Professional Documents
Culture Documents
3-0188-16x-00 - Content Server Administration v16 - OT PDF
3-0188-16x-00 - Content Server Administration v16 - OT PDF
pe o
D
Learning Services
The software described in this Workbook is furnished under a license agreement or non-disclosure agreement (the “Agreement”)
with Open Text Corporation or one of its affiliates (“Open Text”). The software may be used or copied only in accordance with the
terms of the Agreement. The information contained in this Workbook is the valuable property of Open Text and represents trade
secrets of Open Text. No part of this Workbook may be copied, reproduced, translated or transmitted in any form or by any means
without the prior written consent of Open Text.
The information contained in this Workbook is subject to change without notice. If this Workbook is provided in both printed and
electronic form, the electronic form will govern in the event of any inconsistency. Open Text makes no representations or
warranties concerning such information or the software described in this Workbook except as expressly set forth in the
Agreement.
Copyright © 2016 by Open Text Corporation
OpenText is a trademark or registered trademark of Open Text SA and/or Open Text ULC. The list of trademarks is not exhaustive
of other trademarks, registered trademarks, product names, company names, brands and service names mentioned herein are
property of Open Text SA or other respective owners. All rights reserved.
O oN
pe o
D
n tD
Te i
xt str
In ibu
te te
rn
al
Welcome to the Content Server Administration course. This course will provide you with the
knowledge and skills required to administer Content Server. The focus of this course is on Content
Server’s Administration pages.
By the end of the course, you will be able to:
Install Content Server v16.0, optional Modules as well as Core and Modular Language Packs
Utilize Cluster Management to patch Content Server
O oN
Configure Content Server menus, facets, folder presentation features, security settings
pe o
Configure notification, Pulse, email, eLink and Enterprise Connect administrative settings
n tD
Configure Directory Services (OTDS), users/groups, permissions and privileges for Content
Server
Te i
Configure and manage Content Server search and indexing resources such as the System
Object Volume and the Enterprise Index
xt str
Initially configure Content Server after running the needed Windows installers
In ibu
Prerequisites:
te te
There are no specific prerequisites for this course; however, the following general skills will provide
a better understanding of Content Server:
rn
Networking experience
al
1-0184 Managing Documents in Content Server and 1-0185 Collaborating in Content Server,
or equivalent eLearning courses, or equivalent practical experience with Content Server v16.0
U
1-0187 Content Server Installation and Configuration, or equivalent practical experience with
se
Thank you for participating in this course. Should you require anything further, please contact us at
OpenText Learning Services. Good luck and enjoy your learning experience.
nl
Class Information:
For your reference during exercises, please record the following information per your instructor's
directions:
Username: ___________________________________________________
Password:___________________________________________________
iv
Table of Contents
MySupport ................................................................................................................................................1-5
Knowledge Center .................................................................................................................................1-7
n tD
2. Server Configuration
Overview ........................................................................................................................................................... 2-1
Server Configuration Administration .................................................................................................... 2-2
Additional Enterprise Menu Items .......................................................................................................... 2-3
Administer Date/Time.................................................................................................................................. 2-6
Time Zone Configuration ....................................................................................................................2-8
Data Picker Year Range .......................................................................................................................2-9
Cluster Management ................................................................................................................................. 2-12
Configure Facets.......................................................................................................................................... 2-12
Configure Functions Menu...................................................................................................................... 2-13
Configure Performance Settings........................................................................................................... 2-16
Configure Presentation ............................................................................................................................ 2-18
Configure Container Options................................................................................................................. 2-19
Navigation ..............................................................................................................................................2-21
5. Cluster Management
Overview ........................................................................................................................................................... 5-1
Cluster Agent and Patch Management.................................................................................................. 5-1
Cluster Management .................................................................................................................................... 5-4
Manage Cluster Settings ............................................................................................................................. 5-6
Manage Cluster Agents................................................................................................................................ 5-9
Manage Updates.......................................................................................................................................... 5-10
Cluster Audit History .........................................................................................................................5-19
Update Analysis ...................................................................................................................................5-21
6. Database Administration
Overview ........................................................................................................................................................... 6-1
Introducing Database Maintenance Tasks.......................................................................................... 6-2
Database Administration ............................................................................................................................ 6-2
Change Current Database .......................................................................................................................... 6-3
View Content Server Tables ...................................................................................................................... 6-5
Microsoft SQL Server Maintenance Tasks........................................................................................... 6-6
O oN
7. System Administration
Overview ........................................................................................................................................................... 7-1
In ibu
Summary ................................................................................................................................................7-12
nl
Undelete and Recycle Bin Modules Replaced with Built-in Recycle Bin............................... 10-1
Supported Types ..................................................................................................................................10-5
n tD
Settings ....................................................................................................................................................10-7
Te i
Modules........................................................................................................................................................... 11-1
What Modules Are Available?................................................................................................................ 11-2
U
Exercises .........................................................................................................................................................19-9
O
Exercises .........................................................................................................................................................26-7
xt str
31-5
se
n tD
Configuring Region Modifiers for Index Regions and Like Searches...................................... 38-2
Region Modifiers and search.ini ....................................................................................................38-6
te te
Include Node Types or Item Types for System Generated Messages.................................... 40-7
Summary ...................................................................................................................................................... 40-10
pe o
D
Warehouse .............................................................................................................................................48-4
My Workbench .....................................................................................................................................48-6
xt str
Just What Can I Export and Import From Content Server as XML? ....................................... 49-4
Exporting a Content Server Item .......................................................................................................... 49-6
y
A. Continuing Education
Certification Programs................................................................................................................................ A-1
What’s in the Courses?................................................................................................................................ A-3
List of OpenText Content Server Training Courses and Workshops....................................... A-4
Business User Roles .............................................................................................................................. A-4
System Administrator Roles ............................................................................................................. A-4
Developer Roles ..................................................................................................................................... A-4
O oN
How Content Server Maps Permissions From Folders to Work Items ................................ C-11
Changing Default Access......................................................................................................................... C-12
O
Support ......................................................................................................................................................D-9
al
the instructor.
xt str
xxi v
Content Server Administration v16
Learning Services
Training Date:
O oN
Instructor:
pe o
D
Location:
n tD
Student Name:
Te i
Position:
xt str
Industry:
rn
Education Financial/Insurance
U
Integrator Other
se
O
Company:
nl
Street Address:
y
E-mail:
Phone Number:
y
nl
O
se
U
al
rn
te te
In ibu
xt str
Te i
n tD
pe o
O oN
D
Chapt er 1. I ntr odu ct ion t o Cont ent Se rv e r Admi ni str a ti on
Objectives
topics
pe o
D
Describe how Secure Extranet Architecture or Remote Cache are used in some deployments of
Content Server
Te i
xt str
Overview
In ibu
… and many others whose jobs include Content Server in some manner.
The Roles of Content Organizations differ in how they set up Content Server administration,
O oN
Server Administrators and we provide an overview so you can understand the various
pe o
possibilities.
D
n tD
Installation and Consider your enterprises’ needs for storage, speed, security and
Architecture scalability
xt str
Access Control to Set up the structure of the Content Server Enterprise (folders,
rn
current
se
Users and Groups Create and manage users and groups. This task is sometimes
nl
Teaching skills
Patience and determination
xt str
Server, and other times the various system administration tasks are
distributed among a team of users, for example, the database
te te
Knowledge Manager
nl
Information Librarian
y
Power User
Technologist
Project Leader
Content Server Analyst
They do not have access to the Administration pages, but they may be
responsible for:
Training
Setting permissions
Creating workflows, categories, forms
Answering questions
Ensuring the success of the rollout “from the ground up”
When you begin to implement Content Server there are many issues that
Te i
compound document, project, discussion)?
U
How will you disseminate information and make sure you are taking
se
administered?
How are you going to train and support your users?
One of the keys to informing your end users, managers and other
stakeholders is to develop a design document that sets out your goals and
methods.
n tD
Te i
My Support (http://support.opentext.com)
te te
review their existing tickets, request an FTP account to upload large files
to tickets, chat with a support rep, and enter details about their
U
O oN
pe o
D
n tD
Te i
xt str
In ibu
te te
rn
al
U
se
O
nl
y
n tD
Te i
xt str
In ibu
te te
rn
al
U
se
O
nl
y
pe o
D
Before you open your next support ticket, consider the kind of
n tD
Take a look through the menu of online support channels and the
xt str
O oN
pe o
D
n tD
Te i
xt str
In ibu
te te
rn
al
U
D
training courses)
n tD
Te i
Architectural Overview
xt str
High Level Content The Content Server architecture can be simplified by breaking down the
Server Architecture logical components of the system into five layers:
In ibu
Client
te te
Communication
rn
Application
al
Data
Network
U
se
Client Layer A client initiates a request for the application or database to perform an
operation. The client can be a web browser or other end-user process (e.g.
web service, mobile application).
Communication Layer When the client layer application does not interface directly with Content
Server through web services, it usually requires an intermediate
communication layer to interface with the application. This refers
primarily to the browser interface.
Application Layer Content Server provides access to the data for the client. It serves as an
interface between the client and one or more database servers. This
interface provides an additional level of security. It can also perform some
O oN
of the query processing for the client, thus removing some of the load
pe o
D
from the database server. The server assumes the identity of the client
when it is performing operations on the database server for that client.
n tD
processes all of the requests and holds the logic for all transactions. There
are four primary components to the Content Server application:
In ibu
Content Server Application The Content Server service is responsible for handling all Content Server
U
Services requests sent by the users, whether it is indirectly via web services or
se
The Content Server Admin or search and index service is responsible for
O
full text search and indexing. The full text index itself is considered part of
nl
Although the Cluster Agent Service is not required for the basic features
and functionality of Content Server, the service is required to access the
corresponding Administration pages, to perform Cluster and Patch
Management activities, and to poll systems for applicable setting values.
Ports and Protocols Content Server will use a number of TCP/IP ports to communicate to the
various system components:
O oN
pe o
D
n tD
Te i
xt str
In ibu
te te
rn
al
Data Layer A Relational Database Management System (RDBMS) provides the data
requested by an application server on behalf of a client. The database
server does all of the remaining query processing.
O
nl
Network The network logically and physically ties all of the components together.
Load Balancing, Bandwidth A discussion of load balancing means a participant needs to understand
and Latency various advanced architectural concepts including: load, redundancy,
load balancing, front ends, and clustering. This level of architectural detail
and discussion is outside of the scope of this course.
external storage; where files are stored externally from the database on a
separate drive/disk on the same machine or on a separate machine or
n tD
device (SAN).
Te i
Figure 1-5:
se
Monolithic Architecture
nl
y
Figure 1-6:
architecture in which the Content Server, web server, and Admin server
are deployed on separate physical or virtual machines (or several VMs on
Te i
one physical computer). The Admin server will handle all of the search and
indexing. The Content Server plus web server will handle all of the traffic
xt str
Figure 1-7:
se
Distributed Servers Most enterprise applications are distributed across a network, because
client and data store resources are usually located on different machines
from the application itself. This provides greater flexibility in managing
and growing the entire system.
n tD
Te i
xt str
In ibu
te te
rn
al
U
se
O
nl
y
CGI/EXE, LL ISAPI, Generally speaking, ISAPI or a servlet performs better than the
pe o
D
each request
rn
Once in ISAPI
U
Once J2EE
standards
O
nl
Performance It has been observed that servlet is twice as fast as CGI/exe. Empirical
testing has shown the servlet is at least on par with the ISAPI with regards
to speed.
One undisputed benefit enjoyed by both the LLISAPI.dll and the servlet is
the fact that both are loaded into memory only once whereas the CGI
must be spawned for each separate request. The CGI activity, in contrast,
will add overhead to each transaction or request.
Security Servlet is more secure than CGI or ISAPI. The servlet runs under an
application server (e.g., Tomcat) in its own memory. It is Java EE, which
has very strong definitions with regards to what it can and cannot do on
the system.
O oN
pe o
The only port necessary is the one API communication port, so there is no
D
Secure Extranet
Te i
Architecture (SEA)
xt str
Introduction to SEA The Secure Extranet Architecture Servlet (SEA) is a streaming servlet that
was added as an alternative interface to Content Server which replaces
the CGI or ISAPI used to access the llserver process. The interface is a
In ibu
extranet environment.
rn
Advantages Using the SEA Servlet has a unique advantage: once a document is fully
uploaded to the application server, the servlet then connects to Content
al
Server and streams the file through the API/regular communication port,
thus requiring only one open port.
U
se
This new environment will allow all user requests (including file uploads)
to be tunneled through HTTPS to the application server. The application
server then passes these requests to the llserver engine similar to CGI
and ISAPI operations.
All requests, file uploads, and API requests (as well as HTTPS requests)
will be sent through the firewall to the internal Content Server via the
SEA Servlet hosted by the application server.
O oN
Security Benefits As previously mentioned, the huge benefit from the use of SEA and the
pe o
servlet is security.
D
None of the Content Server data or services reside on the SEA server.
n tD
There is no temporary data stored on the SEA server. All uploaded data is
xt str
Thus, SEA utilizes a Streaming Servlet, which has the ability to upload files
al
without utilizing file system mappings, eliminating the need for a file
mapping between an application server (e.g., Tomcat) and Content Server
U
for uploads.
se
O oN
pe o
D
n tD
Te i
xt str
In ibu
te te
rn
al
U
Archive Server OpenText Archive Center, formerly known as Archive Server, enables
storage, management, and retrieval of archived data and documents.
Content Archiving for The Content Archiving module makes it possible to archive documents
Content Server and emails created in Content Server, and to also display archived
O oN
n tD
te te
Benefits Depending on the business process, the document type, and the storage
rn
management.
U
It can also address multiple partitions of like media within the same media
se
Remote Cache OpenText Remote Cache (OTRC or RC, for short) provides a distributed
document caching solution for Content Server. This add-on module
allows users who are geographically far from the main Content Server
system to access documents from a local cache.
O oN
pe o
D
n tD
Te i
xt str
In ibu
te te
rn
al
U
se
O
You must clearly and unambiguously distinguish which server you are
y
talking about when discussing Content Server and Remote Cache server.
The primary Content Server system or installation is the one which has
the Remote Cache module installed.
The remote site or system refers to the site where the Remote Cache
server has been installed. This system includes a Web Server, Remote
Cache, Document Conversion Service, and a local disk cache.
A Remote Cache server does not have a database nor does it have the
O oN
must be used. OpenText Remote Cache Server is not supported for use
with the ISAPI (llisapi.dll) version of Content Server.
Te i
xt str
Knowledge Center.
rn
al
U
se
O
nl
y
Outdoor Gear uses Content Server to manage all kinds of work for its
pe o
CS16 Installation The C:\CS16 installation of Content Server consists of CS 16 and includes
Te i
– WebDAV
In ibu
– Email Services
– Forms
rn
– Web Forms
al
– Pulse/Social
U
– Enterprise Connect
se
– ActiveView
– eLink
O
– Office Editor
nl
– WebReports
y
Optional modules
– XML WF IC & EX
WebDAV LifeCycle By default, the Content Server 16 installer places the WebDAV 16
module in the staging directory. Since it’s not a mandatory module,
administrators can then choose when to proceed with the installation and
deployment of WebDAV. WebDAV 16 will be the final release of the
module. No further versions of this module will be released. With the
upcoming deprecation of much of the underlying infrastructure
supporting WebDAV components by browser vendors and the
duplication of WebDAV functionality with other Open Text offerings, we
have made the decision to discontinue the WebDAV module.
– Enterprise Connect
pe o
D
– ActiveView
– eLink
n tD
– Office Editor
Te i
– WebReports
xt str
Content Server v16.0 supports Microsoft® Office 2010, 2013, and 2016
as discussed below.
se
Office 2007 Office 2007 and previous versions are not supported by Content Server
O
Office Editor
nl
n tD
Summary
Te i
organizations set up their Content Server administration
te te
O oN
pe o
D
n tD
Te i
xt str
In ibu
te te
rn
al
U
se
O
nl
y
2. Server Configuration
Objectives
Overview
n tD
administration.
xt str
Administer Date/Time Specify date formatting and time zone handling for
U
and aliases.
y
Limit the Admin Account Restrict the IP addresses from which the Admin user
Log-in account can log-in to Content Server.
O oN
Specify Server Port Specify the port number on which you want the
Content Server to listen.
Te i
respective topics:
rn
Configuring Facets
License Management
al
Cluster Management
U
se
Server Configuration
y
O oN
pe o
D
n tD
Te i
xt str
In ibu
te te
rn
al
U
se
You can add URLs to the Enterprise menu quickly and easily from the
Additional Enterprise Menu Items page.
Figure 2-2:
Additional Enterprise
Menu Items
O oN
pe o
D
n tD
Te i
xt str
Add Menu Item When the Additional Enterprise Menu Item page is first used, it is already
to accept Name and URL entries, however, when the page is revisited
In ibu
after an entry has been made, it is necessary to click Add Menu Item to
create a new item, otherwise your entry will overwrite the previous one.
te te
Deleting An Item To delete an Additional Enterprise Menu Item, select it and click the
rn
convenience).
U
Name The name of the added URL appearing beneath a separator under the
se
The order of the added item within the Enterprise menu is determined by
nl
the order specified in the list -- either based on the order of entry, or by
using the up/down arrows (i.e., ; the buttons shown here
y
URL The URL can be any valid HTTP or HTTPS destination or location.
The URL that you add can be to any web page that Content Server can
access using HTTP or HTTPS protocol. The only requirement is that URL
is not a dynamic one (i.e., URL attributes or arguments do not change).
Administrators should keep in mind that any site added to this menu
should be accessible to all users, for example, a link to your company’s
web site, or to frequently traveled locations within your organization.
2. Enter Google for the Name and http://google.com for the URL.
3. Click Add Menu Item.
O oN
4. Enter ODG Ports for the Name and http://localhost/ for the URL
pe o
D
5. Click Submit.
n tD
Figure 2-3:
O
9. Click on each additional menu item to test it out, clicking the back browser
button to return the browser to the Enterprise Workspace.
10. Close the additional Enterprise Workspace browser window or tab when
done testing the Additional Menu Items.
[Menus]
menu_002={'ODG Ports','http://localhost'}
menu_001={'Google','http://google.com'}
O oN
pe o
D
Administer Date/Time
al
organization.
If more than one language is enabled, as in the case with the Outdoor
O
Gear system, the date and time formats can be configured individually for
nl
each language.
y
By default, all three date settings are the same: month/day/year, with a
two-digit month, a four-digit year, a 12-hour clock, and the slash (/) as the
separator.
Administer Date/Time
n tD
Te i
xt str
In ibu
te te
rn
al
U
se
O
nl
y
Time Zone Content Server stores dates in coordinated universal time (UTC) format
Configuration within the database. The Administer Date/Time page allows you to
configure date and time input and display options:
Users in different time zones may find it more convenient to see
Content Server activities posted in their local times, rather than in the
server time. You can use the Enable Time Zone Offset feature to
provide all users with a “local” view of all the time stamps for each
separate localized language
You can also control the entry and display format of dates for each
separate localized language. The Input Date Format applies anywhere
that users enter dates, such as in an attribute field. The Short Display
O oN
Date Format is used on pages such as a folder “browser” page, and the
Long Display Date Format is used on pages such as Info pages
pe o
D
Enable Time Zone Offset Select the Enable Time Zone Offset setting to override the [DBMS] server
n tD
time.
Te i
The Content Server service needs to be restarted and any open browsers
need to be completely closed, before users sign in with their respective
xt str
The effect for users, as illustrated in the following example, is that the
date/time that appears with an offset. In this specific scenario, Fred adds
te te
Data Picker Year Content Server bases the Date Picker Year Range based on the lower/
Range minimum and upper/maximum year values found in the [dateformts]
section of the opentext.ini file. The default values are 1990 and 2027
respectfully, as illustrated in the figure below.
[dateformats]
InputDateMinYear=1990
Figure 2-6: InputDateMaxYear=2027
WantTimeZone=FALSE
O oN
SeparateCentury=FALSE
pe o
D
The default minimum and maximum year values of the range can be
n tD
modified from either Admin pages > Server Configuration > Administer
Te i
Date / Time and Date Picker Year Range setting or alternatively from
Admin pages > Languages > Administer Date/Time and the Date Picker
xt str
clustered.
U
se
Settings Accessible*
nl
*Some of the Date/Time settings are only applicable if the user has the Enhanced
Keyboard Accessible Mode enabled (or if this setting has been enabled for the entire
system).
O oN
pe o
D
n tD
Te i
xt str
In ibu
te te
rn
al
U
se
(i.e., Linus Lending) has Keyboard Accessible menus enabled (i.e., Tools >
Settings > General > Enhanced Keyboard Accessibility Mode).
y
Figure 2-8:
Restart Is Required
O oN
pe o
D
n tD
Figure 2-9:
te te
Service Restarting
rn
al
Figure 2-10:
nl
Restart Successful
y
[dateformats]
InputDateMinYear=2010
InputDateMaxYear=2030
Figure 2-11:
TwoDigitYears=FALSE
Year Range in opentext.ini
WantTimeZone=FALSE
SeparateCentury=FALSE
O oN
WantYearRange=TRUE
pe o
D
n tD
opentext.ini file.
In ibu
te te
In situations where nonsensical values for the year range have been
used (e.g., 0 and 9999), the Calendar Control will default to its native
rn
behavior and display +/- 10 years relative to the current year (i.e.,
display 2006 as the From year in 2016.
al
U
se
Cluster Management
Cluster Management and its range of topics is discussed in a subsequent
O
chapter.
nl
y
Configure Facets
Configure Facets and its range of topics is discussed in a subsequent
chapter.
Group 1 GET IT Allows the user to retrieve the item or its data.
pe o
D
Group 2 AFFECT ITS Allows the user to change an aspect of the item.
CONTENT
n tD
Group 3 AFFECT ITS Allows the user to copy, move, or create an item from
Te i
Group 4 TRACK IT, Informs the user that something happened to the
item.
In ibu
Group 5 COMMUNICATE Allows the user to inform other users about the item.
ABOUT IT
te te
Group 6 AFFECT ACCESS Allows the user to control or permit access to items.
rn
Group 10 DETAILS which allows the user to view, delete, or change item
information.
O
nl
O oN
pe o
D
n tD
Te i
xt str
In ibu
te te
rn
al
U
se
O
nl
y
n tD
Figure 2-13:
Te i
In a bid to simplify the menu for most users, some of the Group 1 menu
options can been relocated or moved to the More menu.
U
7. Back in the separate browser window or tab, and the ActiveView item (e.g.,
Enterprise Workspace > Course Material > 3-0119 ActiveView > AV
Demos > AV Demo - Chapter 1 (Intro) folder), once again click the
ActiveView’s Functions Menu to display the available WebReport-related
functions that are part of ‘Group 0 & 1’.
The updated Functions menu has many of the Group 0 and 1 options
appearing under the More submenu, as illustrated in the following figure:
Figure 2-14:
Functions to More
pe o
D
n tD
Te i
xt str
Configuration page.
nl
y
Figure 2-15:
Configure Performance
Settings Page
O oN
pe o
D
n tD
Te i
Web Caching Web caching allows items served by Content Server to be cached by the
xt str
Web server and it applies to any content that is saved or opened (i.e.,
downloaded or opened) to the desktop. Future requests for the same URL
In ibu
are handled by the Web cache, instead of asking Content Server for the
item again.
te te
rn
Cache Expiration The default time, in minutes, to keep cache data that does not have a
specified expiration. The default is 4320 minutes.
O
File Buffer Size This setting allows you to configure the file buffer size when copying
nl
items to and from the External File Store. The file buffer size must be
entered in bytes and the value must be between 16384 (16 KB) and
y
2097152 (2 MB). By default, the file buffer size used for copying items is
524288 (512 KB).
Configure Presentation
The Configure Presentation administrative pages enable you to set some
of the basic appearance and behavior of Content Server. The settings on
these pages affect the Content Server folders and other containers,
methods of uploading and opening Content Server items, the appearance
of icons and thumbnails, and other such settings.
panels.
al
Configure Small and Large Enable or disable large and small icon views.
Icon Views
U
Server.
Configure Presentation
Figure 2-16:
Configure Presentation
O oN
Page
pe o
D
n tD
Te i
xt str
In ibu
options.
U
se
O oN
pe o
D
n tD
Te i
xt str
In ibu
te te
rn
al
U
Scrolling down the page displays the bottom half of the page:
O oN
pe o
D
n tD
Te i
xt str
In ibu
te te
rn
al
Navigation Set the default navigation style (i.e., as a list or as a hyperlinked trail) and
se
Smart View UI The Configure Container Options page contains the administration
O
To enable the option, Select Enable Smart View Link and Save Changes
at the bottom of the page to enable the Smart View option.
The Smart View option is displayed in the Global Menu bar > My Account
menu, as illustrated below, but it only displays if:
The option has been enabled by an administrator, as noted above
A user is in the Browse View of a container, located in the Enterprise
or a Project workspace (i.e., this excludes the Personal Workspace), in
O oN the Classic UI, that is also accessible in the Smart View UI)
pe o
D
n tD
Te i
xt str
them to find items. Administrators can configure the number of items that
display in containers throughout Content Server. If the number of items
U
Pagination for the entire system can also be disabled. When pagination is
disabled, users will see all contents within a container on one page.
O
Column This topic will be addressed in the section on Facets and GUI
nl
Customization customization.
y
Featured Items By default, Featured Items are also located in the standard browse list.
This setting allows them to be removed.
Drag and Drop A Content Server System Administrator has the ability to modify these
Administration default settings to meet the requirements of their users.
Settings
Scroll down to the Drag and Drop section of the page.
Enable Drag and Drop DnD functionality is enabled by default; however, system administrators
can disable this functionality as required for their organization.
Add Version Also by default, DnD will add a version of the file if the [same] file name
already exists in the destination or target Browse View folder.
Maximum Number of Files Content Server is configured to only allow 500 files, by default, to be
Allowed In A Drop dropped during a single transaction.
O oN
Maximum File Size For A The system is also configured to limit the size of individual files to 100
pe o
D
Skipped Since the Admin page settings constrain file size and file quantity during a
single DnD operation or transaction, these would represent a pair of
Te i
The file already exists in the destination or target Browse View folder;
te te
If you try to Drag and Drop more files than the configured maximum
U
Enable or disable the Document Overview page as the default target for a
document or version link.
By default, both the Display on Detail List View and Display on Properties
& View as Web Page are enabled. Users see the Edit, Open, Download and
Comments as buttons on Properties and View as Web Page pages, and as
links on the Detail view of a folder.
O oN
Figure 2-20:
rn
Configure Presentation
Page
al
U
se
O
Configure Sidebar
nl
Project Settings
The Project Settings allows administrators to configure default project
O oN
The default start page for a project as either the Project's Overview
page or the Project Workspace
n tD
Workspaces
The look of the Overview.html page, which provides project
xt str
O oN
pe o
D
n tD
Te i
xt str
In ibu
te te
rn
al
U
se
O
nl
HTTP-only Cookies The HTTP-only Cookies section allows you to specify whether the
httpOnly attribute is added to all Content Server cookies. If enabled, all
cookies will be marked with the http-Only attribute. To browsers that
support it, this attribute indicates that a cookie should not be made
available to scripting. By default, this option is disabled. Enabling HTTP-
only Cookies disables Cluster Management.
Cookie Encryption Content Server creates an authentication cookie using the user's numeric
Key ID and other values that you can specify. The values that you select are
necessary to authenticate requests after logging in. The Cookie
Encryption Key lets you provide a text string for use as the key that
encrypts a Content Server authentication cookie. If a key is not specified
in this field, Content Server uses a default key. However, OpenText
strongly recommends that you change this value to a unique key.
Data Encryption Key Content Server also uses a Data Encryption Key, which lets you provide a
text string for use as the key that encrypts the database administrator's
password when it is included in a Content Server request. If a key is not
specified in this field, Content Server uses a default key. However,
O oN
Cookie When configuring the authentication cookie, you can include the client's
n tD
Authentication IP address as a value. The Client IP address list lets you apply a bit mask
when comparing the IP addresses of different requests. The bit mask
Te i
Information
indicates which portion of the IP address is to be compared; the nonzero
elements of the IP address are compared to the IP address placed in the
xt str
cookie at log-in. For instance, if 255.255.0.0 is selected, only the first two
elements will be compared. This makes it possible to verify that requests
In ibu
You can also set authentication cookies to expire. After the specified
y
Log-in Cookie You can set the cookie expiration date to manage cookies for the Content
Expiration Date Server log-in page. This parameter controls the language display when
users have multiple language packs installed. A cookie on the Content
Server log-in page remembers a user’s language selection until they are
authenticated, after which it uses their preferred language.
The cookie expiration date is calculated based on the date and time value
of a user's computer, not the date and time of Content Server. The
number of days must be a positive integer between 1 and 999. By default,
the log-in cookies are set to expire after 8 days.
Log-in Connection This section helps secure Content Server against repeated failed user
Policies
O oN
users from simultaneously accessing Content Server from more than one
computer. If you enable this feature, users can sign in to Content Server
Te i
from one computer, but if they sign in a second time from another
computer, the first Content Server session is terminated.
xt str
In the except for hosts field, you can provide a comma-delimited list of IP
In ibu
addresses for any computers to which this feature does not apply. Also,
you can specify a single * wildcard character to indicate multiple
te te
The Allow log-in via HTTP GET request setting specifies the default login
al
required to sign in again when that session’s cookies expire. This option is
disabled by default.
O
already logged on. The secure request token is a value that is shared from
the server to the browser when the user performs certain actions. This
value must accompany requests for other actions. If the value is not
present, the requested action is invalid. This option is disabled by default.
Password Retries This section defines the numbers of times an incorrect password can
entered by a Content Server Web Administrator and Admin before the
log-in is disabled, and whether to send an email to the Administrator. By
default, these options are enabled.
Password policy for users can be set in OTDS. For more information, see
OpenText Directory Services with the OTDS Web Client - Installation
and Administration Guide (OTDS-IWC).
Web Administrator If too many incorrect password attempts are made to enter the Web
n tD
you to specify the Content Server Administrator should receive an
email whenever the specified number of log-in attempts is exceeded.
O
Admin The Admin account is essential, and cannot be disabled without impacting
nl
the system. This policy allows you to alert Admins to the possibility that
y
The disable log-in feature does not apply to the Content Server Admin
account. You can protect the Content Server Admin account by allowing
only certain client IP addresses access. For more information about
limiting Content Server Admin account log-in attempts by IP address, see
Limiting Admin Account Log-ins by IP Address.
O oN
pe o
D
n tD
Te i
xt str
In ibu
te te
rn
al
U
se
O
nl
y
Frame Embedding You can optionally choose to prevent request handlers from being
embedded in external frames by selecting the Prevent request option. By
default, this option is selected.
Request Argument When Request Argument Filtering is enabled, all client requests to
Filtering Content Server are compared with the values in the Filter String field. By
default, these fields are blank. If any matches are found, the request is
rejected.
The filter list is delimited by a separator that you specify. For example, if
you use a comma (,) as the separator, type three filters as:
<Filter_A>,<Filter_B>,<Filter_C>
Container Size The Hide Number of Items check box in the Container Size Display field
D
Display prevents users from displaying how many items are in a container.
n tD
Secure Request Token The Secure Request Token Expiration field is part of an enhanced security
Expiration framework that allows requests to access authentication token (cookie)
generation and verification functionality. A token can be passed between
In ibu
Content Server Client The Content Server Client Hosts field contains the IP addresses of
Hosts servers from which requests are to be accepted. By default, the field is
al
Trusted Referring The Trusted Referring Websites parameter is a security measure used to
se
Websites prevent other users from exploiting your website. The sites contained in
this list appear in an HTTP Referrer header, which validates HTTP
requests coming from another website. If a request comes from an
O
message is displayed.
y
For Enterprise Process Services Integration, you must enter the Trusted
Referring Websites parameter in the following format: http://<PW
Server>, where <PW Server> is the computer where Process Workplace
(the web server part of Enterprise Process Services) is running.
Document Functions The Document Functions area contains radio buttons to enable and
disable the Open and View as Web Page functions in Content Server.
When these functions are enabled, users can open a document in its
native application, or view them as web pages, by clicking the document’s
link. When disabled, the Open option does not appear on a document’s
Functions menu or on the Overview page. The Open Document function
is disabled by default.
Trusted Cross The Trusted Cross Domains field allows you to manage Content Server
Domains and third party web application integrations. You register the <key>;
<target> pair where <key> is a value to be passed in as a URL parameter
and will perform the registration lookup and <target> is a registered URL
path to the target resource (third party web application).
Note: For Enterprise Process Services Integration, you must enter the
Trusted Cross Domains parameter in the following format: pw;http://
<PW server>/pw/client/csbrowse.htm, where <PW Server> is the
computer where Process Workplace (the web server part of Enterprise
Process Services) is running.
O oN
pe o
n tD
O oN
pe o
D
n tD
Te i
xt str
In ibu
te te
rn
al
U
se
O
nl
URL Prefix for / The URL prefix, also known as the virtual directory alias, is mapped to the
support Directory support directory during the installation of Content Server. By default,
the support directory is located at the root installation level: /
installation_path/support. It is normally not necessary to change URL
prefix; however, if you modify it, you must make the change in Content
Server and the web server.
The default value for the URL prefix is /img/. Remember to use a forward
slash (/) before and after the URL prefix.
Content Server The Administrator password is one that you use to access the
Administrator Administration pages. Do not confuse this password with the password
Password for the Admin user. After the initial Content Server installation, you
should change the default Admin password. You can set a new
Administrator password on the Configure Server Parameters page by
selecting the Change Administrator Password check box. The new
password takes effect the next time you log in as the administrator.
Site Name The Site Name is the name that is displayed throughout Content Server.
The site name should be a simple, user friendly name. The default Site
Name is Content Server.
O oN
Administrator E-mail If you provide an email address for the Administrator, a link to the
Address address appears on the User Log-in page.
pe o
D
Categories Upgrade This parameter enables you to set the refresh rate of the progress
n tD
Batch Processing window during batch Category upgrade operations. The default refresh
rate is 200 items, which means the progress window will refresh every
Te i
Configure Edit/ This parameter allows you to specify a maximum number of items that
Organize users can put on one page. The default is a maximum of 100 items per
In ibu
page.
te te
Note: This limitation applies only to Edit/Organize pages. Pages that have
rn
Content Server splits the Edit/Organize page into multiple pages. The
limit then applies to each split page individually.
U
Default User Start This parameter allows you to select one of the following pages, which is
se
Page where users are brought to when they first log in:
Enterprise Workspace, which displays your organization's home page
O
when users sign in
nl
users sign in
About Content Server, which displays the About Content Server page
when users sign in
If you select About Content Server, you need to decide if you want to
require that your users login in order to view the page. If you want to
require that your users login, select the "About Content Server" Requires
Login check box. This option is disabled by default.
Administer Icons for When enabled, this parameter allows users to select additional icons for
Folders Content Server folders. This parameter is disabled by default.
O oN
pe o
D
n tD
Te i
xt str
In ibu
te te
rn
al
U
se
O
nl
Duration of New and You can specify the number of days items have the New or Modified icons
Modified Indicators next to them when items are added or changed. By default, the New icon
appears for 2 days after an item is added; the Modified icon appears for 7
days after an item is changed.
Multiple Address You can change the character that is inserted between multiple recipient
Separator for URL addresses in message composition windows. If your organization
predominately uses Microsoft email applications, you should choose a
semi-colon for the address separator.
Server Logging You can modify the logging options for the Admin server on the Configure
Options Server Parameters page or the Configure Debug Settings page. For more
information, see Configuring Server Logging. The following logging
options are available:
No logging, which disables logging for the Content Server server. This
is the default setting
Thread logging, which generates the following log files in the
OTHOME/logs directory: llserver.out, sockserv1.out, thread<c>.out
(one per thread)
Detailed thread logging, which generates the same log files as Thread
logging, but in verbose mode. Verbose mode includes information
O oN
Thread & CGI logging, which generates the following log files in the
OTHOME/logs directory: llserver.out, sockserv1.out, thread<n>.out
n tD
temporarily set the Content Server to run on a single thread. This allows
you to find diagnostic information in a single file. Because running on a
O
usage only and that you return the Server to its original thread setting
y
Enhanced Keyboard Enhanced Keyboard Accessibility Mode permits the user interface to be
Accessibility Mode manipulated using keyboard commands. However, certain features that
depend on Java, such as the Text Editor, are disabled when Enhanced
Keyboard Accessibility Mode is used. This option is disabled by default.
When you enable this option, all users are required to use this mode.
Character Set You can specify the character set web browsers use when displaying the
user interface. For more information, see HTMLcharset in the [general]
section of the Opentext.ini File Reference.
Upload Directory The Upload Directory parameter is used to restrict the location from
which Content Server accepts Documents for upload. The directory
specified in this field must be accessible to both the web server and the
Admin server. OpenText recommends that you specify the full path to the
directory in this field.
Receive Before Send This setting reduces the amount of time the Server must dedicate to
downloading and opening documents. The default setting for Receive
Before Send is set to TRUE. When ReceiveBeforeSend=TRUE, the
Server's responses are buffered to the web server, which then assumes
control of sending the contents to the browser. This allows the available
server threads to move on to other requests more quickly. From an end-
O oN
user perspective, fetching and downloading documents will still take the
same amount of time.
pe o
D
Server Threads This setting defines the number of threads used by Content Server. The
n tD
Number of Sessions This setting defines the maximum number of user log-in sessions cached
on a server thread. The default value of the Number of Sessions is set to
xt str
100. When the maximum number of sessions is reached, the oldest user
log-in session is dropped. User log-in sessions are cached independently
In ibu
information has been dropped from the cache, it will take slightly longer
to execute their next request. The lower the maximum number of
rn
sessions, the less memory the server must dedicate to tracking user log-in
sessions on each thread. The larger the number, however, the less often
al
the server will drop user log-in information from the cache. A Server's
memory consumption can be large for a system running many threads.
U
You may want to try different values for the maximum number of
se
Configure Server There are several elements on the Configure Server Parameters page
nl
The Site Name section allows you to create a friendly name for your
Content Server instance that will appear on the Login page.
News items are a great way to inform people at your site quickly and
efficiently. Administrators can add system messages that appear below
In ibu
the search bar, to all users in every folder. Use the Configure System
te te
Messages page (in the Server Configuration area) to set up this message.
rn
in any Channel you choose, to a new web page, intranet page, or any other
link.
U
se
Adding a URL link makes the scrolling headline ‘click-able’ and sends you
to the news story or other content you have provided.
O
System Messages look similar to regular news items but there are two
important differences:
nl
They appear on every folder in Content Server and every user can see
y
them
They have no expiration date. They must be manually deleted to stop
them from appearing in the news ticker
Figure 2-25:
Configure System
Messages Page
O oN
pe o
D
n tD
Te i
Add Message When the Configure System Messages page is first used, it is already to
xt str
accept Name, Headline, and URL entries, however, when the page is
revisited after an entry has been made, it is necessary to click Add
Message to create a new item, otherwise your entry will overwrite the
In ibu
previous one.
te te
Deleting A Message To delete an a System Message, select it and click the delete icon (i.e.,
rn
Name The name of the System Message does not appear to end users, only as
part of the pick list to the left and when storing the message information
U
in length.
The order of the added item within the pick list is determined by the order
O
specified in the list -- either based on the order of entry, or but using the
nl
for convenience).
Headline The headline is the text that displays in every folder’s news ticker. The
name can be up to 30 characters in length.
URL The URL can be any valid HTTP or HTTPS destination or location.
The URL that you add can be to any web page that Content Server can
access using HTTP or HTTPS protocol. The only requirement is that URL
is not a dynamic one (i.e., URL attributes or arguments do not change).
Administrators should keep in mind that any URL used in the System
Message should be accessible to all users, for example, a link to your
company’s web site, or to frequently traveled locations within your
organization.
Headline.
D
6. Click Submit.
xt str
Workspace.
rn
following figure:
U
se
O
Figure 2-26:
nl
y
9. You can test the message’s URL by clicking on the link; it redirects you to a
web site that provides details about world time zones.
10. You can close the additional Enterprise Workspace browser window or tab
when done testing the System Message.
[News]
news_1={'Content Server will be Restarted at 07:00 hrs
GMT-5','5/18/2016','http://www.worldtimezone.com/
','Restarting Content Server'}
O oN
pe o
D
n tD
Limit the Admin [User] Account Log-in enables you to restrict where the
Admin User can log in from to specific server IP addresses. By default, this
xt str
Administer Date/Time
U
Figure 2-27:
The values that you add to the Allowed IP Addresses field can include an
explicit IP address or an IP address that contains an asterisk (*) that acts
as a wild card to replace portions of the address. Using asterisks lets you
include a group of computers that have portions of their IP address in
common.
As noted, the Content Server service must be restarted, for the changes
to take effect.
O oN
Limit the Admin Account Log-in will not work if TCP IP addresses are
pe o
D
Manage Licenses
rn
chapter.
U
se
SLD Registration
O
the SLD Registration page in Content Server to generate a SLD file with
y
SLD Registration
Figure 2-28:
Figure 2-29:
Port Number Enter an unused TCP IP port number between 1,025 and 65,535 which
n tD
Family Hint The Family Hint is used to select the address family (i.e., IPv4, IPv6) which
Content Server listens to for requests.
xt str
System Report
al
U
You must be logged in as a user with Admin privileges when you run a
system report.
The System Report page is displayed and you are informed if there is no
previously generated system report, as illustrated in the figure below.
O oN
pe o
D
n tD
Te i
Figure 2-30:
xt str
Content Server defaults to a Lite System Report which does not include
nl
The page will update and provide details regarding the location and size of
the system report and the status of the report generation. The status will
continue to show Processing … while the report is being generated; the
size of the file will also continue to grow as more information is added to
the report.
Figure 2-31:
n tD
Te i
When the report has finished generating, the Status will be updated and
indicate that the report has been Completed, as illustrated in the
rn
following figure.
al
U
se
O
Figure 2-32:
nl
3. Navigate to C:\CS16\logs\ and set the filter the directory for *.txt files.
4. Right-click the sysreport.txt file and select TextPad (Hint: You will want to
choose Configure > Word Wrap in Text Pad to be able to more readily view
the contents of the log file).
5. Scroll through the file and compare your results against the next figure,
which illustrates some of the initial sections of data, for example the
version of Content Server and the database version being used.
6. Click Admin Home.
System Info:
Version: 16.0.0
Update: 0
n tD
Build Number: 1
Hostname: TrainOTCS
Te i
IP Address: ::1
Platform: Windows
OS Version: 6.2.9200
Language Code: USA
xt str
[Timing: 5 ms]
License Info:
In ibu
Core License:
Status: Valid
Product Name: OpenText Content Server
te te
<snip>
[Timing: 25 ms]
System Report Content
Current Database Info:
O
MSSQL: CS16
User Name: CS16
Content Server DB Version: 7,0,4,0
y
[Timing: 2 ms]
Application Info:
Number of Workflows: 23
Number of Categories: 12
Number of Additional Node Attributes: 0
[Timing: 23 ms]
Users and Groups Info Reports the number of users and groups in the
Te i
system.
UI Only Node Types Info Reports SubType names and integer numbers,
In ibu
information.
al
Request Handlers Info Lists Request Handlers (in the OScript system
Registry).
integer numbers.
n tD
collation.
xt str
Content Server Tables Info Reports database table information and the
number of rows in each table.
In ibu
Information
O
nl
Summary
y
Exercises
This exercise will provide you with an opportunity to practice what you have learned earlier in this
chapter about the configuring some of the settings and options available from the Content Server’s
Server Configuration Administration page.
n tD
2. Enter Google for the Name and http://google.com for the URL.
In ibu
te te
3. Click Add Menu Item, enter ODG Ports for the Name and http://localhost/ for the URL and
then click Submit.
rn
5. Open a separate browser window or tab and navigate to the Enterprise Workspace.
U
7. Click on each additional menu item to test it out, clicking the back browser button to return
the browser to the Enterprise Workspace.
O
nl
8. Close the additional Enterprise Workspace browser window or tab when done testing the
Additional Menu Items.
y
Administer Date/Time
2. Update the Year Range from 1990 to 2027 to values of 2010 and 2030 and click OK, at the
bottom of the page. Click Restart followed by Continue.
2. In a separate browser window or tab, navigate to the Enterprise Workspace and then to an
ActiveView item (e.g., Enterprise Workspace > Course Material > 3-0119 ActiveView > AV
Demos > AV Demo - Chapter 1 (Intro) folder).
4. On the Configure Functions Menu administration page, change all of the Group 0 actions
O oN
5. Also change all of the Group 1 actions for ActiveViews or WebReports from Main to More.
n tD
7. Back in the separate browser window or tab, and the ActiveView item (e.g., Enterprise
Workspace > Course Material > 3-0119 ActiveView > AV Demos > AV Demo - Chapter 1
xt str
(Intro) folder), once again click the ActiveView’s Functions Menu to display the available
WebReport-related functions that are part of ‘Group 0 & 1’.
In ibu
3. Enter Content Server will be Restarted at 07:00 hrs GMT-5 as the Headline.
nl
5. Accept the default of today’s date as the Effective Date. and click Submit.
7. Open a separate browser window or tab and navigate to the Enterprise Workspace.
8. You can test the message’s URL by clicking on the link; it redirects you to a web site that
provides details about world time zones.
9. You can Close the additional Enterprise Workspace browser window or tab when done
testing the System Message.
1. Click System Report and select Full System Report and click Generate.
2. Navigate to C:\CS16\logs\ and set the filter the directory for *.txt files.
3. Right-click the sysreport.txt file and select TextPad (Hint: You will want to choose
Configure > Word Wrap in Text Pad to be able to more readily view the contents of the log
file).
4. Scroll through the file and compare your results against the next figure, which illustrates
some of the initial sections of data, for example the version of Content Server and the
O oN
Objectives
Overview
pe o
D
n tD
Facets are filters that allow users to see a subset of material that is
te te
O oN
pe o
D
n tD
Te i
xt str
In ibu
te te
rn
al
U
se
O
nl
Figure 3-2:
Sidebar Configuration
From the Administration
O oN
Page Perspective
pe o
D
n tD
Te i
xt str
Individual users can configure the Sidebar location and whether or not to
Show the Side Bar in Browse View. Users navigate from the Main menu >
In ibu
Tools > Personal > General tab to configure the Sidebar Location and
Show Sidebar in Browse settings.
te te
rn
al
U
se
O
nl
Figure 3-3:
y
Sidebar Configuration
From the End User’s
Perspective
By default, the settings are to display on the left side and are enabled to
show in Browse.
You can navigate to the Facet Volume through either of two methods.
The first method is to use the Main menu. From the Main menu, select the
O oN Tools menu and then choose Facets Volume.
Figure 3-4:
pe o
D
Figure 3-5:
Figure 3-6:
Both the View Facet Volume link from the Administration pages, and the
n tD
Facets Volume menu selection from the Tools menu, takes you to the
Facets Volume, as illustrated in the figure below:
Te i
xt str
In ibu
te te
rn
Figure 3-7:
Once inside the Facets Volume you can click the Facets Functions Menu
and select Control Panel.
y
Folder view versus dynamic view: with dynamic view all the parts of the
view are updated (on both sides of the screen). Dynamic view has a unique
URL that can be bookmarked.
Figure 3-8:
Functions Menu
pe o
D
n tD
Te i
xt str
Selecting Control Panel from the Facet’s Functions menu takes you to the
Facets Volume Control Panel page, as illustrated in the following figure.
In ibu
te te
rn
al
Figure 3-9:
U
Panel
O
nl
y
You can enable or disable the sidebar and panels, which allows you to
configure the system before revealing Facets to your end users.
Admin vs. “Knowledge Content Server has a Knowledge Manager usage privilege which adds the
Manager” Facets Volume to a user’s Tools menu. This allows responsibilities to be
Responsibilities distributed rather than having the Admin user configuring everything.
Non-Admin Users
2. The Knowledge Manager Usage Privilege is given to the group.
In ibu
Facets Volume.
al
Figure 3-10:
y
Scrolling down to the bottom of the page, to the Usage Privileges section,
allows Facet privileges to be set for the Knowledge Manager.
Figure 3-11:
Creating Facets and In the next pair of figures, we are configuring our system to display
Facet Trees custom metadata as Facets. The Customer Feedback Category contains
pe o
D
data source).
3. Create a Facet Tree and add the Facets to it.
In ibu
te te
rn
al
Figure 3-12:
U
O oN
pe o
D
Figure 3-13:
n tD
O oN
pe o
D
n tD
Te i
xt str
In ibu
te te
rn
al
U
se
O oN
pe o
D
Figure 3-15:
n tD
Application Class
Te i
xt str
In ibu
te te
rn
al
Minimum unique values Must have at least this number of values before this Facet is displayed.
U
Maximum values to display In example above, on Sidebar, under Application box, maximum of five
se
Show lookup in ‘More…’ When user clicks More, they can refine their Facet browse.
Some Facets are “flat” and have only one level of depth. For example,
“owner name”. Facet Trees were created for Facets that have more
“depth”. For example, a Facet Tree like Province could have individual
Facets of Ontario, Manitoba etc.
Figure 3-16:
n tD
Te i
xt str
Virtual Folders for Virtual folders are saved Facet browses. This means they are fully
Content Server 10 scalable.
In ibu
te te
Virtual Folder The only administration for Virtual Folders is to allow and restrict users
Administration and groups to create and edit them. This is accomplished in the usual
se
Figure 3-17:
Customizing Columns
Content Server comes with four default Columns, just as previous
versions: Type, Name, Size and Modified.
You can add additional Columns and configure when and where they are
seen, and who sees them. But first you must enable Column
customization from the Configure Container Options page.
D
The same data source cannot be used by multiple columns. Once used, it
te te
Options and scroll down to the Column Customization section. The Allow
Browse List Column Customization setting has to be selected, as
U
illustrated below:
se
Figure 3-18:
O
nl
Enabled
O oN
pe o
D
Figure 3-19:
n tD
The four default columns have a “locked” icon indicating they are
fixed System Columns. They cannot be deleted and Name and
Type cannot be modified at all. Size and Modified can be hidden
O
A new Column is created using the Add Item menu and selecting Column.
O oN
pe o
D
n tD
Te i
xt str
Figure 3-20:
In ibu
Source
rn
al
U
se
O
nl
y
Figure 3-21:
O oN
Language Column’s
pe o
Specific Properties
D
n tD
Te i
xt str
In ibu
te te
everyone in your system can view them (if they are enabled in a Browse
View). After creating a column, clicking its Availability tab allows you to
configure where the column can be added.
O
nl
By default, the column is Not Available; you will need to make it available
to either specific locations or everywhere.
y
Figure 3-22:
In the example below, the custom Column has been made available to a
pair of separate folder locations in Content Server.
Figure 3-23:
n tD
Specific Locations attribute data source (the Product Spec category contained a text popup
attribute called “Language”). We then set its availability to be “Only
xt str
O oN
pe o
D
n tD
Figure 3-25: Available Columns from Tools > Settings > Columns
Te i
Columns for As we just saw, selecting the Allow Browse List Column Customization
Individual Users check box adds a Columns tab to folder properties and to each user’s
xt str
Global Columns Even after making a Column Available Everywhere you must still
configure it for display, by navigating to the Facets Control Panel. Then
click Configure Global Columns and move any of the Available Columns
to the Displayed Columns area. In the illustrated example, the column
Owner is being made available globally.
