Documente Academic
Documente Profesional
Documente Cultură
Copyright Notice
Notice
1999-2009 Autonomy Corporation plc and its affiliates. All rights reserved.
No part of this publication (hardcopy or electronic form) may be reproduced or transmitted, in any form or by any means, electronic, mechanical,
photocopying, recording, or otherwise, without the prior written consent of Autonomy Corporation plc and its affiliates. Information in this manual
is furnished under license by Autonomy Corporation plc and its affiliates and may only be used in accordance with the terms of the license
agreement. If this software or documentation directs you to copy materials, you must first have permission from the copyright owner of the
materials to avoid violating the law which could result in damages or other remedies.
6/12/09
Part Number 04-001-07-EN
Contents
Chapter 1:
Introduction
Components of the WorkSite Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
WorkSite Library . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
WorkSite Server Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
WorkSite Indexer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Client Applications. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Administrative Tools or Utilities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Chapter 2:
19
19
19
20
21
21
22
23
23
24
24
24
25
25
27
27
27
28
28
29
30
30
31
31
32
32
33
33
34
38
41
43
44
Contents
Chapter 3:
45
Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
About Database Administration. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Starting and Stopping the DBAdmin . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
DBAdmin Desktop . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Tree Frame . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Table Frame . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Searching the Table Frame . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Right-click Menus . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Toolbar . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Information Tables and Subtables. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Registering WorkSite Databases . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Automatic Login Feature. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Login Failures and the Reconnect button . . . . . . . . . . . . . . . . . . . . . . . . . . .
Configuring WorkSite Database Options. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Viewing the User History . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Database Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Synchronization Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Common Functions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Adding Items to an Information Table . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Editing Items in an Information Table . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Searching in a Table or List View. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Using the Lookup Bar . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Setting Max Lookup Entries . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Error Messages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Chapter 4:
65
Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Managing Users. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Purpose of the User Table. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Adding Users . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Adding Virtual Users. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Adding Microsoft Windows OS Domain Users. . . . . . . . . . . . . . . . . . . . . . .
Adding Novell Bindery Users . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Adding Novell NDS Users . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Adding LDAP Directory Users . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Changing the Default Password . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Editing User Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Synchronize Users . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Managing Groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
NRTADMIN Group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Adding Virtual Groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Adding Microsoft Windows Domain Groups . . . . . . . . . . . . . . . . . . . . . . . . . . .
Adding a Novell Bindery Group. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Adding Novell NDS Groups. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Adding LDAP Directory Groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
45
45
46
46
46
47
48
48
49
49
51
53
53
53
57
57
58
59
60
60
61
62
63
63
65
65
66
67
67
69
71
73
75
82
82
83
84
85
85
87
88
90
92
Contents
Chapter 5:
125
125
125
126
126
127
130
131
131
132
133
133
134
135
Contents
Chapter 6:
159
Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
About Document Import . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Features and Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Document Import Process . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Starting and Stopping the Document Import Tool . . . . . . . . . . . . . . . . . . . . . . . . .
Log into a WorkSite Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Logging Off from a WorkSite Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Creating a New Profile Template. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Selecting a Document Type . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Autodetect and Nonautodetect Document Types. . . . . . . . . . . . . . . . . . . . .
Using Selection Boxes. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Dynamic Profile Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Where to Use Dynamic Profile Field Commands . . . . . . . . . . . . . . . . . . . .
Combining Profile Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Filename or Extension Substring Extraction . . . . . . . . . . . . . . . . . . . . . . . .
136
138
139
139
140
141
142
143
143
144
144
145
145
145
147
148
148
149
150
150
150
150
151
151
153
153
153
155
158
159
159
160
160
161
162
163
163
165
166
167
168
169
169
170
Contents
Chapter 7:
171
171
172
172
173
174
176
176
176
177
178
180
180
181
181
181
182
183
183
184
184
185
185
186
186
186
187
188
188
188
189
190
190
190
191
192
192
194
195
197
197
198
199
199
200
Contents
Chapter 8:
205
Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
About WorkSite Monitor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Starting WorkSite Monitor. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Registering and Unregistering WorkSite Servers. . . . . . . . . . . . . . . . . . . . . . . . . .
The WorkSite Monitor Desktop. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Keyboard Shortcuts and Toolbar Buttons . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Server WorkSpace Window . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Icons in the Server WorkSpace Window . . . . . . . . . . . . . . . . . . . . . . . . . . .
Information Window . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Results WorkSpaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Statistics Tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Document Search Results Tab. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Document History Search Results Tab . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Active Users Tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Results Tab Right-click Menu Options . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Setting Search Results Display Options . . . . . . . . . . . . . . . . . . . . . . . . . . .
Using Support Dialogs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Selection Dialog Box (Lookup Tables) . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Setup Additional Custom Fields Dialog Box. . . . . . . . . . . . . . . . . . . . . . . .
Setting Up Custom Fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Using WorkSite Monitor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Searching for Documents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Searching the Document History . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Deleting Entries in the Document History Table . . . . . . . . . . . . . . . . . . . . .
Redisplaying Search Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Printing Reports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Setting Printer Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Print Preview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Unlocking Documents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Deleting Documents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Relocating Documents between Databases. . . . . . . . . . . . . . . . . . . . . . . . . . . .
Relocating Documents. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Changing Document Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Bulk Profile Edit. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Reassigning Documents by Author or Operator . . . . . . . . . . . . . . . . . . . . . . . .
Document Archiving . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Marking Documents for Archiving . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Unmarking Documents for Archiving . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
201
201
201
201
202
202
205
205
206
206
208
209
210
211
212
213
213
214
215
216
216
217
220
221
221
221
222
222
224
226
226
226
226
226
227
227
229
231
235
237
239
240
241
244
Contents
Chapter 9:
Chapter 10:
246
246
248
249
250
254
254
255
255
257
257
257
258
258
261
261
262
264
265
265
267
270
271
273
273
273
274
274
275
275
276
277
278
278
278
279
279
279
279
280
280
281
283
283
Contents
Chapter 11:
287
Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
How Directory Service Synchronization Service Works . . . . . . . . . . . . . . . . .
Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Installing DSS Service. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Configuring the DSS Service. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Setting the DSS Schedule . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Creating Connections to DSS Services. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Specifying External Users and Groups . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Mapping Directory Service Attributes to WorkSite. . . . . . . . . . . . . . . . . . .
Running the DSS Service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Chapter 12:
301
Chapter 13:
301
301
302
302
303
304
304
305
305
305
308
313
313
314
314
317
Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
About WorkSite Server with Caching . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Caching Server Technology. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Cache Fileserver . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Preloading the Cache . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Configuring the WorkSite Server for File Caching. . . . . . . . . . . . . . . . . . . . . .
Purging the Cache Fileserver . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Overview of Proxying Capabilities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Setting up Library Connections . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Chapter 14:
287
288
288
289
291
291
292
297
298
299
317
317
318
319
320
321
323
323
325
329
Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 329
Migrating Users to a Different Database . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 329
Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 329
10
Contents
330
330
331
331
332
332
333
333
333
334
334
337
337
338
338
339
339
339
339
343
Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 343
Abbreviations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 343
Common DMSLog.txt File Entries . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 344
349
Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 349
355
356
357
357
358
360
361
361
362
363
363
364
364
365
366
366
367
367
368
11
Contents
Index
12
368
369
369
370
371
372
373
374
375
375
377
Figures
Figure 1
Figure 2
Figure 3
Figure 4
Figure 5
Figure 6
Figure 7
Figure 8
Figure 9
Figure 10
Figure 11
Figure 12
Figure 13
Figure 14
Figure 15
Figure 16
Figure 17
Figure 18
Figure 19
Figure 20
Figure 21
Figure 22
Figure 23
Figure 24
Figure 25
Figure 26
Figure 27
Figure 28
Figure 29
Figure 30
Figure 31
Figure 32
Figure 33
Figure 34
Figure 35
Figure 36
Figure 37
Figure 38
13
Figures
Figure 39
Figure 40
Figure 41
Figure 42
Figure 43
Figure 44
Figure 45
Figure 46
Figure 47
Figure 48
Figure 49
Figure 50
Figure 51
Figure 52
Figure 53
Figure 54
Figure 55
Figure 56
Figure 57
Figure 58
Figure 59
Figure 60
Figure 61
Figure 62
Figure 63
Figure 64
Figure 65
Figure 66
Figure 67
Figure 68
Figure 69
Figure 70
Figure 71
Figure 72
Figure 73
Figure 74
Figure 75
Figure 76
Figure 77
Figure 78
Figure 79
Figure 80
Figure 81
Figure 82
Figure 83
Figure 84
Figure 85
Figure 86
Figure 87
14
Figures
15
Figures
16
Tables
Table 1
Table 2
Table 3
Table 4
Table 5
Table 6
Table 7
Table 8
Table 9
Table 10
Table 11
Table 12
Table 14
Table 15
Table 16
Table 17
Table 18
Table 19
Table 20
Table 21
Table 22
Table 23
Table 24
Table 25
Table 26
Table 27
Table 28
Table 29
Table 30
Table 31
Table 32
Table 33
Table 36
Table 37
Table 38
Table 39
Table 40
Table 41
Notation Conventions...............................................................................................
Revision History .......................................................................................................
Toolbar buttons and menu options ..........................................................................
WorkSite Server Properties Dialog Options .............................................................
Information Tables in the tree frame ........................................................................
Database icon color .................................................................................................
Document Tab, Document History Options .............................................................
User tab, Information ...............................................................................................
Document management tasks associated with roles............................................
Using Roles to Manage Document Searches ........................................................
Examples of Roles .................................................................................................
Options on the Privileges Tab................................................................................
Application Setup Properties..................................................................................
Default Document Types .......................................................................................
Document Type Dialog Properties .........................................................................
Changes to NRT.INI file .........................................................................................
Information Fields in the Add and Edit Class dialog boxes....................................
Sample PC Location Records................................................................................
Common Uses for Custom Tables.........................................................................
Sample Custom Table entries................................................................................
Dynamic Profile Field Commands..........................................................................
Dialog boxes that can be customized ....................................................................
Types of Forms ......................................................................................................
Valid formats for the Custom fields ........................................................................
Restrictions on controls..........................................................................................
Elements toolbar Icons ..........................................................................................
Required Controls for Each Form Type .................................................................
Align Controls.........................................................................................................
Keyboard Shortcuts and Toolbar Buttons ..............................................................
Icons in the Server WorkSpace window ................................................................
Column Headings on the Statistics tab ..................................................................
Status Icons ...........................................................................................................
...............................................................................................................................
Options Available for Changing Security Settings .................................................
Setting the Frequency with which the Statistics window is updated ......................
Events to Associate with Rules..............................................................................
Abbreviations used in the DMS log file ..................................................................
Command Line Parameters ...................................................................................
19
21
30
35
49
52
55
56
108
109
109
112
128
131
136
137
140
144
148
149
169
181
187
191
192
192
198
199
209
211
213
215
230
235
254
270
315
334
17
Tables
Table 42
Table 43
Table 44
Table 45
Table 46
18
340
341
343
349
374
Intended Audience
This guide is recommended for the WorkSite Administrators who are experienced in setting up
the WorkSite Server and its components. Contact Autonomy technical support to resolve issues
that are not addressed in this guide.
Notation Conventions
This manual uses the following notation conventions:
Table 1
Notation Conventions
Convention
Bold
Text that appears in a GUI element such as, a menu item, button, or
element of a dialog box, and command names are shown in bold.
For example:
Click Edit File in the Button Bar.
Italic
Monospace
19
Table 1
Notation Conventions
Convention
Monospaced
italic
This means that you must replace role and user with your values.
Monospaced bold
Monospaced bold
italic
The term Windows indicates any supported version of the Microsoft Windows operating
system, such as Windows 2000.
Directory paths use UNIX conventions. These conventions mandate using forward slashes (/
) in path names. (Windows systems use backward slashes.) The Windows convention is used
when referring to a Windows-specific directory. For example:
UNIX: docroot/news/front.html
Windows: docroot\news\front.html
Manual Organization
20
Introduction on page 23
DeskSite Installation and User's Guide or FileSite Installation and User's Guide. Provides
more information on WorkSite client applications such as DeskSite, or FileSite.
WorkSite Installation Guide. Provides detailed, step-by-step instructions for installing the
WorkSite Server and its components.
WorkSite Design Guide. Provides information on the design principals for the WorkSite
Server.
WorkSite Resource Kit Administrators Guide. Provides instructions for using various
WorkSite Server utilities that are not documented in this book.
Revision History
Refer to Table 2 for a list of updates to this guide.
Table 2
Revision History
Revision
Date
Comments
August 2007
21
Table 2
Revision History
Revision
Date
Comments
December 2007
September 2008
April 2009
8.5 Release
Added the following information
File dates and system dates in Configuring
WorkSite Server Service Properties on page 34.
Preventing flat space filing in Configuring
WorkSite Server Service Properties on page 34.
Server side email filing in Server Side Email
Filing on page 375.
Allow folder creation in public workSpaces in
Allow Folder Creation in Public Workspaces on
page 375.
Search Results Sorting in Search Results Sorting
on page 358.
Chapter 11 Directory Service Synchronization
Service on page 287.
Support for unknown file types in Support for
Unknown File Types on page 372.
Documentation Updates
Additions and corrections to this document (when available) can be downloaded in PDF format
from the following Web site: https://customers.autonomy.com.
22
Chapter 1
Introduction
Components of the WorkSite Server
The WorkSite Server is a 3-tiered architecture with components at each tier. The WorkSite
Server forms the middle tier between the client and library tiers.
Figure 1
The components of each tier may be distributed across several machines or may coexist on the
same machine. See the WorkSite Design Guide for details on recommended installation.
The tier levels can be broadly classified as WorkSite Library, WorkSite services, and client
applications. The following sections describe the tiers and their components.
23
Chapter 1: Introduction
WorkSite Library
From an end-users standpoint, a WorkSite Library is a repository for documents. From an
Administrators standpoint, a WorkSite Library consists of two fundamental components:
One or more file servers, where the actual documents are stored.
WorkSite Serverthis core service connects to the SQL Server, the WorkSite Indexer, and
the Document File Server. This service coordinates transactions with these back end systems
and returns data to the client.
Rules Engineprocesses system events, such as e-mail notification for certain system
activities.
Cluster Manageran optional service that performs automatic client redirection when a
server in the cluster fails. The Cluster Manager Service also performs automatic load
balancing across available WorkSite Servers.
These services interact through an interface known as the WorkSite Service Manager.
WorkSite Indexer
The WorkSite Indexer is responsible for creating the indexes which allow users to search for
WorkSite documents. The WorkSite Indexer also processes all search queries and returns the
results to the WorkSite Server.
For more information, refer to the WorkSite Indexer Administrators Guide.
24
Client Applications
In the WorkSite Server architecture, client applications do not make direct connections to
components of the WorkSite Library, or data layer. The WorkSite Server service functions as
a virtual firewall between your users and the data.
The client applications that are commonly used are DeskSite, FileSite, WorkSite Web and
E-mail Management for Lotus Notes. For more information, see the user guide for a
particular product.
WorkSite Service ManagerThe WorkSite Service Manager is the main interface used
configure and manages all services that are part of the WorkSite Server installation.
See Chapter 2, Using the WorkSite Service Manager, for an introduction to using the
Service Manager.
Document ImportThe WorkSite Import tool can import large numbers of documents into
the WorkSite Database. This tool is most frequently used to migrate documents that were
previously stored directly on a shared file server into the WorkSite Server. See Chapter 6,
Using the Document Import Tool.
Dialog EditorThe Dialog Editor tool is used to edit the customizable dialog boxes and
field names (captions) in the WorkSite Database. The Dialog Editor tool is three-tiered, so it
connects to the WorkSite Server service rather than the database. See Chapter 7, Using the
Dialog Editor Tool.
25
Chapter 1: Introduction
26
Chapter 2
WorkSite Services
NOTE
The WorkSite Server Installation Guide provides the information required to install the WorkSite
Server, and configure the services.
27
Registering and Unregistering Servers. The computer on which the WorkSite Server has
been installed must be registered in the WorkSite Service Manager before starting any
service.
Starting and Stopping Individual Services. The WorkSite Service Manager starts and stops
individual services and detects when a service terminates.
Configuring the Services. The WorkSite Service Manager allows you to configure the
properties for each of the services that are installed.
Log File. The WorkSite Service Manager generates a log file that records all the actions or
events connected to the services.
WorkSite Services
The WorkSite Service Manager includes the following primary services:
WorkSite Server. See Configuring WorkSite Server Service Properties on page 34.
Rules Engine. For more information on the Rules Engine Service, see Chapter 9,
Configuring the Rules Engine, of the WorkSite Server Administrators Guide.
WorkSite Server with Caching (add-on service). For more information on the WorkSite
Clustering Service, see Chapter 13, WorkSite Server with Caching, of the WorkSite Server
Administrators Guide.
Cluster Manager (add-on service). For more information on the WorkSite Clustering
Service, see Chapter 10, WorkSite Cluster Manager Service, of the WorkSite Server
Administrators Guide.
28
Each row in the table has a colored bullet at the far left of the table. The bullet is yellow if the
service listed in that row is stopped; the bullet is green if the service is running.
29
Keyboard
Shortcut
Register Server
Ctrl-R
Find Servers
Ctrl-A
Function
Startup Properties
Service Properties
Ctrl-P
Database Setup
Ctrl-D
Ctrl+F
Start Service
Ctrl-S
Stop Service
Ctrl-T
Service About
View Log
Ctrl+V
Topics
F1
About
30
This status box appears while the WorkSite Service Manager searches the network for
WorkSite Server, Cluster Manager, and Rules Engine Servers.
2. To stop the search while this status box is displayed, click Cancel. All servers located by the
WorkSite Service Manager are automatically registered with the service manager.
See Registering and Unregistering Servers on page 31.
31
Figure 4
2. In the Server box, enter the name of the computer where the WorkSite Server has been
installed.
3. Click OK.
If the WorkSite Service Manager connects to the WorkSite Server service successfully, the
main table view lists each server.
When you restart the WorkSite Service Manager, it automatically logs into any servers that
were registered during your previous session. See Automatic Login on page 32.
Automatic Login
When you register a server with the WorkSite Service Manager, an attempt to log into the server
is made automatically each time you launch the WorkSite Service Manager until you unregister
the server.
Unregistering a Server
When the WorkSite Server Manager is started, it automatically tries to log into all of the servers
that were registered with it when you last exited from the tool.
To prevent the WorkSite Service Manager from automatically logging into a particular server, or
to close the WorkSite Service Managers connection to a server, the Server must be
unregistered.
32
To unregister a server:
1. Select the server that must be unregistered from the table view.
2. Select Unregister Server from the Service menu. The connections to the services that are
displayed in the table view will disappear.
Start or
33
3. Enter the Login ID and Password for the Windows User account under whose context the
WorkSite Server Service program will run. This account must be different from the
Windows service account Local System and must have Log on as a service privileges. The
default value that appears in the Login ID field in the Startup dialog box is that of the
current user.
4. Select the Startup Type:
If you want the service program to start up automatically on boot, check Automatic.
If you want the service program to start up only when launched manually from within the
WorkSite Service Manager, then check Manual.
5. Click OK to register your changes.
Change the appropriate the settings as desired in the WorkSite Server Properties dialog, then
click OK. Table 4 lists all available options on the WorkSite Server Properties dialog.
34
Figure 6
Table 4
Field/Feature
Description
Cluster/Server Name
The Cluster/Server Name field is used to specify the name of the cluster a
WorkSite Server Service program is associated with. If the WorkSite Server
Service is not part of a cluster, this field should be left blank. For more
information on clustering, see the WorkSite Server Administrators Guide.
Cache Fileserver Path If your WorkSite deployment utilizes the WorkSite Server with Caching
feature, enter the path to the fileserver that is used to cache files downloaded
from remote locations.
E-mail Domain
35
Table 4
Field/Feature
Security Configuration
Accept Trusted
Authentication
When the Accept Trusted Authentication feature is enabled, users who are
already logged into the Windows domain can connect to WorkSite without
providing a second, addtional login ID and password. The user must be a valid
user on the database and the users database login ID must be identical to his or
her login ID on the domain. Trusted authentication will not work if the user is
not logged into the domain. Users such as virtual users who are not logged into
the domain cannot use trusted authentication.
Enable Impersonation The Enable Impersonation feature allows anyone who knows the Enable
Impersonation password to logon to the WorkSite system as any user whose
login has not been disabled. The administrator uses the Administrative
Impersonation password in place of the normal password of the user being
impersonated.
When enabled a password of at least six characters must be entered in the
Password field.
TCP/IP Port Configuration
The values entered in the Service Port and File Port text-entry fields are
dedicated TCP/IP port numbers assigned to the WorkSite Server Service
program. The service port is used for service transactions, and the file port is
used for transmitting files.
Use the default value for the service port (1080) and file port (1081) unless
instructed otherwise by Autonomy Technical Support.
Refresh Frequency
36
This value determines with what regularity the WorkSite Server will check that
all database tables in memory contain less than the maximum number of rows
and unload infrequently used entries from any tables that are larger than the
maximum size.
Use the default value of 1 unless instructed otherwise by Autonomy Technical
Support.
Table 4
Field/Feature
Rows per Cache Table By specifying a value in the Rows per Cache Table field, you can limit the
number of entries to cache in memory from each of database tables. If this
value is set to 10, for instance, no more than 10,000 entries will be cached from
any one table. When a database table contains more total entries than the
maximum specified in the Rows per Cache Table field, then the WorkSite
Server Service will identify infrequently used entries and remove them from
the cache.
The following tables are cached in memory for each database to which the
WorkSite Server is connected:
User Table
Document Types
Custom1/Custom2
Custom Tables
Class/Subclass
App Setup
Custom29/Custom30
Preload Cache Data
When the Preload Cache Data option is selected, the WorkSite Server will
preload the database tables into the memory cache at startup. If this option is
disabled, the database tables are loaded into the memory cache dynamically or
incrementally (as needed). Turning off the Preload Cache Data feature will
improve startup time.
Share Cache
Enable Symantec
Enterprise Vault
Integration
If you have installed Symantec Enterprise Vault (SEV), you can integrate
WorkSite with SEV by checking this option. Enter the DNS name or address of
the Enterprise Vault Server in the Server Address field. Refer to Chapter 12,
Symantec Enterprise Vault Integration for more information.
37
Table 4
Field/Feature
Description
Document Date
Options
This option determines whether the created and modified dates on a file are set
based on information in the file, or by WorkSite.
Use System Dates: When a file is imported into WorkSite, the "Created"
property is populated with the date and time of when the file was imported to
WorkSite. The "Modified" property is updated with the date and time when
the file was last modified in WorkSite. This method ignores the original
created and modified information of the file. Use System Dates is the default
setting.
Use File Dates: This option saves both the original file dates (created and
modified) as well as the dates and times of when the file was imported or
modified in WorkSite.
Note. Do not switch these settings back and forth.
38
The Database Setup dialog box shows those databases that the WorkSite Server is currently
serving. If you have not connected WorkSite Server Service to any databases yet, the list view
in this dialog box is blank.
3. Click Add Database, or select an existing database from the list and click Modify. The
Database Properties dialog opens.
Figure 8
4. Enter the database name. You can select it from the list of available ODBC sources, by using
the browse button.
5. Enter the Logon ID and Password for the entered or selected ODBC.
6. Select the Enable Cache Fileserver option if you are using WorkSite Server with Caching
and want to enable Fileserver caching for this database.
7. In the How many connection section, choose one of the following options:
39
number of SQL connections available to the WorkSite Server are pooled and shared
among the simultaneous threads running on the WorkSite Server.
Connection CountEnter the number of SQL database connections that the WorkSite
Server service should maintain to this database.
Preferred DatabaseSelect this option to designate this database as the source for
dialog boxes, captions, and roles. Any database that is identified as a Preferred Database
can serve as a source for dialog boxes, captions and roles. Each WorkSite Server must
be connected to at least one database that is identified as a preferred database. You can
specify alternate preferred databases for individual users using the Database
Administration tool.
Web Contentselect this option if the WorkSite Server is to be used as the database for
the WorkSite web client.
Select the Hidden option if you do not want to display the Web Content database.
9. Click Advanced to set the following options for this library. The Advanced Properties
dialog box opens.
Figure 9
Select Prevent flat space filing to force users to file content inside a workspace. When
enabled, WorkSite clients will prevent any content from being filing outside a
workspace.
In the Grace period to undeclare (hours) field, select one of the following grace period
options.
40
No grace period. This option does not provide a grace period to undeclare a
declared document. Selecting it denotes that once a document is declared, it cannot
be undeclared. This is the default option.
Specify grace period (hours): Specify the time period within which a normal user
can undeclare a declared document. This time period is calculated from when the
document was declared. The value set here updates the Undeclare Record registry
setting in the following key on the WorkSite Server:
HKEY_LOCAL_MACHINE\Software\Interwoven\WorkSite\imDmsSvc\Databases\
<Database Name>\
In the Locale ID field, enter the numerical identifier for the language of the WorkSite
database. WorkSite supports the storage of information in U.S. English plus one
additional language. For WorkSite to support this additional language, you must enter
the Locale ID of the second language here. The locale ID value must compliment the
database collation setting. Refer to the WorkSite Design Guide for more information and
for a complete list of Locale IDs. This list can also be found on the Microsoft web site.
The default value is 1033 (U.S. English).
Caution: The Locale ID setting must only be set for a new WorkSite database. Do not
alter this setting for an existing (deployed) WorkSite database.
NOTE
For information about configuring the WorkSite Indexer portion of this dialog, refer to the
WorkSite Indexer Administration Guide.
10. Click OK to add the database. The database is now added to the list seen in the WorkSite
Server Database Setup dialog.
11. Click Close to save the settings.
41
42
43
Solution: Reconfigure the startup properties for that service in the appropriate Startup dialog,
then try to start the service again.
NOTE
You may receive a positive confirmation message after you configure the startup properties for a
service, but still receive this error message if the login and password provided are not correct.
You can use the About dialog to edit or enter comment information or to view version
information for the selected service.
44
Chapter 3
DBAdmin Desktop
Common Functions
Error Messages
45
DBAdmin Desktop
The main program window in the DBAdmin tool resembles the layout of Windows Explorer. On
the left is a tree frame that displays a list of databases and information tables in hierarchical
form. On the right is a table frame, where the contents of each of the information tables are
displayed.
