Open Text® Document
Management, eDOCS Edition™
eDOCS DM Administration Guide
eDOCS DM 5.3
Open Text Document Management, eDOCS Edition
DM Administration Guide
Rev.: November 2010
This documentation has been created for software version 5.3.
It is also valid for subsequent software versions as long as no new document version is shipped with the product or is
published at: https://knowledge.opentext.com.
Open Text Corporation
275 Frank Tompa Drive, Waterloo, Ontario, Canada, N2L 0A1
Tel: +1-519-888-7111
Toll Free Canada/USA: 1-800-499-6544 International: +800-4996-5440
Fax: +1-519-888-0677
E-mail: support@opentext.com
FTP: ftp://ftp.opentext.com
For more information, visit: http://www.opentext.com
Copyright © by Open Text Corporation, Open Text Inc.
Open Text Corporation is the owner of the trademarks Open Text, The Content Experts, Open Text ECM Suite, Open Text
eDOCS, eDOCS, Open Text FirstClass, FirstClass, Open Text Exceed, Open Text HostExplorer, Open Text Exceed
OnDemand, Open Text Exceed 3D, Open Text Exceed Freedom, Open Text Exceed PowerSuite, Open Text Exceed XDK,
Open Text NFS Solo, Open Text NFS Client, Open Text NFS Server, Open Text NFS Gateway, Open Text Everywhere, Open
Text Real Time, Open Text Eloquent Media Server, Open Text Integrated Document Management, Open Text IDM, Open
Text DocuLink, Livelink, Livelink ECM, Artesia, RedDot, RightFax, RKYV, DOMEA, Alchemy, Vignette, Vizible, Nstein,
LegalKEY, Picdar, Hummingbird, IXOS, Alis Gist-in-Time, Eurocortex, Gauss, Captaris, Spicer, Genio, Vista Plus,
Burntsand, New Generation Consulting, Momentum Systems, DOKuStar, and RecoStar among others. This list is not
exhaustive.
All other products or company names are used for identification purposes only, and are trademarks of their respective
owners. All rights reserved.
Contents
Part 1
DM Server Administration
Chapter 1: Setting DM Server Properties
3
About the DM Server Manager 4
Starting Server Manager 5
Server State Tab 6
Preferences Tab 7
Log Settings 8
Location of the PCDOCS.INI File 11
Location of Forms Used by DM Client Applications 11
Enterprise Webtop URL 12
WorkFlow Server Notifications 12
Event Notification Level 12
Network Logon Settings 13
Transaction Monitoring 13
Compression of Retrieved Documents 14
Use UTF8 Format Full Text Searches 14
Libraries Tab 15
The Default Library 16
Full-Text Index for Library Users 17
The SQL-Connection Cache Size 18
Specifying Libraries in the PCDOCS.INI File 19
SearchServer Indexes Tab 20
Adding an Index 21
Starting an Index 22
Deleting an Index 23
iii
Modifying the Properties of an Index 24
Location & Sharing Tab 24
Index Properties Tab 25
Log File Tab 30
Index Defaults 31
Reindexing Documents 31
Manually Compressing an Index 32
Document Previews Tab 33
Startup Type 34
Log File Tab 35
Internal User Tab 36
FOLB Settings Tab 37
Defining a Cluster of DM Servers 39
Selecting FOLB Client Parameters 40
Network Bindings Configuration 43
NetWare Servers Tab 46
Results Tab 47
Maximum Size of Results Sets 48
Amount of Virtual Memory for Caching Results 48
Time-Out Interval 48
Cleanup Frequency 49
Recent Edit Limit 49
Caches Tab 50
HCS Server Tab 52
Content Cache Tab 54
Content Cache Lazy Write Feature 56
Chapter 2: Using the DM Indexer
About Full-Text Indexing 60
Content Searches by Users 60
The Indexing Process 60
iv
59
What Is Indexed? 61
The Search Process 62
System Requirements for Indexing 63
The Indexer Server 63
Hardware and Software 65
The Internal User for Indexing Activities 65
Creating an Index and Putting it into Production 66
Identifying the Index Location 66
Creating a New Index 67
Starting an Index 75
Select Indexes for Searching 75
Multiple Indexes for a Single Library 76
Monitoring and Managing an Index 77
Index States 77
Compressing an Index 77
Reindexing an Index 78
Administering an Index from a Different DM Server 79
Pausing the Indexer for System Backups 79
Backing Up an Index 80
Restoring an Index from a Backup 80
Monitoring Indexer Activities 80
Deleting an Index 81
Using Wildcards in Searches 81
Using Stopwords to Speed Searching 82
Configuration Options for Full-Text Indexing 83
DM Server Manager 83
Hybrid Searches 84
Technical Notes 86
Changes Made By the Hybrid Search Enhancement 86
Indexed Metadata 86
Storing Foreign Keys 88
Effect on Search Strings 88
v
Troubleshooting Index Problems 88
Viewing the Index Log File 88
Disabled Search-Term Highlighting 89
Users Unable to Search 89
Problems with Shared Indexes 89
FulCreate Is Not a Writable Directory 90
No Such File or Directory 90
Unable to Save Index 90
Document File Formats Recognized by the Indexer 90
Chapter 3: Document Access and Security
91
An Overview of DM Security 92
ACL Security 93
Primary Group Permissions 94
SQL Database Security 94
The Common Logon Account 94
SQL Administrator Accounts 94
Document Server Security 96
No NOS-Level Security 96
NOS-Level Security 97
Setting Up Security 98
Setting Up Users 98
Setting Up Generic Document Servers with Security 99
Setting Up Document Servers with NOS-Level Security 100
Setting Up the Client Software 103
Setting Up Client Users in a NetWare-Only Environment 103
Logging On and Accessing Document Servers 104
Information Required for Logons 104
Use of the Network Name in Logons 106
What Users See When They Log On 107
Authentication Service Support 108
vi
Accessing a Document Server 108
Support for Integrated Windows Authentication 109
Configuring Integrated Windows Authentication 109
Using Mixed and Windows Authentication for SQL Server Authentication 112
Changing Database Access from Trusted Connection 113
Chapter 4: Failover and Load Balancing on Multiple DM Servers 117
About Failover and Load Balancing 118
Failover 118
Load Balancing 118
System Requirements for Failover and Load Balancing 119
Setting Up a Server List 120
If the Propagation Fails 122
Setting Up Failover Only 123
Selecting Options for Failover and Load Balancing 124
Polling Options 125
Chapter 5: Generating Previews of Stored Documents
127
About Document Previews 128
How Previews Are Displayed 128
Word Processing Formats 128
Presentation and Chart Formats 128
Spreadsheet Formats 128
Pixel-Type Graphics Formats 128
How Previews Are Generated 128
Part 2
Library and DM Web Server Administration
vii
Chapter 6: Library Parameter Settings
133
Setting System Parameters 134
Setting Default Permissions 135
Setting System Features 137
Setting System Default Values 138
Setting System Permissions 142
Allowing Access to DM Utilities 142
Specifying Version Control Options 144
Setting Attache Options 146
Setting System Preferences 149
Working with Document Servers 150
Editing Document Server Settings 150
Working with Remote Libraries 153
Editing Remote Library Settings 153
Changing System Terminology 155
Using the Term Maintenance Page 155
Chapter 7: User and Group Settings
Listing Current Users 158
Adding User Accounts to DM 159
Maintaining User Listings 159
Configuring Network Aliases 160
Setting Group Access for Users 161
Managing Groups 162
Listing Current Groups 162
Adding or Maintaining Group Listings 163
Setting Group Features 164
Setting Group Permissions 167
Adding Group Access to Utilities 168
Configuring Group Version Control 170
viii
157
Adding Members to Groups 172
Setting Default Forms for Groups 173
Group Master Form 174
Form Default Values 175
Group Paper Form 175
Group Primary Form 175
Group Profile Search Form 175
Group Quick Retrieve Form 176
Group Applications Forms 176
Setting Up Group Aliases 177
Attache for Groups 177
Cleanup Options 179
Setting Group Preferences 179
User Synchronization 180
Group Synchronization 182
Chapter 8: Validation Tables
185
Setting Up Applications 186
Maintaining Applications 187
Selecting Launch Methods 191
Setting Up Launch Methods 192
Configuring DDE Settings 195
Setting Compatible Applications 196
Working with File Types 197
Modifying or Adding File Types 197
Using Multiple File Extensions 198
Supported File Extensions 198
Adding File Extensions 202
Editing File Extensions 204
Deleting File Extensions 204
Disabling/Enabling File Extensions 204
ix
Document Types 205
New Document Type 206
Other Tables 209
Custom Table Maintenance 209
Dynamic Views 209
Creating a Dynamic View 210
Using Security 214
Using Custom Dynamic Views Security 216
Using Node Icons 219
Creating Dynamic View Languages 219
Creating a View Level 221
Adding a View Level Language 226
Adding a Level Search Item to a View Level 227
Adding an Enumeration 229
Setting the Base for Template Folders 232
Configuring Level Searches 234
Assigning Level Search Languages 236
Using Matter-Centric Security in Dynamic Views 239
Chapter 9: Indexes and Profiles
245
Attachments to Index 246
Using the Attachment to Index Maintenance Page 247
Keywords 247
Using the Keyword Maintenance Page 248
Custom Profile Defaults 248
Custom Profile Default Maintenance 249
Chapter 10: DM Webtop Maintenance
DM API Configuration 251
DM Webtop Parameters 253
x
251
Timeout 254
On Document Select 254
Guest Logon 255
Language 255
Logon 256
Webtop Tree 257
User Format 257
Group Format 257
Custom Parameters 259
Custom Parameter Definition 259
Part 3
Application Integration
Chapter 11: Configuring Application Integration
263
Integration Methods 264
Application Integration Components 265
Other Integrated Applications 267
Applications Using DDE Settings 268
DDE Settings for Microsoft Applications 268
Microsoft Visio DDE Settings 272
Application Integration for Corel Applications 272
DDE Settings for Lotus Applications 275
DDE Settings for Other Applications 277
Setting up BI Query Reports 278
Setting Up Application Integration 279
Active Integration 279
Passive Integration 279
Check-in/Check-out 279
Interceptor 279
The Interceptor Module 280
xi
Launching Interceptor 280
Configuring New Applications for Interceptor 280
Enabling Applications Within Interceptor 282
Disabling Integration with Interceptor 283
Editing the Interceptor Launch Method Settings 283
Exporting Interceptor Settings 285
Importing a Registry File 286
Restricting Access to Interceptor Settings and Native Dialog Boxes 287
DM Macros for Microsoft Word and Corel WordPerfect 288
The WordPerfect Footer Macro 288
Mail Client Requirements 290
E-mail Integration Options 290
Modifying the Profile Forms 292
Chapter 12: The DM Client Deployment Utility
Starting the Client Deployment Utility 296
DM Client Deployment Utility Node 297
Exporting the Registry File 297
Importing a Registry File 297
Configuration Settings 298
Plug-ins Node 298
Document Management Plug-in Node 298
Forms Node 308
Event Handlers Node 310
Integration Schemes Node 311
E-mail Integration Node 311
General Tab 312
Header Fields Tab 313
Dialogs Tab 314
Profile on Send Tab 316
Logging Options Node 316
xii
295
Acrobat Plug-in 317
Attaché Plug-in 317
Attaché Plug-in API 318
Core 318
DM Outlook Addin 318
Document Management Plug-in 318
Document Management Plug-in API 319
Download File Manager 319
Extended Log 319
eDOCS DM Desktop 319
eDOCS DM Linking 320
Interceptor 320
Interceptor Core 320
ODMA Document Management System 320
ODMA Manager 320
Viewer Add-on 320
Windows Explorer DM Extension 321
User Interface 321
Add-ons Node 321
Tabs Node 322
Tree Nodes Configuration 323
Chapter 13: Setup Information for DM Extension for Lotus Notes 325
Supported Versions 326
Prerequisites for Database Setup 326
Installing DM Extension for Lotus Notes 326
Configuring Launch Methods for Lotus Notes 327
Using DM Webtop to Configure Lotus Notes Launch Methods 328
Using Library Maintenance to Configure Lotus Notes Launch
Methods 328
Associating Profile Forms with Lotus Notes Application IDs 329
xiii
Configuration Options and Settings 330
Configuring the HLE_Template.ntf File
331
Administrative
Settings 331
Cache Settings 333
Data Source Related LNE E-mail File
Settings 334
Data Source Related LND Document File
Settings 336
Data Source Related LNE Related
Mapping Settings 339
Data Source Related LND Related
Mapping Settings 340
Setting up Drag-and-Drop Functionality
341
Installing the Root Node Image 342
Setting up the Advanced Interface on Integrated Databases 343
Designating the Home Page in Lotus
Notes 345
Configuration Notes for Indexing Attachments in Lotus Notes E-mails 345
Troubleshooting DM Integration with Lotus
Notes 345
Removing Lotus Notes Integration 346
DM-Lotus Integration Maintenance for a
Specific Data Source 347
Manually Removing DM Extension for
Lotus Notes Integration 348
Setting Up Logging 351
Part 4
Appendices
Appendix A: Configuration Settings 355
Bypassing Multi-Level Circular Reference
Checks 356
Caching to an XML File for Troubleshooting
Purposes 356
Registry Setting 356
Excluding or Including Items 357
Viewing the Output File Layout 359
Interpreting Output Values 359
Troubleshooting 361
Configuring Dynamic Views to Expand AdHoc Folders Containing Other Folders 361
Configuring Dynamic Views to Limit Sub
Nodes Under Subscription Level 362
Configuring the File and Send E-mail Save
Option 363
Configuring Modified Paper Profiles to Appear in Recently Edited Documents
List 364
Configuring the Recently Used Items List to
Hide Disabled Validation Items 365
Configuring the Remember Last Location
366
Configuring Whether Prompt to Profile Appears When Saving an E-mail Attachment 366
Configuring Which Items Appear in the Recently Edited Documents (RED) List
367
Controlling the Display of Lookup Data 368
NotLoadOnStartup Setting 369
xv
StartInRecent Setting 370
Setting Individual Lookups 370
Converting Links to External Native Files
371
Determining Which Library to Save to When
Using Drag and Drop 372
Disabling the Unmanaged Document Notification 372
Document Recovery Dialog Box Options
373
Enabling Continuous Logging for COM Automation 374
Enabling or Disabling Auto Update Component 375
Enabling Logging for Microsoft Outlook Email Integration 376
Ensuring Application Integration Works
When You Do Not Install All Microsoft Office 2007 Applications 377
Ensuring the Microsoft Word, Excel, and
Project Status Bars Are Populated
378
Excluding the DOCS_USERS Group from
Quick Search Queries 379
Forcing User Interface within DM Application Integration to Execute on Separate Thread 379
Improving Performance When Accessing
Documents Added to a Folder from
Remote Library 380
Improving Performance in Microsoft Excel
When DM Linking Is Installed 381
Inserting URLs and Attachments in E-mail
Messages 381
Microsoft Office Registry Key Settings 382
General Options 382
Microsoft Office Menu Options 384
xvi
Microsoft Word Footer Options 390
Microsoft Excel Footer Options 395
Microsoft PowerPoint Footer Options
400
Log File Options 401
Modifying the Attaché Menu 403
Preventing Content Searches in Easy Searches
404
Preventing Non-English Characters from Being Replaced when Using Document
Import Utility 404
Renaming Documents E-mailed as Attachments 405
Renaming E-mail Attachments in GroupWise 407
Renaming Workspace and Public Folder
Nodes in the Explorer View 408
Requirement for Users to Select Destination
Folder When Using Profile on Send
Feature 408
Saving Full E-mail Addresses in Outlook Integration 409
Setting Folder Display Names in Workspaces
409
Setting the Default View in Recently Edited
Documents 410
Disabling DM Server RED List Using
Client Deployment Utility 411
Disabling DM Server RED List Using
Registry Editor 411
Sorting the Library List Alphabetically 412
Specifying the Location of DM Server DMP
Files 412
Supporting the Microsoft Excel Indirect
Function 413
Supporting OTDS Authentication 414
xvii
Tracking Open DM Documents When a
Windows Session Terminates 414
Using Front-End Profiling in Mixed Microsoft Word 2003/2007 Environments 415
Using the dmviews.dat File to Configure
Views for Multiple Users 416
Using the IgnoreProcess Registry Key for Applications Using Interceptor 417
Using the SaveSeparately Registry Key to Select or Clear the Save Separately
Check Box 418
Viewing TIFF Images in Viewer Add-ons
Pane 418
Warning Message Indicates Document Profile Form Is Already in Use 419
Windows Communication Foundation
(WCF) Tuning 419
MaxArrayLength 420
MaxReceived
MessageSize 420
InactivityTimeoutMinutes 420
MaxConcurrent
Sessions 421
Appendix B: Performance Monitor Settings 423
Counters for DM Server 424
Counters for DM Server Libraries 425
Adding Counters in Performance Monitor
426
Windows Server/Advanced Server
Instructions 426
xviii
Appendix C: Other Server Admin Tools 429
Activity Log Purge
430
Purging the Activity Log 430
Restoring Purged Records 431
Add an External Library 431
E-Mail Attachment Update 432
Prerequisites 432
Running the Utility 433
Appendix D: Security Regeneration 435
About Security Regeneration 436
Performing Security Regeneration 436
Appendix E: Multilingual Support for DM Webtop Users and Indexed Documents 439
About Multilingual Support for DM Webtop
Users 440
Installing for Multilingual Support 442
Special Considerations for French
Installations 443
Multilingual Indexing and Searching 443
Indexing 444
Searching 444
Creating a Multilingual Index 445
Full-Text Search Operators in All Language
Versions 445
Appendix F: Configuring DM Extensions Per-User
xix
Based 447
DM Extensions Per-User Configuration 448
Per-User DM Extensions Installation
Configuration 448
Configuring DM Icons to Appear 449
Configuring Per-User Based ODMA Active
Integration 449
Additional Setup Configuration for
Microsoft Excel 450
Additional Setup Configuration for
Microsoft Project 451
Configuring Per-User Based ODMA Passive
Integration 452
Microsoft Word 452
Microsoft Excel 452
Microsoft Project 452
Configuring Per-User Based COM Automation Active and Passive Integration
453
Microsoft Word 453
Microsoft Excel 453
Configuring Per-User DM Linking 454
Configuring Per-User Document Viewer
Control 455
Per-User Configuration of the eDOCS DM
Search Feature 457
Per-User Configuration of Interceptor 457
Setting Outlook E-Mail Integration and DM
Extension for Microsoft Outlook on
Per-User Basis 458
Appendix G: Configuring the Save User Interface 461
Collapsible Navigation Pane 463
xx
All Locations Button 464
Search Button 464
Navigation Pane Configuration Options
465
Location Selection Panel 466
Parent Locations 466
Location Selection Panel Configuration
Options 467
Profile Form Selection Panel 468
Profile Form Selection Panel
Configuration Options 468
Profile Form Panel 468
Entering Invalid Values 469
Security Selection Panel 469
Security Selection Panel Configuration
Options 469
Save User Interface Frame and Buttons 469
Resizing and Layout Options 470
Configuration Options 470
SaveUIConfig.xml File Location 470
The SaveUIConfig.xml Default
Configuration File 471
The Location Selection Field 472
The Profile Form Selection Field 473
The Security Panel 474
The Location List Size 474
The Navigation Tree 475
Configuring the Save User Inteface to
Show Only the Document Profile
Form 475
Index
xxi
P
A R T
1
DM Server Administration
In This Section
Chapters 1 through 5 address administration of the DM Server:
•
Setting DM Server properties.