O oN
pe o
D
Figure 3-26:
n tD
Configuring Global
Columns
Te i
xt str
In ibu
te te
rn
The Owner Column now appears on all Browse Views so there are now
al
five columns.
U
se
O
nl
y
The figure below shows the Browse View of a configured folder showing
the Global ‘Owner’ value.
O oN
pe o
D
n tD
Te i
xt str
In ibu
te te
rn
al
U
se
Document Classes Content Server ships with a number of pre-configured Facets. Many of
these are based on object types. Because the object type of “document” is
y
so general, and there are so many MIME Types, the concept of Alias is
employed to group together common types.
Figure 3-28:
Document Class
Definitions
O oN
pe o
D
n tD
Te i
xt str
Facet Count The Facet Count Indicators page lets the Admin choose between graphic
Indicators or numerical indicator of object count (mousing over a graphic indicator
In ibu
Figure 3-29:
U
In the next example, there may be many MIME Types you would like to
classify as Office, so an alias is created to group them together.
Figure 3-30:
n tD
Te i
xt str
In ibu
te te
rn
al
U
se
O
nl
y
The figure below illustrates how all Document Classes appear as Facets
along with the other defined Facets.
O oN
pe o
D
Figure 3-32:
n tD
Summary
O
nl
Exercises
Setting Up Facets
You are going to set up Facets and a Column based on custom Attribute values.
This exercise is going to make use of the Office Locations Category located in the Categories
Volume > Corporate Categories [folder].
1. Create a folder called Offices (in the Enterprise Workspace) and add the Office Locations
Category to it.
O oN
2. Upload a few documents (e.g., C:\SampleDocs\Our ODG Offices\) into the folder and add
pe o
D
4. In the Offices Facet Folder, add two Facets based on the Office Location and Type of
Information Data Sources.
xt str
5. Inside the Offices folder create an Offices Facet Tree and add the two Facets to it.
In ibu
6. Then make the Offices Facet Tree available on the Offices folder by browsing Content
te te
7. Navigate to the Offices folder, enable the sidebar and view the metadata Facets.
al
U
se
O
nl
y
2. Navigate to the System Default Columns folder in the Facets Volume and add an Office
Locations column based on the Office Location Data Source.
4. Navigate to the Offices folder’s Columns tab and move the Local Column Office Location
from the Available Columns field to the Displayed Columns field.
5. Navigate to the System Default Columns folder in the Facets Volume and add an Office
Locations column based on the Office Location Data Source.
7. Navigate to the Offices folder’s Columns tab and move the Local Column Office Location
from the Available Columns field to the Displayed Columns field.
O oN
pe o
D
n tD
Te i
xt str
In ibu
te te
rn
al
U
se
O
nl
y
O oN
pe o
D
n tD
Te i
xt str
In ibu
te te
rn
al
U
se
O
nl
y
Objectives
Overview
n tD
This chapter deals with Content Server product and optional modular
Te i
licensing.
xt str
It is unlicensed
se
It is newly installed
If you have upgraded from a previous Content Server version, and you
O
Figure 4-1:
O oN
Administrative Mode
pe o
D
n tD
Te i
xt str
For the demo step sets in this chapter, we will be utilizing the CS16b,
te te
1. Start the required Content Server services if they are not already running
al
(e.g., CS16b).
2. Launch the IE browser and from the favorites bar, select OTCS 16.0 >
U
cs.exe?func=admin.index.
3. Enter an Administrator password, if prompted (e.g. opentext).
O
4. Change the Administration page view by clicking the Show As Tabs link.
nl
y
O oN
pe o
D
n tD
Te i
xt str
In ibu
te te
rn
Figure 4-2: Content Server Administration Pages > Server Configuration > Manage Licenses
al
U
The only other automatically created accounts are for eLink and
otadmin, so that is why the License Overview, illustrated in the
next figure, shows a user count of 3.
Options Each of the license management options are available by selecting the
appropriate tab appearing under the Options heading, including:
License Overview
License Management
System Fingerprint
License Report
7. Click the License Overview tab on the left under Options, if the tab is not
automatically displayed.
License Overview The Content Server License Overview summarizes the features of your
O oN
n tD
Te i
xt str
In ibu
te te
rn
al
U
Status Displays the current license Status of the Content Server system.
O
Product Name The product licensed by the license (i.e., OpenText Content Server).
xt str
The number of users issued for the non-production license matches the
number of licenses that have been purchased/granted for the production
system.
Company Name The name of the company that the license is issued to. The maximum
length of the name is 100 characters.
Expiration Date If your license type is Temporary License, an expiration date appears;
otherwise the license has no corresponding Expiration Date.
Licensed Users Maximum number of users supported by this OpenText license (appears
only when a valid license is applied to the system).
License Management License Management allows system administrators to obtain and then
apply Content Server (or applicable modular) license files.
In ibu
Obtaining a License File To obtain a license file, via the License Management tab, click the
te te
the securing of License files and the use of the activation server.
O
When prompted to log on to the Knowledge Center, use the user account
nl
Server.
O oN
license file.
In ibu
The system fingerprint is the same for every instance of Content Server in
your deployment, provided each instance connects to the same Content
U
Server database.
se
O
nl
y
Invalid System In the unlikely event that changes in your database causes your System
Fingerprint Fingerprint to become invalid, your license status will appear as Invalid
Fingerprint on your Content Server License Overview.
10. Click the License Report tab on the left under Options.
License Report The License Report page displays detailed information on your Content
O oN
Server license, including your End User Code, System Unique Identifier
pe o
n tD
below.
xt str
In ibu
te te
rn
al
U
se
When the Content Server system has been licensed, it will report the
same information previously discussed in the License Overview section.
O oN
pe o
D
n tD
Te i
xt str
In ibu
te te
rn
11. To generate an XML copy of this report, click Generate Report. You will
U
**************************************************
License Information
Status: Valid
Product Name: Content Server
Product Version: 16.0.0
License Type: Non-production
Company Name: OpenText Learning Services Training Use Only
Expiration Date: No Expiration
O oN
SUID: 48382-38294
D
Status: Valid
Product Name: CSAOTPERSPECTIVEMGR
Te i
SUID: 00000-00000
End User Code: EU0000000
Licensed Version: 1.0
License Information in
te te
Status: Valid
O
The XML file contains the same license information found on the UI (with
an additional report hash or file checksum value) as illustrated in the
following figure.
O oN
pe o
D
n tD
Te i
xt str
In ibu
te te
rn
al
1. Continuing from the previous step set, where steps 1 through 7 have
already been performed click the License Overview tab.
O oN
pe o
D
n tD
Te i
This step set assumes that a suitable Content Server License has
rn
4. Select the Content Server license file and click Open (e.g., C:\Install Files
for Content Server\INSTALL CS 16.0 - Release\CS16.0 OT LS Rel 16.0
NonProd.lic).
O oN
pe o
D
n tD
Te i
xt str
In ibu
te te
rn
The page refreshes and a New License File Details section appears with
information from the license file that you just opened and are going to
apply.
O oN
pe o
D
n tD
Te i
xt str
In ibu
te te
5. Click Apply License File to apply the License File to the Content Server
al
installation.
U
se
O
nl
y
The Status will update from Unlicensed to Valid. When the license file is
successfully applied, the Manage Licenses page appears, and Valid
appears in the Status field of the Content Server License Overview.
O oN
pe o
D
n tD
Te i
xt str
In ibu
Figure 4-15:
D
Summary
n tD
Exercises
If you did not apply a Content Server License file while following along with the instructor demo
during the course, you will do so in this exercise. In the next exercise you will apply a WebReport and
an OIOE (Object Importer) License file.
2. Navigate to the administration pages, using your preferred method, which may include:
O oN
c. the Global Menu bar > Admin > Content Server Administration
Te i
6. Select the Content Server license file and click Open (e.g., C:\Install Files for Content
te te
The page refreshes and a New License File Details section appears with information from
the license file that you just opened and are going to apply.
al
7. Click Apply License File to apply the License File to the Content Server installation.
U
The Status will update from Unlicensed to Valid. When the license file is successfully
se
applied, the Manage Licenses page appears, and Valid appears in the Status field of the
Content Server License Overview.
O
1. This exercise assumes we are continuing from the previous exercise, otherwise you need to
sign in and navigate to the administration pages.
3. On the License Overview tab, confirm that both WebReports and OIOE are both
unlicensed.
6. Select the WebReport license file and click Open e.g., C:\Install Files for Content
Server\INSTALL CS 16.0 - Release\CS16.0 OT LS WR16.0 NonProd.lic).
The page refreshes and a New License File Details section appears with information from
the license file that you just opened and are going to apply.
8. Click the Show Details link to display additional modular licensing information.
9. Repeat the previous steps in this exercise to license the OIOE module, using the the
O oN
following license file: e.g., C:\Install Files for Content Server\INSTALL CS 16.0 -
pe o
D
10. Restart the Server services (this makes WebReports available on the Add Item menu etc.).
Te i
O oN
pe o
D
n tD
Te i
xt str
In ibu
te te
rn
al
U
se
O
nl
y
5. Cluster Management
Objectives
Overview
pe o
D
This chapter deals with the Cluster Agent Service and Patch
n tD
Management.
Te i
You can start the necessary services using the provided Start >
Start-Stop-Scripts > CS16b on batch file and powershell script
rn
1. If any of the CS16b services are running, they all need to be stopped.
2. Launch the Host File Editor and update the IP address of your TrainOTCS
O oN
n tD
Te i
xt str
In ibu
te te
Section='ContentServer.HostInfo'
se
Cluster Agent
1. If the Content Server Cluster Agent service (CS16b) is not running, it needs
to be started by navigating to Services and then starting the service.
Although the Cluster Agent Service is not required for the basic features
and functionality of Content Server, the service is required to access the
corresponding Administration pages, to perform Cluster and Patch
Management activities and poll systems for applicable setting values.
O oN
pe o
Figure 5-1:
D
When the Content Server service is started, and no hosts have been
In ibu
only one such entry for each instance, as illustrated in the figure below.
al
Figure 5-2:
U
If, however, the IP address of the host system was dynamic (i.e., DHCP
O
Cluster Management
The Cluster Management administrative options and links are described
in the following table:
Cluster Audit History Review audit history for the Content Server
n tD
instances.
Te i
Manage Cluster Agents View detailed cluster agent and host information.
manually copied and thus made available to Content Server and Cluster
Management.
O
Cluster Management
Figure 5-4:
Administration Pages
O oN
pe o
D
Figure 5-5:
al
Cluster Management
Pages
U
se
O
nl
y
n tD
Te i
xt str
In ibu
Manifest URL The URL that is used for updating the system manifest.
2. Select Help – For This Page to consult the available help information for
the applicable URLs for Windows, Solaris and Linux systems and their
O oN respective Manifests.
pe o
D
n tD
Figure 5-7:
Te i
We’re hosting the manifest file on the local TrainOTCS IIS web
server, therefore the difference in URLs.
nl
Once the validation has been completed, you are informed that the
system has validated the Manifest URL.
Figure 5-8:
Validating Manifest
O oN
pe o
D
5. Click OK to continue.
n tD
Master System The Master System specified here acts as a ‘master’ template that is used
Te i
Figure 5-9:
se
7. Select the master system (e.g., TrainOTCS) and click the OK button.
The Master System field will be updated with the selected host
information.
Staging The Patch Staging Folder is the location where the new patches will be
staged for the database.
Download With this option enabled, Content Server will automatically download
and stage patches, however, this option does require an Internet
connection and valid Knowledge Center account.
9. For purposes of this step set, leave the default of Download disabled.
10. Click Save Settings.
11. Click the Yes button to confirm you are sure you want to save the settings.
The system will once again validate the Manifest URL and display a
message.
When the Manifest has been validated and the settings saved, you are
O oN
n tD
The Manage Cluster function analyzes and displays information about the
Content Server hosts. When the Analyze Cluster page loads, it will
In ibu
It will also list information for each Host, including the following:
rn
It may take Content Server a few minutes for the system to respond as it
nl
If the Install path does not say C:\CS16b or the port say 22099, inform
your instructor.
Manage Updates
pe o
D
n tD
Manage Updates
Te i
Before the Manage Updates page is displayed, the first time the page is
accessed with a master system, the master system will be validated and
In ibu
figure:
rn
Once the Manifest has been updated, you are prompted to confirm the
analysis of the Master System.
al
U
se
Figure 5-11:
O
Validation of Master
nl
System
y
n tD
Te i
xt str
An analysis page will display and be updated throughout the process and
In ibu
the validation may take several minutes. The following figure represents a
history of the analysis:
te te
rn
al
U
se
O
nl
Figure 5-12:
y
Analysis Report
Figure 5-13:
Analysis Report
O oN
pe o
D
n tD
Te i
3. Click OK.
xt str
The system will record various information and process the information
In ibu
Available Available lists the available patches on the OpenText Knowledge Center
for download.
al
Staged Staged lists the currently downloaded patches that are in the Patch
U
Staging folder.
se
O
nl
y
Installed Installed lists the installed patches, indicating their status as Error (faulty
install), Removal (being removed), or Verified (successful install).
O oN
pe o
D
n tD
Te i
xt str
modular patches displayed will vary with time and based on the
optional modules that a system has installed.
al
U
Refresh Button Click the Refresh button to update the listing of Available patches.
se
Page Navigation Buttons Click the << >> buttons to move forwards or backwards if there are
multiple pages of Available Patches.
O
nl
y
n tD
Figure 5-15:
Te i
Patch Details
xt str
In ibu
te te
rn
al
Figure 5-16:
O oN
pe o
Knowledge Center
D
n tD
Te i
xt str
In ibu
te te
rn
al
You would repeat the previous download step to download all of the
remaining available patches.
O
informing you that the patch has been superseded. You can therefore
ignore that particular patch and ensure that the patch is either already
y
For training purposes, all of the required patches can be found in the
C:\Install Files for Content Server\INSTALL CS 16.0 - Release\v16
General Hot Fixes (Mar 2016, Rel) folder.
6. Copy the following patches ending in 03, 04, 09, 15, 16, 17, 18, 19, 20,
23, 24, 25, 26, 29, and 30 from C:\Install Files for Content
Server\INSTALL CS 16.0 - Release\v16 General Hot Fixes (Mar
2016, Rel) to C:\CS16\clustermanagement\staging.
7. Click the Staged tab and click the Refresh / F5 button; it may take a minute
or two for the system to update the page.
n tD
Te i
xt str
In ibu
te te
rn
al
8. Select all of the patches for deployment under the Install column.
se
O
nl
Figure 5-18:
y
9. Click Deploy.
O oN
pe o
D
Figure 5-19:
n tD
Confirm Deployment
Te i
xt str
In ibu
te te
rn
al
The Deploy System page will display and refreshes, providing you with
updated and overall status information regarding the patch deployment.
O oN
pe o
D
Figure 5-20:
n tD
Overall Status
Te i
xt str
In ibu
te te
rn
al
U
The system will then deploy the patches, restarting the various services
se
Figure 5-21:
When all of the patches have been deployed, the system will save its
system information.
When the deployment is complete, you are asked to validate your system
and confirm the deployment was complete.
O oN
pe o
D
n tD
Te i
xt str
In ibu
te te
rn
13. Click the Details link to review the information regarding individual
patches.
U
se
15. Click Cluster Management at the bottom of the page to return to the
nl
Cluster Audit History Allows you to review an audit history for this Content Server instance and
the cluster maintenance performed on it.
The Cluster Audit History function displays the events that happened on
a cluster with deployment and analysis of patches.
When a Content Server instance is first installed, the Audit History will be
blank.
O oN
pe o
D
n tD
Te i
xt str
In ibu
te te
rn
The Audit History page displays all events on the available hosts,
U
Details The Details link provides additional information about the event.
17. Click Details to open an Event Details window with further information
regarding the audited event.
Figure 5-24:
O oN
Event Details
pe o
D
n tD
Te i
xt str
In ibu
administration page.
al
Update Analysis Analyze clustered systems and determine update impact prior to
installation.
U
se
21. Click the Add opposite to the Host to expand the displayed information.
nl
y
O oN
pe o
D
n tD
Figure 5-26:
Analysis Complete
O
nl
y
O oN
pe o
D
Figure 5-28:
al
The report will identify new files supplied by the update or hotfix.
O oN
Figure 5-29:
pe o
n tD
Te i
xt str
In ibu
te te
rn
The report is updated and shows file differences between source and
updated files.
O oN
Figure 5-30:
pe o
D
File Differences
n tD
Te i
xt str
In ibu
te te
rn
31. Click the Admin Home link to return to the admin pages.
U
se
are using a monolithic architecture and as a result the instance are not
y
The Cluster Agents function displays the hosts for Content Server. The
Cluster Agents page displays all the following information about the
available hosts and instances:
Host is the name of the Content Server instance.
Port is the number of the port that the Content Server instance uses.
Agent Status lists if the host is active, idle or offline.
Last Updated lists the time that the most recent change was made to a
Content Server instance.
Status lists if the host is online or offline. It the Status is online,
detailed information about the host is available.
O oN
pe o
D
Cluster activities.
te te
rn
displayed.
U
41561891).
y
Summary
In summary, in this chapter we:
Described the functionality associated with Cluster Agent Service
and Patch Management
Installed applicable patches to a Master Content Server system
Exercises
This exercise will provide you with an opportunity to practice what you have learned earlier in this
chapter about the Cluster and Patch Management, including: Cluster Agents, Cluster
Administration.
If you have already performed Cluster Management using the provided CS16b instance by
following the instructor demo, then you can skip to the end of this chapter exercise.
For training purposes only and because of the likelihood of the TrainOTCS’s CS16b instance
acquiring multiple sets of host information, you will use SQL Server Management Studio to first
query the database to learn what information it has stored and then delete it, so that when the
O oN
CS16b instance’s services are started, it will be working “from a clean slate”. None of these activities
pe o
D
would be required in a production setting, where the servers would all be assigned static IP
addresses and host names would be resolved using DNS.
n tD
Te i
1. If any of the CS16b services are running, they all need to be stopped.
xt str
2. Launch the Host File Editor and update the IP address of your TrainOTCS vmware instance
(i.e., update 192.168.254.100 with your IP). Remember to Save your changes, before you
close this application.
In ibu
te te
8. The query will delete an equal number of rows that were first reported.
y
10. Now, when the CS16b services are started, the CS16b instance will resolve to TrainOTCS.
1. If the Content Server CS16b services, especially the Cluster Agent service is not running,
they need to be started.
2. Make a note of the IP address of your system, after opening a command prompt window and
running the ipconfig command.
Cluster Management
4. Navigate to the Administration pages > System Administration section. If prompted for
the Administration Password, enter opentext.
8. Click Browse opposite Master System field and select TrainOTCS the master system and
Te i
10. Click Yes to confirm you are sure you want to save the settings.
te te
13. The Agent should have an install path of C:\CS16b and a port of 22099, if not, inform your
O
instructor.
nl
Manage Updates
17. Click Details to review information regarding the available patch then click Close when
finished reviewing the details.
18. Copy the following patches ending in 03, 04, 09, 15, 16, 17, 18, 19, 20, 23, 24, 25, 26, 29, and
30 from C:\Install Files for Content Server\INSTALL CS 16.0 - Release\v16 General Hot
Fixes (Mar 2016, Rel) to C:\CS16\clustermanagement\staging.
19. Click the Staged tab and click the Refresh / F5 button; it may take a minute or two for the
system to update the page.
20. Select all of the patches for deployment under the Install column and click Deploy.
23. Click the Details link to review the information regarding individual patches then click
Close.
24. Click Cluster Management at the bottom of the page to return to the cluster administration
O oN
page.
pe o
D
n tD
26. Click Details to open an Event Details window with further information regarding the
audited event then click OK to close the window.
In ibu
O oN
pe o
D
n tD
Te i
xt str
In ibu
te te
rn
al
U
se
O
nl
y
6. Database Administration
Objectives
Overview
n tD
Change Current Database Change the Content Server database which Content
Server is connected with.
al
View Content Server View a list of the tables created for this Content
U
relational database.
Verify This Database Verify the integrity and status of this Content Server
database.
Many of the database maintenance tasks that you will carry out for
Content Server will be done directly through the DBMS (e.g., Microsoft
SQL Server) interface. However, if you do not have access to that
interface, there is a Maintenance Tasks link on the Maintain Current
Database page that allows you to log in to the database and perform basic
operations through Content Server’s web interface. This is the same page
O oN
Database Administration
al
Database Administration
U
se
Figure 6-1:
Administration Pages
n tD
Te i
xt str
In ibu
te te
rn
al
U
se
O
nl
When you deselect your current Content Server database, you are
offered the choice of deleting or keeping the data sources that are
associated with your current database. By default, deselecting the
current database will delete the data sources listed below along with their
search indexes on disk. To prevent a data source from being deleted so
that you can preserve it or back up the search index, clear the check box
beside the index in the Delete column.
You must stop any Admin Servers and remove the search.ini and
otadmin.cfg files from the config directory of each Admin Server
prior to connecting to a different database. This prevents
O oN
Figure 6-3:
y
Administration Pages
O oN
pe o
D
Figure 6-4:
n tD
Page
xt str
In ibu
te te
rn
al
Object tables may include: views, user table, trigger, stored procedure,
nl
etc.
y
O oN
Figure 6-5:
pe o
D
SQL Sever Name Depending on the naming convention used during the installation of
Microsoft SQL Server [2012], the field could either be the system name
U
System User The default system user for SQL Server is “sa”.
System Password The system password is the one assigned to the “sa” user when SQL
Server was installed.
n tD
Te i
xt str
In ibu
te te
rn
al
U
se
O
nl
y
Figure 6-7:
n tD
Te i
xt str
In ibu
te te
rn
al
U
Figure 6-8:
se
Upgradeable Schema
O
nl
y
19. Click Admin Home to return to the database administration page; clicking
Continue returns you to the Maintain Current Database page.
After starting the verification, you will see an option to click here to check
on the status of your verifications. If you click the link prematurely, it will
n tD
erroneously report that there are no errors in the database, even though
Te i
Changes have been made to reduce the number of false positive errors
rn
This Step Set continues from the previous one and assumes you are still
signed in using an administrative account and are located on the Maintain
Current Database page.
O oN
pe o
D
n tD
Figure 6-9:
Te i
O oN
pe o
D
n tD
Figure 6-10:
Te i
Custom Verification
xt str
Options
In ibu
te te
rn
al
U
se
O
3. Select one or more of the available tests to perform on the Content Server
nl
Content Server will state that Your verifications have been started.
Figure 6-11:
Verification Status
The page will update and display the Verification Report. In this example,
O oN
Figure 6-12:
xt str
Custom Verification
Complete
In ibu
te te
rn
The page will update with a message informing the user that the Database
Verification is being performed.
The time to run the diagnostic depends on the selected diagnostic level
and the size of the database; the diagnostic will take longer with higher
levels of diagnostics and larger databases.
As seen earlier with the custom verification level process, Content Server
will state that Your verifications have been started.
10. To check the status or progress of the verification, select click here.
The page will update and display the Verification Report. In this example,
O oN
n tD
Te i
Figure 6-13:
xt str
Verification Complete
With No Errors
In ibu
te te
rn
In this example, there are several separate database rows being reported
all related to a DAPI Node ChildCount error.
O oN
pe o
D
n tD
Te i
xt str
Figure 6-14: Example of a Content Server Database Verification Report with ChildCount Issues
In ibu
te te
11. Navigate to C:\CS16\logs\ and filter the directory for *.txt files.
U
se
O
nl
y
12. Right-click the verifylog2.txt file and select TextPad (Hint: You will want to
choose Configure > Word Wrap in Text Pad to be able to more readily view
the contents of the log file).
A<1,?,'dbType'='MSSQL','logFormatVersion'='1.1','suiteList'
={'DBWizApiRoot.VerEssentialNodes','DBWizApiRoot.VerTempDBC
ollation','DbWizApiRoot.VerChildCount','DbWizApiRoot.VerPar
entIDs','DbWizApiRoot.VerDocIds','DbWizApiRoot.VerDTreeCore
IsValid','DbWizApiRoot.VerACLCount','DbWizApiRoot.VerDVDPro
viderID','DbWizApiRoot.VerPDProviderID','DbWizApiRoot.VerGr
oupMembers','DbWizApiRoot.VerKUAFChildrenIDs','DbWizApiRoot
.VerAllDTreeRowsHaveAncestor','DbWizApiRoot.VerAncestorIDIn
DTree','DbWizApiRoot.VerDataIDInDTree','DbWizApiRoot.VerNoM
O oN
inusOneID','DbWizApiRoot.VerReflexiveRow','DbWizApiRoot.Ver
Figure 6-15:
pe o
FileName','StorageProvider
D
VerifyPkg.VerifyStorageProviderAllObjects'},'systemUpdateNu
Contents of a Verify Log
mber'=0,'systemVersion'='16.0.0'>A<1,?,'errMsg'=X<WEB_ERRMS
n tD
File
G2.DAPIErrorNodeChildCountDoesNotMatchTheNumberOfChildren>,
'info'=V{<'Name','OwnerID','ParentID','DataID','ChildCount'
Te i
,'DataType','SubType','ACLCount'><'Content Server
Reports',-2002,-1,2002,45,?,211,4><'Slice Folder',-
xt str
2000,11648,11653,3,?,0,5><'Instructor Aids',-
2000,2000,354115,7,?,0,4><'Legal',-
te te
2000,2000,567781,7,?,0,4><'Highly Recommended',-
2000,2000,729846,24,?,0,4>}>
rn
Depending on the type of database error, you can either self-repair the
al
fault using the provided Test or Repair Known Database Issues features,
discussed in the next section, or alternatively, the verifylog2.txt file would
U
support ticket. In the latter case, OpenText will analyze the file and
respond with a Database Verification Error Analysis report.
O
nl
y
Workflow attachment folders (SubType 154) are created when initiating or editing a
workflow with an Attachments component. When editing a workflow, a workflow
attachment folder is created in the editing user's Temporary Workflow Edit Volume
(162). In this situation, children of the workflow attachment folder do not have
the same OwnerID (volume) as their parent, which causes a false positive in the
database verification for ChildCount.
correctly maintain this association within the main Workflow Volume (161) and do
not show up as false positives.
pe o
D
Figure 6-16: Database Verification Error Analysis From OpenText Customer Support
Te i
The following SQL statements will adjust the ChildCount for verified SubTypes:
UPDATE DTree SET ChildCount=(SELECT COUNT(*) FROM DTree WHERE OwnerID=-3211 AND
al
UPDATE DTree SET ChildCount=(SELECT COUNT(*) FROM DTree WHERE OwnerID=-2069 AND
ParentID=2069) WHERE OwnerID=-2069 AND ParentID=-1 AND DataID=2069
se
Figure 6-17: Database Verification Error Analysis via OpenText Customer Support
O
n tD
Te i
xt str
In ibu
te te
Figure 6-18:
rn
Relocate Orphaned Items Identifies and then re-parents any orphaned items into a separate
volume. A full listing of affected items can be viewed by running a Level 2
Database verification.
Insert Missing Reflexive Inserts missing reflexive rows into the DTreeAncestors table for volume
Rows for Volume Objects objects.
Regenerate ChildCounts Regenerates incorrect ChildCount column values within the DTreeCore
table.
Regenerate ACLCounts Regenerates incorrect ACLCount column values within the DTreeCore
table.
Delete references to Deletes references within the KUAFChildren table to nonexistent Users
nonexistent Users and or Groups.
Groups
Delete orphaned rows in Deletes rows within the DVersData table with references to both
DVersData nonexistent DocIDs and ProviderIDs.
Identify Document Class Identifies any cycles in your Document Class parent-child relationships.
Cycles
These cycles can cause recursion problems when building Document
O oN
Class facets.
pe o
D
Recalling the earlier reported error (i.e., “Child count does not match...”), it
can be remedied using one of the Test or Repair Known Database Issue
n tD
features.
Te i
Figure 6-19:
U
Figure 6-20:
The system will report that the previously reported issue was repaired
and that there are no errors found in the database, as illustrated in the
following figure:
Figure 6-21:
Use this page to modify the password Content Server uses to connect to
rn
This Step Set continues from the previous one and assumes you are still
signed in using an administrative account and are located on the Maintain
O
O oN
pe o
D
n tD
Te i
xt str
O
Summary
In summary, in this chapter we:
Performed database administration and maintenance tasks from the
Content Server’s Database Administration page, including viewing
tables and updating a database connection password
Verified database integrity and status
Tested and Repaired Known Database Issues
O oN
pe o
D
n tD
Te i
xt str
In ibu
te te
rn
al
U
se
O
nl
y
Exercises
This exercise will provide you with an opportunity to practice what you have learned earlier in this
chapter about the database verification and fixes.
Database Verification
2. Navigate to the Administration pages > Database Administration section, and click
Maintain Current Database. If prompted for the Administration password, enter opentext.
O oN
pe o
4. Begin with a Custom Verification and click Go To Custom Verification Options, then select
n tD
Verify the existence and size of all objects stored in physical storage providers
te te
Verify the existence and size of system objects stored in physical storage providers
rn
6. Check the status or progress of the verification by selecting click here. Results of the
diagnostics should confirm that no errors were found, as illustrated below:
U
se
O
nl
y
10. Check the status or progress of the verification by selecting click here.
11. Review the created verifylog#.log file is by navigating to C:\CS16\logs\ and filter the
directory for *.txt files. Right-click the verifylog?.txt file and select TextPad (Hint: You will
want to choose the verifylog file with the highest number and Configure > Word Wrap in
Text Pad to be able to more readily view the contents of the log file).
13. Click Test or Repair Known Database Issues followed by Regenerate ChildCounts.
Content Server provides a summary of its testing and what will be corrected:
O oN
pe o
D
n tD
Te i
xt str
In ibu
te te
rn
al
U
se
14. Click Regenerate ChildCounts then click OK to proceed. The database child count will be
repaired.
O
7. System Administration
Objectives
Overview
pe o
D
n tD
Auditing types.
Administer Object and Set which users and groups can create each type of
Usage Privileges Content Server item.
Configure Status Page for Configure Settings for multi-select processing status
Multi-Select Actions page.
Configure the Operations Specify the method to perform the transaction for
for Copy, Delete and copy, delete, and move.
Move
Open the Categories Work with the objects in the Categories Volume.
n tD
Volume
Te i
Recycle Bin Configure the settings for the Recycle Bin including
the purge duration and user access options.
xt str
respective topics:
te te
Recycle Bin
nl
y
Monitor Blob Administrators can review which objects are scheduled for deletion, as
Deletion Failure well as remove blobs manually.
Configure the Blob The link redirects the administrator to the Configure Scheduled Activities
Failure Retry Agent page and allows modification to the default (i.e., midnight) agent schedule
O oN
n tD
(https://knowledge.opentext.com/knowledge/livelink.exe/
Properties/CT700069), for more information regarding Blob
xt str
Deletion Retry.
In ibu
te te
versioning parameters. You can also enable the Advanced Add Item
process, which allows users to choose a Category when they add an item
se
if the item they are adding is of a MIME type that has more than one
Category associated with it. The settings you specify on this page become
O
the default values for Content Server items that are reservable or
versionable.
nl
y
Figure 7-1:
O oN
n tD
Te i
xt str
In ibu
These settings affect all items in the entire Content Server system; by
default they are not enabled.
U
se
O
Figure 7-2:
nl
Triggers
Selecting a check box below restricts the event from triggering an update
to an item's modified date. Checking the Permissions modification box
below also implies that the event will not send such changes to Search
Engine, which can improve the search indexing.
If you are upgrading from a previous version, you should review the item
pe o
D
Activity Manager
xt str
Figure 7-3:
n tD
Te i
xt str
In ibu
When you click the Restrict link, you must then define the set of users and
te te
groups that are allowed to create the item. Anyone not included in this set
will not be able to choose that item from any Add Item menu in the
rn
system.
al
Simplify the interface for new users. By limiting what they can add in
the system, they may require less training
se
Control the size of your database by not allowing casual users the ability
to add items. Users who only need to browse the system will not
O
unimportant items
Enforce proper use of the tools available to Content Server users. For
y
example, perhaps only users who have had workflow training should
be able to create workflow maps
Figure 7-4:
O oN
Privileges Section
n tD
Te i
xt str
In ibu
te te
rn
al
Recycle Bin Allows you to view, restore, and purge any items in the Recycle Bin.
Allows you to access the Recycle Bin even if user access to the Recycle
U
ActiveView Allows you to view and manage ActiveView overrides for the Classic View
nl
of the Content Server user interface. The privilege also allows you to view
y
and manage Perspectives for the Smart View of the Content Server user
interface.
Facet Administration Allows you to access the Facets Volume from the Tools global menu and
to create Content Server Facets and Columns.
O oN
Figure 7-5:
pe o
D
As we learned earlier, you can remove the owner, owner group and Public
Access from objects in Content Server. Normally, anyone with Edit
al
Permissions permission can remove them and restore them. This page
lets you restrict their restoration to only system administrators.
U
se
note, this behavior only occurs when moving items from the Personal
Workspace to a folder in the Enterprise Workspace, and not from a folder in
y
Figure 7-6:
O oN
Administer Rendering
Settings
pe o
D
n tD
Te i
When enabled, as is the case here, the generated HTML page contains
rn
<HTML>
<HEAD>
<META http-equiv="content-type" content="text/html;
O
charset=UTF-8">
nl
You can also set the BASE HREF value in an HTML page that includes a
custom view. If no values are present in this page, default values in the
HTTP request are used. The settings include:
Protocol: a list from which you can select either http or https
Host: a text field which allows you to enter the hostname of the server
to include in the BASE HREF URL
Port: a text field which allows you to enter the port of the web server
used in the BASE HREF URL
This setting refers to Copy, Move and Delete which appear at the top of
every folder -- the Multi-select buttons.
n tD
deleted, you are taken to a Status page that displays the progress of your
actions. The page refreshes after every 5 items have been processed.
xt str
In ibu
te te
Figure 7-8:
rn
You have two options for these operations. The default is to commit the
y
Figure 7-9:
n tD
Te i
xt str
up.
te te
rn
Memcached Statistics
al
Memcached proceses are managed just like the other Content Server
U
Figure 7-10:
Memcached Statisticse
n tD
Te i
xt str
In ibu
te te
rn
al
U
se
O
nl
y
Objectives
Overview
n tD
including the setting of auditing interests, querying the audit log and
purging the audit log.
xt str
Set Auditing Interests Select which events you want to audit for which items
in the Content Server database.
U
Query Audit Log Query the audit log to view information by item type,
se
Purge Audit Log Purge information from the audit log, based on event
O
Manage Audit Records The Content Server auditing system was changed
Created in Prior Releases following version 9.2. The Content Server auditing
y
Audit Security Settings Allows the Admin user [only] to alter the security
settings for auditing maintenance tasks.
Any user with See and See Contents permission for an item can view its
O oN
their data is stored in the WWorkAudit table. You can view their
Te i
Figure 8-1:
Administration Pages
O oN
pe o
D
n tD
Te i
xt str
Figure 8-2:
y
The important point to notice with the Admin user account is the
presence of the Audit Security Settings administrative option.
7. Log out as the Admin User and sign in using an administrative account (e.g.,
sadmin/letmein).
It is important for the Admin User to review the Set Auditing Interests
page settings to ensure the appropriate events are being audited for
their respective systems.
With upgrading to a newer Content Server, or the addition of
cumulative updates, there may be additional auditing events available,
O oN
n tD
The Set Auditing Interests page should be reviewed after the following
activities, since additional audit events are not always enabled by default,
Te i
including:
xt str
O oN
pe o
D
n tD
Te i
xt str
In ibu
te te
rn
al
U
se
O
nl
y
Figure 8-3: Example of Set Auditing Interests Page with All Events Selected
Events To enable event auditing, select the check box for the event.
To disable event auditing, clear the check box for the event.
The help for this page can be used to obtain more information and
explanations regarding the auditing of specific events.
O oN
pe o
D
n tD
Te i
xt str
Fundamentals course.
se
O
Options
nl
Audit Attributes Changed This auditing option is enabled by default and it records an Attributes
Changed event when an item (or item version) that is created or copied
has a Category Attribute applied to it, and the default value of the
Category Attribute is changed.
As the Admin User or a user with system administration privilege, you can
view the entire audit trail for all items from the Query Audit Log page.
In ibu
dates.
rn
This page essentially gives you a flexible interface to run SQL statements
against the DAuditNew table.
al
past two weeks
nl
y
Figure 8-5:
n tD
Te i
xt str
In ibu
To query specific items, click the By Type radio button, and then select
an item in the drop-down list
U
To query a single item, click the Single Item radio button, and then
se
click the Browse Content Server button, navigate to the item, and
then click its Select link
O
To query items that belong to a specific user or group, click the Single
nl
To query the audit log of items up to the present day, leave the To
pe o
D
Date blank
To query the audit log of items since the system was first installed,
n tD
leave the From Date blank
Te i
Rows Per Page The Rows Per Page setting controls the number of results displayed on
each page. The default value is 50; however this can be changed to 100,
In ibu
7. Click Submit Query to query the audit log based on your entered criteria.
al
U
se
O
nl
y
O oN
pe o
D
n tD
Te i
xt str
In ibu
te te
The Audit Log is never emptied automatically. As you can imagine, it can
grow to be very large in a short amount of time. You can purge all or part
y
of the audit log as needed, using the same general interface to define the
records to be purged as you do to query the audit log.
Before purging the audit log, you may choose to back up your database.
You will have to establish a policy on how much and how long your
Content Server instance is audited. But remember that once you purge
the audit trail, you will not be able to run LiveReports on that information.
Your decision on how often to purge the audit log and how to store the
data is often subject to regulatory control. Your policies should be
included in a Best Practices document for your organization and Content
Server system.
n tD
Te i
Figure 8-7:
xt str
To query specific items, click the By Type radio button, and then select
y
button, and then find a user or group
pe o
D
To query the audit log of items or events within a specific time frame,
specify the month, day, and year in From Date and To Date using the
xt str
calendar picker
To query the audit log of items up to the present day, leave the To
In ibu
Date blank
te te
To query the audit log of items since the system was first installed,
leave the From Date blank
rn
5. Enter a From Date (e.g., start of this week) and a To Date (e.g., today).
al
6. Click Purge to begin purging the audit log based on your entered criteria.
U
Figure 8-8:
You can use the Maintain Current Database link on the Content
Server Administration page to access a listing of the record
counts in all tables, including the DAuditNew table, where the
audit records are stored.
The Manage Audit Records Created in Prior Releases page gives you two
pe o
choices to deal with your older audit records. You can convert them into
D
The Audit Security Setting page is available with Content Server 10.0 +
Update 11 and later, which enables the Admin user to restrict the ability
In ibu
To protect the accuracy and integrity of the Content Server audit log,
ordinary users cannot access the Content Server audit log administrative
al
functions. By default, only the Admin User and any user with the system
administration privilege can query the audit log, set auditing interests,
U
and purge the audit log. You can enable Audit Security Settings; however,
se
Figure 8-9:
n tD
Te i
xt str
Limit Audit Config to By default, this setting is disabled and means that any user with the
Admin User system administration privilege can access the Audit Configuration
In ibu
settings.
te te
If the Limit Audit Config to Admin User setting is enabled, it means that
rn
only the Admin user will have the ability to Purge Audit Logs or Modify
Audit Interests.
al
Other users with the system administration privilege will only see the
U
page.
O
nl
y
Figure 8-10:
In the unlikely event that the user navigates to a saved URL (e.g., Set
Auditing Interests), they will receive an error message informing them
that they do not have enough permissions to execute that request, as
illustrated in the figure below.
Figure 8-11:
O oN
Insufficient Permissions
pe o
D
n tD
Te i
xt str
Disable Audit Purge If the Disable Audit Purge option is enabled, then users no longer have
access to the Purge Audit Log functionality, either from the UI or through
a URL. When this setting is enabled, it cannot be reversed.
In ibu
te te
Lock Audit Settings If the Lock Audit Interests setting is enabled, then the Set Auditing
Interests page becomes read-only and users are no longer able to modify
rn
these settings. If the user installs a module that creates their own event
interests, they will be displayed on the page, but the user will not be able
al
Consider carefully before you decide to prevent purging of the audit log
or changing the lock audit interests. Once you take either of these steps,
O
4. If the Limit Audit Config to “Admin” User setting was previously enabled
during this Step Set, ensure that it is disabled and you click Submit to save
the change, otherwise click Admin Home to return to the System
Administration page.
The audit trail, and LiveReports against the audit trail, can show
important system activity. This can help you both show the success of the
system and spot individuals and groups in your organization with “weak”
usage of the system that may need more help and encouragement.
O oN
You can create graphic charts and summary tables showing the system
usage by generating LiveReports which query the DAuditNew table, the
pe o
D
DTreeCore table, the workflow tables, and other parts of the database
schema.
n tD
from the Global Menu bar > Personal > My Workspace > ODG
Maintenance > System, Usage and Audit Reports folder (i.e., http://
xt str
localhost/CS16/cs.exe/Open/353926).
In ibu
Running the ODG Mgmt - Audited System Usage - Pie Chart report
generates a pie chart similar to the following figure, however, results may
te te
vary, based on the events that Content Server has recorded prior to
rn
O oN
pe o
D
n tD
Te i
xt str
In ibu
te te
rn
al
U
se
O
nl
y
Figure 8-12: Example of LiveReport Pie Chart Showing System Usage Based on Audited Events
Summary
In summary, in this chapter we:
Set Auditing Interests
Queried the Audit Log
Managed Audit Records, if Upgrading from Versions Prior to 9.2
Set Audit Security Settings
O oN
pe o
D
n tD
Te i
xt str
In ibu
te te
rn
al
U
se
O
nl
y
Exercises
Overview
This exercise will provide you with an opportunity to practice what you have learned earlier in this
chapter about administering auditable events.
3. Navigate to the Administration pages > System Administration section. If prompted for
the Administration password, enter opentext.
n tD
Te i
5. Enable all of the available events, then click Set Interests followed by Admin Home.
xt str
7. Enter an Event Type of Configuration Changes and a From Date corresponding to the
te te
beginning of this week then click Submit Query. Results will include the most recent, change
to audited events, as illustrated in the following figure:
rn
al
U
se
O
nl
y
O oN
pe o
D
n tD
Te i
xt str
In ibu
te te
rn
al
U
se
O
nl
y
Objectives
Categories and Attributes
pe o
D
n tD
Overview
Te i
This chapter deals with The Content Server System Administration pages
xt str
advice – so in this chapter we will also make sure you are prepared to give
it.
O
This Step Set will make use of the CS16b instance to demonstrate the
Additional Node Attributes feature, so as not to impact of affect the CS16
or Outdoor Gear instance.
1. Start the CS16b instance services if they are not already started.
2. Sign in to the CS16b instance with the Admin user account (e.g., admin/
livelink).
O oN
Figure 9-1:
n tD
Description field and they are also presented when objects, like
documents are added to the system.
xt str
In ibu
Figure 9-2:
a. Name as ODG_Sunset_Time.
D
Figure 9-3:
se
11. Select Include for both attributes and click Save Changes.
12. You will be prompted to restart the Content Server service; click Restart
followed by Continue to complete this process. The service must be
restarted for the Additional Node Attribute changes to take effect.
13. Click Admin Home.
14. To test the additional node attribute, add a document to the Enterprise
Workspace from C:\SampleDocs.
Figure 9-4:
O oN
An Additional Attribute
Displayed on an Add
pe o
D
Document Page
n tD
Te i
xt str
In ibu
te te
because, behind the scenes, Content Server adds a new column to the
DTreeCore table when Additional Node Attributes are added to the
al
system.
U
the DBBMS.
nl
y
letmein).
pe o
Figure 9-6:
U
In the following example, PDF files are associated with the Product Spec
Category.
click the Link button ( ). To remove the link between the MIME
Type and the Category, click Unlink.
6. Click Submit.
The MIME Type will then appear as one of the Assigned Types, as
illustrated in the following figure, when the page is displayed.
Figure 9-7:
n tD
Te i
than one Category associated with it, you must select the
Display categories on second Add Item page check box on the
In ibu
to the Enterprise Workspace > Product Development > Laser Sighter folder,
remembering to click Add.
U
se
When a file with the specified MIME Type is added to Content Server.
O
nl
y
Figure 9-8:
Figure 9-9:
n tD
Te i
maps are not part of this scenario therefore attributes should not be
required for these types of items.
se
When you clear a check box next to an object type’s name on the
Configure Attribute Value Requirements page (as illustrated in
the subsequent figure), the required values will no longer be
enforced. However, the object will still inherit any categories
that are on the parent item.
O oN
pe o
D
n tD
Te i
xt str
In ibu
te te
rn
al
U
se
O
nl
y
letmein).
pe o
The Category Volume can store Category Folders, a useful tool used to
organize sets of Categories, perhaps along departmental lines or
functional roles, and Categories.
If the Product Spec Category was opened for editing along side the
Enterprise Search Manager Regions (discussed later in this course), you
can see a correlation between the Category and search, in support of
earlier claims that Categories can be used to help searches.
O oN
pe o
D
n tD
Te i
Categories and Attributes provide users with a way to collect and store
U
custom metadata; you then have several options with the search
se
interface to find and retrieve this data. However, by default, only system
administrators can create Categories. System administrators can extend
this privilege to certain users and groups in order to control the number
O
Object and Usage Privilege page, system administrators can allow special
Knowledge Managers to create Categories.
it.
al
Keep in mind that in most organizations, 95% of the users will not need to
use a Category from the Categories Volume or elsewhere – they will use
the Categories that are inherited from the folder to which they add items.
O
nl
The Table below lists various Category activities and the corresponding
permissions for Categories and Content Server Items.
y
Modify, Edit
Attributes
pe o
D
Attributes
Contents,
Modify, Reserve
In ibu
Contents
rn
Modify, Edit
Attributes
U
Contents,
Modify, Delete
Versions, Delete
O
nl
y
Summary
In summary, in this chapter we:
Created Additional Node Attributes
Reviewed the Categories Volume functionality
Administered MIME Types and Categories
Configured Attribute Value Requirements
Set Necessary Permissions and Privileges to Selected Users or
Groups to Manage Categories and Attributes
O oN
pe o
D
n tD
Te i
xt str
In ibu
te te
rn
al
U
se
O
nl
y
Objectives
Overview
n tD
section.
te te
Undelete and Recycle Bin Modules Replaced with Built-in Recycle Bin
O
The previously available Content Server [core] Undelete module and the
nl
optional Recycle Bin module are no longer required for use with Content
Server. Administrators will find that the corresponding administration
y
O oN
pe o
D
n tD
Te i
xt str
In ibu
(i.e., opentext).
3. Scroll down to the System Administration section and click Recycle Bin.
O
nl
y
O oN
pe o
D
n tD
Te i
xt str
In ibu
te te
rn
al
U
se
Legacy Undelete or Legacy The other possible Option(s) are dependent on whether the system was
Recycle Bin upgraded from a prior version and it had either the Recycle Bin or
Document Undelete module installed and they contained deleted
documents. If so, additional View Options will appear for example as
“Manage Legacy Deleted Items”.
O oN
pe o
D
n tD
Te i
xt str
In ibu
te te
Legacy data links are only visible if Recycle Bin (RB) or Undelete (UD)
Volumes existed in a system prior to it being upgraded to Content Server
U
v16.0.
se
Users with system administration rights or users with the Recycle Bin
nl
Supported Types
Restorable Click Edit/Review Restorable Node Types to display the tabulated lists
of:
Optional Restorable Node Types
Mandatory Restorable Node Types
The following figure illustrates the objects that can be deleted and
recovered or restored, assuming that they have not been manually
purged by the user or automatically purged by Content Server. The first
group of Optional Node Types are configurable while the second
Mandatory Node Types is not configurable. The numbers in brackets
O oN
n tD
Te i
xt str
In ibu
te te
rn
al
U
se
O
nl
y
You can review the configuration and click Cancel to return to the
previous page or alternatively make changes and click Update to make
the change and also return to the previous page.
Not Restorable Click Edit/Review Non-Restorable Node Types to display the tabulated
lists of:
Non-Restorable Node Types
Non-Restorable Volumes
The following figure illustrates the objects that do not support restore.
When the node type is deleted, they are immediately purged and will not
appear in the Recycle Bin. The numbers in brackets correspond to the
O oN
n tD
Te i
xt str
In ibu
te te
rn
al
U
se
O
nl
y
You can review the configuration and click Cancel to return to the
previous page.
The missing icons for 162, 908, 2504 and the missing names for
731, 732 have already been reported to OpenText. Unknown
(397) is actually My Personal Staging Folder and Unknown (527)
is actually Transport Item Part.
Settings Administrators have the ability to enable or disable the Recycle Bin
O oN
feature, its automatic purging, and the frequency with which the purging
pe o
Enable The Recycle Bin is enabled by default with Allow restore capability for
n tD
restored are maintained by the Recycle Bin after a user has deleted the
object.
xt str
If the Recycle Bin is disabled, with Schedule immediate purge of all items
when they are deleted, all user deleted objects will be immediately
In ibu
deleted.
te te
Purging The Recycle Bin Auto Purge is enabled by default with a value of 60 days.
rn
disabled, the Duration setting is grayed out, and objects retained by the
Recycle Bin will not be subject to automatic purging.
U
se
User Options
User Access The Recycle Bin has User Access enabled by default via Ordinary users
can see Recycle Bin. When it is enabled, users can access the Recycle Bin
and restore or recover deleted items. Users will access the Recycle Bin
from Global Menu bar > Tools > Recycle Bin.
If the Recycle Bin has User Access disabled, users cannot recover or
restore deleted items themselves and there will not be any corresponding
menu option.
Enabling Users can Purge items will allow users to purge [their] items
from the Recycle Bin, just like throwing out the trash.
User View Options The set of view options corresponds to the deleted ‘report’ or filter links
that are made available to end users under the Global Menu bar > Tools >
Recycle Bin, include:
I Deleted Today
I Deleted
Anyone Deleted Today
Anyone Deleted
Disabling every view option will remove the Recycle Bin entry
O oN
from every user’s Personal menu; however, this does not apply to
users with Recycle Bin Manager or System Administration
pe o
D
rights.
n tD
Te i
2. Change to the Smart View UI using Global Menu bar > My Account >
se
Smart View.
O oN
pe o
D
n tD
Te i
xt str
In ibu
te te
rn
al
O oN
pe o
D
n tD
Te i
7. Delete the document and when prompted, confirm the deletion by clicking
In ibu
Yes.
te te
rn
Figure 10-8:
Users should note that Recycle Bin is now accessed from the
Tools menu, not the Personal menu as in prior versions.
n tD
Te i
xt str
In ibu
te te
rn
Figure 10-9: The Recycle Bin and its Contents are Displayed
al
U
se
The Content Filter is available on the side panel, should you need
to filter on an item name, which may be especially true if you
have recently deleted a large number of files.
O
nl
Recycle Bin Views There are a number of possible views available, which can be configured
y
by the administrator.
I Deleted Today I Deleted Today will only display those items that you have deleted today.
I Deleted I Deleted will show a complete history of all of the documents you have
deleted (i.e. that you have deleted, but ones you or the system have not
purged).
Additional metadata columns displayed include who deleted the item, the
date/time when the item was deleted and the parent container where the
item was before it was deleted.
Anyone Deleted Today A user can see what everyone has deleted today.