Tree Frame
The tree frame lists only those databases that are currently registered. Multiple databases can be
listed in the tree frame at the same time. If a database is not listed in the tree frame, you need to
register the database with WorkSite. To display the list of information tables for a database,
click the plus sign next to the
Database icon. To collapse a branch of the tree frame, click
the icons minus sign. All the icons seen below the database in the tree frame are the information
tables available to each database. See Information Tables and Subtables on page 49.
46
DBAdmin Desktop
Table Frame
The contents of an information table are displayed in the table frame in the right pane of the
main program window. To display the contents of an information table in the table frame, click
an icon in the tree frame. To edit an entry in the table frame, double-click the item in the table or
press Enter. The rows in the table frame are commonly identified as Items, Entries or Records.
Use the Tab key to shift focus between the tree frame and the table frame. While the cursor is in
the tree frame, you can use the arrow keys to move up and down the tree.
47
Right-click Menus
There are two right-click menus available in the main program window.
In the tree frame, select and right-click a database to display the Database menu.
In the table frame, select and right-click an item to display the Edit and Manage menus.
NOTE
Custom2 and Custom30 are subclasses that are dependent on Custom1 and Custom29
respectively. The subclasses appear only when the appropriate parent class is displayed in the
table frame.
48
DBAdmin Desktop
Toolbar
The toolbar provides quick access to frequently needed functions. The toolbar can be hidden or
redisplayed by selecting Toolbar from the View menu. The position and configuration of the
toolbar on your desktop is entirely customizable. To move the toolbar to a new location, click
the edge of the toolbar and drag it to that location. The shape of the toolbar can be customized
by clicking and dragging on the edge of the toolbar to reshape it.
Figure 16 Floating toolbar
Document types
Document classifications
Software applications
PC locations
Preferred databases
File servers
Table 5 lists each of the information tables seen in the tree frame and its importance to the
database. Detailed information about each information table is provided in the corresponding
sections of this chapter.
Table 5
Information
Table
Description
This information table lists users who have been granted access to the database.
Users can be of six types, depending on how they access the database: Novell
Bindery users, Novell NDS users, NT users, LDAP users, external users, and
virtual users. Virtual users are DOS users or users who access the database over
the internet. See Managing Users on page 65.
49
Table 5
Information
Table
Description
This information table lists groups of users who have been defined for the
purpose of granting them access collectively to documents. When a group is
granted access rights to a document, all users who are defined as part of that
group are granted the same access privileges. See Managing Groups on page 84.
This information table lists generic security profiles that you can assign to users.
These profiles grant customizable levels of access to document management
functions. Typical roles include database librarian, administrator, user, guest,
group supervisor, and project supervisor. See Roles on page 107.
This information table lists the document types that enable WorkSite to link up a
document with its native application. Document types are normally based on the
application used to create the document. A Microsoft Word document and a
WordPerfect document may be in the same class of documents, but they would
have different document types indicative of the application in which they were
created. See Managing Document Types on page 131.
This information table lists the document classes defined for a database.
Document classes are custom categories used to differentiate documents. Typical
classes of documents include legal briefs, original site plans, letters, memos,
proposals, or transmittals. Document classes can be further subdivided into
subclasses. Document classes and subclasses determine the default security
setting for documents. See Managing Document Class and Subclass on
page 139.
This information table includes information essential to integrate WorkSite DMS
with other applications. This table also identifies the principal application for
each document type. See Defining Application Formats on page 125.
This information table maps PC Node Addresses to descriptive information that
will help identify a PCs actual location. This information is useful for locating
documents that are in use or checked-out. See Managing PC Locations on
page 144.
The Custom1 table is a custom category, typically a Client. It is also used to
differentiate documents in your database. Each Custom1 category can be
subdivided into Custom2 classifications. Custom2 is typically customized as
Matter. They are used to identify the specific case (or project) to which all the
documents relate. See Managing Custom Tables and Subtables on page 147.
to
The Custom3 to Custom12 tables are lookup tables for the Custom3 to Custom12
profile fields. These profile fields provide you with the opportunity to create new
custom categories to identify and differentiate documents in your database.
Custom categories may include Department, Account, Region, Country,
Language, Organization, Division, Coauthor, and Project. See Managing Custom
Tables and Subtables on page 147.
The Custom29 table, like the Custom1 table, presents an additional opportunity to
differentiate documents in your database. The Custom29 table can also be further
subdivided into custom Custom30 classifications. See Managing Custom Tables
and Subtables on page 147.
50
Table 5
Information
Table
Description
This information table is a list of WorkSite databases that can be assigned to users
as their preferred database. See Preferred Databases on page 100.
The Doc File Servers table is a list of the document file servers associated with
this database that can be assigned to users. See File Server on page 103.
This information table lists the templates of security settings that operate globally
and can be assigned to particular authors. When a new document is created for an
author who has been assigned a security template, those security settings will be
applied to the document by default. See Security Templates on page 118.
NOTE
Table 5 lists the default captions for the information tables. You can change the captions using
the Dialog Editor administrative tool.
51
The UnRegistered Database column lists databases that have not been logged into but have
already been defined as ODBC data sources.
Table 6 contains database icons and their descriptions.
Table 6
Icon
Green icons indicate registered databases to which you are currently logged in.
Yellow icons indicate unregistered databases.
Red icons indicate that the DBAdmin tool attempted to log into the database on
startup, but the database did not respond in time and the automatic login
feature timed out.
2. Select the database to be registered from the UnRegistered Databases list and click
Register.
The Logon to Database dialog opens.
3. Enter the Login ID and Password, and click Login.
If the database was already initialized as a WorkSite database, the database name is
displayed in the Registered Databases column and an icon for the database appears in the
tree frame of the main program window.
52
If you are registering the database for the first time or if the database has not been initialized
as a WorkSite database, you are prompted to create the database. Click OK. Refer to the
WorkSite Server Installation Guide for information about the steps to initialize this database.
NOTE
Follow the same procedure to Unregister the database using the DBAdmin tool. Select the
database and click << Unregister.
Document echoing
53
NOTE
The conditions you select in the Set Database Options dialog box are activated or
deactivated globally in a database.
2. To enable document echoing on the database, select the Enable Document Echoing check
box under Database Options. When document echoing is enabled, the WorkSite Client
saves a copy of all documents opened by a user on the users local hard drive.
This local echo document can be accessed directly using the WorkSite Portable program
when, for instance, network connectivity is unavailable.
Refer to Managing Document Class and Subclass on page 139 to enable or disable
document echoing for a specific document class.
3. Enter the length of time in days that a users password should remain valid in the Password
Expires After field under Password Options.
54
NOTE
You cannot disable the password expiration field by setting the number of days to zero.
Enter a value equal to or greater than 1.
4. Enter number of days that the password has been used in the Start Warning User After box.
After this period of time elapses, the system warns users that their password will expire.
5. In the Login Failure Attempts field, enter the number of login attempts that users are
allowed before they are locked out of the system.
6. The WorkArea system preferences under WorkArea System Preferences designate the
containers that appear in the tree for that database. All options are selected by default.
Checked-out Documents
My Favorites
Matter Worklist
My Matters
Document Worklist
WorkSite Explorer
Recent Searches
7. Under the Generate History Record For, Document Tab, select the kinds of activities that
must be recorded in the document history record. Table 7 lists these operations.
Table 7
Open
Close
Security
New Document
New Version
Check-in/check-out
Profile Change
Copy
View
Synchronize
55
Table 7
Delete
Archive
Restore
Release
Export
Modify
Edit Time
Shred
Declared
Migrated
Undeclared
Removed From Folder
8. Under Generate History Record For User, enable the login for User and Impersonation.
Select or clear options listed in Table 8.
Table 8
Successful Login
Unsuccessful Login
Impersonated Login
Impersonated Logoff
9. Click OK.
56
NOTE
In the User History log, the ACTIONSID corresponds to the SID for the action in
MHGROUP.USERACTIONS.
Database Information
To view the database information:
1. Select a database from the tree frame.
2. Select Database Information from the Database menu.
The server and path information for the Database is displayed in an Information window.
57
3. Click OK.
Synchronization Options
To set the synchronization options for a database:
1. Select a database from the tree frame.
2. Select Synchronization Options from the Database menu.
NOTE
The user can set a number of options for synchronizing online and offline documents when
WorkSite OffSite is installed. See the DeskSite Installation and User's Guide or the FileSite
Installation and User's Guide.
3. Set the options for each database on your system.
58
Common Functions
4. Under Container Selection, select items you want to exclude from synchronization:
Exclude all search folders. This option causes the synchronization operation to ignore
all search folders and their contents.
Exclude all folder shortcuts. This option causes the synchronization operation to
ignore all folder shortcuts and their contents.
Exclude documents accessed greater than ___ KB. This option causes the
synchronization operation to ignore any documents that are larger than the size you
specify. This option enhances performance, since large documents are not synchronized.
Exclude documents which have not been accessed in ___ days. This option causes the
synchronization operation to ignore any documents that have not been accessed in the
number of days that you specify. This option enhances performance, since older
documents are not synchronized.
Click OK.
Common Functions
The most commonly performed functions in DBAdmin tool are:
59
Right-click in the main program windows table frame to display the right-click menu
containing the options that are on the Manage menu.
Click the
For more specific instructions, see the sections of this manual that describes the actions that can
be performed in each information table.
Enabling or disabling a particular user or group to deny or grant them access to the database
Before you edit an item in a table, you must display the table of information in the table frame.
To display an information table in the table frame, click its icon in the tree frame.
To edit a field in an information table:
1. Select Modify from the Manage menu or the right-click menu. Click the
the toolbar, or press Ctrl-M.
60
Modify icon in
Common Functions
2. (Optional) Modify the value of the entry by entering text in the Description text box.
3. (Optional) Use the checkbox to enable or disable the entry in the table.
For more specific instructions, see the sections of this manual that describe all the actions that
can be performed in each information table.
61
2. Enter a string in the Search String field. Click the Search String arrow to select from a list
of previously used search strings.
3. If you want to search in only one column in the table frame, select the column from the In
Column field. (All) is selected by default.
4. Set the following options:
Match Whole Word. Use this option to find instances of the search string that appear as
whole words.
Match Case. Use this option to match the case of your search string exactly. In
Figure 22, the Database Administration program would find ALAN and aLan
because the Match Case check box was not selected.
Direction. Use this option to set the direction for searching in the table. Select
Backward to search up, or Forward to search downward the list.
62
Error Messages
NOTE
Do not select a filter when you search in the User, Group, or Roles table. All entries listed in
that particular table on the database are displayed (up to the maximum number of entries
allowed).
Error Messages
Error messages produced by the DBAdmin tool have the following structure:
Every SQL error message begins with an SQL Error number, followed by the error message
from the database. These two pieces of information help WorkSite Technical Support to
understand the nature of the error and why it was produced.
63
The last part of each error message is a message to the user produced by the DBAdmin tool.
In the example, the error was produced when a user attempted to delete an entry in the
Document Class information table when there were still Subclasses defined for that class.
Technical Support
If you receive an error message, contact Autonomy Technical Support. Document the the error
message and the circumstances that produced it.
64
Chapter 4
See the WorkSite Server Installation Guide for an introduction to using DBAdmin.
Managing Users
Each WorkSite database has its own list of validated users. To gain access to a database, the user
must first be added to the list of validated users.
A users access to documents in the database is limited by the security status of documents (such
as public or private), and the users membership in any groups that are defined for the database.
A users role determines the users access to document management functions. See Creating
Roles on page 110.
65
Users are differentiated into five types, based on the operating system that they use.
Microsoft Windows OS Domain Users. Users who access the database through Microsoft
Windows. Database user IDs and full names must match those listed on the network for
these users.
Novell NDS Users. Users who access the database through Novell NDS. Database user IDs
and full names must match those listed on the network for these users.
LDAP Directory Users. Users who access the database through directory services that use
the Lightweight Directory Access Protocol. Database user IDs and full names must match
those listed on the directory service for these users.
Novell Bindery Users. Users who access the database through Novell Bindery. Database
user IDs and full names must match those listed on the network for these users.
Virtual Users. Users entered directly into WorkSite and not synchronized or populated from
another source.
The following actions can be performed in a User Information table using the DBAdmin tool:
Synchronize database user information with network information (except for LDAP users)
66
Managing Users
User accounts are stored in the database. The WorkSite Server verifies each users login against
accounts stored in the SQL database. It gives users access to those databases on which they are
valid users.
Users log into the WorkSite Server but their account details are stored in the SQL database.
Users only see the databases on which they have accounts.
Adding Users
To give users access to a database, you must first add them to the user information table for that
database.
NOTE
Before you can add a Novell user, Windows user, or Novell NDS user to a database, the user
must be defined as a user on the network. The Add User function in the DBAdmin tool only
allows you to add Novell, Windows, or Novell NDS users who are already defined on the
network.
To add users to a WorkSite database:
1. Start DBAdmin.
From the Windows Start menu, point to All Programs, then Autonomy and then select
iManage Database Administration.
2. Select the required database in the tree frame of the main program window.
3. Click the
4. Select the
5. Click the
Add icon from the toolbar or select Add from the Manage menu. The Add
New Users dialog box is displayed (see Figure 27).
6. Click the appropriate tab for the type of user that you want to add, then enter the users
information.
Add icon from the toolbar or select Add from the Manage menu.
67
68
Managing Users
External Users. Select this option to designate this user as an external user, such as a
customer, part-time contractor, vendor or partner.By default, external users have limited
privileges.
6. Enter a password for this user in the Password field and the Confirm Password field. You
must enter the same password in both fields. There is no default password for new users.
New users cannot be added with a blank password.
7. Select User Must Change Password at Next Logon to force this user to change their
passwords the next time they connect to WorkSite.
8. Select Password Never Expires to exempt the user's password from the expiration settings.
Use this option for system service accounts that should not expire rather than end-users.to
prevent To specify the default number of days before passwords expire, see Configuring
WorkSite Database Options on page 53.
NOTE
Autonomy does not recommend selecting Password Never Expires when adding users.
9. Click Add, then click Close to save the added user(s) and exit.
Add icon from the toolbar or select Add from the Manage menu.
69
Figure 28 Add New Users Dialog, Microsoft Windows OS Domain Users Tab
5. Select the appropriate domain from the List Users From list.
6. Select the user from the list of Domain Users.
7. Select the External Users option to designate this user as an external user, such as a
customer, part-time contractor, vendor or partner. By default, external users have limited
privileges.
8. Enter the password in the Password and Confirm Password fields to change the password
that is assigned to all new users.
NOTE
There is no default password for new users. New users cannot be added with a blank
password. You must enter a password in the Password and Confirm Password fields.
9. Select User Must Change Password at Next Logon. This option forces users to change
their passwords the next time they connect to WorkSite.
70
Managing Users
NOTE
Autonomy does not recommend selecting Password Never Expires when adding users.
10. Click Add after all the details are entered.
11. Click Close when finished adding users.
Add icon from the toolbar or select Add from the Manage menu.
71
Figure 29 Add New Users dialog box, Novell Bindery Users tab
5. Select the appropriate server from the List Users From list.
NOTE
The Novell Bindery Users tab displays users according to the server to which they are
bound. If you want to add a user who is listed under a container object, use the Novell NDS
Users tab.
6. To search through any list of users, click Find to perform a search.
7. Select the required user from the list of Domain Users.
8. Select the External Users option to designate this user as an external user, such as a
customer, part-time contractor, vendor or partner. By default, external users have limited
privileges.
9. Enter the password in the Password and Confirm Password fields to change the password
assigned to all new users.
72
Managing Users
NOTE
There is no default password for new users. New users cannot be added with a blank
password. You must enter a password in the Password and Confirm Password fields.
10. Select User Must Change Password at Next Logon. This option forces users to change
their passwords when they log in.
NOTE
Autonomy does not recommend selecting Password Never Expires when adding users.
11. Click Add, then click Close to save the added user(s) and exit.
Add icon from the toolbar or select Add from the Manage menu.
73
Figure 30 Add New Users dialog box, Novell NDS Users tab
5. Select the server or container object in which the user is listed in the tree frame.
You can navigate between servers and container objects by selecting items in the tree frame.
Each time you click an item in the tree frame, the list of users associated with that item are
displayed in the table frame.
Figure 30 shows the Novell NDS Users tab with users from the NRT_OU container object
displayed. Click the .. in the tree frame to navigate up the tree.
6. Select the user from the list.
7. Select the External Users option to designate this user as an external user, such as a
customer, part-time contractor, vendor or partner. By default, external users have limited
privileges.
8. Enter the password in the Password and Confirm Password fields to change the password
assigned to all new users.
74
Managing Users
NOTE
There is no default password for new users. New users cannot be added with a blank
password. You must enter a password in the Password and Confirm Password fields.
9. Select User Must Change Password at Next Logon. This option forces users to change
their passwords when they log in.
NOTE
Autonomy does not recommend selecting Password Never Expires when adding users.
10. Click Add, then click Close to save the added user(s) and exit.
If you are adding more than a few LDAP Directory users from a common directory, Autonomy
recommends that you use the Directory Service Synchronization Service described in
Chapter 11, Directory Service Synchronization Service. This service allows you to automate
the import and synchronization of users from ADS or LDAP.
Adding LDAP Directory users is a multi-step process that requires you to know details about the
LDAP Directory tree. You should be able to access the LDAP Directory server as an
administrator, and you will need to know the attributes used to store user information.
The following steps describe how to add users from an LDAP Directory.
1. Select the required database in the tree frame of the main program window.
2. Click the
3. Click the
Add icon from the toolbar or select Add from the Manage menu.
75
76
Managing Users
6. Under Directory Type, select Microsoft Active Directory or LDAP based on the type of
directory service your organization uses.
7. Under Credentials, select one of the following options:
Use Sync Server LoginIf you have WorkSite Directory Service Synchronization
installed, you can use the configuration information stored for the service to
authenticate with the LDAP server. You must have Directory Service Synchronization
configured to communicate with the LDAP server to use this option. In the Sync Service
Server field, enter the computer name where Directory Service Synchronization is
installed.
Other LoginUse this option to manually authenticate with the LDAP Server. Enter
the fully qualified distinguished name of a user with administration privileges in the
User ID field and the users password in the Password field.
8. In the TCP port field, enter the port number that the LDAP server uses to communicate.
The default port is 389.
9. In the LDAP Server field, enter the name of the server that is hosting the LDAP service.
10. Click OK. If the information entered is correct, the LDAP Attribute Mapping (User) dialog
opens.
77
The LDAP Attribute Mapping (User) dialog (as shown in Figure 33) allows you to map the
attributes used to store user information in your LDAP directory to corresponding user data
fields used by the WorkSite database.
Each field has a list of LDAP attributes that are commonly used to contain the data for the
corresponding WorkSite field. If none of the options in the list are correct, you may enter the
name of an attribute in the field.
11. In the Name field under Organizational Unit, select or enter the LDAP attribute that
contains the names of the Organizational Unit (OU) containers on your LDAP Directory
tree.
NOTE
If the LDAP attribute mapped to the Name field for a OU container returns a blank, that
container will not be displayed in the Container column of the LDAP Directory Users tab.
12. In the User section, select or enter the LDAP attributes for each of the WorkSite properties
shown. Refer to Figure 33 for an example.
NOTE
If either of the LDAP attributes mapped to the Name or User ID fields for a user returns a
blank, that user will not be displayed in the table frame of the LDAP Directory Users tab.
13. After completing the mapping of fields, click Update.
The LDAP Directory Users tab is displayed. If there are not too many directory objects
(users) to display, all users that exist below the root level of the LDAP Directory are listed in
the table frame.
78
Managing Users
14. Select the server or container object in which the user is listed in the tree frame.
You can navigate between servers and container objects by selecting items in the tree frame.
Each time you click an item in the tree frame, the list of users associated with that item are
displayed in the table frame. Click the .. in the tree frame to navigate up the tree.
NOTE
To limit the number of users shown, refer to Limiting the Number of Users Displayed on
page 80.
15. Select the user(s) to be added. Multiple users can be selected by using a Shift-click to select
a continuous group or a Control-click to add individual users to those previously selected.
16. Select the External Users option to designate this user as an external user, such as a
customer, part-time contractor, vendor or partner. By default, external users have limited
privileges.
79
17. Enter the password in the Password and Confirm Password fields to change the password
assigned to all new users.
18. Select User Must Change Password at Next Logon. This option forces users to change
their passwords when they log in.
NOTE
Autonomy does not recommend selecting Password Never Expires when adding users.
19. Click Add, then click Close to save the changes and exit.
After you close the warning message, the LDAP Directory Users tab is displayed but the
table frame is empty.
2. Click Search Filter to display the LDAP Directory Search Filter dialog.
80
Managing Users
3. Select the attribute to filter on in the LDAP Directory Search Filter dialog box:
Use Filter on Name Attribute. This check box applies search criteria against the
contents of the Full Name column in the user table.
Use Filter on Account Name Attribute. This check box applies search criteria against
the contents of the User ID column in the user table.
NOTE
Both attribute filters can be selected at the same time. When both filters are selected, the
search criteria are treated as a logical AND operator. For an object to be displayed, it has to
match both criteria.
4. Enter values for the Filter Value field(s).
5. Select the filter type:
Exact Match. The search object is returned only when there is an exact match with the
value entered in the Filter Value field.
Starts With. The search object is returned only when it begins with the value entered in
the Filter Value field.
6. Click OK to execute the search filter. The LDAP Directory Users tab is displayed with the
results of the search.
81
Synchronize users with the network. See Synchronize Users on page 83.
Modify button in
82
Managing Users
3. Make the required changes, then click OK. Refer to the online help by clicking Help for
more information.
Synchronize Users
In addition to changing user information using the Modify command, you can update user
information by synchronizing database user information with the latest network information.
The Synchronize command is used to update user information in a WorkSite database with the
most recent information available on the network. This option is available for WINDOWS NT,
NOVELL 3.X, or NOVELL NDS network users.
NOTES
LDAP Directory users who require administrative access to the LDAP Directory network
cannot be synchronized.
Virtual users for whom there is no corresponding network information cannot be
synchronized.
83
When you synchronize a user, the following changes are registered on the database:
Novell NDS, NT, and Novell Bindery database users who do not have a matching network
user are disabled.
Database users whose network login privileges are disabled will also be disabled.
Database user full names are changed to match their corresponding network user full names,
if necessary.
Managing Groups
The concept of a group in WorkSite is similar to the idea of a group on the network. Groups are
lists of multiple users. They are defined as a collection for assigning identical access privileges
to certain documents to group members. If a group has access to a document, then the users in
the group can access the document.
Before granting group access to documents in a database, add the group to the list of registered
groups in that database. You can add groups either by creating them from within the DBAdmin
tool or by importing the membership lists for groups that already exist on the network. After you
add a group to the database, its membership is not changed even if the membership of the group
on the network is changed.
You can import groups from Novell Bindery, Novell NDS, a Windows domain, or LDAP or
Microsoft Active Directory Service networks. Once you add groups to the database, you can
fully customize the members using the DBAdmin tool.
Three fields of information are associated with each user group on a database:
84
Enable flag. When groups are disabled, they cannot be added to Access Control Lists on
documents or containers.
Managing Groups
NOTE
The Add New Groups dialog box is displayed (see Figure 38).
To add specific groups to the database, see the following sections.
NRTADMIN Group
The NRTADMIN Group is used to determine who can access the database using the DBAdmin,
Document Import, and the Monitor tool.
When you log into a database from the DBAdmin tool, the tool verifies if you are a member of
the NRTADMIN Group on that database. If you are not a member of that group, the tool checks
if you are the administrator on your workstation. If one or the other of these conditions is true,
you are allowed to log in.
On NDS networks, you may want to create the NRTADMIN Group on the network and add
yourself as a member. On NDS networks, if you are not a member of the NRTADMIN Group on
the database, but you are a member of the NRTADMIN Group on the network, the DBAdmin
tool allows you to log into the database.
CAUTION
Membership in the NRTADMIN group also gives a user the privilege of being able to delete
other users documents from the WorkSite client. This ability can be disabled using the Roles
information table.
85
86
Managing Groups
NOTE
For instructions on how to add a user to a virtual group, see Assigning Users to Groups on
page 98.
87
Figure 39 Add New Groups Dialog, Microsoft Windows OS Domain Groups Tab
4. Select the appropriate domain from the List Groups From list. In Figure 39, the groups
defined for the AD2003 domain are displayed.
5. Select the External Group option to designate this group as an external group.
6. Select the group(s) in the table, then click Add.
7. Click Close to save the changes and exit.
88
Managing Groups
4. From the List Groups From list, select the server to which the group is bound.
When a server is selected, the groups bound to that server are displayed in the Domain
Groups frame.
In Figure 40, the Domain Groups frame displays the groups bound to SUN server.
5. Select the External Group option to designate this group as an external group.
6. Select the group from the Domain Groups frame, then click Add.
7. Click Close to save the changes and exit.
89
90
Managing Groups
4. Select the container object or server to which the group is bound from those available in the
tree frame.
Click an item in the tree frame to display the contents of the new container. The current
context displayed in the table frame is noted at the top of the window. It is identified by the
words, Current Context. In Figure 41, groups defined for the NRT_OU container object
are displayed.
5. Select the External Group option to designate this group as an external group.
6. When the group name that you want to add appears in the table frame, select it and click
Add.
7. Click Close to save the changes and exit.
91
If you are adding more than a few LDAP Directory groups from a common directory, Autonomy
recommends that you use the Directory Service Synchronization Service described in
Chapter 11, Directory Service Synchronization Service. This service allows you to automate
the import and synchronization of groups from ADS or LDAP.
Adding LDAP Directory groups is a multi-step process that requires you to know details about
the LDAP Directory tree. You should be able to access the LDAP Directory server as an
administrator, and you will need to know the attributes used to store user information.
The following steps describe how to add groups from an LDAP Directory.
1. Click the
Group icon in the tree frame to display the databases group information table
in the table frame.
2. From the Manage menu, click Add, or click the
92
Managing Groups
93
Current Group Credentials: Use this option if you are currently logged in to the
system as an LDAP user with administration privileges. This is the default.
