to the contents of the folder DMS Storage Class IStore class You can specify your own DMS storage class here The class must implement the interface com groiss dms Store DMS Archiving Class DMSArchiver class Class for archiving documents must implement the interface com groiss dms DMSArchiver Standard table model Table handler avw dms standard_tablemodel A class can be speci
26. to apply the latest bugfixes A patch archive is a bundle which incorporates the individual new versions of the files to be patched along with two additional files version changes which describe the patch and the needed actions The technical format of a patch archive is a ZIP archive Because not every patch is applicable for each target system the build number of the current installation will be compared with the patch build number If the system is not at a minimum required build or the system is newer than the patch the patch will not be applied If the currently installed build cannot be determined the patch will not be applied The automatic patch deployment mechanism is conservatively designed and therefore pre vents the loss of files which are in your current installation Before a patch archive is applied a backup of all affected files will be performed Each time you apply a patch a separate backup folder will be created The content of the backup folder will remain on your hard disk even if the patch has been successfully applied All actions will be appended to a file patch log where the full patch history can be seen In case of an error a rollback will be performed leaving all files unchanged Both the backup folder and the log file will be created in the patches folder The following steps initiate an automated patch procedure 1 Download the patch archive 2 To play it really safe backup the database 3 Copy the
27. user to inform him about new mail which has been added to the given process This field allows to use following placeholders org the name of the organizational unit proc_id the process instance id of the process where email is attached task the current task of the process instance from the sender of the email 34 3 8 COMMUNICATION e Non trustworthy senders ep mail junk The mails of all mailboxes will not be handled for given email addresse or a pattern of addresses Separators are new lines Examples groiss If email address contains string groiss email will not be handled by mailbox groiss com If email address contains string groiss com at the end email will not be handled by mailbox max muster 0 If email address contains string max muster at the begin ning email will not be handled by mailbox max muster groiss com If email address contains exactly the string max muster groiss com email will not be handled by mailbox e Default action for sending mails ep mail queue usage Here you can define the default action for sending emails Following values are available Send over mail queue This option allows to send mails by using mail queue If an error occurs the mail will be stored in mail queue until MailQueueTimer is executed see System Administration Guide section Timers for more details Put in mail queue If this option is selected mails are stored in
28. 6 2 2 HTTP session failover enterprise provides no out of the box means for session failover When a node fails the proxy has to detect this state and will reroute the request to use another working node Since the HTTP session is not known on the new target node the user will have to login again to this node 6 2 3 Node election at initial session creation At the first contact between client and the enterprise cluster the cookie bearing the node 1d has not been set So the choice of the initial node is somewhat arbitrary The proxy should be configured to use some sensible strategy By using a special login URL see later the enterprise load balancing mechanism which is based on a combination of node weight and user session count can also be used for initial node election 6 2 4 SSL termination in Proxy In a configuration where all traffic between the proxy and the clients is carried out via SSL TES a function of the proxy is to terminate the SSL traffic and to use plain HTTP to connect to the cluster nodes This diminishes the SSL processing load at the nodes Since this would be within the perimeter of a central network unencrypted data traffic in this network links should not be a security issue Should SSL termination at the proxy really not be allowed a different configuration is needed since the cookies are also encrypted in such a scenario and are therefore not accessible for the proxy for node routing purposes 6 2 5 Tr
29. DatabaseName lt dbname gt integratedSecurity true e Activate checkbox Credentials not needed and perform next setup step 12 Now the database and driver will be tested Optionally you can test if your database can store Unicode characters 13 The next step is the creation of the database tables The time may vary depending on your server s speed and the database that you use If a schema of a previous enterprise version exists setup cannot be continued at this point 14 After initializing the database some internal services have to be started 15 On the next screen the password of the system administrator can be specified 16 Now a user and an organizational unit can be created The following roles will be given to this user all home in the inserted organizational unit and sys 17 If you want you can load an example process now 13 2 2 EXTRACT AND INSTALL 18 Congratulation You finished the setup of enterprise Click on Login to go to the login page where you can immediately start to use enterprise By completing the previous steps you finished the setup of enterprise If you want to change the configuration or configure advanced settings take a look at chapter 3 2 2 1 Bootstrap in stand alone server Jetty Since enterprise 8 0 the bootstrap mechanism is used which builds the classpath au tomatically This mechanism allows to keep the batch and or shell file simple and clear Following configurations
30. IP calendar imip If this checkbox is activated MIP will be used In en terprise calendar notifications contain iCalendar files iMIP offers the possibility to process status information of an appointment iMIP email address calendar imip email Email address which is used for com municate with the participants participants will reply to this email address e Show default resource cal show defaultres If this checkbox is checked the user can use a simple resource form for assigning resources to calendar appointments Resource classes cal resources It is possible to use arbitrary Persistent classes for calendar resources Either the names incl package name of the classes can be entered e g a form class com dec avw appl lt formid gt _ lt formversion gt or xml nodes can be defined in following way xmlid lt xml_id gt lt node_id gt The type of the xml node should be a query node see Application Development Guide for more details After setting the classes the self defined resources can be used in the calendar e Non working day cal nonworkingdays In this list it is possible to select one or more non working days which will be needed for example in escalations Calendar Class calendar class A calendar class of type com ibm icu util Calendar can be entered here which is used by enterprise e Number of days in agenda view calendar agenda days Define the number of days which are displayed in agenda view how mu
31. In par ticular the following properties are useful in dealing with network problems mail pop3 connectiontimeout and mail pop3 timeout e RMI port avw rmi port Port number of RMI Remote Method Invocation lis tener Needed for Java Clients 35 3 8 COMMUNICATION Enable RMI class loading avw dyn_class_load enabled Enables class loading via RMI this is needed when working with forms and the Java Client Enable full RMI access avw rmi enablefull When starting an RMI session the system must authorize a user All RMI calls will be performed as this user then If you enable full RMI access you can call all available API methods independent of the user s rights Allow plain communication over RMI avw plain_rmi Allows plain unencrypted communication for RMI connections Export port for plain RMI communication avw rmi plain_exportport If speci fied this is the port used for RMI traffic Use SSL for login sequence at RMI communication avw secure_login_rmi Use SSL to encrypt the login sequence for RMI communication Crypt RMI communication with SSL avw permanent_secure_rmi Encrypt the whole communication over RMI Export port for RMI over SSL avw rmi ssl_exportport If specified the en crypted RMI communication uses this port Client certificates for RMI over SSL ssl_requireclientcertificate_over_rmi This parameter determines how a secure SSL connection can be established by a RMI client There are
32. TF 8 encoding the text will grow up to 102 Byte and could not be stored anymore For this purpose you can change the semantic on two ways e global by using following statement alter system set NLS_LENGTH_SEMANTICS CHAR scope both e per session db session environments in enterprise configuration by using follow ing statement alter session set NLS_ LENGTH _SEMANTICS CHAR Hints for the performance of Oracle based enterprise installations can be found in ap pendix A 2 1 2 MS SQL Server enterprise requires a case insensitive installation of MS SQL Server When creating a SQL Server database use the option ANSI NULL is default You can specify it in the database property panel or by execution of a stored procedure after instal lation sp_dboption lt dbname gt ANSI null default true lt dbname gt must be replaced with the name of your database The procedure results in behavior consistent with the ANSI standard regarding the handling of NULL values The database user for enterprise must have the right to create tables for example via the role db_ owner It is advisable to use Statement Level Snapshot Isolation in order to avoid shared locks by readers Enable it with ALTER DATABASE lt dbname gt SET READ_COMMITTED_SNAPSHOT ON Note that no other users are permitted to be in the database when you issue this command and that the feature is available only in SQLSserver 2005 or higher If you use
33. abase Management Systems We support the following DBMSs Oracle MS SQL Server IBM s DB2 PostgreSQL Derby MySQL and Firebird is supported experimentally The following database versions are required Oracle 9i or higher MS SQL Server 2000 or higher DB2 9 7 or higher on Windows or AIX PostgreSQL V8 4 or higher Derby 10 5 3 0 or higher MySQL 5 0 experimental Firebird Version 2 5 or higher experimental The database can be installed on the same machine as enterprise or on another networked server 1 4 Client In order to use the the Web Client a Web Browser is all that is needed Supported Products and Versions are MS Internet Explorer 9 or higher Firefox 20 0 or higher Safari 5 0 or higher Chrome 15 or higher 2 Installation 2 1 Database Preparation enterprise needs a database with one user In the following we briefly describe the nec essary steps for creating a database user for the supported databases Please consult the database manuals or the local experts for further information about database setup and creation of a user 2 1 1 Oracle You need a database user with the following rights CREATE SESSION ALTER SESSION CREATE TABLE CREATE VIEW The user must also have access to a tablespace and the permission to add data there Example EP_USER is the name of the enterprise database user create user EP_USER identified by lt password gt default tablespace users grant create session alt
34. according to his configuration the history check can t be performed correctly The result will indicate a correct password although the password may have been reused and even be equal to the previous e Minimal number of whitespace characters passwdpolicy min_whitespace Spec ifies the number of min allowed whitespace characters Note If parameters are set in a way that an inconsistent policy is specified the users may not be able to change their passwords So please care about the following rules for the parameters maximal length gt minimal length minimum capitals minimum lowercase characters minimum digits minimal special characters lt maximal length minimum letters minimum digits minimal special characters lt maximal length minimum different characters lt maximal length 3 15 3 Your Own Checker Class e Checker Class passwdpolicy checker_class If the default password checker does not satisfy your requirements you can enter your own password checker class here The class must implement the com groiss passwd Checker interface 3 16 Calendar e Holiday Class avw calendar class Here you can define a class for displaying the holidays in the calendar It must implement the com groiss cal Holidays interface e Allow email address as attendee cal date attendees mailuser If this checkbox is checked it is possible to add email participants to an appointment 50 3 17 PROCESS COCKPIT e iM
35. address No two clusters should use the same multicast address Be aware of other applications using multicast in your configuration For specification and assignments of multicast addresses refer to http www isi edu in notes iana assignments multicast addresses Monitoring of multicast packets is quite easy with tcpdump tcpdump ip multicast e Multicast IP Port Port to send and receive multicast packets Must be available on the machine e Multicast TTL Determines the scope of multicast packets on the network For clus tered systems with small network diameter this should be 1 63 5 3 CONFIGURING A CLUSTERED ENTERPRISE SYSTEM e Buffersize Bytes Size of reception buffer in bytes Recommended value is at least 30000 Bytes When specifying these values be aware of possible address space collisions with a multicast based client notification service or cache coherence services of other clusters Reliable Multicast via JGroups JGroups is an open source communications library for reliable group communication It is written in Java www jgroups org It is deployed in the enterprise engine itself and needs no external processes running It is started automatically The library itself consists of a single Java archive named jgroups all jar and uses the apache commons logging facility commons logging jar which must be explicitly added to the classpath mere placement in the lib directory is not sufficient The following
36. and displayed in enterprise Servermonitor This option is usable if parameter Monitor server with Java Melody has been activated before Inline images into CSS ep css inline images Inlining images as Base64 strings causes fewer server requests but the CSS file is significantly larger It depends on your client network configuration which option has fewer disadvantages Inline imported CSS files ep css inline styles Inlining imported css files causes fewer server requests but the single CSS file is significantly larger Allow automatic move into user folders ep userfolder allow automove If this checkbox is activated worklist entries are moved automatically to appropriate user folders which have entered a XPath expression No initial listing for the following tables ep big tables A comma separated list of table id s can be entered here where no listing should be performed when displaying table the first time It is necessary to perform the search function s of a table to list the content Example configuration The string admin user admin dept means that no content is listed initially for user table and organizational unit table 3 13 1 ACLCache In enterprise it is possible to speed up the rights check by activating the ACLCache The cache improves the speed of the ACL hasRight method calls The results of calls to method ACL hasRight are cached and the cache is consulted before accessing the database The cache is o