As previously stated, the ability to select the I / Anyone Recycle Bin views
is configurable by the administrator. In the example below, the Admin
User can see the daily or the full history of what has been deleted.
Users have the ability to Restore, however users do not have the
ability to purge their own deleted documents unless they are
given that right by the administrator.
O oN
Restore A user can readily restore an item, such as a document, that has been
accidentally deleted – as long as it has still been retained by the system
pe o
D
10. Click I Deleted, if that is not the current Recycle Bin View.
Te i
11. Click Restore opposite the item to be restored, or alternatively, use the
multi-select check boxes to pick one or more items to restore.
xt str
In ibu
te te
Figure 10-10:
rn
The page will update and provide you with a confirmation dialog.
nl
12. Click the Restore button to confirm the restoration of the item.
y
The status should say ‘Ok’, otherwise, if there was an issue with the
restore, additional information would be displayed under the Status
column.
Summary
In summary, in this chapter we:
Described the features and functionality of Content Server’s Recycle
Bin
O oN Configured Restorable item Types
pe o
D
n tD
Te i
xt str
In ibu
te te
rn
al
U
se
O
nl
y
Exercises
This exercise will provide you with an opportunity to practice what you have learned earlier in this
chapter about the creating deleting and restoring items. Although the deleting and restoring of
items, like documents would be considered end user functionality, this exercise focuses on end user
item deletions and restores and thereby allow administrators to be familiar with deletes and
restores from a consumer’s perspective.
2. Change to the Smart View UI using Global Menu bar > My Account > Smart View.
D
n tD
5. Drag-and-drop a few files from C:\SampleDocs into the folder then delete one or more of
xt str
the documents.
In ibu
6. Delete the document and when prompted, confirm the deletion by clicking Yes.
te te
7. Using the personal menu, select Classic View and navigate to Global Menu bar > Tools >
rn
Recycle Bin.
al
9. Click Restore opposite the item to be restored, or alternatively, use the multi-select check
U
10. Click the Restore button to confirm the restoration of the item followed by clicking the OK
button to complete the restore process.
O
nl
y
Objectives
Overview
n tD
Modules
te te
including: projects, forms, text editing, users and groups, etc. Depending
on the Content Server package or bundle you have purchased, there are
al
optional modules and solutions are described on the OpenText web site
se
There are often situations where not all modules are immediately
installed and deployed. For example, your organization may roll out a
basic version of Content Server, train your users, migrate documents and
processes, and then subsequently deploy additional modules and
functionality (e.g., Records Management). It is a good idea to create a
spreadsheet containing information like module name, version,
O oN
The Knowledge Center contains a Module Matrix that lists all Content
Server versions and the module versions that match, and their location.
n tD
Te i
knowledge.opentext.com/go/matrix
In ibu
te te
In addition to the core, optional core and optional modules, there are
other possibilities for adding specific or custom functionality:
rn
with your own custom functionality (using the Content Server IDE or
CSIDE).
nl
y
Additionally, all the modules you have purchased will be located in the
Downloads section of the Knowledge Center so you can always download
updated versions.
O oN
pe o
D
n tD
Te i
xt str
In ibu
te te
rn
al
U
se
O
nl
y
Figure 11-1: The Knowledge Center Contains the Product Compatibility Matrix
n tD
C:\CS16b\module\collections_16_0_0\ospaces\collections*.prop
nl
The Properties file stores all of the user text in a given language
(e.g. English, German, etc.) or locale, with keys used by the code.
O oN
pe o
D
Figure 11-2:
n tD
You can install, upgrade, and remove modules from the Content Server
nl
Administration pages.
y
Uninstalling Uninstalling a Content Server module removes it from the Content Server
interface and its functionality; it may or may not remove associated
database schema. The module is then placed in the
\uninstalled\yyyymmdd_hhmmss\ directory so that you can install it
again later if desired.
Upgrading Upgrading a module does just what it sounds like. For example, if we
U
O oN
pe o
D
n tD
Te i
xt str
In ibu
te te
\OTHome\staging\ directory.
O
nl
y
Content Server WebDAV Content Server WebDAV provides the Drag and Drop feature (when
using Internet Explorer). Additional web server mappings are required to
complete the installation and configuration of the module.
You can use the provided CS16b instance for this step set. Ask your
instructor if you are uncertain about which instance to use in class.
1. Start the required Content Server services if they are not already running
(e.g., CS16b).
O oN
2. Launch the IE browser and from the favorites bar, select OTCS 16.0 >
CS16b Admin; the corresponding URL is: http://localhost/CS16b/
pe o
D
cs.exe?func=admin.index.
n tD
4. Select the Module Administration section and then click Install Modules.
You should only see those modules which have been previously staged,
U
and in this case it would be the WebDAV module as illustrated in the prior
se
figure.
5. Open Windows Explorer and navigate to the C:\Install Files for Content
O
Figure 11-5:
O oN
n tD
Te i
xt str
In ibu
te te
7. Click Next.
rn
Figure 11-6:
8. Select I accept the terms in the License Agreement and click Next.
O oN
pe o
D
Figure 11-7:
n tD
Figure 11-8:
O oN
Install Files
D
n tD
Te i
xt str
In ibu
te te
O oN
Figure 11-9:
pe o
D
reveal the presence of the prior WebDAV module, part of the original
core installation that automatically staged the module, and three
additional modules, the result of running the pair of module installers in
O
O oN
Figure 11-10:
pe o
D
13. Return to the browser and refresh the Install Module page (i.e., F5).
U
The page lists the modules that have been staged and are available for
se
installation.
O
nl
y
requires_1={'kernel',16,0}
Example of Modular requires_2={'webwork',16,0}
Te i
File requires_5={'formwf',16,0}
In ibu
1. Select the Module Administration Section and then click Install Modules,
if the browser is not already on that page.
U
You will see those modules which have been previously staged and they
se
Figure 11-14:
xt str
3. Click Restart.
al
Figure 11-15:
nl
Figure 11-16:
You are returned to the Install Module page and it lists any modules that
are staged and available for installation.
O oN
pe o
D
Figure 11-17: Install Module Page Showing Remaining Module Available for Installations
n tD
Te i
We can test that the XML Workflow Interchange and Extension modules
In ibu
editing the map, to confirm that several XML Workflow steps are now
available in Content Server.
rn
2. From the Add Item menu, select Workflow Map and enter a name of Test
Map followed by clicking Add.
U
O oN
pe o
D
n tD
Te i
xt str
In ibu
te te
rn
al
U
se
O
nl
y
Figure 11-18: Testing of the XML WF IC & EX Modules Using the Map Designer
4. From the Global Menu bar, select Map > Save followed by OK.
5. Return to the Administration pages using the Global Menu bar and select
Admin > Content Server Administration.
You will see the modules which have been previously installed and can be
uninstalled. In this example, the modules include the XML WF IC & EX
modules, as illustrated in the following figure:
Request Processor.
Te i
in batches.
In ibu
te te
rn
al
U
se
O
nl
Figure 11-19: Uninstall Module Page Showing the Modules Available for Uninstall
y
2. Select Uninstall for the Content Server XML Workflow Exchange module.
Figure 11-20:
3. Click OK.
D
Figure 11-21:
In ibu
Prompted to Restart
te te
rn
4. Click Restart.
al
The screen will continue to notify you that it is working to restart the
U
service:
se
Figure 11-22:
O
nl
Figure 11-23:
Prompted to Continue
following Service Restart
6. Repeat the prior steps to uninstall the Content Server XML Workflow
Interchange module, confirming the necessary restart and continue
prompts.
7. Repeat the prior steps to uninstall the Content Server XML Request
Processor module, confirming the necessary restart and continue prompts.l
n tD
Te i
xt str
In ibu
te te
Figure 11-24: Uninstall Module Page Showing No Other Modules are Available for Uninstallation
rn
Summary
O
Exercises
In this exercise, you will stage and then install both the XML Workflow Extensions and XML
Workflow Interchange modules to your Content Server CS16b instance. If you already have this
pair of modules installed because you were following along with your instructor’s demo, skip to the
next exercise.
3. Navigate to the Administration pages > Module Administration > Install Modules page. If
prompted for a password, enter opentext.
n tD
Te i
4. From the C:\Install Files for Content Server\INSTALL CS 16.0 - Release\Xtra Modules
folder, run the16.0.0_CS_XMLWFIC64_WIN.exe installer and complete the staging of this
module to the CS16b instance.
xt str
5. Also run the 16.0.0_OTXMLWFE64_WIN.exe installer and stage this module to the CS16b
In ibu
instance.
te te
6. From the Install Modules page, refresh the page to list the XML Workflow modules you
rn
In this exercise, you will also install an optional Content Server module, however, the provided steps
give you minimal instructions, but you can rely on the previous exercise for additional guidance and
y
2. Install the Attribute Extensions module, using the Module Administration > Install Module
page. Sign in using admin/livelink and with an Administration page password of opentext.
3. Although you could test and confirm that the Attribute Extensions module was successfully
installed by creating a Category and demonstrating the availability of the Text: Table Key
Lookup attribute, a feature of the Attribute Extensions module, as illustrated in the
following figure, there is an easier way for you to confirm the module was installed.
How would you confirm that the module was successfully installed?
O oN
pe o
D
n tD
Te i
xt str
In ibu
te te
rn
al
U
se
O
nl
y
Solution
There are a pair of different ways to independently confirm that the module was successfully
installed:
1. A review of the C:\CS16b\staging\ directory will show that the previously staged module is
no longer there and that it has been incorporated into the C:\CS16b\module\ directory, as
illustrated in the following figure:
O oN
pe o
D
n tD
Te i
xt str
In ibu
te te
rn
al
U
end of that section to reveal the last module that was installed to this Content Server
instance, which will correspond to the Attribute Extension module, as illustrated in the
O
following figure:
nl
y
O oN
pe o
D
n tD
Te i
xt str
In ibu
te te
rn
al
U
se
O
nl
y
Objectives
Overview
pe o
D
Language Packs
al
has the ability to apply Language Packs (overlays) to the default installed
se
involves copying or extracting the files into a directory and the second
stage involves finishing the installation from the Administration pages.
nl
y
There are both Core and Modular Language Packs. Core Language Packs
deal with language localizations for the core Content Server and its
respective shipping modules (e.g., including WebDAV etc.). Modular
Language Packs deal with language localization for the optional module
only (e.g., Attribute Extensions).
Language Packs are available for download from the Knowledge Center,
however, a number of these have been stored locally in the following
folder: C:\Install Files for Content Server\INSTALL CS 16.0 -
Release\Core and Modular LPs.
O oN
pe o
D
n tD
Te i
xt str
In ibu
te te
rn
al
U
se
Figure 12-1: Extract the Language Pack from the Zip File
O
nl
y
'sv'\
Te i
xt str
In ibu
Figure 12-3:
n tD
Te i
xt str
A moment later, a progress bar will appear and notify you as to the
progress of the installation, as illustrated in the figure below:
te te
rn
Figure 12-4:
al
Progress Bar
se
When the installation is complete, you will need to restart the Content
O
Figure 12-5:
If required, you can change the System Default Language from English to
Swedish, by clicking System Default opposite the Swedish language.
View Installed The View Installed Language Packs page provides a useful overview of
Language Packs installed functionality (and modules) and their respective Language
Packs.
11. From the Languages administration page, click View Installed Language
Packs.
O oN
n tD
Te i
xt str
In ibu
te te
rn
al
U
se
O
nl
y
illustrated in the following figure and select 7-zip > Extract Here.
pe o
D
n tD
Te i
xt str
In ibu
te te
rn
al
U
se
O
The Install Language Packs page is displayed, with the staged Swedish
Modular language Packs for the Attribute Extension, XML WF IC and
XML WF EX modules, as illustrated in the following figure:
Figure 12-8:
O oN
n tD
Te i
xt str
7. Select all four of the Swedish modular Language Packs and click Install.
In ibu
A moment later, a progress bar will appear and notify you as to the
te te
Figure 12-9:
U
2. Change the Language setting from English (United States) to Swedish and
click Update.
O oN
pe o
D
n tD
Te i
xt str
In ibu
Figure 12-10:
te te
3. Select Personal (i.e., Personlig) to confirm that the GUI and menus are
localized in Swedish, as illustrated in the following figure:
O oN
pe o
D
n tD
Figure 12-11:
Te i
4. Change the Language setting from Swedish to English (United States) and
O
click Update.
nl
English.
Summary
In summary, in this chapter we:
Installed and configured a Core Language Pack
Installed and configured Modular Language Packs
Exercises
In this exercise, you will stage and then install a Core Language Pack (LP) to your Content Server
CS16b instance. If you already have installed the Swedish LPs, because you were following along
with your instructor’s demo, you can substitute Swedish for one or more of the Western European
locales such as French, German, Spanish, Italian or Dutch.
3. Navigate to the Administration pages > Languages > Install Language Packs page. If
prompted for a password, enter opentext.
n tD
Te i
4. Using Windows Explorer, navigate to the C:\Install Files for Content Server\INSTALL CS
16.0 - Release\Core and Modular LP folder.
xt str
5. Right mouse click on the langpack_16.0.0_cs64_win_sv.zip file and select 7-zip > Extract
Here.
In ibu
6. Copy the C:\Install Files for Content Server\INSTALL CS 16.0 - Release\Core and Modular
te te
7. From the Install Language Packs page, select Swedish and click Install.
al
In this exercise, you will stage and then install a Modular Language Pack (LP) to your Content Server
CS16b instance. If you already have installed the Swedish LPs, because you were following along
with your instructor’s demo, you can substitute Swedish for one or more of the Western European
locales such as French, German, Spanish, Italian or Dutch.
3. Navigate to the Administration pages > Languages > Install Language Packs page. If
prompted for a password, enter opentext.
4. Using Windows Explorer, navigate to the C:\Install Files for Content Server\INSTALL CS
16.0 - Release\Core and Modular LPs\modules\Xtra Modules folder.
5. Using CTRL+mouse click, select the three *.sv.zip modular language Packs and select 7-zip >
Extract Here.
6. Copy the C:\Install Files for Content Server\INSTALL CS 16.0 - Release\Core and Modular
LPs\langpkgstaging folder to C:\CS16b\.
8. Select all of the Swedish modular Language Packs and click Install.
O oN
n tD
In this exercise, you will perform a quick test of the successful installation and configuration of the
Swedish Core and Modular Language Packs, by temporarily changing the default Language for the
xt str
2. Change the Language setting from English (United States) to Swedish and click Update.
rn
3. Select Personal (i.e., Personlig) to confirm that the GUI and menus are localized in Swedish.
al
4. Change the Language setting from Swedish to English (United States) and click Update.
U
se
O
nl
y
Objectives
Overview
pe o
D
n tD
Multilingual Metadata
xt str
Figure 13-1:
Configuring Multilingual
Metadata
With a new Content Server installation, only the System Default MLM
language will be displayed. This is the one specified during installation as
the default MLM Language, as illustrated in the figure below:
O oN
Figure 13-2:
pe o
D
Installation
Te i
xt str
4. Click Add New Metadata Language … and scroll down the list to select the
desired MLM language to add to Content Server (e.g., Sweedish - sv).
O oN
pe o
Figure 13-4:
D
entries.
y
The new MLM is added, but it is not enabled by default and will appear at
the end of the other enabled languages, out of alphabetic order.
O oN
pe o
D
n tD
Te i
Server, click the System Default radio button for the language.
se
O
nl
y
7. To edit the Language Name, click the language's Edit icon, and enter a new
language in the Language or Language (Local) fields, and then click Save. If
available, different database Collations can be changed from the default
value.
O oN
pe o
D
n tD
Te i
xt str
In ibu
te te
8. To delete a language that has been added to the system but is no longer
al
Figure 13-8:
nl
Figure 13-9:
The MLM language will be removed from the list of available languages
n tD
9. Click the Admin Home link at the bottom of the page to return to the
Content Server Administration page.
xt str
In ibu
conditions to consider:
al
MLM Value is Available in Where the search term is part of the node Name (or Description) and the
the Preferred Language MLM value is in the user’s preferred language.
U
The search result node Name will appear using standard formatting.
se
O
1. This step set assumes that you are signed in with a system administration
y
The search for ‘customer’ yields the following results, remembering that
the user account has a preferred language of English:
O oN
pe o
D
n tD
Te i
xt str
In ibu
Figure 13-10: Search Results Where MLM Name is in User’s Preferred Language
te te
4. From the Global Menu bar select My Account > Log-out and sign in using
an international user account (e.g., mdumont/opentext), so the prior
rn
language.
5. Navigate to the Enterprise Workspace > ODG Parent Company folder.
U
The search for ‘customer’ yields the following results, remembering the
user has a preferred language of French:
O oN
pe o
D
n tD
Te i
xt str
In ibu
Figure 13-11: Search Results Where MLM Name is in User’s Preferred Language
te te
MLM Value is Available in a Where the search term is part of the node’s Name (or Description) and
rn
Different Language the MLM value is in a different metadata language (e.g. if the user
preference is French but a match is found in English text), the preferred
al
Figure 13-12: General Properties Page of a Search Result Where MLM Name Is in a Different Language
Search Results – and MLM metadata, for example on the General >
Properties page -- are displayed using the MLM value in a different
language from the preferred language.
MLM Value is Not Where the search term is part of the node Name (or Description) and the
Available in the Users MLM value is not in the user’s preferred language.
Preferred Language
From the node’s Properties > General page, the MLM value will appear
with its language code. The node’s name and/or description are followed
by a grayed out MLM Editor globe icon and the language code.
7. When done reviewing the search results, Fselect My Account > Log-out
and sign in using an administrative account (e.g., sadmin/letmein).
O oN
pe o
Hit Highlighting Hit highlighting, if active, will highlight the matching text only. If the
D
match is in the user’s preferred language, other MLM values will not be
n tD
description field values by default, the results will show the user default
description as well as the description text in the matching language. The
xt str
second description follows the same format as the name. That is, it shows
the language code and grayed out (inactive) globe icon. It will only show
In ibu
one matching description field while any other matching ones are
suppressed.
te te
rn
Summary
al
and view Content Server item names and descriptions in their
preferred language
O
metadata language
y
Exercises
This exercise will provide you with an opportunity to practice what you have learned earlier in this
chapter about working with Multilingual Metadata (MLM) in Content Server.
1. Sign in using the sadmin/letmein administrative account, if you previously logged out.
2. Navigate to the Administration pages > Metadata section; enter opentext, if prompted for
the administration page password.
O oN
pe o
3. Click Configure Multilingual Metadata and add at least one additional metadata language
D
that is not already in use by the Content Server system (e.g., Swedish). Remember to enable
n tD
5. Edit the MLM for the uploaded document using its Functions menu > Properties > General
tab, and then using the localization icon. For example, ‘Red Tag Sale Event’ in English could
In ibu
Swedish. If you do not know how to localize the document Name/Description into the
metadata language, then use values that are distinctive and will be remembered.
rn
Remember to click OK at the bottom of the Edit Additional Languages dialog to save the
MLM changes and Update on the General tab.
al
6. From the Personal Workspace, enter a an appropriate non-English search term, like ‘rod’ or
U
‘rood’ followed by the enter key. The Red Tag Sales Event doc, with its associated
se
Objectives
Create a Landing Page Perspective for a user or a group
pe o
D
Overview
xt str
Administer Login Page Set or change the ActiveView user that runs the login
User page
Allow AVID In URL Used to set whether AVID is allowed in URLs, and if it
is, can restrict to Admin users only
Open the Perspectives Work with the objects in the Perspectives volume
Volume
n tD
Introducing ActiveView
Te i
now included as part of the [core] system. This module no longer requires
separate licensing.
In ibu
Introducing Perspectives
A Perspective is equivalent to an ActiveView override, but applied to the
Content Server’s Smart View rather than the Classic View. It allows
organizations to change the look and content of a particular component in
the Smart View. For example, one Perspective can be defined to show a
different layout for users depending on their role in the organization.
There are two types of Perspectives: Landing page and Container. The
Landing page is like a default work area while the Container relates to any
Content Server folder-like item.
O oN
pe o
widget configuration.
Te i
xt str
Who Can Create or By default, the ability to create or edit a Perspective is restricted on the
Edit a Perspective Administration pages > System Administration > Administer Object and
In ibu
Figure 14-1:
rn
Usage Privileges
U
While ActiveView > ActiveView Tab controls which users can view or
se
manage ActiveView overrides within the Classic View UI, and the
ActiveView > ActiveView Usage Tab controls which users can see a list of
which nodes are affected by the current ActiveView template, it is the
O
ActiveView > Perspectives Tab setting that controls which users can view
nl
n tD
Te i
xt str
Figure 14-2:
In ibu
te te
ActiveView Administration
The ActiveView administrative links that deal with ActiveView items
include:
ActiveView Appearance Conversion
ActiveView Template Upgrades
Administer Login Page User
Allow AVID in URL
Enable or Disable ActiveView Override Types
Enable or Disable ActiveView Templates
O oN
D
The page will list any ActiveView overrides which are contained within
Appearances, with the exception of ActiveView overrides used by
Appearance Headers or Footers, which cannot be converted.
Use the check boxes in the Select column to select ActiveView overrides
to be converted. Any ActiveView overrides contained within enabled
Appearances will be selected by default.
Use the Select/Deselect All check box to select or clear all of the check
boxes.
Use the drop-down lists in the Priority column to select a Priority value
for the ActiveView override. Overrides can be given one of five Priority
values:
Global (available for global overrides only)
Priority (available for local overrides only)
O oN
High
pe o
D
Medium
n tD
Low
Te i
than one ActiveView template applied to an override type with the same
priority then the first one from the lowest level of the node hierarchy that
In ibu
can be overridden by the higher 'Priority' value that can be set against
local overrides.
se
The conversion will delete the selected ActiveView overrides from the
nl
Appearances they are contained in, and recreate them using the new
method.
y
The page will refresh and display any overrides that are left, with a
message indicating whether the conversion was successful or not, as
illustrated in the following figure:
Figure 14-4:
Appearance Conversion
Successful
O oN
pe o
D
n tD
This page is used to identify and update ActiveView templates using out-
of-date syntax.
rn
As there are no Templates in the system that are upgradable, each of the
above options will result in a “No templates to upgrade” message being
generated.
O oN
The selected user will be used as the context for running the ActiveView
as the Login Page override occurs before a user has logged in. The
selected user will also require the proper permissions for the ActiveView
selected for the Login Page override, otherwise the standard Content
Server login page will be displayed. If no user is specified, then the
standard Content Server login page will be displayed.
To specify a user for this override, simply choose a user, click Apply and
then restart the Content Server service. Whenever this setting is
changed, a Content Server service restart is required for the change to
take place.
Click Clear to delete any saved user and force the login page to display
the standard Content Server login page regardless of an ActiveView
override being set for the login page.
n tD
This section allows you to control the use of the &avid parameter in the
URL to temporarily disable ActiveView Templates from overriding a
xt str
Figure 14-7:
nl
This option allows every single override to be enabled or disabled for each
server in a Content Server system. This page provides a list of overrides
te te
with a description of each one and a check box that allows the override to
be enabled or disabled. The top option allows all ActiveView functionality
rn
O oN
Figure 14-8:
pe o
D
Override Types
n tD
Te i
xt str
In ibu
te te
rn
Once you have made a change to this page a restart will be required and
you will be warned to restart before continuing.
se
When any overrides are not enabled you will see a symbol in the
y
These settings can also be changed via the opentext.ini file, if required,
and are illustrated in the following figure:
[ACTIVEVIEW]
Figure 14-9: ENABLEAV=TRUE
ENABLEDOBJECTS={{'FOLDER-BROWSE',FALSE},{'PROJECT-
Override Types Using BROWSE',FALSE},
Opentext.ini File {'CD-BROWSE',FALSE},{'PWS-BROWSE',FALSE},{'PROJECT-
MENU',FALSE}
n tD
Te i
xt str
In ibu
te te
rn
al
Figure 14-10:
U
ActiveView Templates
se
O
nl
y
n tD
Te i
xt str
In ibu
te te
rn
al
U
se
O
nl
y
n tD
Te i
xt str
In ibu
te te
rn
al
U
se
O
nl
Perspective Administration
The ActiveView administrative features that are new to v16.0 are the
ones that deal with Perspectives and they include:
Manage Global Perspectives
Open the Perspective Manager
Open the Perspectives Volume
View All Perspectives
O oN
letmein) or alternatively a user that has been granted the Perspectives Tab
usage privilege.
te te
Figure 14-13:
The Help icon, located in the top left, is dynamic and will open
the appropriate help page depending on which Perspective
Manager tab is selected at the time.
Screen Width Information As the width of the browser window is increased or reduced, the Screen
width information will update and display either: XL, LG, MD, SM, XS.
Why display the width? This is to show you how the widgets you have
placed on the Configure tab will respond to changes in device size. The
Perspective Manager reacts in the same way as the Smart UI when it
moves between screen sizes. This means you can check the widget and
O oN
Perspective Manager.
n tD
General Settings
Te i
5. Enter a name for the Perspective (e.g., Finance Department Landing Page).
rn
Type The Perspective type can be either as Container or Landing Page. The
al
case of a Landing Page; all users, groups or devices would have a specific
nl
Container Type The Container Type setting allows you to control where the Perspective
is applied. The default setting is All. An example might be of applying one
Perspective for a folder and another for a project.
Figure 14-14:
Perspective Manager
Rules Tab
O oN
Rules The Perspective Manager Rule is used to construct the logic that governs
pe o
D
10. Click Add Rule to create the desired Perspective Rule logic.
Te i
xt str
Figure 14-15:
In ibu
Mobile)
Group (Content Server Group)
O
Mobile Device
nl
should be used on its own and not in conjunction with other rules. This is
particularly important because the exclusive behavior is not currently
pe o
D
enforced in the UI. If you pick one or more ‘standard’ rules and combine
them with a compound rule (i.e., Mobile Device), then the rule becomes
n tD
invalid.
Te i
xt str
Boolean Logic The available Boolean logic is selected as either is/equals or is not/not
equals.
In ibu
existing ones. When there are multiple Rules, And/Or logic between
multiple rules is available. When the Rule logic is applied, it is applied from
rn
11. In this example of a Global Landing Page Perspective, select Group and is.
12. Click the user field.
U
se
13. Enter f followed by Find to list the groups beginning with “f”.
O oN
pe o
D
n tD
Te i
xt str
In ibu
te te
rn
al
U
se
Layout The Layout specifies the position of the various Perspective’s tiles and
how the Perspective behaves when displayed.
Flow Each new tile/widget is added into the next available space. The metaphor
is like carriages on a train. If a widget/tile will take up more space, the
trailing widgets/tiles will push along the existing ones and may wrap into
the next row. Widget/tile size is determined automatically according to
its kind (e.g., Assignments, Favorites, Welcome etc.).
Left-Center-Right There are only three available placements for a [single] widget/tile.
There are three slots available for widgets/tiles: left sidebar, right sidebar
and central slot. On smaller screens, the central section takes the full
width of the device and the sidebar appears underneath. Widget/tile size
is determined automatically so that it fills its slot.
Tabbed The tabbed layout contains a header slot, followed by any number of
widgets/tiles grouped into a number of tabs. Each new widget is added to
the next available space, flowing into the next row as required. Widget/
tile widths may be resized. Heights are determined automatically
according to screen size.
O oN
pe o
D
Figure 14-17:
y
Perspectives Manager
Configure Tab
D
18. Click and drag the first widget and release it onto the tile where it says
“drag widget here” (e.g., Recently Accessed).
In ibu
19. Repeat the drag-and-drop step for the other desired widgets (i.e., Favorites,
te te
My Assignments, Shortcut).
rn
al
U
se
O
nl
y
For the Shortcut widget, there are available options including the target
item, a fallback default Shortcut location and a background color.
n tD
Te i
xt str
In ibu
te te
rn
al
U
se
O
nl
y
Figure 14-20:
Perspective Successfully
Created
O oN
pe o
D
26. Click Close and click the back browser button to return to the Content
n tD
At the moment, using the back button in the browser is the only
way to return to the previous page. One thing to point out is that
In ibu
?func=csapps.launchapp&appname=OTPERSPECTIVEMGR so
that means ‘back’ may not mean the Administration pages.
rn
al
To test the Perspective, sign in as a user that is part of the Finance Group
U
O oN
pe o
D
Figure 14-21: Chris Ho’s View of the Finance Department Landing Page
n tD
Te i
color) in the Perspective tiles from left to right. The list of Recently
Accessed items will depend on what Chris has ‘visited’ and this does not
In ibu
letmein) or alternatively a user that has been granted the Perspectives Tab
usage privilege.
U
3. Click Open the Perspective Manager and the Perspective Manger will
nl
General Settings 4. The default is to create a new Perspective; leave the default setting (i.e.,
Create new).
5. Enter a name for the Perspective (e.g., Peter’s Perspective).
6. Change the Container Type from All to Folder.
7. Click Container / Node ID.
8. Select a container (e.g., Enterprise > ODG Parent Company > Eco-Tours >
International Eco-Tours (MLM)) that has more than 25 items in it, so that
we can demonstrate pagination later on.
9. The default is not to Cascade; leave the default setting (i.e., No), so only the
specified container will be affected by the Perspective and not its parent or
children.
10. Click Rules.
Rules 11. Click Add Rule to create the desired Perspective Rule logic.
12. In this example of a Local Container Perspective, select User and is.
13. Click the user field.
14. Enter f followed by Find to list the users with last names beginning with “f”.
D
n tD
Te i
xt str
In ibu
te te
rn
Figure 14-22:
al
O oN
pe o
D
n tD
Te i
xt str
In ibu
te te
19. Click and drag the first widget and drop it on to the tile where it says “drag
O
20. Click and drag the second widget and drop it on to the tile where it says
y
For the Custom View Search widget, the option includes specifying a
target item as the Customer View Search.
22. Click Browse and select Search Sample Docs > Search & Custom View
Search Forms > Holiday Search Query.
23. Click Create to save the Perspective.
24. Click Close and click the back browser button to return to the Content
Server administration pages.
To test the Container Perspective, use the user that was specified in the
Perspective Rule (i.e., Peter Fitzgerald) and also navigate to the container
(i.e., folder) that was also specified in the Perspective’s General Settings.
25. Using an alternate browse (i.e., Chrome), sign in to Content Server (e.g.,
pfitz/opentext), if necessary, switch to the Smart View UI.
26. Click Enterprise.
27. You can optionally filter the list of contents by entering ODG.
pe o
D
n tD
Te i
xt str
Figure 14-24:
In ibu
Workspace is Displayed
rn
al
U
se
Notice how the user interface layout remains the same as you navigate
down the folder hierarchy, but the layout changes on reaching the
destination folder when the folder displays using Peter’s Perspective:
Figure 14-25:
O oN
Figure 14-26:
O oN
pe o
Editing an Existing
D
Perspective
n tD
Te i
xt str
In ibu
te te
rn
33. On the Configuration tab, delete the left and right widgets.
al
34. Add the Favorites widget to the left tile and [Content Server
Collaboration] Activity Feed to the right tile.
U
37. Click the back browser button to return to the Content Server
administration page.
38. Return to the alternate (i.e., Chrome) browser (i.e., the one that pfitz is
signed in with).
39. Refresh the browser page.
Figure 14-27:
O oN
n tD
Te i
xt str
In ibu
Open the
rn
Figure 14-28: Example of the Perspective Volume Following the Previous Step Set Activity
View All Perspectives The View All Perspectives page lists all the Perspectives in effect both
locally and globally in the system. To open the View All Perspectives page,
from the Content Server Administration > ActiveView Administration
page, click the View All Perspectives link.
n tD
Te i
xt str
In ibu
te te
Perspective Applied To The node to which the perspective is applied, showing both inherited
Perspectives as well as Perspectives applied directly to the current
object.
O
nl
To view only local Perspectives that apply to the listed node, click the
Perspectives link to see the Perspective Summary tab for that object, as
y
ActiveView Template Name of the associated ActiveView template used by the Perspective.
ActiveView Expression Lists the rules or logical expressions defined for the Perspective that
ActiveView evaluates to determine if this Perspective should be applied.
ActiveView Priority The priority value combines with the Rules and Cascade value to
determine if the Perspective will be executed. Valid priority values are:
Priority, High, Medium, or Low.
ActiveView Cascade Value The cascade value determines whether the perspective applies to child
nodes. The cascade values include the following:
Cascading
O oN
Non-Cascading
pe o
Cascade to Contents
D
Manage Global The previous section discussed how a Perspective allows you to
Perspectives customize the look and layout of the Smart View UI.
al
A local Perspective can affect specific containers in the Smart UI, based
U
controls the Classic View of the Content Server user interface while a
Perspective controls the layout of the Smart UI.
O
A global Perspective affects the Smart View of the entire Content Server
nl
O oN
pe o
D
n tD
Rules, they can be readily modified to include additional report tags and
logic using the illustrated editor.
In ibu
te te
rn
al
U
se
O
nl
y
Figure 14-32: Perspective Rule Editor from the Manage Global Perspectives Page
Summary
In summary, in this chapter we:
Converted legacy ActiveViews to Work Without Appearances
Upgraded ActiveView Templates for Compatibility
Configured Content Server to Allow AVIDs in URLs
Enabled or Disabled ActiveView Override Types and Templates
Managed Global ActivView Overrides
Created a Landing Page Perspective for a user or a group
O oN
n tD
Te i
xt str
In ibu
te te
rn
al
U
se
O
nl
y
Exercises
In this exercise, you will have the opportunity to create a Landing Page for Students in the Students
Group that includes a Shortcut widget that takes them to the Product Development folder.
8. Click Rules and then click Add Rule to create the desired Perspective Rule logic.
te te
9. Select Group and is followed by clicking the user field and entering s followed by Find to list
rn
13. Click and drag the Welcome widget and release it onto the tile where it says “drag widget
here”.
nl
14. Repeat the drag-and-drop step for the Recently Accessed, Favorites, My Assignments, and
y
Shortcuts widgets.
15. For the Shortcuts widget, click Browse and select Product Development and leave the
default Volume fallback as Enterprise. Choose a Background color of Orange.
18. Click Close and click the back browser button to return to the Content Server
administration pages.
Test the Newly Created Landing Page Perspective for a Content Server Group
In this exercise, you will have the opportunity to test or try out the newly created Landing Page for
Students in the Students Group that includes a Shortcut widget that takes them to the Product
Development folder.
1. Using an alternate browser, for example Chrome, sign in to Content Server using student1/
O oN
opentext. If necessary, switch to the Smart View UI using My Account > Smart View.
pe o
D
3. Confirm that the Landing Page Perspective for the Students Group created in the previous
Te i
exercise is displayed and that it contains the following widgets: Welcome, Recently
Accessed, Favorite, My Assignment, and a Shortcut pointing to the Project Development
xt str
In this exercise, you will have the opportunity to create a Container Perspective for Students in the
Students Group for the Marketing folder.
7. Click Rules and then click Add Rule to create the desired Perspective Rule logic.
xt str
8. Select Group and is followed by clicking the user field and entering s followed by Find to list
the groups beginning with “s”.
In ibu
12. Click-drag-and-drop the Node Browsing Table widget into the middle tile.
U
13. Click-drag-and-drop the Activity Feed widget into the left tile and the My Assignments
se
15. Click Close and click the back browser button to return to the Content Server
administration pages.
y
In this exercise, you will have the opportunity to test or try out the newly created Perspective for
Students in the Students Group that is applied to the Marketing folder.
1. Using an alternate browser, for example Chrome, sign in to Content Server using student1/
opentext. If necessary, switch to the Smart View UI using My Account > Smart View.
2. Confirm that the Container Perspective for the Marking folder is displayed and that it
contains the following widgets: Activity Feed, Node Browser, My Assignments, like the
following figure:
O oN
pe o
D
n tD
Te i
xt str
In ibu
te te
rn
al
U
se
O
nl
y
Objectives
Overview
pe o
D
n tD
features.
xt str
Remember that you can selectively remove parts of the interface and
optionally replace them with custom HTML. There is also some support
U
system
nl
Provide additional tech support links for user in the header or footer
y
of the interface
Include custom CSS in header to override the standard Content
Server CSS
group of users.
pe o
D
Keep in mind that there are really three types of Appearances. Each one
corresponds to a level of control and can be used in conjunction with each
n tD
te te
Because the Global Appearance will impact the Appearance Volume and
all that the Admin User sees outside of administration areas, it is worth
rn
creating a special Appearance just for the Admin User only. This
Appearance will include all standard Content Server UI and have no
al
custom HTML. Only the Admin User should have See and See Contents
permissions for this appearance. It should also be alphabetically earlier
U
Appearances Administration
nl
Branding Administrators The ability to add and modify Appearances is restricted to certain users or
groups known as Branding Administrators. As a Branding Administrator
you set permissions on the Appearance. In setting the permissions, you
determine to which users or groups an Appearance should apply. For
O oN
Appearance
Te i
precedence.
O
nl
To add Global Appearances, you also need the Add Items permissions on
the Appearances Volume. In addition, to modify an Appearance that was
added by another user, you need the Modify permission on the
Appearance. You do not need permission to modify any subitems that an
Appearance may affect.
Appearances Administration
n tD
Figure 15-1:
Te i
Administration Pages
xt str
In ibu
te te
rn
Figure 15-2:
nl
From the Add Item menu, you will notice that you can create either an
Appearance Folder or an Global Appearance.
Global Appearance As previously suggested, a global Appearance can be used throughout the
Content Server Instance to change the look of the [Classic] UI.
4. From the Add Item menu, select Appearance Folder and provide it with an
appropriate name (e.g., ODG Appearances).
5. Click on the newly created Appearance folder and from its Add Item menu,
select Global Appearance (e.g., ODG Global Appearance).
9. Click Header.
10. If the HTML code makes use of a graphic, like the example illustrated
In ibu
code into Edit: Header followed by clicking Add Version, at the bottom of
the page.
U
se
<td><img src="http://localhost/img16/odg2013logo-sm.png">
Example of a Global
</td>
Appearance Header HTML
nl
</tr>
Code
</table>
y
The default OpenText - Content Server Header has been replaced with a
custom ‘outdoor gear’ one, as illustrated in the following figure:
O oN
pe o
D
n tD
Te i
xt str
In ibu
te te
Appearance folder.
se
19. Refresh the web browser page with F5 to return the system and your
browser to the prior state without your custom Appearance Header.
y
opentext).
D
Figure 15-5:
rn
Administration Pages
al
U
se
O
Figure 15-6:
n tD
Te i
Setting Description
te te
You can view the available search bar configurations, add a new one by
clicking the Add New Search Bar Configuration Add New Search Bar
Configuration button or edit the existing configurations. You can also
remove any existing search bar configuration, except the Standard Search
bar, by clicking the Remove button. The Edit button opens the Search Bar
Edit page with the settings for that search bar mode and from this page
you can define the default look and the components available on the
Content Server search bar.
General Settings In this section you can configure the search bar, which is visible on most
pe o
workspace pages.
D
You can choose the type of search (Full Text, Nickname, or Natural
n tD
You can also configure the text label that appears on the Search button to
initiate a search, and enable a Help link on the search bar for the selected
xt str
Search Type.
In ibu
Worth noting is the fact that the Nickname mode of the Search
te te
Bar does not utilize Content Server’s full text search but instead
rn
Workspace.
Figure 15-7:
n tD
Te i
7. Using the Administration page browser window or tab, click Search Bar
Administration.
xt str
8. Change the Search Button setting from Icon to Text and enable the Help
Link.
In ibu
10. Refresh the browse window that is positioned at the Enterprise Workspace
rn
and review the changes you have made to the search bar, as illustrated in
the following figure:
al
U
se
O
Figure 15-8:
nl
The Search Bar Administration page allows you to create new search bar
configurations and modify existing configurations, which can then be
selected when creating Appearances (you will have a chance to do this at
with the exercises at the end of this chapter).
If you want to have any search bar (other than the Standard search bar)
appear in a folder, you must create and configure an alternate Search Bar,
add an Appearance to the target folder plus enable it, and choose the
alternate search bar on the Content Server Components section, as
shown in the following figure.
O oN
pe o
Figure 15-9:
D
Component of an
Te i
Appearance
xt str
In ibu
te te
rn
al
n tD
Te i
xt str
In ibu
te te
rn
al
U
se
O
nl
Figure 15-10: Administrators Have Many Options to Configure the Search Bar and Searching in General
y
Full Text Settings The system administrator has full control over what the Appearance
Te i
designer can select. The Include check box turns the full text search on or
off, as illustrated in the following figure.
xt str
In ibu
te te
rn
al
Figure 15-11:
U
Text Settings
O
nl
y
The Search Bar and Search Panel are the interfaces end users employ
most frequently when searching. They can be configured from the
Appearances Administration > Search Bar Administration area. Clicking
the Edit icon for the Standard search bar displays the system default
settings. Components can be added or deleted from the interface through
the check boxes in the Show column.
n tD
Te i
xt str
In ibu
te te
rn
Figure 15-12:
al
Configuring Searchable The Searchable Types Configure page allows for the modification and
Types addition of choices for the end user. Items which will be displayed are
listed in the Displayed list. Items can be organized and ad-hoc groups can
be created by using separators. Items which are available to add are listed
in the Available list. To add or remove an item to/from the Displayed list,
select the item and click the appropriate left/right arrow to move the item
to or from Available. The Searchable Types list is displayed in Preview
mode to the right.
To create a new item, click the Add New Menu Item button and fill in
the Edit area accordingly. Creating new items requires knowledge of the
Content Server Query Language.
Because there are so many Full Text setting options and choices,
you should refer to the online help or the Admin Help Guide (a
local copy is available in the following folder: C:\Install Files for
Content Server\INSTALL CS 16.0 - Release\Help and User
O oN
n tD
Summary
Te i
Exercises
This exercise will provide you with an opportunity to practice what you have learned earlier in this
chapter about the creating and Appearances. This exercise will focus on adding a new Appearance
item, but rather than using a Global Appearance, this exercise will create a ‘local’ folder appearance
and also modify other UI components such as the Search Bar.
n tD
4. In the Search Bars Section, opposite the Standard Search Bar link, click the Add button, to
create a new/alternate search bar. Call it ODG Search Bar for Legal and change the Default
xt str
mode setting from Full Text to Nickname. Also select Text for the Search button and select
Show to enable the Help Link. Scroll to the bottom of the page and click OK.
In ibu
5. Open a new browser window or tab and navigate to the Enterprise Workspace > Legal
te te
6. From the Add Item menu, select Appearance and call it ODG Appearance for Legal. From
its Functions menu, select Properties > General and change the Nickname to SeeUinCourt
al
8. Click Settings, set the type as Cascading, click Enabled followed by Submit.
O
9. Click Header and change the MIME Type to Text. Enter the following HTML code as
illustrated below and copy odg2013logo-sm.png from the C:\Instructor Resources\3-0188
nl
[Application] Administration folder into the C:\CS16\support\ folder, if you did not
y
previously do it.
11. And from the Search Bar drop down list, pick ODG Search Bar for Legal, then click Submit
at the bottom of the page.
12. Select Legal from the breadcrumb. The Legal folder should now look like the following
illustration, complete without the footer, sidebar and default header, but with the newer
custom header (Note: the Pending Court Cases folder also inherits the same configuration
due to the previous cascade choice or setting):
O oN
pe o
D
n tD
Te i
xt str
In ibu
te te
13. From the Search Bar, enter a keyword of *court and click Search. Notice how ODG
rn
Appearance for Legal is returned as a result because of its Nickname containing the word
‘court’.
al
U
se
O
nl
y
O oN
pe o
D
n tD
Te i
xt str
In ibu
te te
rn
al
U
se
O
nl
y
Objectives
Overview
n tD
This chapter provides you with an introduction to Archive Center and its
Te i
Administration pages.
storage beyond simple internal and external options that were discussed
te te
various Storage Providers such as Archive Center for long term storage
and Enterprise Information Management (EIM).
al
U
se
Depending on the business process, the document type, and the storage
media, Archive Server uses different techniques to store and access
documents. This guarantees optimal data and storage resource
management.
It can also address multiple partitions of like media within the same media
pool; while we do not actually address them as a single logical volume,
Archive Server writes to the whole media pool in a round-robin method
by default.
administration page.
D
n tD
With Content Move Administration and Move Jobs, you can define when
nl
to apply [Storage Provider Rules] and on which documents. You can then
schedule jobs to be executed regularly or only once.
y
Figure 16-1:
Administration Pages
O oN
pe o
D
n tD
n tD
Te i
Figure 16-3:
This Step Set assumes you are continuing from the previous one and you
are signed in with an n administrative account (e.g., sadmin/letmein).
Figure 16-4:
Administration Pages
O oN
pe o
n tD
Figure 16-5:
U
Refer to the online admin help for more information regarding the
creating and configuring of Content Move Jobs in addition to the Guides
that are published to the Knowledge Center (e.g., https://
knowledge.opentext.com/knowledge/llisapi.dll/Properties/62359333).
Summary
In summary, in this chapter we:
Identified and navigated to the Content Server Administration pages
responsible for Archive Storage Provider configuration
Described the Archive Storage Provider and Content Move settings
available in Content Server that can be used to integrate with
OpenText Archive Center
O oN
pe o
D
n tD
Te i
xt str
In ibu
te te
rn
al
U
se
O
nl
y
Objectives
Overview
pe o
D
n tD
When a user performs a search using a Best Bets value, any results
containing the value are displayed at the top of the Search Results page.
Te i
For example, you may have a corporate event that you want to promote,
such as a company picnic. You can apply a value, such as corporate events,
xt str
You can also apply a Best Bets expiry date to items, so that when the
In ibu
expiry date is reached, the Best Bets value associated with the expiry date
te te
no longer appears in the Best Bets section on the Search Results page.
rn
This chapter will cover how administrators configure and manage Best
Bets.
al
U
Best Bets
se
You can ‘tag’ an object - add words or phrases that you want to be
O
associated with an object - in the Best Bets value field. When you search
nl
using those words or phrases, the object will be returned in the Best Bets
section of the Search Results page.
y
O oN
pe o
D
n tD
Te i
Figure 17-1: Example of a Best Bets Value on the General Properties Tab of a Document
xt str
In ibu
shortly.
al
criteria of ‘bike’ yields search results where the document appears at the
se
Figure 17-2: Example of a Best Bets Value Appearing at the Top of the Search Results
Remember, if users search for common words or a phrase, they will get
hundreds of documents -- or more. While you could use categories and
attributes to add searchable metadata to the documents, you should
consider the use of Best Bets to make special documents and items easier
to find.
Before users can apply or edit Best Bets values, they must have
permissions to modify items. Also, you must add the user to the Best Bets
Administrators group. This is done by editing the Best Bets usage
O oN
privileges.
pe o
D
n tD
the Administer Object Usage and Privileges page, you can give
this privilege to other users (they will also need Modify
xt str
Best Bets can also have an expiry date. For example, suppose certain
nl
corporate governance documents are only valid for one fiscal year—the
y
Best Bets could automatically expire at the end of the year so those
documents would have no priority on the search results page.
You can also configure the Best Bets value label and expiry date label,
which appear on the General tab of an item's Properties page.
n tD
Te i
Figure 17-3:
xt str
Administration Pages
In ibu
te te
rn
al
Figure 17-4:
O oN
n tD
Te i
xt str
In ibu
te te
Most administrators will use the default settings for the Options and
Pattern Matching, unless advised by OpenText to change them. Refer to
rn
the online help for additional information regarding the Best Bets
Options.
al
4. Click Admin Home to return to the Best Bets Administration page section.
U
se
Once Best Bets values have been applied to Content Server items, you
can monitor the values on the Manage Best Bets Items page. You can
y
modify or remove Best Bets values, and use a search bar to locate items
with values applied to them. When searching for items that use a phrase
as a Best Bets value, place the phrase in double quotation marks.
This Step Set continues from the previous one and assumes that your are
still logged in with an administrative account and on the Administration
page.
O oN
pe o
D
n tD
and their status. The page also provides for removing Best Bet values for
batches or groups of items.
In ibu
te te
2. Select the check box opposite the cycling organizations document and click
Remove Best Bets Entries. When prompted to confirm the removal, click
rn
OK.
3. Click Admin Home to return to the Administration pages.
al
will return only one Best Bet value that appears at the top of the search
se
Figure 17-6: Updated Example of a Best Bets Value Appearing at the Top of the Search Results
Summary
In summary, in this chapter we:
Reviewed the use of a Best Bet applied to a Content Server item
Administered and Configured Best Bets from the Administration
Pages
Managed Content Server Best Bet items
O oN
pe o
D
n tD
Te i
xt str
In ibu
te te
rn
al
U
se
O
nl
y
Exercises
This exercise will provide you with an opportunity to practice what you have learned earlier in this
chapter about the administering and managing Best Bets.
2. Navigate to the Administration pages > Best Bets Administration section. If prompted for
the Administration password, enter opentext.
O oN
pe o
3. Click Configure Best Bets Settings to review the settings and then click Admin Home to
D
5. Select the check box opposite the cycling organizations document and click Remove Best
Bets Entries. When prompted to confirm the removal, click OK.
xt str
7. Repeating the earlier Enterprise Workspace search using a keyword of bike will return only
te te
one Best Bet value that appears at the top of the search results page.
rn
al
U
se
O
nl
y
Overview
O oN
following table:
Te i
Settings Spreadsheet
te te
Introducing Collections
O
provide a location where items can be added over time directly from their
parent folder and to create ISO images for burning a CD or DVD to store
y
O oN
pe o
D
n tD
Te i
page to control the use of this tool, as discussed in a prior chapter, and as
te te
Figure 18-2:
O
nl
Collections Privileges
y
Collections Administration
This section will discuss the administration of Collections.
Collections Administration
n tD
Te i
xt str
Figure 18-3:
In ibu
Administration Pages
te te
rn
al
U
se
O oN
pe o
D
Figure 18-4:
n tD
Collections General
Settings Page
Te i
xt str
In ibu
te te
rn
al
Download As
U
Spreadsheet Settings
se
Item Limit Defines the maximum number of objects that can be exported using
Download as Spreadsheet. If more objects are selected, the user is
O
Limit check box to unrestrict the number of objects that can be exported.
y
Compression Threshold Defines the maximum value for the size of downloaded spreadsheets, in
kilobytes (KB). Spreadsheets larger than this will be compressed and
converted to a ZIP file for download. The default is 5120.
Items per Spreadsheet Defines the maximum number of objects that can be placed in a single
spreadsheet. If there are more items, then multiple spreadsheets are
created and they are compressed into a single ZIP file. The default is
30,000. Select the No Limit check box to place all items in a single
spreadsheet.
Collect Folder
Settings
Item Limit Defines the maximum number of Objects that can be included in a
Collection. If there are more items, they are not included. The default is
1,000,000. Select the No Limit check box to collect all items.
Searchable Settings
Collection Status
pe o
D
Active This section displays information about each Collection process currently
n tD
running, including:
Name --name of the Collection
Te i
Background This section displays information about each Collection process currently
running in the background, including:
U
n tD
Te i
xt str
In ibu
te te
rn
al
U
Figure 18-5:
se
Figure 18-6:
al
Administration Pages
U
se
O
Customer Service > Customer Feedback Collection and from its Functions
menu, select Properties > Collection Items Audit.
y
O oN
pe o
D
n tD
Te i
xt str
Figure 18-8: Example Of the Auditing of Collections Actions using the AuditCollectionsItems Table
In ibu
te te
The following SQL query was used to generate the results from
rn
To delete records from this audit trail, specify the number of days old
y
(default is 45) for the entries that you want to purge, and then click the
Purge button.