Other Login: Use this option if you are not logged in as an LDAP user with
administration privileges. Enter the fully qualified name of a user with administration
privileges in the User DN field. Enter a password in the Password field.
7. Under TCP Port, select the TCP port that the LDAP server uses to communicate. The value
of the default port is 389. If your LDAP server is not using this TCP port, select the Other
Login option and enter a value in the TCP Port field.
8. Under LDAP Server, select the server that is hosting the LDAP service. The default server
is the LDAP server that authenticated the current user.
If you want to connect to a different server or if you are not logged in as an LDAP user,
select the Other Login option. Enter the name of the appropriate server in the LDAP Server
field.
9. After entering all the necessary information in the fields of the LDAP Authentication dialog
box, click OK. If the information entered is correct, the LDAP Attribute Mapping (Group)
dialog box is displayed.
94
Managing Groups
The LDAP Attribute Mapping (Group) dialog box allows you to map the attributes used to
store group information in your LADP tree against corresponding group data fields used by
the WorkSite Server database.
Each field has a list of LDAP attributes that are commonly used to contain the data for the
corresponding WorkSite field. If none of the options in the list are correct, you may enter the
name of an attribute in the field.
10. Locate the Organizational Unit section. In the Name field, select or enter the LDAP
attribute for the OU containers on your LDAP directory tree.
NOTE
If the LDAP attribute mapped to the Name field for an Organizational Unit container
returns a blank, that container will not be displayed in the Container column of the LDAP
Directory Groups tab.
11. Locate the User section. In the User ID field, select or enter the LDAP attribute that
contains the user IDs for your LDAP directory tree.
NOTE
If the LDAP attribute mapped to the User ID field for users returns a blank, the
corresponding user will not be added to the group member list.
12. Under Group, select or enter the LDAP attributes for each of the WorkSite properties
shown. Refer to Figure 44 for an example.
NOTE
If LDAP attributes mapped to the Name or Group ID fields returns a blank, the associated
group will not be displayed on the LDAP Directory Groups tab.
95
14. Select the server or container object in which the user is listed in the tree frame. You can
navigate between servers and container objects by selecting items in the tree frame. Each
time you click an item in the tree frame, the list of users associated with that item is
displayed in the table frame. Click the .. in the tree frame to navigate up the tree.
15. Select the group(s) to be added. Multiple groups can be selected by using a Shift-click to
select a continuous set of groups or a Control-click to add individual groups to those
previously selected.
16. Select the External Group option to designate this group as an external group.
17. Click Add, then click Close to save the group(s) and exit.
96
Managing Groups
1. Click Search Filter to display the LDAP Directory Search Filter dialog box.
Figure 47 LDAP Directory Groups, LDAP Directory Search Filter
o
2. Select the attribute to filter on in the LDAP Directory Search Filter dialog box:
Use Filter on Name Attribute. Applies search criteria against the contents of the Full
Name column in the group table. This search filter should not be used against the LDAP
Directory Groups table. It will cause nothing to be returned.
Use Filter on Account Name Attribute. Applies search criteria against the contents of
the Group column in the group table.
NOTE
Both attribute filters can be selected at the same time. When both filters are selected, the
search criteria is treated as a logical AND operator. For an object to be returned by the
search, it has to match these entries.
3. Enter values for the Filter Value field(s).
4. Select the filter type:
97
Exact Match. The search object must exactly match the value entered in the Filter Value
field.
Starts With. The search object must begin with the value entered in the Filter Value
field.
5. Click OK to execute the search filter. The LDAP Directory Groups tab is displayed with
the results of the search.
Group membership cannot be synchronized with network groups after adding the group to
WorkSite Server. If you change membership of a group on the network, you must make identical
changes to the group on the database manually to keep group membership in WorkSite and on
the network identical.
The Directory Service Synchronization service tool allows the WorkSite Server to perform
repeated one-way synchronizations with hierarchical directory services, including LDAP and
NDS. See Chapter 11, Directory Service Synchronization Service..
Before you can add users to a group, you must add the group to the database. See Managing
Groups on page 84.
98
Managing Groups
Groups. The leftmost column is a list of groups that have already been added to the
database.
Users. The middle column displays a list of users belonging to the group selected in the
leftmost column.
Available Users. The rightmost column lists the available users or users who are not
included in the group currently selected in the Group column.
99
NOTE
Users can be assigned to multiple groups. Double-click user to move them between the
Users and Available Users columns.
Preferred Databases
Each user in a WorkSite database can be assigned a preferred database. Assigning users (or
authors) a preferred database prevents the user the extra step of selecting a library during certain
actions, such as:
100
When a user creates a new document, the database selected in the New Document Profile
dialog box is automatically set to his or her preferred database by default. If the user enters a
different users name in the Author field in the New Document Profile dialog, the selected
Preferred Databases
database will automatically switch to the preferred database assigned to the user named in
the Author field.
When a user first opens the Search dialog, the selected target for the search will be set to his
or her preferred database. If the user changes the target database for the search, that setting
will remain in effect until he or she changes it or disconnects from WorkSite.
Prerequisites
The following steps must be completed before you begin working with preferred database
tables:
1. The user must exist in the User information table.
2. The database must be added to the Databases information table.
3. Identify the users preferred database.
3. Right-click in the table frame and select Add. The Add Databases dialog opens.
Figure 49 Add Databases Dialog
101
102
Preferred Database. This column displays the databases that are listed in the Database
information table.
Users. This column lists the users who have been assigned the database selected in the
Preferred Databases column.
File Server
Available Users. This column lists those users who have not been assigned to a preferred
database.
You can determine the database assigned to a user by viewing the Preferred Database
column in the User information table. The preferred database assignment for each user is
listed in a column of the User table.
File Server
A WorkSite database can store documents on multiple file servers. When you create a WorkSite
database, you must identify at least one machine that will serve as a repository for documents.
The document file server that you identify when you create a WorkSite database becomes the
Default File Server for that database.
103
Documents are stored on file servers according to author information. The documents of users
(or authors) not assigned to a file server are stored on the default document file server.
File Server icon in the tree frame of the DBAdmin main program window.
3. Right-click in the table frame and select Add. The Add File Servers dialog opens.
Figure 51 Add File Servers Wizard, Select File Server Container
4. Select the operating system type for the file server that you want to add.
5. Click Next.
104
File Server
6. Enter a Name to identify this file server. Do not enter a name longer than 32 characters, or
one that contains single quotes, double quotes or spaces.
7. Under Path Creation Options, select how documents should be organized on the file server.
If you select Path based on Custom1 Entry, documents will be organized by Custom1
information.
8. In the Path field, enter the full path to the root directory in which documents should be
stored on this machine, or use the
NOTE
If the operating system is Novell NDS, enter the Container Name in the Server Context
field. Enter the machine name and root directory path in the Path field.
9. Click Finish to add the file server to the database.
NOTE
You cannot delete or modify entries in the File Server information table.
105
106
File Servers. This column lists the file servers that appear in the File Server information
table.
Available Users. This column lists users who are not assigned to a file server.
Users. This column lists those users who are currently assigned to the file server selected in
the File Servers column.
Roles
Roles
WorkSite Server implements a dynamic security model called Roles. Roles allow administrators
to distribute access to document management functions selectively across an organization.
Users are each assigned a generic security profile, called a role, which controls the kinds of
document management activities that the user can perform.
NOTE
Roles do not affect a users access to documents. Access rights are determined by default
security settings and access control lists.
The kinds of document management activities that users can perform and that are controlled by
their security profile or role are
Importing documents
Editing documents
107
Table 9 illustrates how roles can be used to control access to document management tasks.
System administrators can assign the same security profile to one or more users.
Table 9
Role
Example
User
Create New
Docs
Edit
Docs
Archive Read-only
Docs
Access
Legal User
Typist
Granted
Granted
Granted
Granted
Accounting
Power
Accounting
Secretary
Granted
Granted
Temp
Temp in
Accounting
Granted
Granted
DB Librarian Archivist
Granted
Granted Granted
Office
Manager
Office
Manager
Granted
Granted
Sys Admin
Sys Admin
Granted
Granted
Create
New
Users
Delete
Documents
Granted
Granted
Granted
Granted
Granted
Granted
108
Roles
Office Managers documents. They can share documents by creating public folders or sharing
saved searches.
Table 10 Using Roles to Manage Document Searches
User
Role
New Docs
Labeled
Legal
Accounting
Business
Other
Legal
Granted
Granted
Search Access Search Access
Corporate
Attorney
Granted
Granted
Search Access Search Access
Accounting
Secretary
Accounting Accounting
User
Granted
Search Access
Office
Manager
Office
Manager
Granted
Granted
Search Access Search Access
Accountant
Accounting Accounting
Power User
Granted
Granted
Search Access Search Access
Sys Admin
Sys Admin
Granted
Granted
Granted
Search Access Search Access Search Access
Business
Other
Examples of Roles
You can create various types of roles to assign to users and groups.
Table 11 Examples of Roles
Role for...
Temporary
Employees
Typical Users
Delete documents
Release documents
Supervisors
Checkout documents
Delete documents
Search for public documents
Create public folders
Perform public searches
Perform full-text searches
109
Creating Roles
Roles consist of two items:
Security profile
Membership list
All users listed in the membership for a role receive the privileges (or limitations) associated
with that role. You can edit the membership for a single role from the same dialog used to create
the security profile for that role, while the Role Management dialog is available for managing
the membership of multiple roles at once.
Default role
When a WorkSite database is first created, a default role is added to the table of existing roles.
Users who are not assigned a specific role in the database are granted the privileges that are
assigned to the default role.
You cannot edit the membership of the default role. You can, however, change the privileges
assigned to the default role.
You can assure that a user is assigned the default role by removing the user from the
membership of all other roles that are defined.
NOTE
Roles cannot be deleted, however they can be disabled by removing all members or by clearing
all task privileges.
Roles icon in the tree frame of the DBAdmin main program window.
Add icon in the toolbar or select Add from the Manage menu.
110
Roles
Select or clear the check boxes in the columns to indicate permission to perform activities
for the users assigned to that role. See Table 12.
111
7. Create a custom document profile and search profile for the role using the Edit/Create
Profile tab and the Search Profile tab. To prepopulate or disable fields in the New
Document Profile and Document Search dialog boxes, see Edit/Create Profile and Search
Profile Tabs on page 113.
8. Click the Membership Assignment tab to assign the new role to users. See Assigning
Roles to Users on page 115.
9. Click OK to add the role to the database.
Table 12 Options on the Privileges Tab
If this check box is selected...
Content Operations
Import/Create
Checkout Documents
Unlock Documents
Delete
Read Only
Folder Operations
Create Public Folder
Administrative Operations
Use WorkSite Import
Web Operations (These privileges are specific to users accessing the database through
the WorkSite Web product.)
112
Roles
Perform searches
Create WorkSpaces
Delete WorkSpaces
Delete workspaces
Profile IDs. Identifies the field of document profile information that is being referenced.
Default Values. The Default value(s) for the corresponding profile field.
Access Rights. Indicates whether the user who is assigned this role can change the default
value applied to the corresponding profile field. Access Rights can be read-only (R) or
read-write (W) in the Search Profile tab and the Edit/Create Profile tab. With read-write
access, the user can override the default value.
113
2. Select a Profile ID and click Edit. In Figure 55, the Matter profile field is selected, and the
Edit Matter dialog is shown.
3. Enter values in the Edit dialog.
114
In the Default Value field, enter a default value for this field of information. This field
will be prepopulated with the default value when the user opens the New Document
Profile, New Version Profile, or Document Search dialog box. When a default value is
assigned to a profile field, the user is assigned read-only access. The user cannot change
the value of the profile property. When multiple default values are specified for a profile
field, then these are the only valid values available to the user.
Set the Access Rights on the profile field. If you want users to be able to change the
value of this profile field, select read-write access. If you do not want users to be able to
change the value of this profile field, select read-only.
Roles
NOTE
All values entered in the Edit/Create Profile tab are read-only. Values can be set to
read-write in the Search Profile tab only.
4. Click OK. The new values are displayed under Profile Access Information on the tab. R
in the Access Rights column indicates that users have read-only rights on the field. W
indicates users have read-write access.
When you are editing the access privileges associated with a role
In the Role Setup dialog Membership Assignment tab, you can add or remove users associated
with a specific role. This dialog can be used to edit the membership for only one role at a time.
To edit the membership for multiple roles at once, select Role Management from the Manage
menu.
Roles icon in the tree frame of the DBAdmin main program window.
115
4. To assign the role to a user, select the users name in the Users column and click << Add.
5. To remove a user from the list of users who are assigned this role, select the users name in
the Users column and click Remove>>.
NOTE
As a shortcut, you can double-click a users name to move it from one column to the other.
You can also move multiple users at once by selecting the users names and clicking the
Add or Remove buttons.
6. Click OK.
NOTE
When the default role is being edited in the Role Setup dialog box, the Membership
Assignment tab is not displayed. You cannot explicitly edit the membership for the default
role. Users who are not assigned to any other roles receive the privileges assigned to the
default role.
116
Roles
Membership for the default role cannot be edited. Users who are not explicitly assigned to a
role inherit the privileges set for the default role.
Only external users can be assigned to an External role. They cannot be assigned to other
roles that are not external.
117
Security Templates
Security templates operate similarly to the preferred database and file server assignments. The
Security Templates information table is a list of predefined security settings that can be
assigned to a particular user.
The security settings of the template assigned to a user are applied by default to all the
documents for which that user is the author.
118
Security Templates
4. Enter the name and description in the Security Template Name and Description fields.
5. Select the level of default security from the Default Security list. The options available are
Private, Public or View.
6. Select a level of security from the Security Type list. The options available are Read/Write,
Read, Full Access, and No Access.
7. Select the user or group from the Available Users/Groups list.
NOTE
Use the User Filter button to filter the users based on specifics in the Select User dialog
box.
8. Click < Add to add the user or group to that security template.
9. Click OK.
119
NOTE
To remove the user(s) from the security template, select the user(s) from the Security
Information column and double-click or click Remove>>.
120
Renaming Users
Renaming Users
The rename function in the DBAdmin tool is used to replace one user name with another
throughout a database. This function changes all instances of the old user name in all of the
database tables to the new user name.
Prerequisites
The following steps must be completed before renaming the user function:
Neither the old user nor the new user may be logged in during the renaming process.
No documents for which the old user is listed as the author, operator, or as the user who last
edited the document can be checked-out or in use. Use the Monitor tool to release all such
documents.
The user involved should not work on echo documents while the renaming process is being
performed. The old user will not be able log in and then synchronize such documents after
the rename operation is completed.
Do NOT interrupt the renaming process by shutting down the DBAdmin tool or the
workstation on which this process is running.
You MUST verify that you have sufficient space in your SQL transaction log to handle the
many UPDATES that this function may generate.
It is recommended that you perform a complete database dump before using the Rename
function to clear the transaction log.
The renaming process is an extensive operation that touches over fifteen database tables.
Depending on the type of database and the number of documents in your database, it may
take a long period of time to complete and may generate many UPDATE transactions on the
database.
There is no rollback option to reverse the changes made during the renaming operation.
Any documents checked-out by either the new user or old user during the renaming process
will not be updated.
121
Table 13:
Group membership lists
Document profiles
Role memberships
Worklist information
Project owners
The old users preferred database and file server assignments will not be copied to the new
user automatically. If you want these settings to migrate, you will need to make these
assignments manually.
If the old user is listed as an author or operator in any Edit/Create or Search profile template
for a role, you will need to update these listings manually. Check all of the roles that you
have created to verify that the old user is not listed in the Edit/Create or Search profile
templates for a role.
NOTE
Information about the rename operation is recorded in the DBADMIN. LOG file.
122
Renaming Users
The renaming process is an extensive operation. Depending on the type of database and number
of documents involved, the renaming process may take an extended period of time to complete.
123
124
Chapter 5
See the WorkSite Server Installation Guide for an introduction to using DBAdmin.
125
NOTES
If you use the default settings for the list of applications for a database, each user should
have a DOS path established to the drive and directory of the integrated applications.
App Setup is the default caption for the Application information table in the database. This
caption can be customized using the Dialog Editor.
Add button from the toolbar, or from the Manage menu, select Add.
126
127
NOTE
These fields cannot be edited once an application record is added. To modify these fields,
you must delete the application record and add a new updated recorded.
4. Click OK.
Table 14 Application Setup Properties
128
Field Identifier
Intended Content
Name
Path
Enter the location of the application in this field. You can specify
a full pathname. For example, if the application is Microsoft
Word and the executable file is WINWORD.EXE, then it would
be sufficient to enter WINWORD.EXE in this field.
If the application is a non-primary application (see Primary
Application check box in this table), the following command line
parameters pass document information to applications launched
from WorkSite:
%DOC_DB. Allows you to pass the database name
%DOC_NUM. Allows you to pass the document number
%DOC_VER. Allows you to pass the document version
-NO_OUTPUT Used when the application being launched does
not return output to Autonomy.
Example:
You want to pass the database name, document number, and
version number to an application via the command line. The
specified application will not be returning output to WorkSite. A
fax application is an example of an application that might
consume this document information but not return output. You
call the fax application sendfax.exe. Given these parameters,
the command line settings for the fax application would be:
C:\\sendfax.exe DB=%DOC_DB NUM=%DOC_NUM
VER=%DOC_VER -NO_OUTPUT
Type
Primary
Application check
box
Intended Content
Integration Mode
Complete the following sections only if the DDE check box is selected:
DDE Name
DDE Topic
Enter the DDE Topic for this application in this field. The DDE
Topic usually identifies a category of data associated with the
server application.
Open
Delete
129
Primary Applications
The primary application is the preferred application for opening a document. If only one
application is associated with a document type, the Primary Application check box must be
selected in the App Setup list in order for WorkSite to open the document.
If there are multiple applications mapped to the same document type, you can identify one as
primary by selecting the Primary Application check box when you create the entry for that
application in the App Setup list. Only one application can be identified as the primary
application for a document type.
NOTE
To use the Open in WorkSite, the document type must have an application designated as the
Primary Application in the App Setup list.
Non-Primary Applications
The Primary application is the preferred application for opening a WorkSite document. Other
applications that are mapped to the same document type become non-primary.
All non-primary applications are listed under the Application submenu in the WorkSite client.
Users can select documents in the document grid, A user can launch a document in a
non-primary application by selecting it from the Application submenu.
130
Alias
DMS
Extension
App
Extension
ANSI
%V
TXT
Microsoft Word
WORD
%V
DOC
Word 2007
WORDX
%V
DOCX
WORDXT
%V
DOTX
Corel WordPerfect
WPF
%V
WPD
Microsoft Excel
EXCEL
%V
XLS
Excel 2007
EXCELX
%V
XLSX
Lotus 1-2-3
LOTUS
%V
%V
QUATTRO
%V
QPW
PPT
%V
PPT
Description
Word Processing Document Types
Microsoft PowerPoint
131
Auto
Alias
DMS
Extension
App
Extension
PowerPoint 2007
PPTX
%V
PPTX
PRSHW
%V
SHW
Windows Bitmap
BMP
%V
BMP
Compuserve GIF
GIF
%V
GIF
PC Paintbrush
PCX
%V
PCX
TIFF
%V
TIF
Windows Metafile
WMF
%V
WMF
VSD
%V
VSD
JPEG
%V
JPEG
ACROBAT
%V
FAX
%V
%V
HTML
HTML
%V
HTML
URL
URL
%V
URL
XML
XML
%V
XML
MIME
MIME
%V
MSG
GroupWise Email
GW
%V
TXT
Notes Email
NOTES
%V
DXL
Laserform 8
LFD
%V
LFD
Microsoft Publisher
PUB
%V
PUB
Other
132
The Auto column in the Type information table cannot be changed. This column indicates
whether WorkSite Server will automatically recognize a document type. Document types are
marked as non-autodetect if DBAdmin tool does not add them during database initialization.
Autodetection is accomplished through file type detection technology, which is built into
WorkSite Server. WorkSite Server can detect dozens of different file types. When you create a
WorkSite database, a set of default WorkSite document types are installed in the Type
information table.
These document types are mapped to many of the most common file types, such as Microsoft
Word, WordPerfect, and PDF.
In addition, you can map a document type to one or more file types. The WorkSite Server can
then detect the file type.
For example, you could create a document type for ASCII, Autocad, or HTML, and map those
WorkSite document types to corresponding file types. When a document type is mapped to an
file type, WorkSite Server assigns the appropriate value to the document type and opens it in the
appropriate application. If WorkSite cannot detect the file type of a document, or when the
documents file type is not mapped to a WorkSite document type, then the user must manually
select a WorkSite document type. See File Type Mapping on page 133
133
Document Type Mapping Management from the Manage menu. See Mapping WorkSite
Document Types to File Types on page 134.
If the file type is mapped to an entry in the WorkSite Document Type information table,
then the WorkSite client labels the document with that WorkSite document type.
If the file type is not mapped to an entry, or if the WorkSite client cannot determine the
documents file type, then the user must select a proper document type for the document
from those available in the Document Type information table.
The Document Type Mapping Management dialog allows you to customize WorkSite clients
automatic document type detection capabilities. With the Document Type Mapping
Management dialog, you can map file types to document types listed in the WorkSite Document
Type information table. When a WorkSite Document Type is mapped to one or more file types,
it is identified in the Document Type table as an autodetect document type. Entries in the
Document Type information table that are not mapped to any file types are identified as non
autodetect. Non autodetect document types can only be applied to documents when WorkSite
clients are unable to assign a document type to the document automatically.
The Document Type Mapping Management dialog consists of three columns.
Type. This column lists all document types listed in the Document Type information table.
File Type. This column shows the file type that is mapped to the document type selected in
the Type column.
Available Type. This column shows file types that WorkSite Server can detect
automatically, but which have not been mapped to any WorkSite document types.
Each file type can only be mapped to one WorkSite document type, although multiple file types
can be mapped to any one WorkSite document type. Mapping multiple file types to the same
WorkSite document type enables you to include documents created in earlier versions of an
application. These versions are included within the scope of a single WorkSite document type.
The WorkSite Server uses the WorkSite document type to determine which is application used to
open the document. For information about mapping document types, see Defining Application
Formats on page 125.
134
135
3. Enter the information requested for in the Add Type dialog. Table 16 lists the fields on the
Add Type dialog, and their descriptions.
Table 16 Document Type Dialog Properties
136
Field Name
Description
Description
Alias
Description
DMS Extension This field identifies the filename extension that WorkSite uses to
store a document of this type on the file server. The default entry in
this field is %V. If %V is entered as the DMS Extension, WorkSite
uses the documents version number as the file name extension. For
example, the document number is 157 and the document version is 2.
If %V is the DMS extension for that document type, then WorkSite
will store the file as 157.2 on the file server.
App Extension
This field identifies the extension that WorkSite should add to the
filename for the document when it is exported, checked-out,
e-mailed or downloaded. Autonomy recommends setting the
Application Extension for a document type to that recognized by the
document's native application. For example, use .doc for a Word
document. You can use the same extension for multiple document
types, such as .doc for Word 97 and Word 2003.
4. Click OK.
5. To enable WorkSite Server to detect your new document type automatically, you need to
map it to one or more file types. See Mapping WorkSite Document Types to File Types on
page 134.
Example
[ALIAS]
[VISIO]
PRIMARY_TYPE=ALIAS PRIMARY_TYPE=VISIO
File Extention=ALIAS
.vsd=VISIO
NOTE
ALIAS refers to name entered in the Alias field of the DBAdmin tools Add Type dialog box.
Registry Settings
CAUTION
Modifying the Registry improperly can cause serious problems with the operating system. Be
sure to back up the registry and exercise caution when modifying the registry. Autonomy is not
137
responsible for loss of data due to improper use of the Registry Editor or failure to back up the
registry.
In the Registry of the client workstations, add the following key:
HKey_Classes_Root\VISIO\ODMA32 and set the default value to "MHODMA".
After this update, users can open the documents in the required format.
Integration Options
This option is available only for applications that are integrated with WorkSite, for example,
Microsoft Office Integration for DeskSite/FileSite.
For enabling or disabling integration options, the following line(s) can be set in the NRT.INI file
in the [ALIAS] section:
LOCAL SAVE=Y/N
LOCAL OPEN=Y/N
NEWDOC_SAVE_OPTION=Y/N
NOTE
If LOCAL SAVE=N, users will not be able to save a new document to a disk before profiling it
even if NEWDOC_SAVE_OPTION = Y.
To disable the application integration, remove the contents under the [ALIAS] section from the
NRT.INI file.
138
Whether or not a copy of the document can be echoed to a users local hard drive
Which custom fields of profile information are required for the document
The number of days before the document should be marked for archiving
The document classes that you create depend on your company and your database requirements.
Examples of document classes could distinguish documents by genre, department, region, and
so on.
The document class determines a specific class of documents can be echoed. (For information
on echoing, refer to the DeskSite Installation and User's Guide or the FileSite Installation and
Users Guide.) Since document echoing leaves unsecured backup copies of documents on a
users hard drive, you may want to have classes that are security-based, such as
CONFIDENTIAL and UNCONFIDENTIAL, or PRIVATE, PERSONAL, and PUBLIC. These
distinctions could also be made at the Subclass level, whereas the Class field of profile
information could be used to distinguish documents by genre (memo, letter, and contract),
department, region, or other criteria.
139
Add icon from the toolbar or select Add from the Manage menu.
140
Field Name
Significance
Description
Alias
The alias for a class or subclass is what users will enter in the
document profile information. It must be 32 characters or less.
Echo*
Table 18 Information Fields in the Add and Edit Class dialog boxes
Field Name
Significance
Retain Days*
Required Fields*
Security*
Require Subclass
*Fields marked with an asterisk in the previous table contain information that may conflict
between a class and its subclass. In such cases, the information listed in these fields for the
subclass will apply.
For example, if a document is marked with a class for which the default security setting is
PRIVATE, and marked with a subclass for which the default security setting is PUBLIC,
then the documents default security will be PUBLIC.
4. To require a subclass entry in the document profile, select the Require Subclass check box.
Users are required to enter a subclass for the documents.
5. Click OK.
When a document in the database is identified with a document class or subclass, the referenced
class or subclass cannot be deleted from the database and the alias cannot be changed.
141
In the Required Fields box, select the mandatory custom fields. Users are required to
complete these fields when adding or modifying a document profile in the client interface.