•
Setting up full-text indexing of documents in the repository.
•
Setting up security for your DM repository.
•
Combining multiple DM servers for failover and load
balancing of client transactions.
•
Setting up the document-preview generator.
1
Chapter
1
Setting DM Server Properties
In This Chapter
This chapter explains how to use the DM Server Manager to set server
properties.
3
About the DM Server Manager
To run Server Manager, you must be logged in as an administrator on
the DM Server machine. The DM Server Manager lets you set the
following DM Server properties:
Server State Tab
• Start and stop the DM Server service (page 5).
Preferences Tab
• Set up the logging feature (page 30).
• Specify the location of the PCDOCS.INI file (page 11).
• Specify the location of the client-application forms (page
11).
•
Modify network logon settings (page 13).
• Turn off/on transaction monitoring (page 13).
• Turn on/off the document-compression option (page 14).
• Process full-text search requests against multilingual
indexes (page 14).
Libraries Tab
• Select the libraries to be used with DM Server (page 15).
• Change the default library that users log on to (page 16).
• For each library, select the index to be used for full-text
searching by users (page 17).
• Set the SQL-connection cache size for a library (page 18).
SearchServer Indexes Tab
• Set up the DM Indexer for full-text indexing with
SearchServer (page 17).
Document Previews Tab
• Set up document previewing on individual libraries (page
33).
Internal User Tab
4
CHAPTER 1
• Identify the user name and password used by the DM
Indexer and the Document Preview Generator to access
documents for indexing and previewing (page 36).
FOLB Settings Tab
• Set up failover and load balancing for multiple-server
clusters (page 37).
NetWare Servers Tab
• Set up DM Server to work with NetWare document servers
and indexing servers (page 46).
Results Tab
• Modify results-set settings (page 47).
Caches Tab
• Manage the internal caches (page 50).
HCS Server Tab
• Select a Hummingbird Core Services (HCS™) server from
which DM Server will obtain user logon credentials for
users accessing the DM Webtop via the Enterprise Webtop
().
Content Cache Tab
• Configure caching of document contents (page 54).
Starting Server Manager
To start Server Manager, click Start>ProgramsOpen Text>DM Server>DM
Server Manager. The DM Server Manager window appears.
STARTING SERVER MANAGER
5
Server State Tab
The Server State tab on the Server Manager window indicates whether
the DM Server service is started or stopped.
The DM Server service is set up to start automatically when Windows
starts . When you change certain Server Manager options, you are
prompted to restart the service so changes can take effect. You can
restart the service immediately in response to the prompt or, if you
want to restart later, you can stop and start the service manually on the
Server State tab.
6
CHAPTER 1
Note: Errors can occur on user workstations if the DM Server service is
restarted too quickly, even when failover is enabled. To avoid these errors, wait
approximately 10 seconds between stopping the service and restarting it.
Preferences Tab
On the Preferences tab, you can set properties governing DM Server.
PREFERENCES TAB
7
Log Settings
Note: The logging feature is intended primarily for troubleshooting.
You have the option of collecting the following information in a log
file:
• Calls to DM Server. This information includes the user ID
from which the call originated and the user’s current library.
• SQL statements sent to the SQL server.
• Other internal information that can help Open Text support
personnel troubleshoot problems with a DM Server.
Secured information, such as passwords and document contents, are
not collected in the log.
To modify the logging options:
1. Click the Preferences tab.
2. In the Logging Level field, click the down arrow to display
the following options, and click the one you want:
8
CHAPTER 1
No Logging
The logging feature is off.
Log All
The logging feature is on. Calls to
DM Server, internal information,
and SQL transactions are logged.
The information includes the
user’s ID and current library. Note
that because this option logs so
much data, selecting it can
significantly affect DM Server’s
performance.
Log Calls
The logging feature is on, but only
calls to the DM Server are logged.
The information includes the
user’s ID and current library.
Log SQL
Logs SQL statements.
Log SQL & Calls
Logs SQL statements and calls to
the DM Server.The information
includes the user’s ID and current
library.
Log Network
Logs network connections and
protocols.
Log User Logins
Logs when users log on to the DM
Server.
Log SearchServer
Indexing
Logs certain full-text indexing
activities by the DM Indexer. This
information can be used for
diagnostic purposes by Technical
Support.
Log Content Cache
Logs content cache activity such as
adding, removing, and
maintenance of documents in the
cache. This option logs activities
only if content caching is installed
and enabled. See “Content Cache
Tab” on page 54.
3. In the Log File field, specify the path name for the DM
Server log file. The default location is C:\Program
Files\\DM Server\Default.log. You can enter a different
path name or you can specify a template using one or more
of the following log-name variables:
%Y
year
%M
month
%D
day
%H
hour
These variables can be used to specify folder names as well
as file names. If you use log-name variables for folder
names, the folders must exist prior to specifying them; DM
Server does not create them. The log file extension can be
.LOG, .TXT, or any other text-type extension.
Examples
The following template will create a new log file every day
and change the directory every month and year.
C:\DMLogs\%Y\%M\%D.LOG
PREFERENCES TAB
9
For example, on June 30, 2010, at 12 A.M., a new log file
will be created named:
C:\DMLogs\2010\06\30.LOG
The log file created at 12 A.M. (midnight) for the next day
will be placed in the July folder and named:
C:\DMLogs\2010\07\01.LOG
The following template creates a new log file every hour:
C:\DMLogs\%Y-%M\%D-%H.log
On June 30, 2010, at 3 P.M., a new log file will be created
named:
C:\DMLogs\2010\06\30-15.LOG
Note that hours are counted on the 24-hour clock.
The following template also creates a new log file every
hour, but the year, month, and day are part of the file name,
and all logs are placed in the same \DMLogs folder:
C:\DMLogs\%Y-%M-%D-%H.LOG
At 11 A.M. on August 15, 2010, a log file will be created
under the name:
C:\DMLogs\2010-08-15-11.LOG
Note the use of the dash as a separator character between
variable names. Separator characters are not required, but
they can help make your file names more readable.
For less frequent logging of events, use a larger time
increment. For example, to have a new log file created
every month, the template name could be:
C:\DMLogs\%Y-%M.LOG
With this template name, a new log file will be created on
the first of every month at 12 A.M. (midnight). For
example, the log file for March, 2010, would be created at
12 A.M. (midnight) on March 1 under the name:
C:\DMLogs\2010-03.LOG
4. In the Log File Maximum Size field, specify the maximum
allowable size (in megabytes) of the log.
5. Click Apply to have the new logging preferences take effect.
Restarting the DM Server service is not necessary after changing a log
setting.
10
CHAPTER 1
Location of the
PCDOCS.INI File
The PCDOCS.INI file contains information about each library in your
system. The file is created in the DM Server \Program folder (by
default, C:\Program Files\Open Text\DM Server\Program) when you
generate a library.
If you are running DOCS Open, your existing PCDOCS.INI file may be
located in a different folder, which you are asked to specify when you
install the DM Server software. During installation, the file will be
copied from the location you specify to the DM Server \Program folder.
If you decide to move the PCDOCS.INI file to another location, or you
want to use a different copy of the file, you must specify the new
location to Server Manager.
To specify the PCDOCS.INI file location:
1. Click the Preferences tab.
2. Click the button in the field PCDOCS.INI Location, find the
PCDOCS.INI file, and click to select it.
3. Click Apply. Then click OK.
4. Restart the DM Server service.
Depending on the contents of the PCDOCS.INI file, you may want to:
• Change the default library, which is the library users
connect to if they do not specify a library when they log on
to the DM application.
• Change the libraries that are available to DM Server.
Location of Forms
Used by DM Client
Applications
The DM client forms are installed by default in the folder \Program
Files\Open Text\DM Server\DOCSObjects. These forms are used to
define aliases for SQL columns for use when DM client application
users communicate with DM Server.
The forms can reside in any folder that is accessible to DM client
application users. If you move the forms from the default folder, you
must specify their new location:
1. Click the Preferences tab.
2. Click the lookup button in the Forms Location field, find the
folder where the forms are now stored, and click to select
the directory.
3. Click Apply. Then click OK.
PREFERENCES TAB
11
4. Restart the DM Server service.
Enterprise Webtop
URL
This indicates the URL for the Enterprise Webtop.
The URL should be in the following format:
http://<server>:< port>/portal/hcleip
WorkFlow Server
Notifications
Select this check box to enable notifications to be sent when an event
is triggered from DM Server. This is used in applications such as
Enterprise Workflow and Business Process Management (BPM).
Select the Event Notification Levels to specify which notifications are sent.
Event Notification
Level
Event Notification allows events (such as a specific document being
checked out or a specific folder being updated) to trigger a customizable
notification message.
Select the events that you want to trigger event notification:
DOCUMENT.ACCESS
DOCUMENT.Edit_Profile
DOCUMENT.CREATE
DOCUMENT.VIEW
DOCUMENT.EDIT
DOCUMENT.CHECKIN
DOCUMENT.CHECKOUT
DOCUMENT.PUBLISH
DOCUMENT.Make_Read_only
DOCUMENT.Remove_Read_only
DOCUMENT.Delete
CONTAINER.LINK_ADDED
CONTAINER.LINK_REMOVED
CONTAINER.LINK_UPDATED
RM.CONTAINER.CLOSED
RM.CONTAINER.REOPENED
RM.ITEM.RELEASED
RM.ITEM.SUSPENDED
12
CHAPTER 1
Network Logon
Settings
Server Manager has two settings pertaining to network logons:
• Network Alias Required. This option requires users to log on
to DM with a network user name/password that is aliased to
their user ID in the library. When this option is selected,
non-network users cannot log on to DM Server using an
Attache password. See Document Access and Security for
more information.
• Default Password. This option tells DM Server to use the
password supplied during logon when the user requests
access to a document server where his or her logon
credentials have not been authenticated.
If this option is selected, it prevents DM Server from using
one of the grace logon attempts in organizations where
users are allowed only a few failed logon attempts before
being locked out.
By default, these options are turned off. They are toggled on the
Preferences tab.
If you change either option, click Apply. Then click OK. Restarting the
DM Server service is not necessary after changing the network logon
settings.
Transaction
Monitoring
The Commit Transaction Monitoring feature applies to Windows
document servers only. It ensures that documents uploaded from the
DM clients to DM Server are not saved to the document server until the
entire contents of the document have been transmitted successfully.
If Commit Transaction Monitoring is disabled, documents are divided
into multiple streams of data and sent to DM Server one by one. If the
transmission is canceled before it completes, only a portion of the
document will be stored on the document server.
By default, Commit Transaction Monitoring is enabled. This option is
toggled on the Preferences tab.
Restart the DM Server service after changing this option.
If your organization has Windows, Centera and NetWare document
servers, selecting this option provides transaction monitoring only on
the Windows document servers.