Figure 18-9:
11. Revisit Enterprise Workspace > Customer Service > Customer Feedback
Te i
Collection and from its Functions menu, select Properties > Collection
Items Audit to confirm that the previous audit trail has been purged.
xt str
In ibu
> Administer Event Auditing > Query Audit Log, which was covered in a
previous chapter.
rn
al
U
se
O
nl
y
Summary
In summary, in this chapter we:
Administered Collections and the General Settings
Referenced Published Documentation Regarding Disk Image
Creation
Purged Collections Items Audit Records
O oN
pe o
D
n tD
Te i
xt str
In ibu
te te
rn
al
U
se
O
nl
y
Objectives
Overview
pe o
D
following table:
Applications.
al
Open the Content Server Work with the objects in the Content Server
se
the application does not contain sub-tag drop-in files, then it will not
have a subtags folder
xt str
properties folder
te te
Name Description
U
n tD
Te i
Figure 19-1:
xt str
Administration Pages
In ibu
te te
rn
al
From this administration page you can install, uninstall, rebuild or delete
an Application. Later in this chapter, you will have an opportunity to
install a CS App.
Applications Volume
The Applications Volume is the default destination for applications built
or installed using Applications Management.
n tD
Te i
xt str
Because the WebReport Report Pack has already been installed to the
CS16 instance, this exercise will utilize a new or blank instance as the
O
destination system.
nl
y
that new installations of Content Server only have the one user account
pe o
D
opentext).
Figure 19-6:
O oN
Selecting a Destination
Folder
n tD
Te i
xt str
In ibu
te te
rn
9. Click Browse for Container and navigate to Select the Content Server
al
The page will update and inform you that the application is being
installed; it may take several minutes to complete. Once the installation
se
has been completed, it will prompt you to restart the Content Server
service to finalize the installation:
O
nl
y
Figure 19-7:
The Application Management page is displayed, and the Report Pack has
been installed.
O oN
pe o
D
n tD
reports, however, many not produce any results as the CS16b instance
does not contain any data from which to generate report results.
te te
rn
al
U
Figure 19-9:
se
Summary
In summary, in this chapter we:
Review CS App Administration functionality including Application
Management
Install a CS Application
Exercises
This exercise will provide you with an opportunity to practice what you have learned earlier in this
chapter about the managing and installing CS Apps in Content Server. This exercise will focus on
adding a new Appearance item, but rather than using a Global Appearance, this exercise will create
a ‘local’ folder appearance and also modify other UI components such as the Search Bar.
Because the WebReport Report Pack has already been installed to the CS16 instance, this exercise
n tD
will utilize the new or blank CS16b instance as the destination system.
Te i
2. Start the CS16b services either using Windows Services or alternative the provided batch
te te
file. The batch file can be run by selecting Start > Start-Stop-Scripts > CS16b on. When
prompted, click any key to close the Powershell window.
rn
installation.
se
4. Using the IE browser, select Favorites > OTCS 16.0 > CS16b EWS.
O
5. Sign in with admin/livelink. Remember that new installations of Content Server only have
the one user account automatically created and its default password is livelink.
nl
y
9. Click Browse for Container and navigate to Select the Content Server Application folder
and click Submit.
12. Click the Report Pack Launcher link. The Report Pack for WebReports page is displayed;
this demonstrates that the Report Pack was successfully installed. Running many of these
reports, however, many not produce any results as the CS16b instance does not contain any
data from which to generate report results:
O oN
pe o
D
n tD
Te i
xt str
In ibu
Objectives
Overview
O oN
pe o
This chapter introduces the OpenText Content Suite Viewer and its
D
The Content Suite Viewer provides native HTML viewing capabilities and
provides simple scroll, zoom, rotate, print, and page controls within a
In ibu
browser environment.
te te
Figure 20-1:
Administration Pages
O oN
pe o
D
n tD
This viewer is not enabled by default. Before you can enable this viewer,
you must download and install the Brava Server Components package,
which can be found on the OpenText Knowledge Center.
https://knowledge.opentext.com/knowledge/
pe o
cs.dll?func=ll&objId=62405110&objAction=browse
D
n tD
Te i
Summary
xt str
Viewer to Content Server
te te
rn
al
U
se
O
nl
y
O oN
pe o
D
n tD
Te i
xt str
In ibu
te te
rn
al
U
se
O
nl
y
Objectives
Overview
O oN
pe o
This chapter deals with features and functionality in Content Server that
D
deployments
se
Server
Select OTDS Server During installations or upgrades, the administrator is asked to specify
Type whether their Content Server instance will use Internal or External
In ibu
The Select OTDS Server Type page seen during an installation is below:
rn
al
U
se
O
nl
y
External OTDS Use of an External OTDS Server Type is the recommended configuration
for most production deployments, especially where there is a need to
support high availability, distributed architecture, or multiple Admin
Servers.
course.
pe o
D
n tD
Internal OTDS The implementation of the Internal OTDS Server Type is through the
OpenText Directory Services Integration [core] module.
Te i
O oN
pe o
D
n tD
Te i
xt str
In ibu
te te
Administrators will typically accept the default port number and only
select alternative ports if there is an existing port conflict.
al
8004 is for internal use by Content Server to stop the jetty process.
This port does not need to be opened on firewalls.
O
nl
HTTP Configuration The Internal OTDS server uses a Jetty web and servlet server that is built
into Content Server. By default, the Internal OTDS server uses a self-
signed certificate for HTTPS communications, but you can configure it to
use a different certificate by entering appropriate values in the Java Key
Store settings in the HTTPS Configuration section.
Beginning with Content Server v16.0, the Admin Server service must be
running to allow for user log in/sign in and authentication.
Content Server.
U
se
Internal OTDS Process The Internal OTDS Process is located within the System Object Volume
(SOV), and can be accessed from the Global Menu bar > Search Admin
Browser > Tasks [section]> Open the system folder (SOV).
The System Object Volume, with the Internal OTDS Process, is illustrated
in the following figure:
O oN
pe o
D
n tD
Te i
xt str
In ibu
The OTDS Processes store the Jetty port and related information for use
rn
by Content Server.
al
U
se
O
nl
y
O oN
pe o
D
n tD
Te i
xt str
Configure Integration The Configure Directory Services link is used to open an OTDS
Settings administration interface to manage user synchronization (if applicable),
user passwords, password policies and other resources.
When you select the Configure Directory Services link, you are
prompted to provide the OTSD-based User name and Password.
O oN
pe o
D
Online help is available for OTDS by selecting the help icon located in the
upper right corner of the landing page:
O oN
pe o
D
n tD
Te i
xt str
In ibu
te te
rn
al
U
se
OTDS Administration
Page Sections
nl
y
There is no limit to the number of user partitions you can create and the
following figure is an example of Outdoor Gear’s OTDS Partitions,
including the Content Server Members Partition:
O oN
pe o
D
n tD
Te i
xt str
In ibu
te te
rn
al
Authentication Handlers This section manages the authentication handlers and their required
se
O oN
pe o
D
n tD
Te i
xt str
In ibu
te te
Resources This section manages the creating, editing and deleting of synchronized
al
Access Roles This section manages the assigning of members to access roles and allows
users with particular access roles to sign on to selected resources.
O
You will need to create access roles to define which resources you want
nl
your users and groups to have sign in privileges for. An access role can be
y
Users and Groups This section allows for the viewing, editing, and consolidating of user and
group information.
The Users and Groups object provides a common access point to all the
users and groups that are found in all user partitions in Directory
Services.
O oN
pe o
D
n tD
Te i
xt str
In ibu
te te
rn
System Attributes This section displays Directory Services system attributes. The page
displays a list of default OTDS attributes that ship with Content Server.
U
O oN
pe o
D
n tD
Te i
xt str
In ibu
te te
rn
Trusted Sites This section allows you to specify a list of trusted addresses that
Directory Services will allow to refer to a forwarding address.
U
For example, the user accesses Content Server and Content Server
y
O oN
pe o
D
n tD
Te i
xt str
In ibu
te te
rn
al
Passwords and Password Beginning with Content Server v16.0, password policy is controlled from
se
Table 21-2: Comparison of Configure Password Setting Options and Default Values
in Content Server Versions 10.0, 10.5 and 6.0
For our operational training needs, the "use global policy" on the
Content Server Members partition had to be disabled and
overridden locally (everything) leaving only 6 characters
minimum, as illustrated in the following figure.
O oN
pe o
D
n tD
Te i
Frequently Asked This section provides a series of frequently asked questions and answers,
In ibu
Answers
rn
Domains Our Content Server instance makes use of [CS] Domains and we will
upgrade to v16.0.
al
Existing Users Migrated Are existing KUAF and/or external OTDS information migrated to their
O
Admin Service Running Since OTDS is using (i.e., piggy backing onto) the Admin Server service,
does that mean that the service must be running in order to authenticate
users and log in to Content Server?
Yes, that is correct. Even Content Server IDE (CSIDE) developers will
need to have the Admin Server service running for them to log in to
Content Server.
Cyclic Groups Is there any impact on the group recursivity setting – whether it is
enabled or not – to the establishing of the OTDS partition(s) and user/
group migration?
OTDS is case insensitive, like any LDAP system out there. Case sensitive
user names will not work - only a single account will exist in OTDS.
xt str
OTDS User or Group Are there any length limits on OTDS user or group names?
Restrictions
In ibu
OTDS Logs There are a number of OTDS logs that can be found in OTHOME\logs
rn
directory.
al
These logs can be viewed using Info > Log Files and selecting the desired
tab, like otds, as illustrated in the following figure:
O oN
pe o
D
n tD
Te i
xt str
In ibu
te te
rn
al
U
As noted on the page, not all of the rows of the entire log may be
visible on these log file pages, so you may need to review the
nl
Figure 21-15:
If prompted for an OTDS user name and password, enter them (e.g.,
admin/cs!).
xt str
Click Setup > Partitions, and from the Content Server Members partition,
select Actions > View Members:
In ibu
te te
rn
al
U
se
O
nl
y
O oN
pe o
D
n tD
Te i
xt str
In ibu
te te
Figure 21-18:
O
nl
O oN
pe o
D
n tD
Te i
xt str
In ibu
and Action > View Member page. This should not be confused with
Setup > Users & Groups because the latter page displays ALL users (or
U
O oN
pe o
D
n tD
Te i
xt str
In ibu
te te
rn
al
Synchronized and The terms synchronized and non-synchronized, used when referring to
Non-Synchronized various Content Server and OTDS users, is discussed in this section.
Users
O
nl
Starting with the most basic scenario, the one exemplified by Outdoor
Gear, is where users and groups were stored in the KUAF table within the
DBMS (i.e., Authentication =Livelink).
The following figure illustrates this upgrade and the resulting non-
O oN synchronized OTDS partition of Content Server users:
pe o
D
Figure 21-21:
n tD
Partition
In ibu
te te
rn
al
In the next scenario, the legacy Content Server Directory Services (CSDS)
U
server, in which users and groups were stored in both the KUAF table
within the DBMS and within Active Directory (i.e., Authentication
=LDAP).
O
nl
non-synchronized users.
O oN
pe o
D
n tD
Te i
During an upgrade from CS 10.5 SP1 to 16.0, if Internal OTDS was used,
xt str
Figure 21-22:
se
Synchronized OTDS
Partitions
y
In the last scenario, OTDS was already in use by an organization for User
Identity Management, with an earlier version of Content Server, in which
users and groups were stored in both the KUAF table within the DBMS
and within Active Directory.
During an upgrade from CS 10.5 SP1 to 16.0, if external OTDS was used,
the result would be the creation of an OTDS partition.
O oN
The KUAF table information remains and the resulting OTDS partition is
pe o
D
synchronized.
n tD
Te i
xt str
In ibu
te te
Figure 21-23:
rn
Synchronized OTDS
Partition
U
se
O
nl
y
OTDS maintains its own set of SMTP related settings which are found
under the System Attributes section as previously discussed.
n tD
Te i
Summary
xt str
Objectives
Enterprise Connect
pe o
D
n tD
Overview
Te i
This chapter deals with Content Server eLink and email administration.
xt str
The eLink administrative options and links are described in the following
table:
In ibu
te te
eLink Global Workflow Configure eLink Workflow settings for all users.
nl
eLink Administration
n tD
Figure 22-1:
Te i
Administration Pages
xt str
In ibu
te te
3. Ensure that Mercury Mail, the SMTP/POP3 server has been started, using
rn
the icon on the task bar (i.e., ); the application can remain minimized in
al
Configure eLink The Configue eLink page is used to administer a number of eLink settings,
including Virtual Host name, STMP, POP3, and other settings. By default,
nl
eLink is disabled and the settings are not defined; any existing eLink
y
settings found during an upgrade are ignored and the administrator needs
to configure eLink as part of any post-upgrade process.
[eLink]
debug=1
format=text/html
send_my_own=true
virtualHostname=elink.opentextls.com
O oN
pop3MaxMessagesPerSession=500
pop3Password=b3BlbnRleHQA
pe o
D
pop3Port=20110
pop3Server=localhost
n tD
pop3Username=elink
smtpPort=2025
Te i
smtpServer=localhost
tempDir=eLinkTemp
timeout=1
xt str
maxInboundMailSize=5120
maxOutboundAttachmentSize=1024
In ibu
restrictedList={'mailer-daemon@','postmaster@','daemon@'}
restrictedXHeader={'X-On-Vacation'}
te te
restrictedSubject={''}
allowedDomains={''}
rn
Figure 22-2:
restrictedTypes={'vcf'}
newStyleEmail=true
al
AttachmentLinkCmd=open
EnableEmailDocLink=true
se
InboundDocAcknowledgement=true
CancelAllowed=true
O
ExpandAutoSubscribedGroups=false
MyMailEnabled=true
nl
AuthId=SP_TrainOTCS
CertificateFile=sp.pem
PrivateKeyFile=sp.pem
CertConfigVersion=2
putcertdate=?
AutoPutCert=true
putcertmessage=Missing configuration: please configure an
Archive Server Name in the Archive Storage Provider
Configuration
putcertid=SP_TrainOTCS
putcertfile=sp.pem
ExchangeDir=C:\CS105\temp\
In this case, the eLink settings have already been provided for the
Outdoor Gear instance, so this section of the chapter will allow a review
of these settings from the perspective of a configured and working
environment.
O oN
pe o
D
n tD
Te i
Figure 22-3:
xt str
Example of eLink
Configuration Settings
In ibu
te te
rn
al
U
se
O
nl
y
General Section The following settings are contained in the General section:
Notification The Notification entry is read-only and it reports whether Content Server
Notifications are enabled.
E-mail Contents Click one of the following in the E-mail Contents list:
Text, to have eLink send email messages as text only by default. All
email clients can handle this message type
HTML, to have eLink send email messages in HTML format by default
E-mail me topics/replies Select the E-mail me topics/replies that I post check box to enable users
that I post to receive an email from eLink for each discussion topic and reply that is
posted.
Enable alternative style E- Click one of the following in the Enable alternative style E-mails from
mails from discussions discussions list:
Undelivered Mail Type an integer in the Undelivered Mail field, indicating the number of
days that eLink should continue to attempt delivery of undelivered
messages before discarding them.
O oN
pe o
Virtual Hostname In the Virtual Hostname field, type the domain name that your mail server
D
Verbose Logging Select the Verbose Logging check box to enable verbose logging for eLink
Te i
SMTP Section
xt str
Server In the Server field, type the name of the mail server through which eLink
In ibu
Port In the Port field, type the port on which the SMTP server listens. The
rn
Test SMTP Connection Click the Test Connection button to test the SMTP connection settings
for outgoing email messages.
U
The test will report a successful SMTP connection and test, as illustrated
O
Figure 22-4:
SMTP Test
POP3 Section The following settings are contained in the POP3 section:
Server In the Server field, type the name of the mail server that stores eLink's
incoming email.
Port In the Port field, type the port on which the POP3 server listens. The
default port is 110.
Username In the Username field, type the name of the mailbox on the POP3 server
to which eLink's mail is delivered.
O oN
Password In the Password field, type the password corresponding to eLink's POP3
username.
pe o
D
Test POP3 Connection Click the Test Connection button to test the POP3 connection settings
n tD
The test will report a successful POP3 connection and test, as illustrated
in the following figure
In ibu
te te
rn
al
U
Figure 22-5:
se
POP3 Test
O
nl
y
O oN
pe o
D
Figure 22-6:
n tD
Te i
Inbound Message The following settings are contained in the Message Filter section:
O
Filters Section
nl
Discard messages In the Discard messages containing these X-Headers list box, type
y
containing these X- headers found in incoming messages that you want eLink to discard.
Headers
Discard messages In the Discard messages containing these in the subject list box, type the
containing these in the Subject text for incoming email messages that you want eLink to discard.
subject
Discard messages from In the Discard messages from these addresses list box, type the email
these addresses addresses or partial addresses of incoming messages that you want eLink
to discard.
Accept messages for the In the Accept messages for the listed domains only, or leave blank for no
listed domains only, or restrictions list box, type the domains of messages that you want eLink to
leave blank for no accept. Any domains not listed will be rejected.
restrictions
Discard attachments of In the Discard attachments of these MIME types or with these file
these MIME types or with extensions list box, type the MIME types or file extensions that you want
these file extensions: eLink to discard.
eLink Advanced The eLink Advanced Settings Administration page is where you manage
O oN
Settings document or discussions and email settings and other eLink global
override settings as illustrated in the following figure:
pe o
D
n tD
Te i
xt str
In ibu
te te
rn
al
Figure 22-7:
U
Administration page
O
nl
y
Documents via E-mail The following settings are contained in the Documents section:
Section
Enable e-mailing Select the Enable e-mailing documents via function menu check box to
documents via function allow users to email documents from the Functions menu.
menu:
Acknowledge receipt of Select the Acknowledge receipt of inbound e-mail content check box to
inbound e-mail content: send an email message when content is received by an email-enabled
Folder or Workspace.
E-mail document link Click one of the following in the E-mail document link option list to choose
option: the type of link included in messages:
O oN
Discussions via E-mail The following settings are contained in the Discussions section:
Section
xt str
Allow non-Content Server Select the Allow non-Content Server users to post to discussions check
In ibu
users to post to discussions box to allow users who do not have Content Server access to participate
in email enabled discussions.
te te
Allow users without Edit Select the Allow users without ‘Edit’ permission to post to discussions
rn
permission to post to check box to allow users without permission to post in a discussion to
discussions post topics.
al
Allow users to opt out of Select the Allow users to opt out of group auto-subscription check box to
U
Send topic/reply only to Select the Send topic/reply only to the immediate members of a group
the immediate members of check box if you want topics or replies to be sent only to users directly
O
a group subscribed to the discussion (but not users subscribed through a group).
nl
My Mailbox Section The following settings are contained in the My Mailbox section:
y
My Mail Client Select the My Mail Client check box to enable users to access the Content
Server light email client using the My Mailbox option in the Personal
menu.
Changing the value of the My Mail Client check box requires that
you restart the Content Server service.
Override user's setting Specify the POP3 email server to use instead of the settings configured by
with this POP3 Server users.
Override user's setting Specify the connection or port for a POP3 email server to use instead of
with this POP3 Port the settings configured by users.
Use Content Server Select the Use Content Server username as POP3 username check box to
username as POP3 require users to sign in to the POP3 server using their Content Server
username credentials.
Corporate Signature The following settings are contained in the Signature section:
Section
Include Corporate Select the Include Corporate Signature in outgoing e-mails check box to
Signature in outgoing e- add a signature to eLink messages.
mails
O oN
Corporate Signature Enter the Corporate Email signature in the provided field; the signature
pe o
D
11. Enable the Corporate Signature, so that you include a corporate signature
in outgoing emails and enter a Corporate Signature of Outdoor Gear.
Te i
eLink Global The eLink Global Workflow Settings Administration page is where you
al
Workflow Settings can globally enable notification interests for every user in the system, as
illustrated in the following figure:
U
se
O
nl
Figure 22-8:
y
The Table below provides a correlation between the Kini stored setting
values and the settings on the administration page.
Table 22-2: eLink Global Workflow Settings and Database Kini Table
O oN
pe o
AllUsers10 1=enabled
AllUsers11 1=enabled
te te
AllUsers8 1=enabled
The storage of the eLink Global Workflow Settings to the Kini database
se
Figure 22-9:
nl
te te
The Content Server full text search can be used to search the full content
of emails. To allow for searching on individual email properties from the
rn
Figure 22-10:
Email Services
O oN
Administration Section
pe o
D
n tD
Te i
xt str
In ibu
Configure Email There are three sections to the email services administration page:
al
Extractable Attributes
se
Extractable Email Fields By default, the following email fields or metadata are extracted by
Content Server and can be subsequently used as a search criteria:
O oN
pe o
D
n tD
Te i
xt str
In ibu
Figure 22-11:
Extractable Email Fields
te te
rn
al
U
se
O
nl
y
O oN
pe o
Figure 22-12:
D
OTEMail* Regions
n tD
Te i
xt str
In ibu
te te
rn
al
Extractable Attributes You can choose whether to index standard Content Server attributes for
emails or not. The default setting is to enable standard attribute
O
extensions.
nl
Limiting what can be extracted for indexing can help to reduce the
y
Figure 22-13:
Extractable Attributes
O oN
pe o
D
Figure 22-14: Example of Email Metadata And Its Extracted Metadata, Now in Search Index
n tD
indexed or searchable:
In ibu
te te
rn
al
U
se
O
Figure 22-15:
nl
Email Attributes
y
Store Message Body You can choose whether the email message body will be stored as
metadata in the database for viewing when email nodes are previewed in
Content Server. The default is to store the message body.
If you choose not to store the email message body content for viewing,
the body of an email will not display in the HTML view. But you can view
the body of messages if they are rendered in the view produced by Open
Text Document Filters instead.
O oN
pe o
D
Figure 22-16:
n tD
This is an example of the HTML view of the email message body; storing
the message body means the contents of the email message can be
In ibu
searched against, but it will add to the size of the Enterprise index.
te te
rn
al
U
se
O
nl
y
Figure 22-17: Displaying the Contents of the Message Body, using OTDFs
Extracting Additional In addition to the standard email properties, you can specify custom email
Email Properties properties to extract and store. To configure Microsoft Outlook to
extract and store additional email properties on the server, you need to
add the list of properties to the Extracting Additional Email Properties
field. Entries should be entered on one row per line, in the following
format:
<MailSystem>|<PropertyName>|<Display Name>|<Region Name>
mail system.
pe o
D
For Lotus Notes, enter the <Field Name> of the Document Property.
xt str
<Display Name> is the display name that you want to use for the property
In ibu
searchable, you must specify a region name. This can be omitted if you do
al
Signed/Encrypted Message You can define special Microsoft Outlook message classes for signed or
Classes encrypted email messages. Enterprise Connect uses the message classes
entered in this section to identify signed or encrypted emails. If the list of
messages included in this section is incomplete, you can modify the list to
include additional messages.
O oN
n tD
Te i
xt str
In ibu
Signed or encrypted emails are stored in Content Server like other emails.
In some cases Enterprise Connect is unable to display a signed or
al
Email Viewable MIME Email Services also provides an HTML view which is optimized for
Types displaying emails with a preview of the stored body and email properties
such as To, From, and Sent Date. If an email’s MIME type is included in the
Email Viewable MIME Types list, the Email Services HTML view is used to
display the email in the browser. If an email’s MIME type is not included in
the list, the email is displayed in the browser using the available Content
Server viewing method, if one exists for the message type.
If the Store Message Body was set to No, the Email Services
HTML view is unable to display the message body. The view can
only display email properties that have been extracted and
O oN
O oN
pe o
D
n tD
Te i
xt str
In ibu
Figure 22-21:
te te
Metadata Fields
al
U
se
O
nl
y
O oN
pe o
D
n tD
Te i
xt str
In ibu
te te
rn
al
U
se
O
And finally, the additional metadata or Regions available for display in the
search results:
O oN
pe o
D
n tD
Te i
xt str
In ibu
te te
rn
al
And the resulting search results page with the additional email metadata
being displayed on the search results page:
O oN
pe o
D
n tD
Te i
xt str
In ibu
te te
Configure Email Field You can configure user interface options to display specific email fields
when Enterprise Connect users add an email to Content Server. The
Email Subject, From, To, CC, Sent date, and Receive date fields are default
fields and appear on the Add dialog box. The On Behalf Of and BCC are
not default fields and you must configure them if you want them to
appear on the Add dialog box.
O oN
pe o
D
n tD
Te i
Figure 22-25:
xt str
The default Email fields will appear when using Enterprise Connect:
O oN
Figure 22-26:
pe o
D
Enterprise Connect
Te i
xt str
In ibu
te te
rn
al
U
The Add dialog box only appears if the user is required to specify
metadata when adding the email to Content Server.
se
O
added through Enterprise Connect. They do not apply to emails that are
added through other interfaces by using either the Add Item > Email
y
You can configure whether to hide or show email fields, or to make the
email fields editable in the Enterprise Connect Add dialog box, as
illustrated in the figure below where all of the available fields have been
shown and a number of them have been made available for editing::
O oN
pe o
D
n tD
Figure 22-27:
Te i
When additional Email fields are enabled, they will appear and/or be
available for editing when using Enterprise Connect, as illustrated in the
following figure:
O oN
pe o
D
Figure 22-28:
n tD
length.
nl
y
BCC 2000
CC 2000
FROM 255
NAME 248
ON Behalf Of 255
Subject 255
To 2000
Summary
In summary, in this chapter we:
Configured eLink including STMP and POP3 settings
Enabled eLink Advanced Settings to configure email and document or
discussion features
Configured workflow initition using email
Configured email extractable metadata fields and make Regions
querable and displayable
Enabled which email files should be shown or can be edited when
O oN
n tD
Te i
xt str
In ibu
te te
rn
al
U
se
O
nl
y
O oN
pe o
D
n tD
Te i
xt str
In ibu
te te
rn
al
U
se
O
nl
y
Objectives
Overview
O oN
pe o
Settings
rn
Column Settings
functionality.
pe o
D
OpenText Office Enterprise Connect uses the OpenText Office Editor to manage the
nl
Editor editing process for items on the client. Office Editor is installed on the
client as part of the Enterprise Connect Framework installation and
y
10.5.2 can work with Content Server versions 10.0, 10.5, and 16.0.
al
Figure 23-1:
n tD
Te i
xt str
In ibu
Figure 23-2:
te te
Administration Pages
rn
al
U
se
O
nl
y
Specify when users are prompted to enter metadata when they add
pe o
displayed.
te te
rn
al
U
se
O
nl
Figure 23-4:
y
O oN
pe o
D
n tD
Figure 23-5:
Te i
n tD
Te i
xt str
In ibu
te te
rn
al
U
se
O
nl
y
Figure 23-6: Enterprise Connect - Configure Enterprise Connect Display Settings Page
them to Content Server
Te i
Specify which format is used when exporting emails from IBM Notes
to Content Server
xt str
Specify the naming conventions and rules used for emails that are
added to Content Server using Enterprise Connect
In ibu
O oN
pe o
D
n tD
Te i
xt str
In ibu
te te
rn
al
Figure 23-7: Enterprise Connect - Configure Enterprise Connect Email Settings Page
U
se
O
nl
y
11. Scroll down to reveal the bottom half of the administration page.
O oN
pe o
D
n tD
Te i
xt str
In ibu
te te
rn
al
U
se
O
Figure 23-8: Enterprise Connect - Configure Enterprise Connect Email Settings Page (continued)
nl
O oN
pe o
D
n tD
Te i
xt str
In ibu
te te
rn
al
U
se
O
nl
y
Figure 23-9: Enterprise Connect - Configure Enterprise Connect Menu Settings Page
n tD
Te i
xt str
In ibu
te te
rn
al
U
se
Figure 23-10: Enterprise Connect - Configure Enterprise Connect Search Settings Page
O
n tD
Te i
xt str
In ibu
te te
rn
al
U
se
O
nl
Figure 23-11: Enterprise Connect - Configure Enterprise Connect System Settings Page
y
Summary
In summary, in this chapter, we:
Reviewed the Administering of Enterprise Connect
O oN
pe o
D
n tD
Te i
xt str
In ibu
te te
rn
al
U
se
O
nl
y
Objectives
Overview
n tD
This chapter provides deals with the Content Server Template Volume
Te i
and items such as Template Folders, Custom View Templates and Project
Templates. The focus of this chapter is in the creating of these items and
xt str
The Templates Volume helps organize and centralize the storage and
administration of Project and Custom View Templates. These templates
al
Project Template, the template is used to fashion the new Project (i.e.,
think of it like a rubber stamp).
y
You can also create a project or Custom View Template in the Templates
Volume or from an existing project or Custom View’s Functions menu.
You can export a Project Template by clicking its Functions menu, and
then choosing Export Template. A copy of the Project Template is saved
as an XML file that can be imported to another Content Server instance.
Figure 24-1:
n tD
Administration Pages
Te i
xt str
In ibu
te te
Figure 24-2:
y
Selecting the Add Item menu will demonstrate that you can add either a
Template Folder, Customer View Template, or a Project Template to this
volume.
Template Folder Template Folders allow you to organize or arrange various Item
Templates with the volume. For example, Templates could be grouped
together by department or on a functional or role basis to make them
easier to locate and maintain.
Custom View Template A Custom View Template is based on an Custom View item stored in
Content Server or an externally stored XML template file. When the
Custom View has been stored as a Template, it can then be leveraged
throughout the system as kind of a prototype or starting point for other
departmental or individual Custom Views, as illustrated in the following
figure:
O oN
pe o
D
n tD
Te i
Figure 24-3:
xt str
external XML template file. When the Project has been stored as a
Template, it can then be leveraged throughout the system as kind of a
O
4. From the Add Item men, select Template Folder (e.g., call it ODG Partner
y
Projects).
5. Click on the newly created Template folder, so your templates are created
within that folder.
<p> </p>
<table border="2" cellpadding="2" cellspacing="2"
style="width: 100%;">
<tbody>
<tr>
Figure 24-4:
<td><c><img height="100" src="\img16\shark-surf-1.jpg"
width="100" /></c></td>
Example of a Custom View
<td>
O oN
HTML Code
<h2 style="font-style: italic;"><span style="font-size:
pe o
</tr>
</tbody></table>
n tD
<p> </p>
Te i
xt str
img16/ mapping.
al
U
se
O
nl
y
O oN
pe o
D
n tD
Te i
xt str
In ibu
Figure 24-6:
se
9. Click Browse Content Server opposite the Create In field and navigate to
Content Server so you can select Content Server Templates..
Figure 24-7:
O oN
Destination
n tD
Te i
xt str
In ibu
Figure 24-8:
nl
Status
y
11. Navigate to the Content Server Template Volume to confirm the Custom
View Template was successfully created.
Figure 24-9:
Template Created
O oN
pe o
D
n tD
You can now export the template in the form of an xml file.
Te i
12. From the Custom View Template’s Functions menu, select Export Template
and specify a destination folder (e.g. C:\downloads) to store the xml file.
xt str
Now use the Custom View Template to create a new Custom View in
In ibu
13. Navigate to the Enterprise Workspace > ODG Parent Company > Event
rn
Sponsoring folder.
14. From the Add Item menu, select Custom View.
al
15. Change the Document from Existing to Template and click Browse
U
Content Server, to select the banner template (e.g., Shark Surf Banner
Template.
se
O
nl
y
Figure 24-10:
Selecting a Template to
Create the Custom View
16. Enter a Custom View name (e.g., Shark Surf Event Sponsoring) and click
Add.
Figure 24-11:
n tD
Te i
17. Close all of the browser windows to log out of Content Server.
xt str
In ibu
Summary
te te
rn
Exercises
This exercise will provide you with an opportunity to practice what you have learned earlier in this
chapter about the creating and exporting of Item Templates. This exercise will focus on adding a
new Project, then creating a Project Template from the Project and exporting the Template as an
XML file.
4. If you did not previously create an ODG Partner Projects folder, when following the
instructor demo Step Set earlier in this chapter, create it now using the Add Item men, and
selecting Template Folder and calling it ODG Partner Projects.
xt str
5. In a new browser window or tab, navigate to the Enterprise Workspace > ODG Parent
In ibu
Company folder.
te te
6. From the Add Item menu, select Project and call it A Project for Template, and click Finish
rn
7. From the A Project for Template’s Functions menu, select Make Template. Enter a Name of
Blank Project Template and select as the Create In destination.
O oN
pe o
D
n tD
Te i
xt str
In ibu
te te
rn
al
U
8. Click Add. If you are prompted to Edit Categories: New Project Template, click Done and
Add again.
se
9. Open the browser window or tab to the Template Volume and navigate into the ODG
O
Partner Projects folder. Confirm that the Blank Project Template was created.
nl
10. From the Blank Project Template’s Functions menu, select Export Template and save the
xml file to C:\Downloads.
y
Objectives
Overview
pe o
D
n tD
Open the LiveReport Work with the LiveReport Volume and its contents.
se
Volume
O
nl
LiveReport Administration
opentext).
pe o
D
Figure 25-1:
rn
Administration Pages
al
U
se
O
nl
y
Configure LiveReport The Configure LiveReport Security page is displayed; this page allows
Security administrators to irreversibly prevent LiveReports from making database
or schema changes.
Figure 25-2:
Configure LiveReport
Security Page
This check box is cleared by default, which prevents the SQL statement
D
When the check box is selected, a confirmation dialog appears; you must
xt str
Figure 25-3:
U
se
Configure LiveReport
Security Page
O
nl
y
For training and Step Set purposes, do NOT enable the Prevent
LiveReports from modify the database setting.
After stopping all of the Content Server Services, the openext.ini file can
be backed up to a copy and then edited. The following section needs to
have a parameter defined:
[report]
AllowDBModification=false
[report]
Te i
AllowDBModification=true
xt str
ModificationSQLTerms=INSERT, UPDATE
In ibu
UPDATE
rn
UPDATETEXT
al
WRITETEXT
REMOVE
U
DROPCREATE
se
ALTER
O
INSERT
nl
COMMIT
EXECUTEFETCH
y
REVOKE
ROLLBACK
SAVE
TRUNCATE
Export LiveReports
You can export LiveReports from Content Server to a [RPT] text file. The
exported text files can then be imported into any Content Server
installation. This allows you to import a LiveReport, instead of creating it
from scratch.
Export LiveReports
1. This Step Set continues from the previous one and assumes you are signed
in using an administrative account (e.g., sadmin/letmein).
O oN
following figure represents the start of the list which you can scroll
through:
In ibu
te te
rn
al
U
se
O
nl
Figure 25-4:
y
O oN
Figure 25-5:
pe o
D
Example of Several
n tD
displayed.
y
Import LiveReports
Where one or more LiveReports have been exported from Content
Server to a [RPT] text file, the LiveReports can then be imported into any
Content Server installation. This allows you to import a LiveReport,
instead of creating it from scratch.
Import LiveReports
1. This Step Set continues from the previous one and assumes you are signed
in using an administrative account (e.g., sadmin/letmein).
Figure 25-6:
pe o
D
training and purposes of this Step Set, you can use the same Content
Server instance to perform the import.
rn
4. Click Browse Content Server opposite Create In and select the LiveReport
al
destination folder (e.g., Enterprise > ODG Parent Company > Software
Training).
U
5. Click Browse opposite File and select the import file (e.g.,
se
Parent Company > Software Training) and confirm that the same (i.e., 14)
exported LiveReports have been successfully imported.
y
8. Optionally run a report, for example the one called 3-0136 Demo LR -
Document Versions by MIME Type (Bar Chart), which generates a bar
chart of stored Content Server documents, organized or groups by MIME
Type. Click the back browser button to return to the folder containing the
LiveReports.
9. Navigate back to the Enterprise Workspace by selecting the Enterprise
breadcrumb.
LiveReports Volume
1. This Step Set continues from the previous one and assumes you are signed
in using an administrative account (e.g., sadmin/letmein).
2. If necessary, navigate to the Administration pages > LiveReport
Administration section. If prompted for the Administration Password,
enter it (e.g., opentext).
3. Click Open the LiveReport Volume.
O oN
By default, there are 45 standard shipping reports and they are available
Te i
to all users from the Global Menu bar > Personal > Reports >
LiveReports option.
xt str
Figure 25-7:
O
nl
LiveReports Volume
y
Summary
In summary, in this chapter we:
O oN
Te i
xt str
In ibu
te te
rn
al
U
se
O
nl
y
Exercises
This exercise will provide you with an opportunity to practice what you have learned earlier in this
chapter about the exporting and importing of LiveReports. This exercise will focus on you choosing
which reports you wish to export and import.
4. Choose several LiveReports using the select check box opposite the report name. Once all
Te i
of choosen reports have been selected, scroll to the bottom of the page and click Export.
5. Provide a suitable name for your RPT export file and save it to C:\Downloads.
xt str
7. Click Browse opposite the Create In setting and select the location as Enterprise > ODG
te te
8. Click Browse opposite the File setting and pick the file you exported to the C:\Downloads
folder.
al
9. Click Add.
U
se
10. Navigate to the Enterprise > ODG Parent Company > Software Training folder to confirm that
your reports were successfully imported.
O
nl
y
Objectives
Overview
O oN
pe o
The General Settings page allows you to configure how Content Server
n tD
handles the zip and download, email, and print actions, and set the
Te i
download.
rn
documents.
Multi-File Output works with any supported document type for which the
O
user has at least See Contents permissions. They can output the contents
nl
be supported
n tD
Te i
General Settings
xt str
In ibu
opentext).
U
Figure 26-1:
y
Administration Pages
O oN
pe o
D
n tD
Figure 26-2:
Te i
Temporary Directory The path to the location that Content Server will use for temporary file
nl
OTHOME\temp\multifile\.
SMTP Settings The number of seconds you want the cache to be valid before Content
Server attempts to obtain new settings. By default, this field is set to 300.
Address Limit The maximum number of recipients that a user can specify when they use
a Multi-File Output email action. By default, the Address Limit is set to 10.
Bandwidth Limiter Enter the maximum file size in KB (after file compression) that users are
allowed to download, email, or print in the Bandwidth Limiter boxes. By
Te i
default, the maximum files sizes are all set to 5120 KB. In the case of
Outdoor Gear system, the maximum download setting has been
xt str
increased.
In ibu
O oN
Figure 26-3:
pe o
D
(continued)
Te i
xt str
In ibu
te te
rn
al
Multifile Objects You can enable the object types that users can download, email, or print
U
Configuration using multi-file buttons. By default, only Documents and Folders are
se
enabled.
5. Select Download, Email and Print for Email and Email Folder Types.
O
7. In a separate browser (i.e., Chrome), sign in with a user account (e.g., Cho/
opentext).
8. From the Global Menu bar, select Personal > My Workspace.
9. Navigate into the Chris Outlook Email Message Conversation > Philip
Allen (Enron) Sent Email, Request Keyword email folder.
10. Using the Multi-select check box, select all of the email message files and
click Zip & Download.
11. Scroll to the bottom of the page and click Zip & Download.
Figure 26-4:
Figure 26-5:
al
Contents of the
Downloaded Zip File
U
se
O
nl
y
Summary
In summary, in this chapter we:
Configured Multi-file Output settings for your organization
Exercises
This exercise will provide you with an opportunity to practice what you have learned earlier in this
chapter about the using MultiFile Output and configuring it using the administration pages.
3. Click General Settings and scroll down to the bottom of the page and select Download,
D
7. Navigate into the Chris Outlook Email Message Conversation > Philip Allen (Enron) Sent
Email, Request Keyword email folder.
te te
8. Using the Multi-select check box, select all of the email message files and click Zip &
rn
Download.
al
9. Scroll to the bottom of the page and click Zip & Download followed by Downloading the zip
file.
U
se
10. Optionally, decompress the downloaded zip file to reveal the message files downloaded
using Multi-file Output to verify the email messages are contained within the provided
MFO zip file.
O
nl
y
O oN
pe o
D
n tD
Te i
xt str
In ibu
te te
rn
al
U
se
O
nl
y
Objectives
pe o
D
Overview
n tD
Te i
users perform, it will be difficult for you to determine how well the system
te te
Test Email Delivery Test the delivery of email messages from the Agent
server to the reply to and on error addresses and to
any other email address.
Notification Administration
n tD
Te i
xt str
In ibu
te te
rn
al
U
se
3. Ensure that Mercury Mail, the SMTP/POP3 server has been started, using
nl
the icon on the task bar (i.e., ); the application can remain minimized in
y
Figure 27-2:
In ibu
5. Click Purge.
U
se
Configure Notification
Notifications are not enabled by default on newly installed Content
Server instances.
Figure 27-3:
n tD
Te i
Enable Notification If Notifications is not enabled, it needs to be enabled along with a restart
of the the Content Server service (i.e., Content Server (CS16)) using
xt str
Windows Services.
In ibu
Content Server Home Page The Home Page URL is specified in the form of a protocol (http, https) +
URL optional port number + server name or FQDN + instance name + cs.exe.
te te
Scrolling down to the SMTP Settings section, the mail server setting are
rn
defined.
al
If you are setting up Notification for the first time, begin by configuring
the SMTP Settings area. You must accurately configure these Simple Mail
U
correctly.
SMTP Server ID The default for most SMTP servers is mail. In the case of the Outdoor
O
Gear instance, it has been set to the IP address for localhost, 127.0.0.1.
nl
SMTP Port The default SMTP port for mail is 25. In the case of the Outdoor Gear
y
Content Server Host Name The Host Name will be the same name used during the installation for the
DNS Name. The DNS Name ,and thus the Host Name, will either be
localhost or a fully qualified domain name (FQDN). You must provide the
FQDN, in the following format: host.domain.suffix (e.g.,
otcs.opentextls.com), to permit users to connect to Content Server from
outside your local network. Content Server uses this name to create links
to items in Content Server notifications and elsewhere. If you do not
specify the fully qualified domain name, these links may not work for
remotely connected users.
Figure 27-4:
Notification
pe o
D
n tD
Te i
Default Message Type Most administrators will employ HTML Body Only as the message type as
xt str
Plain Text Body Only, sends reports in plain text format. All email
clients can handle this message type.
te te
HTML Body Only, sends reports in HTML format. If your users have
rn
email program(s) that your users use cannot display HTML, do not
select HTML Body Only.
U
Plain Body with HTML Attachment, sends the report in plain text
se
format with an HTML version included as an attachment to the
message. Users can open the HTML attachments in their Web
O
browsers.
nl
Default Subject and On The default is ‘Content Server Notification [Error] at %1’, where %1 is a
Error Subject variable that inserts the server’s date and time.
y
Default Content Server The name of the Content Server database and Notification displays this
Database database name in the headers of its reports. The setting will be the same
name as when the database was originally created during installation.
Default Addresses All email addresses requested in the following procedure must be valid
Internet email addresses, in the format account@domain, where domain is
the domain of the email account’s mail server and usually takes the form
of myserver.mycorp.com.
Scrolling down to the Report Settings section, it allow you to limit the
number of Notifications sent out at one time and limit how long old
messages stay before being cleared (if a user does not clear their
Notifications page then events will continue to be added until the time
indicated by the Clear Old Messages setting).
O oN
pe o
D
n tD
Te i
Figure 27-5:
xt str
Notification
te te
rn
al
U
se
O
nl
y
Maximum Events Per Pass This setting represents the number of Notification events that will be
processed each time the notification ‘agent’ is run. The default setting is
1000 and is suitable for most organizations unless they were advised by
OpenText development or Customer Support to change it.
Default Report Type Currently, Default Notifications Report is the only report type available,
however, the setting has he provided for possible customizations and the
offering of alternative report types.
Default Report Options The default of <None> does not provide the possibility of displaying
notifications in new browser window while a setting of Alternate Window
provides this option.
Clear Old Messages Clear Old Messages, defaults to 1 month or 30 days and corresponds to
the MessageClearInterval parameter found in the opentext.ini
configuration file. The parameter sets the maximum number of days that
Content Server stores Content Server Notification messages.
Clear Outstanding Events Clear Outstanding Events, defaults to 1 month or 30 days and
corresponds to the ScheduleHandlerClearInterval parameter found in
the opentext.ini configuration file. The parameter sets the maximum
number of days that Content Server stores Content Server Notification
O oN
Default Notification The Default Notification Schedules define the three default schedules
n tD
Schedules that Content Server users can customize when they configure their own
personal notification schedule. An example of a user Notification Report
Te i
The day and time of notification is based on the time zone and clock
setting of the host on which the database used by Content Server resides.
If messages are not being sent at the expected times, it may be because
the host’s clock is set incorrectly or users have not taken time zone
differences into account.
Figure 27-7:
n tD
Te i
Configure Scheduled
Activities Page
xt str
In ibu
te te
rn
al
Midnight Event Producer The Midnight Event Producer sends out notifications on Workflow
U
These settings are used not only for the user Notification but also for
O
other legacy agents (such as the agents that drive data flows in order to
nl
keep an index up to date) and for third party agents (those created via
customization).
y
Add Rendition There is an scheduling agent associated with the creation or adding of
Renditions to Content Server. As noted in the Renditions chapter, a
rendering engine (e.g., Blazon) is required to create the Rendition. By
default this agent is enabled; skipping the unnecessary execution of a
third party rendering engine is a known issue.
Provider Blob Deletion If external file storage is used as the Storage Provider, files may be
Failure Retry retained after a user deletes it; this event will try to delete any data which
should no longer be retained. By default, this event runs at midnight each
day. This setting can be changed in the Activity Schedule section.
O oN
pe o
D
n tD
Figure 27-8:
Te i
Configure Scheduled
Activities Page (continued)
xt str
In ibu
te te
rn
al
U
se
Drag and Drop Incomplete Notifies users via email when they Drag and Drop (DnD) an item into a
Items Notification container that has a Category with required attributes assigned to it, but
O
have not yet completed the required attribute information for that item.
nl
In other words, this event sends a notification when an item, which was
dragged and dropped to Content Server, was not fully added to Content
y
Email notifications are sent to users with incomplete items at the times
you specify in the Activity Schedule, unless the item was added within the
Completion Delay time limit. The Completion Delay setting allows users a
specified amount of time to complete items once they are dragged and
dropped into a container, before a Notification is sent out. For example, if
the Activity Schedule is set to check for incomplete items at 1:00 P.M.,
and the Completion Delay is set to 30 minutes, items that are added
between 12:30 P.M. and 1:00 P.M. will be included in the next notification
time specified in the Activity Schedule.
By default, this event runs every five minutes each day. This setting can be
changed in the Activity Schedule section.
Clear Old Messages On rare occasions, you may wish to clear the queues of all events – for
example, after restarting a Content Server system or restoring a
database. You can use the Clear Old Messages setting to delete all
messages that have not been cleared by users or you can also go to the
Clear Outstanding Events page to purge events before they become
messages.
Failed Log-in Notification Notifies the administrator if the number of failed log in attempts within a
pe o
Consumer Five Minute Agent that drives notification events. Reads the NotifyEvents table and
Agent populates the LLEventQueue table. Enables or disables legacy and third
xt str
party agents. This event is the same as the Midnight Event Producer
except that it runs on a different schedule. This event is used when you
In ibu
Figure 27-9:
y
Configure Scheduled
Activities Page (continued)
Transfer Notification If Notifications is enabled and properly configured, this event moves
Events information from the NotifyEvents database table to the LLEventQueue
table for processing. This is a step in the processing of Content Server
Notifications. By default, this event runs every five minutes each day. You
can change the default behavior by configuring the Activity Schedule
section.
Consumer Event Processor Developers should no longer subclass this process as it is a deprecated
agent.
Node Event Processor Converts individual node events to message events for each user
interested in that node/event combination. You can define the number of
instances of the Node Event Processor that run concurrently. By default,
O oN
this event runs every five minutes each day. This setting can be changed in
pe o
n tD
Te i
Figure 27-10:
xt str
Configure Scheduled
Activities Page (continued)
In ibu
te te
Event Processors Number of processors, defaults to 1, but can be changed using the
rn
3. Ensure that Mercury Mail, the SMTP/POP3 server has been started, using
pe o
D
the icon on the task bar (i.e., ); the application can remain minimized in
the system tray.
n tD
Figure 27-11:
se
O oN
pe o
D
n tD
Te i
xt str
6. Start Outlook, select the cs16 profile name, and click OK.
te te
address:
al
U
se
O
nl
Figure 27-13:
y
Fundamentals course.
pe o
D
n tD
Te i
xt str
In ibu
te te
rn
Figure 27-14:
al
Configure Scheduled
Activities Page
U
se
O
nl
y
Summary
In summary, in this chapter we:
Cleared Outstanding Events
Configured Notification settings such as SMTP server and email
addresses
Configured schedules such as Drag and Drop Incomplete Items
Tested Email Delivery
Viewed Scheduling Statistics
O oN
pe o
D
n tD
Te i
xt str
In ibu
te te
rn
al
U
se
O
nl
y
Exercises
This exercise will provide you with an opportunity to practice what you have learned earlier in this
chapter about administering Notification. This exercise will focus on a testing Notification and
Email Delivery, which are integral parts of Content Server Notification.
3. Ensure that Mercury Mail, the SMTP/POP3 server has been started, using the icon on the
n tD
task bar, if it is not already running; the application can remain minimized in the system tray.
Te i
4. Click Send Default Message to trigger the sending of a default test message.
5. Start Outlook, select the cs16 profile name, and click OK.
xt str
6. Confirm that 3 separate messages were received, corresponding to the success status for
In ibu
Objectives
Overview
O oN
pe o
v16.0, OIOE is included with the core software, however, it still requires a
te te
Table 28-1: OIOE Administration Page Links and their Functional Descriptions
Object Exporter: View Log Files View the export log files
Object Importer: Import Status Shows the status of a running import process
into Content Server
Object Importer: View Log Files Shows the import log files
OIOE enables the export of any number of objects from Content Server
to the file system. The control file that manages the export process is
O oN
configurable. Within the control file, you specify where the objects to be
exported are located in Content Server, and where on the file system to
pe o
D
export the objects. You can export the following Content Server object
types:
n tD
Shortcut alias
In ibu
Discussion discussion
al
Document document
U
Folder folder
se
Project project
Reply reply
O
Task task
nl
y
Content Server provides ten different OIOE agents which can be used on
various instances to import contents.
Use the Schedule Import Tasks page to set which scheduling agents are
enabled and to set their respective schedules. Content Server
Notifications needs to be configured before scheduling automatic
imports.
The Object Importer runs on a single thread and therefore only one
instance of the importer can run per Content Server install. Object
Importer can be installed on multiple machines connected to the same
Content Server database, to reduce the time required to import large
amounts of data. The data on the Schedule Import Tasks page applies to
O oN
4. Select Enable followed by the day(s), hour(s) and time(s). The frequency of
Te i
the agent runs should consider the impact on the server’s performance, so
some organizations may choose to run the imports only after regular
xt str
business hours. For training purposes here, all of the agent times have been
selected.
In ibu
te te
rn
al
U
se
O
nl
5. If you are running more than one instance of Content Server, you will need
to add the following to the [scheduleactivity] section in the opentext.ini file
for the server: 2999=1. Object Importer requires that scheduling agents
are enabled on all machines that will be importing objects. Other agent IDs
can be disabled by setting their value to zero.
6. You will be prompted to restart the server service.
Working with Object Object Importer creates, updates, or deletes objects within Content
Importer Control Files Server based on directions from an import control file. The import control
file contains meta-information supplied by the user. It is an XML file, and
must contain valid XML. The import control file can have any name and
ASCII extension, for example, import.txt.