See Introduction to Custom1/Custom2 Tables on page 151.
The Edit Class dialog box is identical to the Add Class dialog box, except that the Alias field
is displayed for read-only purposes.
5. Click OK.
4. Click OK.
NOTE
All subclasses listed for a document class must be deleted, before a document class can be
deleted.
142
Document Subclasses
Document classes may also be broken down into subclasses. Users may be required to enter
subclass information in a document profile for particular document classes if the Require
Subclass check box is selected in the Add Class dialog box. The security and other parameters
specified for a subclass override any settings created for the class if a subclass classification is
specified for a document.
Adding a Subclass
You can define subclasses for a document class at any time. Subclasses are created and
displayed in the Subtable window. Before you can add subclasses to a class, you must first
display the list of subclasses that are already defined for that class.
To display subclasses for a class:
1. Select the
When a document is classified with a class and a subclass, the documents default security
and required fields will be those set for the subclass. If the default security for the
documents class is set to PRIVATE, and the default security for the subclass is set to
PUBLIC, then any documents classified with both the class and subclass will be PUBLIC.
143
After a document has been associated with a class or subclass, the referenced field cannot be
deleted
Managing PC Locations
The list of PC Locations that is associated with a WorkSite database is a record of PC node
addresses (or NIC numbers) and actual PC locations. The information included in this list is
used to identify the location of the PC where a document is in use or checked-out.
The two fields of information included in the PC Location list are a Node Address and PC
Location information.
The Node Address field is sometimes referred to as an NIC number for network interface
card number. Node addresses are 12-digit hexadecimal numbers that are assigned to network
adapter cards. Each node address is unique.
The PC Location field provides useful information for identifying the PC associated with
the node address.
Location
105D67E33C92
28D8390BE567
ED2938596CB9
1987E452BC34
From the DBAdmin tool, the WorkSite Administrator can add, modify, or delete custom PC
locations. PC locations can also be imported from an ANSI text file. This section describes how
to perform these tasks.
144
Managing PC Locations
Adding a PC Location
1. Select the
Deleting a PC Location
1. Select the
The available PC Locations are displayed in the table frame. Select the required PC
Location from the table frame.
2. Press the Delete key, click the
right-click menu.
145
Each record in the text file may contain more than two fields of information, but a single,
consistent character in the text file must separate fields, and each record must end with an
end-of-line character.
2. Select the
4. In the Source File field, enter the full path of the ANSI text file, or use the
to select the file from a list.
browse button
146
Field Delimiter. Enter the character that you used to separate fields in your text file. For
example, if each PC Location is separated from the Node Address by a comma in your
text file, enter a comma in this field.
Node Address. Enter the column number of the Node Address field in the text file. For
example, if each record in your text file contains six fields, and the Node Address is the
third field in each record, enter 3 in this field.
Node Location. Enter the column number of the Node Location field in the text file. For
example, if each record in your text file contains ten fields, and the Node Location is in
the second field in each record, enter 2 in this field.
Node Enabled. Enter the column number of the Node Enabled field in the text file. For
example, if each record in the text file contains ten fields, and the Node Enabled field is
the fifth column in each record, enter 5 in this field.
Overwrite Option. If you want to the DBAdmin tool to update the Node Addresses for
any locations that it finds in the text file that are already listed in the list of PC
Locations, then select the Overwrite Option check box. If the Overwrite Option is not
selected, then the DBAdmin tool adds only the PC Locations and their corresponding
Node Addresses that it finds in the text file that are not already listed for the database.
6. Click OK to start the load process. A dialog box displays the status of the load process. A
log file is created and named LOCATION.LOG. This file is stored in the same directory as
the ANSI text file.
NOTE
The Load Data command does not delete any records in the list of PC Locations, only
supplement the list with information from the text file. If the Overwrite Option is selected,
only existing records are changed.
These parent-child tables allow you to define custom subcategories that are unique for each item
in the parent table. Refer to Administering Custom1/Custom2 and Custom29/Custom30 Tables
on page 151 for instructions on using these parent-child tables.
Custom13-28 Fields
Additional custom fields are provided to store non-validated document profile information. The
Custom13-Custom28 tables are not displayed in DBAdmin because WorkSite clients do not
compare the information that appears in these custom fields against tables of information. Users
can enter any value in these fields, not only those defined by the DBAdmin tool.
147
The Dialog Editor is used to add fields for the Custom13 to Custom28 tables in the WorkSite
client dialogs.
Custom1-2
Client-Matter
Client-Matter
Custom3
Industry
Industry
Custom4
Jurisdiction
Jurisdiction
Custom5
Status
Status
Custom6
Party
Party
Custom7
Precedent Status
Precedent Status
Custom8
Billing Attorney
Billing Attorney
Custom9
Corp Matter
Custom10
Corp Department
Custom11
Outside Councel
Custom12
Retention Policy
Retention Policy
Custom29-30
Team-Type of Matter
Practice-Type of Matter
The Custom3 to Custom12 tables consist of custom-defined categories that you can use to
differentiate and identify the documents in your database.
148
Each Custom table is associated with a field of document profile information. For example, in
the New Profile dialog each Custom field corresponds to a Custom table in the DBAdmin tool.
The
browse button is used to select the items populated in the Custom tables. These fields of
document profile information are configured as browse fields, which means that the only
information users can enter in these fields comes from the associated Custom3 to Custom12
tables.
If while creating or editing a class in the DBAdmin tool you have selected the required fields
from the Required Fields list then a document that is saved under that class (for example,
Letter, Memo or Document) requires that the user enter information in the field before it can be
saved. See Editing Document Class Information on page 141.
Each Custom table consists of a list of records each of which contains three fields:
Enable. If the Enable check box is not selected, then the table item it corresponds to does
not appear on the document profile in the clients.
Description
Enabled
WorkSite
IBM
ABC
D&K
You can add new records to the Custom tables, delete or edit existing records, and import tables
entries from an ANSI text file. Once a Custom table item is used in a documents profile
information in the database, it cannot be deleted. However, custom table items can be disabled
with the Enable flag, and their description fields can be modified.
149
3. Enter the alias for the new entry in the Alias field. The alias is what users enter in this field
in a documents profile information from the client end.
4. Enter an appropriate description or correlating information for the alias in the Description
field. If the alias is an abbreviation or coded name, enter the meaning of the alias in the
description field.
5. Click OK.
150
single, consistent character in the text file must separate fields, and each record must end
with an end-of-line character (\n).
2. From the DBAdmin tool, select the
Custom3 to Custom12.)
The Custom1/Custom2 and Custom29/Custom30 tables are distinct from the other Custom
tables in one important way: each item listed in the Custom1 and Custom29 tables is the parent
of a unique set of Custom2 or Custom30 table entries.
Figure 66 illustrates the parent-child relationship applied to custom tables.
151
The Custom1/Custom2 tables and the Custom29/Custom30 tables share the parent-child
relationship. The Custom1 and Custom29 tables can be configured so that each Custom1 or
Custom29 entry has a unique set of Custom2 or Custom30 subentries associated with it.
For every value selected in the Custom1 or Custom29 field of the client interface, the Custom2
or Custom30 list is populated with a list of valid values corresponding to Custom1 or Custom29.
For example, if Custom1 is Westinghouse, Custom 2 would be a list of existing matters for
Westinghouse
Every Custom1 table entry (added from DBAdmin) is populated in the corresponding Custom
field appearing in the client interface (for example, DeskSite), provided the enable flag was
selected while entering the items from DBAdmin.
The Custom29 and Custom30 fields in the document profile are optional by default. Custom1
and Custom2 can be required profile fields for particular document classes. See Editing
Document Class Information on page 141 to learn how to make Custom1 and Custom2 required
fields
Custom1 and Custom29 classifications in the Custom1 and Custom29 tables do not necessarily
have to have Custom2 or Custom30 classifications associated with them. Some Custom1 entries
may have no Custom2 items associated with them, while others have multiple ones.
152
A Custom1 or Custom29 item that has been used in document profile information in the
database cannot be deleted, only disabled by clearing the Enabled check box in the Edit dialog
box.
153
4. Enter an Alias and Description for the Custom2 or Custom30. The alias can be up to 32
characters long.
5. Click OK. Next, close the Subtable window.
To edit a Custom2 or Custom30 item:
1. Select the
4. Edit the Description and Enable fields. The Alias field is read-only.
5. Click OK. Next, close the Subtable window.
154
NOTE
To delete a Custom2 item, select the item from the Subtable window. Select Delete from the
Manage menu.
Import Custom1 and Custom2 classifications together from a text file (parent and child)
Import only Custom1 or Custom29 classifications from a text file (parent only)
155
3. Enter the full path of the ANSI text file in the Source File field, or use the
to find the file.
156
browse button
4. If you are importing only Custom1 and Custom29 information, select the Import Custom1
Only or Import Custom29 Only check box.
If you are importing both parent and child classifications simultaneously, then select the
Import Custom1 and Custom2 or Import Custom29 and Custom30 check box.
5. In the Field Delimiter field, enter the character that you used to separate fields in your text
file.
For example, if each Alias is separated from the Description by a # sign in your text file,
enter # in the Field Delimiter field.
6. In the Custom1 or Custom29 Alias Field Number field, indicate the number of the field in
your text file that contains the Custom1 or Custom29 Alias.
For example, if each record in your text file contains six fields, and the Alias is the third
field in each record, enter 3 in this field.
7. In the Custom1 or Custom29 Desc Field Number field, indicate the number of the field in
your text file that contains the Custom1 or Custom29 Description field.
For example, if each entry in your text file contains 11 fields, and the Description is in the
second field in each record, enter 2 in this field.
8. In the Custom1 or Custom29 Enabled Field Number, indicate the number of the field in
each record that contains the enabled flag value. If you enter zero (0), this field will not be
imported and will default to enabled (Y).
9. If you are importing Custom2 or Custom30 fields along with Custom1 or Custom29 fields,
enter the same basic information in the Alias Field Number and Desc Field Number fields
for Custom2 or Custom30.
10. If you want the DBAdmin tool to update the Descriptions and Alias fields with values from
the text file for those that are already listed in the table, then select the Overwrite Option
check box.
If the Overwrite Option is not selected, then the DBAdmin tool only adds the new Alias
and Description field values from the text file.
11. Click OK to start the load process. A dialog box displays the status of the load process.
NOTE
The Load Data command does not delete any existing parent or child classes. It only
supplements the list with information from the text file. Existing records are modified, only
if you select the Overwrite Description option.
157
The Subtable window is fully resizable. Click and drag on the edge of the window to change its
size vertically or horizontally.
Context Menu
If you right-click in the Subtable windows table frame, a menu is displayed. The menu options
include: Modify, Add, Delete, Load Data, Refresh, Find and Find Next. Keyboard shortcuts
for these commands are the same as those available in the main program window.
158
Chapter 6
Importing Documents
Error Messages
159
You can create, save, and reuse document import profile templates. Document import profile
templates are used to generate profile information for the imported documents.
Documents can be selected for import based on document type or DOS file specifications.
All the subdirectories below a starting path can be included in a single import session.
The import tool provides the option of deleting the source files.
Dynamic settings will change for every document imported based on document
meta-data.
Settings in the document import profile template are checked before starting the import
process.
You can instruct the Document Import tool to count the number of documents contained in
the source directory that meet s specified criteria before starting the import process.
The Import program generates a complete log of all documents imported. It includes
document import profile settings, the date and time of importation, error messages, and
other information.
You can optionally rollback all documents that have been imported. This feature is useful
when the log files indicate a mistake in the importation process.
160
The Document Import tool is located in the default WorkSite Server Installation directory.
To start the Document Import:
1. Select Start, point to All Programs.
2. Select Autonomy, then iManage Document Import. The Document Import tool main
window opens.
Figure 71 WorkSite Document Import
161
2. Enter or select the name of a WorkSite Server in the Server Name field.
3. Click Connect.The Login to Server dialog box is displayed.
4. Enter your user name and password. They are assigned when users are added from the
DBAdmin tool.
NOTE
Only users who have been assigned to the Admin role and given permission to access this
tool can log into the Document Import tool. See Adding a Role to the Database on
page 110.
5. Click Login.
If login is successful, the Select Database dialog box is displayed.
6. Select the destination database.
162
NOTE
163
Enter the directory that contains the documents that you want to import in the Source
Document Path field, or use the
164
Select the Include Subdirectories check box if you want to include the documents that
are contained in all subdirectories within the source documents path.
Select the Move Files check box if you want the Document Import tool to delete your
original or source files after copying them to the destination file server.
2. In the Document Attributes section, enter a document type in the Type field. You can also
browse button to select the document type from a list. See Selecting a Document
use the
Type on page 165.
3. Complete the profile information. You can enter static information or dynamic criteria in
profile fields.
Dynamic properties vary for each document, based on the imported documents
attributes. See Dynamic Profile Information on page 168.
NOTE
You can use selection boxes to enter profile information.Position your cursor in the profile
field. Press the Enter key or F2 to display a selection box that lists validated entries for the
field. You can also use the
4. Click Additional Custom Fields. Enter profile information for fields not displayed in the
Document Import Profile Template dialog box. See Additional Custom Fields on page 172.
5. Click Exclude and Include List to create an Exclude or Include List. You need to provide
one DOS file specification in the Include List to perform an importation. See Creating an
Exclude and Include List on page 174.
6. Save the template. See Saving a Template on page 176.
7. Select Import from the Documents menu to start the import process. See Importing
Documents on page 177.
Your entry in the Type field is the document type. It is applied to all documents that you
import into the WorkSite database. This document type is entered in each documents profile
record in the database.
If you select an autodetect document type, then the Document Import tool scans through all
the files contained in the source document path to determine their document type. It imports
only those that match this document type. Use the Exclude and Include Lists to exclude
documents of this type in the source path.
NOTE
Autodetect document types have a Y in the Autodetect column of the Select Type dialog
box. The document types listed in the Select Type dialog box are populated from the
165
Information table Type in the DBAdmin tool. See Autodetect Document Types on
page 132.
If you select a nonautodetect document type, then the Document Import tool will rely
exclusively on the Exclude and Include List criteria to determine which documents to add
to the database. All documents that you add to the database are identified with the document
type that you select.
If you select ALL, then the Document Import tool will try to import all documents of types
that it can detect automatically. It identifies each with the corresponding document type.
166
NOTE
Some custom fields do not require entries validation against a table. They have no lookup tables
or selection boxes. See Additional Custom Fields on page 172.
167
Quick Access
After you type a letter in a selection box, a list of selections beginning with this letter are
displayed. You can scroll to the next entry by typing another letter.
NOTE
The results obtained using this function depends on the order in which entries in the selection
box have been sorted.
Sorting
You can sort the entries displayed in a selection box by clicking any of the column headings.
Clicking again on a column heading sorts the column in reverse order.
Searching
You can search for all entries not displayed in a selection box. Enter a string in the field called
Show All Possible Entries that Match, and click the Lookup button. Entries that match your
search string are listed in the selection box. To search for a string among only those entries
currently displayed in the selection box, click Find.
Default strings when any of the above commands return a null value
168
Name
Description
Client
Custom2
Custom fields
NOTE
The profile fields that appear in your Document Import Profile Template dialog box may differ
from the default names supplied with WorkSite.
Table 22 Dynamic Profile Field Commands
Command
Definition
%F
%E
%P
%D
Current date
%T
Current time
%DT
%FD
%U
xxxxxxxxx
%FS(offset,length)
Filename substring
%ES(offset,length)
Extension substring
169
The Description field becomes the logged in user.It is followed by the original filename of the
document, the last date modified, and the literal string, IMPORTANT DOCUMENTS.
You can use spaces to separate commands. The following command line is equivalent to the
example above:
%U %F %FD IMPORTANT DOCUMENTS
170
171
The Default Profile command is useful when expected storage or naming conventions have not
been followed consistently.
Assigning Security
In the Document Import Profile Template dialog box, click Assign Security. The Security
Assignment dialog box is displayed. In the Security Assignment dialog box you can choose to
base security settings on document class or subclass by selecting the Use Class/Subclass
Security check box. If this option is selected, the security settings for documents imported into
your WorkSite database are determined based on the class or subclass used to identify the
documents.
If a subclass is specified for the document, then the default security setting for the document
subclass is used. If no subclass is specified, then the default security setting for the document
class is used. You can change the security settings for individual documents after the
importation.
You can also choose to set default security to PRIVATE, PUBLIC, or VIEW, without regard to
class or subclass.
172
173
Custom26
Custom27
174
If you have specified an autodetect document type in the Type field of the Document Import
Profile Template, then you do not necessarily need to exclude other file types that exist in
the source document path. The Document Import tool detainees, which files are the selected
type. In such a case, you need to provide at least one DOS file specification in the Include
list. DOS wildcard characters can be used in your file specifications. The asterisk stands in
for any string, and the question mark stands for any single character. Figure 76 shows
several examples of DOS file specifications in the Exclude and Include lists.
If you specify ALL in the document Type field of the Document Import Profile Template
dialog box, then you may need to specify autodetect document types to exclude from the
importation in the Exclude Files list. You can list only those autodetect document types that
you want to include in the Include Files list.
If you select a nonautodetect document type in the Type field of the Document Import
Profile Template dialog box, then you must provide Exclude and Include file specifications.
They filter out unwanted files for importation. When you select a nonautodetect document
type for importation, all files that appear in the source document path are treated as
candidates for importation UNLESS they do not meet the Include file specifications, or if
they are explicitly excluded by the file specifications on the Exclude list.
175
Saving a Template
1. Click the
Save Template icon. You can also press Ctrl+S, or select Save (or Save As)
from the Profile Template menu.
2. Enter a name for the template in the Save Profile Template dialog box.
3. Click OK to save the template, or Cancel to abort.
A message appears indicating whether or not the save was successful.
NOTE
The Document Import tool checks the syntax of all information entered in a profile template
before saving it. If any information is incorrect, an error message is displayed.
Deleting a Template
1. Click the
Delete Template icon. You can also press Ctrl+D, or select Delete from the
Profile Template menu.
2. Double-click the name of the template that you want to delete. Or select the template name
and then click OK.
3. Click OK in the Confirm Delete message box.
176
Importing Documents
Importing Documents
After you have created an import template, click the
Import icon. You can also press Ctrl+I,
or select Import from the Documents menu. You must complete all required fields in the
Document Import Profile Template dialog box before you can initiate the Import command. If
you have completed any required fields improperly, a list of errors displayed in the Profile Error
Information dialog box. See Error Messages on page 180.
From the Import Documents dialog box, you can:
177
Click Start.
While documents are being imported, you can:
178
Database name
Document Type
179
Error Messages
When you initiate the Import process, the Document Import tool checks the profile to ensure the
information is valid. If a required value is missing or if the value you provided cannot be
verified against the lookup tables, you are notified with a message in the Profile Error
Information dialog box. You cannot start the import process until all static profile fields can pass
this verification stage.
When you are using dynamic profile field commands, such as Client and Custom2 information,
the Document Import tool generates error messages only when it confronts an import problem.
The most frequent errors occur when a dynamic profile field command is not a valid entry in the
lookup tables in the database. Errors that occur during the import process are recorded in the log
file. Use the View Log option to view these error messages.
180
Chapter 7
Getting Started
Captions
Form Management
Form Design
There are four legacy dialog boxes that are used in versions of the Dialog Editor that are
previous to version 8.0. Eight new dialog boxes are used in WorkSite Dialog Editor 8.2. All 12
dialog boxes are customizable. Table 23 lists the dialog boxes and describes them.
Table 23 Dialog boxes that can be customized
Name of dialog box
Search (Legacy)
181
Search
New Profile
New Version
Edit Profile
Search WorkSpace
Quick Search
New WorkSpace
Edit WorkSpace
Getting Started
Access the Dialog Editor tool from the WorkSite Server installation directory or from the
Windows Start menu.
1. Select Start, point to All Programs.
2. Select Autonomy, then iManage Dialog Editor.
182
Getting Started
Only Users who have been assigned to the Admin Role and given permissions to access this
tool from the DBAdmin Role Setup dialog box can log into the DBAdmin tool. See Adding
a Role to the Database on page 110.
5. Click Login. If login is successful, the Select Database(s) dialog appears with a list of
available databases.
6. Select the database(s) in the list whose dialogs you wish to edit, then click OK.
7. A different tabular pane appears in the Project WorkSpace window for each database to
which you are connected.
Changes made to forms that you did not save are lost when you log off from the WorkSite
Server.
183
When you deselect a database, any changes made to the forms on that database that were not
saved will be lost.
To select a database:
1. Choose Select Database(s) from the Database menu.
2. Select the database(s) whose forms you want to edit.
3. Click OK.
NOTE
When you select a database, the Dialog Editor loads the latest version of a form saved in the
database.
184
File Toolbar
Elements Toolbar
Align Toolbar
To open a form for editing, select a form from the forms listed under the database in the left pane
and double-click the
Form icon.
To open or close a node in the tree, click the plus or minus sign next to the Form icon in the tree.
File Toolbar
The File toolbar contains buttons to create, open, or save a form. It also contains a button to
display help for the Dialog Editor.
185
Align Toolbar
The Align toolbar contains buttons to position controls on a form precisely. See Aligning
Spacing and Resizing Controls on page 199.
Figure 81 Align Toolbar
Elements Toolbar
The Elements toolbar adds controls to a form. See Adding Controls to a Form on page 192.
Figure 82 Elements Toolbar
Captions
Captions are customized labels associated with each Profile field available to a form. The
Dialog Editor allows you to customize the names of the profile fields in a WorkSite database
through the use of captions. Changes to these names are reflected dynamically in the dialogs
seen by the end user.
At the bottom of the Set Captions list are eight new captions for WorkSite Server. You can edit
these captions to change the container names in the matter-centric DeskSite and FileSite trees.
To customize the names of profile fields:
1. In the Project WorkSpace window, select the database from the Database menu. It contains
the captions that you will edit
186
Form Management
3. Select a profile field, and click Edit. You will modify the name of this field. The Modify
Captions dialog box is displayed.
4. Enter a name for the profile field in the Caption field. Click OK.
5. Click OK. The new captions appear on the form when it is reopened.
Form Management
Forms are the design templates for dialog boxes used in WorkSite. The Dialog Editor is a
sophisticated forms editor. By editing forms, you change the way the users access documents in
WorkSite, and how they enter and change document profile information.
Table 24 lists the forms that you can edit in the Dialog Editor.
Table 24 Types of Forms
Forms
Editing Options
New Profile
187
Opening a Form
Select the required form in the left pane. Double-click the
Form menu. You can also click the
Exporting Forms
The Export option in the Form menu works like the Save As option in the File menu. Selecting
the Export option prompts the user to enter a new name for the form.
Use this feature for the following tasks:
Importing Forms
The Import option in the Forms menu loads any saved form file with the appropriate .mhd file
extension.
188
Form Management
CAUTION
Import does not have the same functionality as the Form | Open option. See Opening a Form
on page 188. The design elements, controls, and features of the imported form overwrite the
active form
If you want to save changes made to a form, but do not want to overwrite the existing
version of that form that is currently saved on the database, use the Export option under the
Form menu to export the form to a directory. See Exporting Forms.
3. Use the Deselect Database(s) option under the Database menu to unload the forms for the
database that contains the form that you want to reload.
CAUTION
When you deselect the database, unsaved changes to the forms on that database will be lost.
4. Use the Select Database(s) option from the Database menu to reconnect to the database.
When you use the Select Database(s) option, the Dialog Editor loads the last version of the
form that was saved to the database.
5. Open the form again in the Dialog Editor. The form is restored to the state before it was
modified.
189
Saving a Form
To save a modified form:
1. Select the form that you want to save on your desktop.
2. Click the
Save icon in the File toolbar. You can also select Save from the Form menu. To
save all open forms to the database, select Save All from the File menu.
NOTE
When the Form Analysis dialog box is displayed, it indicates that required components are
missing from the form. Add these components and then select Save to save the form.
Deleting a Form
The Delete option from the File menu is not available in this release of Dialog Editor.
NOTE
Forms cannot be added or deleted. Only form profile fields can be added or deleted in the
existing forms.
Closing a Form
1. Select the required form from the left pane of the Dialog Editor.
2. Select Close from the Form menu.
3. Click Yes to save changes to the database.
NOTE
Changes made to the form remain in memory and are recalled when you open the form. To
get the unmodified form from the database, you need to deselect the database and then select
it. See Reloading Forms from the Database on page 189, or Selecting or Deselecting
Database(s) on page 184.
190
Form Design
Form Design
With the Dialog Editor, you can configure dialog boxes to meet your operations specific needs.
Figure 85 displays the nine elements that make up a typical form design.
Figure 85 Sample Form with all the Controls
Edit Box
Control
Lookup Button
Control
List Control
Group Box
Control
Command
Button Control
Date Field Control
Dynamic
Text Control
Radio Button
Control
Table 25 lists the valid data formats set for each of the Custom fields. The expected format for
data that is associated with each of the fields cannot be changed.
Table 25 Valid formats for the Custom fields
Field Name
Custom1/Custom2
Custom3 to Custom12
Custom29/Custom30
Custom13 to Custom16
Custom17 to Custom20
Custom21 to Custom24
191
Custom25 to Custom28
Controls
Controls are fields in a form that allow users to enter information, select valid values, enable
options, or perform a specific command.
New Profile
New Version Profile
Search Dialog
All
Not Available in
the Form...
Quick Search
Table 27 lists the controls that can be used in WorkSite forms. The number of times a control can
be used is determined when you move your cursor over the control icon in the Elements toolbar.
A smart pop-up box displays all the available controls.
Figure 86 Elements toolbar
192
Control Name
Description
Static Text
Form Design
Control Name
Description
Dynamic Text
Edit box
Group box
Radio Button
Buttons
Combo box
List Control
Date Field
Check box
193
Adding Controls
The procedure for adding controls to a form is similar for all controls. Also, see Adding a
Canvas Control on page 195 and Adding the External User Control on page 197.
To add controls to a form:
1. Move the pointer over the required icon in the Elements toolbar without clicking.A smart
pop-up displays the type and number of such controls available for adding to the form.
NOTE
The static text and group box controls display only the name of the control. These controls
are added directly to the form without associating a database.
2. Click the icons from the Elements toolbar.
3. Click a place within the form where you want to add the control. The Database Association
dialog box is displayed.