PREFERENCES TAB
13
Compression of
Retrieved
Documents
The Use Compression document-compression feature can help reduce the
network bandwidth required by DM Server to retrieve documents for
users. Documents are sent in a compressed format, minimizing
network traffic. However, compressing documents does increase
processing on the DM Server.
If your principal performance bottleneck is in bandwidth utilization,
we recommend you enable the Use Compression option. Then monitor
CPU usage on the DM Server machine to verify that the additional
processing is not significantly affecting server performance.
By default, the Use Compression option is enabled. This option is toggled
on the Preferences tab.
Use UTF8 Format
Full Text Searches
This option causes all full-text searches processed by DM Server to be
processed using the UTF8 character set format. This allows the DM
Server to process search requests in any language regardless of the
default language/locale specified for the server. For example, an
English DM Server could process Chinese language full-text search
requests from a user on a Chinese DM client. This option would
typically be used in combination with a multilingual index to facilitate
the indexing and searching of a document library containing
documents written in multiple languages.
For more information, see “Multilingual Indexing and Searching” on
page 443.
14
CHAPTER 1
Libraries Tab
On the Libraries tab, you can select all libraries to be accessed through
the DM Server. On this tab, you can also:
• Select a library to serve as the default library for users.
• The tree structure displayed in the Libraries pane shows the
logon libraries available to the DM Server. (If you don’t see
the library you want, see If a Library Isn’t Listed on the
Libraries Tab.)
LIBRARIES TAB
15
• If a library name is selected (a check mark is in the check
box beside it), the library is available for users of DM
clients to log on to. To select a logon library for the DM
Server, select the check box next to the library name.
Multiple libraries can be selected.
• Remote libraries associated with a logon library can be
displayed by clicking . When a logon library is selected,
all of its remote libraries are automatically selected as well,
making them available to client users. If you do not want
users to access a particular remote library, clear the check
box next to the remote library name.
• A
symbol denotes the server’s default library. The
default library is the library that DM client users initially
log on to.
You can also set the following by clicking the Properties button on the
Preferences tab:
• Select the index or indexes that users connected to the DM
Server will use for searching. Set the SQL-connection
cache size for each library.
The Default Library
The default library is the library to which users connect if they do not
specify a library when they log on to a DM client. If the client allows
users to select from a list of libraries when they log on, the default
library is the first library in the list.
Note: The default library is different from the current library. The current
library is the library that the user is currently accessing.
To change the default library:
1. Click the Libraries tab.
2. Verify that the check box next to the library you want is
selected.
3. Click Properties to display the Library Properties dialog box.
4. In the Library field, click the down arrow and select the
library you want.
5. Select the option Server’s Default Library.
6. Click OK to return to the Libraries tab. The
symbol
should appear next to the library you selected as the default.
Click Apply and OK.
16
CHAPTER 1
7. Restart the DM Server service to have the new default
library take effect.
Full-Text Index for
Library Users
Once you have created an index for a library, you can give users access
to the index by selecting it in Server Manager on each DM Server that
handles user requests.
Indexes are created by SearchServer. If you have multiple indexes for
a library, you can select up to 10 indexes for user access.
The selected indexes can be employed in a round-robin fashion to
provide high-performance searching or you can use one index for
searching and the others as backups in case the first index is not
available. SeeUsing the DM Indexer for details on how the multipleindex feature works.
To select one or more indexes for a library:
1. Click the Libraries tab. Then click Properties to display the
Library Properties dialog box.
2. In the Library field, select the library name.
LIBRARIES TAB
17
3. The Full-Text Search Indexes box displays any indexes that are
currently selected. To add an index, click Add. The Select a
Full-Text Index dialog box appears with all of the library’s
indexes displayed. Highlight the index you want to add and
click OK.
4. If you have multiple indexes in the Full-Text Search
Indexes list, select the way these indexes will be employed:
• To make all indexes available in a round-robin fashion,
select the option Use All Indexes in Sequence. The first user
request goes to the first index in the list, the second
request to the second index, and so on.
• To use a single index with the others serving as backups,
select the option Use Next Index in List Only When Current
Index Fails. The first index in the list is used for all search
requests unless it is unavailable. Then searching is taken
up by the next index in the list.
To change the order of an index in the list, highlight the
index and click the Up or Down key . The Remove key
deletes an index from the list.
5. Click OK to return to the Libraries tab. Then click Apply and
OK.
It is not necessary to restart the DM Server after making a change to the
Full-Text Search Indexes. This allows the DM administrator to
dynamically redirect user searches to a different index without
interrupting the DM Server or user activities.
The SQLConnection Cache
Size
The SQL-Connection Cache Size parameter specifies the minimum number
of connection objects within the DM server. This value does not
represent the actual number of SQL connections. If the number of SQL
connections required increases above the specified value (to a
maximum of 50), then the DM server instantiates more connection
objects. However, these additional connections are dropped when
processing completes, and the number of connections return to the
value specified in the SQL-Connection Cache Size parameter.
When a DM client user processes a transaction, DM Server uses one of
its open SQL connections instead of creating a new connection, which
improves system performance. (Examples of SQL transactions are:
creating a Document Profile, performing a search, and saving an edited
document.)
18
CHAPTER 1
SQL connections are not held open all of the time. If there is no activity
on a SQL connection for 10 minutes, the number of connections drops
to zero.
For example, if you set the SQL-Connection Cache Size parameter to 5,
starting the DM server uses one connection. If four users log on and
retrieve the Recently Edited Documents list simultaneously, the DM
server initiates four additional SQL connections, for a total of five. If
more users log on, they share the five SQL connections; however, if 10
simultaneous connections are required, DM Server initiates an
additional five connections, for a total of 10.
To achieve the optimum value for the SQL connection cache, you have
to strike a balance between minimizing the resources used by idle SQL
connections and maximizing the frequency with which users are able
to use an open connection.
To change the SQL connection cache size for a library:
1. On the Libraries tab, click Properties to display the Library
Properties dialog box.
2. In the Library field, select the library whose cache size you
want to change.
3. In the SQL Connection Cache Size field, type the number of
connections to keep open. The maximum supported value is
50. Click OK.
4. On the Libraries tab, click Apply and OK.
5. Restart the DM Server service to have the change take
effect.
Specifying
Libraries in the
PCDOCS.INI File
If a Library Isn’t Listed on the Libraries Tab
The library names displayed are retrieved from the PCDOCS.INI file
specified on Server Manager’s Preferences tab. If a library name does
not appear in the list, you are probably not pointing DM Server to the
correct copy of the PCDOCS.INI file, or you may need to copy a [Library]
section for the missing library into the PCDOCS.INI file specified on the
Preferences tab. Use any text editor to add the [Library] section. The
section should contain the following settings:
[Primary Library]
NAME=<Library name>
LIBRARIES TAB
19
[Library <name>]
Vendor=<SQL vendor code>
Database=<SQL database name>
Owner=<name of SQL server login account>
Location=<name of server where database is installed>
Username=<username for SQL login>
Password=<encrypted password>
Vendor is a number representing one of the following SQL vendors:
3
Microsoft SQL Server
5
Oracle
Database is the name given to the DM database when it is created using
the SQL engine.
Owner is the SQL Server logon account assigned as owner of the
database. For all vendors other than Oracle, the owner is DOCSADM.
With Oracle databases, multiple libraries may be created on a single
instance so long as each library has a different owner.
Location is the name of the server where the database resides.
Username is the SQL account DM Server uses to access the database.
This is the name you specified on the Login Scheme dialog box during
library generation.
Password is an encrypted version of the password for the SQL logon
account.
SearchServer Indexes Tab
On the SearchServer Indexes tab, you can create and manage full-text
indexes. Full-text indexes allow users to perform searches for
documents against the entire contents of documents and text fields on
Document Profiles.
20
CHAPTER 1
The SearchServer Indexes tab also indicates the status of each index, its
state (whether it is stopped or started), startup type (manual or
automatic), its size, and the size of the DYX file. This information is
retrieved when you start Server Manager. To refresh the information
after starting Server Manager, click the Refresh button.
Adding an Index
An index can be created from any DM Server, provided that the server
has access to the library that is to be indexed.
SEARCHSERVER INDEXES TAB
21
To create an index:
1. Start Server Manager and select the SearchServer Indexes tab.
2. Click Add Index.The Add Index dialog box appears.
3. In the left pane, select the library you want to create the
index for. A check appears in the box next to the library
name, and the Add button is enabled.
4. Click Add. The index is added to the right pane with the
name <library name>_Index.
5. Select the index and click Properties to define the properties
of the index. See “Modifying the Properties of an Index” on
page 24 for instructions.
6. When the properties are set up, click OK to return to the Add
Index dialog box. Click OK to return to the SearchServer
Indexes tab; then click Apply or OK to create the index.
The new index is initialized and ready to begin indexing documents.
Note that the initialization process sets up the index files and creates all
the index tables. It does not index existing documents in the library. To
index existing documents, you must first start the index.
Starting an Index
22
CHAPTER 1
On the SearchServer Indexes tab, you can control the running of the DM
Indexer against the indexes that have been initialized and are ready for
indexing.
An index’s state need not be Started for users to perform full-text
searches, but it must be started in order for documents to be indexed.
To start or stop the Indexer, you must be running Server Manager from
the Indexer server.
To start an Index:
1. Go to the SearchServer Indexes tab.
2. Select the index name and then click Start to start indexing
documents for this index.
3. Check the index properties log file and verify the Indexer is
running.
To stop an Index:
 To stop an index, perform these steps and select Stop in step
2.
Deleting an Index
This process deletes all files that make up the selected index. It also
deletes the ODBC data source associated with the index from the
Indexer server.
To delete an index:
1. On the Indexer server, go to the SearchServer Indexes tab.
2. Select the index you want to delete and click Delete Index.
3. Click Apply to permanently delete the index.
If the index is shared, we recommend you delete the ODBC data source
associated with the index on every DM Server. This is not required, but
you will be unable to reuse that data source name on a server until it is
deleted.
To delete the data source name:
1. Select Start>Settings>Control Panel>Administrative Tools>Data
Sources (ODBC).
2. Click the System DSN tab.
3. Highlight the data source name and click Remove and OK.
SEARCHSERVER INDEXES TAB
23
Modifying the
Properties of an
Index
Location & Sharing
Tab
1. You can modify the properties of an index by clicking
Properties on the SearchServer Indexes tab in DM Server
Manager; The Index Properties dialog box appears with
the Location & Sharing tab selected.
The Location & Sharing tab contains the following fields:
Index Name: The name of the current index is displayed here.
Data Source Name: By default, DM Server assigns an index a data
source name in the format <library name>_<number>.
Path — Default: If you are creating an index, select Default to store
the index in the default location, which is C:\Documents and
Settings\All Users\Application Data\Open Text\DM Indexes\ .
To store the index in a different location, clear the Default check
box and then enter the Path.
NOTE: The Default check box option appears only when you are
creating an index.
Remote — Shared: The option you select here depends on whether
you are running Server Manager from the Indexer server or from
a DM Server that handles requests from DM client users.
24
CHAPTER 1
Select Shared if the Indexer server is the local machine and users
will be accessing the index via other DM Servers or KM. Then
select the appropriate Network Protocol and Port so that users
accessing the local server can locate the index. The port cannot be
used by other indexes on the server or by other software using the
network. For Named Pipes, the port is the name of the pipe (for
example, ftnet). For TCP/IP, the port is the TCP port number (for
example, 3048). The TCP\IP port number cannot be in use on the
local system. (To determine the port numbers in use, run
NETSTAT at a command-line prompt.) Normally, anything
higher than 5000 is a usable port number.
Once a port number has been assigned to an index, it cannot be
used again until you run \SSK\BIN\FTSVCADM.EXE to remove
unused port numbers. (Do not remove port number 16547; it is
used by DM Server.) After removing the ports, restart the DM
Server service. At this point, you can then add a new index with
the previously used port number.
The Remote option is automatically selected if you create a shared
index on one server and are viewing the properties of that index
on another server.
Note: A single library cannot have more than one shared index on an Indexer
server.
Server Name: When you are creating an index, this field displays
the name of the local server. When you are viewing the properties
of an existing index, the field displays the name of the server
where the index is located.
Click OK to have any changes you made take effect.
Index Properties
Tab
The Index Properties tab contains the following:
SEARCHSERVER INDEXES TAB
25
Language: Select the language of your documents and profiles. If
your documents are in a language other than the choices listed
here or you are not sure what to choose, select Other.
The Unicode option lets you create an index containing
information for documents of various languages instead of
targeting a specific language. The Unicode option defaults to a
character set value of UTF8. The advanced linguistics properties
available for other languages are not supported by the Unicode
option.
Advanced: This button invokes the Advanced Index Properties
dialog box. When you select a language, most of the advanced
properties are modified to the defaults for the language. See
“Advanced Index Properties” on page 28 for a description of the
options on this dialog box.
Compress Index: When a new document is created or a document is
changed, SearchServer indexes the new data in a temporary file
called <index name>.DYX. User searches are performed against both
the index and the DYX file until the DYX file is merged into the
index. The Compress Index option performs the merge operation.
26
CHAPTER 1
To schedule a regular weekly compression of the index, enter a
day and time in the fields provided. To compress the index every
day, select the option Daily and enter a time. The Indexer will
automatically be stopped while the index is undergoing
compression, so no new documents will be indexed. But users
will be able to search against the index during that time.
See “Manually Compressing an Index” on page 32 for
instructions on manually compressing an index.
Schedule Backup: This option lets you schedule a time when the
Indexer pauses for system backups or regularly scheduled
maintenance. While the Indexer is paused, documents are not
indexed, but users may continue searching against indexes. You
can schedule the pause on a daily basis (Daily) or on a specific
day of the week. In the At field, select the time when you want the
Indexer to pause. Note that if the Indexer is indexing a batch of
documents or compressing the index, it will complete these
operations before pausing for the backup. So we recommend you
schedule the pause approximately 30 minutes prior to the backup,
to give the Indexer time to finish.
In the Backup Duration field, select the number of hours—between
1 and 24—to pause the Indexer. It is important to allow sufficient
time for backups to finish. We recommend you monitor the time
required for backups and adjust the Backup Duration value as
necessary so the Indexer does not resume processing while the
backup is still running.
If you don't want to pause the Indexer during backups, select
Never in the Schedule Backup field.
Startup Type
By default, Startup Type is set to Manual, which means that indexing
for this index must be started manually by the DM administrator.
Manual: Indexing must be started manually by the DM
administrator by selecting the index on the SearchServer Indexes
tab and clicking Start.
Automatic: Indexing starts automatically when the DM Server
service starts.
Enable Periodic Mode Indexing: The periodic-mode indexing feature
allows SearchServer to switch to periodic mode for more
SEARCHSERVER INDEXES TAB
27
efficient indexing of large numbers of documents. When Enable
Periodic Mode Indexing is selected, the indexer automatically
goes into periodic mode when a large number of documents—
100 or more—is in the indexing queue. This primarily occurs
when the index is being initialized or reindexed. By default,
Enable Periodic-Mode Indexing is enabled. To disable it, clear
the check box. (See “The Indexing Process” on page 60 for more
information on periodic-mode indexing.)
Click OK to have any changes you made take effect.