37. ansparent view for the clients To present a uniform an node transparent address for the clients the enterprise server object must be configured accordingly The official address of the clustered system must be set In particular the combination of protocol HTTP or HTTPS host name and port which will be used by the client to contact the proxy must be provided via Administra tion Admin Tasks Cluster Servers If the nodes are configured to use dedicated admin connectors the proxy configuration as well as the server info must be augmented accordingly 6 2 6 HTTP header transformation by the Proxy In order to provide the nodes with appropriate data about the technical nature of each re quest the headers of the HTTP requests must be enriched by the proxy Two additional headers are important X Forwarded For and X Forwarded Proto The first one bears the originating client address the second one should be set to https when the proxy uses SSL session termination and the incoming connection was made via SSL 6 2 7 Configuration considerations for enterprise The node routing cookie for session binding must be switched on via the parameter avw cluster setnodecookie in the Cluster section of the configuration 70 6 3 EXAMPLE CONFIGURATION An additional parameter httpd jetty behindproxy must be set in section Other parameters in the configuration is accounts for correct interpretation of the X Forwarded headers 6 2 8 Specia
38. by appropriate multi column indexes Queries of application tables should generate a result set as small as possible It is recom mended to use a two phase approach for queries with potentially large result sets First the number of tuples count should be determined If this number exceeds a certain thresh old it is time to give the user a chance to decide upon further execution of the query The user could apply additional constraints to the search condition which would further confine the result set or she could explicitly get the whole large result set and thereby accepting higher response time and workload on the server For medium sized tables which are often scanned in their entirety table level caching could be advantageous alter table mytable cache Clearly sufficient space in form of DB_BLOCK_BUFFERS must be provided Criteria in queries should be used in such a way that indexes get used Strive for point queries or at least for multipoint queries with high selectivity its better to use a b than a like b which is in turn better than a like b Of uttermost importance is the usage of the enterprise transaction cache mechanism which works for all subclasses of SQLObject Access to such objects should be done through receiver get oid and not via receiver get 0id xxx Performance friendly formulation of application queries especially such statements which are executed quite often call for gen
39. ch days in advance Business start time cal meeting earliestStart Definition of the earliest possible time for appointments Business end time cal meeting latestEnd Definition of the latest possible time for appointments e Calendar sources cal applications A list of classes can be defined here to acti vate deactivate additional calendar components e g if com groiss calendar CalendarAppl is removed no appointments can be added anymore default com groiss calendar CalendarAppl com groiss calendar wf DueTasks com groiss calendar wf FinishedTasks e Date import formats cal impex formats A list of classes which implements the com groiss cal CalFormat interface These classes are used for importing exporting Notifier class cal notifier A class which implements the com groiss cal Notifier interface This class is used for sending notifications reminder of due appointments 3 17 Process cockpit This section contains the parameters for the process cockpit see details in the User Man ual e Root folder ep cockpit rootfolder The path to the root folder of the process cock pit 51 3 18 TIME MANAGEMENT Reports for all processes ep cockpit allreports A comma separated list of Report Id s These reports are displayed in the process cockpit for every process Show overdue processes of last n days ep cockpit deadline days Specifies the number of days which are used for the calculation of process
40. cify an im plementation of interface com groiss servletWebDAVAuth which will be used to determine the requesting user by some data in the HTTP request e g from a client certificate sent as part of that request As for Basic Auth this setting will be used for all kinds of WebDAV clients Hint for old GUI When using Internet Explorer even in the old GUI Microsoft Office documents can be opend in read write mode Therefore the registry entry HKEY_CURRENT_USER Software Microsoft Office 14 0 Common Internet OpenDocumentsReadWriteWhileBrowsing must be set to 1 whereat 14 0 stands for the Office version and therefore may vary see http support microsoft com kb 870853 for further information For authentication each option mentioned above can be used except the authentication token which may only be used in new GUI 41 3 12 Search 3 12 SEARCH Maximum table size on server rows query maxtable Maximum table size the server will handle If the table size exceeds this value the operation is canceled and an error message is produced Cache interval minutes monitoring cacheinterval Specifies how long a query result resides in cache Maximum number of cached queries monitoring cachesize Number of queries in cache Maximum number of simultaneous queries monitoring maxparallel Number of threads that concurrently compute query results Maximum number of startable queries monitoring maxqueue Length of que
41. configuration parameters are needed under Configuration gt Coherence and must be identical on all cluster nodes These parameters are available only if JGroups is used as Transportlayer for Coherence e Groupname JGroups has the notion of communication groups A member must state the groups he belongs to Can be an arbitrary string we recommend to use epgroup or to use the name of the server entry in the cluster e Properties This parameter specifies the location of a configuration file in XML syntax The recommended configuration is located in the jgroups ccs xml file Since the whole JGroups protocol stack is configured through it it looks rather complicated But in normal situations just a handful of key parameters need to be changed Such parameters are clearly marked in the ccs xml file The parts of the configuration to be changed are the multicast IP address mcast_adar the multicast port number mcast_port and the time to live ip_ttl For the multicast address and multicast port we refer to the previous section about unreliable multicast for the time to live we recommend either 1 as the packets should only reach the other enterprise node which are placed in the network vicinity If network components are between the nodes of the cluster it might be necessary to increase this value to 32 In case of doubt consult your local network administrator Please avoid any interference within enterprise e g client notification service w
42. ctory of the Java compiler and interpreter 3 Installation directory The directory where the system will be installed 4 Choose the port on which the enterprise server will run 5 If your server operating system is MS Windows you can install a service 6 Now setup shows you information about how you can start the server and continue the setup process 7 Setup will try to start the server and open a browser for you If this fails and if you did not install a service you have to start the server manually by executing the batch file ep sh or ep bat If your browser didn t already do it please navigate to http localhost port where port is the port number that you have chosen during the previous setup steps The rest of the installation is done with the browser 8 The first screen is the Welcome screen click on Start Setup to start the configuration 9 On the next screen you specify a logical name for the server server ID a server number an integer value for distributed installations the license key and the server s default language 10 Now you can load a database JDBC driver Use the JDBC Driver Help Page for information about different databases and their JDBC drivers 12 2 2 EXTRACT AND INSTALL 11 On the next screen you have to specify some database parameters We suggest to use the help function the question mark next to Database Type to fill the Database Type JDBC Driver Class and JDBC URL fields
43. d possibly by incorporating them in a version control system Application logfiles usually in the log subdirectory of the enterprise installation di rectory should be rotated and a periodic or rotation triggered copy could be made The logfiles are not essential for the operation so there is no need to recover them nevertheless they might be essential for gaining insight of the nature of the problem and help to avoid further errors Concerning the database backup and recovery measures are obviously vendor specific But some general remarks are nevertheless applicable Periodical backup of the data files is strongly recommended To be able to recover to the youngest point in time possible trans action log writing must be enabled The logs must be switched and shipped to a safe location on the fly Concrete recovery measures depend on the type and range of the disaster but in general they consist of recovering the database from the latest backup of data files and transaction logs to copy the software artefacts of enterprise and of the application back to their destinations and to reinstitute the configuration data 18 3 Configuration This chapter describes advanced configuration parameters of enterprise You can change the data that you entered at setup as well as additional configuration here Open the config uration area in the system administration by clicking on Configuration in the menu on the left side In order to save
44. d avw_formversion The timer Archive Timer moves all processes that have been finished n days ago to the archive schema The number of days is taken from the parameter field in the timer entry mask You can find these processes using the process or extended search when you check the Add Archive checkbox Reactivating a process will move it back to the standard database schema For installing an archive schema perform the following steps 1 Create a new schema in Oracle a database user 2 Insert the schema name in the enterprise configuration parameter Archive Schema group Tuning 3 Create the tables and views using the following URL http lt host gt lt port gt lt context root gt serviet method com dec avw timertask ArchiveTimer createArchiveSchema It is necessary that your standard database user has the rights to create tables and views for the archive schema For example you can temporary give the dba right to this user 4 Activate the archive timer and supply values for the timer interval The timer argu ment is a single integer n Processes finished since n days will be moved into the archive schema 76 enterprise and Datasources This chapter describes the configuration of datasources in enterprise and gives example configurations for Tomcat and Jetty 6 1 Before version 8 0 enterprise could use the traditional method to acquire connections to the database via the DriverManager From version 8 0 and o
45. d that will then be sent to the server Usage of Basic Authentication may be deactivated on your windows client but you may change the current behavior by setting registry entry HKEY_LOCAL_MACHINE SYSTEM CurrentControlSet Services WebClient Parameters BasicAuthLevel Supported values are 0 Basic authentication disabled 1 Basic authentication enabled for SSL shares only 2 or greater Basic authentication enabled for SSL shares and for non SSL shares When setting value to 2 be aware that username password will be transmitted in clear text when using a non SSL connection Note Activating Basic Auth in enterprise is not only relevant for editing docu ments via the browser but for all kinds of WebDAV clients trying to connect to the DMS of enterprise Use persistent cookie in DMS ep dms useperscookie When checking this param eter a persistent session cookie will be written on the client when the user navigates within the DMS in the browser That cookie will then be sent by Microsoft Office to authenticate the user But note this works only when using Internet Explorer as browser otherwise Office will not find that cookie Use authentication token in DMS ep dms useauthtoken When checking this parameter an authentication token will be passed as part of the URL to Microsoft Office The server will be able to authenticate the user by this token WebDAV authentification class webdav auth class Here you may spe
46. des can be accessed via Admin Tasks Server Running Nodes Monitor The fields displayed are Hostname Name of the cluster Node Id Id of the node Start Time Time of startup of this node Last HeartBeat Timestamp of last heartbeat made by this node Running Marks if the node is running ClusterTimers Marks if the node is the one which runs the cluster timers Load Current number of connected users Performance Factor The performance factor of the node Load Coefficient The current load coefficient number of users divided by perfor mance factor Load Balanced Marks if the node is member of loadbalancing see section 5 4 2 Logins enabled Marks if new logins are allowed on the current node Logins can be enabled disabled with the toolbar function Disable Enable Login Current Session Shows if current sessions should be kept renewed or aborted At startup this is always set to keep 67 5 4 OPERATION OF A CLUSTERED SYSTEM e Successor Nodes The id of the successor node is displayed where the clients of the switched off node should be logged in if login is restricted see column Logins enabled and current session should not be kept At server startup this column is always empty Hint Current Session and Successor Nodes are used by enterprise Java Clients only 5 4 2 Load Balancing Principle A client which wants to obtain a load balanced session should first connect to a special URL on an arb
47. describes the steps needed to upgrade from a prior enterprise version to the current one e g 8 0 to 9 0 1 Backup your old installation and database 56 4 4 APPLICATION REPOSITORY 2 Extract the content of setup90 jar into a new directory We recommend to use the initial setup wizard for this purpose 3 Copy your existing configuration file avw conf forms directory required jar files e g JDBC driver of the lib directory e g ojdbc4 jar to the corresponding directo ries of the new version 4 To perform an interactive upgrade start the server and login as sysadm You should now be redirected to the upgrade page where you can initiate the necessary upgrade procedure for the database 5 To perform an unattended upgrade start the server with the upgrade option Any required database upgrades will be performed The server will be stopped automat ically Please note If you are using PostgreSQL as your DBMS you must use this upgrade method 6 Re Start the server and delete Browser caches Hint If problems with your forms occur after upgrading to current enterprise version try to set parameter ep xforms dojo load sync in section Other parameters to value true 4 4 Application repository enterprise offers the possibility to get new applications and patches from an application repository the user interface is described in the System Administration Guide For this purpose an application for managing these f
48. docs If this option is checked users cannot see any hidden documents beginning with a point in the filename in the DMS Do not display folder Common dms hide common With this parameters you can hide the Common folder in DMS Do not display user related folders dms hide userfolder This parameter fades out the user folder and the folder of the substituted person Sort table grouped by folders documents dms grid sort grouped If this param eter is checked the elements of a DMS folder will be grouped into folders and non folders and sorting e g by name will be performed within this groups as it is known by Windows Explorer This parameter works in smartclient only OpenOffice home ep openoffice path The root path of OpenOffice can be entered here for replacement of Office templates odt files More details about Office tem plates in enterprise can be found in the Application Development Guide Please note that a mixture of 32 bit and 64 bit version of JAVA and OpenOffice can lead in problems e g converting mechanism from odt to another file format cannot be used Number of named OpenOffice pipes ep openoffice threads Here you can enter the number of threads which are used for the piped connection with OpenOffice The default value is 1 Use named pipes to connect to OpenOffice ep openoffice piped connection If this checkbox is activated a piped connection will be established with OpenOffice This option is activa