Figure 87 Database Association dialog box
NOTE
The Database Association dialog box is not displayed for the static text and group box
controls
4. Select the profile field from the Associate Control With list, and click OK.
The control is added to the form.
For the static text and group box controls:
5. Right-click the control and select Properties from the menu.
6. Enter the text that should appear in the control in the Caption field of the Properties dialog
box.
NOTE
The Date field includes a lookup button that allows users to select a date from a popup
calendar. The Date field also includes a checkbox to enable or disable the field. When
194
Form Design
adding date fields to the Search dialog, you must add one control to enter a specified date or
a date with a modifier such as Begins or After. To search for a date range, you will need to
add two controls for the From date and the To date.
4. Move the pointer inside the canvas, right-click, and select Properties.
The Custom Control Properties dialog box is displayed.
195
5. To add a caption inside the canvas, enter a title in the Caption field and select Visible. The
Alignment options determine the position of the caption: Left, Center, or Right.
NOTE
If there is more than one database on the server, then captions must be changed consistently
in all databases for the changes to become visible in the client interface.
6. Click Visible to create a visible border surrounding the canvas. Use the Width list to select a
border width of 1, 2, 3, or 6 points.
7. To add color to a border or canvas, select the Color tab on the Custom Control Properties
dialog box. Select where the color should be applied: Border Color or Canvas Color. From
the Color Set list, select from a group of Standard Colors or Windows System Colors.
196
Form Design
8. To create a custom color for the border or canvas, click Edit Custom Color.
9. Click Apply and OK.
197
2. Select External User Sign (Specialty Control) from the Database Association dialog box.
Figure 91 External User control, Database Association dialog box
3. Select Tab Order from the Layout menu on Dialog Editor to display the tabs on the form.
NOTE
The tab order allows the user to move from one field to another in the dialog box using the
Tab key. See Form Design on page 191 for information about using the Tab key.
4. Click the form or press Ctrl+D to exit Tab Order mode. The External User control becomes
visible.
Required Controls
Each of the four form templates require certain controls to appear on the form. You will not be
able to save the form if any of the required or necessary controls are missing.
Table 28 Required Controls for Each Form Type
New
Profile
New
Version
Control
Search
Edit
Profile
DocNum Label
Version Label
198
Form Design
New
Version
Edit
Profile
Control
Search
Find Button
Cancel Button
Help Button
OK Button
Control-Specific Dependencies
Some controls depend on the presence of other controls on the form to function properly. These
control-specific dependencies are listed below:
Profile field descriptive labels require an associated Edit Box where the user can enter a
description. To set the caption for the label, enter the name of the field in the Set Captions
dialog.
Lookup Buttons require an associated Edit Box. When the user selects a valid value from
the Lookup dialog box, the selection appears in the edit box.
NOTE
You cannot save a form that is missing a required control or a control-specific dependency to
a database. To check whether required controls are missing from a form, select Analyze from
the Form menu. To save an incomplete form temporarily, export it to a local directory.
Icon
Keyboard
Description
Left Align
Ctrl+Left arrow
Right Align
Ctrl+Right arrow Aligns the right edges of selected controls to the right
edge of the highlighted one
Align Tops
Ctrl+Up arrow
199
Icon
Align Bottoms
Keyboard
Description
Centre Controls
Vertically
Centre Controls
Horizontally
Center
Horizontal
F9
Center Vertical
Shift+F9
Space Evenly
Horizontally
Space Evenly
Vertically
Alt+Up Arrow
Make Same
Width
Make Same
Height
Make Same
Size
Display Grid
The specific properties that exist and can be modified by the user depends on the specific form
or control type. The properties for some controls cannot be edited.
To change properties on a form or a control:
1. Right-click in the form or on a control on the form.
2. Select Properties from the popup menu.
3. Change any available properties on the form or the control.
200
Form Design
Importing Controls
The Import function copies a set of form controls that were previously exported as a MHD file
into the currently active form on your desktop.
To import controls:
1. Select Import from the Form menu.
2. Browse to the file that you want to import. Forms are saved with the .mhd extension.
3. Click Open. The controls stored in the MHD file will be copied into the currently active
form on your desktop. Any controls already installed on the currently active form will be
overwritten.
CAUTION
Importing controls will overwrite any existing controls on the currently active form and replace
them with those saved in the .mhd file.
Exporting Controls
The Export function allows you to save a set of form controls as an .mhd file on your local or
network drive. These form controls can be loaded into another database, replacing the form
201
controls on the same type of form, or they can be used as a template to create a new form on a
database.
To export controls:
1. In the Dialog Editor, open the form with the controls that you want to save. Select the form.
2. Select Export from the Form menu.
Navigate to the directory where you want to save the file.
3. Enter a file name for the MHD file.
4. Click Save.
NOTE
Click the Test icon, or select Test from the Layout menu to see how the form will look to
the end-user in the WorkSite database.
Select Analyze from the Form menu to see if the form is missing any required controls or if
any present controls require additional controls that are not there. If your form is fully
compliant with all requirements a message confirms the details to you.
202
Form Design
3. By default, the first control that you click will be assigned the first tab order in the sequence.
To begin editing the tab order in the middle of the sequence, hold down the Control key and
click the control with which you want to begin.
4. Click the controls in the order that will be most intuitive to the user. The next control that
you click is assigned the next position in the tab order sequence.
5. Click the form or press Ctrl+D to exit tab order mode.
CAUTION
When setting tab order, you must put the lookup that is associated with a particular Edit box
immediately after the Edit box in the tab order. This is necessary for the F2 shortcut key to
work. The F2 shortcut key allows a user to open the lookup for a profile field on a form when
the cursor is in the Edit box for that profile field on the form.
203
204
Chapter 8
205
206
2. Enter the name of the WorkSite Server in the Enter Server Name field.
3. Click Register.
4. Enter your user name and password in the Login to Server dialog box.
5. Click Login.
6. When you are finished registering servers, click Close to close the Register Servers dialog
box.
To unregister a WorkSite Server:
1. Select Register/Unregister from the Server menu to display the Register Servers dialog
box.
2. Select the server name.
3. Click Unregister.
4. Click OK.
To reconnect to a server when autologin times out:
1. Select Register/Unregister from the Server menu to display the Register Servers dialog
box.
2. Select the server that the WorkSite Monitor tool failed to log into automatically at startup.
The server will be marked with a red icon.
207
3. Click Reconnect.
4. Click OK.
208
Server WorkSpace window. Displays the WorkSite Servers and WorkSite databases to
which the WorkSite Monitor tool is connected.
Information window. Displays messages to the user about timeouts, reconnects, error
messages, and so on.
Results workspace. Displays Search Results tab, History Table Search Results tab,
Statistics tab, Active Users tab, and Print Preview tab.
There are also two toolbars and a menu bar, which can be detached, resized or hidden, as can the
Server WorkSpace and Information windows. The arrangement of the frames on the WorkSite
Monitor desktop can also be fully customized.
Select the required window from the Window menu to hide or display the window in the
WorkSite Monitor main window.
Toolbar
Ctrl+G
Function
209
Toolbar
Function
Ctrl+N
Delete
Ctrl+E
Ctrl+F
F1
View the online help topic associated with the item you
select
F2
F3
F5
Ctrl+P
Ctrl+L
Relocate documents
Ctrl+A
Ctrl+O
Ctrl+S
Ctrl+H
Ctrl+M
Ctrl+C
Ctrl+R
Ctrl+Q
Ctrl+U
Ctrl+D
210
The Server WorkSpace window also contains a tab for each of the WorkSite Servers that is
registered with the WorkSite Monitor tool. When you click the tab for a WorkSite Server, a list
of available databases is displayed.
Figure 96 Server WorkSpace Window, Database tab
Description
The Network icon appears in the Servers tab and contains a list of all
WorkSite Servers that are registered with the WorkSite Monitor tool.
211
Description
A WorkSite Server icon appears for each WorkSite Server machine that is
registered with the WorkSite Monitor tool. Double-click the icon in the
Servers tab to display the tab for that WorkSite Server.
An Active Users icon appears beneath each WorkSite Server icon.
Double-click this icon to display a list of all users currently logged into the
WorkSite Server.
A WorkSite Database icon appears beneath a WorkSite Server icon for each
WorkSite database to which that WorkSite Server is connected. Each WorkSite
Database icon contains a list of Document Searches and Document History
Searches.
The Document Searches icon contains a list of searches that have been
performed on the database during this session with WorkSite Monitor.
Double-click a search icon to displays the results of the search.
The Search icon represents a document search recently performed on this
database. Double-click this icon to redisplay the results of the search.
Right-click the icon and select Show Search Parameters to display the
parameters used to perform this search.
The Document History Searches icon contains a list of searches that have
been performed on the document history table during this session with
WorkSite Monitor. Double-click a Document History Search icon to display
the results of the search.
The Document History Search icon represents a search recently performed
on the document history table for this database. Double-click this icon to
display the results of the search. Right-click the Document History Search
icon and select Show Search Parameters to display the search parameters.
Information Window
The Information Window displays messages about timeouts, reconnects, and errors.
Figure 97 Information Window
212
Results WorkSpaces
The Results WorkSpace displays information in the tabs. The following tabs are displayed when
you run the corresponding command or action:
Statistics tab
Statistics Tab
The Statistics tab displays status information for the WorkSite Servers that are registered with
WorkSite Monitor. When you select a WorkSite Server, you can view a snapshot of its document
management transactions. To change the frequency with which the information in the Statistics
tab is updated, set the Set Priority option under the View menu. For example, you can change
the settings from High to Low. Table 32 lists the columns in the Statistics tab.
Figure 98 Results WorkSpace, Statistics tab
Description
Servers
Server name
TX/min
Total TX
# of Sessions
213
Description
TX Pending
ConnectedDBs
DisconnectedDBs
File Download/min
File Upload/min
The total number of files uploaded since the last time the
server was started
File TX Pending
214
Indicates
Checke- out
Archived
In Use (Busy)
NOTE
The Windows Explorer icon for the application is associated with the document type. It is
displayed in the status column of the Search Results tab, when a document is not checked-out,
busy, or archived.
Customize View
Select Options under the View menu to customize the profile fields that appear and the order in
which they appear in the Search Results tab. See Setting Search Results Display Options on
page 217.
215
To delete entries in the Document History tab, perform a search. Select the rows that you want
to delete, and press the Delete key. Alternatively, you can right-click the selected rows and
select Delete.
Right-click one or more selected documents in the Search Results or Document History
Search Results tab.
The right-click menu is displayed.
216
Select Document Information to display details of the WorkSite database that contains the
document. This information includes the file server on which the document is stored, path
information for the document, and the number and version information.
Select Document Detail Information to display the current users name, anticipated return
date (if the document was checked-out), and the IP address of the users PC.
Select Delete Current Selected to delete a document in the displayed tab, or select a
document, then press the Delete key. See Deleting Documents on page 227.
Select Unlock Documents to release a document that is checked-out or in use, and make it
available to other users. You can also select the document, and then press Ctrl+N. See
Unlocking Documents on page 227.
Select Refresh to update the current active tab in the WorkSite Monitor tool with the latest
information from the database or WorkSite Server.
Choose Select All to select all the rows in the Search Results tab.
217
The profile fields displayed in the short profile display area at the top of a Search Results
tab when you select a row in the document grid
The maximum number of documents or table entries to be displayed in a Search Results tab
or any of the selection boxes
The option to display all versions of a document or only the latest version
The option to display custom field aliases or descriptions in Search Results tabs
The changes made to these options are applied globally to all databases and servers to which
the WorkSite Monitor tool is connected
The profile fields displayed in the Search Results tab are shown in the Search Results list.
The fields are listed in order of their appearance from left to right in a Search Results tab.
The Profile Fields list contains all other profile fields that can be displayed in a Search
Results tab.
3. To add a profile field, double click the profile name as it appears in the list view on the left.
4. To remove a profile field from those currently displayed in Search Results tab, double-click
the profile name in the Search Results list.
218
5. To change the order in which profile fields appear in a Search Results tab, click any profile
name in the Search Results list and drag it up or down in the list.
6. Click OK.
To change the profile fields in the short profile display area:
1. Select a row in the Search Results tab:
2. Select Options from the View menu in WorkSite Monitor.
3. Click the Short Profile Display tab. The profile fields you select will display read-only
values for a selected document in the Short Profile Display above the Search Results table.
The fields displayed in this dialog box show the profile fields that are currently being
displayed in the short profile display area of the Search Results tab.
Figure 103 Document Search Display dialog box, Short Profile Display tab
4. Click the arrow next to any field to display a different profile field in that part of the short
profile display area.
5. Click OK.
To change the maximum number of search results to display:
1. Select Options from the View menu.
2. Click the Search Size tab.
219
Figure 104 Document Search Display dialog box - Search Size tab
3. To set the maximum number of rows displayed in any Search Results tab or in the selection
boxes, enter the number in the Maximum number of documents in Search Window entry
field in the Search Size tab.
4. To change the length of time in seconds elapsed before the search times out, enter a number
in the Server Time-out In Seconds field. The default is 500 seconds. Increase this number if
your searches time out.
5. To display only the latest version of a document in the Search Results, select Latest Version
Only. To display all versions that meet the search criteria, select All Versions.
6. To display the Description component of custom fields in any Search Results tab, select the
Description field.
7. To display custom field aliases, select the Alias field.
8. To save your changes, click OK. To exit without saving your changes, click Cancel.
220
Table 34:
Author
Subclass
Operator
Custom 1 through 12
Type
Custom 29
Class
Custom 30
Wildcard Characters
The percent (%) character is a wildcard character available when performing a search using the
WorkSite Monitor tool. It functions as a multi-character wildcard character. Entering BAR% in
the Author field, for instance, will match all entries that begin with BAR, such as BARBARA,
BARB, BART, and BARTH.
221
3. Enter criteria in the corresponding Edit dialog box that is displayed. Lookup tables are
available for custom fields 3 to 12. Use the
browse button when entering criteria for
these fields to select validated entries from a lookup table.
4. Click Update.
5. Click Close.
222
Profile information
The WorkSite Monitor tool allows you to search for documents based on any field of profile
information, including fields that do not appear on the Search Dialog box in the WorkSite
Client.
To search for documents:
1. Select a
window.
3. Enter search criteria in the Document Search dialog box. Use the
validated entries from database lookup tables.
4. Click Additional Fields to enter criteria for custom fields not displayed in the Document
Search dialog box. See Setup Additional Custom Fields Dialog Box on page 221.
223
5. To search for documents that are busy or checked-out, select the appropriate checkbox.
6. To name the search query for later use, enter a name in the Query Name field. If no name is
entered in this field, the WorkSite Monitor tool assigns a default name to the search.
7. Click Search to display matches to your search. The search results are displayed on the
Search Results tab. See Document Search Results Tab on page 214
224
3. Select the activities that you would like to search in the document history table. To search
only for instances of such activities that were performed by particular users, enter those user
names in the User field. Use the
database users.
4. Enter document profile criteria to narrow the scope of the search to include activities only
performed on specified documents. To enter criteria for custom fields not displayed in the
Document History dialog box, click Additional Fields. See Setup Additional Custom Fields
Dialog Box on page 221.
5. Select a date or a date range to display activities performed during a specified period.
6. Click Search. The search results are displayed in a separate Document History Search
Results tab. See Document History Search Results Tab on page 215.
225
Printing Reports
From the WorkSite Monitor tool, you can print document history reports, search results, lists of
active users, and tables of server statistics.
To print reports or lists:
1. On the tab that you want to print, select Print from the File menu. You can also press
Ctrl+P. The Print dialog box is displayed.
2. Enter the details and click OK.
Print Preview
The WorkSite Monitor tool includes a preview option for the Document History Reports,
Server Statistics, and Search Result tabs. To preview a printout, select Print Preview from the
File menu on the window that you want to print. A Print Preview window appears.
From the Print Preview window, you can:
226
Scan through the pages of your printout using the Next Page and Prev Page buttons.
Toggle between single page and two page display using the One Page and Two Page
buttons.
Increase or decrease the display scale using the Zoom In and Zoom Out buttons.
Unlocking Documents
From the WorkSite Monitor tool, you can unlock documents that are currently marked as
checked-out or busy in the database.
Releasing a document unlocks the document in the database and allows other users to open, edit,
or check out the document.
If a user release or unlocks a document in use by another user, it must be checked into the
database under a different version. For example, a second user may have checked-out or have
been editing the document.
The release function is intended for unlocking documents that have been erroneously marked as
in use or checked-out as a result of a network failure. This function is identical to the unlock
option available in the WorkSite Network Client.
To release a document in the database:
1. Select the documents that you want to release in a search results window.
2. Select Unlock Documents from the right-click menu, or press Ctrl+N. A confirm request
message box appears.
3. Click OK.
NOTE
The WorkSite Administrator must enable the option to release or delete documents in the
database based on user roles.
Deleting Documents
You can delete documents from within the WorkSite Monitor tool:
Select the documents to be deleted from the tab in the Search Results window. From the
Document menu, select Delete and then Current Selected.
227
You can specify document profile information to search for and select documents for
deletion in a database. The keyboard shortcut for deleting the selected document in the
Search Results window is the Delete key.
228
6. To abort the deletion, click Abort. If you click Abort, a message box asks you to confirm
your selection. Click OK in the message box. To continue with the deletion process, click
Cancel.
When the deletion process is finished, a message box is displayed informing you of the
success of the deletion process.
7. Click OK.
Documents can either be relocated or only copied from one database to another.
Table 35:
Number
Type
Custom 1
229
Table 35:
Version
Class
Custom 2
Description
Subclass
Custom 29
Author
Edit Date
Custom 30
Operator
Create Date
You can access the remaining profile fields by clicking on the Additional Fields button. It is
located in the Source section of the Relocate Documents dialog box. the Setup Additional
Custom Fields dialog box is displayed. See Setup Additional Custom Fields Dialog Box on
page 221.
Custom1
Author
Custom2
Operator
Custom29
Class
Custom30
Subclass
230
The remaining profile fields are accessed by clicking on the Additional Fields button in the
Destination section of the Relocate Documents dialog box. The Setup Additional Custom Fields
dialog box is displayed. See Setup Additional Custom Fields Dialog Box on page 221.
Document Security
While migrating documents, you have the option of migrating existing security settings with the
documents or assigning new settings to all of the documents being relocated. If you choose to
assign a new security setting to all migrated documents, the security setting can assign default
security dynamically based on the documents class or subclass. You can also select a uniform
default security setting to be applied to all of the migrated documents. When assigning a new
security setting to all of the documents, you can also create a user and group access control list
that will be applied to all of the documents during the migration.
If you choose to migrate existing security settings with the documents, documents will be
migrated even if there are users or groups listed in the ACL lists who are not valid users or
groups on the destination database. If the WorkSite Monitor tool encounters any users or groups
listed in the ACL lists who are not valid users or groups on the destination database, those users
or groups will be removed from the access control lists before inserting the documents in the
destination database. The access control lists on the source database will remain unchanged if
documents are only being copied (not relocated) between databases.
Relocating Documents
To relocate documents:
1. Select Relocate from the Documents menu or press Ctrl+L.
The Relocate Documents dialog box is displayed.
2. Select the Source Database and Destination Database on the Relocate Documents dialog
box. These databases can be located on the same or different WorkSite Servers.
231
3. If you want to delete the documents after they are successfully relocated, select the Move
Documents check box. Documents that were not relocated successfully during the migration
will not be deleted in the source database.
4. Enter selection criteria in the profile fields of the Relocate Documents dialog box. These
values are used to search the source database and select documents for migration.
5. Use the
browse button to select search criteria from tables of validated entries. Only one
entry per profile field can be specified as search criteria.
NOTE
When multiple entries in a single profile field are necessary, multiple migrations should be
performed.
232
6. If your selection criterion requires additional profile fields that are not shown in the Source
section of the Relocate Documents dialog box, click the Additional Fields button in the
Source section of the Relocate Documents dialog box.
The Setup Additional Custom Fields dialog box is displayed. See Setup Additional Custom
Fields Dialog Box on page 221.
7. Enter profile field substitutions in the fields listed in the dialog box. All fields shown except
the Description field must be valid entries in the lookup tables on the destination database.
NOTE
If any entry exists in a profile field among the documents being migrated that is not a valid
entry in the lookup tables on the destination database and a substitute valid entry is not
provided and then that document will not be relocated.
8. If you require substitutions of additional profile fields that are not shown in the Destination
section of the Relocate Documents dialog box, click the Additional Fields button in the
Destination section of the Relocate Documents dialog box.
The Setup Additional Custom Fields dialog box is displayed. See Setup Additional Custom
Fields Dialog Box on page 221.
9. If you want to migrate document security settings with the documents, make sure the Use
Existing Security check box is selected.
To create uniform access control lists for the documents or assign new default security
setting(s), clear the check box and click Change Security.
10. To retain the same document and version numbers during the relocate or copy operation,
select the Use Same Number and Version as the Source check box.
NOTE
If you select Use Same Number and Version as the Source and a document already exists
in the target database with the same number and version as one of the documents selected
for relocation and then the relocate operation will fail for that document.
11. Click Start to obtain a count of the documents selected for migration.
If the documents are all in order, then the document count is displayed.
233
12. Click OK to continue, or Cancel to return to the Relocate Documents dialog box.
The Relocate Documents dialog box is displayed.
Figure 110 Relocate Documents dialog box
234
If the Move Documents option was selected (as opposed to merely copying documents from
one database to the other and leaving the source documents intact), those documents that
were relocated will be deleted from the source database when you click Cancel in this
message box.
17. When the migration process is complete, an information message box is displayed. Click
OK.
18. Before you exit the Relocate Documents dialog box, you have the option of viewing the log
file or rolling back all documents relocated during the migration.
Click View Log to view the log file for the migration.
Click Rollback to delete all relocated documents from the destination database.
Documents in the source database that failed to migrate or that were rolled back will
remain unchanged in the source database.
If the Move Documents option was originally selected and you did not use the Rollback
option and then the documents in the source database will be deleted when you click
Close.
Documents in the source database remain unchanged if the Move Documents option
was not selected or if you use the Rollback function.
235
3. To assign access privileges to specific users and groups, select those users and groups in the
Available Groups/ Users column and click Add.
4. To remove users or groups from the access control list, select those users or groups and then
click Remove. Click OK in the message box to confirm the change.
5. To change the level of access assigned to users or groups listed in the access control list,
highlight those users or groups, select the desired level of access from the Security Type
list, and click Change. Click OK in the message box to confirm the change.
236
6. Select a default security setting to apply to all of the documents in the Default Security list,
or select the Use Class/Subclass Security check box to assign default security to each of the
documents based on its class or subclass.
If the Use Class/Subclass Security check box is selected and the subclass field in the
documents profile contains a value, the documents default security setting is selected from
the documents subclass. When there is no subclass assigned for a document, then the
documents default security is taken from the document class.
7. Click OK to close the Security Assignment dialog box and return to the Relocate
Documents dialog box.
237
Because the source and destination are the same in the Bulk Edit Document Profiles dialog box,
the only problems that can occur when substituting values in the validated profile fields is if an
invalid value is typed directly into the text field for a validated profile field. In this case the bulk
profile edit will fail.
This dialog box functions the same way as the Relocate Documents dialog box. See Relocating
Documents between Databases on page 229.
238
If you select By Author, the WorkSite Monitor tool replaces a particular user name with
another designated user name every time it appears in the Author field in a documents
profile record.
If you select By Operator, the WorkSite Monitor tool replaces every instance of a
particular users name in the Operator field with a different, replacement user name.
239
NOTE
The reassignment process does not provide a rollback option. After documents are
reassigned, you will not be able to undo changes automatically. You can reassign the
documents again to restore them.
10. While documents are being reassigned, you can stop the reassignment process by clicking
Abort. If you click Abort, the WorkSite Monitor tool asks you whether you want to stop or
proceed with the reassignment. Click OK to stop the reassignment process. Click Cancel to
continue with the reassignment process.
11. When the reassignment process is finished, click Close to return to the Reassign Documents
to Author or Operator dialog box. Click Cancel to close this dialog box.
Document Archiving
Documents can be archived and restored from within the WorkSite Monitor tool. When
documents are archived, the WorkSite Monitor tool copies the selected documents to an archive
location and marks the documents as archived in the database. Archived documents are stored
collectively in archive sets.
Document profile information for the archived documents is not deleted from the database. The
actual documents themselves are deleted from the file server to free up storage space.
240
Archive Devices
Documents can be archived to any device on the network with a UNC path. The archive device
can be an actual disk drive, a removable hard-disk drive, a tape drive, an optical disk drive, or
any other archival storage device. The device can be permanent or removable. If the device is a
mapped drive, the drive should be mapped on the WorkSite Server.
Document Restoration
Documents can be restored selectively or collectively from within the WorkSite Monitor tool.
Users can also restore archived documents automatically using the WorkSite Network client
only if the WorkSite Server can access the archive set that contains the documents.
If users request an archived documents that is contained in an archive set that cannot be
accessed by the WorkSite Server, then the restore request is recorded in the database. It is up to
the administrator or database librarian to restore archived documents that have been requested
by users.
Archiving Process
The archiving process is done in two steps.
Documents that meet the specified search criteria are flagged for archiving in the database. They
are flagged for archiving remain flagged until they are archived, or until they are specifically
unmarked using the WorkSite Monitor tool. You can unmark documents for archiving in the
WorkSite Monitor tool by viewing the list of all documents currently marked for archiving and
selecting individual documents to unmark from the list.
Documents marked for archiving remain fully available to users until archived. If multiple
searches are performed to select and mark documents for archiving, these searches act
cumulatively to add marked documents to the list.
241
Expired Documents
Each document class and subclass has a specified period of days called a retention period.
During third time, the document remains in the database, even if it has not been edited or
accessed. A document expire, when it has not been accessed for a period of days greater than
the retention period specified for its class or subclass.
If the document is classified with a subclass, then the retention period specified for that
documents subclass is used to determine whether or not the document is expired. If there is no
subclass specified for a document, then the retention period specified for that documents class
is used. Expired documents are not automatically marked for archiving. You must search for
expired documents in the database and mark them for archiving.
To search for documents to mark for archiving:
1. Select a database in the Server WorkSpace window
2. Press Ctrl+M, or select Archive and then Mark from the Documents menu. The Mark
Documents for Archiving dialog box is displayed.