Control files must be placed in the control file directory, where Object
Importer processes them one at a time. Before Object Importer begins
processing a control file, each file is moved from the control file directory
into the working directory. Once the file has been processed, which
means that the import has completed and stopped, the control file may be
deleted from the working directory, if that is how you have configured
O oN
Object Importer. Import control files can be added to, or removed from,
the control file directory at any time.
pe o
D
n tD
To prevent data loss, you must stop any running imports before you stop
Te i
import will fail unless the entire import control file, including comments,
is contained within the import tags, <import></import>.
rn
al
top of the control file and save the control file with UTF-8
encoding.
For more information about Object Importer and the Importer
O
<mime>application/msword</mime>
pe o
</node>
D
location>
<title language="en">Shark Surf Logo.jpg</title>
Te i
<file>shark-surf-1.jpg</file>
<mime>application/pjpeg</mime>
xt str
</node>
<node type="url" action="create">
In ibu
</node>
<information>
al
<software></software>
<function></function>
U
<software_version></software_version>
<module_version></module_version>
se
<create_date></create_date>
<export_file_name><![CDATA[?]]></export_file_name>
<rootpaths>
O
<rootpath
nl
id="1"><![CDATA[C:\CS16\object_importer\Upload\]]></rootpath>
</rootpaths>
y
<relative_path enabled="false">
<strip_path_prefix><![CDATA[]]></
strip_path_prefix>
<import_location type="upload_directory"></
import_location>
</relative_path>
</information>
</import>
Validation From the Validation page, you can run an import control file through a
validation tool to check for errors. In particular, this validation tool checks
for import errors relating to the import of multilingual metadata. Object
Importer processes the import control file to validate that specific
requirements are met. The actual import of data will not occur.
The validation tool will not catch all serious errors your import
control file can encounter. Even after running this tool, and
clearing all errors generated by this tool, your import can fail.
O oN
pe o
D
Figure 28-2:
n tD
Te i
Example of Validating a
Control File
xt str
In ibu
Once you select an import control file, and run the validation tool against
te te
that import control file, Content Server displays a new page showing the
rn
Figure 28-3:
Successful Validation
O
nl
y
Configuring Object
Importer
This step set assumes that you are still signed in with an administrative
account and have navigated to the Object Importer section of the
Administration pages.
C:\CS16\object_importer\destination
pe o
D
C:\CS16\object_importer\logs
n tD
C:\CS16\object_importer\Upload
Te i
C:\CS16\object_importer\work
xt str
Figure 28-4:
O
Importer
y
Control File The control file directory is the location where Object Importer looks for
import files (e.g., OTHOME\object_exporter\control).
Working The working directory is the location where Object Importer processes
the import (e.g., OTHOME\object_exporter\work).
Log The log directory is the location where Object Importer will write log files
(e.g., OTHOME\object_exporter\logs).
O oN
Advanced Settings
pe o
D
On Error Address Enter an email address for notification of critical errors. This does not
n tD
include errors related to the imported data as those are written to the log
file.
Te i
Report Every field Enter how often the database is updated. For performance reasons, Open
xt str
Text recommends that this value be in proportion to the size of the upload
file. If a value of zero, (0), is specified, the update will not occur.
In ibu
Create Directory Structure When creating objects in Content Server using Object Importer, you must
te te
does not exist, select the Create Directory Structure check box. If the
check box is not selected, the object will not be added and an error will be
al
logged.
U
Delete Control Files To delete control files from the working directory after processing is
se
complete, select the Delete Control Files check box. If the check box is not
selected, the control file remains in the working directory. This check box
only applies to scheduled imports.
O
nl
Stop Processing on Error To stop processing when an error occurs during control file processing,
select the Stop Processing on Error check box. By default, Object
y
Importer will process the entire control file, skipping any errors that are
encountered.
Add Title to Location The Add Title to Location check box is used to maintain compatibility
between different versions of Object Importer so that existing control
files can still be used. For new installations, Open Text recommends that
you leave this option cleared, so that you are able to rename objects.
Refresh Control Files During a scheduled import, when the agent is activated, a list of files in the
upload directory at that time is noted by Object Importer. These files are
then processed, ignoring any new files that may have been added. To poll
the upload directory until there are no files left to process, select the
Refresh Control Files check box.
Document Modify Date To gain the ability to alter the “modify date” on a document during the
create operation only, select the Document Modify Date check box. This
option does not apply to the update operation, and therefore will only
work on documents with only one version.
Normally, Content Server does not permit this behavior since adding a
version constitutes a modification, which automatically sets the Date
Modified field to the current date. Setting the “modify date” is not
permanent, as it will be reset to the current date when certain actions are
performed within Content Server. These actions include altering the
name of the document or changing permissions on the document.
Default Owner to Admin To set the value for the <owner> tag to “Admin” if the value cannot be
O oN
n tD
Default Creator to Admin To set the value for the <createdby> tag to “Admin” if the value cannot be
found in the system, instead of throwing an error, select the Default
Te i
3. Click Update.
4. The Upload subdirectory needs to have the following set of files, which can
In ibu
Figure 28-5:
U
se
O
5. Copy the control file into the control subdirectory (i.e., C:\Instructor
nl
C:\CS16\object_importer\control\).
6. Click Import Status and refresh the page as required to monitor the
progress of the import; it could take just a few minutes.
OIOE should report that it processed 5 items and that is was successful.
pe o
D
8. Also review that the Shark Surf Partnership Contents were successfully
created.
O oN
pe o
D
n tD
Te i
Manual Object Import From the Manual Object Import page, you can import documents into
Content Server manually, rather than on a scheduled basis. Manual
In ibu
imports are primarily used in test environments. The control files used
te te
Configure Object
U
Exporter
se
Working The working directory is the location where the output file(s) will be
created and stored temporarily, before being moved when the process is
O
Log The log directory is the location where Object Exporter will write log files.
y
In order to view and delete log files from the Object Exporter View Export
Log Files page, the log files directory must be located in
OTHOME\object_exporter (e.g., OTHOME\object_exporter\logs).
Destination The destination directory is the location where Object Exporter will move
the output file(s) when the process is finished. The output file(s) from a
successful export are actually import control file(s) which correspond to
that successful export. Using OpenText Object Importer, you can use
these file(s) to import all objects you have recently exported, as all
object's permissions, titles, attributes, and other object metadata are
detailed in these import control file(s) (e.g.,
C:\CS16\object_exporter\destination).
Objects Per Batch The default value for objects per batch is 1000.
Summary
In summary, in this chapter we:
Used Object Importer to import items into Content Server
O oN
pe o
D
n tD
Te i
xt str
In ibu
te te
rn
al
U
se
O
nl
y
Exercises
In this exercise, you will configure the Object Importer Schedule, so that it can be used to
automatically perform an Object Import, and then configure the Object Importer administration
settings.
All of the source files and materials you will require in this exercise can be found in the C:\Instructor
Resources\3-0177 What's New in Content Server v16.0\object_importer\ folder.
O oN
2. Navigate to the administration pages and enter the password if prompted (i.e., opentext).
n tD
3. Scroll down to the Object Importer Administration section and click Object Importer:
Te i
Schedule.
4. Select Enable followed by the day(s), hour(s) and time(s). The frequency of the agent runs
xt str
should consider the impact on the server’s performance, so some organizations may choose
to run the imports only after regular business hours. For training purposes here, all of the
In ibu
6. Create the following subdirectories as they will be used in the Directory section:
al
C:\CS16\object_importer\control
C:\CS16\object_importer\destination
U
se
C:\CS16\object_importer\logs
C:\CS16\object_importer\Upload
O
C:\CS16\object_importer\work
nl
y
7. Click Object Importer and complete the information as illustrated in the following figure:.
O oN
pe o
D
n tD
Te i
xt str
In ibu
te te
rn
al
8. Click Update.
U
se
10. Copy the provided OIOE Bites Back.txt control file into the control subdirectory. Note: You
would normally create this control file in TextPad using OIOE Guide information, however,
we have already done that for you.
11. Click Import Status and refresh the page as required to monitor the progress of the import;
it could take just a few minutes.
12. OIOE should report that it processed 5 items and that it was successful.
13. Review the log file your import has created (i.e., C:\CS16\object_exporter\logs) against the
one located in C:\Instructor Resources\object_importer\logs\OIOE Bites Back.log. Confirm
that no errors were encountered, otherwise draw them to your instructor’s attention.
14. Also review that the Shark Surf Partnership Contents were successfully created.
O oN
pe o
D
n tD
Te i
xt str
In ibu
te te
rn
al
U
se
O
nl
y
Answers to Exercises
The following is the code contained in the Bites Back importer control file, which we have given to
you as part of this exercise, however, some students may choose to experiment with it to produce
their own control file.
</node>
Te i
xt str
<file>shark-surf-2.jpg</file>
rn
<mime>application/pjpeg</mime>
al
</node>
U
<information>
<software></software>
<function></function>
<software_version></software_version>
<module_version></module_version>
<create_date></create_date>
<export_file_name><![CDATA[?]]></export_file_name>
<rootpaths>
<rootpath id="1"><![CDATA[C:\CS16\object_importer\Upload\]]></rootpath>
</rootpaths>
<relative_path enabled="false">
O oN
<strip_path_prefix><![CDATA[]]></strip_path_prefix>
pe o
D
<import_location type="upload_directory"></import_location>
n tD
</relative_path>
</information>
Te i
xt str
</import>
In ibu
te te
rn
al
U
se
O
nl
y
O oN
pe o
D
n tD
Te i
xt str
In ibu
te te
rn
al
U
se
O
nl
y
Objectives
Overview
pe o
D
n tD
features respectively.
te te
recommendation and rating information
Customizing Recommender, including changing the rating images and
O
Personal Recommendations
Recommendations are available to users from the Global Menu bar >
Personal > Recommendations.
have been created and/or modified and the number of times they
Te i
following figure:
te te
rn
al
U
Figure 29-1:
se
Example of a Personal
Recommendations Page
O
nl
y
Recommender Administration
Figure 29-2:
n tD
Recommender
Administration Section
Te i
xt str
In ibu
te te
rn
The Items per User and Days to Keep settings are enabled by default,
with a values of 250 and 180 respectfully, as illustrated in the following
O
figure:
nl
y
Figure 29-3:
OpenText suggests that the default settings will be suitable for most
customers and they should only be changed on the advice from OpenText
representatives (i.e., Development or Customer Support).
n tD
Figure 29-4:
U
Configure Recommender
Components
se
O
nl
y
Item Types What’s New Specifies the item types that can be displayed in the component.
Most Active Keep in mind that not all Content Server items can be tracked by
Items Recommender.
Sample Size What’s New Specifies the sample size for the component. The sample size
Most Active determines the number of items that the system uses when making
Items recommendations.
O oN
Top Picks For example, if the sample size is 50 and a user has configured the
pe o
50 that best match the component's criteria. The system will only
display an item if the user has been assigned the See permission for
n tD
that item.
Te i
Max Number of What’s New Specifies the maximum number of items that can be displayed in the
Items Shown Most Active component. This setting provides an upper limit for the Number of
xt str
Items Items Shown element, which users use to set how many items a given
Top Picks Recommender component displays.
People With
In ibu
Similar Interests
te te
Documents of
Interest
rn
Show Images Synopsis Specifies the maximum size of images that are displayed as thumbnails
al
Use Description Synopsis Specifies whether to use an item's description (rather than its
nl
Auto-Extract Synopsis When an item is added to Content Server or modified in some way, the
Synopsis system extracts it. This process assigns metadata to the item and
indexes it so that it is searchable.
This parameter specifies whether to extract an item's synopsis upon
the first visit to the Ratings tab of the item's Properties page. Synopses
are searchable only after they have been extracted. If this check box is
cleared, synopses are extracted only when they are edited, so unedited
synopses are not searchable.
Extraction is an expensive operation when done to many items within a
short period of time. Setting Recommender to auto-extract synopses
may slow down large Content Server installations.
Number of Items Reviews Specifies the number of items that a given Recommender component
Shown People Who displays.
Viewed This Item
People Who
Viewed This Item
Also Viewed
Rating Image Reviews Specifies the image set that the system uses when depicting the ratings
that have been assigned to items.
Rating Drop- My Review Specifies the text that appears in the Rating drop-down list on the
Down List Ratings tab of the item's Properties page.
O oN
pe o
configure the Max. Number of Items Show, which Item Types are tracked
Te i
Figure 29-5:
O
Configuring the
nl
Recommendations What’s
New Component
y
Max Number of Items Specifies the maximum number of items that can be displayed in the
Shown component. This setting provides an upper limit for the Number of Items
Shown element, which users use to set how many items a given
Recommender component displays. The default value is 10, but can be
changed using the drop-down list where values range from 10 to 100 (in
increments of 10).
Item Type Specifies the item types that can be displayed in the component.
Sample Size Specifies the sample size for the component. The sample size determines
the number of items that the system uses when making
recommendations. For example, if the sample size is 50 and a user has
configured the component to display 10 items, the system displays the 10
O oN
items out of 50 that best match the component's criteria. The system will
pe o
only display an item if the user has been assigned the See permission for
D
that item.
n tD
Clicking the Action button, under the Ratings Page section, allows you to
Te i
Map.
te te
Figure 29-6:
y
Configuring the
Recommendations
Synopsis Component
12. Enter 500 Kb for the Show Images Smaller than setting.
13. The User-Editable Synopsis and Use Description as Initial Synopsis should
both be enabled.
Copied and moved items do not register as ‘new’ and they will
n tD
1. Sign in with the Admin user account (e.g., admin/cs!) because this Step Set
te te
4. Open another new browser window or tab and navigate to the Enterprise
Workspace and Add a new folder (e.g., Highly Recommended).
se
The newly added items, including the email messages, appear under the
What’s New section, as illustrated in the following figure:
O oN
pe o
D
Figure 29-7:
n tD
Personal
Te i
Recommendations
Personal With Recent
xt str
Activity
In ibu
te te
rn
al
U
se
O
9. Close all of the browser windows and tabs, thereby logging out as the
nl
Admin User.
y
O oN
pe o
D
n tD
Figure 29-8:
Te i
Configuring the
Recommender System
xt str
Settings
In ibu
te te
rn
al
U
se
O
nl
y
Summary
In summary, in this chapter, we:
Configured History General Settings for Recommender
Configured Recommender Components like What’s New and then
tested the system using the updated configuration
Configured Recommender System Settings
Exercises
Configure Recommender
In this exercise, you will have the opportunity to configure additional Recommender components,
based on what you have learned earlier in this chapter. The focus will be on Most Active Items and
Top Picks.
prompted for the Administration Password, enter it (e.g., opentext) and click Configure
pe o
Recommender Components.
D
5. Select the following Item Types: Folder, Email, LiveReport, and Workflow Map.
xt str
6. Enter 10 as the Sample Size and click Update at the bottom of the page.
In ibu
7. Click Action for the Top Picks component and confirm the Max.Number of Items Show is 10
te te
and the Sample Size is also 10. Click Update at the bottom of the page.
rn
8. Click Update at the bottom of the Configure Recommender Components to save your
changes.
al
9. Test your setting by selecting Personal > Recommendations from the Global Menu bar, and
U
then scrolling down to the Most Active Items section. An example of the output, depending
se
on your system activity, may look like the following figure which may include workflow
maps, an item type that your previously configured:
O
nl
y
O oN
pe o
D
n tD
Te i
xt str
In ibu
te te
rn
al
U
se
O
nl
y
Objectives
Overview
O oN
pe o
following table:
Te i
Configure Version Folders Specify the directories into which Content Server
puts the versions of documents for conversion.
U
se
Purge Rendition Log Purges all messages logged by the Rendition module.
View Rendition Log View messages and errors logged by the Rendition
O
module.
nl
View Selective Rendition Display the items with selective rendition enabled.
Report
y
Introduction to Renditions
Renditions, a previously optional module, is now part of core Content
Server.
some cases, the contents of a rendition may be different than the original
document. For example, a document written in English can be rendered as
pe o
D
Renditions Administration
Renditions Administration
Figure 30-1:
Administration Pages
O oN
pe o
D
n tD
Te i
Administer Renditions
xt str
Figure 30-2:
nl
Administer Renditions
y
log file
n tD
Figure 30-3:
Configure Rendition
Folders
n tD
Figure 30-4:
al
When you add or edit a Version Folder, you define a Rendition Rule. A
y
Rendition Rule specifies the set of MIME types that require Renditions,
what directories are used, and whether the rule is applied globally.
Figure 30-5:
n tD
Figure 30-6:
nl
The log file records errors and successes each time that an activity takes
place. Samples of these messages include:
RenditionAdded
VersionQueued
VersionRequeued
ErrorUpdatingVersionInTheRenditionsQueue
QueueError
FilterVersionFailed
12. Click Admin Home.
O oN
n tD
Figure 30-7:
rn
Report
U
se
type and name of the container, whether subfolders are included, who
nl
subscribed it, and the date it was subscribed. The report also lists the
Rendition Rules applied to each container subscribed.
y
Summary
In summary, in this chapter we:
Reviewed Configure Renditions Administration setting
O oN
pe o
D
n tD
Te i
xt str
In ibu
te te
rn
al
U
se
O
nl
y
Objectives
Overview
n tD
This chapter and several following chapters, deals with Content Server
Te i
Search Administration.
xt str
The Search administrative options and links are described in the following
table:
In ibu
Edit the System Default Configure the appearance of the system default
U
Manage Search Forms and Configure maximum numbers of search forms and
Search Results Templates search results templates, and reset search forms and
nl
Open the XML DTD Add XML DTDs to the XML DTD volume, and then set
Volume the corresponding XML regions to allow users to
search XML data from Content Server.
Configure System Object Configure email settings for sending Content Server
E-Mail Delivery system object alert email messages.
Configure Search JVM Set the relative path for the Content Server Java
Runtime Environments, as well as any command line
arguments.
View System Object View the current System Object status. Test the data
Status flows, data flow processes, and indexes in the System
Object Volume.
Open the System Object Create and manage Content Server indexes and
Volume administer Admin servers.
Configure the Enterprise Configure settings for the Enterprise Extractor and
O oN
extracted.
D
Manage Search Statistics View and purge various statistics generated from the
n tD
search results.
Te i
Configure Search If enabled, modifiers can alter the search query based
Location Modifiers on the current location
In ibu
te te
Configure Search Index The Index Verifier identifies and optionally corrects
Verification differences between an Enterprise Search Index and
rn
Configure Search Filters Search Filters are side panels on search results that
allow faceted navigation and refinement of search
queries.
U
se
Rules
Accessing the Search There are two methods of accessing Search administration:
Administration Area 1. From the Content Server Administration page, scroll down to the
Search Administration section.
2. When logged in as a user with System Administration privileges, from
the Global Menu bar, select Admin > Search Admin Browser.
Search Administration
Search Administration
n tD
Te i
xt str
In ibu
te te
rn
al
U
se
O
nl
y
And scrolling down reveals the bottom half of the same page:
O oN
pe o
D
n tD
Te i
xt str
In ibu
te te
2. Click Cancel.
se
Edit the System Default Search Form & Manage Search Forms and Search
y
Results Templates
When Content Server users first access the Advanced Search page, they
see the search options that have been selected in the System Default
Template. By default, only the full text search field and options to modify
a full text search are shown. However, the administrator can configure
this template to provide users with a more flexible interface from the
System Default Template page. For example, you may want Slices to be
available.
Edit the System Default Search Form and Manage Search Forms
O oN
pe o
D
n tD
Te i
xt str
In ibu
The System Default Template settings will appear in all new users’ search
rn
In addition to the System Default Template, you can create other system
search templates that users will find useful.
U
se
When logged in as the Admin User, any template that you save becomes a
system search template and is listed in the users’ Search Forms (more on
this later as an exercise).
O
nl
2. In a separate browser windows or tab, from the Global Menu bar, select
Tools > Search.
Figure 31-5:
n tD
Te i
Users have the option of choosing a system form or one of their own.
xt str
page is displayed.
se
O
Figure 31-6:
nl
y
Figure 31-7:
You can configure the maximum search forms per user and results
n tD
Maximum (Search Forms) Enter a value between 0 and 100 in the Maximum per User text box to
per User define the number of personal search forms that you want to allow each
xt str
Maximum (Search Results Enter a value between 0 and 100 in the Maximum per User text box to
Templates) per User define the number of personal Search Results Templates that you want to
te te
7. Click Update.
al
The Reset Search Forms and Search Results Template page is displayed.
se
O
nl
Figure 31-8:
y
You can reset or delete the system default search template, the other
system search templates, or even all users’ templates from the Reset
Search Templates page. You should be careful with these options, as users
will not understand why their settings were lost.
Administrative As an administrator, you can view each user’s search templates in the
Viewing of Each Users System Object Volume’s Personal Templates folder. When a user creates
Search Templates their first Personal Template, a new folder is created here named after
their logon (e.g. “Content Server – kbrowning”). This Personal Template
folder also contains the system templates, in a sub-folder named “Admin”.
The System Object Volume (SOV) will be introduced later in this chapter
when you will have an opportunity to browse it, followed by subsequent
chapters where SOV information is covered in greater detail.
O oN
pe o
D
When an XML document is added to Content Server, the XML regions are
automatically indexed.
xt str
To allow users to search XML regions, you must add an XML Document
Type Definition (DTD) file and set its regions to queryable. The DTD
In ibu
XML DTD files define the elements and attributes used in XML
rn
Figure 31-9:
XMLDTD Volume
O oN
pe o
D
n tD
Te i
Figure 31-10:
xt str
XMLDTD Volume
In ibu
te te
rn
al
U
se
O
nl
4. Click Update.
y
In this example, you can have resumes from people who have job
experience working with Java, who have taken a course in Java, or who
like to drink a lot of java. If the resumes are uploaded as text documents,
then there is no way to search for all resumes with "Java" listed in the
"job" section. Indexing the XML into regions allows you to make that kind
of sophisticated search.
When you upload any XML files that are based on the XML DTD you have
just published and their XML elements and attributes, they will
automatically be indexed. The XML Regions can then be searched against,
as illustrated in the following figure.
O oN
pe o
D
n tD
Te i
xt str
In ibu
te te
rn
al
U
se
O
Figure 31-11: The XML Regions that Will Show in on Advanced Search Page
nl
An Advanced Search for ‘java’ in the job region (i.e., job1, job2 etc.) would
y
Figure 31-12:
Search Results Based on
XML Region
Figure 31-13:
Configure System Object
se
E-Mail Delivery
O
nl
y
SOV Checking is enabled by default so that you may monitor the status of
processes in the System Objects Volume.
Content Server records the status or condition of the system objects and,
based on the Control Rules you set up, reports this information to the
system object alert email recipients that you configure.
Configuring User You can set up multiple configurations for Content Server administrators
D
Accounts to Receive to receive messages based on the Control Rules you have configured.
n tD
Error Messages
Once you configure a recipient, you can modify the configuration at any
Te i
stored until the morning; the user will miss it. As a best practice,
set the delivery timing for 24 hours, as illustrated in the figure
U
below.
se
O
nl
y
Select which level of messages this recipient should receive using the
Reporting Options choices.
Figure 31-14:
O oN
Adding a Recipient
n tD
Te i
xt str
In ibu
te te
critical. Errors can, however, become Severe Errors if they occur over
extended periods of time and affect the user’s ability to use Content
Server (e.g., A data flow process shutting down may generate an
error)
Warnings are non-critical errors which notify the user of potential
error conditions. A data flow that does not respond to iPool messages,
for example, will generate warnings
Information provides general status and other system information to
the user
Corrections notify the user that an error, severe error, or warning
which was previously reported has now been rectified
Information Level There are three Information Level options. It is up to you to decide how
much information you want the recipient to receive.
Detailed Text Message: Provides recipients with a detailed
explanation of the system object alert in plain text format. May be too
long for some paging devices
Detailed HTML Message: Provides recipients with a detailed
explanation of the system object alert in HTML format. May not be
appropriate for some paging devices
Short Text Message: Provides recipients with the number of errors
reported in the Content Server system. Can be used with any address
selected above
O oN
pe o
D
Beginning with v16.0, the Admin Server debug or logging settings can be
Te i
set from the General Properties tab for each respective server object:
xt str
In ibu
te te
rn
al
Figure 31-15:
U
se
From the Content Server System (SOV), select the Default Admin
Server’s Functions menu > Properties > General. Logging is managed
from that section of the page, as illustrated in the following figure:
O oN
pe o
D
n tD
Te i
xt str
In ibu
te te
rn
al
U
se
Figure 31-16: Admin Server Object and Log Level Changes from the General Tab
O
nl
O oN
pe o
D
n tD
Te i
xt str
In ibu
te te
rn
al
U
se
O
nl
y
Figure 31-17: Admin Server Object Logging is Available from their Respective Properties Tab
Figure 31-18:
pe o
D
4. Select the Default Admin Server’s Functions menu > Resynchronize and
xt str
OK.
In ibu
Figure 31-19:
al
7. Change the log level for the Default Admin Server by selecting the Default
nl
Admin Server’s Functions menu > Properties > General and change the log
y
Figure 31-20:
10. Return the log level of the Default Admin Server back to its value of 1
(Default). Remember to click Update.
n tD
Te i
xt str
In ibu
te te
rn
al
U
Administrators can view the current System Object status and test the
data flows, data flow processes, and indexes in the System Object
Volume.
Figure 31-22:
O oN
pe o
n tD
Te i
xt str
In ibu
te te
rn
The page is updated with a ‘purge’ entry followed by the latest system
object test, as illustrated in the following figure:.
U
se
O
Figure 31-23:
nl
When you first install Content Server only the Enterprise Data Source is
created. You must then add the Help Data Source Folder and the Admin
Help Data Source from the Add Item menu in this folder.
Admin Server An Admin Server manages a set of data flow processes and search
O oN
Data Source Folders A Data Source Folder contains the set of items Content Server uses to
xt str
build and maintain an index. The subsequent figure illustrates the three
most common indexes: The Enterprise index, the Admin Help Data
In ibu
Personal Search Templates Each user can define a number of templates for easier searching, and they
are stored here.
rn
Slice Folder A slice is a kind of filter or search domain to which you can add more
al
specific criteria when running a search. For example, the Enterprise slice
searches only the most recent versions of documents. The queries that
U
the Search bar and in the Scope area of the Advanced Search page. For
example, the OpenText Knowledge Center offers several custom slices
on which to search.
O
nl
y
The following SOV chapters (Part I & II) go into greater detail
regarding the SOV.
If you have other types of data that you would like to make available to
users, for example, an external directory of legacy documents, you can
build indexes on these as well – but this is beyond the scope of this course.
O oN
Each index has a set of objects for managing it, stored in a Data Source
Folder in the System Object Volume.
pe o
D
Source Folder.
Te i
Shortcuts to Slice(s) Whenever you create an index, Content Server creates at least one slice
so that users can access that index. The slice is placed in the Slice folder,
xt str
Data Flow Manager A data flow is a set of processes that together will read something that is
rn
to be indexed, filter it to find its text, and add its content to the index. This
is where the real work of indexing is done.
al
Search Manager The Search Manager for an index dispatches all search requests that
U
objects will be returned in a best bets section at the top of the Search
nl
Results page.
y
Process Folder The Process Folder contains the Memcached processes familiar to
administrators in previous Content Server versions in addition to
additional new processes like Internal OTDS (if applicable) and Document
Conversion Server.
The Process Folder can also store a number of other objects, as illustrated
by its Add Item menu.
O oN
pe o
D
n tD
Te i
Internal OTDS The Content Server Directory Services (CSDS) feature has been
In ibu
O oN
pe o
D
n tD
Te i
xt str
In ibu
te te
rn
al
In the “everything else” category, DCS has been used in a variety of ways.
Without getting too detailed, these include:
Run as a service over a proprietary socket protocol to support the Hit
Highlight feature
Create and run a new process on an Admin Server each time a View as
web page request occurs
O oN
determined)
Te i
The net result is inconsistency and DCS processes running in many ways,
on different servers. The current implementation also requires significant
xt str
Beginning with Content Server v16.0, the DCS has been provided with an
embedded lightweight web server, and exposes a REST API for internal
te te
common approach.
al
View as web page, Hit Highlight, listing email attachments, and MIME
U
type detection will all leverage an Admin server file cache and the DCS
se
REST API. Using a REST API provides future scalability, using standard
load-balancing techniques, for large environments in the event that
O
Each Admin Server with file cache enabled may have a DCS available. The
Document Conversion Service tab of a DCS process instance is shown
below. Note the new settings for the DCS web service, such as Number of
Threads and Queue Size, which determine how many requests can be
serviced or pending before the instance reports “busy”.
O oN
pe o
D
n tD
Te i
xt str
In ibu
te te
rn
al
U
se
O
Items
Documents and Text Administrators can now add documents or text documents into the
Documents in SOV Process folder and thereby maintain SOV/search/process documentation
right where they are used.
Process A data flow is a series of linked processes that exchange information. You
can create a custom data flow for a particular data source by adding and
configuring data flow processes. You add data flow processes to a Data
Flow Manager. Data flow processes include:
Directory Walker, which extracts data from a set of files on your file
system and writes the data to a data flow
Document Conversion, which converts documents from their native
formats to HTML or raw text
Enterprise Extractor, which is a data flow process that extracts data
from the Content Server database and writes it to an Enterprise data
flow, where it is indexed. Because only one process is normally
O oN
Spider, which is a data flow process that extracts data from a Spider
D
server which crawls corporate intranets, extranets, web sites, or even
n tD
from public web sites on the World Wide Web, and writes it to the
Data Flow Manager of any non-Enterprise data source, where it is
Te i
indexed
Importer, which reads the data that was output by the Update
xt str
Distributor process, and then uses the data to perform a task. For
example, if you have installed Content Server Classifications, the
In ibu
Conversion processes to combine the iPool messages from multiple
al
processes and write them to a single iPool for the next data flow
process
U
Proxy, which acts as a placeholder for a process in a data flow. You add
se
XML Activator, which reads data (as XML files) from the specified
y
Remote Content Server You can use OpenText Content Server Remote Search to search multiple
Content Server installations. You set up a remote connection between
installations by adding and configuring a Remote Content Server system,
which resides within a Data Source and is accessible to slices. This allows
the Administrator the ability to create new slices to search against
remote Content Server systems, or add the object to existing ones. For
information about slices, see Creating Slices. When the administrator
browses to the parent of this object, this object would have a status or
either idle, searching, or process error, like other search processes. For
information about data sources, see Changing Your Content Server
Database.
D
n tD
Te i
xt str
In ibu
te te
rn
al
U
se
O
nl
y
Content Recover When selected, a notification email is sent to the administrator when the
Notification Extractor fails to process documents for indexing. The default is disabled.
Maximum Items Per Specifies the maximum number of search index update requests the
Extraction Extractor will process when each individual type of iterator runs:
then review whether the search success has improved or declined, and
adjust accordingly. The measurements are:
pe o
D
% Successful The ratio of searches where one of the common actions is selected on at
n tD
Result Position For successful results, the position in the list of results. This is only
measured when “relevance” is the search sorting order. Lower numbers
In ibu
are better as these correspond to search results found at the top of the
listing. If a selected result was in the fourth row of the third page, then its
te te
Number of Steps For a successful search, the number of search refinements needed before
al
selecting the result. Steps include going to the next page or applying a
search facet. In general, fewer steps are preferable to more steps.
U
se
O
nl
y
The Relevance reports are accessible from the Search Administration >
Manage Search Statistics > View Relevance Reports.
O oN
pe o
D
n tD
Te i
xt str
In ibu
te te
When the View Relevance Reports link is selected, the page looks like the
following figure:
O oN
pe o
D
n tD
Te i
xt str
In ibu
te te
rn
To specify that certain result fields may not be removed from the Search
Results pages by the end user, select those fields from the Available (left)
O
side of the page and click the right arrow button to move them to the
nl
The online Admin Help discusses the indexing of these properties in the
[QDF] section. Indexing is controlled by the outputOLEInfo setting
(true/false).
O oN
The basic syntax for indexing these properties is to append OTDoc- to the
OLE name (e.g. ‘Author’ becomes ‘OTDocAuthor’).
pe o
D
To search within a specific property, you can use the following Content
n tD
“OTDocAuthor”:“Thomas Pynchon”
“OTDocKeywords”:“fiction”
xt str
For most Content Server content, categories and attributes have much
more flexibility for metadata collection and search, but there may be
rn
Nickname Settings There are parameters that can be configured for the Nickname section. A
Nickname-based search will query the database, not the full text index.
U
Select Exclude Sub-Folders will present the configuration for this feature:
O oN
pe o
D
n tD
Te i
xt str
In ibu
te te
rn
al
If enabled, the user will see this location modifier as an option in the
se
O oN
pe o
D
n tD
Te i
xt str
In ibu
Figure 31-32: The Advanced Search Page with Exclude Sub Folders
te te
rn
Search Filters let users generate a new search request, based on their
y
The unique values with additional restrictions used by Search Filters may
sometimes show a higher number of Search Results than really exist. This
happens when a particular value is deleted from every object, but the
value string is still in the dictionary.
O oN
pe o
D
n tD
Te i
xt str
In ibu
te te
rn
al
U
se
O
nl
y
performance logs.
te te
clauses.
al
U
There are also two new auditing interests for tracking changes to agent
status, and an optional email notification to inform users that their agents
se
4. Click the Classifications tab, if it is not displayed by default then click the
Prospectors tab.
The tab will display the global ‘switch’ to turn Prospectors On or Off as
well as a list of Search Queries associated with their respective
Prospectors, as illustrated in the figure below:
Figure 31-34:
Figure 31-35:
te te
Figure 31-36:
6. Click the E-mail Search Agent Owners link under the Actions panel.
O oN
pe o
D
n tD
Te i
xt str
In ibu
7. Enter a custom message, for example: “Your Prospector Search Query has
rn
Figure 31-38:
O
nl
Example of an Email
Message for a Disabled
y
Search Agent
Figure 31-39:
Confirmation of Email
Message for a Disabled
Search Agent
O oN
pe o
D
n tD
Te i
Figure 31-40:
O
in Outlook
y
Thumbnail Generation
A common issue for customers is the desire to generate Thumbnails for
objects, without performing a system wide re-index.
Thumbnails may not have been created for legacy data because they were
‘missed’ or because, additional MIME Types were subsequently
configured to be Thumbnailed.
Beginning with Content Server v16.0, there are a pair of new options that
allows Thumbnails to be generated or for an item to be re-queued for
In ibu
indexing.
te te
rn
Collection.
y
O oN
pe o
D
n tD
Te i
4. Click Submit.
y
O oN
pe o
D
n tD
Te i
xt str
O oN
pe o
D
n tD
Te i
xt str
In ibu
Thumbnail Priority
al
items like documents and their text or metadata, and as a result not all
Thumbnails may find themselves ‘ingested’ into Content Server.
se
[DCSipool]
lib=dcsipool
ThumbnailLocation=C:\CS16/temp
Thumbnailpixelx=200
Thumbnailpixely=200
Thumbnailformat=JPG
Thumbnailpagerange=1
Thumbnaillimit=20000
Waitforthumbnails=true
iPool Quarantine
pe o
D
based on what files were in the iPool. This feature allows a quarantined
iPool to be selected and the contents of the iPool, displayed.
Te i
xt str
Navigate to System Object Volume > Enterprise Data Source Folder >
Enterprise Data Flow Manager.
O oN
pe o
D
n tD
Te i
xt str
In ibu
te te
n tD
Te i
xt str
In ibu
te te
rn
al
U
se
O
nl
y
Queued The number of tasks that were awaiting execution by Distributed Agent
Workers.
The task counts for the current hour are updated frequently. Over the
course of an hour, the same task may be counted as both Queued and
Processed.
View a graph that shows the number of queued tasks and processed
tasks for each hour of the past 12 hours
xt str
Pausing All Workers You can temporarily pause the entire Distributed Agent system if you
need to immediately shut it down cleanly. If, for example, your Content
Server database is overloaded, you could pause all of the Distributed
Agent Workers while you troubleshoot your database issue.
Pausing Individual Individual Worker processes can be paused and then restarted by using
Workers their respective Pause / Start button.
Individual Worker actions are toggled from the available Pause and
Resume buttons.
Defining a Distributed To define a Distributed Agent System outage, click Add new outage and
pe o
Agent System Outage the Outage Details dialog will display, as illustrated in the following
D
figure:
n tD
Te i
xt str
In ibu
te te
rn
Figure 31-49:
al
Why You Would Schedule a You can schedule a Distributed Agent system outage so that the system is
Worker Outage not operating during important system events.
If, for example, you take a weekly database backup that runs for three
hours on a Sunday, you can configure a recurring Distribution Agent
system outage to occur during the database backup period.
n tD
Te i
xt str
In ibu
te te
Summary
U
se
Exercises
There will be several times during this course when you will want to refer to the online help, so in
this exercise, you will make indexes for it.
1. Go to the System Object Volume of your Content Server instance by clicking the Open the
System Object Volume link in the Search Administration area of the administration pages.
2. From the Add Item menu, choose Admin Help Data Source. In the page that Content Server
O oN
opens, examine the fields on the page, asking your instructor if you want to know more
pe o
about them. Leave all of the defaults, and click the Create Processes button.
D
3. After a pause, Content Server will display a page with information about the progress of the
n tD
index creation. It should end with the message “Your processes were created successfully.”
Te i
If it does not end with this message, ask your instructor for help. Click the Continue button.
4. After your system finishes creating the index, you should be able to search the
xt str
administration online help from the search field of the administration help pages.
In ibu
5. Return to the System Object Volume and create an index for the User Help. When you are
finished, any user should be able to search the help files from the search field of the user
te te
Perform the following exercises to use some of the Administration page options.
O
Change the Prompt Text to Content Server full text search. Add an additional component to
y
the search bar. Navigate to the Global Appearance you created in the last set of exercises
and select the search bar you just created. Browse the system to test that it appears in all
folders.
2. On the Edit the System Default Search Form, change the default so that it displays Slice and
the System Attributes section, including the Creation Date attribute under the Created By
attribute.
3. Test your work: Create a new group and a new user account in that group (your instructor
can provide guidance creating users and groups, but it will be covered in a subsequent
chapter). Then log in as that user to test that:
a. Item numbers are hidden,
b. Searching from the search bar functions as you intended in step 3.
c. When you navigate to the Advanced Search Page you should see the default system
template.
Choose Users & Groups from the Enterprise menu and then select Group from the Add Item
menu and type in a name (e.g. Documentation). Add the group.
Again, choose Users & Groups from the Enterprise menu and then select User from the Add
O oN
Item menu. Give the user a name (e.g. Fred) and make their Department the group you just
created.
pe o
D
Generate Thumbnails
xt str
2. Using either Search or manually ‘adding’ items to your new Collection, ensure that you have
included a few items from common MIME Types such as Word documents or Excel
rn
spreadsheet.
al
4. From More Actions … select Queue Thumbnail Generation and click Submit.
se
6. Test the success of Thumbnail of Generation by either performing a search for the item and
using a Standard Search Display Style, changing the item so that it is displayed as a Featured
nl
1. Navigate to the Enterprise Workspace > Handy Images > EXIF and XMP Photo Metadata
folder.
2. Using drag-and-drop, add the C:\SamplesDocs\EXIF\xmp bike4.jpg file into the folder.
3. Run the Saved Search Query with Display Showing XMP Metadata query and confirm that
it displays “Cannon” metadata on the search results page, as illustrated in the following
figure:
O oN
pe o
D
n tD
Te i
xt str
In ibu
te te
rn
al
And here is the bike photo shot with a Cannon camera, based on its XMP
metadata:
U
se
O
nl
y
O oN
pe o
D
n tD
Te i
xt str
In ibu
te te
rn
al
U
se
O
nl
y
Objectives
Overview
pe o
D
Admin Server, the Data Source folders for Help and the Enterprise, and
on individual processes.
rn
al
Figure 32-1:
U
What Status Can a Data The status of a Data Flow Manager summarizes the current status of the
Flow Manager Have? data flow’s processes. The manager’s status will be one of the following:
Figure 32-2:
In ibu
Folder
al
U
se
What Status Can a Data A process in a data flow can have the following status:
Flow Process Have?
O
The following figure illustrates the Enterprise Data Flow Manager and its
status.
Figure 32-3:
and Status
pe o
D
n tD
Te i
xt str
The following figure illustrates the Help Data Flow Manager, individual
processes (i.e., DW, DC, UD), and their respective status (e.g. Idle,
In ibu
Running).
te te
rn
al
U
se
Figure 32-4:
Flow Manager
nl
y
The Extractor process identifies the latest objects and then crawls
backwards to older objects in the database. This is particularly helpful
when re-indexing your Content Server data because the newest data is
indexed first, as it is usually more meaningful for your users.
O oN
although setting it to run less frequently will mean your users cannot
search on items recently added to Content Server.
n tD
The Stop Options for this process should also be left with the default
Te i
settings. The maximum good exit code for this process is -1, meaning that
the Admin server will not restart this process if it fails. Do not modify this
xt str
O oN
pe o
D
n tD
Te i
xt str
In ibu
te te
rn
al
U
se
O
nl
y
Figure 32-6:
O oN
Figure 32-7:
al
Figure 32-8:
O oN
n tD
Te i
xt str
In ibu
te te
rn
Enterprise Extractor The following settings are available for the Enterprise Extractor.
Settings
al
Log Level Logging refers to the level of detail captured during data extraction and
U
written to the Content Server thread logs: Normal (minimal data detail),
se
Maximum Items per As mentioned in the previous chapter, the Extractor process is triggered
O
Extraction by events added to the DTreeNotify table. The default settings should be
nl
When paused, extraction for the selected iterator does not occur.
Artifacts will begin to queue for the iterator to process, and that queue
will continue to grow until the iterator is allowed to continue processing.
Maximum Versions to By default Content Server will index all your document versions. This can
Extract occupy a great deal of space. If your users never use the Enterprise All
Versions slice, then you can save space and CPU resources by limiting the
versions extracted. For example, a value of 5 means only the latest five
versions would be indexed.
Include Access Control When enabled, permission information is added to the dataflow and
D
Lists search index. Naturally, this will increase the amount of data retained and
consequently reduce indexing performance.
n tD
Te i
EFS Object Content / Non- Enterprise File System (EFS) objects are typically stored two ways for the
EFS Object Content Document Conversion process (DCS):
xt str
Allow DCS to read object content: files are not deleted, but instead
te te
the DCS reads the content directly from the EFS object. This is a less
secure option, but is more efficient. The best practice is to ensure that
rn
O oN
Figure 32-9:
pe o
D
iPool Limits Limits are set in MB for the total size of documents in an iPool and for
total size of a single item in the iPool. If an object that exceeds the limit for
either maximum pool size or single item size is written to the iPool, the
iPool closes and moves on to the next message.
The Number of Items refers to the number of extracted items that the
extractor will process in a single iPool message.
exceeded.
n tD
Te i
Exclusion Settings Certain item types, volumes, and locations can be excluded from the
extraction. These are maintained in lists of pre-defined items, volumes,
and locations, respectively.
xt str
Extractor is not. Each item is presented with its unique subtype value in
brackets. These items and their subtype values are pre-defined by
al
Select the items you want to exclude from the Extractor process and click
Update.
O oN
pe o
D
n tD
Te i
xt str
In ibu
te te
rn
al
U
se
O
nl
y
Figure 32-10: List of the Items Which May Be Excluded in Exclusion Settings
You will notice that there are certain item types which are excluded by
default. For instance, Forms and Form Templates are not items which are
typically indexed for searching.
n tD
Te i
xt str
In ibu
te te
rn
al
Figure 32-11: A List of the Volumes Which May Be Excluded in Exclusion Settings
U
se
Like items, there are certain volumes, such as the System Object Volume
itself, which are not typically indexed.
O
nl
y
You can choose a general location which will be excluded from the
Extractor process as well. Use the Browse Content Server button to
select a location to add to the list of excluded locations. The Extractor
process will skip any item within that location when indexing.
O oN
pe o
D
n tD
Statistics Gathering When enabled, the extractor gathers statistics for a specified number of
Settings days (the default is 7).
xt str
In ibu
applied to an object.
Due to dependencies on the generation of the OTLocation
al
Index Tracer
A new system exists that tracks the performance of search indexing.
When selected, special marker objects (i.e., Index Tracer) are injected into
In ibu
the data flow stream at regular intervals, then their progress is tracked
te te
through the indexing system to determine how fresh or stale the search
index is.
rn
DTreeNotify.
n tD
Te i
xt str
In ibu
te te
rn
al
U
se
O
nl
y
Figure 32-13: The Document Conversion Process for the Enterprise Data Flow
on the page
Te i
data.
In ibu
te te
The temporary directory becomes an editable field once you stop the
process. You can specify a particular directory here for the Document
O
Conversion Process to store its temporary files (e.g., a RAM drive). This
tends to be a legacy setting since most processes now run in memory.
nl
The default maximum good exit code for this process is 20, meaning that
y
any error over this number will not be restarted automatically. Do not
modify this number unless instructed to do so by OpenText Customer
Support.
The DCS uses three typical document filters for Content Server
documents:
OTDFs for MS Word, Excel, PowerPoint and Outlook.
Designed by OpenText to improve performance. These
are the default filters.
XPDF for PDF files (OTHome\filters\xpdf).
The DCS is controlled by the admin servers. View as Web Page, from the
Functions menu, and Hit Highlighting are processes that are both clients
of the DCS. The document filters are built-in and included with Content
Server.
O oN
The OpenText Document Filters (OTDFs) detect and convert items of the
following formats:
Te i
Adobe PDF
rn
HTML
al
XML
ZIP
U
A list of all the supported file formats is in the Release Notes (refer to the
Document Filters Format Support section).
O
nl
OTHome\filters\image folder.
In addition to extracting the text for the index, the document filters are
also responsible for the “View as Web Page” option, which is available for
MIME types.
Further information is available from the online help, including a list of the
supported file and MIMETypes.
Write Checkpoint Writes a checkpoint file if the metalogs are at more than 10% capacity.
This button is not available when the page reloads after you click it, or if a
n tD
Figure 32-15:
y
n tD
Te i
xt str
Figure 32-16:
In ibu
O oN
pe o
D
Figure 32-17:
n tD
Settings Page
xt str
In ibu
te te
rn
al
U
se
index engines so that all indexed data in each partition is kept up-to-date.
nl
modified items.
Figure 32-18:
The default start option for the Update Distributor process is set to run
persistently because the process footprint is small and the Index Engine
processes have startup costs and many background tasks to complete
(e.g., cleanup, merge, etc.). Therefore, it is more efficient to make it a
persistent process.
In the Help files and various documents you may find references
to OT10 and OT7. These refer to the search architecture for the
various product versions. Similarly, Search Engine is often
abbreviated to SE; for example SE10.5 refers to Search Engine
10.5.
O oN
pe o
D
minimum components:
Update Distributor
In ibu
Index Engine
te te
Search Engine
al
Search Federator
U
se
Summary
O
Exercises
This exercise provides an opportunity to work with the System Object Volume (SOV), monitoring
the ‘ingestion’ of newly added documents and configure some Extractor Exclusion settings.
1. Start the CS16b and CS16bAdmin services, if they are not presently running as we will be
using that instance for this exercise.
2. Navigate to the Administration pages by choosing Start > Programs > OpenText Content
O oN
Server 16 (CS16b) > Content Server Administration. If prompted for the Administration
pe o
4. Navigate to the Search Administration section and click the Open the System Object
Volume link. If prompted to login, enter admin and a password of livelink.
xt str
5. Confirm the Admin Server is Active and there are no errors, as illustrated in the following
figure. Bring any errors to the attention of your instructor.
In ibu
6. Navigate to the Enterprise Workspace. Create a new folder called Do Not Extract Here.
te te
7. Return to the Search Administration page and click the Configure the Enterprise Extractor
rn
8. Click the edit / review list link opposite the Locations field in the Exclusion Setttings
section.
U
se
9. Click the Browse Content Server button and select the previously created Do Not Extract
Here folder. Click the Update button.
O
11. Navigate to the SOV, Enterprise Data Source Folder, Enterprise Data Flow Manager and set
y
12. Open an additional browser window and log in to CS16b, so that you can continue to
observe the Enterprise Data Flow Manager in the first browser window.
13. Add the same Word Document (e.g., C:\SampleDocs\Marketing Proposition.doc) to both
the Enterprise Workspace and to the Do Not Extract Here folder.
14. Make the document in the Do Not Extract Here folder a Featured Item (Hint: Properties >
General tab).
15. Wait for all of the pending items on the Enterprise Data Flow Manager to be extracted.
16. Confirm the Featured Item appears as a Thumbnail, as illustrated in the following figure. As
you may recall, Thumbnails are created as part of the Extractor process, so we know that
this document has been ‘processed’.
O oN
pe o
D
n tD
Te i
17. Use an Advanced Search (i.e., “*” wildcard, Enterprise Scope or Slice, from the Enterprise) to
search the system for your recently added – and extraction excluded – documents. Hint: If
xt str
you experience any issues with search grid components, refer to the Challenge Exercise).
In ibu
18. Confirm that the search results include the document added to the Enterprise Workspace,
but it does not include the created folder or its Featured document.
te te
rn
al
U
se
O
nl
y
This exercise allows you to practice what you have learned earlier in this chapter and to start
individual search processes.
1. In the unlikely event that you generate an error message when you perform an Advanced
Search in the previous exercise, similar to the one illustrated in the figure below:
O oN
pe o
D
n tD
Te i
xt str
2. Navigate to the SOV and click the Default link to review the various processes. In this
specific example, the Search Engine has not started, it is Idle. Click the process link.
In ibu
te te
rn
al
U
se
O
nl
y
3. Use the Functions menu > Start to change the search process Status from Idle to Running.
O oN
pe o
D
n tD
Te i
xt str
In ibu
te te
rn
al
U
se
O
nl
y
Objectives
Overview
pe o
D
Partitions
xt str
Figure 33-1:
U
se
Color code partitions in update only mode (including soft update only) in
yellow, and full partitions in red. Retired or read-only in grey.
O oN
Also identify which Admin Server the engines are attached to.
Te i
Links on the partition name, index engine status, search engine status and
xt str
search facets.
al
U
se
O
nl
y
O oN
pe o
D
Figure 33-2:
n tD
The Specific tab, illustrated in the next figure, provides Partition Space
and Mode information for the administrator.
O
nl
Figure 33-3:
y
Partition Space The space being used is listed as a percentage full value and represents
the amount of disk or memory space (whichever is higher) currently
occupied by the content and metadata of indexed documents. The
settings page is illustrated in the previous figure.
Mode The mode indicates whether the partition’s index is still accepting new
items for indexing (Read/Write), accepting updates to existing indexed
items only (Update Only), or not accepting any further updates (Read
Only).
Although you can specify the file cleanup interval, which allows unused
files in a partition's indexes to be deleted automatically, these settings are
not typically changed, unless you are directed to do so by OpenText.
Partition Map > Enterprise Search Federator 1 > Properties > Advanced
pe o
n tD
Te i
xt str
In ibu
te te
Figure 33-4:
rn
Enterprise Search
al
Federator Advanced
Settings Page
U
se
O
nl
y
n tD
Figure 33-5:
Te i
A more distributed index means the individual merges are smaller, faster,
se
and the partitions are spread across multiple machines and/or drives.