49. e IP port is a SSL port If no port is defined the Server SSL Port is used e Allowed hosts or networks for administration ep adminshell allowedips A list of hosts and networks can be specified These hosts can access the administration of HTTP server The syntax of this field is described below in section 3 2 1 e Allowed hosts or networks httpd hosts allow Analogous to Allowed hosts or networks for administration but only for non administration session If Allowed hosts or networks for administration is empty and this host network matches it is possible to enter the administration session e Denied hosts or networks httpd hosts deny Analogous to above but only for non administration session e Access control urls allowed We provide a mechanism which allows to grant or deny access to method URLs based on a combination of IP addresses and rights The syntax of access rules and their semantics is described below in section 3 2 2 e Exclude SSL ciphersuites httpd jetty sslconnector excludeciphersuites Vulner able SSL cipher suites can be excluded from use in HTTPS with following line httpd jetty sslIconnector excludeciphersuites TLS_RSA_WITH_AES 128 CBC_SHA WnTLS_RSA_WITH_AES_256_CBC_SHA WnTLS_ECDH_ECDSA_WITH_AES 128 CBC_SHA WnTLS_ECDH_ECDSA_WITH_AES 256_CBC_SHA WnTLS_ECDH_RSA_WITH_AES 128 CBC_SHA r nTLS_ ECDH_RSA_WITH_AES 256 CBC_SHA WnTLS_ECDHE_ECDSA_WITH_AES 128_CBC_SHA WnTLS_ECDHE_ECDSA_WITH_AES 256 CBC_SHA
50. e configuration must be saved thereby reconfiguring Access Control Caching of user rights in the Access Control mechanism is logged at log level 2 26 3 3 DATABASE 3 3 Database We suggest to use the help function the question mark next to Database to fill the Database JDBC Driver Class and JOBC URL fields with valid values for a selectable database e Database database The database you can select ORACLE DB2 MS SQL Server Firebird or Derby e JDBC Driver Class database driver class Java Class that contains the driver See the table on page 29 for a list of driver classes e JDBC URL database url URL for the database The syntax of this string depends on the JDBC driver used See the examples on page 29 or consult the documentation of the driver e Database Userid database user The ID of the user with whom you want to con nect to the database e Database password database password Password for the database user with the ID that you entered above e Number of connections database connections Default number of database con nections e Maximum number of connections database connections max The maximum number of database connections that can be created e Session environment database session env You can specify SQL commands which are executed for each connection after connecting for example set TEXTSIZE 1000000 e Connection properties database connection properties You can specify e
51. e how often statements have been executed and how much time they consumed total and average You can find these statistical information in Admin Tasks gt Database connections Don t activate statement statistics for long time periods in production environments because they may need a lot of resources and therefore slow down your server File cache size in megabytes file cache size Here you can define the size of the web server file cache The default value is 20MB Permission Cache activated aclcache active Check if the ACLCache should be activated More details about ACLCache can be found in section 3 13 1 44 3 13 TUNING Max number of object specific rights aclcache objectrights maxelems Size of the object specific rights cache in objects Lifetime of object specific rights sec aclcache objectrights lifespan secs Life time of rights in the object specific rights cache Max number of class rights aclcache classrights maxelems Size of the class rights cache in objects Lifetime of class rights sec aclcache classrights lifespan secs Lifetime of rights in the class rights cache ACLCache parameter See section 3 13 1 Monitor server with Java Melody ep servermonitor use melody If activated Java Melody is used as server monitor in Centerprise Monitor DB Connections with Java Melody ep dbmonitor use melody If this parameter is checked the database connections will be monitored
52. e the appropriate transport mechanism like described above e Disallow logins after coherence error avw cluster coherence error disallowslogin If this checkbox is activated no logins are possible anymore in case of a coherence error Hint In section Other parameters the configuration parameter ep timerentry change check seconds can be used to check for changes in timer entries Ports If you do run several nodes on one machine e g for testing purposes ensure that distinct network port numbers for the HTTP server the HTTPS server and the RMI mechanism are used Directories If your nodes run on the same machine or access the same remote file sys tems be sure to configure each of the nodes with distinct destinations for the log file and the error log file as well as a distinct temporary directory Timers Timers require special consideration in a cluster There might be timers which should run on each node and there might be timers that should only be running on one dedicated node of the cluster The former timers must just be marked by checking the box Run on each Node on the timer edit form The latter ones must be marked by NOT checking the box and require special action In a clustered system one of the nodes assumes responsibility for running the timers Transparent failover is provided To enable this functionality make sure that two timers are started on each node e HeartBeat Should be running on each of the nodes Peri
53. ed especially with the parameters of group 2 a brute force attack may be effective in a small amount of time because of the insufficient number of possible passwords So if you don t want to set a parameter let the input field blank 3 15 1 General Policy Settings The following parameters do not focus on the password itself but on the password change and login management These parameters are e Period of validity in days passwdpolicy days_password_valid Defines the password s period of validity in days e Inform user before password expires in days passwdpolicy days_warning_before Defines the days before the validation time is expired where the user will get a warn ing that his password will expire Maximal number of unsuccessful logins until account is deactivated passwdpol icy max_count_invalid_logins A unsuccessful login is defined as a login attempt of an existing user id with a non valid password If the specified number of unsuccessful logins are performed between two valid sessions of the specific user the account is deactivated and the user will get a specific error message on the next login One way Hash Algorithm to Use passwdpolicy algorithm The password is stored in encrypted form by using a one way hash function In former releases this algo rithm was the Unix Crypt algorithm Now one of the following different algorithms can be chosen SHA 256 Secure Hash Algorithm Takes a plain string
54. en statistical ac curacy and resource consumption can be achieved through use of ESTIMATE instead of COMPUTE In this case the system takes samples of the data and does not go through the entire volume A good strategy might be to establish a batch job which issues this schema analysis commands on a regular weekly basis A 4 1 Disks The main performance issues in the disk subsystem are the separation of random access and sequential access and further to isolate individual sequential accesses More precisely separate the redo logs the after image files and the rollback segments and put them on individual disks without any further activity Further split up SYSTEM and TEMPORARY tablespaces from the rest of the system Tables with particular high activity on them are AVW_STEPINSTANCE AVW_FOLLOWS and AVW_FORMVERSION A good measure would be to place them together with their indices on separate tablespaces to be able to place them on specific disks and to distribute the load on multiple devices Another possible strategy would be the division of index space and table data space in different tablespaces It is not possible to give general advice without deeper knowledge of the operational char acteristics Nevertheless for an installation with significant size we strongly recommend to devote some thoughts to this issues and to divert from the default configuration An overview about IO distribution over the individual data files can be gai
55. eparated list of rules Each rule com bines an IP specifier an URL prefix and a set of rights separated by spaces Each of the components can be a wildcard in the form of an asterisk Accordingly the syntax of the ruleset is ip specifier SPACE url prefix SPACE DENY right SPACE right COMMA 24 3 2 HTTP SERVER The IP specifier consists of an ip address and a net mask separated by a Both IPV4 and IPV6 addresses are permissible A net mask should be given in the CIDR style in form of an integer specifying the number of bits of the network part For IPV4 addresses the traditional dotted notation is also permitted It can be used to specify a single host or a subnet in the following ways 10 205 112 22 255 255 255 255 designates the single host 10 205 112 22 10 205 224 22 32 designates the single host 10 205 224 22 P10 205 112 23 255 255 255 255 designates the proxy host 10 205 112 23 10 205 112 0 255 255 255 0 designates all hosts in the subnet 10 205 112 10 205 224 0 24 designates all hosts in the subnet 10 205 224 10 0 0 0 255 0 0 0 designates all hosts in subnet 10 11 0 0 0 8 designates all hosts in subnet 11 2001 0db8 0010 48 designates all hosts in subnet 2001 0db8 0010 i ffff 0a0a 0a0a 128 designates a single IPV4 hosts 10 10 10 10 this wildcard designates all hosts Technically the IP address of a requester matches an IP specifier when the network prefi
56. er session to EP_USER grant create table create view to EP_USER grant unlimited tablespace to EP_USER Since Oracle 11g a default profile mechanism with resource limitations and password ex piration settings might lead to immediate lockout when getting the password wrong or to lockout after a password expiration intervall It is recommended to check the applicable profile parameters and to change them appropriately for the enterprise database user An unlimited profile can be created with create profile EP_UNLIMITED_PROFILE limit composite_limit unlimited connect_time unlimited cpu_per_call unlimited cpu_per_session unlimited failed_login_attempts unlimited idle_time unlimited 2 1 DATABASE PREPARATION logical_reads_per_call unlimited logical_reads_per_session unlimited password_grace_time unlimited password _life_time unlimited password_lock_time 1 password_reuse_max unlimited password_reuse_time unlimited password_verify_ function null private_sga unlimited sessions_per_user unlimited The specific requirements for your site may vary in case of doubt check with your local DBA The profile can be assigned to the user with alter user EP_USER profile EP_UNLIMITED_PROFILE Other useful commands for account administration and trouble shooting are e Check the users profile select profile from dba_users where username EP_USER e Check the properties of the profile select resource_name limit from dba_profi
57. eration interpretation and perhaps modification of the execution plans Measures could be the definition of additional indices or clustering on a physical level or semantic preserving reformulation of the query or explicit incorporation of query optimization hints Concerning these issues we refer to the Oracle8 Tuning and Oracle8 Concepts and Or acle8 Application Developers Guide manuals Consider the possibilities of TKPROF and EXPLAIN PLAN The logfile of enterprise may have valuable first hints like duration of SQL statements It is much better to run complex queries in their entirety on the DB server than to overflow the server with lots and lots of simple individual queries and to stick their results together in the enterprise server This is due to relatively high startup and communication overhead and context switches between the two servers 86
58. erence Service The cache coherence mechanisms task is to propagate cache relevant events within the clus ter in order to keep the caches current For the time being the following event types are propagated e Workitems Changes in the worklist new items finished items e Substitution Changes in substitutions of users new substitute period of substitution starts or ends e Seen Objects Items that are new to a user We provide the following choice of transport mechanisms to account for different needs of an installation e Unreliable Multicast via UDP e Reliable Multicast via JGroups e Java Message Service JMS Unreliable Multicast via UDP While this mechanism is easy to configure and poses virtually no overhead it is recom mended primarily just for development or test installations due to possible loss of pack ets A installation which uses dedicated physical network interfaces and interconnections for cache coherence service might also use unreliable multicast with good results but one should be aware of the susceptibility to errors This transport mechanism uses features present in the Java platform no deployment or startup is needed The following configuration parameters are needed under Configuration gt Coherence and must be identical on all cluster nodes These parameters are available only if Standard Multicast is used as Transportlayer for Coherence e Multicast IP Address Must be a valid multicast
59. error log logger restart errorfile see Restart log Number of error logs logger keep errorfile see Number of logs System loglevel ep logger level This setting is used for log actions of enterprise applications only One of the following levels can be selected Inherit If selected level of parameter root logger level in section Other parameters is taken ERROR Errors are logged only WARN In addition to level ERROR warnings are logged INFO HTTP requests are logged time stamp user IP address and URL DEBUG SQL statements and process oriented logging TRACE The full HTTP headers parameters of prepared statements and other infor mation for debugging purposes Don t use the options DEBUG or TRACE in production for extended periods of time because it generates a lot of data Store loglevel store logger level Analog to System loglevel but is used for log actions of enterprise Store package com groiss store only You can select the entry Inherit to use the selected level of System loglevel Servlet loglevel httpd logger level Analog to System loglevel but is used for log actions of enterprise servlet methods package com groiss servlet and Java Melody only You can select the entry Inherit to use the selected level of System loglevel Log on console logger logOnConsole The log information is written to the stan dard output stream 30 3 6 Classes 3 6 CLASSES Custom loglevels logger custo
60. et tds TdsDriver jdbc inetdae host 1433 sql7 true MS SQLServer V2000 jTDS Project TDS net sourceforge jtds jdbc Driver jdbc jtds sqlserver host 1433 dbname MS SQLServer V2000 Microsoft V3 0 com microsoft sqlserver jdbc SQLServerDriver jdbc sqlserver host 1433 database dbname Oracle LONGs deprecated Oracle Thin oracle jdbc OracleDriver jdbc oracle thin E host 1521 SID Oracle LONGs deprecated Oracle OCI oracle jdbc OracleDriver jdbc oracle oci TNSNAME Table 3 1 JDBC Drivers 29 3 5 Logging 3 5 LOGGING Log file logger logfile Name path of file where enterprise writes log informa tion If file not exists a new one will be created If the logfile extension is zip or gz the logfile s will be compressed automatically depending on parameter Restart log or Max filesize Restart log logger restart logfile Here you can define how often the log file should be initialized daily at midnight or at startup only Number of logs logger keep logfile The number of stored log files If the logfile extension is zip or gz the logfile s will be compressed automatically Error file logger errorfile This file is a centralized collection of errors Errors will also appear in the general logfile If the logfile extension is zip or gz the logfile s will be compressed automatically depending on parameter Restart error log or Max filesize Restart