242
3. In the profile fields, enter the criteria used to select documents for archiving. Use the
browse button to choose criteria from the database lookup tables.
4. Click Additional Fields to enter criteria in additional profile fields not displayed in the
dialog box. The Setup Additional Custom Fields dialog box is displayed. See Setup
Additional Custom Fields Dialog Box on page 221.
5. Select the Expired Documents check box to search for and mark documents that have
expired. See Expired Documents on page 242.
6. Click Mark to search for all documents that meet the specified search criteria and mark
those documents for archiving.
A message box indicates the number of documents that meet the search criteria. The search
results includes documents that meet this criteria and are already marked.
7. Click OK in the message box to mark the selected documents for archiving; click Cancel to
cancel the request.
243
From the Mark Documents for Archiving dialog box, you can also unmark documents that
meet specified search criteria or view the list of all documents currently marked for
archiving and selectively unmark documents in the list.
4. Click Additional Fields to enter criteria in additional profile fields not shown in the dialog
box. The Setup Additional Custom Fields dialog box is displayed. See Setup Additional
Custom Fields Dialog Box on page 221.
5. Click Unmark to unmark documents that meet the selection criteria. The message box
displays the number of marked documents that meet the selection criteria.
6. Click OK to unmark the selected documents, or click Cancel.
After all selected documents are unmarked in the database, a message box appears reporting
on the success of the unmark operation.
7. Click OK to close the message box.
To select documents for unmarking:
1. Select the database in the Server WorkSpace window.
2. Press Ctrl+C or Ctrl+M to display the Archive Documents or the Mark Documents for
Archiving dialog box. Alternatively, you can select Archive from the Documents menu, and
then either Archive or Mark.
3. Click View. A list marked documents is displayed in the Documents Marked for Archiving
dialog box.
244
4. To unmark a document for archiving, clear the check box that appears next to the document
number in the table. To remark a document, click on the empty box icon.
Alternatively, you can mark and unmark documents by selecting a document and then
clicking the spacebar. Double-click a row in the table to toggle the marked or unmarked
status of that document.
NOTE
You must click the Save & Refresh or Save & Close button to change the status of
documents on the Documents Marked for Archiving dialog box. If you click Cancel, the
changes that you made are not saved to the database, including those made by the Undo
command.
5. Click Save & Refresh to save your changes and refresh the display to show only those
documents that remain marked for archiving.
6. Click Undo to restore the display to its original state. The changes made through multiple
Save & Refresh commands are canceled by clicking Undo.
245
NOTE
Changes that have been saved to the database are undone on your display only, until you
click Save & Refresh or Save & Close buttons.
7. Click Save & Close to save the current marked or unmarked status of documents and close
the dialog box.
8. Click Cancel to close the dialog box without saving the current status of documents.
Changes you made since the last time you saved the current status of documents are not
preserved when you click Cancel.
Archiving
After you have marked documents, you can archive them by selecting Archive, and then
Archive from the Documents menu.
To archive all marked documents:
1. Select the database in the Server WorkSpace window.
2. Press Ctrl+C, or select Archive and then Archive from the Documents menu. The Archive
Documents dialog box is displayed.
3. Use the
browse button next to the Operator field to identify the user who is creating the
archive set.
246
4. Locate the Date field. To select a new date, click the arrow and select a date from a calendar.
The current date is selected by default.
5. For Path field, use the
browse button next to select a storage location for the archive set.
Documents can be archived to any device on the network with a UNC path. See Archive
Devices on page 241.
6. Enter a description of the archive in the Comments field.
7. Click View to view a list of the documents marked for archiving or to remove individual
documents from the list of those selected for archiving. (See Unmarking Documents for
Archiving on page 244.)
8. Click Start. The number of documents currently selected for archiving is displayed.
9. Click Yes. The Archiving Documents dialog box is displayed.
247
10. Click Start to begin the archiving process. The status of the archiving process is displayed
in the Archiving Documents dialog box.
11. If necessary, click Abort to stop the archiving process. You have the following options:
If you click Abort button, a message box appears asking you if you want to discontinue
the archiving process. Click OK to abort the process or Cancel to continue archiving.
If you abort the archiving process, you can still continue archiving documents, as long
as you do not close the Archiving Documents dialog box. Click Start to continue
archiving the remaining documents marked for archiving in the database. The
documents will continue to be added to the same archive set.
NOTE
In the Archiving Documents dialog box, a message displays indicating when the archiving
process is finished.
12. Click Close.
248
document is available to the WorkSite Server. If the archive set is unavailable, a user request is
generated and can be viewed with the Monitor tool.
249
NOTE
Confirm that the archive set used to restore documents is available to the WorkSite Server.
User requests are generated only when the WorkSite Server was unable to locate the archive
set that contained the document when the user requested it. Otherwise, the document would
have been restored automatically. If you attempt to restore documents from an archive set
that is not available to the WorkSite Server, you will receive an error message.
7. When finished restoring documents from user requests, click Close.
Figure 120 The Document Request List dialog box
250
NOTE
The Restore Archived Documents dialog box can also be displayed by selecting Archive
from the Documents menu, then Restore, and then From Archive Set from the menus that
appear.
3. Click Find to search the list for a specified search string.
4. To view a list of documents contained in an archive set before restoring, highlight the
archive set, then click View. When finished viewing, click Close to return to the Restore
Archived Documents dialog box.
5. To restore an entire archive set, select the archive set in the Restore Archived Documents
dialog box, and click Restore. A message box displays the number of documents contained
in the archive set that have not been restored.
6. Click OK to continue the restoration procedure. The Restore Documents in Archive Set
dialog box is displayed.
251
7. In the Restore Documents in Archive Set dialog box, click Start to begin restoring
documents.
8. If necessary, click Abort to interrupt the restoration process. You have the following
options:
A message box will be displayed asking you if you want to abort the process. To abort,
click OK. To continue restoring documents, click Cancel.
After you abort the restore process, you can still choose to continue restoring documents
in the archive set. Click Start again in the Restore Documents in Archive Set dialog
box.
9. In the Restore Documents in Archive Set dialog box, click Close when the WorkSite
Monitor tool is finished.
10. If you want to delete the archive set, now that you have restored all of the documents
contained in it, select the archive set and then click Delete. Click OK in the message box
that is displayed.
11. If you are finished restoring documents from archive sets, click Close.
To restore individual documents from an archive set:
1. Select the database from which you want to restore documents in the Server WorkSpace
window.
2. Press Ctrl+R to display the Restore Archived Documents dialog box. The Restore Archived
Documents dialog box displays a list of all archive sets that have been created. You can also
select Archive from the Documents menu, then Restore, and then From Archive Set from
the menus that appear.
3. Click Find to search the list for a specified search string.
252
4. Select the archive set that contains the document(s) that you want to restore, then click
View. The Restore Documents from Archive Set dialog box is displayed.
Figure 123 Restore Documents from Archive Set dialog box
The Restore Documents from Archive Set dialog box displays the documents included in the
archive set. They are listed by document and version number. This window also indicates
whether the document has already been restored by displaying Y in the Restored column.
5. If the list of documents is very long, click Find to search through the list for a specified
search string.
6. Select the document(s) that you want to restore, then click Restore.
7. If the document(s) are restored successfully, then the status of the documents in the
Restored column will change from N to Y.
8. If you are finished restoring documents from this archive set, click Close.
9. If all documents from that archive set have been restored, you can delete the archive set by
selecting it in the Restore Archived Documents dialog box, then clicking Delete.
253
10. When you are finished restoring documents from archive sets, click Close.
Set Priority
The Set Priority option in the WorkSite Monitor tool sets the frequency with which the WorkSite
Monitor tool sends queries. These queries are sent to each of the WorkSite Servers registered to
update the information displayed in the Statistics tab. The options available are Paused, Low,
Normal, and High. The frequency with which the Statistics tab is updated depends on the
frequency with which queries are sent and the speed with which the WorkSite Servers are able to
respond to these queries.
To change the frequency of queries sent to the WorkSite Servers:
1. Click the Statistics tab or select Statistics from the Window menu.
2. Select Set Priority from the View menu and then select one of the options: High, Normal,
Low, or Paused. Alternatively, right-click the Statistics tab to display the menu.
Table 38 Setting the Frequency with which the Statistics window is updated
Priority
Paused
No queries sent
Low
Once a minute
Normal
High
Once a second
254
Log Files
The WorkSite Monitor tool has log file called Monitor.Log. It is stored in the installation path
for WorkSite.
When relocating documents between databases, detailed information about the migration is
stored in an additional log file named Relocate + the User ID of the user who performed the
migration plus the extension, .log. This file is stored in the installation path for WorkSite. It
includes information the following information:
For example, a user named Gail performs a relocate documents procedure. A log file called
Relocategail.Log is created.
255
256
Chapter 9
Requirements
The Rules Engine Service must have administrative privileges on the machine where it is
installed and must have permission to log on as a service.
The Rules Engine uses SMTP to send e-mail notifications. Windows Messaging uses the
currently configured e-mail client, such as Outlook, Lotus Notes, or Groupwise. The Rules
Engine startup ID and the system login ID must be the same. The e-mail user ID can be
different.
The e-mail notifications are sent under the auspices of the e-mail account of the user who
created the rule. For example, a user creates a rule on a folder (from WorkSite Web client 4.0)
that says: Send an e-mail to everybody on the page when anyone uploads a document to this
folder. When any user uploads a document to the folder, the Rules Engine sends an e-mail to
everyone on the page as the user that created the rule.
257
The user's e-mail address comes from the user table in the WorkSite Server. If the users e-mail
address is blank, then when that user creates the rule on the folder, the Sent From e-mail address
for the rule will be set to the default e-mail address specified in Administrative options
(Options.xml).
258
1. Select the Rules Engine service in the left column and click Add to move it to the Installed
column.
The Rules Engine Startup dialog opens, as shown in Figure 126.
259
2. In the Logon section, enter a Username (Logon ID) and Password for the Windows User
Account that will be used to run this service.
3. In the Startup Type section, select one of the following options to determine how the service
will be started:
Manualthe service must be started manually using the WorkSite Service Manager
tool.
4. Click OK. A dialog opens with an informational message: Granted Service logon
privilege to account.
5. Click OK to return to the WorkSite Service Add/Remove dialog.
6. Click Exit.
NOTE
WorkSite services can be uninstalled or reinstalled later by running the imSvrIns.exe program
located by default at C:\Program Files\Autonomy\WorkSite\Server\.
260
4. Click Add to define a database connection for the Rules Engine Service.
261
5. Enter or select the desired database plus Logon ID and Password. Click OK.
262
By default, the Rules Engine Service uses the Windows account used to log in, to try to gain
access to the file server. In this dialog box, you can specify an alternative account to use, in
case the Rules Engine Service is unable to log into the file server using its service logon
account. Whether or not an alternative account is specified, Rules Engine Service always
uses the Service Logon account first, to try to gain access to any Windows file server.
Figure 131 File Server Connections Dialog, Microsoft Windows tab
4. If any of your File Servers are Novell Bindery or Novell NDS, click the NetWare tab and
enter the Novell NetWare login account and password to be used by the Rules Engine
Service to log into all file servers that are Novell NetWare. You created this account when
you set up the File Server in File Server Setup on page 28. You can only specify one
account per Rules Engine Service (that is, per machine).
263
You may specify connection criteria for both Windows 2000 and Novell NetWare File
Servers for the same Rules Engine Service. Each Rules Engine Service is capable of
connecting to both Windows 2000 and Novell NetWare File Servers.
3. Enter the interval (in minutes) for Rules Engine scanning in the Process new events every
__ Minutes field.
264
4. Enter the name or IP address of the SMTP server that will be used to send the email
notifications in the SMTP Server field.
5. Click OK.
2. Type HELO and press enter. (Your typing may not be echoed back to you and may not
appear in the window.)
3. Type MAIL FROM: and type an e-mail address of the following format and press enter.
Mail from e-mail address format: anybody@<SMTPSERVERNAME>
Example:
anybody@WIN2K_TESTBOX
You can use ANY e-mail account name for this purpose, whether or not such an account
really exists.
4. Type RCPT TO: <destinatione-mailaddress> and press enter.
Where destinatione-mailaddress is an address in a valid domain for that SMTP service. This
must be a valid e-mail account to which you have access, for testing purposes.
265
(SMTP Services must be configured to allow mail forwarding to remote domains. Be sure
that the e-mail address that you specify is within a domain to which the SMTP service is
allowed to forward messages. For instructions on configuring SMTP domains, see below.)
5. Type DATA then press enter.
6. Type This is a test. and press enter.
7. Type . and hit enter (that is, a single period only, on its own line).
You should see a message indicating that the test e-mail message has been queued for
delivery.
Figure 133 Command window showing SMTP Connectivity test
8. Verify that the message has arrived in the destination e-mail account.
9. Type QUIT and press enter to exit the application.
NOTE
Source: This information was obtained from Microsoft's book, Running Microsoft Internet
Information Server 4.0, published by Microsoft Press, 1998. Pages 691-705. See Also:
Microsoft Windows 2000 and IIS 5.0 Administrator's Pocket Consultant, Microsoft Press,
2001, pages 215-249.
266
If this option is not available, you must add it using the Windows Components section of the
Add or Remove Programs Control Panel. Refer to the Microsoft Management Console
online help for detailed instructions.
267
268
5. Enter your domain name in the Name field and click Finish.
6. Double-click Domains to view the domain you created.
269
7. Right-click the domain you just created and choose Properties, as shown.
Figure 137 Computer Management, Properties
270
Event
Content Type
Update Profile
Document
Content Type
Document
Document
Document
Import Document
Document
Copy Document
Document
Synchronize/Replace--Replace (Modify)
Document
Document
Document
Document
Request Restore
Document
Create Folder
Folder
Delete Folder
Folder
Document
Document
Redistribute Document
Document
Document or
Folder
271
4. On the Rules Engine server, set up the e-mail client to communicate with the e-mail server
by entering the server name and the user mailbox name you created for use by the Rules
Engine.
272
Chapter 10
Introduction to Clustering
Introduction to Clustering
A cluster is a group of servers that act like a single system to provide higher availability, load
balancing, and parallel processing.
The WorkSite Clustering Server is a service that enables multiple WorkSite Servers to act
collectively as a cluster.
When WorkSite Servers begin to act as a cluster, client applications benefit from automatic load
balancing across services, and in the event of a server failure, automatic redirection to other
servers in the cluster.
273
Advantages of Clustering
A clustered environment has the following advantages:
274
Fault Tolerance
The WorkSite cluster is an entity defined in the DNS. It points to the IP addresses of all the
servers in the cluster. The DNS returns information relating to the current load on each server
and the list of IP addresses to the requesting client. Based on this information, the client tool
connects to, and requests the WorkSite Server that is less loaded. The WorkSite Server queries
the required database, and returns the results to the requesting client.
Features of Clustering
The basic features of server clustering on a network are:
275
When clustering is implemented, the client uses the following process to make a server
connection:
1. The client queries the DNS for the cluster name.
2. The DNS returns a list of IP addresses. One for each of the WorkSite DMS servers that are
listed under the cluster.
3. The client then sends a UDP multicast to each of these servers using the IP addresses.
4. The servers reply with their IP address, port, and current load (or connection count)
information.
5. The client (specifically the imanage.dll) reviews the server loads. It determines which server
has the lowest connection count, and connects to that server with the supplied IP address
and port.
There are two types of connections:
276
Brokered. In a brokered connection, the client asks the Cluster Manager for the connection
information using UDP. It determines the WorkSite DMS that it use to establish connection,
based on the current load details.
Direct. In a direct connection, the client uses TCP/IP to make a connection with the first
server that responds.
By default, the desktop clients use a "discovery" mechanism. This mechanism includes both
UDP and TCP communication to determine whether a connection needs to be made to a
WorkSite DMS Server or a WorkSite DMS Cluster. The desktop clients can be configured to
make a direct TCP connection to a particular server, or to use a brokered connection from the
registry.
To configure the connection mode on the desktop clients:
1. Locate the following hive of the registry:
HKLM\Software\Interwoven\WorkSite\Server Common\
2. Configure a DWord called Connection Mode and set the value. The values indicate the
following:
When a client application becomes inactive, it performs an implicit logout from the server. It
only reconnects when the user performs an action that requires a server connection. The client
application reconnects to the server in the cluster that is reporting the lowest load. These
disconnections and reconnections are transparent to the user.
Graceful Shutdown. The cluster member sends a UDP notification to the Cluster Manager
and clients of intended shutdown. When a WorkSite DMS is stopped through the WorkSite
Service Manager, it sends a notification to its peers and its clients. Each client disconnects
from the cluster member. On subsequent transactions, the clients silently connect to an
active server within the same cluster. During a computer or network failure, the remaining
WorkSite DMS Servers notify the clients of the unavailable server after 30 seconds. The
clients reconnect with the active servers. During this 30 seconds, the clients of the
unavailable server may notice transaction failures.
277
When the Windows firewall is used on the client side, there is a known issue with this
feature. A random UDP port is used, instead of UDP port 2637. Microsoft Exchange has a
similar issue.
Unexpected Shutdown. In the event of a server failure, client applications that are
connected to a cluster automatically disconnect from a server that has become unavailable.
When a clustered WorkSite Server is shutdown, it notifies its peers in the cluster that it is
becoming unavailable. The other WorkSite Servers in the cluster then notify all client
applications that the server has become unavailable. This notification does not happen
immediately. Affected client applications will disconnect from that server and connect to
another server in the cluster in the background.
WorkSite Servers in a cluster periodically inform each other of their existence, their current
client loads, and other information. If a WorkSite Server does not report to its peers in 30
seconds, the other servers assume that it is no longer available. They inform all client
applications to connect to another server in the cluster.
Prerequisites
Identify the WorkSite Servers that should be part of the cluster and ensure that each of these
Servers are connected to the same databases.
From the control panel, create an ODBC or System DSN for each database. The WorkSite
Server connects to one of these entities.
Phase 1
Assign static IP addresses to the identified WorkSite Servers. Select a Name for the Cluster and
create an entity with that name in the DNS. This entity should point to the IP addresses of the
WorkSite Servers that are members of the cluster.
278
Phase 2
Install Clustering Manager for each WorkSite Servers in the cluster. Configure the startup
properties for the Clustering Manager, using the WorkSite Service Manager. See Installing
Cluster Manager Service on page 281.
Phase 3
Use the Service Manager to configure the service properties for each WorkSite Server in the
cluster. The service properties must include the cluster name as defined in the DNS.
Also, configure the Database Properties to include all the databases to which the WorkSite
Server must be connected. See Configuring WorkSite Server Service on page 283.
For each WorkSite Servers in the cluster, start the DBAdmin and register all the databases to
which they connect.
Phase 4
Stop and start all the services from each of the WorkSite Servers in the cluster. The client should
log in to the cluster name to access the servers and databases that are part of the cluster.
279
3. Approximately every 60 seconds, the cluster members generate a full report for the Cluster
Manager. Cluster members normally send updated load information every 60 seconds or on
request. The load info in the Cluster Database is updated immediately upon receipt of this
information. Services update their internal load statistics every time through the loop (every
15 seconds).
The WorkSite Cluster Manager service functions as a directory service that manages
information about services running on the network and the clusters to which they belong.
When the WorkSite Cluster Manager service is not running, the clustering capabilities of the
WorkSite Servers are not available to client applications.
WorkSite client applications that support the ability to connect to a cluster are:
Earlier versions of WorkSite client applications can still connect directly to a WorkSite Server
that is part of a cluster, but those client applications do not have the advantage of automatic
client redirection in the event of a server failure or shutdown.
280
the Clustering Server sends replies to client applications that are attempting to log into the
cluster on a specified port. If this configuration option is not set the clustering server replies to
client applications on any available port.
This configuration option must be set on client machines that are attempting to log into the
WorkSite Clustering Server.
Client applications that support this configuration option are:
1. Configure the UDP reply port. In the following key in the registry on client workstations:
HKEY_LOCAL_MACHINE\Software\Interwoven\WorkSite\8.0\Common\
281
282
5. Enter the Login ID and Password for the WorkSite Server administrative domain account.
This account must have service privileges. The default value that appears in the Login ID
field in the Startup dialog is that of the current user.
6. Select the Startup Type
If you want the Cluster Manager service program to startup automatically on boot, select
Automatic. Autonomy recommends that this option be selected.
If you want the service program to start up only when launched manually from within the
WorkSite Service Manager, then select Manual.
7. Click OK to register your changes. A status box indicates that the account entered in the
Service Startup dialog box was granted login privileges to the service.
Service Properties
Configure each WorkSite Server service belonging to the cluster.
1. From the WorkSite Service Manager tool, select the WorkSite Server service then select
Service Properties from the Properties menu. The WorkSite Server Service Properties
dialog box is displayed.
2. Enter the cluster name in the Cluster Name field.
283
NOTE
If you have not registered all the servers in one instance of the WorkSite Service Manager,
you have to configure each of your WorkSite Servers.
3. To log into a server within the cluster from a client application, specify the cluster name (for
example, CLDMS) instead of a literal server name or IP Address.
284
Database Properties
Configure each WorkSite Server service belonging to this cluster.
1. From the WorkSite Service Manager tool, select the WorkSite Server service then select
Database Properties from the Properties menu. The WorkSite Server Database Setup
dialog box is displayed.
2. Enter the cluster name in the Cluster Name field.
Figure 143 WorkSite Server Database Setup dialog box
285
4. Enter the database name. You can select it from the list of available ODBC sources, by using
the browse button.
5. Enter the Logon ID and Password for the entered or selected ODBC.
6. Click OK to add the database. The database is now added to the list seen in the WorkSite
Server Database Setup dialog box.
7. Click Close to save the settings.
All the WorkSite Servers in the cluster must be connected to the same set of databases. You
must create an ODBC connection for every database that is connected to the WorkSite
Servers in the cluster. Create the connection for each WorkSite Server.
5. Register the databases in DBAdmin tool.
6. After changing the cluster name, stop and restart each WorkSite Server service.
286
Chapter 11
Directory Service
Synchronization Service
Overview
This chapter includes information on the following topics:
The Directory Service Synchronization (DSS) service enables the WorkSite Server to perform
repeated one-way synchronizations with hierarchical directory services, including Microsoft
Active Directory or other LDAP server. The service can perform continuous or scheduled
imports of users and groups that are added to directories on remote domains. Using the
Directory Service Synchronization service saves administrators time by automatically updating
user information on WorkSite when changes are made on the directory service.
The Directory Service Synchronization service is configured using the WorkSite Service
Manager. The service currently supports synchronization with the following directory services:
Novell NDS
Windows NT
287
The first process compares all the users and groups on the directory service with those on
the WorkSite library. New users are added to the WorkSite library and profile information is
updated for existing users, if necessary.
The second process determines whether each user and group on the WorkSite library exists
on the directory service. Users that have been removed from the directory on the remote
domain are disabled in WorkSite.
Synchronization is one-way only. If user or group accounts are added or modified on the
WorkSite database, the changes are not recorded on the external Directory Service.
The key to performing synchronization is having a unique identifier for each user and group
imported from the directory service. The K1SyncID is stored on both the WorkSite library and
the external directory service, enabling exact matching on directory objects even when those
objects are modified. (For example, an employee changes department or name.) The value of the
K1SynchID of a user or group cannot be modified. If it is changed on the directory service, the
synchronization process logs an error, and the user and group accounts are not updated on the
WorkSite library.
The DSS service can be set to run continuously or on a schedule. In either case, the basic
program flow consists of a basic interval repeated continuously or as time remains in the
scheduled period. If the WorkSite Server is connected to more than one directory service, only
one connection is serviced during an interval. During the next interval, the next connection is
serviced, and so on.
NOTE
WorkSite Server does not support nested groups. When nested groups are imported from Active
Directory, the members of the nested group are added to the parent group.
Requirements
The DSS service requires administrative privileges on the machine where it is installed and
permission to log on as a service.
288
1. Select the Directory Synchronization Service in the left column and click Add to move it to
the Installed column.
The Directory Synchronization Service Startup dialog opens, as shown in Figure 146.
289
2. In the Logon section, enter a Username (Logon ID) and Password for the Windows User
Account that will be used to run this service.
3. In the Startup Type section, select one of the following options to determine how the service
will be started:
Manualthe service must be started manually using the WorkSite Service Manager
tool.
4. Click OK. A dialog opens with an informational message: Granted Service logon
privilege to account.
5. Click OK to return to the WorkSite Service Add/Remove dialog.
6. Click Exit.
NOTE
WorkSite services can be uninstalled or reinstalled later by running the imSvrIns.exe program
located by default at C:\Program Files\Autonomy\WorkSite\Server\.
290
291
If you select Schedule, the DSS service runs only during the periods you specify. Select
the time of day (in 2-hour intervals) and the days of the week when you want the
synchronization to occur.
If you select Continuous, the service continuously compares and updates the WorkSite
libraries with user and group information from the external directory service. The
default interval is 10 minutes.
6. Click OK.
292
293
4. Enter a name for the connection. This name appears in the Directory Service Connections
dialog (see Figure 148).
5. Under Directory Service, enter the following information:
294
Server Type Select the type of directory service to which you are connecting.
TCP/IP Port Enter the TCP/IP port number of the server/domain hosting the directory
service.
Context (for Novell NDS only) Enter the location of an object in the Directory tree.
NDS objects are identified by their relative location in the Directory tree.
Server Enter the name of the server hosting the directory service.
Service Logon and Other (Specify) Select Service Logon to log on as the service
account for the DSS service. Select Other to enter the User Name and Password.
User ID Enter the FQDN, UPN, or Domain\User ID of a user with access to the
directory service using one of the following forms:
Fully Qualified Distinguished Name, for example:CN=Tim Jones, OU=AMER,
OU=Domain Users, DC=Autonomy, DC=COM
User Principal Name (UPN) format or e-mail address, for example:
tjones@autonomy.com.
Domain\UserID, for example: autonomy\tjones.
Note: Administrative-level access is required for Sun ONE and Novell NDS in order to
update those directories with the K1SyncId value. Read-only access is sufficient for
ADS. Be sure that the ADS user has sufficient access to read from the nodes they
choose.