Advanced Index Properties
The Advanced Index Properties dialog box appears when you click the
Advanced button on the Index Properties tab. The Advanced Index
Properties dialog box lets you set SearchServer parameters for the
index. When you select a language on the Index Properties dialog box,
most of the advanced properties are modified to the defaults for the
language.
Language: Select the language of your documents and profiles. If
your documents are in a language other than the choices listed
here or you are not sure what to choose, select Other. This field
designates a language that will be used by the linguistic engine,
which enables stem searches on words. In English, for example, a
stem search on “work” will find documents containing “worked”
and “working” as well as “work.”
Character Set: Select the SQL character set used by your database.
Stop Words Header: Stopwords are words that are not indexed. For
most languages, the appropriate option here is Default. If you have
28
CHAPTER 1
installed the Japanese or Korean version of DM, select the
stopword header for your language.
Wild Card Optimization: A wildcard is a character in a search term
that represents one or more characters that are not specified.
SearchServer supports two wildcard characters:
? question mark represents a single character
* asterisk represents any number of characters (including no
character)
Three wildcard optimization methods are available. Select the
method most appropriate for your system:
NONE: No wildcard optimization is set. Performance against
search terms containing both leading and trailing wildcard
characters is substantially reduced.
MINIMIZE_SEARCH_TIME: This method maximizes search
performance at the expense of indexing time and index size.
MINIMIZE_INDEX_OVERHEAD: This method minimizes
indexing time and index size. The search performance is nearly as
good as with the MINIMIZE_SEARCH_TIME method, except
for search terms containing both leading and trailing wildcard
characters.
See “Using Wildcards in Searches” on page 81 for more about
wildcards.
NOTE: The Enable Word Proximity and Generate Term Vectors check boxes
appear unavailable until you select an item from the Language drop-down
menu. Select a language even if your language, for example, English (US)
already appears.
Enable Word Proximity: Proximity searches allow users to search for
words within a certain proximity of each other. Turning on the
ability to do proximity searches between words can affect
indexing performance and increase the size of the index.
Generate Term Vectors: Selecting this option generates term
vectors for each indexed document, which allows KM to perform
results-list clustering on the index. A term vector is a list of
significant words and noun phrases in a document. When a user
performs a search, KM analyzes the term vectors for each
returned document, identifies the common terms, and returns a
results list with the documents grouped by theme. When this
SEARCHSERVER INDEXES TAB
29
option is selected, a document abstract will be generated and
displayed in KM WebFIND.
Selecting this option increases the size of index files and slows
the indexing process, so if you are not using KM or don't want to
perform results-list clustering, clear the check box.
The following languages are supported: English, French,
German, Spanish, and Italian.
Session Options: This feature is not intended for normal use. Do not
use it unless instructed to do so by Open Text technical support
staff.
Log File Tab
The Log File tab allows you to enable or disable the log file and change
the log file location. You can also view the index activities.
The index log contains a record of indexing activities, including:
• Times when the index was started and stopped.
• Times when the index paused for a backup and when it
resumed indexing after the backup.
30
CHAPTER 1
• Times when the index was compressed.
• A list of the document numbers being indexed.
• Any errors that occurred during indexing.
By default, logging of index activities is enabled and the file is located
in the folder:
C:\Documents and Settings\All Users\Application Data\Open
Text\DM Indexes\<index system ID>\<index name>.xlg.
To disable index logging:

On the Index Properties tab, clear the Log Enabled check box.
To open the log file:

Click the Open with Notepad button.
To obtain the latest indexing information:

Click the Refresh button.
Index Defaults
The Defaults button on the SearchServer Indexes tab lets you establish the
default values that appear when you create a new index. To change the
defaults, click Default, modify the options in the Index Properties dialog
box, and click OK. The new defaults will apply to any indexes created
after the defaults are changed.
Reindexing
Documents
The reindexing process builds the index—either by indexing the entire
repository or reindexing documents that were indexed between a
specified date and today. Reindexing must be performed on the server
where the index is located.
To reindex an index:
1. On the SearchServer Indexes tab, select the index you want to
reindex.
2. In the Maintenance section, select one of the following
reindexing options:
Everything to reindex the entire document library (except
those documents for which Full Text Indexing is not
selected on the Document Profile).
From and a date to reindex from the specified date.
SEARCHSERVER INDEXES TAB
31
The Indexer will reindex all documents that were indexed
between the From date and today, inclusive. This includes
new documents plus existing documents that were indexed
during the specified time period.
3. Click Re-Index. When the index is ready for use, you will
see “Initialized” in the Status field.
4. To make the index available to users, start the index by
following the instructions on page 22. Then select the index
by following the instructions on page 17.
For more information on reindexing, see “Reindexing Documents” on
page 31.
Manually
Compressing an
Index
If you see that the DYX file is growing beyond a few hundred
megabytes, and the regular compression is not scheduled to occur soon,
you should manually compress the index:
1. On the Indexer server, start Server Manager and go to the
SearchServer Indexes tab.
2. Select the index you want to compress and click Compress
Index.
The Indexer is automatically stopped while the index is undergoing
compression, so documents will not be indexed. User searching can
continue during a compression.
See “Compressing an Index” on page 77 for more information on
compressing indexes.
32
CHAPTER 1
Document Previews Tab
DM gives users the option of displaying short HTML previews of
documents. This feature saves document-retrieval time and helps users
quickly determine if a document is the one they want.
The Document Previews tab lists all libraries known to DM Server, their
current preview status (started or stopped), and their startup type
(disabled, manual, or automatic). The startup type is controlled on the
Preview Generator Properties dialog box; click Properties to see it.
To enable previewing, you must first allow users to see previews by
enabling the Allow Preview option in DM Webtop’s DM Admin tab under
Library Parameters>System Parameters>Default.
To start preview generation for a library, highlight the library name and
click Start. Click Stop to halt previewing for documents in that library.
Note that if the library’s Startup Type on the Preview Generator
DOCUMENT PREVIEWS TAB
33
Properties dialog box is Disabled, you will not be able to start preview
generation until you change the startup type. By default, Startup Type is
set to Manual, which means that preview generation must be started
manually by the DM administrator.
To regenerate previews for a selected library, you have two options:
Everything: Regenerate all documents in the library.
From: Regenerate previews only on documents for which previews
were generated between the From date and today, inclusive. This
includes new documents plus existing documents.
To modify the preview-generation properties for a selected library,
click Properties.
Note: The Properties button is disabled when the Preview Generator is
running. Click Stop to stop the Preview Generator if you want to view or change
the properties.
Code page: Make a selection here based on language of the library’s
documents.
Generate Netscape-Compatible HTML: Certain graphic formats are not
shown properly in the Netscape browser. Selecting this option
generates previews without graphics.
Startup Type
Manual: Preview generation for a library must be started manually by
the DM administrator by clicking Start on the Document Previews tab.
Automatic: Preview generation for a library started automatically when
the DM Server service starts.
Disabled: Preview generation for the library is disabled. The document
previews remain on the document server; however, when you select
another Startup Type and preview generation begins, all previews are
regenerated, including those already on the document server. This is
necessary because the preview generator does not determine if a
document has been updated since the previous preview was generated.
Regeneration of previews is a time- and resource-consuming process,
so the preview generator should not be disabled unless you are advised
to do so by Open Text Technical Support. If you do not want previews
generated, stop the preview generator.
34
CHAPTER 1
Log File Tab
The preview-generator log contains a record of preview-generator
activities, including:
• Times when the preview generator was started and stopped.
• A list of the documents for which previews are being
generated by document number.
• Any errors that occurred during preview generation.
To see the log-file properties for a selected library, click Properties and
then click the Log File tab.
The log file is located in the folder: C:\Documents and Settings\All
Users\Application Data\Open Text\DM Indexes\<library
name>\preview.log
On the Log File tab, you can also open the log file for editing by clicking
Open with Notepad. And you can obtain the latest information by clicking
Refresh.
Click Apply to have any changes you made take effect.
See Generating Previews of Stored Documents for more information
on document previews.
DOCUMENT PREVIEWS TAB
35
Internal User Tab
On the Internal User tab, you can identify the DM library user ID used
by the DM Indexer and the Document Preview Generator.
Identify a DM User ID for the Indexer and Document Preview
Generator
To index a document, the DM Indexer/SearchServer opens the
document and reads its contents. To do this, SearchServer must log on
to DM Server with a DM user ID that has universal read access: the
rights to read all documents in the library. (See “The Internal User for
Indexing Activities” on page 65 for more information on setting up the
Indexer user account.)
The Document Preview Generator creates one-page previews of all
documents and keeps them up to date. To access documents for the
preview-generation process, the generator also needs a user ID with
universal read access.
36
CHAPTER 1
Any DM user ID with these rights can be designated as the internal
user. Once this account has been established, it can be identified to
Server Manager on the Indexer server. If you do not create an internal
user, the default internal user account created when a new library is
generated will be used for indexing and preview generation. The user
name of the default internal count is INTERNAL. This account has no
network alias and is a member of only one library group:
DOCS_SUPERVISORS.
To define the Internal User:
1. Start Server Manager and click the Internal User tab.
2. Enter the user name and password of the internal DM user
account. You cannot enter a domain name because DM
Server gives you the ability to use the account over multiple
domains. If you do this, however, the password must be the
same in every domain.
3. Click Apply and Close.
Note: Because they are so numerous, the activities of the internal user are not
collected in the Activity Log. For this reason, the internal user account should
be dedicated for use solely by the DM Indexer and Document Preview
Generator.
FOLB Settings Tab
If your organization employs multiple DM Servers, you can connect
them in a cluster to implement failover and load balancing (FOLB) of
requests from DM client users. A cluster is a group of DM Servers on
the same network serving the same set of libraries.
• The failover feature automatically switches DM client users
from one DM Server to another in the cluster if the initial
server fails for any reason. You have the option of
implementing the failover capability alone or integrating it
with the load-balancing capability. The failover feature
provides a high degree of fault tolerance to the cluster of
DM Servers. Typically, only the last user request will need
to be resubmitted in the event of a server failure.
FOLB SETTINGS TAB
37
• The load-balancing component distributes users’ requests
among the servers in the cluster so that the load of user calls
is distributed relatively evenly. You can choose from two
load-balancing methods: round robin and CPU utilization.
Under the round-robin method, client-user requests are
assigned in rotation among the servers in the cluster. Under
the CPU utilization method, each client polls the servers to
find one that has less than 75 percent utilization and sends
its request to that machine.
The following paragraphs walk you through the steps required to
define a server cluster and select the FOLB settings. But before setting
up failover and load balancing, we recommend you familiarize
yourself with how these features work. Failover and Load Balancing
on Multiple DM Servers describes what happens in an FOLB
environment, the system requirements for FOLB, and the implications
of the various FOLB settings.
38
CHAPTER 1
Defining a Cluster
of DM Servers
To define a cluster of DM servers:
1. On a server in the cluster, run Server Manager and click the
FOLB Settings tab. The name of the current DM Server
appears in the Known Servers list.
2. In the Enter New Server field, type the name of another server
and click Add. Its name will appear in the Known Servers list.
3. Repeat step 2 for all servers in the cluster.
NOTE: To remove a server from the cluster, select the server and click Delete.
The Clear All button removes all server names from the list.
4. When you finish adding servers to the Known Servers list,
click Apply to record the new server list. The server names
are ordered alphabetically.
5. The Propogating New Server List dialog box appears with
the following prompt:
“The new Remote Server List was successfully applied
locally.
This new server list will not take effect on the remote
servers until the eDOCS DM Service propogates such
changes. Would you like the service to propogate now or
would you like to propogate it manually later?”
If you click Propogate Now, the server list is propagated to all
servers in the cluster. The server list of each server will bear
a time stamp that reflects when you initiated the
propagation. During the propagation, messages are
displayed indicating the time stamp of the server list at each
server. The time stamps should all be the same. If they are
not, see “If the Propagation Fails” on page 122 for
instructions.
If you click Propagate Manually, you can return to the FOLB
Settings tab at a later time and click Propagate Current Server
List to bring up the Propagating New Server List dialog box.
This dialog box has two options:
Propagate Now—Updates the time stamp of the new server
list and sends it to each server in the cluster. Choose this
option when you are:
• Adding a new server to the cluster.
• Removing a server from the cluster for reconfiguring or
disposal.
FOLB SETTINGS TAB
39
• Renaming a server in the cluster.
Propagate Manually—Closes the dialog box and applies your
changes only on the server you are making the changes
from; no other servers in the cluster are updated. You can
return to this dialog box later and select Propagate Now or
you can manually enter the server list on each member of
the cluster. However, we do not recommend manually
entering the names because of the possibility of
typographical errors. Choose this option when you are:
• Removing a server from the cluster when you intend to
continue using the server as a DM Server, such as a
dedicated DM Indexer Server.
• Disabling FOLB but continuing using the server as a
DM Server.
If you were to use Propagate Now instead of Propagate
Manually in either of these situations, the DM Server would
be removed from its own Known Server list, which would
make the server unknown to itself ; no DM client would
then be able to attach to the server. Propagate Now should be
avoided if you intend to continue using the DM Server. You
should instead make your changes to each server in the
cluster and then select Propagate Manually.
6. When the propagation is finished, click OK and exit Server
Manager.
Selecting FOLB
Client Parameters
40
CHAPTER 1
The Client Parameters button on the FOLB Settings tab allows you to select
the FOLB features.
To select the FOLB features used by DM Web Servers:
1. On the FOLB Settings tab, click Set Client Parameters. The
FOLB Client Parameters dialog box appears.
2. Select either Fail Over and Load Balancing or Fail Over Only to
specify the type of FOLB.
If you want the failover capability but do not want to
implement load balancing, select the Fail Over Only option.
With Fail Over Only, you must designate a primary server to
receive all user transactions. If the primary server fails,
transactions are sent to the next online server in the server
list. When the primary server comes back up, it will resume
all processing of user transactions.
2.1 If you select Fail Over Only, the Specify Primary eDOCS DM
Server drop-down menu becomes available. Select the
primary DM server.
If you want both capabilities, select the option Fail Over and
Load Balancing.
FOLB SETTINGS TAB
41
2.1 If you select the Fail Over and Load Balancing option, you
must then select the Load Balance Method:
Round Robin—This method is the default for load
balancing. Under the round robin method, user
requests are assigned in rotation among the servers in
the cluster. The server list is ordered alphabetically, so
the first request from a user goes to Server A, the
second request from that user goes to Server B, and so
on.
CPU Utilization—Under this method, each DM client
polls the DM Servers to find one with less than 75
percent CPU utilization and sends the request to that
machine. If, during the polling process, the client
detects an offline DM Server, the server will be
suspended from the server list until it comes back
online. While the server is down, requests
automatically failover to the next server in the list.
3. In the FOLB Polling Parameters section, select one of the
following:
Poll Failed Servers—If a user sends a transaction to an offline
server, the server is effectively suspended from the DM
Web Server’s server list until it comes back up. The DM
Web Server will poll the DM Server at the designated
intervals to determine if it has returned to service, but until
that time, no transactions will be sent. Polling ceases once
all offline servers are online again.
Poll All Servers—At the designated intervals, the DM Web
Server polls all servers in the cluster to confirm they are
online. Offline servers are effectively suspended from each
DM Web Server’s server list until they come back up. This
polling option has the advantage of suspending an offline
server from the DM Web Server’s server list before it sends
a request, preventing delays in the processing of
transactions. However, it tends to increase network traffic.