61. exists a backup of the KeyStore of enterprise 46 3 14 SECURITY KeyStore password ssl keystore_pwd To access a KeyStore a password with a minimum length of 6 characters is needed Default validity period of certificates days cert default validity If a self signed certificate should be created this value is taken for validity period by default Certificate alias to use for SSL connections ssl cert alias Since each user can define his own certificate which is stored in the server keystore the certificate alias to use for ssl connections has to be configured Password for server certificate prk passwd The Java API to access the KeyStore is not able to handle different keys with different key passwords So a system key password has to be configured to access the keys This password has a minimum length of 6 characters Bind session to IP address ep check ip If activated the real client ip address is checked with the ip address stored in session Basic Auth in WebDAV avw dms allow_basicauth Check if you want to allow Basic Auth authentication in WebDAV More information can be found in section 3 1L 1 Use persistent cookie in DMS ep dms useperscookie Check the persistent ses sion cookie should be used for WebDAV access More information can be found in section 3 11 1 Use authentication token in DMS ep dms useauthtoken Check if an authenti cation token should be passed to Microsoft Office Plug i
62. fied which is used for displaying the document tables For further details please take a look into enterprise Application Development Guide section Using the DMS API WebDAV drive webdav drive The webdav drive can be specified with this param eter which represents the root the same letter like set in WebDrive properties If the value off is entered WebDrive will not be used anymore You have to reconnect to the enterprise Server after changing this parameter Open documents in new window avw dms newwindow If checked documents will be opened in new window only for old gui Open documents via Microsoft Office Plug in webdav officeDocuments openWithPlugin This must be checked to activate usage of the plug in by enterprise More information can be found in section 3 11 1 Extensions of plug in supported documents webdav officeDocuments openWithPlugin extensions Holds a comma separated list of extensions e g doc docx for which the Microsoft Office Plugin should be used More information can be found in section 3 11 1 Use applet for data capturing ep dms use applet When creating a new document in DMS you may use an installed webcam or scanner as source for your document s content This is done via an applet which must be activated with this checkbox If that option is activated the document creation dialog will provide the option to select any device for which a TWAIN driver is installed Maximum document size in
63. g enabled avw cluster activated Must be checked e Server name avw servername Name of the server Must be the same on each node of one cluster e Node Id avw node id Id of the cluster node Must be unique within the cluster 65 5 3 CONFIGURING A CLUSTERED ENTERPRISE SYSTEM e Performance factor avw node perffactor Relative performance factor of the node Depends largely on CPU power of the node A node with a factor of 2 is expected to support twice the users of a node with factor 1 The load balancer makes use of the factor to distribute user sessions according to the relative power of the nodes e Member of load balancing avw node loadbalancing member If set to YES by default the loadbalancing function for this node is active i e the node is a potential target for clients which request loadbalanced sessions On nodes which serve special purposes and should not receive logins from ordinary clients this parameter should be unchecked e Set Node Cookie avw cluster setnodecookie Needed for load balancing in proxy environment see chapter 6 e Coherence strategy avw dbcache coherence strategy Currently there is just one strategy supported Notification Do not confuse this with the client notification mechanism While the things share the same name they have nothing in common In the future other strategies might be provided as well e Transport layer for Coherence avw dbcache coherence transport Choos
64. ia Host name User port Admin port enterprisewf acme com 80 443 So we have to set the server object 71 6 3 EXAMPLE CONFIGURATION Protocol HTTP Hostname enterprisewf acme com HTTP S port 80 Administrative protocol HTTPS Administrative IP port 443 We also need to set the parameters avw cluster setnodecookie and httpd jetty behindproxy as described above 6 3 2 Preparation Proxy building and SSL aspects Compilation The options for the make command will have to be adjusted for the platform in use For a reasonable modern Linux system the following might be appropriate make TARGET linux2628 USE_PCRE 1 USE_OPENSSL 1 ADDLIB Iz SSL configuration The following steps can be used to provide the proxy with a self signed server certificate generate private key openssl genrsa des3 out privkey pem 2048 generate certification request openssl req new key privkey pem out cert csr sign the certificate request openssl req new x509 key privkey pem out cacert pem days 10000 the following two command are needed if haproxy startup should not ask for manual input of the passphrase cp privkey pem privkey_passphrase pem openssl rsa in privkey_passphrase pem out privkey pem build a certification chain cat cacert pem privkey pem gt cacertprivkey pem 6 3 3 Proxy configuration In the following we provide a commented configuration file for haproxy for the installation
65. iles is necessary an example for a repository management application can be downloaded via http www groiss com 4 4 1 Interface The application repository defines an URL can be entered under Communication Application Repository URLs A HTTP request on this URL returns a XML that accords to defined schema applrepository xsd can be found within ep jar Example for XML lt applications gt lt application gt lt id gt pm lt id gt lt name gt Project Management lt name gt lt icon gt com groiss apprep AppRepository showResource 9 0 pm pm png lt icon gt lt shortdesc gt Project Management lt shortdesc gt lt description gt lt description gt lt version gt 1 0 1 61 lt version gt lt changelog gt lt changelog gt lt patchfile gt com groiss apprep AppRepository showResource 9 0 pm patch 1 0 1 61 zip lt patchfile gt 57 4 5 MIGRATION OF DEPRECATED DBMS DATA TYPES lt url gt com groiss apprep AppRepository showResource 9 0 pm pm zip lt url gt lt timestamp gt 2012 10 16T14 34 32Z lt timestamp gt lt application gt lt applications gt The XML defines some parameters of the application lt id gt lt name gt lt shortdesc gt lt de scription gt lt version gt and links to an icon lt icon gt a download lt url gt and a patch file lt patchfile gt Itis also possible to define a changelog file which contains information about the changes in current patch 4 5 Migration of de
66. imum number of entries in tables when paging is enabled This parameter is also used for DOJO object selects Max paging table length table paging maxsize For paged tables of size greaten than this number the user is asked before the table is shown or the search function in toolbar must be used 32 3 7 LOCALIZATION Symbol Meaning Presentation Example G era designator Text AD y year Number 1996 M month in year Text amp Number July amp 07 d day in month Number 10 h hour in am pm 1 12 Number 12 H hour in day 0 23 Number 0 m minute in hour Number 30 s second in minute Number 55 S millisecond Number 978 E day in week Text Tuesday D day in year Number 189 F day of week in month Number 2 2nd Wed in July w week in year Number 27 W week in month Number 2 a am pm marker Text PM k hour in day 1 24 Number 24 K hour in am pm 0 11 Number 0 Z time zone Text Pacific Standard Time escape for text Delimiter i single quote Literal Table 3 2 Values for Date and Time Format Masks e Use browser language locale from browser If this option is set the system uses the language settings of the browser instead of the settings in the user table of en terprise e Select list search option selectlist search The search option for searching in a select list Starts with at the begin of a string Substring within a string e Enable Wiki link syntax ep
67. in real production mode and not immediately after the startup phase of the instance when the cache is still cold It is common knowledge that the buffer cache should not be increased beyond certain thresholds Each word of main memory that is allocated exclusively for the buffer cache can be in high demand by other system components In no way the machine should be 82 A 2 KEY OPERATING PARAMETERS OF THE DATABASE pressed to swapping or paging activities After every expansion of buffer cache size mea surements with a warm cache are called for in combination with keeping an eye on paging or thrashing Memory expansions should be considered at such points SHARED_POOL_SIZE Determines the size of the shared pool in the System Global Area SGA Oracle defaults are often found to be too small A rule of thumb says that 15 to 20 of the shared pool should stay free The current size can be calculated as follows select value from v parameter where name shared_pool_size The free space is returned by this query select name bytes from v sgastat where name free memory Key elements in the shared pool are the library cache and the data dictionary Miss rates for both components can be determined with the help of the following queries In the library cache miss rates of under 1 and of under 5 in the data dictionary are commonly seen as appropriate column Executions format 9 999 999 990 column Cache Misses Executing forma
68. irectory of form classes avw formclassdir Directory where the system writes the form classes e Directory for temporary files Httpd tempDir Directory for temporary files 28 3 4 DIRECTORIES DBMS Driver Vendor Driver Kind Class and URL DB2 UDB IBM Data Server Driver com ibm db2 jcc DB2Driver jdbc db2 host 50000 dbname DB2 Z OS IBM 0S390 COM ibm db208390 sqlj dbc DB2SQLJDriver jdbc db20s390 location name Derby Apache Embedded org apache derby jdbc EmbeddedDriver jdbc derby ep create true Firebird SQL 1 5 Firebird JCA org firebirdsql jdbc FB Driver jdbc firebirdsql host 3050 dbalias MS SQLServer V2005 Inetsoftware Una2000 com inet tds TdsDriver jdbc inetdae host 1433 sql7 true MS SQLServer V2005 jTDS Project TDS net sourceforge jtds jdbc Driver jdbc jtds sqlserver host 1433 dbname MS SQLServer V2005 Microsoft V3 0 com microsoft sqlserver dbc SQLServerDriver jdbc sqlserver host 1433 database dbname MySQL V5 0 experimental MySQL Connector J 3 1 com mysql jdbc Driver jdbc mysql host port dbname Oracle LOBs Oracle Thin V10g oracle jdbc OracleDriver jdbc oracle thin E host 1521 SID Oracle LOBs Oracle OCI oracle jdbc OracleDriver jdbc oracle oci TNSNAME PostgreSQL V8 1 PostgreSQL Native org postgresql Driver jdbc postgresql host port database MS SQLServer V2000 Inetsoftware Una2000 com in
69. is Recommended 0 Minimal number of different characters passwdpolicy min_different_chars Specifies the minimal number of different characters in the password As an ex ample if the parameter is set to 3 the password aaaa2222 is not accepted but aabb2222 is Recommended 3 Maximal sequence of same character passwdpolicy max_char_adjacent Spec ifies the maximal sequence of the same character in the password As an example if the parameter is set to 3 the password aaaa is not accepted but aaabaaa is Recommended 2 49 3 16 CALENDAR e Maximal length of substring passwdpolicy max_sub_user_data Specifies the maximal length of any substring in the password which exists in the user s first name surname or id As an example if the parameter is set to 3 and the user s id is testuser the password stus is not accepted but tes ser is This check is case insensitive Recommended 2 e Number of old passwords to check passwdpolicy history_steps Specifies the number of old password to check password reuse As an example if the param eter is set to 3 and the user changed his password in the order hello itsMe myPassword and letMeln the password itsMe is not accepted but hello is Recommended 5 Note The history check can only cover old passwords which have been logged in the database These old passwords are deleted by the LogTask Timer so if the timer has deleted all old passwords
70. is set only these paths files will be considered i e the default behavior of enterprise classpath will be disabled 14 2 3 INSTALLING A SERVICE 2 3 Installing a Service In Windows you can configure a stand alone installation of enterprise to run as service This can be done while installing see the previous section or later with calling the program install bat in the directory service enterprise uses the framework Java Service Wrapper from Tanuki Software 2 3 1 Components of the Framework The service framework consists of the following files in the service subdirectory Common wrapper files e install bat Used to install the service Needs to be executed once or after changes in the service configuration uninstall bat Used to uninstall the service Needs to be executed before certain changes in the service configuration get effective wrapper dll wrapper exe and wrapper jar The core components of the wrapper license wrapper txt The license that governs the use of the wrapper e run bat Can be used to execute the wrapped program in the foreground not as service for debugging purpose Specific service template for enterprise wrapper conf Utility to send a CTRL BREAK signal to a process SendSignal exe Use SendSignal lt pid gt to get a threaddump The lt pid gt is the PID of the Java JVM process not of the wrapper The thread dump is captured to services wrapper log file 2 3 2 Migrating t
71. is set to 8 the password hello_its_me is not accepted but hello is Recommended 8 Minimal number of letters in password passwdpolicy min_letters Specifies the minimal number of letters in the password As an example if the parameter is set to 1 the password 1234 is not accepted but a1234 is Recommended 1 Minimal number of capital letters passwdpolicy min_capitals Specifies the minimal number of capital letters in the password As an example if the parame ter is set to 1 the password hello is not accepted but Hello is Recommended 1 Minimal number of lowercase letters passwdpolicy min_lowercase Specifies the minimal number of lowercase letters in the password As an example if the parameter is set to 1 the password HELLO is not accepted but NELLO is Rec ommended 1 Minimal number of digits passwdpolicy min_digits Specifies the minimal num ber of digits in the password As an example if the parameter is set to 1 the password Hello is not accepted but Hello1 is Recommended 1 Minimal number of special characters passwdpolicy min_others Specifies the minimal number of special characters in the password Special characters are defined as any character which does not belong to any of the following character classes uppercase characters lowercase characters digits space characters As an example W if the parameter is set to 1 the password hello is not accepted but hello
72. istribution is com groiss org PasswdAuth Settings Class settings class A class defining some global settings can be defined here For details see the enterprise Programming Guide Notification Provider Class avw notification_provider_class The class for the notification mechanism must implement the interface com dec avw notification NotificationKit This mechanism allows to notify RMI based Java clients in an asynchronous manner about changes in worklists Archiving Class avw archiveclass The class used for archiving process instances must implement the interface com dec avw core AVWArchiver2 Error Formatter Class avw error formatter You can write an error formatter class that will be used to display errors The class must implement the com groiss gui ErrorFormatter interface 31 3 7 LOCALIZATION 3 7 Localization Services services The list of services that the system starts You can add your own services but should not modify or delete the entries already there if you don t really know what you are doing Additional JAR files for Process Editor pred_applet ext_jars Here you can enter a comma separated list of jar files which will be loaded additionally by the process editor For example you can get an I18N support for other languages as supported by enterprise List of locales Locale list Here you can define a comma separated list of locales that will be used by the server If you don t define a