You can also reduce your total cost of ownership by spreading the index
O
n tD
Te i
xt str
In ibu
te te
rn
Figure 33-6:
al
Planning You must know some information about your existing Content Server
Admin processes, and must select unique port numbers for Admin server
ports.
Partitions You must specify the size of each partition. This will depend on two
factors:
1. How many partitions do you plan to add now and in the future?
2. Will the partitions be on one machine or on separate hosts?
Index Engine and Search You must decide where the files of the partition will reside. The directory
Engines (or directories) must already exist in the system.
The maintenance task options that appear for a data source will vary
n tD
depending on which data source you are examining (e.g., a user Help Data
Source has different options than an Enterprise Data Source).
Te i
xt str
In ibu
te te
Figure 33-7:
rn
The Maintenance options for the Enterprise Data Source are illustrated in
the following figure.
O oN
Figure 33-8:
pe o
D
Re-extract the data from The Extractor will start at the top of the database, and crawl down the
se
the source DTreeCore table without purging the existing index. When it has
completed reextracting (re-indexing), a message appears on your screen,
either listing the errors or reporting that there were no errors.
O
being indexed. Perhaps you excluded workflows previously but now want
y
to search on them, or you’re migrating from CS10 to CS16 and you want
to include thumbnail generation of featured items).
Purge the data flow, Deletes the contents of the index before re-extracting the data from its
reconstruct the index… source.
Gather the log files for this You can gather the search log files and archive them to a temporary log
data source directory. To avoid gathering large files, you can specify the number of
lines you want to keep.
Additionally, you can gather and archive the search.ini file, Admin Server,
and DCS configuration files.
Set log levels for this data This page provides a convenient interface to set unified log levels for a
source number of search components.
All
n tD
Search
Indexing
Te i
components:
Update Distributors
In ibu
Index Engines
te te
Search Federators
rn
Search Engines
al
The DCS Server check box enables or includes the log level for this
component.
U
se
Managing Indexing and re-indexing are resource intensive because most activities
Performance involve writing to disk and using RAM resources. The vast majority of
Content Server installations will begin with at least two servers: one for
O
Content Server actions and the other “Admin server” for all the indexing
nl
processes.
y
Just as there are many contributing factors, so, too, are there many
possible solutions, each of which depends upon the configuration of your
Content Server system. There are, however, some general lessons to
adhere to when managing the performance of the Update Distributor.
Re-index vs. Purge and When it is practical to do so, purging and indexing, in general, tends to be
Index faster than re-indexing alone.
Depending upon the level of index validation which has been requested,
the checkpoint file is used increasingly for validation and verification of
the index. This will obviously slow down the indexing process. The topic of
Index Verification is dealt with in the 3-0128 – Content Server
Troubleshooting Workshop course.
High Ingestion Another factor to consider for indexing large amounts of data is tuning
Environments the search grid.
O oN
pe o
The first tuning recommendation is the use of Low Memory mode (later in
D
this chapter) for storing text metadata. Low Memory mode minimizes the
n tD
In the [Dataflow] section of the search.ini file, there are settings which
indicate when to create checkpoint files based upon certain conditions,
In ibu
such as when the metalog grows too large, or when a large number of
objects are added or modified. These settings are:
te te
high as 50,000)
U
If you’re using Low Memory mode, these settings can be raised in order to
O
partitions will need to create checkpoint files, which places a higher load
y
Update Batch Sizes The Update Distributor breaks input iPools into smaller batches for
delivery to index engines. The default is a batch size of 100. For Low
Memory mode, this can be higher, even as high as 500. Since the batch
size is distributed across all index engines that are currently accepting
new objects, the batch size can be increased more if you have many
partitions.
Figure 33-9:
A time stamp indicates the last time the Data Flow was tested
n tD
and Flushed.
Te i
xt str
Suspend Stops all processes in the data flow. If you suspend the data flow, you
al
Flush Stops the data flow processes and deletes all pending iPool messages
from the data flow. You should flush a data flow if one of the processes in
se
the data flow appears to have trouble handling the amount of data being
written to its source data interchange pool (iPool).
O
Test Stops any running processes in the data flow, deletes the contents of all
nl
iPool directories, and then attempts to send a test message through the
y
Perform a test if you suspect that data is not flowing properly through a
data flow.
You should never test, flush, or suspend a data flow without OpenText
Support guiding you through the process, otherwise, you are likely to
lose all of the index data.
The only operation safe to perform on your own is Resynchronize.
Resynchronize Content Server reads the information that it has stored in the database
about the location of the iPool directories and then recreates or repairs
them as necessary. You should resynchronize the data source if one or
more of the iPool directories in a data flow has been inadvertently
deleted.
After you resynchronize a data flow, test the flow of data by sending a test
message through the iPools.
For data to flow successfully through a data flow, the paths must
be valid and accurate. These paths were specified for the read
O oN
pages of each process in the data flow are valid and accurate, and
then repeat the test.
Te i
xt str
There are many different ways in which data can be stored in an index.
te te
The default mode for previous versions was Value Storage mode. In this
rn
The Metadata Memory Settings for the Partition Map will display a table
U
of the storage modes, how much memory is being stored for all the
regions in the mode, and the default location of storage.
se
Read / Write: this is the default mode. All objects are read from and
nl
retrieved from the index
Read Only: objects can be retrieved, but cannot be added or changed
Retired: the index accepts updates and deletions, but does not accept
new objects
By default, the regions are stored on disk, but you can use the button to
edit how, and what regions, are stored.
Since that time, the OpenText Search Engine has been enhanced with
more efficient modes of operation that allow more objects to be stored in
a partition (i.e., Low Memory Mode), and more efficiently indexed by
optimizing the storing if index information. These new methods have
O oN
n tD
Te i
xt str
In ibu
te te
rn
al
U
se
O
nl
y
Beginning with v16.0, the default of using Low Memory Mode has been
hard coded into the product, eliminating the option of using RAM storage.
O oN
pe o
D
n tD
Te i
Figure 33-11: Storage Method in Content Server v16.0 Uses Low Memory Mode
xt str
Low Memory Disk Mode The Low Memory variant allows many more objects to be stored in a
In ibu
represent the full text index to similarly store text metadata indexes. The
text metadata values are stored in checkpoint files, and the text metadata
rn
Disk Retrieval This mode of storage is optimized for text metadata regions which need
to be retrieved and displayed, but do not need to be searchable. In this
U
mode, the text values are stored on disk within the checkpoint file, and
se
regions for moving to Memory or Disk mode. The regions are grouped, as
well, by whether or not they’re Displayable, Sortable, or based on
y
In general, you can convert between any of the storage modes without
adverse effects. When the Index Engines are started, changes to the
storage modes are applied to the existing index. This requires index
conversion, creation of new checkpoint files, which adds time to the start
up, depending on the size of the index, fields to convert, CPU, etc. The
process is flexible enough so that you can convert regions from one mode
to another if you discover that the region needs to be more (or less)
searchable. There are, however, certain circumstances which will
naturally affect this, such as the amount of available RAM remaining for
your partition.
If the existing search index uses the deprecated methods, then an index
conversion will occur after synchronization and restart. If desired, you
can avoid this conversion by making the equivalent changes to search
configuration in older versions before upgrading.
n tD
And that refinement extends to the Metadata Memory settings and the
removal of the previous Memory Region options as they were no longer
required in Content Server v16.0.
O oN
pe o
D
n tD
Te i
xt str
In ibu
te te
rn
al
but we assume you will only look at these files in consultation with
y
The Extractor process stores transition files that have not yet been placed
into an iPool in the *.trn folder.
The index is stored in the enterprise/index directory. You can note the
number of separate index files by noting how many numbered folders are
located within the index folder. From time to time the index process
merges these into larger indexes.
n tD
Summary
Te i
O oN
pe o
D
n tD
Te i
xt str
In ibu
te te
rn
al
U
se
O
nl
y
Objectives
pe o
D
Overview
n tD
Te i
Your Content Server Admin servers are listed at the top of the System
al
Object Volume page. They are scheduling and watchdog servers for the
various indexing processes.
U
se
When you add data flows and configure their processes, specify
schedules for how often they should run. It is the Admin server that
records these settings and ensures the work takes place.
O
nl
y
Content Server can have multiple Admin servers, and each one can
manage different index components (for example, one could administer
the Enterprise data flow, and another a Directory Walker data flow). By
placing Content Server Admin servers on other hosts you can distribute
indexing processes across machines.
Figure 34-1:
n tD
The Admin server and the Administration pages are not related,
despite their similar names.
Te i
Content Server Admin The possible status values for the Admin server are: Active, Unavailable,
rn
Server Status Unknown and Safe Mode. Each status is described below.
al
Unknown Content Server was able to communicate with the Admin server, but the
Admin server was unable to report the status of the process. This can
U
Unavailable The Admin server is not available and, therefore, cannot report the status
O
Safe Mode The Admin server is running, but it is currently in a suspended state. Safe
y
Active The Admin server is running and is communicating with Content Server.
O oN
pe o
D
n tD
Te i
xt str
In ibu
te te
rn
al
U
se
O
nl
Advanced settings for DCS are available from SOV > Process Folder >
Document Conversion Server for Default > Specific.
Figure 34-3:
Document Conversion
O
Service Settings
nl
y
When you are performing system maintenance, such as adding more disk
space, replacing a disk, defragmenting, or similar tasks, you will need to
n tD
suspend the Admin server. By suspending the Admin Server, all the
Te i
indexing processes are shut down, the Admin Server goes into Safe Mode,
and it releases its lock on index files.
xt str
In ibu
te te
rn
al
U
se
O
nl
y
O oN
pe o
D
n tD
Te i
xt str
In ibu
te te
rn
al
U
se
O
nl
y
While the Admin Server is suspended, users cannot perform searches nor
will indexing take place. General browsing and other operations
throughout the system may also slow down.
If you do not know why the Admin server went into Safe Mode, open the
General page for the Admin server. The reason will be listed on the status
line.
When maintenance tasks are completed, reset the server to bring it out of
Safe Mode.
Automatically Occasionally, an Admin server may enter Safe Mode automatically. The
D
file. You should exclude the index directories from these processes
xt str
port number or host name
In ibu
During an upgrade
te te
When repairing the problem(s), the Content Server Admin server creates
or deletes objects as necessary to reflect the updated information. Users
U
can continue to search during a resynch but if the index is rebuilt then
se
Content Server Admin server after you change its host name or port
number, or if you connect to a different database.
y
O oN
pe o
D
n tD
Te i
xt str
In ibu
te te
rn
Figure 34-5:
al
Sample Resynchronization
Message Example 1
U
se
O
nl
y
Figure 34-6:
O oN
pe o
Sample Resynchronization
D
Message Example 2
n tD
Te i
xt str
In ibu
server?
The hardware used for Content Server
The number of processes controlled by the Admin server
rn
n tD
Te i
Figure 34-7:
need to:
Perform a regular Content Server installation. During the installation,
y
you will assign the Admin service a port number
After the installation, you need to register the remote Admin server
with the Content Server on the primary host
Distributing Indexing Although the Extractor process can run on any server, it is simplest to
Example configure it on the first Content Server installed. The easiest way to
distribute indexing is to:
1. Install Content ServerA on ServerA and create the Enterprise index
as you normally would, then
2. Install Content ServerB on ServerB and connect to the same database
as Content ServerA. At the end of the install Content ServerB will
recognize that an Admin server is already present. You can accept
that as the Default. Finally,
3. Content ServerA will be your Admin server and perform all the
indexing tasks. You will direct all your user’s requests through
O oN
Content ServerB.
pe o
D
page > Search Administration section > Open the System Object
te te
Volume link > Admin Servers section > [named] Admin Server > Data
Source Folder's Functions icon, and choose Path Management.
rn
The page allows you to display and edit the file paths used by the search
al
system. The information on the page has been extended to display the
search processes that rely on each path. This change makes it easier to
U
understand which file paths need editing especially when upgrading from
se
O oN
pe o
D
n tD
Te i
xt str
In ibu
te te
rn
al
U
se
O
nl
y
The Search Engines give the search results to the Search Federator
pe o
D
which merges together all the search results and then gives the final
search results to the Search Manager
n tD
The Search Manager accepts the search results and gives them to
Te i
Figure 34-9:
When the Query results are sent to the Search Manager, they
are also checked for permissions by querying the Database.
Users will never see results on which they don't have at least See
Contents permission.
If several users perform searches at the same time, the Search Manager
spreads the requests across several Search Engines and reduces queuing.
n tD
Summary
rn
al
maintenance
Resynchronizes the Admin server
O
Described the role of Search Managers and Search Engines and how
to they are configured
1. When would you put the Admin server into Safe Mode? When might it go into Safe Mode on
its own?
___________________________________________________________________________________________________
___________________________________________________________________________________________________
___________________________________________________________________________________________________
___________________________________________________________________________________________________
pe o
D
___________________________________________________________________________________________________
n tD
___________________________________________________________________________________________________
Te i
___________________________________________________________________________________________________
In ibu
___________________________________________________________________________________________________
te te
___________________________________________________________________________________________________
rn
al
U
se
O
nl
y
Exercises
This exercise provides an opportunity to work with the Admin Server, its Safe Mode and
Resynchronization.
1. Start the CS16b services, if they are not presently running as we will be using that instance
for this exercise.
2. Navigate to the Administration pages by choosing Start > Programs > OpenText Content
O oN
Server 16.0 (CS16b) > Content Server Administration. If prompted for the Administration
pe o
4. Navigate to the Search Administration section and click the Open the System Object
Volume link. If prompted to login, enter admin and a password of livelink.
xt str
5. Confirm the Admin Server is Active and there are no errors. Bring any errors to the
attention of your instructor.
In ibu
6. From the Default Admin Server’s Functions menu, select Suspend Server. The Status should
te te
7. From the Default Admin Server’s Functions menu, select Reset Server. The Status should
al
display Active.
8. From the Default Admin Server’s Functions menu, select Resynchronize. When prompted,
U
9. When the page states that resynchronization is complete, review the sync activity and
record any situations were a search process has to be created/recreated or repaired and
details concerning the details of the repair. Compare your list with the following example,
illustrated below:
O oN
pe o
D
n tD
Te i
xt str
In ibu
te te
rn
al
U
se
O
nl
10. Click the Continue link to return to the System Object Volume.
y
1. Browse to the System Object Volume. From your Default Admin server’s Functions menu,
select the Suspend Server function. What is the Admin server’s Status? Navigate to the
Admin server’s Properties > General page and view the information. Perform a search; what
message is displayed?
O oN
pe o
D
n tD
Te i
xt str
2. Add a document, then check the iPools (in the Enterprise Data Flow Manager folder). Is the
In ibu
document being indexed? What are the statuses of the processes in the Enterprise Data
te te
Flow Manager? What are the statuses of the iPools? Navigate back to the Content Server
System page and choose Reset Server from the Admin server’s Functions menu.
rn
al
U
se
O
nl
y
3. Return to the Enterprise Data Flow Manager and ensure that the new document is being
indexed. Compare the statuses of the processes and iPools now that you restarted the
Admin server.
O oN
pe o
D
n tD
Te i
xt str
In ibu
te te
rn
al
U
se
O
nl
y
Objectives
Overview
pe o
D
n tD
As the Content Server search administrator, there are several things you
can do to enhance searching for end users. This chapter and the following
Te i
Search is a very powerful tool that can save your end users hours of
browsing for information.
rn
There are many ways of using search, and Content Server provides a
al
number of configuration options that allow you to ensure your end users
have powerful and complex searches.
U
se
If you wish to have any search bar (other than the Standard search bar)
O oN
appear in a folder, you must add an Appearance to the folder, enable it,
and choose the alternate search bar on the Content Server Components
pe o
D
figure, each search bar can be configured individually by clicking the Edit
y
button.
Select the default mode according to your communities’ needs. You have
a choice of Icon or Text for the search button. A help link can be shown or
hidden.
O oN
pe o
D
n tD
Te i
xt str
In ibu
te te
rn
Full Text Settings The system administrator has full control over what the Appearance
Te i
The Include check box turns the full text search on or off, as illustrated in
the following figure.
In ibu
The Search Bar and Search Panel are the interfaces end users employ
te te
the Edit icon for the Standard search bar displays the system default
al
Slices A more general method of helping your users search is to create a custom
slice. Content Server automatically creates three default slices:
Enterprise, Enterprise [all versions] and From Here. Slices are a special
kind of query, or search filter, through which your users can perform
more granular searches.
Adding slices to the drop-down list makes granular searching easier for
end users.
Figure 35-2:
O oN
Menu
Te i
xt str
In ibu
Slices are cached and, by default, the cache expires every 5 minutes.
te te
To create a slice:
Navigate to the Advanced Search page and create a query. For
O
From an end user perspective, Slices are similar to Search Forms, because
both help to refine the search, but slices are more generic and simpler to
use.
O oN
pe o
D
n tD
Te i
xt str
In ibu
te te
rn
al
U
Figure 35-3: Create a Slice by Saving a Query in the SOV’s Slice Folder
se
Complex Slices You can combine slices to create a slice composed of other slices.
O
For example, you may have created separate slices for your IT
nl
You can create a complex slice (i.e., “multiple slices slice”) by entering an
asterisk in the Search field and clicking the Save as Slice button.
Figure 35-4:
Configuring Slice You can control the order in which slices are displayed for searching.
O oN
Order System Object Volume (SOV) > Slice Folder > Configure Slices (from the
pe o
Functions menu) will take you to the Slice Folder configuration page.
D
n tD
There are three selections you can make to control the slice order:
1. Alphabetical, with Enterprise first
Te i
2. Alphabetical
xt str
3. Custom
In ibu
te te
rn
al
U
se
O
nl
y
O oN
pe o
D
n tD
Te i
xt str
In ibu
te te
rn
al
U
se
O
nl
You can set permissions on slices from the Slice Folder to restrict
who sees what slice.
n tD
Te i
xt str
In ibu
te te
rn
al
U
se
O
Figure 35-6: Advanced Search Which Includes the Customer Feedback Category
nl
y
Click the Save Search Query button to save this search as a query. In the
following figure, the query has been saved as a query called “Quick
Customer Feedback” in the Customer Service folder. Using the saved
query’s Functions menu, select Make Custom View Search.
O oN
pe o
D
n tD
Te i
xt str
In ibu
te te
rn
al
U
se
Figure 35-7: Make Custom View Search From Saved Quick Customer Feedback Query
O
nl
y
Parameters which were used in the saved Search Query are copied into
the new Custom View Search. Some of the parameters, such as the Text,
Content Type, etc., can be either preserved as default values or
overridden. These values have the Show property enabled. In the figure
below, the full text and the attributes of the Category are shown.
O oN
pe o
D
n tD
Te i
Figure 35-8:
xt str
Select Parameters to
Preserve or Override in the
In ibu
O oN
pe o
D
n tD
Te i
xt str
In ibu
te te
rn
al
U
se
O
nl
y
Summary
In this chapter, we:
Described how an administrator can enhance the search capability
for Content Server users.
Customized the default search page.
Displayed additional custom and system attributes on the search
page.
Customized the list of slices available on the search bar and Advanced
Search page.
O oN
pe o
D
n tD
Te i
xt str
In ibu
te te
rn
al
U
se
O
nl
y
Exercises
In this exercise, you have the opportunity to Create an Advanced Search that uses Category and
Attribute values and save it as a search form.
1. Navigate to the Advanced Search page. Select the Customer Feedback Category and Build
a query using the following attributes:
O oN
pe o
D
n tD
Te i
2. Save this as both a Saved Search Query in the Enterprise Workspace and as a Personal or
System Search Form.
xt str
In ibu
Create a Slice
te te
In this exercise, you will create a query that searches only discussions, and save this to the Slice
rn
folder.
al
From the Advanced Search page, search for the word “Product” and view the overwhelming number
of results. Now select “Content Type: Discussions” from the drop-down and perform the same
U
search. Fewer results are gathered. Save as Slice to make this kind of search filtering much easier.
se
Alternatively, you can save this as a Search Query to the Slice folder. First, save the search as a
Search Query. Give the new query a name, then click the Browse Content Server button and
O
navigate to the Content Server System and then into the Slice Folder (Content Server > Content
Server System > Slice Folder) thus:
nl
y
In order to test the “Discussions Only” Slice, you must have the same content both
in a discussion, and in a document, folder, etc. “Product” is one word that works,
try and find one or two others.
1. Navigate to the Search Administration section of the Admin Pages, and click the Edit the
System Default Form link.
2. Click the System Attributes link, and then choose Creation Date from the Additional
Attributes menu.
One way is to confirm that you have a Product Discussions slice on the Advanced Search
n tD
O oN
pe o
D
n tD
Te i
xt str
In ibu
te te
rn
al
U
se
O
nl
y
Objectives
Overview
pe o
D
As the Content Server search administrator, there are several things you
n tD
This chapter will point you in the right direction and continues where the
previous chapter left off. We will focus on Regions and additional
xt str
n tD
Te i
xt str
Figure 36-1:
Manager
rn
al
U
se
O
nl
y
Scenario A restaurant chain is expanding across the country and they use Content
Server to manage their expansion. For each new restaurant they create a
project to store blueprints, lease information, tasks, discussions,
miscellaneous documents and legal contracts. Each project has a folder
called “Legal” with similar files in it. They would like to search all the Legal
folders at once, and avoid navigating to each project. How can they do
this?
The Region “OTLocation” indexes the location of an item by its dataid. Its
Displayable check box is selected, which means that, by default, Content
Server displays the location of each retrieved object on the Search
Results page.
O oN
Suppose that two of the Legal folders in the above scenario have dataids
pe o
of 3321 and 4687. Here is the Content Server Query Language syntax
D
You must choose “Complex Query” and you can either string together all
the locations in one line, using parentheses, or duplicate the Full Text field
xt str
Figure 36-2:
se
OTLocation is Found
Further Down the List of
Regions
O
nl
y
Figure 36-3:
n tD
Queryable, Displayable,
Search by Default,
xt str
Figure 36-4:
O
Enterprise Index
y
n tD
Te i
xt str
In ibu
te te
rn
al
U
se
O
nl
y
Figure 36-5: “Queryable” Means the Regions Will Appear on the Advanced Search Page’s Additional Attributes
Menu
Displayable Makes Regions potentially displayable on the Search Results page (e.g.
OTLocation is displayable by default). The Regions may still have to be
selected from the Edit Display Options menu.
Search by Default When you perform a search using the Enterprise or Enterprise [All
Versions] slice, you can query data from these Regions (unless you choose
the Content Only option).
Sortable There is a Sort drop-down list on the Search Results page which defaults
sorting by “Relevance”. “Date” and “Size’ are also options. Selecting the
Sortable check box places the Region on that drop-down list . Note: only
the results for a single Search Results page will be sorted unless you save
these options to a Search Result Template.
Figure 36-6:
drop-down list
pe o
D
n tD
Filter When this value is enabled for a Region, it becomes available on the
Configure Search Filters page. Then, if you make it “Active”, it is available
Te i
Figure 36-7:
U
se
Results Page
nl
y
Each index (Enterprise, Help, Directory Walker, etc.) has its own
pe o
Changing Region Once a metadata Region type definition is made, it is remembered in the
Types search index. If no explicit type definition was made, the Region will be a
xt str
TEXT type.
In ibu
It is possible to change the type definition for an existing Region, but not
between all types (see Tips at the end of the chapter). For a type
te te
conversion to succeed, the format of the values for the target Region type
must be compatible with the format of the values of the current type. For
rn
example, if you try to change the type of a Region from TEXT to INTEGER,
al
Here, the administrator replaces the TEXT type with the INTEGER type.
nl
y
Select the Functions menu of the Enterprise Search Manager > Properties
> Region Attributes.
O oN
The Region Attributes page is a text box which accepts key-value pairs for
pe o
D
the attributes. For example in the figure below, the OTName Region has
been assigned language values for English (the default), French, and
n tD
Region Modifiers The search engine now supports a Region modifier for search queries: the
nl
exact matches. The “like” keyword is supported in Full Text and Advanced
searches.
O oN
pe o
D
n tD
Te i
xt str
Figure 36-10: Region Modifiers Tab of the Enterprise Search Manager Properties
In ibu
te te
are placed in the second text area. Regions in each text area are separated
al
by commas. After these settings have been changed, you must restart the
indexing process.
U
Purge Regions There are many Regions which are listed in the Regions tab, but not all of
O
them exist in the search index. Some Regions are not used, although they
nl
Regions which are purged will be added again later if content is indexed
containing that same metadata.
Figure 36-11:
n tD
Removing Empty Regions When the search engine starts, it will automatically remove any empty
Te i
When those objects are subsequently deleted, the empty Regions remain,
and are eventually “garbage-collected” by the system.
In ibu
te te
rn
To specify that certain result fields may not be removed from the Search
Results pages by the end user, select those fields from the Available (left)
side of the page and click the right arrow button to move them to the
O
Figure 36-12:
Configuring Required
Search Result Fields
n tD
Te i
Figure 36-13:
xt str
Example of Microsoft
Word 2007 File (OLE)
In ibu
Properties
te te
rn
al
U
se
O
The online Admin Help discusses the indexing of these properties in the
nl
The basic syntax for indexing these properties is to append OTDoc- to the
OLE name (e.g. ‘Author’ becomes ‘OTDocAuthor’).
To search within a specific property, you can use the following Content
Server Query Language syntax:
“OTDocAuthor”:“Thomas Pynchon”
“OTDocKeywords”:“fiction”
For most Content Server content, categories and attributes have much
more flexibility for metadata collection and search, but there may be
some cases where you wish to leverage the OLE properties.
Figure 36-14:
Page
pe o
D
n tD
Te i
xt str
Nickname Settings There are parameters that can be configured for the Nickname section. A
Nickname-based search will query the database, not the full text index.
In ibu
System Attributes For example, OTLocation, OTName, etc. These attributes are found on
each object’s Properties pages.
Custom Attributes Custom categories allow you to apply additional metadata to items such
as documents. For example, information such as Author, Product Code,
and Language will help users to search for very specific information:
O oN
You can design category templates and add them into the Category
n tD
The Region Map is the list of search metadata Regions within the
U
Search Manager. The Regions page is used to review the list and
modify the properties of the search Regions.
se
database.
nl
y
Figure 36-15:
Check Box
pe o
D
n tD
Te i
xt str
In ibu
te te
Metadata From Other Microsoft Office OLE metadata, form, and workflow metadata fields are
Sources also present on the Regions page. Installing additional modules like
rn
Enterprise slice, you would have to select its Region’s Search by Default
se
check box.
O
nl
y
Making Attributes Categories and attributes add valuable search content that can be
From Categories tailored to many different corporate environments. However,
Displayable interpreting the default search results can be challenging because there is
no quick way to compare the different attribute values of all the returned
items.
If you specify index Regions as being “displayable,” they will appear in the
Display Options page for queries and can be made to appear on the
Search Results page. This will allow you to easily compare the custom
attributes of items retrieved during searches.
When you save a query, you also save its Display Options criteria, and this
allows you to create several custom queries for your users that display
O oN
n tD
Te i
Figure 36-16:
xt str
Making Other Knowing how to make Regions displayable can help clarify many of your
Metadata Displayable search results. For example, if you search the Enterprise [All Versions]
slice, the default search results will contain all valid versions of
documents, but each document’s version number will not be displayed. If
you make the OTVersion Region displayable, then the document’s
version number will appear on the Search Results page. You can also
change a Region’s Display Name to make it more user friendly (e.g.,
change OTVersion to a display name of “Document Version #”).
O oN
pe o
D
n tD
Te i
xt str
In ibu
te te
rn
al
U
se
O
nl
y
O oN
pe o
D
n tD
Te i
xt str
In ibu
EXIF (or XMP) metadata is generally attached to media files. For example,
U
the GPS location, resolution, image size, camera type, etc. Photo and
media software will often also add this XMP data to PDF files.
O
nl
The OpenText Document Filters now have the ability to extract this data
from media files (JPEG, TIFF, PDF). The metadata is exposed in DCS
(Document Conversion Server), where it can be included as searchable
metadata in the search index, or retrieved using the REST API.
OTDocTitle
pe o
D
OTDocSubject
n tD
OTDocKeywords
Te i
OTXMP_Format
OTXMP_DocumentID
xt str
OTXMP_InstanceID
In ibu
The following XMP metadata fields are added with the prefix OTXMP_
te te
ImageWidth
rn
ImageLength
ImageHeight
al
Compression
U
Make
se
Model
PixelXDimension
O
ExifImageWidth
nl
PixelYDimension
y
XResolution
YResolution
ResolutionUnit
GPSLatitudeRef
GPSLatitude
GPSLongitudeRef
GPSLongitude
This list can be tuned / edited in the DCS.INI file. Also, if you want
unrestricted extraction and indexing of all XMP fields, a setting
in the DCS.INI file allows this behavior, but is generally not
recommended.
3. Continue navigating to Open the System Object Volume > Enterprise Data
D
Source Folder > Enterprise Search Manager and from its Functions menu,
n tD
5. Once the group of OTXMP regions has been located, they are not be
Queryable, Displayable or Filterable by default, so each one of the OTXMP
O
8. Navigate to Enterprise Workspace > Handy Images > EXIF and XMP Photo
Metadata folder. The folder contains one jpg and one png file, each of
pe o
D
9. Click Saved Search Query with Display Showing XMP Metadata to run
the saved query and it will generate search results that includes XMP
Te i
metadata.
xt str
In ibu
te te
rn
al
U
se
O
nl
y
10. From the Select Display Style menu, select Edit the Display Options. All, or
the metadata values of interest, have to be moved from the Available list to
the Displayed list, for the metadata to display on the search results page in
the prior step:
O oN
pe o
D
n tD
AutoDesk Support Additionally, Autodesk AutoCAD 2015 & 2016 are supported by the
xt str
A series of AutoDesk AutoCAD 2015 and 2016 dwg files can be found in
In ibu
Thumbnail Generation
A common issue for customers is the desire to generate Thumbnails for
objects, without performing a system wide re-index.
Thumbnails may not have been created for legacy data because they were
‘missed’ or because additional MIME Types were subsequently
configured to be made into Thumbnails.
page [using Standard Style] and as Featured Items - based on the contents
pe o
D
of the first page of each respective document - rather than using a generic
MIME Type icon.
n tD
Beginning with Content Server v16.0, there are a pair of new options that
Te i
O oN
pe o
D
n tD
Te i
4. Click Submit.
y
O oN
pe o
D
n tD
Te i
xt str
O oN
pe o
D
n tD
Te i
xt str
In ibu
Thumbnail Priority
al
items such as documents and their text or metadata, and as a result not all
Thumbnails may find themselves ‘ingested’ into Content Server.
se
[DCSipool]
lib=dcsipool
ThumbnailLocation=C:\CS16/temp
Thumbnailpixelx=200
Thumbnailpixely=200
Thumbnailformat=JPG
Thumbnailpagerange=1
Thumbnaillimit=20000
Waitforthumbnails=true
iPool Quarantine
pe o
D
based on what files were in the iPool. This feature allows a quarantined
iPool to be selected and the contents of the iPool displayed.
Te i
xt str
Navigate to System Object Volume > Enterprise Data Source Folder >
Enterprise Data Flow Manager.
O oN
pe o
D
n tD
Te i
xt str
In ibu
te te
Summary
In this chapter, we:
Explained the benefit Regions and the Query Language offers end
users
O oN Discussed displaying selected metadata on the Search Results page
pe o
D
n tD
Te i
xt str
In ibu
te te
rn
al
U
se
O
nl
y
Exercises
1. Navigate to the System Object Volume, click Enterprise Data Source Folder > Enterprise
Search Manager.
2. Click the Functions menu for the Enterprise Search Manager and then Properties and select
Regions.
O oN
3. Scroll down to the OTCatalog section and select its Queryable check box. Also change its
pe o
D
5. Test your work; search for the word knowledge using a regular query. Record the number of
results.
xt str
6. On the Advanced Search page select Featured Item from the Additional Attributes menu.
In ibu
Hint: You may have to refresh the page to view the newly added attribute.
te te
7. Type 1 in the resulting field, and knowledge in the main search field.
rn
8. Execute the search and verify you are getting results from Featured Items. Additionally, you
can type “0” in the Featured Items field to find all items with “knowledge” that are not
al
Featured Items.
U
se
Make the ProductSpec attribute values displayable on the Search Results page.
nl
y
1. Open the Product Development folder and create a folder called Product Ideas. Then click
its Functions menu, Properties, Categories and Add Categories.
2. Add several documents to the folder and give them different values, but ensure one value is
consistent (e.g., select Language: English. This will give you better search results).
3. Navigate to the Enterprise Search Manager for the Enterprise Data Source. Click the
Functions menu, then Properties and then Regions.
4. Locate the ProductSpec Category towards the top of the page and click Displayable for all
its attributes, then click the Update button.
5. Navigate to your Advanced Search page and select the Edit the Display Options option from
the Select Display Style menu. Select all the attributes you have just made displayable and
move them to the Displayed column.
7. Now run the query from the Advanced Search page using the ProductSpec category that
will find documents with the common custom attribute value (e.g., Language: English). Note
that you can see and compare the values for the attribute on the Result page. You may need
to remove Green and Organic.
Generate Thumbnails
2. Using either Search or manually ‘adding’ items to your new Collection, ensure that you have
pe o
D
included a few items from common MIME Types such as Word documents or Excel
spreadsheets. A list of supported file formats has been provide below.
n tD
Word 95-2013
Excel 95-2013
xt str
PowerPoint 97-2013
In ibu
DWG
rn
DWF
CADRA
al
WordPerfect
U
Postscript
se
RTF
nl
Calcomp
y
HPGL
DXF
Gerber
CGM
EMF
WMF
ME10
CALS
Raster Images (BMP, PNG, GIF, TIF, JPEG, JP2, JBIG)
4. From More Actions … select Queue Thumbnail Generation and click Submit.
6. Test the success of Thumbnail of Generation by either performing a search for the item and
using a Standard Search Display Style, changing the item so that it is displayed as a Featured
item or by visiting the Overview page for the item.
1. Navigate to the Enterprise Workspace > Handy Images > EXIF and XMP Photo Metadata
pe o
folder.
D
2. Using drag-and-drop, add the C:\SamplesDocs\EXIF\xmp bike4.jpg file into the folder.
n tD
3. Run the Saved Search Query with Display Showing XMP Metadata query and confirm that
Te i
it displays “Cannon” metadata on the search results page, as illustrated in the following
figure:
xt str
In ibu
te te
rn
al
U
se
O
nl
y
And here is the bike photo shot with a Cannon camera, based on its XMP metadata:
O oN
pe o
D
n tD
Te i
xt str
In ibu
te te
rn
al
U
se
O
nl
y
Objectives
Overview
pe o
D
Choose a data flow for which you want to establish Control Rules. In this
O oN case, the Control Rules are being set up for the Enterprise data flow.
pe o
D
n tD
Te i
Figure 37-1:
xt str
You can edit existing rules and add new rules for the Data Source.
Figure 37-2:
n tD
Te i
For example:
te te
system.
se
O
Creating Data Flow Control Rules based on disk space allow you to start or stop an iPool
Rules Based on Disk Feeder, an iPool Reader, or a data flow based on the amount of free disk
Space space available to the data flow processes on the computer where the
data flow runs.
If Data Flow disk space is less than 100 MB: issue the command to
pe o
D
Figure 37-4:
The actions allow for the selection of the applicable start/stop or other
action:
O oN
pe o
D
Figure 37-5:
n tD
How big will the index get? Here are some parameters to keep in mind:
In ibu
It depends…
The final index size depends on the document mix, the kinds of objects
te te
partitions to handle your initial content and then monitor the ratio of
external store to partition size
O
location, in its entirety. These copies are deleted as they are indexed
but they need extra space during the indexing process
y
Creating Data Flow You can base Control Rules on the number of iPool messages associated
Rules Based on with a particular process in a data flow.
Number of Messages
The Extractor process polls the DTreeNotify table for information, and
continues to extract items listed in that table until it has extracted all
items. As it encounters items, it bundles them in messages of about 1000
items. The size of the message varies, however. If the process encounters
only four items to update, then only four items will be bundled in the
message.
n tD
Figure 37-6: Full Options for Setting Rules Based on the Number of Messages
Creating Data Flow Quiet data flows occur when processes are running successfully and are
Rules Based on Quiet clear of iPool messages (idle). You may want to turn processes off when
(Idle) Data Flows they are quiet in order to save system resources and then have them turn
on automatically when there is new input from the producer process.
For example, the Help data flow is set to stop after 6 hours of a quiet data
flow, because once the help files are indexed, no new information will be
added to them (unless you install new modules).
Another example is the Directory Walker. It is set up to stop the DCS and
Index engine if the data flow is quiet for 1 hour. You could add another
rule to specify that when messages are greater than one, start the data
flow. This would ensure that new/modified documents are added to the
O oN
index.
pe o
D
n tD
Te i
xt str
In ibu
te te
rn
al
U
se
O
nl
y
Figure 37-7: Options for Setting Rules Based on a Quiet Data Flow
The Help index is a static set of information: you are not adding
or changing help files very often.
You can turn off the help file processes once the help is indexed
in order to save resources (e.g. memory, disk I/O).
If you add a new module, you will need to restart the Help
Directory Walker, in order to search on any new help files
associated with the module.
Creating Data Flow A stalled data flow has processes that are running but are not processing
Rules Based on Stalled the iPool messages that the data flow is receiving. The stalled data flow
O oN
Data Flow Control Rules allow you to automatically stop the data flow or its iPool
pe o
Feeder.
D
(corrupted file)
Port conflict
xt str
Figure 37-8: Options for Setting Rules Based on a Stalled Data Flow
Creating Data Flow Process errors can occur during the execution of one of the processes in a
Rules Based on data flow. If a process error occurs, a message describing the specific
Process Errors error condition is displayed on the Specific Info page of the corresponding
data flow process.
You can base Control Rules on process errors in a data flow but not for a
specific process within the data flow. The Control Rules allow you to
automatically stop the data flow, as well as send messages about the
process error.
O oN
pe o
D
n tD
Te i
xt str
In ibu
te te
rn
al
Figure 37-9: Full Options for Setting Rules Based on a Data Flow Process Error
U
se
You can create a Control Rule that sends an error message and
O
stops the data flow (all processes) when a process error occurs.
nl
y
Data Flow Rules There are three types of Control Rules based on Partitions, one of them
Based on Partition simply sends a report and two actually create additional partitions.
Properties
O oN
pe o
D
n tD
Te i
xt str
In ibu
te te
rn
al
Figure 37-10: Adding a Control Rule Based on Partition Capacity That Initiates a Report
U
se
O
nl
y
You can add a Control Rule based on partition capacity that issues a
report when every partition has reached 75% capacity. This would be
similar to most of the other Control Rules we have seen. After receiving
the report, the administrator manually creates an additional partition.
n tD
Te i
xt str
In ibu
te te
rn
al
U
se
O
nl
y
Figure 37-11: Adding a Control Rule Based on Partition Capacity That Creates a New Partition
You can have Content Server change the modes (step down) of previous
partitions as new partitions are created, you can select how many new
partitions to create, and you can specify a partition name template and
partition directory template (variables that determine how Content
Server automatically names partitions and the directories in which they
are stored). The disk locations for the directories that store partitions are
taken from the site’s partition configuration, which must be already set up
for these rules to work properly.
O oN
pe o
Summary
D
n tD
___________________________________________________________________________________________________
___________________________________________________________________________________________________
___________________________________________________________________________________________________
___________________________________________________________________________________________________
pe o
___________________________________________________________________________________________________
D
___________________________________________________________________________________________________
n tD
Te i
3. Why are default Control Rules on the Help data flows different from the Enterprise data
flows?
xt str
___________________________________________________________________________________________________
In ibu
___________________________________________________________________________________________________
te te
___________________________________________________________________________________________________
rn
4. Describe two Control Rules that you will want to set up on your production system.
al
___________________________________________________________________________________________________
U
___________________________________________________________________________________________________
se
___________________________________________________________________________________________________
O
nl
y
Exercises
Use Configure System Object E-mail Delivery to Send the Administrator Error Notifications via
Email
In this exercise you first test the system to ensure that email messages can be successfully sent and
then configure the System Object E-mail to send error notifications.
1. Navigate to the Notification Administration section of the administration pages. Click the
Test Notification E-mail Delivery link.
O oN
a. If the test messages have a Status of Success, continue to the next step.
b. If the test messages fail, as illustrated below, make sure you’ve started the Mercury/32
n tD
mail server and repeat Step 2, to make sure Content Server can connect to the mail
Te i
server.
3. Navigate to the Search Administration section of the administration pages. Click the
xt str
4. In the Recipients section of this page (Recipients and Options), set up SOV messages for
three basic scenarios:
te te
a. An administrator during regular weekly work hours will receive all messages,
rn
b. An assistant administrator will receive warnings, errors and severe errors overnight
al
If you have not created users in your system, you can make up names and email
O
5. Navigate to the SOV and click the Functions menu of the Enterprise Data Source folder.
Select Control Rules from the Properties sub-menu.
6. Set up Control Rules for three different processes. For example, a Process Error in the Data
Flow should stop the Data Flow and send a Severe Error message; if a Data Flow stalls for
more than two hours, then the iPool feeder should be stopped and an Error should be
reported.
Objectives
Explain the different types of search and index logs you can generate
pe o
D
n tD
Overview
Te i
processes, this chapter provides you with tips and ideas on how to take
better advantage of Search technology.
In ibu
te te
The “like” Operator Part numbers and file names are not normally constructed for readability.
al
Compare the method in which an individual may search for a part to how
that part may be stored in Content Server.
O
nl
y
Figure 38-1:
Disconnection Between
Search Query and Data
Storage
File Type Searches Many regions are used to identify the type of a file or object, and the
differences are often confusing.
D
OTFileType: this is also added by the DCS, but combines file format
Te i
https://knowledge.opentext.com/knowledge/cs.dll?
func=ll&objId=42656566&objAction=ArticleView&
O
viewType=1
nl
y
The Search Engine also has the ability to create search regions comprised
of the domain portions of email addresses, to support eDiscovery
processes with email.
If the region with part number properties is included in the list of default
xt str
search regions, then the QLLIKE operation will be used automatically for
that region.
In ibu
Open the System Object Volume and select Enterprise Data Source
rn
Folder > Enterprise Search Manager > Properties > Region Modifiers.
al
You will recall, from Chapter 6, that these two text boxes contain the
comma-separated regions which have unusual grammar and where the
U
click the Open the System Object Volume link.
nl
Data Source Folder link of the data source containing the index
regions to which you want to apply region modifiers.
Click the Functions menu of the Search Manager, choose Properties,
and then choose Region Modifiers.
From the Like Modifier area, in the first text box, enter a comma-
separated list of search regions configured to use the “like” modifier.
In the second text box, enter a comma-separated list of search regions
configured for default application of the “like” modifier.
Restart the Index Engines for all Admin servers in the Content Server
cluster for the modifications to take effect.
O oN
pe o
D
n tD
Te i
The behavior of the LIKE modifier has been enhanced to include singular/
In ibu
more characters.
rn
This means that a search for SalesReport2014 will match variations such
as “Sale-Reports/2014” or “vacation” will match variations such as
al
file: LikeUsesStemming=false
O
nl
y
O oN
pe o
D
n tD
Te i
xt str
The search results page, like the one illustrated below, demonstrates how
variations in the search term ‘vacation’ includes words like 'vacations' or
rn
'vacationing'.
al
U
se
O
nl
y
Region Modifiers and Entries which are made in the Region Modifiers text boxes, illustrated
search.ini earlier in this section, are immediately written to the search.ini file
once those changes are applied. The named regions, which must be text
values, are listed as comma-separated values for two keys:
OverTokenizedRegions and UseLikeForTheseRegions, respectively.
The new region, however, will NOT be able to leverage the “like”
pe o
D
When a query is processed which relies upon the “like” operator, the
query is also tokenized with the alternate rules, and is tested against the
al
tooth cog for a DuraAce Di2 freewheel” but using our current indexing
process, the search engine will have great difficulty matching this request
nl
By identifying the part number region as a target for the “like” operator, it
sends an indication to the indexing process to heavily tokenize the part
number. Compare the differences in tokenization presented below.
Figure 38-5:
Schematic of Tokenization
and Over-tokenization for
a Part Number Region
Shadow Regions The over-tokenized regions property, with its list of comma-separated
regions, provides an instruction to the index engine to build a shadow
region. A shadow region is just an extra copy of the region. The shadow
region is derived from the original metadata region, but it uses a different
set of rules for interpreting the metadata, and for building tokens and
patterns.
In the previous example, the part number region will have a separate
shadow region, which will deconstruct the part number, and send a
message to the search engine that any query involving this region should
O oN
The generated shadow regions which are used to support the “like”
n tD
operator have their own properties. The shadow regions are created
once the index engines load the search.ini file, applying the feature to
Te i
existing data sets without the need for re-indexing. Shadow regions are
saved to disk as part of the index until removed from the search.ini
xt str
file’s list of over-tokenized regions (which also occurs once the index
engines restart and re-load the search.ini).
In ibu
A shadow region has the same name as the original, with ‘_OTShadow’
te te
Notice how the user returns 84 search results and many of the items
include non-document results, in this example here:
Te i
xt str
In ibu
te te
rn
al
Figure 38-6:
U
se
O oN
pe o
D
n tD
The following pair of links have be provided to list users that conform to
xt str
For example, the following figure lists the users who do not currently
rn
Figure 38-8:
Apply Restrictions The Apply restrictions to Users with eDiscovery rights and the Apply
restrictions to Users with System Administration rights check boxes
determine whether the Mandatory Search Terms are (or are not) applied
to eDiscovery and System Administration rights enabled users.
Group Mandatory Search Terms are applied on a group basis. To select a group,
click in a blank group field and you can select a group by searching for it.
O oN
Search Term Search Term restrictions are not comprised of LQL. They must be
pe o
D
might be:
([region "OTProvider"] "BusUnit2") or ([region "OTLocation"] "2000").
xt str
In ibu
Figure 38-9:
te te
Term
al
defined.
O
Clicking the checkmark opposite the search term will ‘check’ the syntax of
the OTSQL and display an OK status or an alternative error message, if
nl
To delete a Mandatory Search Term, click the red ‘x’ opposite the
search term.
The end result of this specific Search Term is to only return search results
for anyone in the Students groups to documents (i.e., subtype 144).
n tD
Te i
xt str
In ibu
te te
rn
al
U
se
O
Figure 38-10: Student Search Results With a Mandatory Search Term Configured for Only Documents
nl
y
Table 38-1: SearchOptions Settings in the opentext.ini File That Affect Search
search component.
rn
al
objectTypes, The Content Type menu on the Advanced Search page allows you to
objectTypesName restrict your searches to documents, folders, tasks, discussions, projects,
workflow maps, and workflow status. To modify this you must add
objectTypes and objectTypesName settings to the SearchOptions
section. For example, the following settings:
objectTypes={144,0,206,”130 or 134”,207, 202,1,278}
objectTypesName={‘Documents’,’Folders’,’Tasks’,’Discussions’,’Channel’,
’Projects’,’Shortcut’,’Snapshot’}
will remove “Workflow Map” and “Workflow Status” from the menu and
add “Shortcut” and “Snapshot”.
O oN
pe o
D
objectTypes 144 0
objectTypesName Documents Folders
xt str
If the set elements are out of order, you will get unexpected
In ibu
search results.
te te
rn
DefaultWords, The default language of the dictionary and thesaurus which are used for
DefaultThesaurus searching. For example:
al
DefaultWords=English
DefaultThesaurus=English
U
This is not present in the INI file unless you wish to change the default
se
language.
O
functionMenu When enabled, specifies that the functions menu is available for search
result items, especially when using the search API with an XML output
nl
functionMenu=false
dateTypesAdditions The date handling allows users to enter dates with a calendar widget
instead of the special text syntax. The contents of this list are values
separated by a comma for any valid non-default regions. For example,
dateTypeAdditions={'OTEmailSent','OTEmailReceived'}
Figure 38-11:
n tD
[Summarizer]
In ibu
SumDefFile=../config/summdef.eng
Summarizer in the SumDocFreqFile=../config/docfreq.eng
rn
SumTagFile=../config/tags.eng
U
Table 8-3.
y
SumDocFreqFile Definition file for the word frequency file. The word
frequency file contains data necessary for Summarizer
to calculate the statistical significance of words in
documents.
SumTagFile Definition file for the tag word file, which contains a
list of tags (case insensitive) along with a number that
signifies its significance.
Setting Description
1.3 A score multiplier for sentences that are in the first 20% of a
document. These sentences are more than likely lead-in
introductory sentences and should therefore be good summary
sentences.
Only the first 250 KBytes of a document are summarized. Sentences that
Te i
are too short or too long are not used, and documents with only framesets
are not used. News articles with “boilerplates” can cause problems,
xt str
documents that are too short may have no phrases, and documents that
are too long may have “scattered” themes.
In ibu
Topics.
rn
al
n tD
Te i
xt str
In ibu
te te
rn
al
U
se
Figure 38-13: Search Results Showing the Different Rankings for “open” Versus “cats”
O
nl
y
O oN
pe o
D
n tD
Te i
xt str
In ibu
te te
rn
Figure 38-14: Search Results Showing the Different Rankings for “open” Versus “cats” - continued
al
U
Although the number of hits and object date are part of the
se
search result calculations, they are not the only two elements
which contribute to score calculation. See the online help article
O
There are other criteria that have a smaller amount of weight, including
how common the word is. For example, searching for the word “open” will
find plenty of results, but none may score above a moderate percentage
because the word is quite common. On the other hand, “anthropocentric”
is not very common, so many occurrences of it within a document will
receive a higher score.
n tD
Te i
xt str
In ibu
te te
rn
al
Figure 38-15: The Ranking Configuration Page on the Enterprise Search Manager Properties
U
se
appear on the Search Result page did not change. The Search
Engine assigns file types to objects based on content analysis, file
y
extension, subtype, and MIME type. This file type is now used in
search relevance and search filters.
Search Statistics
Search Statistics can show you how your users have been searching and
can aid your decisions over how to configure the interface. For example,
viewing your user’s unproductive searches could help determine more
training was needed, or you might create some specific System Search
Templates.
n tD
Te i
xt str
Figure 38-16:
In ibu
Page
rn
al
U
se
O
nl
y
O oN
Figure 38-17:
pe o
D
Page
Te i
xt str
In ibu
te te
rn
al
You have just found out that search is not working. What do you do?
U
There are a few steps you can take to solve the problem yourself, before
se
When “search isn’t working”, find out what kind of error message users
O
are getting on their screen. Is the Admin server unavailable? Are users
nl
reporting problems because they are not able to locate information that
they know is in Content Server?
y
When you are faced with search problems, try the following steps, in
order:
Check what kind of queries the users are running: are they valid
queries?
Visually check the status of the Admin server, the Enterprise data
flow, and its processes.
Test System Object for Errors (located in the Content Server System
Object Administration area of the administration pages). If errors are
reported, check the Error Messages section of the online help to find
out what the error number means.