42
CHAPTER 1
Do Not Poll Servers—DM Web Servers do not poll DM
Servers. If a server is unable to process a transaction, it is
removed from a DM Web Server’s server list. When it
comes back online, it is not returned to the server list, as it
would be if polling were turned on. To restore the server to
the DM Web Server’s server list, the DM Web Server must
be restarted.
4. If you selected an active polling parameter (Poll Failed
Servers or Poll All Servers), enter a value in the Polling Interval
field. Values are in seconds. The default is 10.
5. Click OK to return to the FOLB Settings tab.
You must restart the DM Web Server to have changes to these options
take effect.
Network Bindings
Configuration
When you click the Network Bindings button on the FOLB Settings tab, the
Network Binding Configuration dialog box appears. This dialog box
displays a list of available bindings:
• DCOM
• HTTP
• NetTCP
The default configuration is DCOM set as the primary network
binding.
When you select the HTTP binding, you can perform the following
actions on the binding:
• Enable or disable the HTTP binding. If the binding is
disabled, the Windows Communication Foundation (WCF)
Service Host will not initialize an endpoint listener to
process HTTP requests.
FOLB SETTINGS TAB
43
• Set the HTTP binding as the primary network binding for
use by clients. When a binding is set as the Primary
Binding, a registry value is added to the FOLB client
parameters identifying the Primary Binding. The DM API
will then use this value to determine what network protocol
to use when making wire calls to the DM Server.
• Set the port for use by the HTTP binding. This defines the
port that the WCF Service Host will use to initialize the
HTTP endpoint listener. Port 80 is defined as the default
port for the HTTP binding. The administrator may select an
alternate port for use by the binding.
NOTE: If you change the port number, you must restart the Open Text eDOCS
DM Server WCF Host.
The NetTCP binding is well suited for intranet deployments and uses
an efficient binary wire format for transferring request/response data
over the network. We recommend using the NetTCP binding as the
primary DCOM replacement choice within intranet-based
deployments.
URL Components
A client creates a connection to an eDOCS DM Web Service using a
URL and a WCF endpoint object. The URL is broken into the
following nodes.
• Binding Protocol/URL Scheme
Each service URL must have a URL scheme node that
identifies the communication protocol associated with the
URL. The eDOCS DM WCF implementation will
optionally support the HTTP and NetTCP protocol
bindings. The URL scheme for HTTP is "http" and the URL
scheme for NetTCP is "net.tcp."
• Server Name
This is the name of the server where the Web Service host is
running.
44
CHAPTER 1
• Port used for communication
Each protocol binding must have a port through which it
can listen for incoming calls. The ports used for each
binding will be configurable during the server setup
process. The default port for the HTTP binding is port 80.
The default port for NetTCP is port 808.
• Relative URN for the eDOCS Web Service
This is the portion of the URL that identifies specific Web
Service endpoints. The current eDOCS WCF
implementation exposes two service endpoints. These
endpoint URN definitions are hard coded and cannot be
modified.

/DMSvr/Svc
This URN represents the primary service and is
analogous to the IPCDServerX interfaces used to
access the DM Server through DCOM.

/DMSvr/Obj
This URN represents a unified service implementation
of the calls needed to process supplemental DM Server
objects such as search results and file streams.
Examples
Following are examples of some fully-qualified URLs for accessing
the eDOCS DM Web Service implementations:
http://aserver.com:80/DMSvr/Svc
http://aserver.com:80/DMSvr/Obj
net.tcp://aserver.com:808/DMSvr/Svc
net.tcp://aserver.com:808/DMSvr/Obj
FOLB SETTINGS TAB
45
NetWare Servers Tab
Use the NetWare Servers tab to set up the DM Server to access documents
on NetWare document servers.
The DM Server reads the NetWare server names from the libraries
selected on the Libraries tab and displays them in the Server Name list.
DM Server determines whether each server is NetWare 5.x or 6.x. For
these servers, specify the following:
• NDS Tree Name. This field should contain only the tree name,
not a backslash or any other character.
• NDS Context. This field should display only the container
associated with the DM service account and all parent
containers to that container. Do not include the tree name.
• User name (for DM network access). This field should display
only the user name of the DM service account. Do not
include container or tree names.
46
CHAPTER 1
• Password
• Confirm Password
For example, you might specify the following:
NDS Tree NameAndromeda_tree
NDS ContextDM.techs.support
User nameDMAdmin
Password*******
Click Apply to have the server-access information take effect. Server
Manager does not verify that server names are valid. This is done by
DM Server when a document server is accessed.
If you change the name or password of the account that DM Server
uses for NetWare access, you must restart the DM Server service to
have the change take effect.
Results Tab
When a user executes a search, retrieves a list of recently edited
documents, or performs some other operation where a list of
documents is compiled, DM Server creates a results set.
The following results set settings are specified in Server Manager:
• The maximum size of an individual results set.
• The total amount of virtual memory for caching results.
• The time interval between the user’s last access of a results
set and the point at which the DM Server can delete the set.
• How often the DM Server checks for results sets that have
timed out.
RESULTS TAB
47
• The number of documents displayed in users’ recently
edited documents lists.
Maximum Size of
Results Sets
Amount of Virtual
Memory for
Caching Results
It is important to keep a single search execution from consuming too
much memory. In the Maximum Size field, specify the size in kilobytes.
The default value is 1000 KB. Click Apply and OK to apply the change.
The value in the Maximum Total Size field specifies the total amount of
memory that can be used for caching. This takes into account the
maximum size for each set of search results. The default value is
2,000,000 KB.
Use caution when modifying this value: it can affect the number of
search results users receive.
Time-Out Interval
48
CHAPTER 1
When a user executes a search, DM Server caches the results for the
user to request on a row-by-row basis. If the user does not request any
more results within the time period specified by the time-out interval,
DM assumes that the results set is no longer needed and deletes the
cached entries, thus freeing up resources.
In the Timeout field, specify the time (in minutes) between the user’s last
access of a results set and the point at which DM Server can delete it.
You should specify an interval that allows users plenty of time to obtain
the information they need, but not so long as to drain system resources.
The default value is 15 minutes.
Cleanup Frequency
The value in the Cleanup Frequency field specifies how often (in minutes)
DM Server checks for timed-out results sets and deletes them. The
default value is 15 minutes.
Use caution when modifying this value. Setting it too low may cause
DM Server to waste CPU time checking for timed-out results sets. If
the setting is too high, abandoned results sets can consume resources.
Recent Edit Limit
The value in the Recent edit limit field specifies the maximum number of
documents that can be displayed in the list of recently edited
documents (RED) shown to users. The maximum is 253.
Decreasing the value in this field may improve the performance of
RED searches.
We recommend that the value in the Recent edit limit field match the
configuration setting in the Client Deployment Utility (Document
Management Configuration > General). A different setting in the Client
Deployment Utility will override the Server Manager setting with
regard to how many documents appear in the RED list, but the Server
Manager setting will continue to control the amount of RED data
passed to the client. Matching the two settings will prevent unseen data
from being needlessly passed to the user’s workstation.
RESULTS TAB
49
Caches Tab
On the Caches tab, you can refresh all internal caches while DM Server
service is running.
To see the settings for a cache, click the down arrow in the Caches field
and select a cache.
The Settings field allows you to set the refresh interval for the selected
cache. Click the down arrow to see the available settings:
• Manual Refresh Only (Use the Refresh or Refresh All button to
reset.)
• Weekly
• Daily
50
CHAPTER 1
• Twice-Daily
• Hourly
You can check the statistics or settings, or update the caches, for any of
the following:
• DB Schema Information: Update the cache when new columns
or tables are added to a database. Changes made in DM
Designer are not reflected until the cache is refreshed.
• DOCSObject ClassIDs: This is an internal DM Server cache to
support plug-in server objects. It does not require
refreshing.
• Group Information for Library: This cache contains the
contents of the GROUP table and related information such
as user default values in profile forms.
• DM Network Aliases: This cache holds network IDs for all
supported networks, such as Windows and NetWare. (Users
specify the NetWare user information on Server Manager’s
NetWare Servers tab.) Rather than creating a network alias
for the DM service account for each library, DM Server
stores the network IDs for each supported network and uses
them to access the document servers on different networks.
The Fusion Network Aliases cache should be refreshed
whenever the NetWare Servers information is changed or
when Windows users are changed or disabled at the NOS
level.
• Library Information: Update the cache when you modify
group or user information. Also update the cache when you
change any library maintenance parameters.
• Object Schema Information: Update this cache when you
change forms, such as property names and their SQL
definitions on a form. If you change a form in DM
Designer, be aware that the form will not be changed in DM
Server until the cache is refreshed.
• SearchServer Index Information: This cache holds information
about a full-text index, including the DSN name and lists of
the column names (schema) and physical index names (for
multicomponent indexes). It also holds a pool of ODBC
connections to the index, which are used for searching.
Refresh this cache when you have made a change to the
CACHES TAB
51
database schema and want the change to be reflected in the
index. Refreshing the index closes all ODBC connections,
which can be useful when you want to stop the Indexer
server, although in general it is preferable to stop the DM
Server, if possible.
• User Information for Library: This cache contains the contents
of the PEOPLE table and related information such as user
default values in profile forms.
Because a single transaction may affect more than one cache, you
should use the Refresh All button.
The Clear Counters button resets the hit rate on the caches. Although
observing the hit rate may be useful in gauging library access through
DM Server, clearing the counters is not required.
HCS Server Tab
DM Server can communicate with a Hummingbird Core Services
(HCS) server to support the use of DM Webtop through Enterprise
Webtop. Through the HCS server, users can provide a single set of
logon credentials to access DM Webtop via their organization’s
Enterprise Webtop. When a user logs on to Enterprise Webtop, the
HCS server authenticates the user's Windows network credentials and
sends this information to DM Webtop for use when the user logs on to
DM Server.
Note: When applications such as DM Server and the Enterprise Workflow
Engine use separate HCS services, the CAP token validating the user’s logon
credentials from one HCS service cannot be validated by the other HCS
service unless one of the following is in place:
• When the Enterprise Workflow engine runs in an HCS cluster, the DM
Server must use one of the HCS services in the cluster.
• A trusted core service domain must be set up as described in the HCS
Administration Guide. (This may be the more flexible option for most
organizations.)
DM Server communicates with the HCS server via its internal HCS
Authentication Client, which is installed with the DM Server software.
The HCS server can be installed and configured on the same machine
as DM Server or on a different server on the network. The HCS Server
52
CHAPTER 1
tab lets you identify the server authenticating a user’s logon credentials
when the user accesses DM Webtop from Enterprise Webtop.
Server Name: Enter the name of the HCS server. The default name is
localhost.
Server Port: Enter the number of the port through which the logon
credentials will be sent. Port number expected by the HCS
Authentication Client provided with DM Server is 8765.
Click Apply to save this information in Server Manager.
Whenever the DM Server service is stopped and restarted, the HCS
server on the same machine is automatically restarted as well. If the
HCS service resides on a machine other than DM Server and the HCS
service is stopped and restarted, the DM Server service will
automatically be stopped and restarted after HCS token authentication
has taken place. Changes to the HCS server configuration can be made
from Server Manager or from Enterprise Webtop Administration Tools
HCS SERVER TAB
53
Security Management. The server where the changes were made must
be restarted to have the changes take effect.
Content Cache Tab
Note: This tab appears if the Content Cache license key was provided during
installation of DM Server.
Content caching helps reduce the transfer of document content over
wide-area networks, giving users who are remote from document
servers faster access to the documents they need.
When the content-caching feature is enabled and a user requests a
document, DM Server retrieves the document from the document
54
CHAPTER 1
server as usual, but it also stores a copy on a local share designated as
the content cache. Any edits made by the user are stored in the content
cache; they are also made to the document in the document server. The
next time the user requests the same document, DM Server retrieves it
from the content cache rather than from the document server, thus
eliminating transmission time across the WAN.
To ensure the user receives the latest version of the document, DM
Server verifies that the last write date on the two versions are the same.
If these timestamps do not match, because for example another user has
made subsequent edits to the document, DM Server retrieves the
document from the document server, rather than from the content
cache.
If the document on the document server has a status of checked-out,
due to being in use by another user, DM Server will retrieve the version
from the content cache if the last write dates of the two versions are the
same, but the document will be delivered in read-only format, as is
usual with checked-out documents.
Content caching is enabled via the Enable Content Cache check box on the
Content Cache tab. By default, content caching is disabled. When you
enable it, you must also designate a location where the cached
documents are stored.
Physical Location: The folder or share on the machine where cached
documents are stored.
Maximum cache size (MB): The maximum size of the content cache.
When the size of the cache exceeds this maximum size limit, the
oldest data files in the cache, based on the last access date, will be
deleted to free up needed space. The default value of this field is
500 MB. The current size of the cache is shown above the
Maximum Cache Size field.
Days to keep: The maximum number of days to keep a file in the
cache. If a file has not been accessed for this number of days, it
will be deleted from the cache. If this number is set to zero, files
are not deleted unless the maximum cache size is exceeded. The
default value for this field is zero.
Delete Files: Lets you delete all files currently held in the content
cache.
CONTENT CACHE TAB
55
When a user deletes a file from the repository, the cached document is
also deleted from the cache server.
If your DM system is set up in an FOLB cluster, changes to the contentcache settings are automatically propagated to all servers in the cluster.
When a new server is added to the cluster, the content-cache settings
are automatically sent to the new server.
Content-caching activity can be monitored by selecting the Logging
level Log Content Cache on the Preferences tab.
Content Cache Lazy
Write Feature
The cache server's synchronization of documents with the central DM
Server is transparent to users. For example, when users working in
remote sites save documents, the documents are immediately released
(while synchronization runs), instead of waiting for the documents to
be transferred back to DM Server.
To implement the Content Cache Lazy Write feature:
1. Click Start>Programs>Open Text>DM Server>DM Server Manager.
2. In DM Server Manager, click the Server State tab, and then
click Stop.
3. Using a SQL Query tool, run the content_cache.sql script
(located in \\Tools\DM Server) against all your DM
libraries. If the library owner is not DOCSADM, replace
DOCSADM in the SQL script with the name of the
database owner.
4. In DM Server Manager, click the Content Cache tab and
ensure that the Enable Content Cache check box is selected. In
the Physical Location field, specify a location for storage of
the Content Cache files. In the Maximum Cache Size field,
enter a number to limit the size of the cache. In the Days to
keep field, enter the number of days to keep the cached
files. Click Apply to save your settings.
5. Click the Server State tab and click Start to restart the DM
Server service.
6. Click Start>Run, type regedit, and then click OK.
7. In the Registry Editor, create the following registry key:
HKEY_LOCAL_MACHINE\SOFTWARE\Hummingbird\
DOCSFusion\Content Cache
56
CHAPTER 1
8. Enter a new string value: Lazy Write and set its value to
Enabled.
9. Select File>Exit.
Optionally, you can convert the following text into a registry file
(*.reg) and then use the regsvr32.exe executable file to place it into
your DM Server's registry file. Change the Location field to the location
you have selected to store the Content Cache files.