Note: For Windows NT, the user account must have, on the machine where the DS
Synchronization Service is running, Act as part of the operating system and Log on
locally as part of the machines Local Security Policy. These permissions are granted
automatically when you click Test Login, if they have not already been granted.
Password Enter the password of the administrative user you entered in the User ID
field.
6. Under Attribute Maps, select a map from the Defined Maps list or create a map. To create
an attribute map, click Add. See Mapping Directory Service Attributes to WorkSite on
page 298.
7. Click Test Login. A confirmation message is returned if the login is successful.
8. In the Root Container DN field, define the directory container that should be imported. All
groups and users within (and below) this container will be imported.
If you are connecting to an LDAP type service (for example, ADS), the Root Container DN
field is populated automatically after successfully connecting to the directory service,
showing the top-level container. Click Browse to specify an alternate container (see
Figure 150).
295
9. If any of the users or groups should be designated as external users in WorkSite, you can
specify the specific objects (OUs, groups, users) in the External DNs portion of this dialog.
Refer to Specifying External Users and Groups for step-by-step instructions.
10. Under WorkSite Server, enter the following information:
296
Database The name of the WorkSite library to which the users/groups will be
imported. Each WorkSite library must have a synchronization connection configured
separately. This enables you to import only those users and groups which need access to
that library.
Service Logon and Other (Specify) Select Service Logon to log in as the service
account for the DSS service. Select Other to enter the User Name and Password.
User Name Enter the username of a user who has administrative privileges on the
WorkSite Server (part of the NRTADMIN group).
TCP/IP Port Select Default or specify a port by entering a port number in the text
box.
Select User Must Change Password at Next Logon or Password Never Expires as
needed.
12. Click OK. The connection appears in the Directory Service Connections dialog (see
Figure 148).
You must double-click the line in order to enter, modify, or delete the DN string.
297
If a user or group should no longer be marked external in the library, you must deselect the
external option individually for each user or group using DBAdmin. DSS will not update this
setting, even if you modify the DS Synchronization Connection Properties.
2. Enter a name for the attribute map in the Map Name field, for example, Novell.
3. To select a predefined map for Microsoft ADS or Sun ONE directory services, click the
ADS Defaults or Sun ONE Defaults button. This action populates the form with default
values.
4. To create a new attribute map, select a field from the list to serve as the K1SyncID.
298
5. Under Group, select Directory Service group attributes from the lists that correspond to the
following WorkSite fields:
Group ID
Name
Members
6. Under Organizational Unit, select a Directory Service attribute from the list that
corresponds to the WorkSite Name field.
7. Under User, select Directory Service user attributes from the lists that correspond to the
following WorkSite fields:
User ID
Name
Location
Telephone
Fax
8. Click OK. The new map appears in the list of Defined Maps on the DS Synchronization
Connection Properties dialog (see Figure 149).
Whenever you change any DSS service settings, you must stop and restart the service in the
WorkSite Service Manager.
1. Open the WorkSite Service Manager.
299
300
Chapter 12
301
The SEV integration will restore e-mail stubs that have been imported into WorkSite to fully
realized emails as long as the e-mail content still exists within SEV. The integration will adhere
to the business rules of the existing e-mail management and the records management
functionality in WorkSite. If e-mails are declared as records on import, WorkSite will only allow
reconciliation of the e-mail with SEV and will deny any attempt to modify the record. Also, if
an e-mail stub in Worksite that has not been restored to a fully realized e-mail is accessed,
WorkSite will rely on the SEV client to display the email to the user.
When emails are imported from Outlook into WorkSite, the following rules apply.
If an email is imported into WorkSite from Outlook using a move command, the reference to
that email is removed from that inbox.
If the email is imported into WorkSite from Outlook using a copy command, the reference to
that email remains within that inbox and is continued to be served by SEV.
NOTE
None of these actions impact the actual content in SEV. Content in SEV is still referable using
the SEV shortcut until the content is removed from SEV by its configured records management
rules.
NOTE
The Microsoft Exchange version is dependant on the version of SEV and WorkSite.
302
The DbUpgrade utility may fail if it encounters constraint violations in the database. Contact
Autonomy Technical Support for additional information.
Autonomy is not responsible for loss of data caused by the failure to backup your databases.
3. Create a new test SQL database. Restore the backup of your production database to this
database. Run the upgrade against this test copy of your production database, before running
it in your production environment.
4. Install WorkSite Server 8.3 on the test server machine. (The installation directory contains
the executable for the DbUpgrade utility.) For more information, see the WorkSite Server
and WorkSite Server with Caching Release Notes 8.3.
5. Run DbUpgrade.exe against the restored test copy of your database. See Using the
DbUpgrade Utility on page 304. Complete one of the following tasks based on the outcome
of the upgrade test.
No Errors Reported: Proceed with the upgrade. Run DbUpgrade utility against the
production database.
303
NOTE
Do not run DbUpgrade utility against your production database until you verify that there
are no errors when you run it against the test database.
For example, you would enter the following information if the ODBC Data Source Name
for your SQL Database is NEWYORK, the SQL login account is SA, and the Password is
Barney27:
> DBUPGRADE.EXE -DSN NEWYORK -USR SA -PSWD Barney27
4. Confirm that the command prompt displayed a message indicating that the upgrade was
successful. You can also view the DbUpgrade.log file to confirm the upgrade. This file is
located in the same directory as the DbUpgrade utility.
Contact Autonomy Technical Support if you find errors in this log file that you have been
unable to resolve.
304
For more information about the Vault Admin Console, contact Symantec Corporation.
If user account does not have administrator access to SEV, the SEV API will return Internal
Failure error messages when the DMS attempts to download email messages from the Vault.
305
CAUTION
Modifying the registry improperly can cause serious problems with the operating system. Be
sure to make a backup of the registry and exercise caution when modifying the registry.
Autonomy is not responsible for loss of data due to improper use of the Registry Editor or
failure to backup the registry.
1. Go to Start > Run and enter Regedit, or type regedit at the C: prompt.
The Registry Editor appears.
Figure 153 Registry Editor
3. In the right pane, scroll down to locate the String Value, Reconcile UserId.
306
5. Enter the WorkSite NT user account information in the Value data text box.
6. Click OK.
The WorkSite NT user account gets updated in the registry.
307
2. If the WorkSite Server Service is running, select the Service and click the Stop button in the
toolbar. Alternatively, you can click Stop Service from the Service drop-down menu or type
Ctrl-T. See Figure 158.
308
3. Once the WorkSite Server Service has stopped, click the Service Properties button in the
toolbar. Alternatively, you can select Service Properties from the Properties drop-down
menu or type Ctrl-P. See Figure 159.
309
The WorkSite Server Properties dialog box appears. See Figure 160.
310
4. Select the Enable Symantec(tm) Enterprise Vault Integration check box to enable SEV.
See Figure 161.
311
5. Insert the DNS name or address of the SEV Server in the Server Address text box.
6. Click OK.
7. Restart the WorkSite Server Service by clicking the Start button in the toolbar.
Alternatively, you can click Start Service from the Service drop-down menu or type Ctrl-S.
See Figure 162.
312
E indicates that the email has been reconciled, in either of the following two ways.
313
It was sourced from SEV and the stub was replaced with the fully realized email.
P indicates that the reconciliation encountered an error while processing the email and
increased its retry count. When the retry count equals the maximum value in the DMS
registry key, ReconciliationRetry (found in the Windows registry), it will no longer be
selected as a candidate email.
X indicates that the email has failed reconciliation the maximum number of times and will
no longer be a candidate for reconciliation. For more information, see the explanation for
status code S.
S indicates that the email, sourced from SEV, has failed reconciliation the maximum
number of times and will no longer be a candidate for reconciliation but will remain an SEV
stub message file.
U indicates that the WorkSite Server cannot determine whether the origin of the e-mail
was from Exchange or from Enterprise Vault. This can happen because of corrupted or
non-existent file or because the origin is from other e-mail servers, like Lotus Notes.
Email Reconciliation subsystem is the background process running in the WorkSite Server that
manages the connection to SEV and resolves SEV shortcuts.
Heartbeat Statistics
The Email Reconciliation subsystem will write a status message to the DMS log file just before
going into a sleep state:
QPT=0 QPS=0 QPE=0 QFR=0 QFX=0, TPT=0 TPS=0 TPE=0 TFR=0 TFX=0
314
The Quantum records (QPT, QPS, QPE, QFR, QFX) are the delta for the last cycle and the
Total records (TPT, TPS, TPE, TFR, TFX) are the total since the Email Reconciliation
subsystem was started.
Table 40 shows the records with their expansion.
Table 40 Abbreviations used in the DMS log file
Abbreviation
Expansion
QPT
QPS
QPE
QFR
QFX
TPT
TPS
TPE
TFR
TFX
315
316
Chapter 13
Cache Fileserver
Surfacing the issues and dependencies involved when planning a successful caching server
rollout.
317
This type of caching differs from the meta-data caching and shared cache capabilities that are
also part of the WorkSite Server.
In addition, WorkSite proxy capabilities enhance performance for the caching server. This proxy
capability reduces the number of SQL transactions from the caching server to the remote SQL
Database.
318
Cache Fileserver
Cache Fileserver
A caching server is essentially a regular WorkSite DMS server with additional configuration
options that allow it to perform caching functions. When deployed as a cache server, it acts as an
appliance in the remote office. The caching server can be configured to cache content from
multiple centralized databases. It maintains SQL ODBC connections to each database, and it
connects to the central file server. Each database maintains a list of all caching servers currently
connected and all documents currently maintained in each servers cache.
NOTE
The cache fileserver should have the same specifications as your system fileserver: SCSI, RAID
configured drive capable of handling the amount of content for the number of documents to be
placed into the cache plus 20%.
When a user makes a document request, such as, a checkout, the caching server queries the
appropriate database to see if:
1. The document currently exists in the local cache.
2. The document in the cache is up-to-date.
If both conditions are true, then the caching server returns the local copy from the cache folder
and marks the document as checked-out.
If either condition is false, the caching server connects directly to the central file server, checks
out the document, and streams it to the client machine while retaining a copy of the document in
the cache.
The database is also updated to reflect that the cache contains an up-to-date copy. When the
document is checked in, the caching server accepts the document from the client application. It
releases the client so that the user can continue working. (This happens very quickly, regardless
of document size.) The caching server then checks the document back in, which physically
updates the document on the central server and updates the SQL database accordingly.
The caching server maintains a queue of all the documents to be uploaded. It wakes up at
one-minute intervals, and uploads all the documents in the queue to the central file server. (It
does not upload a document to the centralized file server immediately after receiving it from the
client.) If the upload time extends the one-minute boundary, the cache server does not go to
sleep but continuously uploads documents until the queue is empty.
Configuring the caching server consists of three steps:
Specify the local path or folder on the WorkSite Caching Server where cached documents
are stored
319
For WorkSite Server with caching 8.0 SP1 (With proxying capabilities) and above, specify
the WorkSite Server at the central location where the transactions will be proxied.
Example
A firm that has regional data centers in New York and Chicago. It is common for attorneys in
New York to work on documents for matters based in Chicago, and vice versa. The New York
DMS server needs to see the Chicago databases in order to access that content. Consequently,
it might make sense to configure the New York DMS server to cache the Chicago content
locally. (This minimizes the delays due to uploads or downloads of files across the slower
WAN.) The New York DMS acts as a local DMS for local New York content, and as a caching
server for remote content in Chicago. (The New York DMS does not cache the files of the New
York database, since these files are readily accessible on the fast LAN.) The Chicago site can be
configured the same way, providing both locations with quick, seamless access to content
regardless of its physical location.
Additional considerations includes the number and location of smaller offices around the
regional data centers, the quality of network connections, the work patterns of users, average
document size, and others.
See IManCacheableContent in the COM Object for WorkSite Developer's Reference Guide.
320
Cache Fileserver
2. Enter the path to the Cache Fileserver in the Cache Fileserver Path text box. You can use
the browse button to navigate to the Cache Fileserver and select it.
At Site 1, the centralized site where the databases reside, the Cache Fileserver for
Database 1 will be a path to the Cache Fileserver at Site 2.
At Site 2, the Cache Fileserver for Database 2 will be a path to the Cache Fileserver at
Site 1.
See the examples in Cache Fileserver on page 319.
321
NOTE
A server that does not belong to a cluster must have a unique fileserver cache. All servers
belonging to a specific cluster must have an identical fileserver cache.
3. To complete the other fields in the WorkSite Service Properties dialog box, see the WorkSite
Server Implementation Guide. These fields are all related to Meta-Data caching and not to
File caching.
4. Click OK to save your settings.
5. Set up your databases to enable caching files. Select Databases Setup from the Properties
menu. Select the name of the library you want to enable and click Modify. The WorkSite
Server Database Properties dialog box is displayed.
Figure 164 WorkSite Server Database Properties dialog box
Enable caching only for databases with remote fileservers, that is, fileservers that are
located across the WAN from the WorkSite Server.
322
For example:
C:\> imCachePurge.exe -dsn Colorado -usr sa -pswd mhdocs -dtm "06/18/2003
18:59:00"
3. Type Enter. The utility removes documents in the cache file server for the library you
named that are older than the date you selected.
4. Repeat for each library (Data Source Name) connected to that Cache Fileserver.
323
Currently, WorkSite Server with Caching works to enhance performance over a WAN in a
distributed environment.
It utilizes "proxy" architecture to minimize SQL transactions over the WAN. When a client
initiates a request, the transaction requests are sent directly from a local WorkSite Server to the
remote WorkSite Server. The remote WorkSite Server "proxies" the requests to the SQL
database locally and returns the response to the requesting WorkSite Server.
Figure 166 WorkSite Server with Proxying Capabilities
The proxying capabilities minimize the number of SQL roundtrips over the WAN. The WorkSite
Advanced Server allows a client request to a remote library to go from the local DMS to the
324
remote DMS. The remote DMS handles the multiple server transactions locally, and responds to
the client request in a much shorter time.
Rather than relying on the caching server to communicate directly with the centralized SQL
server, a partial server-to-server proxy mechanism is implemented for transactions that
generated several roundtrips over the WAN.
For transactions that require several roundtrips over the WAN, the caching server can make a
single call to the central WorkSite Server. The central WorkSite Server performs all the
individual SQL transactions locally on the LAN in the central data center, where latency is not
an issue. It then reports the status of the completed transaction to the caching server. Only one
atomic transaction takes place between the caching server and the data center.
NOTES
This capability is referred to as a partial proxy mechanism since only proxied core
transactions result in several round trips over the WAN. The caching server maintains an
ODBC connection to the SQL server for transactions such as authentication, to the file
server for file upload or download, and so on.
It is not possible to turn on file caching for a database, but to turn off the proxying
capabilities. With WorkSite Server with Caching 8.0 sp1 and above, the proxy capabilities
are an integral part of the caching functionality and cannot be disabled.
WorkSite Server with Caching refers to the proxying capability as well. Proxying is an integral
part of the caching technology.
325
2. Click Add Server to open the Server Connection Properties dialog box. You can add a
server connection across the WAN.
Figure 168 Server Connection Properties dialog box
3. Enter the name of the Proxy server in the Cluster/Server Name field.
4. Enter the Logon ID and Password for a WorkSite user, who is a member of the
NRTADMIN Group for the enterprise server. This ID and password must have system
administrator-level access to the enterprise server.
5. Enter TCP/IP Port Configuration information. The values entered in the Service Port and
File Port fields are dedicated TCP/IP port numbers assigned to the WorkSite Server service
tool. The service port is used for service transactions, and the file port is used for
transmitting files. Autonomy recommends that you use the default value for the service port
(1080) and file port (1081), unless otherwise instructed by WorkSite Technical Support.
326
6. If you want to maintain a 1:1 ratio of threads to connections for this database, select the As
many connections as threads check box. Otherwise, clear this check box and enter a custom
number of connections that should be maintained between the WorkSite Server and
database. See the WorkSite Server Installation Guide.
7. Click OK to save your entries and return to the WorkSite Server Database Setup dialog box.
8. Click Add Database to open the Database Properties dialog.
Figure 169 Database Properties Dialog ox
9. Enter the name of the database in the Database Logon Setup field.
10. Enter the SQL Logon ID and Password for the database. This ID and password must have
system administrator-level access to the database, such as the SA account.
11. Select the Enable Cache Fileserver check box.
12. If you want to maintain a 1:1 ratio of threads to connections for this database, select the As
many connections as threads check box. Otherwise, clear the check box and enter a custom
number of connections that should be maintained between the WorkSite Server and
database.
13. Select the Preferred Database option to designate this database as the source for dialog
boxes, captions, and roles. Any database that is identified as a Preferred Database can serve
as a source for dialog boxes, captions and roles. Each WorkSite Server must be connected to
at least one database that is identified as a preferred database. You can specify alternate
preferred databases for individual users using the Database Administration tool.
14. If this database functions as a web content database for use with the WorkSite Web client,
select the Web Content check box.
327
15. If you want the Web Content database to be hidden from end-users, select the Hidden check
box.
16. If you want to enable full-text searching on this database, select the Enable Full- Text
Searching check box.
17. Enter values for the full-text search setup for this database:
Specify the name or IP address of the full-text search server or cluster in the Cluster /
Server Name field.
To specify a TCP/IP service port for the full-text search server, select Specify Service
Port and enter the service port in the field. The default is 1082.
18. Click OK to save your entries and return to the WorkSite Server Database Setup dialog box.
19. Click Close to return to the WorkSite Server Service Manager window.
328
Chapter 14
Prerequisites
The WorkSite Users Preferred Database Migration Tool requires the following prerequisites:
Every WorkSite Database must contain information about the intended destination database
in the MGHGROUP.LIBRARIES table.
Each WorkSite Server must have a common administrator account for every WorkSite
Server and WorkSite Database across the entire system.
329
Server
Source database
Destination database
When the information is entered on the command line and executed, the Migration Tool
performs a four-stage algorithm:
Stage 1: Initialization
Stage 2: Copy
Stage 3: Finalization
Stage 4: Deletion
Stage 1: Initialization
1. Using the administrative userID and password, the Migration Tool logs into the first server
in the server list, and checks the connection to the source and the destination database. If
any connection fails, the Migration Tool closes.
2. The Migration Tool checks to see if the targeted user is in the source database, and if that the
source database is the current preferred database for this user. If not, no further action is
performed for this targeted user and the Migration Tool closes.
3. Next the Migration Tool checks to see if the target user exists in the destination database. If
not, no further action is performed for this targeted user and the Migration Tool closes.
4. The Migration Tool checks to see if the destination database contains any of the following
information for the targeted user:
If any of this information is found, it is the result of a previous unsuccessful migration. This
data is removed from the destination database before initiation of the Copy Stage. If any
error occurs, the Migration Tool closes.
330
Stage 2: Copy
In this stage the target users preference settings, subscription hierarchy, and favorite hierarchy
are copied to the destination database.
Checkout list
Worklist
Recent pages
Preferences
Subscriptions
Favorites
Explorer
Search histories
The Migration Tool copies the visibility flag settings for these items from the source database to
the destination database. If any unrecoverable error occurs, the Migration Tool closes.
Subscription Hierarchy
The Migration Tool copies the entire subscription hierarchy recursively to the destination
database. If any unrecoverable error occurs, the Migration Tool closes.
Favorites Hierarchy
The Migration Tool copies the entire subscription hierarchy recursively to the destination
database. If any unrecoverable error occurs, the Migration Tool closes.
Stage 3: Finalization
In this stage, all the target user's preferred database settings in every database across the system
are updated so that they point to the new destination database. Also, any existing references in
other users' subscription hierarchies that point to the target user's old subscription hierarchy in
the old database are updated so that they reference the new hierarchy in the destination database.
If any unrecoverable error occurs, the Migration Tool closes.
331
Stage 4: Deletion
When the migration succeeds, all of the user preferred database settings in all the databases have
been updated, and all existing subscription shortcuts that point to the old subscription hierarchy
has been redirected. At this point the Migration Tool deletes the old information in the source
database.
Description
-svr
-usr
-pwd
-sdb
-ddb
-tuser
The target user login name in both the source database and the
destination database.
-logfile
The log file with the full path. If not specified, the log file name is
PDMTool.log, and it is located in the working directory.
You can enter the parameters in any sequence. For example, both of the following entries
should be valid for migrating user UU from database SS to database DD using the default
administrator login in both databases.
C:\ > PDMTool.exe -svr workdemo -usr adminuserid -pwd adminpassword -sdb SS
-ddb- DD -tuser UU
or
332
Prerequisites
The clload.exe can only be run from a batch file or from the command line.
333
/db:databasename loginid
password
/parentalias:parentalias
/file:filename
/overwrite:Y or N
/table:tablename
/childflag:Y or N
/format:delimiter field1 field2 field3 field4 field5
field6
Required Parameters
/db:databasename loginid password
The /db parameter is required and must provide the ODBC data source name (databasename),
the user ID which will be used to log into the database, and the password. If the password is
null, use two double quotes to indicate a null password:
Examples:
clload /db:atlanta sa
clload /db:WorkSite sa password
334
/file:filename
The /file parameter indicates the path and name of the ANSI text file that contains the entries
that will be loaded in the specified custom table.
Examples:
clload /file:c:\temp\clients.txt
clload /file:d:\public\accounts.txt
clload /file:e:\acc\public\accounts\css.txt
/table:tablename
The /table parameter specifies which table the entries will be loaded into. The only valid table
names that may be entered for this parameter are listed below. The table name is case-sensitive:
all table names must be entered in all caps, as shown.
When importing entries into a parent table and its child table simultaneously, enter the table
name for the parent table in the /table parameter (i.e., enter either CUSTOM1 or CUSTOM29.)
When importing entries into the Client, Matter, Practice or Subpractice tables, use the table
names, CUSTOM1, CUSTOM2, CUSTOM29, or CUSTOM30 respectively.
/table:CUSTOM1(Client table)
/table:CUSTOM2(Matter table)
/table:CUSTOM3
/table:CUSTOM4
/table:CUSTOM5
/table:CUSTOM6
/table:CUSTOM7
/table:CUSTOM8
/table:CUSTOM9
/table:CUSTOM10
/table:CUSTOM11
/table:CUSTOM12
/table:CUSTOM29(Practice table)
/table:CUSTOM30(Subpractice table)
Optional Parameters
/parentalias:parentalias
The /parentalias parameter is only used when the table name specified is CUSTOM2 or
CUSTOM30. (i.e., when you are importing Matter or Subpractice entries.) When you are
importing entries into either of these child tables, you must specify the parent alias to which the
imported entries should belong. This parent alias must already exist as a valid entry in the
corresponding parent table on the database. This parameter is ignored when the table name
specified in the /table parameter is anything other than CUSTOM2 or CUSTOM30.
335
Examples:
/parentalias:0012359
(Result: All child entries imported in this load will be added to the child table associated with
this parent alias.)
/overwrite:Y or N
The /overwrite parameter specifies whether to overwrite existing description information if the
alias already exists. Normally, the clload.exe program will not overwrite existing description
information in the database. (By default, this parameter is set to N.) If an alias appears in the text
file, and the /overwrite parameter is not set to N, then the entry in the database is not changed. If
the /overwrite parameter is set to Y when an alias appears in the text file that already exists in
the database, the clload program will replace the existing description field for that alias in the
database with the one specified in the text file. If the /overwrite parameter is set to Y while
description information is being skipped, then no substitutions will be made in the description
field.
/childflag:Y or N
The /childflag parameter specified whether to load only parent table entries or both parent and
child table entries simultaneously. To load both together, specify Y. To load only parent table
entries, specify N. The /childflag parameter is set to Y by default. This parameter only applies
when the table name selected in the /table parameter is set to CUSTOM1 or CUSTOM29.
/format:delimiter field1 field2 field3 field4 field5 field6
The /format parameter is used to identify the character used to delimit fields in the text file.
Double quotes must be placed around the delimiter character when the character used as a
delimiter is a pipe symbol, less than or greater than characters, an asterisk, or any other symbol
that may be parsed incorrectly on the command line. (A pipe symbol, for instance, indicates that
you want to pipe the results of the first command to a particular input device.). The criteria that
follows the /format parameter is:
delimiter character used to delimit fields in the text file. The default delimiter is a comma.
field1: number of field (or column) that contains the parent alias. This number defaults to 1.
field2:number of field (or column) that contains the parent description. This number
defaults to 2.
field3:number of field (or column) that indicates whether this item should be enabled (Y) or
disabled (N). This number defaults to 3.
field4:number of field (or column) that contains the child alias. The value of this field
defaults to 4.
336
field5:Number of field (or column) that contains the child description. The value of this
field defaults to 5.
field6:number of field (or column) that indicates whether this item should be enabled (Y) or
disabled (N). This number defaults to 6.
When you are importing entries in any custom table other than CUSTOM1 and CUSTOM29
(the Client and Practice tables), any values entered for fields 4, 5 and 6 are ignored, and the
values for fields 1, 2, and 3 only are used to extract the custom alias and description from each
row or record in the text file.
Example:
/format:"|" 3 4 2 1 5 6
(Result: Given this formatting parameter, this load will parse the file using the pipe symbol as
the character designated to delimit fields in the text file, and it will read in the third and fourth
fields as the alias and description for each custom table entry. If the second field in that row in
the text file contains an "N" or "n", the item will be disabled. If it contains a "Y" or "y" or empty
string, the item will be enabled. If parent-child tables are being loaded simultaneously, then the
first and fifth fields in each record will also be used to create a child table entry that will be
associated with that parent table entry. The child table entry will be enabled or disabled based on
the value in field six.)
Result: No descriptions will be loaded in for any custom table entries or parent table entries
loaded in. This feature may be used when loading in parent-child tables simultaneously. Either
parent or child descriptions or both may be skipped.
337
If the above command line is used to load in data from a text file that contains the excerpt above,
then three entries will be added to the Matter table for the single Client table entry, PA00012.
The above command line statement specifies that client entries should be loaded into the
database NTDB using the userid SA with a null password from the file, CLIMAT.TXT, located
in the C:/TEMP directory. The text file will be parsed using a comma and only parent table
entries will be loaded in. The alias will come from the first field in each row (or record) in the
text file, the description will come from the second field in each row (or record) in the text file.
clload /db:ntdb sa "" /table:CUSTOM2 /parentAlias:000002 /file:c:\temp\
climat.txt
The above command line statement specifies that matter entries should be loaded into the
database NTDB using the userid SA with a null password from the file, CLIMAT.TXT, located
in the C:/TEMP directory. The matter entries will all be added to the entry in the client table
with the alias, 000002.
clload /db:ntdb sa "" /table:CUSTOM3 /file:c:\temp\climat.txt /overwrite:Y /
client:n /format:"," 1 2
The above command will load entries into the custom3 table from the text file CLIMAT.TXT
and overwrite the descriptions of existing entries.