73. ith multicast when selecting multicast parameters The other properties in the file should not be changed without intimate knowledge about JGroups Java Message Service JMS The usage of JMS for the transport of cache coherence messages can be characterized as follows The publish subscribe paradigm is used Per node there is one subscriber and one publisher All nodes subscribe to the same topic No message selectors are used We use non persistent auto acknowledged non transacted messages and nondurable subscribers JMS does not run within an enterprise JVM it must be configured and started separately 64 5 3 CONFIGURING A CLUSTERED ENTERPRISE SYSTEM Apache ActiveMQ http activemq apache org meets all requirements and is known to be reliable but virtually any JMS implementation should be suitable Hints for configuring a particular JMS may be obtained via the enterprise support The following configuration parameters are needed under Configuration gt Coherence and must be identical on all cluster nodes These parameters are available only if JMS is used as Transportlayer for Coherence e JMS Provider URL The URL name of the JMS provider For ActiveMQ this is omething like tcp lt jmshost gt 61616 wireFormat maxInactivityDuration 10000 n e JMS ContextFactory Name of the Java class for construction of the JNDI Context For ActiveMQ this is org apache activemq jndi ActiveMQInitialContextFactory JMS TopicC
74. itrary running cluster node There the client will be redirected to the least loaded node HTTP S Client or can obtain appropriate initial URLs of this node RMI Client Please note that this mechanism does not necessarily imply the use of a dedicated front end load balancing system Details for such a configuration can be found in chapter 6 HTTP S Clients The URL for getting a load balanced session for an HTTP S Client is http s lt host gt lt port gt lt context root gt servlet method com groiss avw html HTMLNodes redirect The client will be redirected immediately to the server with the lightest load RMI Clients Use the same mechanism as mentioned above A client should open an URL Connection to http lt host gt lt port gt lt context root gt servlet method com groiss avw html HTMLNodes redirectJavaClient Three URLS are returned each in a separate line The URLs can be used by the client to obtain an appropriate session to the node The first URL is the one for HTTP clients the second one is the URL for RMI clients the third one is the URL for the HTTPS clients This data can be used in the client to obtain a session to that node 5 4 3 Event Handling Event handlers are executed on the node where the event has been raised 68 6 enterprise in a Load balancing Reverse proxy environment We will briefly discuss some key aspects of deploying an enterprise clustered system behind a load balancing reve
75. ked to persist the changes In the following we describe the different parameter groups Each of them is represented by an entry in the configuration menu If you use a German server installation and encounter problems understanding the English terms used in this manual we suggest to create and use an administrator with English language the sys right is required in order to enter the administration Hint The parameter definition and their groups are defined in properties xml This file should not be changed 19 localhost 2000 wt serviet method com groiss smartclient Main showAdmin e Q Suchen CQerprizi gt 8 Organization Administration lal Save B Applications Search Admin tasks License HTTP server Database Directories Logging Classes Localization Communication Cluster Workflow DMS Search Tuning Security Password policy Calendar Process cockpit Time management Other parameters pm KELAG Ticketing Options Staff processes ITSM Demos Change administrator password Database Database JDBC Driver Class JDBC URL Database Userid Database password Number of connections Maximum number of connections Session environment Connection properties Reconnect try interval sec Reconnect tries Query timeout sec DB connection reservation warning interval secs
76. l functions Some special functions for a proxied configuration are provided via explicit URLs The prefix for all those URLs is protocol proxy port ctxroot servlet method com groiss avw html HTMLNodes Following functions are available e redirect Use the enterprise load balancing mechanism to contact the least stressed node sets the node routing cookie e redirect nodeid lt nodeid gt Explicitly set the node routing cookie to a dedicated node e unbind Remove the node routing cookie e clientinfo For troubleshooting purposes all details about the request are presented 6 3 Example configuration In the following we outline the configuration of an enterprise system with haproxy_1 6 0 available via http www haproxy org as a reverse load balancing proxy The configuration should be seen just as a working starting point there are literally dozens of proxy configuration options and tuning parameters which might need to be adjusted to derive a production ready configuration variant 6 3 1 enterprise constellation We will use an enterprise clustered system consisting of three nodes Each node has two connectors a HTTP user connector and an admin connector which uses SSL but is terminated by the proxy Nodeld Hostname User port Admin port Node_1 nl acme com 8001 8101 Node_2 n2 acme com 8002 8102 Node_3 n3 acme com 8003 8103 We assume that the proxy will be reachable v
77. les where profile select profile from dba_users where username EP_USER e Check the users account state select username profile account_status expiry_date from dba_users where username EP_USER e Unlock a users account alter user EP_USER account unlock e Unexpire an account or change a users password alter user EP_USER identified by lt password gt Hint If you got the message Could not get Session ID Probably no right on V SESSION you have to do following steps in Oracle 1 Login as sys sqlplus sys as sysdba 2 Assign grant grant select on v_ session to EP_USER 2 1 DATABASE PREPARATION If you use full text search the IndexRefreshTimer needs an additional right grant execute on ctxsys ctx_ddl to EP_USER If the use of full text search or W XML2 functionality is intended with Oracle as the under lying DBMS you must select the Oracle LOBs database type in the configuration and not the legacy mode with Oracle LONGs Since Oracle supports just one LONG column per table the tables for WfXML2 functionality will not be generated when LONGs are used instead of LOBs Oracle offers the possibility to set the semantic of varchar varchar2 datatypes BYTE or CHAR The decision of setting the correct type could be necessary if UTF 8 texts should be stored An example could be that a field has a length restriction of 100 characters and the text to be stored contains 100 characters with 2 umlauts Because of U
78. m level enterprise has different loggers which can be customized here with a list separated by semicolons It is possible to increase or decrease the trace level for a logger like in following example com groiss serviet Dispatcher ERROR com groiss store impl StoreEJB DEBUG All other loggers use the default settings Application loggers logger application packages Define a comma separated list of application loggers as package class logger name e g com groiss itsm means that all logging actions of this package are using the System loglevel Length of tail logger tail length This parameter defines how much rows are dis played by default at the end of a log file via GUI see Admin tasks gt Server gt Logging Max filesize logger max filesize This option can be specified in bytes kilobytes megabytes or gigabytes by suffixing a numeric value with KB MB and respectively GB For example 5000000 5OOOKB SMB and 2GB are all valid values Number of configuration backups keep conffiles This parameter defines how many backups of the configuration files avw conf and self defined configuration files should be kept If saving the configuration via GUI a backup file will be created in the appropriate folder where the configuration files exist Authorization Class HttpdAuth class enterprise allows the usage of different authorization mechanisms The Java class used is specified here The default class part of the d
79. n More information can be found in section 3 11 1 WebDAV authentification class webdav auth class Here you may specify an im plementation of interface com groiss servlet WebDAVAuth More information can be found in section 3 11 1 Check Referer header ep check http referer When the referer check is enabled the Dispatcher does not permit requests if the Referer header is missing from the HTTP request or when it does not match the request A Referer header matches the request if the base part of the request URL consisting of protocol scheme host port and context root is a prefix of the Referer Methods and classes marked as public via interface com groiss servlet Public or annotation com groiss servlet Access mode Public are never subject to the referer check Exemptions from Referer check ep check http referer exempt Additional ex emptions from referer check can be configured here A basic set of such method and class names is stated as default value of the configuration parameter Removal of el ements from this default list is not recommended it must be done with great care to avoid application lock out 47 3 15 PASSWORD POLICY 3 15 Password policy The parameters in this section are separable in 3 main groups which are explained in the following paragraphs Note No parameter of these groups is needed to be set quite the contrary is recommended If a too strict password policy is establish
80. ned by select DF Name File_Name FS Phyblkrd Blocks_Read FS Phyblkwrt Blocks_Written FS Phyblkrd FS Phyblkwrt Total_lOs from V FILESTAT FS VEDATAFILE DF where DF File FS File order by FS Phyblkrd FS Phyblkwrt desc A 4 2 Parameters for Tablespaces Appropriate default storage parameters for the tablespaces would be alter tablespace AVW default storage initial 256k next 256k maxextents 200 pctincrease 0 Instead of AVW state the tablespaces which are used to store the enterprise tables and in dexes in particular the default tablespace of the enterprise database user For some tables which can be assumed to have a greater size than that SOMB like AVW_STEPINSTANCE 85 A 5 ONE OWNS TABLES AND QUERIES AVW_FOLLOWS and AVW_FORMVERSION the storage parameters can be changed in full operation mode e g alter table lt mytable gt storage next 1M maxextents 1200 With this statement table lt mytable gt can use 1000 additional extents each being 1 MB in size when one assumes that 200 extents were already used It is generally advisable to use zero as value for pctincrease to avoid exponentially increasing storage demand for extents A 5 One owns Tables and Queries For own tables which are used to store application relevant data exactly the same con siderations like for system tables according to table placement and to storage parameters should be made In particular popular access paths should be supported
81. network and database connectivity and JVM e installation of a single nonclustered enterprise system e selection of the appropriate transport mechanism for the cache coherence service its configuration and startup if necessary e distribution of the enterprise installation directory to the nodes e adapting the enterprise configuration e starting the nodes Details for each of the steps can be found in the following sections 5 3 1 Platform Configuration The nodes of an enterprise cluster can run on a heterogeneous platform as far as the hardware and operating system is concerned While it is also possible to use different versions of the JVM JDK it is strongly recommended to use the same principal version for each node If your installation must use different versions intense testing is strongly advisable The requirements for the minimal technical layout of the nodes do not differ from the layout of a single machine A possible exception are the network interface requirements It may be advisable to use different physical network interfaces and interconnections for client connections database connections and possibly for the cache coherence service 62 5 3 CONFIGURING A CLUSTERED ENTERPRISE SYSTEM 5 3 2 Installation of a nonclustered System No special issues are arising here because of the cluster Just install a plain enterprise system and make sure that it is working 5 3 3 Transport Mechanisms for Cache Coh
82. ntextpath where enterprise is deployed So you would end up with a file named conf Catalina localhost ep90 xml In this file specify the datasource as a resource within the context element lt Context gt lt Resource name jdbc DerbyDB auth Container type javax sql DataSource factory org apache tomcat dbcp dbcp BasicDataSourceFactory maxActive 12 username derby password derby driverClassName org apache derby jdbc ClientDriver url jdbc derby localhost 1527 ep create true gt lt Context gt The value of the name attribute must match the path of the datasource in the enter prise configuration file The value of attribute factory can be also org apache tomcat dbcp dbcp depending on your Tomcat version Details for the other parameters can be found in the Tomcat documentation 4 The following step may not be needed Include the reference to the resource in the web xml descriptor of enterprise application lt resource ref gt lt description gt DB Connection lt description gt lt res ref name gt jdbc DerbyDB lt res ref name gt lt res type gt javax sql DataSource lt res type gt lt res auth gt Container lt res auth gt lt resource ref gt The content of the resource ref name element must match the path of the datasource in the enterprise configuration file 5 Restart Tomcat start the enterprise application and begin to setup enterprise 8 3 Configuration of a Datasource in Jetty 6 1
83. nts as mentioned above 58 4 5 MIGRATION OF DEPRECATED DBMS DATA TYPES select alter table table_name modify column_name case when data_type LONG then CLOB when data_type LONG RAW then BLOB else ERROR end default empty_ case when data_type LONG then CLOB when data_type LONG RAW then BLOB else ERROR end as command from user_tab_ columns where table_name like AVW9 or table_name like FORM9 and data_type in LONG LONG RAW order by table_name column_name 4 Perform the alter index statements which have been created in step 2 to rebuild the indices 4 5 2 Migration of deprecated MS SQL Server data types Since MS SQL Server 2005 Microsoft has been set some data types to deprecated and replaced them by new ones The following list contains the deprecated and the appropriate new data types e text has been replaced by varchar max e ntext has been replaced by nvarchar max e image has been replaced by varbinary max Existing installations can continue to use the old data types but new installations should use the new data types This section describes the recommended migration steps for existing installations with MS SQL Server 2005 and newer Hint Please note that the migration is at your own risk and can take a long time 1 Backup your old database 2 For each table which contains one of the previous menti
84. nward datasources are an alternative way to obtain database connections 8 1 Configuration of a Datasource in enterprise To use a datasource in enterprise the JNDI path of the datasource must be specified instead of the JDBC URL Instead of e g jdbc derby localhost 1527 ep create true use something like jdbc DerbyDB If the datasource path starts with it will be looked up in the initial JNDI context without the prefix If not it will be looked up in the java comp env subcontext of the initial JNDI context When using the datasource it is not needed to provide a JDBC driver or to fill in the following configuration items e Database Userid e Database Password The other database related configuration items are still needed and used 8 2 Configuration of a Datasource in Tomcat This section describes how Tomcat can be configured 1 Put the JAR file of the JDBC driver into the lib directory of Tomcat 2 Deploy the enterprise WAR file e g using ep90 as the contextpath 3 Go to conf lt service gt lt host gt directory and put a lt contextpath gt xml file there 77 8 3 CONFIGURATION OF A DATASOURCE IN JETTY 6 1 e lt service gt The name of the Tomcat service as in the service element in the conf server xml file usually Catalina e lt host gt The name of the Tomcat host as in the host element in the conf server xml file usually localhost e lt contextpath gt The co