Lazy Write Registry File Example:
Windows Registry Editor Version 5.00
[HKEY_LOCAL_MACHINE\SOFTWARE\Hummingbird\DOCSFusion\
Content Cache]
Cache=Enabled
Max Size=dword:000001f4
Lazy Write=Enabled
Location=C:\content_cache
CONTENT CACHE TAB
57
Chapter
2
Using the DM Indexer
In This Chapter
This chapter explains how to set up and manage the DM Indexer for
full-text indexing of document libraries. Full-text indexing helps users
quickly locate documents by searching the document contents for
specified search terms.
Note: Information on performing full-text searches, including a list of search
operators, can be found in the online manuals Using DM Webtop and Using DM
Extensions.
59
About Full-Text Indexing
Content Searches
by Users
When users initiate a search for a document, they have the option of
performing a content search of the document and Document Profile.
Content searches, also known as full-text searches, allow users to search
the entire contents of documents and profiles stored in the DM
repository. Users can search on a word or a phrase. They can also apply
more complex search criteria, such as Boolean expressions, which
narrow the search to specific documents meeting those criteria.
Before a document’s contents can be searched, the document and its
profile must undergo a process called indexing. During this process, the
DM Indexer reads the document and profile, extracting information
about words in the document. This information is placed into an index.
When the user performs a content search, the index is scanned for
terms meeting the user’s search criteria. Upon completion of the scan,
a hit list is returned showing the documents matching the user’s query.
It is the DM administrator’s job to initialize the index for each library
and to monitor the indexing process to ensure smooth and efficient
operation.
The Indexing
Process
When a user saves a new document or saves edits to an existing
document, a table in the library (NEEDS_INDEXING) is updated to
reflect that the document needs indexing. During normal indexing
operations, the DM Indexer obtains this information from the library
and passes it, through the ODBC interface, to SearchServer.
SearchServer is the Open Text indexing/searching engine integrated
with DM.
SearchServer accesses the document, via one of several text readers that
translates the document into a format that SearchServer can interpret.
SearchServer scans the document, extracting information about words
in the document. The extracted information is stored first in a
temporary file called <index name>.DYX. User searches are performed
against both the index (the <index name>.REF file) and the DYX file,
which allows users to search against the latest index data available.
Periodically the data in the DYX file must be merged into the index
itself, in an operation called compression. The DM Indexer can be set
up to compress an index for you automatically or you can do it
manually. (See “Compressing an Index” on page 77 for more
60
CHAPTER 2
information.) During a compression, users can continue to search
against the index.
The preceding description describes the indexing process when the
indexer is running in immediate mode, when the queue of documents
in the NEEDS_INDEXING table is relatively manageable. However,
when the queue grows large, reaching 100 documents or more,
SearchServer can be configured to switch to a batch-indexing process
known as periodic mode.
In periodic mode, the indexer reads the documents, extracting some
metadata into the index, but it does not index the document contents,
so the documents queued for indexing are not available for searching
until the indexing queue is completely processed or the periodic-mode
compress count is reached. The periodic-mode compress count sets a
compression threshold within the periodic-mode indexing process.
When this threshold is reached, the periodic-mode indexing process
compresses the index. After this compression is performed, all
documents queued for indexing up to that point are available for
searching. When the indexing queue has been completely exhausted,
the index will switch back to immediate mode. The default value for
periodic mode’s compress count is 5000. This value can be adjusted by
modifying the following value in the registry:
HKLM\Software\Hummingbird\DOCSFusion\Indexer\
FSSInitialization\PeriodicCompressCount
Periodic-mode indexing is primarily intended to optimize the
initialization or reindexing of a document library, but by default it is
enabled and can run any time the queue of documents reaches 100. The
DM administrator can disable periodic-mode indexing in DM Server
Manager. (See “Modifying the Properties of an Index” on page 24 for
instructions.)
In addition to the REF and DYX files, the indexing process maintains
several system tables associated with the index.
What Is Indexed?
In Library Maintenance, the DM administrator can set documents to
be indexed based on Document Type. Users of the DM client can
override this setting when they edit the Document Profile by selecting
one of the options for Full Text Indexing.
ABOUT FULL-TEXT INDEXING
61
A document is indexed when the one of the options for Full Text Indexing
is selected on its Document Profile. Text fields on the profile, such as
Document Name and Description, are indexed as well.
The user can select one of the following options from the Full Text
Indexing field:
• Contents and Metadata
• Metadata Only
• No Indexing
Note: All text columns from the PROFILE table that are visible to users (such
as Document Name, and Abstract) are indexed by default. To index other
columns or customized columns, use DM Designer (see the option for this in
the column’s Properties).
The indexer is capable of indexing the following items:
•
the last version of a document
•
the last published version of a document
•
an indexable attachment
•
profile form fields
Sub-versions are not indexed.
By default, the last version of a document is indexed. However, if one or
more versions of the document have been published, the last published
version is indexed instead. But, if the document has indexable
attachments, the attachments are indexed instead of the last published
version or the last version of the document.
To be considered “indexable,” an attachment’s Document Type (such as
TXT) must be defined in the Attachments to Index feature in Library
Maintenance.
Note: Documents that are not indexed can be located using the other search
features on DM client search forms, such as searching by author name. See
Using DM Webtop or Using DM Extensions for information on the different
methods of searching for documents.
The Search Process
62
CHAPTER 2
When a user initiates a content search against the documents in the
library, the request is forwarded by DM Server to SearchServer.
Scanning the index for documents that match the search criteria,
SearchServer returns a list of documents—a hit list—to the user.
From the hit list, users can view the documents meeting the criteria.
The search terms are highlighted in the document display. Documents
can be displayed in DM Viewer, HTML, or the document’s native
format (for example, Microsoft Word). Documents on the hit list can
also be launched in their native application.
System Requirements for Indexing
This section describes how your supporting system must be set up to
create an index and run the DM Indexer.
The Indexer Server
Because the indexing process—particularly the initial indexing of all
existing documents in a library—consumes significant resources, we
strongly recommend that it be run on a dedicated DM Server (an
Indexer server). In this configuration, the index(es) is created on the
Indexer server and shared with the DM Server that is handling the
general stream of user requests.
Note: A single library cannot have more than one shared index on an Indexer
server.
If you have a cluster of DM Servers for failover and load-balancing
purposes, the Indexer server should not be a member of the cluster. The
cluster servers can be set up to access the index(es) on the Indexer
server.
The Indexer server should be configured to connect to all network
resources—that is, all document servers and libraries—for the libraries
they are indexing. The Indexer should not be in a different domain than
either the library or document servers. In segmented networks, the
indexer should be in the same segment as the library and document
servers.
To ensure adequate and consistent throughput, the Indexer server
should be on the same switch or hub as the library and document
servers. Physical requirements for connectivity hardware are dependent
on factors such as number of users, average size of the documents to be
indexed, and network architecture.
If anti-virus software is installed on the Indexer server, all index files
must be excluded from the scan.
SYSTEM REQUIREMENTS FOR INDEXING
63
The number of Indexer servers needed to support indexing depends on
the number and complexity of your documents. Assuming sufficient
processing resources, a single Indexer server may be adequate to handle
all indexing, even if your organization has multiple libraries and
maintains multiple indexes for each library.
A dedicated Indexer server is a must where indexing activity is high. But
if the recommended configuration is not ideal for your organization,
here are some alternatives with their respective pros and cons.
•
If having a dedicated Indexer server on a permanent basis is
not feasible, we recommend you temporarily dedicate a DM
Server to the initialization of the index. The server should be
taken out of production until initialization of the index is
complete. The disadvantage here is that initialization is not
usually a one-time operation. Indexes occasionally must be
reinitialized and reindexed, sometimes from scratch. If you
don’t have a dedicated Indexer server, you will have to
remove the DM Server from server from production again.
•
If you have a cluster of DM Servers and handling user
searches has a high priority, you can set up an index for each
library on each server in the cluster. The indexes are not
shared; each DM Server runs its own Indexer for its own
index.
The advantages here are two-fold: (1) if a server goes down,
users are still able to search against a current index, and (2)
provided that the indexes are not being changed frequently,
network traffic is minimal because there is no accessing of a
separate Indexer server.
The disadvantages include: (1) hardware (processor and
storage) requirements increase, (2) indexing a new or edited
document causes duplicate activity on each server and
increased network traffic, and (3) there may be brief periods
(a few seconds) when the indexes are not in sync, which may
cause problems with load balancing.
The index(es) and their associated files must be stored on the DM
Server where the DM Indexer is running, whether it is a dedicated
Indexer server or a DM Server that also handles user requests.
Note: If the machine being used to store the index files is a Windows 2003
server, the DM administrator will need to set write permissions for the index
directory, because shared directories are shared as "read-only" by default.
64
CHAPTER 2
Hardware and
Software
The disk space required includes not only the index files themselves,
but also temporary space needed during processing. The size of an
index depends primarily on the size of the repository, but it can also be
affected by the indexing options you select when setting up the index.
For example, the method of wildcard optimization can have an effect
on index size. (See “Using Wildcards in Searches” on page 81 for more
information.)
Memory requirements can vary widely. They are affected by the size of
the repository as well as the complexity of the documents. A rule of
thumb is 1 MB of memory for every 1,000 documents.
For optimum performance, ensure that the Indexer does not have to
compete with other processes on the same machine. We recommend
you clear the Indexer server of other software, especially unneeded
drivers and other processes that require processor time or input/output
bandwidth.
We also recommend that the Indexer server be equipped with an
uninterruptible power supply (UPS) to prevent corruption of indexes
in the event of a power failure.
The Internal User
for Indexing
Activities
The DM Indexer and SearchServer access documents in the repository,
so they must have read-only access (at a minimum) to all document
files. To handle these indexing activities, you can create a dedicated user
account in the DM library. The account should not be used for enduser activities.
Note: If you do not designate an internal user, the default internal user created
during generation of a new library will be used for indexing and preview
generation. The user name of the default internal account is INTERNAL. This
account has no network alias and is a member of only one library group:
DOCS_SUPERVISORS.
We recommend that this internal user be created as a DM library
Attache account with an Attache password and no network alias. This
user need not be created at the NOS level nor be a member of any NOSlevel groups.
However, if your organization requires all users to log on to DM Server
with a network account aliased to their DM user ID, an Attache account
that has no network alias cannot serve as the internal user. (Note that
the Network Alias Required option on Server Manager’s Preferences
tab controls whether non-network users can log on to DM Server.) In
SYSTEM REQUIREMENTS FOR INDEXING
65
this case, you will need to create the internal user at the NOS level and
add this account to the network DOCS_USERS and
DOCS_SUPERVISORS groups. This internal user account can be used
across multiple domains. If the account has multiple network aliases:
•
Each alias must have the same password.
•
On Server Manager’s Preferences tab, the option Default
Password must be selected.
The recommended configuration is to have only one Windows network
alias; this will not prevent the Indexer from accessing documents
located on other networks.
Regardless of whether the internal user is an Attache account or a
network alias, its primary group in the library should be
DOCS_SUPERVISORS with the universal file access of Read (at a
minimum).
Once the internal user has been created, it must be identified to DM
Server. There are two ways to do this:
•
Via the Indexer Configuration Wizard, which can be run
from the Start menu.
•
On the Indexer server, via Server Manager on the Internal
User tab. See “Internal User Tab” on page 36 for instructions.
Note: Documents that use application-specific security cannot be accessed by
the Indexer. For example, if a password is applied to a Microsoft Word
document, the document cannot be indexed.
Creating an Index and Putting it into Production
The following instructions explain how to create an index and make it
available to users for searching. We assume that the index is maintained
by a dedicated Indexer server and will be accessed by users via a cluster
of DM Servers that handle user requests.
Identifying the
Index Location
66
CHAPTER 2
Before you can create an index, you need to identify where the index
files will be located. The default location for the index is C:\Documents
and Settings\All Users\Application Data\Open Text\DM Indexes .
This location is not mandatory, however; you can locate the index on
any local drive on the Indexing server.
If you have multiple indexes, and you want to be able to back them up
separately, we recommend you create a separate directory for each
index.
Note: If the machine being used to store the index files is a Windows 2003
server, the DM administrator will need to set write permissions for the index
directory, because shared directories on Windows 2003 are shared as "readonly" by default.
Creating a New
Index
A new index can be created using Server Manager or the Indexer
Configuration Wizard. This section explains how to create indexes
using Server Manager. For instructions using the wizard, see the
chapter on creating an index in the DM Installation Guide. Regardless
of the method you choose, the end result is the same.
Note: Prior to creating a new index, you must create an internal user account
and provide the SearchServer user name and password to DM Server. See
“The Internal User for Indexing Activities” on page 65 for instructions.
To create an index:
1. On the Indexer server, start Server Manager and select the
SearchServer Indexes tab.
CREATING AN INDEX AND PUTTING IT INTO PRODUCTION
67
2. Click Add Index.The Add Index dialog box appears.
68
CHAPTER 2
3. In the left pane, select the library you want to create the
index for. A check mark appears in the box next to the
library name, and the Add button is enabled.
Note: If your library does not appear in the Add Indexes Libraries list, it is not
a selected logon library for your DM Server, which is required for indexing.
Libraries that appear at the top tree level on the Libraries tab in Server
Manager or the Select Libraries dialog in DM Server Configuration Wizard are
valid for logon and have a Library section in the PCDOCS.INI specified for use
by the DM Server.
4. Click Add. The index is added to the right pane with the
name <library name> Index.
CREATING AN INDEX AND PUTTING IT INTO PRODUCTION
69
5. Select the index and click Properties to define the properties
of the index. The Index Properties dialog box appears with
the Location & Sharing tab active.
Index Name: If you want to change the default index name,
modify the name in this field.
Data Source Name: By default, DM Server assigns an index a
data source name in the format <library
name>_<number>.
Path—Default: Select Default to store the index in the default
location, which is C:\Documents and Settings\All
Users\Application Data\Open Text\DM Indexes. To store
the index in a different location, clear the Default check box
and then enter the Path. See “Identifying the Index
Location” on page 66 for index-location requirements.
Remote—Shared: The option you select here depends on
whether you are running Server Manager from the Indexer
server or from a DM Server that handles requests from
client applications.
70
CHAPTER 2
Select Shared if the Indexer server is the local machine and
users will be accessing the index via other DM Servers or
KM. Then select the appropriate Network Protocol and Port so
that users accessing the local server can locate the index. The
port cannot be used by other indexes on the server or by
other software using the network. For Named Pipes, the
port is the name of the pipe (for example, ftnet). For TCP/
IP, the port is the TCP port number (for example, 3048).
The TCP\IP port number cannot be in use on the local
system. (To determine the port numbers in use, run
NETSTAT at a command-line prompt.) Normally, anything
higher than 5000 is a usable port number.
Note: Once a port number has been assigned to an index, it cannot be used
again until you run \SSK\BIN\FTSVCADM.EXE to remove unused port
numbers. (Do not remove port number 16547; it is used by DM Server.) After
removing the ports, restart the DM Server service. At this point, you can then
add a new index with the previously used port number.
The Remote option is automatically selected if you create a
shared index on one server and are viewing the properties of
that index on another server.
Note: A single library cannot have more than one shared index on an Indexer
server.