338
specifications for the text files used in the loading process. This utility can only load entries into
the user table.
Prerequisites
The userload.exe may only be run from a batch file or from the command line.
339
null, use two double quotes to indicate a null password: "". Autonomy does not recommend
using a null password.
Examples:
userload /db:atlanta sa ""
userload /db:WorkSite sa password
[/MustChangePwd: [Y|N]]
The /MustChangePwd parameter is optional. If used, Y indicates that the user must change the
password at the next login; N indicates that the user is not required to change the password. The
default is Y.
Description
insert
overwrite
sync
/file:filename
The /file parameter indicates the path and name of the ANSI text file that contains the entries
that will be loaded in the specified custom table.
Examples:
userload /file:c:\temp\user.txt
userload /file:d:\public\user.txt
340
instance, normally indicates that you want to pipe the results of the first command to a particular
input device. The criteria that follows the /format parameter is described in the following table.
Table 43 Format Criteria
Criteria
Description
delimiter
Column1:
Column2:
Column3:
Column4:
Column5:
Column6:
Column7:
Column8:
Column9:
Column10:
Column11:
Column12:
The above command line statement specifies that entries should be loaded into the database
NTDB using the userid SA with a password of mhdocs from the file, UserData.txt, located on
the C drive in the TEMP directory. The text file will be parsed using a comma. There is no
default FILE SERVER or PRIMARY LIBRARY in the data file.
UserLoad /db:ntdb sa "" /MustChangePwd:N /file:c:\temp\UserData.txt /
mode:overwrite
/format:"," 1 0 0 0 0 0 0 0 0 0 2 3
The above command line is for a case where only the UserID, default FILE SERVER and
PRIMARY LIBRARY are present in the data file. The password will default to mhdocs.
341
342
Appendix A
Abbreviations
Information to help you understand the log file generated by the WorkSite Server service is
provided in this section. The log file generated by the WorkSite Server service is named
DMSLog.txt and should be located in the installation path for WorkSite Network.
Abbreviations
During normal operation, the log file grows by two lines of text every minute. Table 44 lists the
abbreviations used in these entries during normal operation to report on the status of WorkSite
Server service.
Table 44 Abbreviations used in the DMSLog.txt file
Abbreviation
Meaning
QD
TD
QU
TU
343
Meaning
QS
XQ
US
XT
NOTE
There are two values for QS recorded in each entry in the log file during normal operation. The
FileXfer QS is the number of file uploads or downloads waiting to be performed. The
RpcManager QS is the number of SQL database transactions waiting to be performed. You can
use either of these entries to evaluate the efficiency of your WorkSite Server.
Example 2: User's transaction was aborted, possibly because of call timeout or the user aborted
the request.
Concerns: None, unless repeating continually.
Mon 03/02 15:49:55.015Executer: 100:Info [0244] Transaction aborted by user
344
Example 3: Users pending request(s) were aborted, possibly due to timeout or because user
exited the application
Concerns: None, unless repeating continually.
Mon 03/02 20:29:48.515
at 10.5.3.117
345
Concerns: Part of the normal operation; the server is capable of internally recovering from such
conditions without the user noticing anything
Wed 03/04 20:02:15.718Executer: 587:Error [0638] execStatement - Unable to
execute SQL Command; SQL State: 40001, SQL Error: [Microsoft][ODBC SQL Server
Driver][SQL Server]Your server command (process id 30) was deadlocked with
another process and has been chosen as deadlock victim. Re-run your command
Wed 03/04 20:02:16.062Executer: 591:Error [0638] SQL Command: UPDATE
MHGROUP.DOCMASTER SET DOCINUSE = 'N', LOGNODEADDR = '', INUSEBY = '' WHERE
(DOCNUM = 987) AND (VERSION = 1)
Wed 03/04 20:02:16.156Common: 212:Warn [0638] Transaction rollback: copydocument
Wed 03/04 20:02:16.390DocMgr:4387:Info [0638] Retrying transaction: retry# 1
Example 7: An uploaded file was not used in a transaction and cleaned up by the server
Concerns: Usually none. This can happen for example when a user tries to import a document
with invalid profile. The transaction is rejected by the server and the uploaded file is eventually
removed
Wed 03/04
889063191
Wed 03/04
889063199
Example 9: The database schema is either older or newer than the server.
Concerns: Possibly serious. Upgrade or conversion may be required. Database will not be
usable.
Wed 03/11 17:25:52.890DsRpcManager: 159:Info [0166] Connected to database madrid
Wed 03/11 17:25:53.078DsRpcManager: 220:Error [0166] Database schema for
database madrid is not compatible with this DMS.
Example 10: The connection to the database has become invalid possibly because of a database
shutdown or restart.
Concerns: Possibly serious. The WorkSite Server Service is capable of reconnecting to a
restarted database server.
Wed 03/11 18:36:59.437Executer: 587:Error [0554] execStatement - Unable to
execute SQL Command; SQL State: 08S01, SQL Error: [Microsoft][ODBC SQL Server
Driver][dbnmpntw]Invalid connection.
Wed 03/11 18:36:59.500Executer: 591:Error [0554] SQL Command: SELECT PRJNUM FROM
MHGROUP.PRJNUMDB
Example 11: The connection to the database has become invalid possibly because of a database
shutdown.
346
Example 12: The WorkSite Server Service has reconnected to the database. One entry appears
in the log file for each thread.
Concerns:None (Be happy).
Wed 03/11 18:35:23.890Manager: 98:Info [0554] Reconnected to database paris
Example 13: The connection to the database has become invalid possibly because of a database
shutdown.
Concerns: Serious. Restart the database server.
Wed 03/11 18:35:25.125Manager: 69:Error [0220] Could not locate connection
handle for paris
347
348
Appendix B
Database Schema
Overview
This chapter lists the database tables and their functions. This list is subject to change in future
releases. For related information, see the COM Object for WorkSite Database Administration
Developer's Guide.
Table 45 Database Table Functions
Table Name
Function
APPS
ARCHIVETBL
ARCHIVENUMDB
ARSET_INFO
CACHE_UPDATE
CAPTIONS
CHECKOUT
CUSTOM1
CUSTOM10
CUSTOM11
CUSTOM12
CUSTOM2
CUSTOM29
CUSTOM3
349
350
Table Name
Function
CUSTOM30
CUSTOM31
CUSTOM4
CUSTOM5
CUSTOM6
CUSTOM7
CUSTOM8
CUSTOM9
DEINDEX_DOCS
DOC_ACCESS
Permissions to documents
DOC_DENIAL
DOC_INDEX
DOC_KEYWORDS
DOC_NVPS
DOCARTIFACT
DOCCACHE
DOCCLASSES
DOCHISTORY
DOCMASTER
DOCNUMDB
DOCSERVERS
DOCSUBCLASSES
DOCTYPES
DOCUSERS
List of users
DSECURITY
EMAIL_ATTRS
FORM_CONTROLS
FORM_TEMPLATE
Overview
Function
FORM_TYPES
FORMS
GROUPMEMS
GROUPS
Group information
INDEX_COLLECTION
KEYWORDS
LIBRARIES
List of databases
MHINFO
Not used
MHPERMS
MHPROFILES
NODELOC
List of PC locations
PALETTE
PRJNUMDB
PROJ_ACCESS
Folder access
PROJ_DENIAL
PROJARTIFACT
PROJECT_ITEMS
PROJECT_NVPS
PROJECTS
Folders
QUICK_RETRIEVE
RE_RECIPIENT
RE_RULE_EVENT
REEVENTDEF
Rules Engine - Definitions of different events, such as new version, edit profile, and other actions that trigger rule
execution
351
Function
REEVENTLOG
RELATED_DOCS
Related documents
RERULEHANDLERS
RERULES
RERULESNUMDB
RESTORETBL
ROLE_NVPS
ROLE_PROFILES
ROLES
List of Roles
SEARCH_PROFILES
List of SIDs
SRCH_PROF_ACCESS
SRCH_PROF_DENIAL
STOPWORDS
SYNC_ITEMS
SYNC_LOCATIONS
SYNC_PREFERENCES
SYSTEM_SYNC_PREFS Lists default value at the database level for optional saved
search to filter out documents
TEMPLATE_CONTROL Default template of the controls used on the various dialogs
S
352
TYPEMAP
USER_PREFERENCES
Overview
Function
USER_SYNC_PREFS
USERACTIONS
USERHISTORY
USERNUMDB
USERROLES
Version information
WEB_PAGE_ACCESS
353
354
Appendix C
OCR-TIFF Replacement
Version Editing
Immutable E-mail
WorkList Filtering
Pessimistic Security
355
This setting is only for use with the Verity-based WorkSite Indexer 8.2. It is ignored when
WorkSite Server is configured to connect to Indexer 8.3.
In the following location in the registry:
HKEY_LOCAL_MACHINE\SOFTWARE\Interwoven\WorkSite\imDmsSvc
356
Y (default) The description search criteria is passed to the Index Search service. Both
the description and full-text criteria are used to query the Verity full-text index
collection. This configuration can help avoid the Verity bucket issue by performing a
zoned search on the description, however it can result in poor search performance if
leading wildcards are used in the description field.
N The description search criteria is not passed to the Index Search service. Only the
full-text criteria is sent to the Index Search service. The full-text results are returned to
the WorkSite Server which then queries the WorkSite database for the description
criteria. In this configuration users may receive an error message indicating the search is
too broad if the full-text criteria hits the Verity bucket, regardless of the description
criteria provided.
OCR-TIFF Replacement
OCR-TIFF Replacement
The WorkSite Server supports the ability to substitute OCR documents with their corresponding
related TIFF documents when returning the results of a full-text search. The feature can be
enabled on a per database basis using the following registry setting.
In the following key in the registry on the WorkSite Server:
HKEY_LOCAL_MACHINE\Software\Interwoven\WorkSite\
imDmsSvc\Databases\[ODBC DSN]\
357
DeskSite and FileSite. The Look For field in the Search dialog box of DeskSite and
FileSite indicate the use of Full-text search. You can sort results within the document
grid. For more information on sorting in DeskSite, see DeskSite Installation and User's
Guide.
Express Search and WorkSite Miner. You must enter the word that you are searching
for in the search field. The search results displayed are sorted based on the order of
relevancy determined by the Indexer. WorkSite Miner offers the user the ability to sort
by relevance or by a particular column displayed in the grid.
2. Email Properties (to / from). If you are searching based on the Custom 13 (To), Custom 14
(From) ),Custom15 (Cc), or Custom16 (Bcc), the Indexer returns a list of search results
sorted in order of relevancy, which the WorkSite Server retrieves and displays to the
WorkSite clients. Further levels of sorting can be achieved through the client interface.
Sorting in the client involves sorting on the search results provided by the WorkSite Server
and Indexer.
358
DeskSite and FileSite. A search performed using only an Email field in the Search
Dialog in DeskSite or FileSite is an exception to the Indexer search.
Express Search and WorkSite Miner. A search from WorkSite Miner or Express
Search always performs a full-text search.
In WorkSite Miner the only exception is when you search using the keywords
Show-checkout and Show-Worklist. Further sorting is possible in the client using the grid
columns. WorkSite Miner sorts on the displayed search results, not on the entire set of
results.
If you have set a limit on the number of search results to be viewed only that many
search results will appear in the grid. You can retrieve and view all the search results
when you click See all Results. This results in a new search request from the server. The
Indexer returns a complete list of all the search results sorted in order of relevancy. This
new search result can be further sorted using the client.
3. Description Searches (including the subject of e-mails). The Indexer returns a list of search
results sorted in order of relevancy, which the WorkSite Server retrieves and displays to the
WorkSite clients. Description search is similar to full-text searches where search results are
also sorted based on relevancy by the WorkSite Indexer relevancy as description / subject
searches are full text searches. Further levels of sorting can be achieved through the client
interface. Sorting in the client involves sorting on the search results provided by the
WorkSite Server and Indexer.
NOTE
Sorting on the WorkSite client (Desksite, FileSite, Express Search, and WorkSite Miner)
operates only on the local result set provided by the server. For example, if the Server returned
500 results out of 1000, the client will sort on the 500, and will not request new results from the
Server unless a new search is performed.
4. Metadata only. WorkSite Server supports the ability to deliver document search results
sorted by edit date and sorted metadata selection values. This feature is only supported for
Microsoft SQL Server databases. The feature may be enabled or disabled on a per table
basis.
To enable or configure this feature:
In the registry on every WorkSite Server machine:
HKEY_LOCAL_MACHINE\Software\Interwoven\WorkSite\imDmsSvc\Databases\
[ODBC Data Source Name]\
The value to specify for "Sort Order Mask" depends on which tables you want to have sorted
by the server. To determine what value to specify as the DWORD value, add together the
values below for all tables for which you want to enable sorting. This is the value to specify
in the registry setting.
359
NOTE
For example, to enable server-side sorting of APPS and DOCMASTER values, you would
specify a value of 3 (1 +2).
To enable server-side sorting for all tables, specify the value: 0x00FFFFFF.
To disable all server-side sorting, specify 0 (zero).
5. Any combination of 1, 2, or 3 with 4. The server sorts by relevancy in the WorkSite Indexer
(same as full text).
360
Set this value to 1 (one) to restrict alias sizes to 16 characters. If you want to remove this
restriction, set this value to 0 (zero). If this key does not exist, then the Database Administration
program restricts alias sizes to 16 characters.
Version Editing
WorkSite Server 8.2 supports the ability to make older versions of documents read-only. When
this option is enabled, users will be able to edit or modify the latest versions of documents, but
361
all previous versions will be read-only, including the profile and security. (Administrative users
are not subject to this restriction.) This feature may be enabled on a per database basis.
NOTES
When the Version Editing feature is enabled, users who are working with an older WorkSite
client may receive error messages if they attempt to modify an older version of a WorkSite
document. Only the latest WorkSite client products are aware of the Version Editing feature
and capable of adapting to it. The following WorkSite client products are aware of the
Version Editing feature: WorkSite DeskSite 6.5 or later, WorkSite FileSite 4.0 or later, and
WorkSite Web 4.3 or later.
This feature should not be confused with the "Auto-Versioning" feature, which is available
in the WorkSite client products. The Version Editing feature described here is independent
of the client "Auto-Versioning" feature. Refer to the WorkSite Desktop Client Customization
Guide for more information about the "Auto-Versioning" feature.
362
Immutable E-mail
By default, e-mail messages saved to WorkSite can be checked-out and edited in the same way
as any other document. To prevent e-mail messages from being modified, you can configure
e-mail to be read-only and declared as a record (that is, immutably read-only) by default by
adding two registry key (one that defines what constitutes an e-mail by type and another that
enables read only e-mail filing).
To define e-mail messages by type:
In the following key in the registry on the WorkSite Server:
HKEY_LOCAL_MACHINE/Software/Interwoven/WorkSite/imDmsSvc/
363
NOTE
This registry key also defines what types are searched when searching for only e-mail in the
search dialog.
To declare e-mail messages as records:
Set the following STRING values:
Name: Import Emails As Declared
Default Value: N (By default this option is not enabled.)
NOTE
WorkList Filtering
By default, e-mail messages saved to WorkSite are added to users' worklists like any other
document. However, WorkSite Server 8.2 supports the ability to select whether e-mail messages
saved to WorkSite should be added to users' worklists.
To prevent e-mail messages from appearing on users' worklists:
In the following key in the registry on the WorkSite Server:
HKEY_LOCAL_MACHINE\Software\Interwoven\WorkSite\imDmsSvc
NOTE
Pessimistic Security
By default, the WorkSite Server resolves conflicts between access grants when determining a
user's effective access to any secured content using an optimistic security model. This means
364
that if a user, Todd, is a member of a group, Managers, and a document is shared to Managers
with ReadWrite access, and the document is also explicitly shared to Todd with Read-Only
access, then Todd will get ReadWrite access. When optimistic security logic is used, the greatest
of the several conflicting access grants is used. Conflicts between access grants can be conflicts
between user and group assignments or between multiple group assignments, where the user is a
member of multiple groups granted access to the secured content.
WorkSite Server 8.2 can be configured to resolve conflicts between access grants using
pessimistic security, rather than optimistic security. When the WorkSite Server is configured to
use a pessimistic security model to resolve conflicts between access grants, the lowest of the
several conflicting access grants that apply to the user is used. In the above example, if
pessimistic security were enabled, Todd would get Read-Only access to the secured content.
To configure optimistic or pessimistic security:
In the following key in the registry on the WorkSite Server:
HKEY_LOCAL_MACHINE\Software\Interwoven\WorkSite\imDmsSvc
This setting determines how document relations are created, not how existing document
relations are handled.
To configure one-way or two-way document relations:
In the following key in the registry on the WorkSite Server:
HKEY_LOCAL_MACHINE\Software\Interwoven\WorkSite\imDmsSvc
365
366
NOTE
If you are not using the default, you must also set these options on each client machine. See the
WorkSite Desktop Client Customization Guide for details.
367
Version Requirements
Kerberos authentication on trusted login is supported for the following software versions and
configurations:
FileSite, DeskSite, OffSite, and any custom application based on WorkSite SDK must be
version 8.2 SP1.
When the local system account is used to start the WorkSite Server service, the File Server
Setup Properties must be configured with a user account that can access the document file share.
1. In the WorkSite Service Manager, select the WorkSite Server service. Open the Startup
Properties dialog.
2. Select Local system account.
3. Start the WorkSite Server service. Confirm that the DmsLog.txt file does not contain any
errors, such as DsServerRegisterSpn failed; error = 0x54b.
368
Using a Domain User Account on Windows 2000 Server Domain on page 369
Using a Domain User Account on a Windows Server 2003 Domain on page 370
The previous step may require the use of ADSI Edit available in the Windows Resource Kit
and Support Tools.
9. Create the required SPNs by running the following commands against a Local Domain
Controller:
setspn.exe -a imDmsSvc/WorkSiteServerName WorkSiteServiceAccount
369
where
imDmsSvc is the WorkSite Server service name (Service Type/Service Class).
WorkSiteServiceAccount is the account used to start the WorkSite Server service.
WorkSiteServerName is the WorkSite Server name.
WorkSiteServerFQDN is the WorkSite Server fully qualified domain name.
Example:
setspn.exe -a imDmsSvc/iwovdms Interwoven\wsadmin
setspn.exe -a imDmsSvc/iwovdms.Interwoven.com Interwoven\wsadmin
10. Start the WorkSite Server service. Confirm that the DmsLog.txt file does not contain any
errors, such as DsServerRegisterSpn failed; error = 0x54b.
The previous step may require the use of ADSI Edit available in the Windows Resource Kit
and Support Tools.
7. Create the required SPNs by running the following commands against a Local Domain
Controller:
setspn.exe -a imDmsSvc/WorkSiteServerName WorkSiteServiceAccount
370
where
imDmsSvc is the WorkSite Server service name (Service Type/Service Class).
WorkSiteServiceAccount is the account used to start the WorkSite Server service.
WorkSiteServerName is the WorkSite Server name.
WorkSiteServerFQDN is the WorkSite Server fully qualified domain name.
Example:
setspn.exe -a imDmsSvc/iwovdms Interwoven\wsadmin
setspn.exe -a imDmsSvc/iwovdms.Interwoven.com Interwoven\wsadmin
8. From the Active Directory Console, select the Worksite Service Account, and open the
Properties dialog.
9. On the Delegation tab, select the options Trust this user for delegation to specified services
only, and Use Kerberos only.
NOTE
In Microsoft Windows 2003, the Delegation tab is visible only when the Microsoft Windows
Domain is at Windows 2003 level.
10. Complete the following steps to add the WorkSite Server Service:
a. On the Delegation tab, click the Add button. The Add Services dialog box appears. The
available services list is initially empty. The following steps describe how to add
services.
b. On the Add Services dialog box, click the User or Computers button to add services.
c. On Active Directory Object Picker box, type the name of the WorkSite Service
Account. Click the Check Names button, and then click OK.
d. On the Add Services dialog box, select the WorkSite Server Service for the appropriate
WorkSite Server(s), and click OK.
11. Start the WorkSite Server service. Confirm that the DmsLog.txt file does not contain any
errors, such as DsServerRegisterSpn failed; error = 0x54b.
371
key enabled, clients prior to 8.2 SP1 are unable to connect to the WorkSite Server using trusted
login. These older clients can connect to the server using explicit login.
NOTE
Configuration of a client-side registry key is required when the WorkSite Server uses Kerberos
authentication. On the 8.2 SP1 clients, the registry key called Authentication Method must be
set to Kerberos. When this key is set to the alternative mode called Classic, the 8.2 SP1 clients
will be prevented from connecting to a WorkSite Server configured only for Kerberos
authentication. See the WorkSite Desktop Client Customization Guide, or the DeskSite, FileSite,
and OffSite Release Notes 8.2 Service Pack 1 for information about the Authentication Method
registry key.
In the following location on the WorkSite Server machine:
[HKEY_LOCAL_MACHINE\SOFTWARE\Interwoven\WorkSite\imDmsSvc]
On the WorkSite Server Properties dialog, you must also select Accept Trusted Authentication.
372
To enable support for unknown file types, you must store information in the following keys in
the registry on the server machine.
CAUTION
Autonomy is not responsible for loss of data due to improper use of the Registry Editor or failure
to backup the registry.
373
This key is only effective if the Retain extension for ANSI types key is set. This option applies
to all non-E-mail document types.
When this option is enabled, the application extension is preserved for all unknown file types
that are not e-mail. When a user imports a file with an extension which WorkSite Server does
not have listed in its document type table, a new document type is created for this file type.
During Open, Export, or Checkout of this document, the original extension is preserved. For
example, importing an Excel file named filename.xyz will set the type to Excel and the file
extension to xyz, and the file will open in the custom application.
When this setting is enabled, WorkSite will automatically create a new document type for any
unknown files and assign a doc type alias based on the file extension and a unique identifier (for
example XYZ4001). As a best practice, you should populate the document type and application
setup tables (using DBAdmin) manually for any custom applications in your organization. This
enables you to specify the properties for each document type that best suits your organizations
needs, as opposed to having WorkSite automatically assign the alias and other properties.
In the following location in the registry on the server:
[HKEY_LOCAL_MACHINE\SOFTWARE\Interwoven\WorkSite\imDmsSvc]
374
Retain Non-E-mail
Key
ANSI Types
Other (non-E-mail)
Types
Off
Off
No
No
Off
Off
No
No
On
On
Yes
Yes
On
Off
Yes
No
As indicated by the highlighted row, when both registry keys are enabled the extension will be
saved for all non-E-mail document types.
There isnt any non-security related feature preventing a user from creating a folder under a
workspace, AND
375
376
There are no limiting ACLs for the user granting him less that read / write access, AND
Index
A
Active Users 216
Adding
Database Users 67
Adding LDAP Users 75
App Setup 125
Application Integration
App Setup table 125
Archived Documents
Restoring 248
Archiving
Documents 240
Autodetect document types 166
C
Class 139
Client/Matter 151
clload.exe 333
Cluster Manager 279
How it works 279
Cluster Manager Startup dialog 282
Command Line Loading Utility 333
Configuring the WorkSite Server with Caching 321, 332
Custom classes 147
Custom Fields 173
Custom Table Loading Utility 333
Custom3 through Custom12 tables 148
D
Database Administration Program 45
Adding Users 67
377
Index
Archiving 240
Deleting 227
Expired 242
Marking for archiving 242
Moving Between Databases 229
Reassigning by author/operator 239
Releasing (Unlocking) 227
Restoring (from archive) 248
Searching for 222
Dynamic profile information 168
E
errata 22
Error messages
in the Database Administration Program 63
Exclude and Include Lists 174
Expired Documents 242
Extensions
Specifying in profile fields 170
Log Files
WorkSite Server Service 343
Lookup Bar 62
Lookup Entries, Maximum 63
M
Marking Documents for Archiving 242
Maximum Lookup Entries 63
Migrating Documents
Between Databases 229
Migration Tool
Database 329
Moving Documents
Between Databases 229
N
NIC numbers 144
NRTADMIN Group 85
Filenames
Specifying in profile fields 170
Find
Searching in Database Administration Program 61
G
Groups 84
Adding to database 85
I
Import Profile Template
Creating 163
Loading 176
Include and Exclude Lists 174
L
LDAP Search Filter 80
LDAP Users
Adding 75
378
P
PC Locations 144
Practice/Subpractice 151
Preferred Database Migration
Performing 332
Preferred Database Migration Tool
How it works 330
Preferred Databases 100
Primary Applications 130
Profile field commands 168
Profiles
Combining commands 169
Default command 171
Filenames and extensions 170
Subdirectories 171
R
Reassigning documents
By author/operator 239
Registering Databases
Database Administration Program 51
Releasing (Unlocking)
Documents 227
Relocating Documents
Between Databases 229
Rename Function 121
Restoring archived documents 248
Roles 110
Default role 110
Membership 115
Rules Engine Server
Setup 258
Wildcard characters
in Monitor program 221
WorkSite Advanced Server
configuring 325
WorkSite Dialog Editor 181
WorkSite Monitor Desktop 208
WorkSite Server
Displaying active users 216
WorkSite Server Service
Configuring Connections to File Servers 41
WorkSite Service Manager
Finding Servers 31
Unregistering Servers 32
Search Results
in Monitor program 214
Searching
for busy or checked out documents 222
Searching for Documents
in Monitor program 222
Searching in the database tables 62
Server Workspace window 210
Set Max Lookup Entries 63
Subclass 139
Subclassifications 147
Viewing tables of 158
Subdirectories
Specifying in profile fields 171
Synchronizing
Database users 83
Understanding
Information Tables 49
Unlocking (Releasing)
Documents 227
User Table
Database users 65
User Table Loading Utility 338
V
Viewing the User History 57
T
Table Loading Utility 333
Toolbar
Activitating/Deactivating
Database Administration Program 49
Database Administration Program 49
Trusted Logon 36
379
Index
380