85. nything here the server will use the following default locales en_GB en_US de_DE de_AT and de_CH Language Locale language Defines the language for the user interface Language is defined in ISO language code for example de for German Country Locale country ISO country code for example AT for Austria Variant Locale variant A default variant to use You can define free variants in the list of locales e g regions companies etc Decimal format avw decimal format Define a decimal format as described in JAVA APIDoc Decimal separator avw decimal separator Set the separator for floating point numbers default is Decimal grouping separator avw decimal grouping separator A separator for e g thousand delimiter can be defined here see Java APIDoc for more details Date format DateFormat Format mask for date input and output See the table below for a description of the possible values Date Time format DateTimeFormat Format mask for date and time Default unit for displaying time intervals calutil defaultunit Default Unit in seconds minutes hours days and weeks Applet look and feel applets lookandfeel Specify the look and feel of the process editor values are metal or windows Max table length table maxsize Specify a natural number For tables of size greater than this number the user is asked before the table is shown Items per page table pagesize This defines the max
86. o the new framework Since enterprise 8 0 the new framework from Tanuki Software is used the old one was JavaService from objectweb org Using the new framework has the following benefits e No restart problems under Windows 2003 e Startup parameters can be changed easily in a plain textfile via services wrapper conf there is no need for registry manipulation e Threaddumps can be captured to the logfile of the new service framework 15 2 3 INSTALLING A SERVICE sendsignal exe in services dumps into services wrapper log Obey following steps to migrate to the new framework 1 Save the older service definition Using regedit go to HKLM System CurrentControlSet Services lt ServiceName gt and export this subtree to a file say epserviceold reg 2 Edit the wrapper conf file Use the corresponding entries from the saved registry entries as a guideline here e Specify the Java directory Replace javadir_placeholder in the following line with the directory containing the desired java version wrapper java command javadir_placeholder bin java e Adapt the classpath Replace classpath_placeholder in the following line with the desired classpath wrapper java classpath 2 classpath_placeholder e Memory size The value of the Xms and Xmx parameter of the JVM for heap sizing can be specified in the following way Initial Java Heap Size in MB wrapper java initmemory 32 Maximum Java Heap Size in
87. ode Activate this checkbox if forms in reporting result should be opened in edit mode Search delay for ObjectSelects ms objectselect search delay This delay is used in ep widget ObjectSelect if a value is entered If the delay period is over the entered value as yet is sent to the server With the following parameters the system s performance can be influenced Worklist Cache avw wlcache state Specify whether the worklist cache should be used Activated means that the cache is used Started but not active means that data structures are maintained but the cache is not used for worklist construction Switched off means that the cache is not used and data structures are not maintained Do not cache seen objects avw wlcache exemptseenobjects If this checkbox is activated seen objetcs will not been cached anymore and read from database Do not cache user folders avw wlcache exemptuserfolders If this checkbox is activated user folders of personal worklist will not been cached anymore and read from database Defer loading of finished parents avw wlcache parents defer missing If checked loading of missing parents for finished parfors scopes processes can be deferred Reload classes avw class reload Reloads classes without server restart if possible This should be used only in development environments Statement statistics avw stmt statistics Creates statistics of database statements If enabled you will se
88. odically writes a timestamp to the database Used to monitor cluster nodes During normal operation there is 66 5 4 OPERATION OF A CLUSTERED SYSTEM exactly one update of a single row followed by a commit per heartbeat and node The heartbeat mechanism uses a dedicated database connection when more than five database connections have been configured for the node eliminating hold ups from finding a connection and overhead from frequently releasing and reacquiring the con nection Recommended periods are in the range of 3 to 10 seconds Because of these short heartbeat intervals it is recommended to use a dedicated timer thread by assign ing a unique thread id e g heartbeat to the timer This avoids the possible delay of the heartbeat by other longer running timers thereby getting the heartbeat info to the database as fast as possible ClusterCheck Should be running on each of the nodes Periodically checks health state of the cluster Recommended periods are in the range of 120 to 600 seconds There are two aspects to check for First if a node fails to update its timestamp within the tolerance time defined in the Clustercheck Tolerance parameter its state is set to not running Second if none of the nodes runs the timers which are started just once for the whole cluster one node must assume this role 5 4 Operation of a clustered system 5 4 1 Monitoring A cluster health monitor which displays the state for each of the no
89. of any length and produces a 256 bit hash output SHA is said to be secure and is the default value if nothing is configured Unix Crypt Is limited to 8 bytes input that means 8 characters so it is not recommended to use Unix Crypt furthermore Nevertheless to ensure compati bility it is supported further on SHA 1 Secure Hash Algorithm Takes a plain string of any length and pro duces a 160 bit hash output It is not recommended to use this algorithm any more due to vulnerability MD5 Message Digest 5 Takes a plain string of any length and produces a 128 bit hash output MD5 is said to be secure and calculates the hash value faster than SHA 48 3 15 PASSWORD POLICY 3 15 2 Default Policy Checker Settings The release is delivered with a default password checker which ensures proper passwords and which is highly configurable If you need extended configuration options it is possible to implement a special password checker The following parameters of the default checker can be changed to specify the minimum requirements for a password The default values are 0 Minimal length of password passwdpolicy min_length Specifies the minimal length of a password As an example if the parameter is set to 8 the password soccer is not accepted but icehockey is Recommended 4 Maximal length of password passwdpolicy max_length Specifies the maximal length of a password As an example if the parameter
90. one server Jetty 14 oo Insialline a Serye oere a kd he Ge he a ER Ea ee eae ES 15 2 3 1 Components of the Framework o 15 2 3 2 Migrating to the new framework 15 2 4 Using an Application Server or Servlet Container 17 2 5 Basic considerations for backup and recovery 18 3 Configuration 19 SA MER nk ew ha he ke ark RE OS AR EDA Rees bake ee 21 3a a one be ee ee eee eRe A ek ee a ae ek 21 3 2 1 Defining Allowed and Denied Hosts or Networks 24 Bice PCC LOMO 6 6 uc cee a a we G 24 2 DIA dsd re ee ew A ae a a Be He ee 27 24 Directories 22 44 04 caed a be eae BA b aed de oS 28 Jo GEBME oia babe bebe SE oe bh hae edhe 30 Due Clages o ke RA OE LEAR AERA eee da aE SG 31 Ao li ac x a ta epia Meee Ma eee ka dele tee balsa 32 D8 COMICIOS cocacola ba a 34 ID RIOR A ee a a 37 310 Workhow oa e suea ees eee Bow in Se ee ee ah gray eb a 37 CONTENTS 3 11 342 313 3 14 3 13 3 16 3 17 3 18 3 19 3 20 4 1 4 2 4 3 4 4 4 5 5 1 5 2 3 3 5 4 6 1 6 2 MOM oo bce baud ek ee ee ee A PR ed ew Ge WUE e e ek el ave Bs ee a a a We ee ie eS Solid AECID pr ra A eS eee a ee ES MOUs dw daa ra Guta ea dea Bie dow OG doe a ea as R Password PONCY gt 45 25 ea Gawd amp Bebe ea 8 a a wa BS 3 151 General Policy Settings eek a a i 3 15 2 Default Policy Checker Settings o 2153 Your Own Checker Class eoe
91. oned data types an alter table statement must be performed like in following way e alter table lt tn gt alter column lt textcolname gt varchar max e alter table lt tn gt alter column lt ntextcolname gt nvarchar max e alter table lt tn gt alter column lt imagecolname gt varbinary max It is a little bit cumbersome to get the affected tables For this purpose the following query helps to get a list of affected tables wrapped in executable alter table statements as mentioned above 59 4 5 MIGRATION OF DEPRECATED DBMS DATA TYPES select alter table table_name alter column column_name case when data_type text then varchar max when data_type ntext then nvarchar max when data_type image then varbinary max else ERROR end Tas as command from information_schema columns where table_name like AVW9 or table_name like FORM9 and data_type in text ntext image order by table_name column_name 60 5 Clustered enterprise System 5 1 Overview and Principles of the Clustered Architecture The clustered architecture supersedes the previous distributed architecture The aim of the new architecture is to allow for e increased scalability e increased availability e easier configuration e more flexible operation H HTTP JMS JGroups Multicast Engine Cluster DB Cluster P JDBC Figure 5 1 Cluster Architectu
92. only Cache is consulted only positive results are in serted Full Cache is consulted all results positive and negative are inserted into cache ACL list Max number of OIDs in IN Clause acl list target splitsize The split size for the target set of an ACL list query If the size of the target set is not greater than the split size enterprise can filter by using a SQL IN Clause with the target oid s otherwise a more general filter will be used which may result in a larger result set for that query In both cases a single SQL statement will be executed Please note that there are database specific restrictions concerning the number of literals within an IN Clause and also the textual length of an SQL statement ACL list Always restrict by OID for the following classes acl list target splitclasses A comma separated list of fully qualified class names For those classes the target set should be splitted so that more than one SQL statement will be executed which always filter by target oid s using an IN Clause This is useful if a lot of object specific permissions exists for such a class so that the more general filter would cause a huge result set KeyStore file ssl keystore The Java KeyStore is a binary file which holds the keys and certificates of the system and the certificates of trusted organizations so called trust anchors The KeyStore is the central database for certificate management Ensure that there
93. onnectionFactory Java class name for the topic factory of the JMS provider For ActiveMQ this is ConnectionFactory J MS Topic The name of the topic used for communication Such topics must typi cally be created within an JMS provider by the administrator For ActiveMQ this can also be a dynamic topic like dynamicTopics avw JMS Time to Live ms The JMS provider is free to throw away messages which are older than this timespan Should be in the range of 30 to 120 seconds Unsyn chronized clocks on participating systems might inhibit proper message transfer e JMS Username Name of the user which is utilized for communication with the JMS provider If this parameter is left empty an anonymous connection is established User administration is specific for each JMS provider e JMS Password Password for the user mentioned before More than one cluster can use a JMS provider if the names of the topics are kept unique for each cluster Do not use the same topic name for client notification via JMS and for client notification if you are using the same physical provider for both purposes 5 3 4 Adapting the enterprise Configuration Configuration Under Configuration Classes Services an entry for the cache coher ence service must be added as the last service com groiss dbcache coherence CoherenceService cs The following configuration entries are needed in a clustered node under Configuration Cluster or avw conf e Clusterin
94. outlined above on the host enterprisewf acme com example configuration of haproxy 1 6 0 as reverse loadbalancing proxy in front of a cluster global description cluster run in background 72 6 3 EXAMPLE CONFIGURATION daemon user and group ids for execution environment user haproxy group haproxy empty unwritable jail dir for chroot chroot some_dir max number of connections per process maxconn 1024 logging definition log 127 0 0 1 local1 notice base directory for ssl stuff crt base var haproxy cnf defaults operating mode layer 7 inspection mode hitp continuously update statistics enable for testing small performance impact option contstats health checks are logged only when state of server changes can be enabled in production too option log health checks timeouts should be adjusted to match network and beackend configuration timeout connect 5s timeout client 30s timeout server 30s use a long timeout for bidirectional tunnel traffic e g websockets timeout tunnel 1h use default mode changed in 1 6 option http keep alive add x forwarded for header option forwardfor use logging definitions from global section log global listens on port 80 for incoming http requests user connector frontend http in description user port 80 bind 80 default_backend ep workers listens on port 443 for incoming https requests admin connector frontend
95. patch archive file to the patches folder of the installation 4 Optionally check the effects of the patch archive prior to applying the patch The system administration provides a function in the System Control section This is especially handy to identify files that have been overwritten in the local installation If there are any clashes you will have to make sure that your local changes are not lost by manually reapplying them after the patch action or by updating the local files according to the changes in the original base files 5 The patch procedure can then be initiated by e If you are using enterprise in standalone mode Jetty you have to start the server with the upgrade option 55 4 2 UPGRADING PATCHING AN ENTERPRISE APPLICATION e If your installation runs in an application server e g Apache Tomcat use the provided patch script upgrade bat upgrade sh to apply the patch Please note your application server or at least the enterprise application must not be running while applying the patch 6 After the patch has been successfully applied the patch archive will be moved to the corresponding backup folder 4 2 Upgrading Patching an Oenterprise Application Applications in enterprise can be kept up to date using the same mechanisms as for the base system itself The upgrade patch of an application contains of a set of files which must be replaced in an installation enterprise also offers the possibility
96. pe it yourself Use smart search algorithm for multi field searches list smartsearch If acti vated it will be searched globally in all specified fields of a table by using OR joins This parameter takes effect on short search in select list and select table DOJO object select short search in object table e g enterprise administration master data tables short search in form table short search in select list of function Change Agent Example The search fields are firstname and surname of the user table In short search field of the user table the string Roland Eisenberg has been entered The sq l condition would be following lower firstname like Roland or lower surname like Roland and lower firstname like Eisenberg or lower surname like Eisenberg It is also possible to activate deactivate this behavior for each table by setting follow ing attribute in configuration file e g myappl xml 43 3 13 TUNING 3 13 Tuning lt Attrib key smartSearch value true false gt Show time in date conditions avw reporting showTimelnDateConditions If ac tivated date and time for datefields on process document searchmask and Reporting condition mask can be entered and on all these masks the appropriate checkbox is activated by default If this checkbox is deactivated only the date can be entered as value without time Open forms in edit mode avw reporting openFormLinksInEditM