CREATING AN INDEX AND PUTTING IT INTO PRODUCTION
71
6. Click the Index Properties tab.
Language: Select the language of your documents and
profiles. If your documents are in a language other than the
choices listed here or you are not sure what to choose, select
Other.
The Unicode option lets you create an index containing
information for documents of various languages instead of
targeting a specific language. The Unicode option defaults
to a character set value of UTF8. The advanced linguistics
properties available for other languages are not supported
by the Unicode option. See “Multilingual Indexing and
Searching” on page 443 for more information.
Advanced: This button invokes the Advanced Index
Properties dialog box. When you select a language, most of
the advanced properties are modified to the defaults for the
language. A description of the advanced index properties
begins on page 28.
72
CHAPTER 2
Compress Index: When a new document is created or a
document is changed, SearchServer indexes the new data in
a temporary file called <index name>.DYX. User searches are
performed against both the index and the DYX file until the
DYX file is merged into the index. The Compress Index option
performs the merge operation.
To schedule a regular weekly compression of the index,
enter a day and time in the fields provided. To compress the
index every day, select the option Daily and enter a time. The
Indexer will automatically be stopped while the index is
undergoing compression, so no new documents will be
indexed. But users will be able to search against the index
during that time.
For most organizations, a weekly compression of the DYX
file will be sufficient. If you notice that indexing and
searching are slowing down, consider compressing the file
daily rather than weekly.
See “Compressing an Index” on page 77 for more about
compressing indexes.
Schedule Backup: This option lets you schedule a time when
the Indexer pauses for system backups or regularly
scheduled maintenance. While the Indexer is paused,
documents are not indexed, but users may continue
searching against indexes. You can schedule the pause on a
daily basis (Daily) or on a specific day of the week. In the At
field, select the time when you want the Indexer to pause.
Note that if the Indexer is indexing a batch of documents or
compressing the index, it will complete these operations
before pausing for the backup. So we recommend you
schedule the pause approximately 30 minutes prior to the
backup, to give the Indexer time to finish.
In the Backup Duration field, select the number of
hours—between 1 and 24—to pause the Indexer. It is
important to allow sufficient time for backups to
finish. We recommend you monitor the time required
for backups and adjust the Backup Duration value as
necessary so the Indexer does not resume processing
while the backup is still running.
If you don't want to pause the Indexer during backups,
select Never in the Schedule Backup field.
CREATING AN INDEX AND PUTTING IT INTO PRODUCTION
73
6.1 Click the Log File tab.
The index log contains a record of indexing activities,
including:
•
Times when the index was started and stopped.
•
Times when the index paused for a backup and when it
resumed indexing after the backup.
•
Times when the index was compressed.
•
A list of the documents being indexed by document
number.
•
Any errors that occurred during indexing.
To disable index logging:

Clear the Log Enabled check box.
To specify the log file location:

Click the Log File lookup button (...), select the desired save
location, and click Select.
To open the log file:

74
CHAPTER 2
Click the Open with Notepad button.
To obtain the latest indexing information:

Click the Refresh button.
Log Enabled: By default, logging of index activities is turned
on. To disable logging, clear this check box.
Log File: By default, the log file is located in the folder
C:\Documents and Settings\All Users\Application
Data\Open Text\DM Indexes\<library name>\<index
system ID>\<index name>.xlg. To locate it elsewhere, enter
the path name here.
Open with Notepad: Allows you to open the log file for
editing.
Refresh: Allows you to refresh the log file to obtain the latest
indexing information.
7. Click Apply to have any changes you made take effect.
8. When the properties are set up, click OK to return to the Add
Index dialog box. Click OK to return to the SearchServer tab;
then click Apply or OK to create the index.
The new index is initialized and ready to begin indexing documents.
Note that the initialization process sets up the index files and creates all
the index tables. It does not index documents. When the index is
started, it will begin indexing documents.
Starting an Index
To start an Index:
1. Go to the SearchServer Indexes tab.
2. Highlight the new index and click Start. The Indexer begins
indexing documents.
3. Check the index properties log file and verify the Indexer is
running.
Select Indexes for
Searching
The DM Server(s) that handle user requests are given access to an index
via Server Manager's Libraries tab:
CREATING AN INDEX AND PUTTING IT INTO PRODUCTION
75
1. On the Libraries tab, click to put a check mark next to the
library you want users to be able to search. Then highlight
the library name and click Properties.
2. On the Library Properties dialog box, click Add.
3. On the Select a Full-Text Index dialog box, highlight the
index to be used for searching and click OK.
4. Repeat steps 1 through 3 for any additional libraries.
5. On the Libraries tab, click Apply.
Note: If you have remote libraries, each remote library combination in the
Library list must have at least one index selected.
Multiple Indexes
for a Single Library
If you have multiple indexes for a library, you can select up to 10 indexes
for user access.
When employing multiple indexes, you have two options:
•
76
CHAPTER 2
Using all the indexes in a round-robin fashion to improve
search performance. In this mode, the first search request
goes to the first index in the list, the second request to the
second index, and so on, until the end of the index list is
reached, and the first server accepts another request.
•
Using a single index as the primary index and the others as
backups in case the first index is not available. In this mode,
when the primary index fails, search requests go to the next
index in the list until the primary index returns to service.
An index might become unavailable because:

The Indexer server is down.

Connectivity problems between the DM Server and the
Indexer server prevent communications.

The service called Open Text eDOCS DM Remote Indexer on
the Indexer server is stopped.

The index files have been deleted from the Indexer
server.
For instructions on selecting one or more indexes for library users, see
“Full-Text Index for Library Users” on page 17.
Monitoring and Managing an Index
Index States
Compressing an
Index
An index will be in one of four possible states:
•
Initialized — An entry for the index has been created in the
library, but documents have not been indexed yet, so the
index is not available for searching.
•
Started — The index is available for searching and for
indexing of new and revised documents.
•
Stopped — The index is available for searching, but it is not
available for indexing of new and revised documents.
•
Paused — The index is available for searching, but it is not
available for indexing of new and revised documents
because the DM Indexer is paused for system maintenance.
When the DM Indexer resumes operation, the index will be
available for indexing.
When a new document is created or a document is changed,
SearchServer indexes the new data in a temporary file called <index
name>.DYX. User searches are performed against both the index and
the DYX file until the DYX file is merged into the index. The Compress
Index option in Server Manager merges the index with the DYX file.
MONITORING AND MANAGING AN INDEX
77
The index should be compressed before the DYX file exceeds a few
hundred megabytes—preferably well before the file grows that large.
Typically, the DYX file is twice as large as the size of all new or edited
documents, so the DYX file can grow quickly in organizations where
numerous documents are edited on a daily basis. The size of each
index’s DYX file is displayed in Server Manager on the SearchServer
Indexes tab.
The index compression can be scheduled to occur automatically on a
weekly or daily basis, and we encourage you to set a schedule for this
important maintenance task. Compression can also be done manually
whenever it appears that the DYX file is growing so large that it is
affecting indexing and searching performance.
To schedule a regular compression of the index, follow the instructions
on page 14. The Indexer will automatically be stopped while the index
is undergoing compression, so documents will not be indexed. User
searching can continue during a compression.
We recommend that you monitor the size of the DYX file, particularly
when creating a new index. If the file grows so large that it affects
performance, follow the instructions on page 32i to manually compress
the index. If you find yourself doing frequent manual compressions, set
up the automatic compression to occur daily rather than weekly.
Reindexing an
Index
The reindexing process builds the index—either by indexing the entire
DM repository or reindexing documents that were indexed between a
specified date and today. You need to reindex the index when you want
to:
•
Rebuild an index. Rebuilding may be necessary if the index
is damaged in some way. Or it may be required when a new
release of DM upgrades the SearchServer software. (If this is
the case, the release notes accompanying DM will advise you
to rebuild the index.)
•
Bring an index up to date after restoring a backup of the
index.
If you are reindexing because you believe the index has been lost or
damaged, you should restore the index from a previous day’s backup
and reindex only from the backup date. See “Restoring an Index from
a Backup” on page 80 for instructions.
78
CHAPTER 2
To reindex an index:
1. On the SearchServer Indexes tab, select the index you want to
reindex.
2. In the Maintenance box, select one of the following
reindexing options:
Everything to reindex the entire repository (except those
documents for which Full Text Indexing is not selected on the
Document Profile).
From and a date to reindex from the specified date.
The Indexer will reindex all documents that were indexed
between the From date and today, inclusive. This includes
new documents plus existing documents that were indexed
during the specified time period.
3. Click Re-Index. When the index is ready for use, you will see
“Initialized” in the Status field.
Administering an
Index from a
Different DM
Server
Pausing the
Indexer for System
Backups
An index can be set up and, to some degree, administered from Server
Manager running on a DM Server other than the server where the index
is located. To perform the following operations, you must be running
Server Manager on the server where indexing is performed:
•
Starting and stopping the Indexer.
•
Reindexing an index.
•
Compressing an index.
The Indexer should be paused before a system backup is started and
remain paused during the course of the backup. Once the backup is
finished, the Indexer can be restarted. While the Indexer is paused,
users can perform searches, but no indexing of new and edited
documents is performed.
The Indexer can be set up to automatically pause at an appointed time
when backups are scheduled. Note that if the Indexer is indexing a
batch of documents or compressing the index, it will complete these
operations before pausing for the backup. So we recommend you
schedule the pause approximately 30 minutes prior to the backup, to
give the Indexer time to finish. See Modifying the Properties of an
Index for instructions.
MONITORING AND MANAGING AN INDEX
79
Backing Up an
Index
To back up an index:
1. Stop the Indexer by going to DM Server Manager on the
Indexer server and selecting Stop on the Server State tab.
2. Check the indexer log files to verify that if the index is
compressing, the compression process has been completed
successfully. Do not proceed with the next step until
compression is finished.
3. Shut down the Open Text eDOCS DM Remote Indexer and
Open Text eDOCS DM Server services.
4. Back up all files in the index folder.
5. Make a backup of the SQL database or make a copy of all
data in the VENDOR_SPECIFIC column. A field in this
column—MULTIIDX—contains the first document
number of each index partition, which is needed to fully
restore the index.
6. Restart the Open Text eDOCS DM Remote Indexer and
Open Text eDOCS DM Server services.
7. Restart the indexer server.
Restoring an Index
from a Backup
To restore an index from a backup:
1. Stop the DM Server service by going to the Server State tab in
Server Manager and clicking Stop.
2. If the index is on a dedicated Indexer, stop the Open Text
eDOCS DM Remote Indexer Server service by going to
Control Panel>Services and stopping the service.
3. Restore the backup to the index directory.
4. When the restoration is finished, restart the Open Text
eDOCS DM Remote Indexer Server service.
5. Restart the Indexer by going to Server Manager’s Indexing
tab and clicking Start.
6. Reindex the index from the date of the backup. See
“Reindexing an Index” on page 78 for instructions.
Monitoring
Indexer Activities
When the Indexer is running, you can monitor its activities by checking
the index properties log file in Server Manager. In addition, you may
want to check four counters for the DM Server in the Windows
Performance Monitor:
80
CHAPTER 2
Full Text Deleted Documents/Sec: When a document is deleted
from the repository, the Indexer deletes its entries from the index.
This counter indicates how many sets of entries are being deleted
per second.
Full Text Indexed Documents/Sec: Indicates how many
documents are being indexed per second. After you start the
Indexer in Server Manager, check this counter to verify the Indexer
is running.
Full Text Indexing Failures/Sec: Indicates how many documents
per second the Indexer was unable to index. Failures can occur
when a document’s format is unknown and the Indexer is unable
to read it or when the Indexer cannot open a document for some
reason. If you notice a larger number of failures than usual, the
problem may be due to network problems, corrupted documents,
or the failure of a DM Server in the cluster.
Indexer Thread Count: For each index to be indexed, DM Server
creates an Indexer thread. This counter indicates how many
threads are running.
Deleting an Index
See “Deleting an Index” on page 23 for instructions.
Using Wildcards in Searches
A wildcard is a character in a search term that represents one or more
characters that are not specified. SearchServer supports two wildcard
characters:
•
the question mark (?) represents a single character.
•
the asterisk (*) represents any number of characters
(including no character).
Wildcard use can have a significant negative impact on search
performance, particularly in the following cases:
•
If the search term contains both leading and trailing
wildcard characters (for example, ?abc*).
•
If the search term contains a leading wildcard character.
To improve performance, SearchServer provides three wildcard
optimization methods:
USING WILDCARDS IN SEARCHES
81
MINIMIZE_SEARCH_TIME: This method maximizes search
performance at the expense of indexing time and index size.
MINIMIZE_INDEX_OVERHEAD: This method minimizes
indexing time and index size. The search performance is nearly as
good as with the MINIMIZE_SEARCH_TIME method, except for
search terms containing both leading and trailing wildcard
characters.
NONE: No wildcard optimization is set. Performance against
search terms containing both leading and trailing wildcard
characters is substantially reduced.
Wildcard optimization is defined in Server Manager. See page 28 for
instructions on setting this option.
Using Stopwords to Speed Searching
A stopword is a word ignored by the DM Indexer. When users perform
content searches against stopwords, or phrases containing stopwords,
the Indexer does not search against those words. However, it does
search against the other words in the search phrase and returns a hit list
of the matches against the non-stopwords.
Designating stopwords can speed up searches, because it reduces the
number of entries in the index. Words such as and, the, and of are
typical stopwords.
DM provides a standard stopword list for each supported language. To
add words to the list, edit the file. The stopword lists are located in
\Program Files\Open Text\DM Server\SSK\Fultext. Look for the file
<language>.STP, where <language> is your language. We recommend
you call Open TextTechnical Support before changing a stopword list.
Changing the stopword list automatically invokes reindexing of the
repository. This means that all documents are reindexed under the new
stopword list, a process that could take some time. Before changing the
stopword list, you should determine whether the modifications are
worth the time and resources required to reindex the repository.
82
CHAPTER 2
Configuration Options for Full-Text Indexing
DM Server
Manager
Two settings on Server Manager’s Results tab affect full-text search
results returned to users.
Maximum size (KB) controls the maximum size, in memory, of
results sets. The idea here is to prevent a single search execution
from consuming too much server memory.
Maximum total size (KB) specifies the total amount of memory
that can be used for caching. This takes into account the
maximum size for each set of search results. The setting can affect
the number of search results users receive.
Note that the values shown above are the default values. These values
can be increased, depending on the total physical memory available on
the server, but they should not be reduced below the default values.
In situations where multiple DM Servers are employed, with one a
dedicated indexer server, the server that is designated as the "primary"
is the server where changes to results set settings should be made. If
your organization uses FOLB, the changes should be made to both the
"primary" and "secondary" DM Servers in the cluster.
DM Webtop
In DM Admin, the setting called Use Standard Search Routines is disabled
by default to allow for optimized searches across the Web. This may
result in smaller search-result lists for DM Webtop users than for users
of DM Extensions. If you enable User Standard Search Routines, you will
turn off optimization and thus increase the number of search results for
DM Webtop users; however, the return of search results may take
longer. (The setting is in DM Admin>DM Webtop Maintenance>DM Webtop
Parameters.)