Verify control rules: are they starting/stopping processes for reasons
O oN
that are not logical, or for reasons that need to be solved, such as a
pe o
D
When you test the system objects for errors, Content Server runs a
U
diagnostic on all objects in the system volume (the data flows, processes,
and search engines in the System Object Volume). The report will be
se
Figure 38-18:
n tD
Output
xt str
In ibu
te te
In most cases, OpenText Customer Support will guide you through the
rn
logging process, but it is helpful to understand how the various logs are
set and, in general terms, what each kind of log might find.
al
There are four main types of logs which can yield important information
U
for search:
se
1. Thread logs. These are usually required because they show the basic
function information when you execute a search. These logs are
discussed in more detail in Troubleshooting and Supporting Your
O
2. Search Logs. The search logs will display the detailed information
y
Summary
In summary, in this chapter we:
Learned about searches on part numbers, file names, and file types
Configured Region Modifiers for Index Regions and Like Searches
Configured Mandatory Search Terms
Described settings in the opentext.ini file that affect search
Listed the first steps to take when search is not working
Explained the different types of search and index logs you can
generate
O oN
pe o
D
n tD
Te i
xt str
In ibu
te te
rn
al
U
se
O
nl
y
There is no ability to combine “likeable” regions with specific values, such as you may
do when using attributes to represent languages. The “like” operator does not support
examining only one language. For example, you have a region with language attributes
for English, French, and German entries.
(en) BlackBicycle7
(fr) VéloNoir8
(de) SchwarzesFahrrad9
If you perform a search for “like FahrradNoir7”, you will get a positive match, even
O oN
though “Fahrrad” is a German entry, “Noir” is French, and “7” is from the English value.
This occurs because of over-tokenization necessary for the shadow region,
pe o
D
Hit highlighting effectually ignores the “like” aspect of a query. Hit highlighting
operations are not processed using “like” operator. It’s quite likely that there will be a
rn
mismatch between tokens in the original metadata value and those from the shadow
region.
al
The “like” operator may generate more search results than expected. Due to the nature
U
of part numbers and the behaviour of over-tokenization in shadow regions, many small
and common tokens can be generated. The “like” operator is biased towards finding
se
Objectives
Overview
pe o
D
Content Server.
xt str
n tD
Figure 39-1:
Te i
Control IP Access to
xt str
Search Components
Administration Page With
In ibu
No IP Addresses
te te
rn
al
Addresses enhance the security of your Content Server system by restricting access
se
Server then stores these IP addresses in the database and in a policy file
(otsearch.policy) in the config folder of each Content Server instance.
nl
Since Content Server overwrites the policy file each time it adds or
y
removes an IP address from the file, you should not modify the file
manually.
Open Access When no IP addresses are registered, Content Server allows access to all
computers. However, once IP addresses have been registered, it only
allows access to computers with those IP addresses. Therefore, you must
register the IP addresses of all computers that host Content Servers and
Admin Servers. Otherwise, the Search system may not respond.
};
D
n tD
Determining Which The figure below illustrates some key IP address information (IPv4 and
IPs to Restrict IPv6) for our VMware classroom image called traingen. We used ipconfig
Te i
/all to output the information; the physical address and default gateway
information have been redacted. Assuming that search components were
xt str
127.0.0.1. Although we have both IPv4 and IPv6 available in this example
(because of the DHCP server), we are exclusively using IPv4 addresses.
te te
All Content Server and Admin Server IP addresses should be entered into
rn
Windows IP Configuration
Host Name . . . . . . . . . . . . : trainotcs
U
Entering IPs to Enter each IP address on the Control IP Access to Search Components
Restrict page of the Content Server and Admin Server.
grant {
// permission java.security.AllPermission;
Figure 39-4:
O oN
Corresponding Contents of
D
otsearch.policy file
te te
KINI table
rn
'SearchIPAllowList'
se
Recover From an If you do register incorrect IP addresses and are no longer able to control
O
Incorrect IP Address IP access through the Content Server interface, you can restore access by
replacing the current policy file with an empty policy file, which will then
nl
An empty policy file is available in the same directory as the current policy
file, under the name otsearch.policy.bak (this file is generated when you
modify the policy file for the first time). However, while the search system
uses the policy file when controlling IP access, the Content Server
interface displays the values stored in the Content Server database.
Therefore, after replacing the policy file, you should update the values in
the Content Server interface, as described below.
Setting Up Secure When indexing, the Document Conversion Service (DCS) and iPools in
Deletion of data flows generate temporary files that may contain text or other
U
Temporary Files content extracted from the files being indexed. When a temporary file is
se
no longer needed, the data flow uses normal operating system calls to
delete it. In most cases, this means that the operating system removes the
file's entry from the file table and leaves the file image on the disk to be
O
software can recover the deleted file from the image, and this may
present a security risk.
y
You specify the level by adding the following line before the </
InterchangePool> line that ends the file:
<SecureDeleteLevel>x<SecureDeleteLevel> where x is the value of the
secure delete level.
If the read and write directories for a data source are on different
computers, you must add this setting to the ipool.cfg files for each
instance.
n tD
Te i
xt str
In ibu
te te
rn
al
U
Figure 39-5:
se
Example of a Content
Server Enterprise Data
O
Which Folder is Which? Since most of the folders appearing within the index and the dataflow are
nothing more than a series of numbers, it may be difficult to keep them
separate in the administrator’s mind.
For example, SOV > Enterprise Data Source Folder > Enterprise Data
Flow Manager > Enterprise Extractor Process > Specific.
This information shows *_0 is the write area for the Extractor, *_1 is the
write area for the DCS and *_2 is the write area for the prospector.
O oN
pe o
D
Figure 39-6:
n tD
Secure Delete Levels When you configure the secure deletion of temporary files, you specify a
secure delete level that determines how the system overwrites file
rn
images left on the disk. Possible values are integers from 0 to 4; these set
varying levels of secure deletion.
al
1 Overwrite the file image in one pass with null bytes. This
nl
n tD
<InterchangePool>
Figure 39-8: <Identifier>file://C:/Content Server-
Te i
Summary
rn
Objectives
Overview
O oN
pe o
functionality.
n tD
Te i
Introducing Pulse
xt str
Pulse You have been introduced to Pulse as part of earlier Content Server
training courses such as in:
In ibu
Pulse provides users with a real time activity feed of what is happening
within the system. By following other people you see activity by those you
O
are most interested in. The activity feed automatically contains details on
nl
new content added to the system and allows you to share a simple status
message with others or comment/reply to something in the activity feed.
y
Pulse Administration
n tD
Te i
Figure 40-1:
Administration Pages
xt str
In ibu
te te
rn
al
Collaboration Administration
U
se
items.
nl
O oN
pe o
D
n tD
Te i
xt str
In ibu
te te
rn
al
U
se
Add Managed Object Type Allows you to add object types that will be under collaboration
nl
administration.
y
Manage Collaboration The Manage Collaboration Features section controls whether specific
Features features, like comments, will be supported.
User Preferences Users can modify collaboration features themselves, when the User
Preferences setting is enabled.
4. From the Select Object Types to Manage drop down list, select or enable
the following item types: Channel, News, Poll, and URL following by
clicking Add.
Figure 40-3:
Pulse Collaboration
pe o
D
n tD
Te i
The object types are added to the Manage Collaboration features section,
xt str
Figure 40-4:
se
Enabling Pulse
Collaboration Features to
O
New Items
nl
y
5. Enable the following features for the newly added object types:
– Comments
– Enable Replies to Comments
– Enable Document Attachments
– Enable Shortcuts to Content Server
– Enable Likes
6. Click Update at the bottom of the page to save the configuration change.
7. Click Configure.
O oN
n tD
Te i
xt str
In ibu
te te
rn
al
U
Figure 40-5:
se
Enable Pulse Select Enabled to make the Pulse features available to your Content
Server users. The Pulse module is needed for OpenText Tempo Box and
OpenText ECM Everywhere, therefore if you do not want to make the
Pulse features available to your Content Server users when you have one
of these products installed, select Disabled.
Max Length for Status Defines the character length limit of status messages, comments, and
Msgs/Comments public or private messages.
Feed Refresh Interval Sets how often to refresh the activity feed to display newer posts or
comments.
Initial # of items to load in Defines how many new posts to retrieve at one time.
O oN
the feed
pe o
D
# of items to grow the feed Sets the maximum number of new posts to display on the page before
via auto-refresh doing a complete page refresh.
n tD
# of Recent Connections to Sets how many connections you want to show in the Recent Connections
Te i
Show list.
xt str
Disable Pulse From Here Removes the Pulse From Here option from the Content Server Functions
menu for folders.
In ibu
Allow Users to set Privacy Controls whether or not users can apply privacy controls to their
te te
Photos
se
Disable comments in Removes the ability to add comments or view comments that were
Workflow Volume previously added to a file, when enabled.
O
Add a DataID to the Adds the DataID or a parent container to the Exclusion List to reduce the
nl
feed.
Users only see activity feed updates on items that they have
permissions to view.
O oN
pe o
For any item that is included, a system message is generated when the
D
or Objects from Activity Feeds. Changes to the list will not affect existing
Te i
O oN
pe o
D
n tD
Te i
xt str
In ibu
te te
rn
al
U
Pulse activity feeds by adding items for inclusion. Through the Comments
nl
Users only see activity feed updates on items that they have permissions
to view.
For any item that is included, a system message is generated when the
item is created or a version is added, assuming the location is not
excluded.
11. Select those items types which you want to automatically generate system
messages, by default only documents are enabled.
12. Click Update.
n tD
Te i
Figure 40-7:
xt str
4. Enter a comment (e.g., Please let me and the IT team know what we can
U
do to help make this a successful trade show this year), and click Update.
se
5. Also enter a comment in the Enterprise Workspace for the Admin Page URL
item by selecting Comment from its Functions menu (e.g., Hello from
O
as an alternative to using the Global Menu bar and it can be found in the
Enterprise Workspace for those with the necessary permissions), and
y
click Update.
6. Launch a separate browser (e.g., Chrome) and sign in as the Admin User
(e.g., admin/cs!).
7. From the Global Menu bar, select Personal > Pulse.
8. Under the Activity Feeds section, select Pulse-All users and confirm that
the previously entered Pulse comments are visible for the URL and news
item, as illustrated in the following figure:
O oN
Figure 40-8:
pe o
D
Summary
U
se
administration pages
nl
y
Exercises
This exercise provides you with an opportunity to configure Pulse collaboration functionality and
then test it out.
4. In a separate browser (i.e., Chrome), sign in as cho/opentext and navigate into the
n tD
Enterprise Workspace > Gearing Up Project > Gearing Up Project Task list and click the
Te i
Task list.
5. Test that you do not have Pulse From Here or Comments as options on the Functions menu
xt str
6. Add the Task List, Task Group and Task as object types to manage on the Collaboration
Administration page and enable all of the collaboration features; remember to click Update
te te
O oN
pe o
D
n tD
Te i
xt str
In ibu
te te
rn
al
U
se
O
nl
y
Objectives
Overview
pe o
D
For example, you could create a rule that all media files larger than 100
MB would be stored on a separate drive or directory. For more
al
The default storage provider is the configuration set up during your initial
installation, but an administration page allows you to add more external
storage locations.
O
The Configure Storage Providers page allows you to add more external
nl
storage locations and allows you to add rules that direct your uploaded
y
Figure 41-1:
nl
Storage Provider
y
Administration
Figure 41-2:
Configure Storage
O oN
Providers
pe o
D
n tD
Te i
4. Open Windows Explorer and create a new folder on the C-drive (e.g.,
C:\CS16-efs4PDF); this folder will be used as a new external storage
xt str
Figure 41-3:
se
Name The provider name is what appears in the UI when referring to the file
store location; it should be under 32 characters, because that is what is
displayable, however, the limit is 64 characters.
6. Enter the name of the storage provider (e.g., External File System for
PDFs).
Configuration The absolute path to the external storage directories. The maximum is
255 characters.
7. Enter the absolute path to the external storage directories (e.g., C:\CS16-
efs4PDF). Hint: It is best to copy and past the information to avoid any
typographical mistakes.
8. Click Submit.
Each Content Server instance has a default Storage Provider that cannot
Te i
Figure 41-5:
Configure Storage
Providers
O oN
pe o
D
n tD
Te i
xt str
Rule The rule is one of approximately two dozen criteria that can be applied to
the incoming Content Server content and it is used to control where the
In ibu
Attribute ? value is ?
y
All Thumbnails
OR '?'
AND '?'
NOT '?'
Project '?'
Volume '?'
Creation Date/Modification Date '?'
Newest Version '?'
Object type in ?
Stored below ?
Description Is the name that appears on the GUI and describes the storage rule.
16. Select the appropriate storage provider from the drop down list (e.g.,
External File System for PDFs - ExtShared (External Document Storage)
n tD
To test the newly created Storage Provider and the Storage Rule, it
In ibu
involves adding a few PDF files and monitoring the external file store.
te te
so that there are at least 3 uniquely named PFDF files displayed (i.e., search
on PDF).
U
21. In a new browser window or tab, navigate to your Personal Workspace (i.e.,
se
Personal Workspace.
nl
y
O oN
pe o
D
n tD
Te i
xt str
Figure 41-6:
In ibu
Auditing Administrators can audit the movement of content from one Storage
Provider to another. By default, the Provider Changed audit interest is
turned off. The audit details for this event include the original Storage
Provider name, the new Storage Provider name, and the name of the user
who moved the content. Every Document in Content Server displays the
name of its Storage Provider on the Versions tab of the Document's
Properties page. Users with the proper permissions can view the entire
list of Storage Provider Rules. This list includes the Storage Provider rule,
and the name and type of the Storage Provider.
View Storage Rules Anyone with Administration Privileges can View Storage Rules from their
Tools drop-down menu, as illustrated in the following figure: .
O oN
pe o
D
n tD
Te i
xt str
In ibu
te te
rn
al
Summary
O
Exercises
This exercise will provide you with an opportunity to practice what you have learned earlier in this
chapter about the creating additional Storage Providers and implementing Storage Provider Rules.
This exercise will focus on adding a new Storage Provider and accompanying Rule.
With an increase in the use of Content Server by our Marketing Department for the storage of their
materials, Outdoor Gear has purchased additional storage (e.g., NAS, SAN) and it has been decided
that ‘large’ file should be stored to this new hardware moving forward.
Examples of these 2GB or larger files are readily reported by the 25 Largest Documents LiveReport
(e.g., Personal > Reports > LiveReports > 25 Largest Documents), as illustrated below:
O oN
pe o
D
n tD
Te i
xt str
In ibu
te te
rn
al
U
se
2. Navigate to the Administration pages > Storage Provider Settings Administration section.
If prompted for the Administration password, enter opentext.
4. Open Windows Explorer and create a new folder called C:\CS16-NAS4Large (i.e., we do not
actually have the NAS or SAN hardware, so we will have to simulate it with a local
directory); this folder will be used as a new external storage provider for ‘large’ files
6. Enter the name of the storage provider and call it External File System for Larger Files
followed buy the absolute path to the external storage directories (i.e., C:\CS16-
NAS4Large), then click Submit. Hint: It is best to copy and past the information to avoid any
typographical mistakes.
8. Click Admin Home to return to the Storage Provider Settings administration page.
3. Select the Size of the file in bytes is greater than “?” rule.
pe o
D
5. Enter a value of 2000000, corresponding to our [simulated] large file size, expressed in
bytes.
Te i
6. Select External File System for Larger Files - ExtShared (External Document Storage) as
xt str
7. Click Submit.
te te
8. Move the Larger Documents Stored Externally to NAS for Large, using the up arrow, so that
it lies just below the ZeroByte rule. This ensures that large PDF files goes to the NAS
rn
storage.
al
U
Test the Storage Provider and Provider Rule for Large Files
se
1. From the Global Menu bar, select Personal > Reports > LiveReports and click 25 Largest
O
2. Download at least one of each of the largest wav, xps and pdf files using the respective
y
3. Using Windows Explorer, open it to the C:\CS16-NAS4Large folder and confirm that there
are no contents in the folder.
4. From your Personal Workspace (e.g., Global Menu bar > Personal > Workspace), create a
new folder called Large Files and add the set of files you downloaded in the prior step.
5. Using Windows Explorer again, open it to the C:\CS16-NAS4Large folder and confirm that
there are contents in the folder; one dat file for each large document added to Content
Server.
6. As an ultimate test, mouse over one of the PDF files previously added to determine its Node
ID, located in the URL displayed in the lower left corner of the browser window and
simultaneously open the folder containing the dat file with that same name (e.g., *077).
O oN
pe o
D
n tD
Te i
7. Open the dat file using Acrobat Reader to reveal it is the ‘large’ PDF file you added earlier.
xt str
In ibu
te te
rn
al
U
se
O
nl
y
O oN
pe o
D
n tD
Te i
xt str
In ibu
te te
rn
al
U
se
O
nl
y
Objectives
Overview
n tD
This chapter deals with Content Server user and group administration.
Te i
The users and groups administrative options and links are described in
xt str
Selection membership.
al
display name.
se
Display
nl
Figure 42-1:
Administration Pages
O oN
pe o
D
n tD
Te i
user’s profile.
te te
Figure 42-2:
The age
O oN
Figure 42-3:
pe o
D
List
Te i
xt str
In ibu
te te
rn
Figure 42-4:
Close the ‘picker’ dialog and then the browser window or tab.
Figure 42-5:
In the case of Outdoor Gear, the administrator has already enabled this
y
setting.
Workspace and add a document (e.g., matrix.doc) and from its Functions
menu, select Properties > General.
pe o
D
n tD
Te i
xt str
In ibu
te te
rn
al
U
The settings chosen on the Configure User Name Display page will appear
on info pages.
O
nl
Figure 42-7:
O oN
pe o
Display Page
n tD
Te i
xt str
In ibu
te te
rn
The settings chosen on the Configure User Name Display page will appear
al
on info pages for Content Server items, as well as tasks, the Personal
Workspace header, etc.
U
following figure:
y
Figure 42-8:
4. Revisit the Properties > General tab of the document viewed earlier and
notice how the sign in name has now been annotated, as in the following
figure.
O oN
pe o
D
n tD
Te i
Figure 42-9: Example of User Name Displayed for a Document Using Name with Appended ID
xt str
In ibu
Users have both a General profile with basic user metadata and a
rn
Personal profile with sections for photos, alternate email addresses, web
site links, etc. Using the User Tab Permissions page in the Users and
al
(uncommon)
se
Specify whether all users should be able to edit their personal profiles
(common)
O
Specify which user(s) should be able to edit the personal profiles of all
nl
other users. For example, you may wish to place someone in charge of
adding digital photographs of all users
y
Only users with user administration rights can edit the general profiles of
other users. They get the blue check marks under Action.
O oN
pe o
D
Figure 42-10:
n tD
The User Tab Permissions page is illustrated in the figure below. The
installation of the optional Pulse module has contributed the Extended
tab.
O
nl
y
Figure 42-11:
General Whether members of this group can edit their General profile
information (first name, last name, etc.).
Personal Whether members of this group can edit their Personal profile
information (favorite web sites, birth date, etc.).
In the User Tab interface, the term Public Access refers to all
users in the system. Elsewhere in Content Server (for example,
on a permissions page), the phrase Public Access means “all users
with Public Access privilege enabled.”
Introducing Domains
n tD
Groups, and access in terms of the System Domain and created Domains.
y
Once Domains are enabled, every user who is created is added either to
the System Domain or to one of the created Domains. You can only enable
the Public Access enabled privilege for users in the System Domain; users
in created Domains are not part of the Public Access group. When
Domains are enabled, the login page for Content Server changes to
prompt the user to enter a Domain name, as you will see illustrated in the
subsequent figure.
Configure Domains
n tD
Te i
Configure Domains
xt str
opentext).
rn
O oN
Figure 42-12:
pe o
D
Enable Domain Support This setting enabled Content Server Domain support.
U
se
All Domains X-Domain X-Domain groups, known as cross-Domain groups, are used to allow
Group collaboration across Domains. For example, if you have two groups of
users, each in a different Domain, that need to collaborate on a project,
O
you can create one X-Domain group which contains both groups of users.
nl
You can also create an X-Domain Project, adding users and groups from
multiple Domains, to allow groups to share information.
Domain Name Display The name or ‘tag’ that appears in the users and group page. Common
names may include: Domain, Division, or similar corporate group entities.
System Domain Name The name of the original Content Server instance or resource. This is the
name associated with the original instance installation and its
workspaces.
8. Click Submit.
pe o
D
Create a Domain For testing and demonstration purposes, it will be necessary to create a
Domain, a domain-based group and a user.
n tD
9. From the Global Menu bar, select Enterprise > Users and Groups.
Te i
10. From the Add Item menu, select Domain, enter Mars Mountain Climbing
xt str
12. From the Add Item menu, select Group, enter Olympus Mons, and click
te te
Submit.
rn
13. From the Add Item menu, select User. Complete the user profile using a
Log-in Name of mars2, Department of Olympus Mons, Password of
U
Prior to enabling the Domain Mappings, this option requires that domain
support be enabled in Content Server and specifies XML-formatted
mappings of OTDS partitions to Content Server Domains. The general
format of this mapping file is:
<Mappings><M>
</M><M>
n tD
</M></Mappings>
In ibu
<Mappings>
Figure 42-13: <M>
al
<P>Outdoor Gear</P>
Example of a <D>Mars Mountain Climbing</D>
U
</Mappings>
click Configure Directory Services. When prompted to sign in, use the
nl
16. Click Partitions and confirm that there is a Mars Mountain Climbing
partition.
O oN
pe o
D
n tD
Te i
xt str
In ibu
O oN
pe o
D
n tD
Te i
xt str
In ibu
te te
rn
al
O oN
pe o
D
n tD
Te i
xt str
In ibu
te te
rn
al
The next step is to test the created Domain, group, and user with the
OTDS mapping.
nl
y
22. In a separate browser (i.e., Chrome), sign in using the previously created
Domain user account and password. The format or syntax for signing into
Content Server using a non-system domain is <user name >@<domain
name>. (e.g., mars2@Mars Mountain Climbing/opentext1).
O oN
pe o
Figure 42-17:
D
O oN
pe o
D
Figure 42-18:
n tD
Te i
Content Server informs you that the password has been updated, and
requires you to enter the changed password to sign in.
Figure 42-19:
O oN
Password
n tD
Te i
xt str
In ibu
te te
25. Enter the updated password (e.g., opentext2) and click Sign in.
rn
displayed
U
se
O
Figure 42-20:
nl
Enterprise Workspace of
y
Summary
In summary, in this chapter we:
Configured Department selection tool
Configured Group Settings
O oN Configured User Name Display
pe o
D
n tD
Te i
xt str
In ibu
te te
rn
al
U
se
O
nl
y
Exercises
This exercise will provide you with an opportunity to practice what you have learned earlier in this
chapter about the administering Users and Groups. This exercise will focus on some frequently used
settings, such as configuring the Department Selection and the Group Name Display.
2. Navigate to the Administration pages > Users and Groups Administration section. If
O oN
5. From the Global Menu bar, select Enterprise > Users and Groups.
xt str
6. Find: User Last Name that starts with Admin, and click Edit opposite Susan Adminvokova to
edit her user profile.
In ibu
8. From the Configure Department Selection page, select Department dialog and click
rn
Submit.
al
1. In a separate browser window or tab, navigate to your Personal Workspace and add a
document (e.g., matri.xdoc) and from its Functions menu, select Properties > General.
3. For the English language configuration, select Append (Log-in) ID and FirstName
MiddleInitial. LastName as the Display Name Format and click Submit.
4. Revisit the Properties > General tab of the document viewed earlier and notice how the sign
in name has now been annotated, as in the following figure:
O oN
pe o
D
n tD
Objectives
Overview
O oN
pe o
This chapter deals with the administration of Web Edit Settings and in
D
n tD
Figure 43-1:
Te i
Administration Pages
xt str
In ibu
te te
rn
This configure page allows you to set preferred editors for individual
MIME types (e.g. Microsoft Word will edit *.doc* files) and enable or
O
If the client does not have Office Editor installed, it can be installed via the
Web UI by default.
The Editor section of the Configure Web Edit Settings page is displayed.
Figure 43-2:
Settings
pe o
D
n tD
Te i
xt str
In ibu
Editors The editors available for configuration depend on the Content Server
modules that you are using, but can include ActiveX Editor and WebDAV
te te
When you set the editor preference, you specify a numeric value.
al
Content Server Display The default Content Server Display Name box,is in the form of <host>/
se
Name <OTHOME> which is the name of the repository that appears in the
Office Editor desktop client.
O
Enable Installer Download In situations where the Office Editor is not installed on a [supported
nl
Windows] client, users can download an installer if this has been enabled
y
by an administrator.
When a new version is This setting enables a user to upgrade old versions of the Office Editor
available client to the very latest version from the Content Server Web UI. Prompt
for upgrade requires 'Enable Installer Download' setting to be enabled.
Options include:
Choose Do not display or prompt for upgrade if you do not want to
prompt users to upgrade to the most recent version of the Office
Editor client. This is the default setting
Choose Provide users with the option to upgrade, or continue using
any compatible older version if you want to let users decide if they
want to upgrade to the most recent version of the Office Editor client
O oN
Use doc.Fetch for All This setting configures the Open function in Content Server.
n tD
Opens
Clear the check box to open all configured documents, as you have
Te i
specified in the MIME Types for Office Editor section, in their native
applications. Office Editor automatically downloads documents to the
xt str
document cache and then opens it from there. This is the default setting.
In ibu
Select the check box to open all documents using the Content Server
default implementation (doc.Fetch). If you select this option, Office Editor
te te
Enable Document Caching This setting configures the ability to keep most recently used documents
in the Office Editor cache. This setting applies to documents edited from
al
The MIME Types section of the Configure Web Edit Settings page is
displayed.
O oN
pe o
D
Figure 43-3:
n tD
Settings Page
xt str
In ibu
te te
rn
al
U
se
Select Support Office Editor for selected MIME types if you want to use
Office Editor to open and edit only the specified document types. You can
O
edit the list of supported MIME types as required. This is the default
nl
setting. You can alternatively select Support Office Editor for all
documents if you want to use Office Editor to open and edit all types of
y
documents.
When documents are The When documents are saved setting allows the system to be
saved configured to specify which versions will be kept during an edit session
and which Microsoft Office documents can be created ‘in-line’ from the
Add Item menu and selecting Document. The default configuration is to
all of the available Microsoft Office document types and versions.
The Add New Documents section of the Configure Web Edit Settings
page is displayed.
O oN
pe o
D
Figure 43-4:
n tD
The Add New Document section of the Configure Web Edit Settings page
allows the system to be configured to support which versions will be kept
nl
created ‘in-line’ from the Add Item menu and selecting Document. The
default configuration is to support all of the listed Microsoft Office
document types and versions.
6. Click Submit.
7. Navigate to the Enterprise Workspace > Product Development folder.
8. From the Add Item menu, select Document.
9. Click New, and the Microsoft Office file type, for example, Word 2010, as
illustrated in the following figure:
O oN
pe o
D
n tD
Te i
xt str
In ibu
te te
Summary
U
se
Exercises
This exercise will provide you with an opportunity to practice what you have learned earlier in this
chapter about the configuring Web Edit Settings. This exercise will focus on configuring settings to
support only the most recent Microsoft Office versions for inline editing.
3. Navigate to the administration pages, using your preferred method, which may include:
O oN
c. the Global Menu bar > Admin > Content Server Administration
Te i
4. Navigate to the Administration pages > Web Edit Administration section. If prompted for
the Administration password, enter opentext.
xt str
In ibu
te te
rn
al
U
se
O
nl
y
5. Click Configure Web Edit Settings and scroll down to the Add New Documents section.
Configure the settings so that only Office 2010 and more recent versions are utilized by
Web Edit, as illustrated in the following figure:
O oN
pe o
D
n tD
Te i
xt str
In ibu
te te
rn
al
U
se
6. Click Submit.
O
nl
7. Navigate to the Enterprise Workspace and from the Add Item menu, select Document.
y
8. Click New, and the Microsoft Office file type of Word 2010 or later, as illustrated in the
following figure:
O oN
pe o
D
n tD
Te i
xt str
In ibu
Notice how Word etc. 2007 and earlier versions are not available from
the list.
te te
rn
al
U
se
O
nl
y
Objectives
Overview
pe o
D
n tD
The Web Forms administrative options and links are described in the
following table:
xt str
Exported as HTML support routines for forms. You may also add your
own file of custom support routines.
al
Connection Encryption Set or alter the encryption key used to protect your
U
Manage Secure Database Create, list, and edit executable database lookups.
Lookups
n tD
Te i
xt str
In ibu
te te
rn
al
U
se
O
Your web server must have read permissions for the custom JavaScript
include file, otherwise the HTML template views will not be able to
include the JavaScript file.
Figure 44-2:
All new and existing database connections encrypt their passwords when
In ibu
you create a connection encryption key. Changing the key updates all of
the connection objects. Only the password is encrypted.
te te
Figure 44-3:
O
Connection Encryption
nl
Key Page
y
[HForm]
AllowUnsafeDatabaseLookups=true
n tD
Figure 44-4:
Te i
Page
In ibu
te te
If any connections from previous releases are found, they are listed on
rn
this page and the information will include the database name, database
type, and the user name of the account that was used to access the
al
database.
U
The Web Forms Connections page is displayed. In new systems, this page
will not have any connections listed, because they have to be added to the
system.
O oN
pe o
D
n tD
Te i
Figure 44-5: Web Forms Connections Page with Examples of Database Connections
xt str
Figure 44-6:
O oN
Figure 44-7:
y
7. Enter the name of the SQL Server (e.g., the host name of
TrainOTCS\SQLSERVER).
8. Enter the name of the SQL Database (e.g., AdventureWorks)
The name of the SQL Database can be obtained, for example, using
Microsoft SQL Server Management Studio.
You can use Secure Database Lookups to create the SQL statement that
n tD
To bind the values passed in from the form to the SQL statement, use the
al
value of the first parameter, and :A-2 would be replaced by the value of
se
you select the Filter Output Based On Permissions check box, then the
y
The Step Set continues from the previous Step Set and the Web Forms
Database Lookup Administration page.
The Web Forms Lookups page is displayed. In new systems, this page will
not have any lookups listed, because they have to be added to the system.
n tD
Te i
xt str
In ibu
te te
rn
al
U
The reason for the LoginID clause will become apparent shortly, but it is
because of the login-based table lookup that the form will be doing
The admnistrator’s job would be finished up to this point in the Step Set,
in terms of configuring etc. the necessary forms connection and lookup,
however, for illustrative purposes, your instructor may choose to
optionally demonstrate a working example of a similar connection, lookup
and form.
6. Navigate to the Enterprise Workspace > Course Material > 2-0114 Forms
> AdventureWorks Lookup folder.
7. Click on the AdventureWorks-HR-Employee Form.
8. Using one of the login IDs found in the C:\Instructor Resources\2-0114
Forms\adventureworks sql query.txt file (e.g.adventure-works\kevin0),
copy and past that ID into the LoginID field and click the mouse away from
O oN
the field.
pe o
D
Figure 44-9:
In ibu
Example of a Working
Form Lookup
te te
rn
al
Summary
U
se
Objectives
Overview
O oN
pe o
following table:
Te i
Manage Tags and Sub-Tags Enable and disable tags and sub-tags.
nl
Manage User / Group WR Determine which Users and Groups can trigger
Triggers WebReports.
Manage WebReports Change the Sleep Interval for the Conversion Agent
Conversion and set input and output directories to manage PDF
conversion.
Manage WebReports Change the Sleep Interval for the Schedule Agent and
Schedules Enable/disable or permanently delete individual
schedules.
Administration syntax.
D
WebReports Sub-tag Used to test build and sub-tags that have been
n tD
WebReports that ship with Content Server (for example with the Records
Management module), can be run, however, for administrators or report
xt str
WebReport Overview
al
U
users.
O
n tD
Te i
xt str
Figure 45-1:
In ibu
WebReport Architecture
and Components
te te
rn
al
U
se
O
the scope of this course. For more information regarding the use
y
WebReports Administration
WebReports Administration
n tD
Te i
xt str
In ibu
te te
rn
Figure 45-2:
al
Administration Pages
U
se
O
nl
y
Flush Cache
This page lets an administrator remove all compiled Reportviews from
the cache location. This is useful if you are having problems with certain
Reportview compilations, as any removed objects will be re-compiled. It
should be pointed out that the purge only flushes the cache for the server
that rktengine.flushcache is run on.
Figure 45-3:
n tD
The page also reports the number of objects that were purged.
In ibu
Use the Install Requests.js Library page to install the requests.js library
and associated files to the JavaScript library location: /img/webreports/
O
library/.
nl
Figure 45-4:
Page
pe o
D
n tD
Te i
xt str
For more information regarding the Install Requests.js Library page, refer
In ibu
Attributes. The administration settings for this feature allow basic control
of the output format and settings which can help set limits on the
y
O oN
pe o
D
n tD
Te i
Figure 45-6:
se
n tD
Te i
xt str
In ibu
te te
rn
Figure 45-7:
al
To use this data source the Data Source Type must be set to: Search
Query Launch. However, the Search Integration feature must be enabled
from the Manager Search Query Integration page. The Search Query
Launch data source will be available to any user that has permissions to
run that particular WebReport. Search Query Integration is disabled by
O oN
default.
pe o
D
Figure 45-8:
te te
Figure 45-9:
Confirmation Dialog
The page is updated and a [blank] Search Button Title field is displayed;
the entered text corresponds to the button’s face on the Advanced
Search Page, for example “ WebReport Search Query”, as illustrate in the
following figure:
Figure 45-10:
Example of a WebReport
using Search Integration
O oN
pe o
D
Figure 45-11: Example WebReport Output Using Content Server with Enabled Search Query Integration
n tD
Te i
xt str
In ibu
te te
rn
Figure 45-12:
al
Page
se
O
nl
y
Figure 45-13: Source Tab of a WebReport Illustrating the Use of an External File
O oN
pe o
D
n tD
Te i
xt str
WebReports and the The file path that's stored on the Source tab of a WebReport will be
te te
Manage Trusted Files validated against the whitelist at runtime. If the requested source file
Whitelist: path does not match any entries in this list, the WebReport will return
rn
regular error message page and the report will not execute
In order to use an External File as a data source of a WebReport, the
U
C:\WRSourceData\mySourceFile.csv and
C:\WRSourceData22\myOtherFile.csv
Te i
For security purposes, do not add "C:*" as a valid file path to this
rn
Figure 45-15:
n tD
E-mail
se
Server
nl
O oN
pe o
D
n tD
page, refer to the online help or the installation and administration guide.
In ibu
There are many reasons why scheduling WebReports can be practical, for
example:
Running large reports outside busy work times
Storing results for later use by delivering popular reports as static
documents
Updating report files once per hour to avoid hitting the database with
a report query every time a user accesses the information
Provide specialized notification functions
n tD
Te i
xt str
In ibu
This feature offers tremendous power and flexibility for reporting or web
application developers. As with many powerful features, it follows that
this capability also has potential risks if used improperly. To reduce these
to a minimum WebReports scripting has been carefully secured and
constrained in a configurable way that allows each Content Server
instance to choose precisely which script features should be enabled and
which not.
Presently the only script language supported is OScript. OScript has the
advantage of running natively on the Content Server platform and hence
offers excellent performance. Although technically it is not required for
creating WebReports with OScript, developers with access to the
Content Server SDK will benefit from the Content Server Builder's
debugging facilities. In practice, for anything but relatively simple scripts
access to the Content Server Builder debugger will be essential to allow
developers to step through their code and debug it.
n tD
Te i
xt str
In ibu
te te
rn
al
U
se
Figure 45-19:
O oN
pe o
Manage WebReports
D
Services Page
n tD
Te i
Manage WR Triggers
U
be enabled or disabled. Enabling the feature for a sub-type will cause the
WR Trigger option to appear on function menus for that node.
y
Figure 45-20:
Figure 45-21:
Miscellaneous
WebReports Settings Page
WebReports Licensing
This page provides similar information to that available from the License
Management page.
O oN
Figure 45-22:
rn
WebReports Licensing
al
U
se
O
nl
Only WebReports that have a tick in the Upgrade WebReport check box
will be updated when applying your selection. The rest will remain on this
O oN
report where you can come back to them at a later date. The WebReports
that are selected will have a new Reportview version added which can be
pe o
D
Figure 45-23:
rn
WebReports Node
Administration
al
U
se
O
In this particular example, there are no WebReports that are using out-of-
y
date syntax.
more sub-tags in the sub-tags folder, are invalid and do not compile.
pe o
D
If this copy of WebReports has not been changed since loading the
module, and errors appear here, then OpenText support should be
n tD
Figure 45-24:
U
WebReports Sub-Tag
se
Builder Page
O
nl
y
Summary
In summary, in this chapter we:
Configured WebReport Administration settings in Content Server
O oN
pe o
D
n tD
Te i
xt str
In ibu
te te
rn
al
U
se
O
nl
y
Objectives
Overview
n tD
Workflow Administration
In ibu
te te
Configure Workflow The Configure Workflow Agent Parameters page is used to specify the
Agent Parameters schedule or intervals when the Workflow Agent runs, enables error
rn
Figure 46-1:
Workflow Administration
Page Section
O oN
Figure 46-2:
pe o
D
Workflow Administration
n tD
Page
Te i
xt str
In ibu
te te
rn
al
The Workflow Map designer has an option for each task to be assigned as
soon as the previous task is completed, or to be scheduled with an agent.
O
If you are initiating a very high number of workflow tasks, then the
workflow agent allows you to schedule the processing load at specific
nl
Understanding the The tasks you define in a user, initiator, form task, or Item Handler
Workflow Agent workflow step can be performed by the Workflow Agent, which causes all
step processing to be handled transparently (in the background), without
user interaction. If you do not use the Workflow Agent, the step must be
sent by the step assignee to complete step processing. By default, the
Workflow Agent is configured to gather and perform background tasks
every 10 minutes (i.e., 600 seconds), but the administrator can specify a
custom schedule that controls when the Workflow Agent runs.
The Workflow Agent for the Outdoor Gear system has been
reconfigured from the default of 600 seconds to 60 seconds for a
O oN
n tD
step -- notice the Assignee field with the enabled Execute using Workflow
Agent:
xt str
In ibu
te te
rn
Figure 46-3:
al
the Agent
O
nl
y
Figure 46-4:
n tD
Te i
xt str
If you imagine that Outdoor Gear makes extensive use of Content Server
workflows and map designers have taken advantage of ‘send on
processing’, the load on the agents might be so great during regular
business hours, that they could be scheduled to run off-hours rather than
running every 10 minutes. Also, additional dedicated ‘workers’ could be
created to also run during the off-hour period.
Refer to the Search chapters and the Distributed Agents (DA) for
additional information regarding the scheduling of workers.
In the figure below, a DA worker could be configured for off-
hours processing of workflow tasks.
O oN
pe o
D
n tD
Te i
xt str
In ibu
te te
rn
al
U
se
O
nl
y
Figure 46-5:
4. Click Save Changes and then restart the Content Server service using the
Windows Services.
Workflow Agent Control The Workflow Agent error notification has to be enabled so that Content
n tD
Parameters -- Errors and Server can dispatch error messages when automatic workflow processing
FIFO Order (i.e., send on) fails or encounters an issue. If you disable error notification,
Te i
specify the email server SMTP settings and the sender’s email address in
the Configure Notification section of the Content Server Administration
al
pages. Workflow managers and step assignees must have their email
addresses listed in their Content Server profiles to ensure delivery of
U
these messages.
se
page. The Workflow Agent will then use Distributed Agents for parallel
processing.
y
Configure Workflow The Configure Workflow Parameters page allows you to set a number of
Parameters defaults for viewing workflows and their audit trail.
For example, you may have hundreds of workflows running at any time, so
you could filter the view to show only late workflows. Similarly, error
emails could be sent just to the Master Manager rather than All
O oN Managers.
pe o
D
Figure 46-6:
n tD
Configure Workflow
Te i
Parameters Page
xt str
In ibu
te te
rn
Select Don't include user names to exclude users' names from the audit
al
Select Allow user proxies to grant users the ability to assign another user
O
Open the Workflow An example of the Workflow Volume is illustrated in the following figure:
Volume
O oN
Figure 46-7:
pe o
D
Workflow Volume
n tD
Te i
xt str
In ibu
te te
rn
al
Viewing Workflow The Workflow Volume page allows you to view the contents of the
Attachments Workflow Volume. You can also set permissions on workflows and
U
If Public Access is not configured for a workflow, users cannot initiate it,
because Content Server stores attachments added to the workflow
attachments folder in the Workflow Volume. Using the Workflow Volume
page, you can assign users privileges to view and add attachments.
Summary
In summary, in this chapter we:
Configured the Workflow Agent Parameters and Workflow
Parameters using the Administration pages
Navigated to and work within the Workflow Volume, including
adjusting volume permissions as required by the organization
O oN
pe o
D
n tD
Te i
xt str
In ibu
te te
rn
al
U
se
O
nl
y
O oN
pe o
D
n tD
Te i
xt str
In ibu
te te
rn
al
U
se
O
nl
y
Objectives
Overview
pe o
D
n tD
Introducing Prospectors
xt str
Prospectors act like robots scanning and filtering items newly added to
In ibu
Prospectors list items matching its search criteria on their results page,
accessible by clicking the prospector’s name. The results change as items
nl
that match your search criteria are added to or removed from the
y
Content Server indexes. You can manually delete the results; or, if you
want to reference a result long-term, either lock it, or create a snapshot of
all the results. You can lock up to 50% of a prospector’s results, or
preserve all results by taking a snapshot of the result.
Introducing Prospectors
O oN
pe o
D
Figure 47-1:
n tD
Example of a Prospector
Te i
xt str
In ibu
te te
rn
al
U
4. Add a new folder (e.g., Heated Tents Prospector Demo Folder) to Product
se
Development.
5. Add at least one word document, excel spreadsheet and pdf file, from
O
C:\SampleDocs into the newly created folder so that the name and
description both contain the phrase ‘Heated Tents’.
nl
Figure 47-2:
O oN
pe o
D
n tD
Te i
Prospector Administration
te te
rn
Prospector Administration
al
Figure 47-4:
Administration Pages
n tD
Te i
xt str
In ibu
te te
Prospectors are based upon search queries applied in the Index Engines
al
performance is affected.
se
Figure 47-6:
O oN
Regenerate Prospector
pe o
Query Files
D
n tD
Te i
Prospectors are based upon search queries applied in the Index Engines.
In the unlikley event that the query files were deleted or became corrupt,
xt str
The Status page is displayed and updated as it regenerates the query files:
rn
al
U
Figure 47-7:
se
Status of Regeneration
O
nl
y
Summary
In summary, in this chapter we:
Created a Prospector
Configured Allowable Prospector Queries
Regenerated Prospector Queries
Exercises
This exercise will provide you with an opportunity to practice what you have learned earlier in this
chapter about the Prospectors.
Create a Hierarchy
3. Create a new Prospector called Unsinkable Kayak Prospector and it should be configured
pe o
according to the example found earlier in the chapter; the keyword should be kayak.
D
4. Add a new folder called Unsinkable Kayak Prospector Folder to Product Development.
n tD
Te i
5. Add at least one word document, excel spreadsheet, and pdf file, from C:\SampleDocs into
the newly created folder so that the name and description both contain the phrase
‘unsinkable kayak’.
xt str
7. Click Regenerate Prospector Query Files followed by Regenerate Query Files. Content
rn
Server should report that Prospector queries in the system have been refreshed:.
al
Successfully saved the queries for Prospector: Unsinkable Kayak Prospector (DataID 863526)
se
8. Return to the Prospector and click on its name. Although file names and types may vary,
depending on which files you uploaded to Content Server, the Prospector should report
O
them as part of its “data mining” based on the specified kayak keyword used earlier, as
illustrated in the following illustration:
nl
y
Objectives
Overview
n tD
Users will find that Content Server include Transport and Transport
Warehouse functionality. Due to changes in item naming, legacy users
y
will find that a Transport Box Folder is now called a Transport Package
Folder and a Transport Box is now called a Transport Package.
Transport Overview Content Server Transport provides a framework for transferring objects
across instances of Content Server.
Intended Users Some Content Server export and import functionality, for example XML
import, requires the involvement of a user with system administration
rights. Transport, however, has been developed for use by people like
power users or knowledge managers.
Goal The eventual goal of Transport is to help move business applications (such
as a workflow) and configuration between systems. For example,
customers build a business solution in a development environment, and
then want to try it in a test environment, and finally, move the solution to
a production environment.
Transport is not about the bulk moving of data. Because we are trying to
move a complete business application or solution, that means ensuring
we get all the necessary pieces, and correctly link them back together on
the target system and resolve all the component relationships (i.e.,
dependencies) rather than merely moving content. Content Server’s XML
export and import itself cannot achieve this level of content transport.
O oN
the target system
rn
Figure 48-2:
pe o
D
Administration pages.
al
Administrators or accounts granted the System Administration privilege, have access to the
se
Transport Administrators are able to select the object and package they
want to transport with Transport Packages – like shipping containers.
The received package can then create items in a new Content Server
instance based on the information contained in the Transport Package.
Volumes and Sub While navigating the Transport Warehouse, there are a number of
Types objects or Sub Types.
The table below identifies the Sub Types used to support Transport and
its functionality.
Workbenches 532
In ibu
Figure 48-3:
y
Transport Warehouse
Warehouse Folder A container used to store the items you are preparing to transport to a
different system.
Workbench A Workbench, which is made up of several folders and boxes, and can be
used by multiple users.
The vision for Workbenches is that they are temporary staging areas
when assembling a transport payload, or preparing to deploy. Anything
that does not seem to be necessary for that purpose is removed to try and
simplify the solution. Workbenches are not, however, intended to be
general purpose folders.
O oN
pe o
that are needed for an application. They can also test the application,
Te i
Users cannot move or copy transport items after they are in the
rn
Workbench and Single Users can use a single Content Server system as a Transport source to
Source Systems reproduce the entire transport cycle:
se
Workbench and Multiple Users can also use multiple Content Server systems as Transport sources
Source Systems to reproduce the entire transport cycle:
My Workbench The My Workbench page contains a list of all the Workbenches that you
have permissions to see.
O oN
pe o
D
n tD
Figure 48-4:
Te i
Workbenches
In ibu
te te
rn
al
U
se
O
You can click a Workbench’s link to open it, or you can click the link in the
nl
Workbench.
Figure 48-5:
O oN
My Workbench Page
pe o
D
n tD
Te i
xt str
Transport Package A container used to store the items to be transported to a target system.
The items on the Workbench are placed into the Transport Package, and
In ibu
then the Package is exported as a ZIP file and imported to the target
instance of Content Server.
te te
rn
Administration
O
Figure 48-6:
Warehouse
Administration and
Warehouse Settings
O oN
pe o
D
n tD
Figure 48-7:
rn
another.
pe o
D
n tD
For illustrative purposes, if the Add to Warehouse Limit value was set to
Te i
the folder.
al
U
se
Figure 48-8:
O
Options
y
Included Objects The Included Objects option is displayed when the selected material to
Warehouse includes a Folder (or similar container). In contrast, the option
will not be displayed when the selected material does not include a Folder
as illustrated below.
Figure 48-9:
No Included Objects
Option
O oN
pe o
D
n tD
The page will update and report that 23 objects will be included in the
Te i
transport operation.
If the Included Objects option is selected and Content Server has been
xt str
message stating that you have exceeded the maximum number. The error
te te
Figure 48-10:
se
Exceeded Maximum
Number for Warehouse
O
Transport
nl
y
If any there are any items that cannot be transported, they will
be reported on the Excluded Objects row, as illustrated in the
figure above.
Transport Roles and The following list of Transport objects can be used by anyone with access
Object Permissions to the Transport Warehouse. If you want these items to be created by
specific users, you can restrict access to the objects on the System
Administration > Administer Object and Usage Privileges page.
Transport Item
Workbench
Warehouse Folder
Transport Package Folder
Transport Package
CS Application Manifest
O oN
pe o
Manager privilege.
xt str
Transport Roles The functionality that is available to you is dependent upon your assigned
role. Transport users are Administrators, Warehouse Managers, or
In ibu
Developers.
te te
Transport Roles are hierarchical, which means that users can perform the
functions allowed by the privilege they are assigned, as well as the
rn
functions for the privileges assigned to the roles below them. For
example, Administrators can perform Warehouse Manager and
al
Administration page.
y
Administrator The Administrator has primary control over Content Server, and can
perform certain tasks that standard users cannot because of security
settings and permissions. The Administrator specifies which users have
Warehouse Manager permissions.
Figure 48-11:
rn
Transport Items,
Unrestricted
al
U
se
3. Click the Restrict link for Workbench and click OK when prompted to
continue.
O
4. Change the Find from User Last Name to Group Name using the drop-
y
down list, enter transport in the that starts with field, and click Find.
Figure 48-12:
Figure 48-13:
O oN
Transport Items,
pe o
Restricted
D
n tD
8. Scroll down the page to the entries under the Usage Privileges section.
Te i
xt str
In ibu
Figure 48-14:
te te
rn
Usage Privileges
al
U
se
The page will update the Edit Group – Warehouse Manager ({525,1}).
nl
10. Change the Find from User Last Name to Group Name using the drop-
y
down list
11. Enter transport in the that starts with field and click Find.
12. Select Add to group and click Submit.
13. When you are finished adding members click Done.
Transporting Items Various objects can be transported to a target Content Server instance as
follows:
te te
rn
Document Facet
Folder Facet Folder
al
1. Sign in as kmanager/opentext.
D
Figure 48-15:
al
4. Enter the name of the Warehouse Folder (e.g., West Coast Warehouse
y
The page updates with the new folder in the Transport Warehouse.
7. Enter the name of the Workbench (e.g., West Coast Workbench). Entering
a Description is optional, then click Add.
The page updates with the new Workbench in the Warehouse Folder.
4. From the System Administration page, click Open the Categories Volume
Te i
Figure 48-16:
U
Add to Warehouse
se
O
nl
y
Figure 48-17:
Adding ProductSpec
Category to Warehouse
O oN
pe o
Add to Workbench The Workbench will be the destination of the selected documents and
D
folder.
n tD
7. Click the Warehouse Folder (e.g., West Coast Warehouse Folder) link and
In ibu
Duplicate Handling The Duplicate Handling option controls whether newly transported files
U
9. In the Duplicate Handling field click Replace then click Add to Warehouse.
O
11. Navigate to the Advanced Search page by selecting Tools > Search from the
Main menu to add a pair of documents to the Workbench.
O oN
pe o
D
n tD
Te i
xt str
In ibu
12. .Click the Categories link under the Add to Search Form panel.
rn
13. On the Select Category page, opposite Product Spec, click the Select link.
al
14. From the Green Attribute, select True from the drop-down list and click the
Search button at the bottom of the page.
O
nl
y
O oN
pe o
D
n tD
Te i
O oN
pe o
D
Add to Transport Package Once a Workbench contains all the items required for transport and the
Workbench has been reviewed, the items are added to a package.
xt str
Adding to a Package means that you are finalizing the items for transport
to the target system. Once the Package is finalized, it is moved to the
In ibu
The Add to Transport Package function is the final Workbench task for
non-Administrator users; however, the Warehouse Administrator still
al
6. Enter a Transport Package Name (e.g., West Coast Transport Package) and
click Add.
nl
The page is updated and reports that the newly created Transport
y
7. Click OK.
8. From the Global menu select Enterprise > Transport Warehouse and click
the Transport Packages link.
9. The Transport Package appears in the Transport Warehouse.
O oN
pe o
D
n tD
C:\Downloads\.