97. precated DBMS data types 4 5 1 Migration of Oracle data type LONG This section describes the migration steps for existing Oracle 9i and newer installations because since Oracle 9i LONG is deprecated Existing installations can continue to use the old data types not recommened but new installations should use the new data types Following steps must be performed for migration Hint Please note that the migration is at your own risk and can take a long time 1 Backup your old database 2 Write down the indices of the affected tables Following query helps to get a list of the affected indices wrapped in executeable alter index statements select alter index index_namel rebuild as command from user_indexes where table_name in select table_name from user_tab_columns where table_name like AVW9 or table_name like FORM and data_type in LONG LONG RAW order by index_name Do not execute the alter index statements in this step 3 For each table which contains one of the previous mentioned data types an alter table statement must be performed like in following way e alter table lt tn gt modify lt longcolname gt clob default empty_clob e alter table lt tn gt modify lt longrawcolname gt blob default empty_blobQ It is a little bit cumbersome to get the affected tables For this purpose the following query helps to get a list of affected tables wrapped in executable alter table stateme
98. prise in a Load balancing Reverse proxy environment Basic constellation ee Main technical considerations 0 0000 ee eee 6 2 1 HTTP session binding sticky sessions 6 2 2 HTTP session failover 6 i ek ee a 6 2 3 Node election at initial session creation 54 54 54 55 56 56 57 57 58 58 59 61 61 62 62 62 63 63 65 67 67 68 68 CONTENTS 6 3 6 2 4 SSL termination in Proxy 2 2 5 ewe eee ee es 6 25 Transparent view forthe clients 2 6c ek o 6 2 6 HTTP header transformation by the Proxy 6 2 7 Configuration considerations for enterprise 62 8 Special TUNCHONS e s d es a ge a eee Le wes Example configuration o 6c ina ee a ee A 6 3 1 enterprise constellation 6 3 2 Preparation Proxy building and SSL aspects 6 3 5 Prozy COM PUCADON 2 2 2 2444548 4 de ea a a eo 6 3 4 Operation of haproxy 2 2 2 2 4 2548453 4524 44 24 ea ES 7 Setting up an Archive Schema 8 enterprise and Datasources 8 1 8 2 8 3 8 4 A l A 2 A 3 A 4 AS Configuration of a Datasource in enterprise Configuration of a Datasource in Tomcat o ooo Configuration of a Datasource in Jetty 6 1 Considerations for pooled Datasources o Database Performance Hints under Oracle e AAN Key Operating Parameters of the Database
99. provide all features of the enterprise pool itself session environment automatic reconnect This strategy imposes two requirements for a pooled datasource e It should never expect to get the connection back or destroy connections in use In a DBCP connection pool this can be implemented via removeAbandoned false e The pool size should be large enough to provide the max number of connections specified in the enterprise configuration see chapter 3 increased by at least 2 for internal connections used by the engine itself 80 A Database Performance Hints under Oracle A l Preliminaries The statements in this chapter refer to an enterprise installation with an Version 8 Oracle DBMS It is assumed that no atypical characteristics concerning either data distributions or data volumes or transaction volumes like extremely long worklists or BLOBs dominate the system Further we assume that no other significant workload besides the enterprise service is processed on the system dedicated hardware For successful performance improvements the most crucial issue is to correctly identify and pinpoint system bottlenecks Applying tuning actions without having a specific hint about the kind or reason for unacceptable performance is not target oriented It is essen tial to isolate and contain the problem area database enterprise server CPU memory network own application classes specific user operations One should apply
100. r IP address but for SSL port Client certificates for HTTPS sl_requireclientcertificate This parameter deter mines how a secure SSL connection can be established by a client There are three possibilities Are not requested If this option is selected SSL connections are established in any case Are required If this option is selected SSL connections are established only if the client has a valid certificate for authorization Are requested If this option is selected the establishment of SSL connections depends on the content of the response if the response contains a valid client certificate the SSL connection is established automatically if the response con tains no valid client certificate a login mask will be displayed to the user and after a successful login the SSL connection will be established Administrative IP port httpd admin port This port is used for administrating enterprise a admin session will be created which is necessary to execute admin istration functions If no port is defined the current user is already logged in and if he want to change to administration he will be requested to log in again for getting admin session 21 3 2 HTTP SERVER e Administrative IP address httpd admin ip address Define an own IP address for administration The behaviour is analog to parameter Administrative IP port e Use SSL for administration httpd admin usessl If activated the Administrativ
101. re Figure 5 1 shows the principal layout of such a cluster The logical architecture consists of a set of enterprise engines termed nodes which access a common database and are operated in a peer to peer mode to a large extend A load balancing mechanism is employed to ensure even load distribution within the cluster Consistency between the caches in the nodes is ensured by a cache coherence service 61 5 2 CLUSTER AND NODES While there are no single points of failure within the cluster nodes we require the database to be available and scalable to an extend that imposes no bottlenecks for the rest of the system 5 2 Cluster and Nodes As already mentioned a node is a single Java Virtual Machine instance In a typical pro duction environment there will be one node running on a single physical machine In a development or test environment more than one node could be running on one machine without enhanced scalability and availability The cluster is represented by a single entry in the Server section of the administration Each node is identified by a Node Id which must of course be unique within the cluster Nodes can enter and leave the cluster at runtime New nodes can be added to the cluster on the fly 5 3 Configuring a clustered enterprise System The clustering of an enterprise system will typically comprise of the following actions e configuration of the underlying platforms in terms of hardware operating system
102. rganized as an expirable and size bounded LRU cache The items have a maximum lifespan associated with them If an item has been found in the cache but has expired its lifespan it is removed from the cache and is reported as being not in the cache This behavior ensures that cached right checks do not become unduly 45 3 14 SECURITY outdated The value lifespan is configurable whereas the default value is 5 minutes The cache has also a maximum number of cached elements associated with it If this num ber would be exceeded by the insertion of a new cached item the least recently used item is removed from the cache thereby ensuring a size bound while providing good hit rate Actually there are two caches one which stores acl entries for specific objects and one which stores acl entries for classes The parameters for size and lifespan can be configured separately for those two caches 3 14 Security Use partition optimized query for permission checks acl separate targetquery ACL evaluations can be tuned by using separate queries for objectscope 3 versus objectscope lt gt 3 For this purpose activate this parameter ACL list Permission Cache integration acl list cache usage This parameter al lows to define how ACL list interacts with ACLCache Following options are avail able None List does not interact with cache Check only Cache is consulted no results are inserted into cache Insert positive results
103. rse proxy 6 1 Basic constellation A cluster consists of several enterprise nodes each with its own unique node id Each node provides HTTP S services to users addressed via a host name port combination re spectively an ip address port combination All nodes together comprise the cluster which is somewhat confusingly for historical reasons and called the Server Installing a reverse proxy between the nodes and the clients strives to implement three main functions e Providing a node transparent view of the enterprise system e Load balancing e SSL termination 6 2 Main technical considerations 6 2 1 HTTP session binding sticky sessions In an enterprise cluster requests for a client in the scope of a session need to be bound to an arbitrary but particular node So enterprise needs a proxy that supports session binding also called sticky sessions or persistent sessions A session in enterprise is conveyed in the form of a session cookie which name is lt serverid gt _EPSESSIONID In order to provide session binding to nodes a second cookie is issued This routing cookie is named lt serverid gt _EPNODEID its value is the node id of the node the session is bound to It is set at login time and deleted at logout time The proxy must be configured to honor the node id cookie inasmuch that incoming requests providing the cookie must be routed to the corresponding node 69 6 2 MAIN TECHNICAL CONSIDERATIONS
104. rvice directory 2 4 Using an Application Server or Servlet Container If you want to run enterprise in an application server e g IBM s WebSphere or a servlet container e g Apache s Tomcat you need the enterprise web application archive file named ep90 war which is especially prepared for this purpose Deploy this file in your server Afterwards open your browser and navigate to http host port context root where host and port must be the right values for accessing your server and context root is the context root that you chose when deploying the file See section 2 2 step 8 for details about the rest of the installation Hint The database name of the Derby JOBC URL the ep part in jdbc derby ep create true in embedded mode is relative to either the current directory or relative to the directory speci fied in the derby system home system property if this is present In a scenario of deploying multiple enterprise systems as different web applications in one servlet container with each of the systems using a dedicated embedded derby instance use unique path names to the database files per web application e g jdbc derby databases app1 derbydb create true and jdbc derby databases app2 derbydb create true If Tomcat is used as Servlet Container and UTF 8 encoding should be used you have to set following attributes in Tomcat s server xml e URIEncoding UTF 8 e useBodyEncodingForURI true Typically lt
105. s for enterprise are provided in the form of patches The main starting point for obtaining such patch files is our download area reachable via http www groiss com download html Patches are also available via the Application repository described in section 4 4 There are two alternative ways to incorporate the patches in your installation We will first describe the manual procedure and then go into the details of the automatic patch facility 4 1 1 Manual Patch Method An enterprise patch consists of one or more files Those patched files should replace the corresponding files in the appropriate directories of the installation Further the patch files may include a procedure to accomplish maintenance steps on the database The following steps should be performed 1 Stop the server 2 To play it really safe backup the database and the installation files 54 4 1 PATCHING THE INSTALLATION 3 Copy the patch files into the corresponding target directories 4 Start the server with the upgrade option Any required database steps will be per formed 5 Start the server again without the upgrade option 4 1 2 Automatic Patch Method To apply patches to an enterprise installation or enterprise application a automatic mechanism can be used The mechanism is based on patch archives which can be obtained by visiting our download area at http www groiss com download html There you can find a cumulated patch allowing you
106. s the size of the database block buffer caches in units of blocks It is an extremely crucial parameter The default values of Oracle are way to small For an application system with the characteristics of enterprise mostly interactive users in OLTP insignificant batch processing one should configure the cache size to achieve a hitrate above 95 to 98 in regular operations Regular monitoring is essential One could apply the following queries as user SYSTEM to determine current hit rates select SUM DECODE Name consistent gets Value 0 Consistent SUM DECODE Name db block gets Value 0 Dbblockgets SUM DECODE Name physical reads Value 0 Physrds ROUND SUM DECODE Name consistent gets Value 0 SUM DECODE Name db block gets Value 0 SUM DECODE Name physical reads Value 0 SUM DECODE Name consistent gets Value 0 SUM DECODE Name db block gets Value 0 100 2 Hitratio from V SYSSTAT column HitRatio format 999 99 select Username Consistent_Gets Block_ Gets Physical_ Reads 100 Consistent_Gets Block_Gets Physical_Reads Consistent_Gets Block_Gets HitRatio from V SESSION V SESS_lO where V SESSION SID V SESS_IO SID and Consistent_Gets Block_Gets gt 0 and Username is not null If an unsatisfactory hit rate is measured DB_BLOCK_BUFFERS should be increased in steps of 15 to 25 until hit rate levels out Meaningful measurements are only possible
107. sers have the right admin or customer DENY Deny everything from everywhere Semantics The validation of a list of rules in the Access Control property is as follows If the property is empty nothing is filtered Otherwise all rules are checked in the order they are defined until a rule matches according to IP specifier and URL prefix For a matching rule the validation depends on the set of rights of the rule We distinguish two cases e Existing Session user already logged in The intersection of the rights of the user and the rights given in the rule is computed If the intersection is empty access is denied an exception is thrown else the rule succeeds and access is granted e No Session user not yet logged in If the set of rights of the rule consists of a single DENY element then access is denied an exception is thrown else the rule succeeds and access is granted If no rule at all matched access is granted This can be avoided if the last rule is DENY Other Operational Considerations Access Control gets reconfigured if the configuration is changed This is also logged at log level 1 to allow one to find incorrect rules Normal operations of Access Control are logged at log level 3 Access Control is not automatically aware of additional rights given to a user or role or to the revocation of rights from them In order to know about the constellation the affected users must log out and log in again or th
108. server the PgAdmin III gui or the psql com mand line can be used to e Create a User Account Login Role in Postgres Terminology CREATE ROLE ep LOGIN PASSWORD eppasswd NOINHERIT VALID UNTIL infinity e Create a Schema the id of the schema and of the role must be identical CREATE SCHEMA ep AUTHORIZATION ep To activate support for the soundex search use the following command the fuzzystrmatch sql file is located in the share contrib directory psql U postgres dbname lt fuzzystrmatch sql 11 2 2 EXTRACT AND INSTALL 2 1 5 Derby Derby doesn t need any preparation Derby is perfectly suited for development purposes and test deployments For heavyweight multiuser installations the use of Derby may not be advisable 2 2 Extract and Install This section describes how to install the enterprise stand alone server enterprise is distributed on CD or can be downloaded from our web site It is packed in one single file named setup90 jar The installation can be started with a double click on the file The installation of a Java JRE 1 7 or higher is required If jar files are not associated with Java on your machine or if you don t have a GUI available please start the setup on a command line java jar setup90 jar The setup process consists of the following steps 1 Verify if this is the version of enterprise that you want to install and start the setup by clicking on OK 2 Specify the dire
109. ster_ EPNODEID nocache default server inter 10s weight 10 lt Nodeid gt lt ip admin port gt cookie lt Nodeid gt check server Node_1 n1 acme com 8101 cookie Node_1 check server Node_2 n2 acme com 8102 cookie Node_2 check server Node_3 n3 acme com 8103 cookie Node_3 check admin connector for haproxy console listen admin description Administrative Overview user port 10001 on all interfaces bind 10001 stats enable default uri is stats uri haproxy stats 74 6 3 EXAMPLE CONFIGURATION stats uri stats realm HAProxy wfm 1 Statistics stats show legends username password stats auth admin admin stats admin if TRUE 6 3 4 Operation of haproxy The haproxy server process can be started via haproxy f lt configfile gt but of course it should be integrated into the startup sequence of your server An brief dashboard of the current state of the cluster according to the haxproy server can be obtained via http enterprisewf acme com 10001 75 7 Setting up an Archive Schema Large amounts of data can decrease the performance of enterprise With the archive schema we provide a mechanism to move finished processes to another database schema This can speed up database operations In the current version of enterprise the archive schema is supported only for Oracle It works as follows A separate database schema is used to store historic data from the three tables avw_stepinstance avw_forminstance an
110. t 9 999 999 990 column Data Dictionary Gets format 9 999 999 999 column Get Misses format 9 999 999 999 column Ratio format 999 99 select sum pins Executions sum reloads Cache Misses Executing sum reloads sum pins 100 Ratio from v librarycache select sum gets Data Dictionary Gets sum getmisses Get Misses 100 sum getmisses sum gets Ratio from v rowcache If higher mis rates are measured we advise a similar procedure like in the case of the DB_BLOCK_BUFFERS parameter SORT_AREA_SIZE Size of the area in the main memory which is reserved for each user for in memory sorting operations If disk based sorts make up for more than 5 to 10 of the in memory sorts then SORT_AREA_ SIZE should be increased The current configuration can be determined with 83 A 3 OPTIMIZER select substr name 1 25 Name substr value 1 15 Value from VEPARAMETER where Name sort_area_size Statistics about the number of sorts separately for main memory and disk based sorts are implemented by select substr name 1 25 Name substr value 1 15 Value from VESYSSTAT where name like sort LOG_BUFFER Size of the redo log buffer in the SGA The current size can be obtained by select substr name 1 25 Name substr value 1 15 Value from V6SGA where Name Redo Buffers If redo log space requests are issued in the database there might be a bottleneck here The following query investigates
111. ted by default 39 3 11 DMS e Used ports for OpenOffice connection ep openoffice ports Alternative to named pipes connection a connection via ports socket connection can be used For this purpose a port or a comma separated list of ports must be entered and the checkbox Use named pipes to connect to OpenOffice must be deactivated The default port is 210 e Support conversion to Office Open XML types docx xlsx etc ep openoffice support office open xml Activate this checkbox if function Gener ate document in DMS is used to create Office Open XML types This parameter is inactive by default because LibreOffice does support these types only Files ignored in zip upload ep dms zipupload ignore Enter a comma separated list of path names which are ignored by DMS function Zip upload Allowed are also and as wildcards The whole path is always compared case sensitive i e if you want to hide directory xx and its content you have to enter xx 3 11 1 Edit Microsoft Office Documents via Browser Via WebDAV it is possible to open Microsoft Office Documents in read write mode when clicking on a document link in the browser Therefore the new enterprise GUI will use the browser plug in that will be automatically installed if Microsoft Office is installed on your computer For using that feature two aspects must be configured 1 activate the usage of the plug in 2 configure user authentication Plug in activa
112. this select substr name 1 25 Name substr value 1 15 Value from v sysstat where name redo log space requests The value should approximate zero If this is not the case one should increase the LOG_BUFFER parameter in steps of 50 to 100 It might be advisable to increase the shared pool size by the same absolute amount A 3 Optimizer Cost based optimization is the way to go with Oracle In general better query plans can be generated than pure rule based optimization could achieve To activate the cost based optimizer the parameter OPTIMIZER_MODE in init ora must be set to CHOOSE It is also necessary to statistically analyze the data distribution and index selectivity Oracle offers commands of the form analyze table lt mytable gt compute statistics One can supplement statistics for an entire schema using execute doms_utility analyze_schema USER COMPUTE The USER element should be replaced by the name of the enterprise data base user It is highly advisable to run this command from time to time In any case it should be run periodically during the first period of production use and additionally when significant 84 A 4 Storage A 4 STORAGE configuration changes new applications other data volumes take place The analysis is quite resource intensive and should not be applied during peak operational hours Sufficient temporary tablespace must be provided also A practical trade off betwe
113. three possibilities Are not requested If this option is selected SSL connections are established in any case Are required If this option is selected SSL connections are established only if the client has a valid certificate for authorization Are requested If this option is selected the establishment of SSL connections depends on the content of the response if the response contains a valid client certificate the SSL connection is established automatically if the response con tains no valid client certificate a login mask will be displayed to the user and after a successful login the SSL connection will be established Enable Wf XML avw wfxml enabled Defines if this server is Wf XML enabled Possible values are Off Active or Passive For further details on how to set up and use Wf XML please take a look at the section Communication with other Systems gt Wf XML of the enterprise Application Development Guide WIXML OU wfxml2 orgunit Default Wf XML Organizational Unit WIXML User wfxml2 user Default Wf XML User WEfXML Server wfxml2 server Defines the default Wf XML server WIXML access log for wfxml2 log objects Defines the objects which will be logged You can select between 36 3 9 CLUSTER Hint ServiceRegistry Factory Instance Activity Observer Size of log wfxml2 log size Max size of the logfile XMPP server address xmpp server The location of the XMPP
114. tion Therefore section 3 11 of the configuration provides the following parameters e Open documents via Microsoft Office Plug in webdav officeDocuments openWithPlugin This must be checked to activate usage of the plug in by enterprise e Extensions of plug in supported documents webdav officeDocuments openWithPlugin extensions Holds a comma separated list of extensions e g doc docx for which the Microsoft Office Plugin should be used Only for DMS documents which extension is contained in that list the plug in will be used all other documents will be handled with the browser s default behavior Note It may be the case that the plug in is deactivated by the browser itself In that case it must be activated within the browser application e g via Add Ons Plugins in FireFox Authentication For viewing editing a DMS document we must determine the requesting user to check if he is permitted for that action But the session cookie of the browser cannot be passed to the plug in therefore we need alternative ways for authentication of the re questing user The following parameters in section 3 14 of the configuration are determined to control the various ways for authentication 40 3 11 DMS Basic Auth in WebDAV avw dms allow_basicauth When activated the server will send an authentication request to the client if no user could be determined The client will react by opening a dialog to enter the user s id and passwor
115. to execute further actions via an upgrade method Typical actions include e XML import Master data of the application can be adapted e Execution of database scripts e Other JAVA methods The upgrade method is part of the application class which has to implement the interface com groiss wf ApplicationAdapter The application will be upgraded patched automatically if you start your server with disabled logins or the upgrade option Further information can be found in the API of enterprise ApplicationAdapter getVersion and Application Adapter upgrade The steps for performing a manual application upgrade patch are the same as manually installing a patch for the base system Patches for applications can also make use of the automatic patch mechanism Place your patch file in the patches folder in your application directory The filename must match patch zip When starting the server with disabled login or the upgrade option these patches will be applied too Please note that it s not recommended to patch more than one application at a time For further information on how to build your own patch archives see the programmers manual Hint It depends on the application which upgrade procedure is used In some appli cations it is necessary to execute the upgrade method only other applications need to be upgraded manually steps should be described in an own readme file 4 3 Performing an Upgrade of enterprise This section
116. ue of queries waiting for execution waiting for a free thread Default process Id search type avw reporting defaultIdSearch Here you can define the standard type for id search in Process Search see user manual for further information Default subject search type avw reporting defaultSubjectSearch The same as Default process id search type but for subject Process relations avw process relations It is possible to define a relationship be tween process instances The relation is defined as ProcessRelation ProcessInstance pl ProcessInstance p2 String reltype The relation can be maintained via API or with the task function addRelation The available relation types can be defined in the field Process relations For each relation type a pair of id and namel name 2 is defined names and id separated by whitespace see syntax beneath A comma new line feed or carriage return separates the pairs The id is stored in the database rela tion the names are used in the user interface Definition syntax id name1 name2 sep id name1 name2 If name2 is missing namel is the default If namel is missing the id is the default In namel and name 2 it is possible to use 20 to use blanks in names values The names could be internationalized by adding appid key O appid is the ID of the application ep is enterprise default Examples a bB c C 201 C2 d ep process e ep forward ep back 42 3 12
117. wikilinks enable If this checkbox is activated links can be entered in the description of an ActivityInstance in wiki syntax link text or link Table 3 2 shows possible values for the date and time format masks The count of pattern letters determine the format Text 4 or more pattern letters use full form lt 4 use short or abbreviated form if one exists Number the minimum number of digits Shorter numbers are zero padded to this amount Year is handled specially that is if the count of y is 2 the year will be truncated to 2 digits Text amp Number 3 or more use text less than 3 use number Any characters in the pattern that are not in the ranges of a z and A Z will be treated as quoted text For instance characters like and will appear in the resulting time text even if they are not embraced within single quotes 33 3 8 COMMUNICATION 3 8 Communication SMTP host mail smtphost Server for outgoing emails host name or IP address Mail sender mail sender The mail address that will appear in the from field of mails that the system sends SMTP Username ep mail smtp username The user name for SMTP server SMTP host SMTP Password ep mail smtp password The password of SMTP user Type of SMTP communication ep mail smtp communicationtype This setting is used by all communication possibilities in enterprise
118. with valid values e Database Type The database you can select ORACLE DB2 MS SQL Server Firebird or Derby e JDBC Driver Class Java class that contains the driver Take a look at the table on page 29 for a list of driver classes e JDBC URL URL for the database The syntax of this string depends on the JDBC driver used See the examples on page 29 or consult the documentation of the driver enterprise allows to configure datasources too For further information take a look in chapter 8 e Credentials not needed Activate this checkbox if database connection without credentials user id password should be used when authentication is accom plished externally e g SQLServer Windows native authentication e Database Userid The ID of the user with whom you want to connect to the database e Database Password Password for the database user with the ID that you entered above e Number of Connections Default number of database connections e Session Environment You can specify SQL commands which are executed for each connection after connecting for example set TEXTSIZE 1000000 If SQLServer Windows native authentication is used the following steps are needed e If using sqljdbc driver the file sqljdbc_auth dll must be available in enter prise root directory or in case of service in lt ep_root gt services directory e Add to driver url the string integratedSecurity true e g jdbc sqlserver lt host gt lt port gt
119. x denoted by the netmask matches An URL prefix consists of the first characters of a fully qualified method name package class method The URL prefixes are case sensitive com groiss designates all calls to methods in classes in packages located in com groiss or below com groiss org PasswdAuth designates all calls to methods in the class com groiss org PasswdAuth this wildcard designates all methods regardless of origin The set of rights is a space separated list of IDs of enterprise rights The right IDs are case sensitive set_agent designates all users who have the right set_agent admin stat designates all users who have the right admin and or the right stat i wildcard designating that rights are not needed DENY special dummy right id can be used to deny access Examples for Rules The following examples show how those three designations can be combined to form a rule 127 0 0 0 8 Access from local host subnet is not restricted 10 205 112 26 32 DENY Access from 10 205 112 26 is not allowed 25 3 2 HTTP SERVER 10 205 112 0 24 com groiss org PasswdAuth Login of hosts from subnet 10 205 112 0 is allowed 10 205 112 0 24 internal All operations of hosts from this subnet are allowed if users have the right internal com groiss DENY Access to com groiss classes and methods is denied to every host com my appl admin customer Access to com my appl classes and methods is allowed if u
120. your changes you must use the Save icon in toolbar which is available on every configuration page After activating this button the changes are stored in the file avw conf by default which can be found in the folder classes of enterprise instal lation directory enterprise offers the possibility to define another configuration files For this purpose the batch shell file or wrapper conf for starting enterprise has to be extended by a comma separated list or alternative by file path separator in Windows and in Linux of filenames or whole folders e g add after com groiss component Bootstrap conf avw conf conf myavw conf conf2 my conf In this example avw conf and myavw conf are files conf2 and my conf are folders and contain a various number of configuration files All configuration files of a folder must contain the prefix conf which are read in alpha betical order case insensitive If a path to configuration files folders contains spaces the whole string must start end with apostrophe as shown in example above If a parameter is available in more the one configuration file the first appearance will be taken When chang ing settings via GUI no server restart is necessary excepting the notification icon appears yellow triangle Each parameter has a value which is set by default If the entered value is different to the default value an icon appears for resetting the value After activating this icon the Save icon must be clic

Download Pdf Manuals

image

Related Search

Related Contents

  Verbatim DVD+RW 8cm Matt Silver    9 - Massey Ferguson  Mode d`emploi pour les parents Mode d`emploi pour les parents  User`s Manual - Embedded Artists  CellOr - Ecopor  Aspirateur Double Cyclone - Euroflex  Philips AVENT Nipple SCF651/27  final draft international standard projet final de norme internationale  

Copyright © All rights reserved.
Failed to retrieve file