In ibu
Deploying After the items in a Workbench have been packed into a Package the
te te
unpacking activity.
n tD
Te i
6. Inside the Warehouse Folder, add a new Workbench (e.g., Workbench for
West Coast).
te te
rn
7. From the Global menu, select Enterprise > Transport Warehouse, and
select the Transport Packages folder.
O
O oN
pe o
D
n tD
Figure 48-23: Transport Package From the Source Content Server System in Destination System
Te i
14. Click the Transport Package from the West Coast link.
xt str
The original box information and its content details are displayed.
In ibu
te te
rn
al
U
se
O
nl
y
18. Click the Select link opposite the Workbench (e.g., Workbench for West
Coast).
The page is updated and the Unpack to field shows the destination
Workbench.
Figure 48-25:
Package
pe o
D
n tD
Te i
Warehouse > From West Coast Warehouse > Workbench for West Coast).
rn
Handling Transport Transport scans the system to verify that item dependencies are met, at
Dependencies the point where a Workbench is about to be deployed to a target system.
al
automatically assigned.
y
not ready to be deployed, you can use the Edit button to make
changes before starting the deployment. If the parent container
n tD
of an item does not exist on the target system, you can change
Te i
the parent container to one that does exist (we will see this
shortly).
xt str
In ibu
3. Click the Product Spec link which has a status of ‘OK to deploy’.
O oN
pe o
D
n tD
Te i
xt str
In ibu
te te
and/or applicable):
U
Version The current version number of the item that will be deployed.
O
nl
Originating Instance The Content Server instance where the original item was located.
If an item you are deploying has dependencies on other items, they are
also listed on the item’s Overview page.
Type The type specifies whether the dependency falls into one of the
previously discussed range of areas, including: Parent, Permissions,
Category, Classifications or Custom.
Original Name/Value The name of the item from the original or source Content Server System.
O oN
Current Name/Value The name that will be used for the item when it is deployed.
pe o
D
Warehouse Administrator.
In ibu
Exists in Instance If the dependent item exists on the target system or instance, a green
te te
check mark appears indicating that an item with same name already
rn
exists. The item would have to be renamed using the Edit button to avoid
a naming conflict or collision.
al
If the dependent item does not exist on the target system or instance, a
U
red “X” appears indicating that an item with that name does not exist.
se
Exists in Workbench If the dependent item exists on the Workbench, a green check mark
appears indicating that the item is ready to deploy.
O
If the dependent item does not exist on the Workbench, a red “X” appears
nl
indicating that the item is not ready to deploy. The item would have to be
updated using the Edit button to assign a new parent container.
y
Status The status of the dependency, including: Deployable, [Parent] Not found,
Not Applicable.
4. To edit the Current name/value of the Category of the Parent type, click
Edit.
In this example, the default destination of the Category is the same as the
source location: the Content Server Categories Volume. Assuming you
wanted to deploy the Category to a different Folder, for example, you
would then click the Browse Content Server button and select a new
destination location such as a folder in the Enterprise Workspace.
O oN
pe o
D
5. If you clicked the Browse Content Server button, click the Cancel button to
cancel any changes you have made.
xt str
6. Click Close.
O oN
pe o
D
n tD
Te i
xt str
In ibu
te te
rn
al
11. Click the Select link next to Enterprise; for illustrative purposes the
document will be redirected to the Enterprise Workspace in the target
instance.
13. Using Edit, systematically map each “Not found” group to Default Group
pe o
D
and each “Not found” user to Admin user. Remember to click Save after
each edit operation.
n tD
The Status for the document is updated from Parent: Not found to
Te i
Also notice how the ProductSpec Category does not exist in the
target instance but does exist in the Workbench and that the
status states “Dependency must be deployed first”.
This means that the user does not need to perform any
corrective action; however, it does mean that the Category must
be deployed first, in advance of the documents, to deal with the
Category-Document dependency requirements.
The Status for all of the items should indicate they are “OK to deploy” as
illustrated in the figure below.
O oN
pe o
D
n tD
Te i
xt str
20. From the sleeping bag.doc’s Functions menu, select Properties >
O
Categories.
nl
y
The Categories tab is displayed with the Product Spec Attribute values,
confirming that the document and associated Category were successfully
transported.
O oN
pe o
D
n tD
Te i
xt str
Summary
U
se
Exercises
In this exercise, you will transport materials from the C:\CS16 source Content Server system which
contains the Outdoor Gear assets into a Transport Package and then you will deploy a Workbench
created from Unpacking a Transport Package into the C:\CS16b target, which is a blank Content
Server 16 system.
The objective is to replicate the process of creating a Transport Package containing the following
items: ProductSpec, sleepingbag.doc and thermos.doc as illustrated earlier in this appendix.
O oN
Note: We are performing similar steps in the following exercise to those presented in the appendix
pe o
and the ‘West Warehouse’, however, we’re working with an ‘East Warehouse’ in the exercise.
D
n tD
Te i
This is already done from the exercise earlier in the appendix. The steps are listed as a review.
Continue to Create a Warehouse Folder and Workbench.
In ibu
te te
1. Sign into CS16 with sadmin /letmein and vavigate to the Admin pages; enter opentext as
the Administration page password when prompted.
rn
2. Click System Administration > Administer Object and Usage Privileges link.
al
3. Scroll down the page to the entries beginning with Transport Item.
U
4. Click the Restrict link for Workbench Item and click the OK button when prompted to
se
continue.
O
5. Change the Find from User Last Name to Group Name using the drop-down list, enter
transport in the that starts with field and click the Find button.
nl
6. For Transport Warehouse select Add to Group, and click the Submit button followed by
y
clicking Done.
8. Scroll down the page to the entries under the Usage Privileges section and click the Edit
Restrictions link for Warehouse Administration.
9. Change the Find from User Last Name to Group Name using the drop-down list, enter
transport in the that starts with field then click the Find button.
10. For Transport Warehouse select Add to Group, and click the Submit button followed by
clicking Done.
3. In the Name field enter East Coast Warehouse Folder and an optional Description and click
Add.
n tD
6. In the Name field enter East Coast Workbench and an optional Description and click Add.
In ibu
te te
rn
2. Click the Admin Pages link or update the browser URL to http://CS16/
se
4. Click System Administration > Open the Categories Volume link at the bottom of the page.
y
9. Click Replace.
12. Navigate to the Advanced Search page by selecting Tools > Search from the Main menu to
add a pair of documents to the Workbench.
13. Click the Categories link under Add to Search Form panel.
7. From the Global menu select Enterprise > Transport Warehouse and click the Transport
nl
Packages link.
y
9. When prompted, save the East Coast Transport Package.zip file to C:\Packages\.
2. Start the Content Server Service (e.g., CS16b instance) for the destination or target system
for the Transport items.
11. Select Enterprise > Transport Warehouse from the Global menu.
n tD
14. In the Name field enter Transport Package from the East Coast.
xt str
15. Click the Browse button opposite the Transport Package File field.
In ibu
16. In the Transport package File field click the Browse button.
te te
rn
17. Navigate to C:\Downloads\ and select East Coast Transport Package.zip. This contains the
transported items from the source Content Server system.
al
18. Click Open followed by Add then click the OK to return to the Transport Packages folder.
U
19. Click the Transport Package from the East Coast link.
se
21. In the Unpack to field click the Browse Content Server button.
nl
24. Click the Select link next to Workbench for East Coast.
25. Click Unpack followed by OK to continue and return to Workbench for East Coast.
1. From Enterprise Workspace > Transport Warehouse > From East Coast Warehouse >
Workbench for East Coast (continue directly from the previous exercise) click the Deploy
Workbench link.
3. Notice the green check mark for the Exists in instance and Exists in workbench columns. If
needed you can click the Edit button to modify the Current name/value.
4. Click the Edit button opposite the Parent: Product list (pending) item then click Close.
5. Click the thermos.doc link to resolve any outstanding dependency issues, if needed, then
click Close.
6. From the Workbench for East Coast page click the Deploy Workbench link in the upper
right corner.
O oN
7. Click Deploy followed by OK when prompted to confirm the deployment then click OK.
pe o
D
O oN
pe o
D
n tD
Te i
xt str
In ibu
te te
rn
al
U
se
O
nl
y
Objectives
Overview
pe o
D
n tD
Content Server has the ability to export almost every type of item in XML
format. You may exchange this data with remote systems, use it as a very
Te i
simple archive function, or import the data into another Content Server
instance.
xt str
In ibu
mechanism.
rn
al
XML has been integrated to provide both background support for related
features (e.g. searching) and specific XML functionality.
O
XML Export Any Content Server item can be exported as an XML document, from a
nl
single document to the entire enterprise. “Item” refers to the items you
can add to Content Server from the Add Item menu.
y
XML Skins Using XML Export and XSLT technology built into Content Server, you
can create different end-user interfaces (or “skins”) through which you
view the content. A skin lets you customize the interface so your users see
a narrower set of features.
XML Import Content Server objects can be imported from an XML document and be
converted automatically to Content Server items.
XML Workflow Allows the use of a workflow to communicate with external programs
Interchange Step using data in XML format. Communication can be one-way, where
Content Server simply exports information, or it can be two-way, where
Content Server exports information, the external program uses that data
(e.g. to update a database) and then sends a message back to the
workflow.
XML Search XML data uploaded to the Enterprise Workspace can be indexed and
made searchable by regions.
In this course, we will focus on using XML Export and Import for archival
activities.
information.
pe o
D
also send data from one program to another in a format that both the
Te i
Figure 49-1:
nl
and objtype.
Te i
To decipher the structure of an XML file, an application can use the XML
file’s corresponding XSD (XML Schema Definition). An XSD defines all of
xt str
the elements and structure that are valid for a particular document (XML
file) type. There are XSDs for Content Server data that defines how
In ibu
directory at OTHOME/support/xml/xsd/livelink*.xsd.
rn
The highest version of XDS file is the current one; previous versions of the
file are retained, to satisfy older XML Export output files that a customer
al
Elements are the building blocks of XML. They contain text, attributes or
other elements. Attributes in XML represent metadata or information
about a given element.
Figure 49-2:
n tD
Te i
Just What Can I Export and Import From Content Server as XML?
xt str
application
se
You can add new items (nodes) to Content Server by importing them from
XML files, either by entering a URL or by calling import functions from
O
Figure 49-3:
n tD
Te i
xt str
name=New Product.doc.
createdby=2624 (which is a user ID.)
al
As you click links on Content Server pages, you are sending function calls.
U
Each function has a name and (optionally) one or more parameters. The
se
figure below illustrates a call to the browse function. The system locates
the function code on the server and processes it. This usually involves
getting or putting data in the database, then using the WebLingo language
O
to return a result in HTML format. When you want to export data from
nl
Content Server, you just need to issue the right function call.
y
3. Modify the URL in the browser by replacing any characters that follow the
pe o
D
http://server/Content_Server/
Te i
cs.exe?func=ll&objID=2419&objaction=xmlexport
xt str
4. Press Enter on your keyboard. If you are using MS Internet Explorer, the
specified file will appear in your browser window as an XML file. If you like,
In ibu
you can now save this file to disk by using the File > Save As command on
your web browser.
te te
contain other llnodes. You can use parameters to control the levels
exported
nl
You will see an llvolume element at the top level if you export an entire
y
O oN
pe o
D
Figure 49-5:
n tD
And the same Finance folder illustrated with its XML exported
se
information.
O
nl
y
Figure 49-6:
If you specify no parameters with the xmlexport action, you will get a
pe o
D
basic set of information about the node. But you can add parameters to
the URL to include additional metadata and content for the exported
n tD
object(s).
Te i
For example, you can only use the content parameter if you also
specify the versioninfo parameter
In ibu
node
se
When would you use which parameter? Well, it depends on what you plan
to do with the output.
O
nl
you can imagine. To prevent your users from casually trying to,
for example, export the entire Enterprise Workspace, you can
set the MaxNodesToExport parameter in the opentext.ini file,
thereby restricting the number of nodes exported regardless of
how many sub-items there are.
Many additional parameters are described in the XML Import
and Export Guide.pdf (found on the Knowledge Centre). These
parameters are helpful for using XML for data exchange and
creating a custom interface.
version 9.1)
(no default, must specify)
al
where:
base64 = base64 encode the content (export it
as binary information)
O
Exporting Items That The XML data used by the XML import function must comply with the
You Plan to Import Content Server XSD. Data exported from Content Server will be
compliant if the XML export includes these parameters:
&nodeinfo–for all the associated information that describes the node
and defines its use in Content Server, such as its permissions and its
O oN
properties.
pe o
D
You will often want to export an item and its descendents, which means
In ibu
cs.exe?func=ll&objID=3011
Example URL for Exporting &objaction=xmlexport&scope=sub&nodeinfo&versioninfo
al
Figure 49-8:
A Fragment of XML
Exported Using All the
Right Parameters for XML
Import
1. ObjID–the node ID of the parent under which the new items should
pe o
be added.
D
2. Filename–the path and file name of the XML file containing the items
n tD
to be imported.
Te i
Figure 49-9:
rn
While this figure illustrates the XML Import was completed without
errors.
O
nl
y
Figure 49-10:
Figure 49-11:
Server server.
al
2. Get the objID of the object that should be the parent of the new item(s).
The objID is the unique ID number for an item. An easy way to get the ID is
U
to browse to the item and look in the URL for the string objID=.
se
3. From your web browser, enter a URL to trigger the import: After the basic
Content Server URL (http://host/CSinstance), add a call to the XML Import
O
?func=admin.xmlimport&filename=filename
y
&objID=parentid
For example:
?func=admin.xmlimport&filename=c:\odgfinance.xml&objID=393180
Content Server opens a status page. The page lists the location of the log
file generated by the process and other information about the import as it
executes.
Summary
pe o
D
Content Server allows you to export practically any node into XML to
n tD
you want exported.
xt str
If you want to export data that you plan to import into Content Server
again, use the &nodeinfo, &content and &versioninfo parameters.
In ibu
You can import XML content into Content Server, and this allows you
to exchange content between Content Server systems, or even in the
te te
Exercises
These exercises will provide you with a chance to cement your understanding of XML export and
import by importing an XML file that someone else created, then exporting and importing XML
yourself.
3. Archive the Atlanta Office Setup Tasks as an XML file in such a way that you can re-import it
pe o
D
a. Take a look at the task list’s contents before you perform the export.
Te i
b. Export the task list to XML, using the parameters that you need in order to import it
again. For example:
xt str
?func=ll&objID=xxx&objaction=xmlexport
&nodeinfo&content&versioninfo=all
In ibu
&scope=sub
c. Save the XML to a file, giving the file a short name and placing it at the root of your C:
te te
drive.
rn
4. Log in to the CS16b instance as the Admin User, and import the task list, like this:
al
a. Assume that you would like this task list at the top level of the Enterprise Workspace,
and note that the objID for the Enterprise Workspace is 2000.
U
b. Visit the Enterprise Workspace, and import the XML file you just exported. For
se
example: …?func=admin.xmlimport&filename=c:\xxx&objID=2000
c. Watch the XML import status page to see the progress. Was it successful? Look at the
O
d. Test your work. Does the task list appear to have the same content as it does in the
y
Imagine that the company for your Content Server installation has created a standard taxonomy for
customer Projects, and they have created a Project ‘master die’ for Projects in the form of an XML
export file. Whenever a new customer Project is defined, it is your job to set up the new project
using this ‘master die’.
1. While logged into your Content Server system as a system administrator, create a new
folder.
2. Locate the file projecttemplate.xml in your C:\SampleDocs\DTDs and XMLs folder. Import
the file projecttemplate.xml into your new folder (it is easiest to copy this file to the root
O oN
3. Watch the XML import status page to see the progress. Was it successful? Look at the log
files if you like.
n tD
4. When the import is successful, take a look at the results. If you like, edit the Project name
Te i
and other item names for the customer and Project–you can make up the names.
xt str
In ibu
te te
rn
al
U
se
O
nl
y
O oN
pe o
D
n tD
Te i
xt str
In ibu
te te
rn
al
U
se
O
nl
y
Objectives
Overview
n tD
By this point in the course, we hope that you have a fairly complete
Te i
In this chapter, we will give you an idea of the range of options for
In ibu
Here are some points to keep in mind as you discuss the structure of a
U
Performance implications Number and type of images on pages when using Custom View
Lengths of Assigned Access lists at the top of the Enterprise
Workspace
browser
Te i
server
te te
In order to give other users the ability to create Custom Views, you must
unrestrict the privilege to create them.
al
Although Custom Views are typically hidden along with supporting files
or graphics, these items are visibly illustrated in the figure below:
O oN
pe o
D
Figure 50-1:
n tD
in Human Resources
Information
xt str
In ibu
te te
rn
al
U
se
O
nl
y
Referring to the HTML code below, you will see how the JPG files are
stored in an ‘images’ folder within the folder containing the Custom View.
</td></tr><tr>
<td><i><b>Key areas:</b></i></td>
Te i
</tr></table>
xt str
Note the absence of <HTML> and </HTML> tags in the Custom View’s
HTML code.
In ibu
In Content Server, there are now several replacement tags that can be
te te
inserted into a Custom View. For example inserting the following tag:
rn
<ot:OTvar_node_childCount />.
<td colspan="3">
Visit this Folder early and often to find out the latest
O
Figure 50-4:
n tD
Te i
Image size: The larger the file size of images you display
se
larger HTML file, your web browser will ignore any tags
nl
Keep in mind that there are really three types of Appearances. Each one
corresponds to a level of control and can be used in conjunction with each
n tD
te te
Because the Global Appearance will impact the Appearance Volume and
all that the admin user sees outside of the admin area, it is worth creating
rn
a special Appearance for the admin user only. This Appearance will
include all standard Content Server UI and have no custom HTML. Only
al
the admin user should have See and See Contents permissions for this
appearance. It should also be alphabetically earlier than the others.
U
se
Remember that you can selectively remove parts of the interface and
optionally replace them with custom HTML. There is also some support
for dynamic content.
Active View
ActiveView was previoiusly an optional module for Content Server,
however, it is now part of the core product an no longer requires separate
licensing. It provides an object called an ActiveView, that is very similar to
a WebReport in many respects.
n tD
Te i
xt str
Figure 50-5:
In ibu
ActiveView Paradigm
te te
rn
al
U
se
Web Services The Services provides a library of functions for integrating Content
Server with external programs. It replaces LAPI (Livelink API) and
provides a more extensible framework for integration.
Content Server Builder When you need to perform customizations to the underlying [OScript]
source code of Content Server – for example, to create a new type of item
O oN
or add a new function – you can use Content Server’s IDE (Content Server
IDE or CSIDE) to create new modules. The IDE provides OScript plugins
pe o
D
for Eclipse provides a graphical user interface for defining module objects
and their features, plus a programming language called OScript.
n tD
Server items (i.e., contact list and suggestion box) and corresponding
modifications to their Functions menu.
xt str
In ibu
te te
rn
al
U
Figure 50-6:
se
Example of an IDE
Customization
O
nl
y
Summary
OpenText provides these aids for customizing Content Server:
Documentation (such as the Content Server Builder Development Guide;
https://knowledge.opentext.com/knowledge/cs.dll/Open/175018148)
Training including the following Content Server courses:
– 4-0140 – Content Server IDE (CSIDE) Fundamentals
– 4-0144 – Content Web Services Fundamentals
On-site assistance with custom information and community
modeling, and more, from different groups within OpenText Services
O oN
You can find out more about all of these from the OpenText web site,
n tD
www.opentext.com.
Te i
xt str
In ibu
te te
rn
al
U
se
O
nl
y
Exercises
Imagine that a new department at your site has decided to manage the lifecycles of their proposals
using Content Server, and they have come to you for advice. In this exercise, you will help this
fictitious staff define an information taxonomy for their proposals.
Note: This kind of work can take a great deal of time in real life, but time is limited here. Try to spend
no more than ten minutes on these steps.
O oN
a. There are about 30 documents involved in the creation of each proposal, some of which
are just “working documents” and some of which form the final document. Many
n tD
different people in the department, plus a few people outside the department, work on
these documents.
Te i
b. Every proposal has the same basic structure, and there is a set of standard templates
xt str
that the department uses whenever possible. There is also a large library of boilerplate
documents that are often pasted “as is” into a proposal. Only the proposal managers
may edit the boilerplate documents or templates.
In ibu
d. The staff currently uses a file server and a very large whiteboard to manage the
rn
elements of the proposal. They decorate the whiteboard with the logos of the company
whose business they are trying to capture, and they display a countdown to the due
al
date.
U
e. They often use email to ask each other questions about how to go about their work.
They spend a lot of time looking through old email messages trying to find answers to
se
Workflow Map. When it is complete and has been sent to the customer, they need to
nl
make certain that the version they sent is not lost and that the full company has read
access to it.
y
2. Now, answer these questions to the best of your ability given this scant information:
a. Considering the points in step Read this information that the department staff brought
to you:, how should the department structure its folder? Or should it use a project? In
what way would Shortcuts and/or URLs be useful? What else would you like to ask the
users in order to decide how to model the information?
b. What kind of folder presentations would be useful? How should the department use
Custom Views, Featured Items, and other presentation features? What else would you
like to ask the users in order to decide how to customize the presentation?
A. Continuing Education
Objectives
Certification Programs
pe o
D
n tD
With the completion of this course, you are a step closer to being certified
as a Content Server professional.
Te i
OTCSBC (5-0151)
rn
OTCSSD (5-0153)
se
O
nl
y
O oN
n tD
Te i
xt str
In ibu
te te
rn
other course prerequisites you need to take to be eligible for the program.
se
There is a program that you can attend which includes material review for
exam preparation, hands-on project, and the exam.
O
For the system administrative and customization aspects you may want
xt str
to consider:
Installing and configuring a Content Server system
In ibu
administrator
rn
using the Content Server Web Services, Content Server IDE (CSIDE),
or XML
U
Server, remember to check the online help and the Knowledge Center –
nl
discussions are e-linked, so you can read items and post questions and
Te i
answers by email.
The following figures show the initial page of the various OpenText
xt str
resources.
In ibu
te te
rn
al
U
se
O
nl
y
Figure A-5:
OpenText Knowledge
Center > Product >
Accelerating Adoption
O oN
Community
pe o
D
n tD
Te i
xt str
In ibu
te te
rn
al
U
se
Figure A-6:
O
OpenText Knowledge
nl
Community
Figure A-7:
OpenText Knowledge
Center > Product >
Discussion Forums
O oN
pe o
D
n tD
Te i
xt str
In ibu
te te
rn
al
U
se
O
nl
y
O oN
pe o
D
n tD
Te i
xt str
In ibu
te te
rn
al
U
se
O
nl
y
This appendix provides additional Content Server FSM or Storage Provider Rule information, in
support of the earlier chapter concerning Provider Rules.
The Configure Storage Providers page allows you to add more external
pe o
D
storage locations and allows you to add rules that direct your uploaded
documents to a specific storage device. Rules include the type filtering
n tD
rules that were previously part of the Content Move and Archive modules
Te i
When you define Storage Providers, you can set individual rules and
nl
Content Server; certain modules have specific rules that are available
only when that module is installed, like Archive Server and Records
n tD
Rule
te te
Zero Byte -1 The Zero Bytes rule is not really a rule but a hard coded behavior of
Content Server’s Storage Provider beginning with Update 10. Any
rn
displayed rule acts like a place holder for the system’s storage supporting
document files which have a size of zero bytes.
al
Size of the file in bytes is 1 If a document or object's file size exceeds the file size specified in this rule,
U
greater than the document will be stored in the Storage Provider specified by the rule.
Sizes are in bytes. For example, to represent 100 KB, enter 1048576.
se
Category name is 2 If a document or object has the specified Category assigned to it, the
O
MIME Type is 3 If a document is of the specified MIME Type, the document will be stored
in the Storage Provider specified by the rule.
y
Size of the file in bytes is 4 If a document or object's file size is less than the file size stipulated in this
less than rule, the document will be stored in the Storage Provider specified by the
rule. Sizes are in bytes. For example, to represent 100 KB, enter 1048576.
Node Name contains 5 If a document or object's node name contains the specified string, the
document will be stored in the Storage Provider specified by the rule.
Enter a string which can be part of the node name.
Always (value is ignored) 6 OpenText does not recommend that you use this storage rule, as it applies
to any object type. An arbitrary value has to be entered.
Any additional node 7 If a document or object has an additional node attribute, and that
attribute value is additional node attribute contains the specified string, the document will
be stored in the Storage Provider specified in the rule. Enter any string
which can be part of the node attribute value.
This rule applies to additional node attributes which can be defined on the
Administering Additional Node Attributes administration page.
Non-Specific attribute 8 If a document has a named, but unspecified, Category attribute that
value is contains the specified string, the document will be stored in the Storage
Provider specified in the rule. The Category attribute does not need to be
O oN
specified.
pe o
Attribute value is 9 If a document has a named and specified Category attribute that contains
D
Enterprise Library Type is 11 If a document or object is of a specified Enterprise Library type, the
In ibu
Enterprise Library Item 12 This rule is obsolete or deprecated. EL-Properties on item level are no
Property is longer supported; Customers do not have such documents.
rn
Enterprise Library 13 If a document or object is of a specified Enterprise Library type, the rule
al
Variant Property is checks if it has a specific variant property type value assigned. If so, the
document will be stored in the Storage Provider specified in the rule.
U
Is Enterprise Library 14 If a document or object is an Enterprise Library object, the document will
se
Node assigned 100 When managed objects are added to Content Server, they are evaluated
O
classifications based on the rule definition. You can create a complex expression for
multiple Classifications connected with And, Not, or Or modifiers. When
nl
using the storage provider rules, Content Server evaluates the classified
items in ascending order, and then stores the items based on your
y
specified criteria.
RM Classifications 200 If a document has a specific RM Classification assigned to it, the document
Primary RM will be stored in the Storage Provider specified in the rule.
Classifications
RM Essential 210 If a document has a specific RM Essential value assigned to it, the
document will be stored in the Storage Provider specified in the rule.
This is to support clients that want to have their Vital Records stored on a
logical archive that is replicated and/or treated special due to the nature
of the contents.
Security Clearance Level 211 If a document or object has a specific Security Clearance Level assigned to
it, then it will be stored in the Storage Provider specified by the rule.
The rule applies specifically to the specified Security Clearance Level
(SCL); it does not apply to items with a SCL below the specified level. If
there are several levels, it may be necessary to concatenate one or more
Security Clearance Rules.
You can only edit rules that use SCLs for which you have the See
permission. If existing rules use SCLs for which you do not have the See
permission, you will see that the rules exist but you cannot access them.
Documents that have their Security Levels updated will be placed in the
O oN
and only those levels for which you have the See permission are displayed
in the list.
n tD
Supplemental Markings 212 If a document or object has specified Security Clearance Supplemental
Te i
have the See permission. If existing rules use Supplemental Rules for
which you do not have the See permission, you will see that the rules exist
In ibu
but you cannot access them. Documents that have their Supplemental
Markings updated will be placed in the queue and reevaluated by the rule.
te te
The specified Supplemental Marking is selected from the provided list and
only those levels for which you have the See permission are displayed in
rn
the list.
al
OR, AND, NOT … The Content Move module allows you to apply defined rules to existing
documents, in order to move document content from a Content Server’s
U
NOT 222 All content to which the rule does not apply.
Project [name] 223 True if the added or evaluated version or rendition is assigned to the
project. Click the Browse Content Server button to search for the project
name. In the Select project window, navigate to the project and click the
corresponding Select link.
Volume 224 True if the added or evaluated version or rendition is assigned to this
volume.
Node Creation/ 225 True if the creation/modification date of the node (not the version and not
Modification Date the rendition) satisfies the given condition (i.e. the node was created or
modified at the specified time or within the specified time range).
Newest Version 227 True if the added or evaluated version or rendition is the newest version of
each document False: all versions except the newest.
Version Category 228 This rule is obsolete or depreciated. It was similar to Category Rule ID 2,
Attribute but it was never implemented in released software.
RM Status 230 If a document or object has a specific RM Status code assigned to it, the
D
Object Type in 240 True if the added or evaluated document is of this subtype (these
subtypes). Select one or more subtypes.
Te i
Stored below Container 241 True if the added or evaluated document is stored in this container. Click
xt str
the Browse Content Server button to search for the container location. In
the Stored below rule window, navigate to the container and click the
corresponding Select link.
In ibu
te te
Stored below Container 242 True if the added or evaluated document is stored in a container of this
Type type (these types). Select one or more Container Types.
rn
Stored in a Personal 243 True if the added or evaluated document is stored in a Personal
al
Rights Administration 244 It is used in Rights Management Administration. Any displayed rule acts
U
like a place holder for the system’s storage supporting the previously
se
documentation (https://knowledge.opentext.com/knowledge/
cs.dll?func=ll&objId=33699985&objAction=browse).
nl
Development
Volume Free Space (MB) 68687 This rule checks the remaining free space available on the volume on
which Content Server is attempting to store the Document. If the free
space will be less than the configured free space value specified in the rule,
it will indicate that the Document cannot be stored on the volume.
Content Server will then try the next volume in the list until it can save the
Document. If the Document cannot be saved to any volume, it will be
stored in the default volume. Value is in megabytes.
O oN
pe o
D
n tD
Te i
xt str
In ibu
te te
rn
al
U
se
O
nl
y
Objectives
Predict permission inheritance
pe o
D
Overview
xt str
At most Content Server sites specific departments will have their own
analysts or Knowledge Managers to control access to their material. As a
In ibu
structure. In this appendix you will learn the basics of how and why to set
permissions.
rn
al
Content Server access control is one of the most important areas in which
to invest time while planning your deployment. Access control in Content
Server covers a range of topics, including the following:
O
distinguish between document management permissions and work item
y
permissions
Content Server uses one permissions model for items in the
Enterprise Workspace and a user’s My Workspace and a more
simplified role based permissions model for Projects
When an item is created, it inherits its permissions from its parent
item. There are times when permissions must be mapped between
different permissions models (for example, when you create a project
inside a folder)
You have great flexibility in modifying access permissions
There are two basic sets of permissions, one for work items (discussions,
In ibu
channels and task lists) and one for document management items (all other
te te
items).
When you add an item, the item inherits permissions from the folder
rn
or Project to which the item is added. If you have Edit Permissions
al
The left side of the Permissions page lists the users and groups that
se
have access to the item. The right side of the Permissions page lists the
permissions for the currently selected user or group
O
The items added to work items do not have permissions. These include
nl
Topics, Replies, Tasks, and News stories. Access to these items depends
on the permissions of the parent of the item.
y
Discussion Can read Can post topics and Can delete all topics
postings to replies. and replies, and
discussion. Can delete own delete the discussion.
topics and replies. Can edit permissions.
Task List Can read Can create tasks and Can delete all tasks,
tasks. assign them to all and delete the task
with write or list.
administer access. Can reassign any
O oN
assigned to self.
Te i
Channel Can read Can create news Can delete all news
news. items. items, as well as the
xt str
channel.
Can edit permissions.
In ibu
items to
another
al
Collection.
U
se
Also, some items include permissions that do not apply to them, but will
be inherited by items added to them. For example, folders are not
versioned and cannot be Reserved, but their Permissions page includes
Add Version and Reserve permissions.
O oN
pe o
D
See the contents of the item (i.e., see a list of the See Contents
U
Add items to this item (Available only for folders Add Items
and compound documents).
Delete versions of the item and/or set the maximum Delete Versions*
number of versions.
*When set at the folder or Compound Document level, this permission determines the default permissions for
items added to the folder.
n tD
For items outside Projects, there are four default entries on the Default
In ibu
Access list:
te te
Owner: Initially, this is the person who added the item to Content
rn
Server. This user could have distinct permissions on that item. Depending
al
on your requirements, this user does not necessarily have full permissions
on the item.
U
se
Public Access: This includes every user for whom the Public Access
privilege is enabled.
y
System: Although it is not visible, every item also has a system permission
for the Content Server system administrators. The system permissions
are always set to “all permissions” and cannot be edited.
You can add more users and groups to the Assigned Access list to further
refine the permissions.
1. To open the Permissions page for an item, select the Functions menu and
choose Permissions. The Permissions page is displayed.
If the function is not there, you do not have the permission to see
(or edit) that item’s permissions.
on the left.
n tD
2. Select and clear check boxes as required, then click Update to apply the
changes. If you are modifying a folder, you need to consider the items in the
xt str
folder.
In ibu
3. To add a user or group to the Assigned Access List, click the icon.
te te
4. Locate the user or group, then click Select to the right of the user/group.
al
The user/group is added to the Assigned Access List and their (null)
permissions are displayed on the right.
U
5. Edit the user/group’s permissions, and then click Update to apply the
se
changes.
O
Coordinators have full access to all items within a Project, and cannot have
their permissions reduced. The coordinators are the owner group of each
item within the project. This enforces the role-based permissions
structure which is key to a Project’s functionality, where someone is in
charge “from here down.”
Members have write access to most items, and can add items to the
project, whereas Guests have read-only access. These form the default
permissions in the access list, to which other users and groups can be
added:
You can augment or lessen the permissions of the Members and
Guests groups when editing the permissions of individual items in the
project (for example, to give project Guests Write permission on a
discussion)
You can add individual users and groups from within the Project when
editing the permissions of individual items in the project, giving them
more access than the rest of their group
O oN
You can give users from outside the Project permission on selected
pe o
Table C-3: Accessing the Participants and Permissions Pages for a Project
In ibu
Choose Participants from the The Participants page is opened and displays
rn
Click Permissions on the You can now see and edit an item’s permissions.
Functions menu of items within
U
the Project.
se
Regardless of who the owner of the parent item is the user who created
the new item becomes the owner of that item.
Because permissions will be copied from parent to child (and from child to
O oN
You should consider the owner permissions at the folder level as the
permissions to give to creators of items in this folder on the items they
Te i
create.
xt str
You can see that it is important how the permissions are set on
In ibu
The creator of the new item becomes the owner of the new item.
U
All other access control records are copied as-is to the child object when
se
Keep in mind that if you apply permissions changes only to the parent
item, the changes to the user’s permissions will not apply to items within
the folder.
One of the items that will be skipped when applying to sub-items is a project.
O oN
If you want to change the sub-items’ permissions for multiple users and
groups all at once, you can use the Edit Sub-Items Permissions page.
Te i
xt str
sub-items (i.e., it was not checked), so it was the item that was
skipped.
al
U
se
At times, you will want to make changes to several user and group
permissions at once, for all of the sub-items of a folder or compound
nl
document. This is when you want to use the Edit Sub-Items Permissions
y
page. You will also find this page useful for other more subtle, granular
changes.
1. Click the Edit Permission Of Sub-Items icon next to the name of the
folder or compound document.
2. For each user and group on the list, choose the action you want Content
Server to perform from the Permission Action drop-down list.
<none> —Do not use this ACL record of the parent when working on
the sub-items.
Add—If this user or group is not already there, add it. If it is there, leave
the permissions the way they are.
Replace—If the user or group is already there, replace the permissions.
If it is not already there, do not add it.
Add & Replace—If the user or group is already there, replace its
permissions. If it is not, add it.
O oN
3. For each user and group whose permissions you want to change or add,
n tD
select the appropriate permissions check boxes. Select the check boxes next
to the other options that you want. If you want any channel, discussion, or
Te i
task list sub-items to be affected, select the corresponding check box in the
Include area.
xt str
If you want to replace the entire ACL of the sub-items with your selections
on this page, select the Clear Existing Sub-Items check box.
In ibu
If you want to make the owner of this item be the owner of all sub-items,
te te
4. Click the Update button. If you want to make the Owner Group of this item
al
be the Owner Group of all sub-items, enable the Make <xxx> Owner Group
of Sub-Items check box.
U
se
O
nl
y
the project.
pe o
Users with at most See Contents access to the folder become guests
D
of the project.
n tD
parent folder are mapped to a project added to the folder. You can modify
Content Server’s initial assignment of roles at the folder level, after you
xt str
When you add a work item to a folder, Content Server maps the folder’s
permissions to the work item. For example, if a group has See Contents
al
permission on the folder, the group will have Read permission for a
discussion added to the folder.:
U
se
item.
nl
2. Use the Find bar to locate the user you want to be the new owner, then click
pe o
The users and groups on the Default Access list can be removed and
Te i
restored if required.
xt str
1. On the Permissions page, select the owner, owner group or Public Access.
te te
rn
The default access entry’s permissions are listed in the right pane.
3. Click OK.
O
If a parent folder has had Default Access entries removed, then all newly
added sub-items to that folder will have those entries removed as well.
Existing items will not be updated.
Users with the ability to edit permissions can restore the Default Access
entries on an item. However, the system administrator can prevent users
from performing this task.
Click the required Restore icon ( ) to restore the Default Access entry.
If you are using the Records Management Module, removing the Owner
from the Default Access list could impact the way in which a Records
Manager group is automatically assigned access when performing
O oN
Configure Access The Configure Access Control page’s link is located in the System
Control Administration section of the Administration pages.
al
use groups on access lists rather than individual users and this feature
allows you to enforce this behavior.
se
As we learned earlier, you can remove the owner, owner group and Public
O
eDiscovery Mode If Enable eDiscovery mode access is enabled, you can assign users the
Access eDiscovery Rights system privilege, which allows a user to set eDiscovery
Mode on the My General Settings page. By default, this setting is disabled.
This capability grants See Contents to all objects for search, collection
and browse operations. This feature is intended for customers
performing eDiscovery and litigation support tasks for data managed by
Content Server.
Advanced Version Content Server includes the ability to have major and minor versions of a
Control With Major/ document. Users with “See, See Contents” permission can see only major
Minor Versions versions. This gives them a clearer picture of a document’s progress and
hides all of the minor revisions.
O oN
The document behavior is set at the container level: the Version Control
pe o
D
page appears on folders and not documents. You need “Edit Permissions”
permission to change any of these options.
n tD
Te i
content taxonomy.
te te
Users who create content should not necessarily have full access
to it. For example, the owner permissions should usually not
rn
need to put into this task by using groups as the way to assign
nl
access lists. Remember that you can restrict access lists to groups
only, and even remove some or all of the Default Access entries.
3. Develop a policy for working with the owner group permissions:
You could consider setting the owner group permissions to be the
permissions you want the knowledge managers of the folder to
have, and consider changing the owner group to be that group of
knowledge managers.
Alternatively, you could use the owner group to give a standard
set of permissions to the end users of a given department and add
a knowledge managers group to the item’s access control list.
Server system, in the form of three new groups for each project.
D
the hierarchy:
Te i
Users can use their Home folders as a work in progress area for
nl
items they are not ready to share yet. Adding this work to their
Home folders ensures backup and allows them to share the items
y
with a few people if they like. Do you want users to use the Home
folder in this way?
Since users can set permissions how they like on items in their
Home folders, and since they often cannot set permissions on
items in the rest of the hierarchy, a Home folder can be a good
place for power users to keep items whose content they wish to
control. They can open up permissions as they like, and they can
create shortcuts to items in their Home folder elsewhere in the
Enterprise Workspace hierarchy. Whether you want users to do
this is another question.
need to be revised.)
D
n tD
10. Develop policies to guide your support staff. For example, what
should your support staff do if a user requests access to an area that is
al
restricted?
U
11. Write a design guide that outlines your approach to configuring users
and groups, how you set up permissions in your Enterprise
se
Summary
Access control is one of the most important design aspects of your
Content Server system. Your knowledge managers will be doing most
of the permissions setting, but you should understand how it all
works.
There are two sets of permissions: A simple none/read/write/
administer set of permissions for work items (discussions, channels,
and task lists), and a more complex set of permissions for document
management items (like folders, documents, and compound
documents).
O oN
There are two principal models for defining permissions: One is the
model used in the Enterprise Workspace and a user’s My Workspace.
pe o
D
The second is the model used for projects, where roles are mapped to
a certain set of permissions, and where the roles are applied to an
n tD
for access control, using their parent’s access list to determine access.
When an item is added to a folder or compound document, the owner
In ibu
of the new item gets the same level of access against the new item
te te
that the owner of the container has against the container item. In
addition, all the other access list records for the container item are
rn
You need to determine who in your organization will have the ability
to set permissions; these people are the true knowledge managers of
U
your system.
se
O
nl
y
Exercises
You will add documents into Content Server and then set different permissions on them. This
exercise demonstrates how the folder’s existing permissions, including Owner permissions, affect
what control users have over existing documents and ones they add.
From the previous exercise, you have a user Sandy in the Product Marketing group. Create a new
group called Finance, and add your user Chris (from the previous exercise) into that group. You will
use only Product Marketing and Finance and only one user should be in each group (remember, you
may need to take Chris out of the Product Marketing group from the previous exercise).
O oN
pe o
Here is what you will do: Set up permissions so that Sandy can add items to the Documentation
D
folder, and can delete the items they add, but cannot delete other items in the folder (that others
n tD
have added).
Te i
Be sure to check each step as you complete it and ensure the permissions match the screen shots.
xt str
1. Create a folder called Documentation in the Enterprise Workspace, if it was not created
earlier.
In ibu
2. Add the Product Marketing group to the Documentation folder’s Access Control List (ACL).
te te
Give Product Marketing: See, See Contents, Modify, Add Items permissions.
rn
3. Make Chris the owner of the folder and give him See, See Contents, Modify, Add Items,
al
4. Remove Public Access from the folder (you can either set permissions to “none” or remove
the group altogether).
se
5. Add a document to the Documentation folder and name it Admindoc1. Add a second
O
6. Modify the permissions on Admindoc2 so that Product Marketing has Reserve permission
(in addition to their existing permissions).
y
7. Log out as Admin and log in as Sandy and navigate to the Documentation folder.
8. Add a document to Documentation and name it Sandy.doc. By clicking the Functions menus,
compare your control over the document you added, with the pre-existing documents
added by Admin. What can you do to each document and why? Now add a version to
Admindoc2 and Sandy.doc. Compare each version’s functions menu to see what Sandy can
do to each version.
Summary of permissions:
If you have set up permissions correctly, Sandy should have reserve permission
only on admindoc2 and Sandy.doc. Sandy should be able to delete versions
from Sandy.doc, but not from Admindoc2.
O oN
Marketing group (can view and rename, but not add versions).
n tD
Admindoc2: additional permissions for that document only (can add versions,
but not delete them).
Te i
Documentation folder.
te te
rn
9. If time permits, log out as Sandy and log in as Chris to compare Chris’s permissions as owner
of the Documentation folder with his permissions on other items in the folder. What
al
permissions does Chris have on the Documentations folder? What permissions on the
documents Admin and Sandy added? Why are they different? What should we do to “fix”
U
Chris’s permissions?
se
O
nl
y
O oN
pe o
D
n tD
Te i
xt str
In ibu
te te
rn
al
U
se
O
nl
y
Objectives
Overview
O oN
pe o
document should help you avoid those “we should have thought of that”
moments during the implementation of your system.
xt str
In ibu
This template is not a substitute for proper project management and the
input of your team. There are also many Open Text consultants
U
management. Our goal is to make sure that you have not forgotten
anything important, and to list the topics you should be discussing
internally, more than to assist you in creating a formal specification.
O
nl
y
Introduction
Overview [Short paragraph explaining the overview of your document.]
Purpose [Define the overall purpose of the Content Server system for your
organization here, summarizing the objectives you hope to address with
the system. What Content and Processes will it help you with?]
Revision History
Assumptions [Define any assumptions that might not be obvious to the readers.]
Signatures The following people have reviewed this document and agree that it
accurately describes the required design of the system.
O oN
_______________________________________________________________________
pe o
D
_______________________________________________________________________
n tD
_______________________________________________________________________
Te i
xt str
There will be [count] users using the system in the next [timeframe]. In the
rn
Experience:
se
The background and experience of our system’s users falls into these
O
Tasks:
y
[These types of users] will use the system in a limited way, mostly
performing [these types of tasks].
[These types of users] will use the system more heavily, mostly
performing [these types of tasks].
Groups The broadest groups of the system will be [these principal groups].
O oN
The Department groups for users will be based upon [your organizational
n tD
chart, the organizations for which the users are employed, the products
the users help to develop, or …]
Te i
[Revisit this section after you have considered access control and
xt str
workflow.]
In ibu
Users Defined by
External Source
te te
rn
OTDS Type The Content Server installation will make use of:
al
External OTDS, migrated from CSDS, and the resulting user partition
will be synchronized
O
Privileges to Create The following types of users should be leaders of [this type of] groups (and
nl
Users and Groups therefore can add and remove users from the groups): [types of users]
y
The following types of users should have the ability to create new groups:
[types of users]
The following types of users should have the ability to create new user
logins: [types of users]
The following types of users should have the ability to add, modify, and
remove any user login: [types of users]
Item Creation All users will be able to create any type of Content Server item (folders,
Privileges documents, facets etc.) in the areas to which they have access, except for
[these users/groups, who cannot create these types of items (often
restrict the ability to create workflow maps and projects)].
Password Control Passwords will be managed by OTDS. When a user login is created, the
password will be set according to this pattern: [first initial + last name or
(hopefully) something more secure]. The user will be informed of the
Content Server URL and login by [e-mail, phone, etc.].
O oN
The Enterprise Workspace will contain one folder per [criteria]. Under
In ibu
Overview [List any general factors that influence your access control structure.]
al
who Access
adds an should
item have
O
should this
nl
See contents
Delete Items
Revise items
be able access
Folder
Add items
to do
y
these
actions
against
that
item
Sub-Folders (may
need to detail for
major sub-folders) These Users/Groups can Person Public
See contents
Delete Items
Revise items
be able access
Folder
Add items
to do
these
actions
against
that
O oN
item
pe o
D
permissi
ons?
xt str
Control
These types of users will be able to create projects: [list users/groups]
te te
terms as is appropriate]
se
Use of Personal Home Users will be encouraged to store [this kind of information] in their Home
y
Folders folders.
[If there is a concern regarding the amount of data people store in their
Personal Workspaces, add sentences describing how you want to monitor
the use of Personal Workspaces.]
Categories and The following attributes will be defined for the system: [names of
Attributes to Define attributes—maybe data types, display formats, and valid values for drop-
down lists as well].
The attributes will be organized into these categories: [list. Also note
O oN
[To complete these sentences, interview your users with questions such
as:
n tD
where …”
In ibu
Also ask your users to finish this sentence: “I only want to see items
where…”].
te te
Entry
Every [type of document] should be placed in the [category name]
al
n tD
The “Home page” that the user will see first by default when logging in will
be [the Enterprise Workspace, the user’s Personal Workspace, the About
Te i
When users visit the Enterprise Workspace, they will see …[big response
In ibu
here. Do you want to define a Custom View file with links to the major
te te
parts of the system? Which Custom View variables would you like to use?
Do you want to use your corporate logo here? Do you want to make use of
rn
featured items? Do you want to have a news ticker and a search bar?
Maybe include a prototype screen capture here.]
al
Users can get an overview of the system and help desk information by
U
columns.
Columns will be created [in the following folders] to display [these types
of custom category and attribute metadata].
Facilitating Search
The standard search bar will be configured with …[describe the default
configuration with Modifiers, Searchable types etc. ]
To facilitate the search for [this type of information], there will be a slice
for [that type of information]. The permissions on the slice will be set such
that only these users/groups can see it: … [Repeat this sentence as
required]
To assist users with more complex searches, these types of Saved Queries
will be created and made available to [these users] by storing them in
O oN
[these locations]…
pe o
D
The Content Server online help and Admin online help will also be
In ibu
Auditing will be enabled for [these types of items] and [these types of
O
The audit trail will be examined [on this basis] by [person/role]. The audit
y
Training The “casual” Content Server users will be trained by: [describe type of
training, estimate time it will take per individual, number of users]
U
The “power” Content Server users will be trained by: [describe type of
se
The users are accustomed to using [this legacy system]. The training will
compare and contrast Content Server with [the legacy system] in this
nl
way: …
y
In addition to learning how to use Content Server, the users will need to
understand [this change in our business process]. This will be addressed
by: …
Support When a user has a question while using Content Server, he/she will know
whom to contact because … [interface element or other way of informing
the users].
We estimate that the [help desk] will spend [number of hours] each day in
assisting users.
O oN
pe o
D
n tD
Te i
xt str
In ibu
te te
rn
al
U
se
O
nl
y
Overview
This appendix is intended as an overview and reference for Content
Server administrators regarding logging in, logging out, and Changing or
resetting user passwords as the functionality and behavior of this
operations for customers that have not previously utilized OTDS as part
of their Content Server installations or deployments.
Signing In and Out of Content Server v16
O oN
pe o
Content Server v16.0 users could be provided a URL that takes them to
D
Content Server.
xt str
classic ‘Log in / Log-in’ and matching ‘Log out / Log-out’ are being
replaced by ‘Sign in / Sign-in’ and ‘Sign out / Sign-out’.
U
the subject of web page and usability etc. and there are also
popular styles or standards (i.e., Microsoft) that allows UIs to be
standardized and ultimately made more user friendly (e.g., http:/
O
/uxmovement.com/buttons/why-sign-up-and-sign-in-button-
nl
Changing the Sign In To change the Sign in page localization, for example from the default of
Localization in the Classic
English to French, click the language switcher and select Francais.
UI
Open Text recommends that you first choose a locale before entering a
User name and Password, otherwise changing the locale will reset (i.e.,
blank) the previously entered User name and Password.
O oN
pe o
D
n tD
Te i
xt str
In ibu
te te
rn
al
U
se
O
nl
Figure E-1: Example of Changing the Sign in Localization from English to French
y
Signing Out Using the To Sign or Log out, use the Global Menu bar and select My Account > Log-
Classic UI out.
Figure E-2:
n tD
Te i
xt str
Although you have been logged out from Content Server, you are
reminded to completely close your web browser to ensure the
privacy of recently viewed data.
In ibu
te te
rn
al
U
se
To Sign in to Content Server, a user enters their User name and password
then Sign in.
y
Changing the Sign In To change the Sign in page localization, click the language switcher
Localization in the Smart and select the locale.
View UI
Signing Out using the To Sign out, use the user menu and select Sign Out.
Classic UI
Figure E-3:
Figure E-4:
n tD
Te i
Beginning with Content Server v16.0, users can change their Content
Server password using Global Menu bar > My Account > Change
xt str
Password
In ibu
te te
rn
Figure E-5:
al
Account menu
se
O
nl
y
The page is updated and the user enters their User name, Old password,
New password, Confirm their password, and then Change.
O oN
Figure E-6:
pe o
D
Changing a Password in
n tD
the Classic UI
Te i
xt str
In ibu
te te
rn
al
U
Resetting a Password When a user signs in to Content Server, they are warned if their User
O
using the Classic UI name or Password are not recognized and an Invalid credentials message
and Email is displayed along with a link allowing the user to reset it.
nl
To reset your password, select the If you forgot your password, reset it
y
here link.
Figure E-7:
When the page is refreshed, enter your Content Server User Name and
Submit and an email will be sent to you that allows you to reset your
password.
Figure E-8:
n tD
Te i
Resetting a Password After a user signs out of Content Server, they are reminded to completely
using the Smart View close their web browser to ensure the privacy of recently viewed data. At
xt str
Figure E-9:
O
The page is updated and you can enter your content Server User name
then Submit.
Figure E-10:
n tD
Te i
The corresponding web browser page that asks for a new password,
confirmation and Reset password is illustrated in the figure below:
Figure E-12:
O oN
pe o
by Entering and
Confirming a New
n tD
Password
Te i
xt str
In ibu
te te
rn
al
discussed later in the course, but the setting can be found on the
Administration pages > Directory Services Integration Administration >
Configure Directory Services > Setup > System Attributes page (i.e.
O