DM Extensions and Integrated Applications
The Quick Search List setting in the Implementation Tool controls the
maximum number of items in search-result lists for users of the DM
Extensions and integrated applications. If users want to receive more
than the default number of search results, this setting can be increased,
but keep in mind that the number of search results can also be
constrained by the maximum results-set size specified on Server
CONFIGURATION OPTIONS FOR FULL-TEXT INDEXING
83
Manager’s Results tab. The number should not be reduced below the
default value.
Hybrid Searches
The hybrid search feature changes the way in which the INDEX table
uses metadata when performing a hybrid search (a search that contains
both profile and content search criteria).
SQL scripts and Windows registry scripts for applying these changes to
your system can be found in \Tools\DM Server\Profile-Content
Search.
We recommend that you contact technical support for assistance in
applying this enhancement to your system.
To apply the index table changes:
1. Set the FULLTEXT flag for all metadata columns.
All metadata columns that are to be indexed must have their
FULLTEXT flag in the DOCSADM.DOCSCOLUMN table
set to Y. This can be done through DM Designer or through
SQL scripting.
Two sample SQL scripts are provided to set the FULLTEXT
flag for subsets of metadata columns that are candidates for
indexing:
• INDEXED_COLUMNS_DM.SQL is for use with basic
DM systems.
• INDEXED_COLUMNS_RM.SQL is for use with RM
systems.
Select and run the appropriate script for your system.
The following scripts are provided for Oracle environments
as of DM 5.2:
• Oracle_indexed_columns_dm.sql is for use with basic
DM systems.
• Oracle_indexed_columsn_rm.sql is for use with RM
systems.
Select and run the appropriate script for your system.
2. Map metadata columns to index columns.
84
CHAPTER 2
Indexed metadata columns must be mapped to a
corresponding index table column. The column mapping is
maintained under the
HKLM\Software\Hummingbird\DOCSFusion\Indexe
r\
FSSInitialization\Mapping registry key.
Two sample registry script files are provided to set up the
index column mapping information:
•
INDEXED_COLUMN_MAP_DM.REG is for use with
basic DM systems.
•
INDEXED_COLUMN_MAP_RM.REG is for use with
RM systems.
The registry mapping information must be applied to the
indexing server and all DM Servers that will be executing
search requests.
Select and run the appropriate registry script for your
system.
3. Refresh the DM Servers schema cache.
4. Shut down and restart all DM Servers and indexing servers.
This step is required to clear all of the cached schema data
from the server caches.
Failure to perform this step will result in the failure for
the index table schema to be properly defined, as well
the inability for the search process to properly map
metadata columns to index columns.
5. Create and populate the index.
This step is required to set the metadata information in the
index. An existing index can be used, but it must be
completely reindexed for the metadata information to be
populated.
6. Enable the new hybrid search enhancement.
Two registry script files are provided to enable or disable the
new hybrid search enhancement:
•
ENABLEHYBRIDSEARCH.REG enables the new hybrid
search enhancement.
•
DISABLEHYBRIDSEARCH.REG disables the new
hybrid search enhancement.
HYBRID SEARCHES
85
The hybrid search enhancement must be enabled on all DM
Servers that will be executing search requests. It is only
necessary to enable the hybrid search functionality on the
indexing server if it will also be processing search requests.
Select and run the registry script to enable or disable the
hybrid search enhancement.
Technical Notes
Searches that combine profile and full-text content search criteria tend
to perform poorly, especially when the full-text content criteria are not
well defined. For example, a search for a particular author from the
profile criteria and the full-text criteria “banking” may take several
minutes to return results. Further definition of the full-text criteria can
improve performance by narrowing the search. For example, searching
for “federal banking rules” would improve performance over simply
searching for “banking”.
The hybrid search enhancement improves search performance by
indexing additional document metadata in the index table.
Changes Made By
the Hybrid Search
Enhancement
Indexed Metadata
86
CHAPTER 2
The hybrid search enhancement makes the following changes to the
DM system:
•
The column definition for each selected metadata property
has its FULLTEXT flag set to Y in the DOCSCOLUMNS
table.
•
The SQL path for each criteria property is mapped to an
index column name.
•
The index column mapped to the SQL path of the criteria
property is added to the index table schema.
•
The enhanced hybrid search functionality is enabled with a
Windows registry setting.
The forms LAWQBE and PD_EPROF were chosen as guidelines for
identifying metadata columns whose usage makes them candidates for
indexing. The SQL paths for the identified columns and their assigned
or recommended index column names are shown below. The mapping
of the SQL paths to index column names is maintained within the
Windows registry.
Column Name
SQL Path
DOCNAME
TITLE *
ABSTRACT
SUMMARY *
LAST_EDIT_DATE
MODIFIED *
KEYWORDS_DISPLAY
KEYWORDS *
AUTHOR.FULL_NAME
AUTHOR *
DEFAULT_RIGHTS
PD_SECURED *
APPLICATION.APPLICATION
PD_APPLICATION
AUTHOR.USER_ID
PD_AUTHOR_ID
TYPIST.USER_ID
PD_TYPIST_ID
TYPIST.FULL_NAME
PD_TYPIST_NAME
DOCUMENTTYPE.TYPE_ID
PD_TYPE_ID
LAST_EDITED_BY.FULL_NAME
PD_LAST_EDITED_BY_NAME
LAST_EDITED_BY.USER_ID
PD_LAST_EDITED_BY_ID
MATTER.CLIENT_ID.CLIENT_ID
PD_CLIENT_ID
MATTER.CLIENT_ID.CLIENT_NAME
PD_CLIENT_NAME
MATTER.MATTER_ID
PD_MATTER_ID
MATTER.MATTER_NAME
PD_MATTER_NAME
PD_ADDRESSEE
PD_ADDRESSEE
PD_EMAIL_BCC
PD_EMAIL_BCC
PD_EMAIL_CC
PD_EMAIL_CC
PD_ORGANIZATION
PD_ORGANIZATION
PD_ORIGINATOR
PD_ORIGINATOR
PD_FILE_PART.PD_FILE_NAME
PD_FILE_NAME
HYBRID SEARCHES
87
Column Name
SQL Path
PD_FILE_PART.PD_TITLE
PD_FILE_PART_TITLE
PD_FILE_PART.PD_PT2LOC_LINK.
PD_LOCATION_CODE
PD_LOCATION_CODE
* Indicates columns that, by default, are already included in the index
table. Certain functions within the overall DM system rely on having
these columns in the index table. These default columns must not be
removed from the index.
Storing Foreign
Keys
Due to the volatile nature of some metadata values, such as user names,
the metadata storage mechanism does not actually store the metadata
value for foreign columns; instead, the mechanism stores the SQL row
key column value. PROFILE table columns are still stored by value.
During the search process, foreign table search properties are resolved
to the appropriate foreign table row key value.
Effect on Search
Strings
When the hybrid search enhancement has been applied, metadata
criteria will be applied to the index table SELECT statement WHERE
clause as an AND conditional, where the specified criteria value must be
equal to the value in the index table row. For example:
WHERE CONTENT CONTAINS 'search term' AND
PD_AUTHOR_ID='1001'
As mentioned above, the SQL row key values are stored for indexed
foreign table metadata; thus, this example shows the WHERE conditional
for the PD_AUTHOR_ID column resolving to the DOCSADM.PEOPLE
table SYSTEM_ID column value instead of the USER_ID column value.
Troubleshooting Index Problems
Viewing the Index
Log File
The index log file contains an entry for each action performed by the
Indexer against an index. It lists the document numbers of the
documents that have been indexed, any errors that occurred, and times
when the Indexer was started and stopped.
Each index has its own log file—<index name>.XLG—stored in the
same folder as the index files.
88
CHAPTER 2
The log file can be accessed when the Indexer is running or stopped. To
view the log file, run Server Manager and select the SearchServer Indexes
tab. Select the index, click Properties, and select the Log File tab.
For problems when setting up an index, you should also check the
Windows event log.
For problems when compressing an index, check the compression
log—<index name>.LOG—stored in the same folder as index files. To
view this log, open it in any text editor.
Disabled SearchTerm Highlighting
If an indexed document is modified and the index is not updated
(because the Indexer is not running), the document is displayed
without search-term highlighting (Viewer or HTML rendition).
Depending on the client application, the user may receive a warning
that highlighting is disabled. Advise your users that this condition will
disappear once the Indexer is restarted.
Users Unable to
Search
If the index has been reindexed and started, verify that the index is
selected in Server Manager on the DM Server that users are accessing.
See “Full-Text Index for Library Users” on page 17 for instructions.
Check the size of the DYX file (noted on the SearchServer Indexes tab
in Server Manager). If it is larger than a few hundred megabytes,
manually compress the index. If this happens frequently, or you notice
that searching and indexing are getting progressively slower, consider
setting up the Indexer to compress the index on a daily basis.
Problems with
Shared Indexes
This can be indicated by a message stating that a network operation has
failed. If the DM Server(s) is sharing an index located on an Indexer
server, verify that the network protocol and port defined on the Index
Properties dialog box are correct and that the port is unique on the
Indexer server.
Because the DM Servers that handle user requests act as clients to
SearchServer, the Open Text eDOCS DM Remote Indexer Server service
must be running on the Indexer server. This should happen
automatically, but if you have connection problems, verify that the
service is started:
1. On Windows Indexer servers, click
Start>Settings>Administrative Tools>Services.
2. Start the DOCSFusion SS Server service, if necessary.
TROUBLESHOOTING INDEX PROBLEMS
89
FulCreate Is Not a
Writable Directory
If you get this message, verify that you have the proper access rights set
up for the index location. See “Identifying the Index Location” on
page 66 for instructions.
No Such File or
Directory
This message appears when the index location you have specified has
not been set up. See “Identifying the Index Location” on page 66 for
instructions.
Unable to Save
Index
This message appears when you try to create a second shared index for
a library. A single library cannot have more than one shared index on
an Indexer server.
Document File Formats Recognized by the Indexer
The DM Indexer uses technology from the viewer application Outside
In by Stellent to identify file formats. Outside In recognizes more than
200 file formats.
If Outside In fails to recognize a file format, the document is indexed as
a text file, but only if it passes the following text-file test:
•
The first 4-KB portion of the file is scanned for one or more
NULL characters (hex 00).
•
If this portion of the file contains NULL characters, it is not
a text file and it is not indexed.
For a list of supported file formats, consult Oracle’s web site at the
following location: http://www.oracle.com/technology/products/
content-management/oit/ds_oitFiles.pdf.
90
CHAPTER 2
Chapter
3
Document Access and Security
In This Chapter
This chapter describes how users access documents in the DM
repository and how DM protects documents from unauthorized access.
It also explains how to implement DM security at your site.
91
An Overview of DM Security
All DM client-user requests for documents, folders, and searches are
handled by the DM Server service. When DM Server receives a user
request, it accesses the DM library and verifies that the user’s logon
credentials (user name and password) are those of a valid library
member. Then DM Server determines if the requested operation can be
carried out.
The DM Server accesses the library using the common SQL logon
account specified during library generation. Access to documents in
document servers is handled by the DM Server service account.
In general, user requests fall into three categories:
Searching for documents. If the user is a library member, his search
request will then be performed against documents in that library.
Operations on documents such as storage and retrieval. After verifying
that the user is a library member, DM Server checks the library’s
security information to verify that the user has rights to perform
the requested operation on the document. If such rights exist, DM
Server accesses the document server and performs the requested
operation.
The logon credentials can also be passed to the network operating
system to verify that the user has rights to network resources.
Access to Document Profiles. After verifying that the user is a library
member, DM Server checks the library’s security information to
verify that the user has rights to view or edit the profile and then
performs the operation.
To determine a user’s rights, the DM Server service checks these settings
in the library:
92
CHAPTER 3
•
The document’s or folder’s access-control list (ACL), which
is part of the Document Profile specifying who can access
the document and the operations they can perform. (ACL
security is sometimes called “discretionary security.”)
•
The permissions granted to the user’s primary group in the
library. (Security applied to members of a group is
sometimes called “role-based security” or “exclusionary
security.”)
A user’s effective rights are a combination of his or her individual rights
on the document’s ACL and the rights of his or her primary group.
Most group permissions do not overlap with the ACL rights, but in the
case of those that do, both the ACL and the group setting must be true
in order for the operation to be allowed. For example, if an ACL gives a
user rights to delete a document, but that user’s primary group is not
allowed to delete documents, he or she will not be allowed to delete the
document.
ACL Security
The DM library maintains an ACL for every secured document, folder,
Quick Search, database import set, and document import set. (In the
interest of brevity, we will refer to all such objects as documents.) The
ACL designates the users and groups who are current trustees of the
document and the rights they are granted. A user cannot access a
document unless he or she is a current trustee and has the appropriate
rights.
It is not required that any document be secured. When an author
creates or edits a Document Profile, he or she has the option of either
leaving the document unsecured or restricting access to it. No ACL is
created for unsecured documents; they are fully accessible to all
members of the library whose primary group permissions permit
access.
To secure a document, the author begins by selecting Secure Document on
the Document Profile and then clicking Edit.
This brings up the Security page where the author can select groups and
users (trustees) who will have access to the document and can designate
their access rights.
For each user or group designated a Current Trustee, the author can allow
or deny the access rights listed on the right side of the Security page.
Note that the permission type “Control Access” refers to the ability to
change access rights to the document or its profile.
The Deny setting can be applied to rights for a group or for an individual
user. This setting is useful when the author wants to prevent a single
user from exercising a right granted to that user’s group (a situation
sometimes called “exceptional security”). If a right is denied to a group,
the Deny setting overrides any Allow setting for an individual user in the
group. So it is not possible to deny a right to a group and then allow the
same right to a user in the group.
AN OVERVIEW OF DM SECURITY
93
For a description of each access right, see the topic “Access Rights
Templates and Options” in the DM Webtop Help system.
Only users and groups who are specifically granted rights can access the
document or its profile. There is one exception to this, however. DM
automatically gives users whose primary group is
DOCS_SUPERVISORS full access to all documents in the library. This
is true even when DOCS_SUPERVISORS is not specifically added as a
trustee of a secured document on the document’s ACL.
Primary Group
Permissions
A user’s group permissions are those set for his or her primary group.
Group permissions are specified in Library Maintenance by the DM
administrator and apply to access to all documents, regardless of the
ACL settings on a specific document.
Group security settings are controlled on the Features and Permissions
tabs in Library Maintenance>Group Maintenance.
SQL Database Security
The Common
Logon Account
When client users log on to DM Server, they are also initiating access to
the library—the SQL database structures containing the Document
Profiles, user information, and other data. During library generation,
you are asked to choose the user name and password of the SQL
account that DM Server will use to access the library. To prevent
unauthorized access to the library from outside DM, this account name
and password should not be made public.
The SQL account can be the default user name—DOCSUSER—or any
other user name and password. We do not recommend the use of the
DOCSADM account for this purpose for the reason explained below.
The logon user name and password are stored in the PCDOCS.INI file,
with the password encrypted for security reasons.
SQL Administrator
Accounts
94
CHAPTER 3
The DOCSADM Account
DOCSADM is a SQL logon account that is the owner of all database
objects and has administrative privileges to the database. The account
can be created by you prior to library generation, or you can let Library
Generator create it for you. You must provide the DOCSADM
password to access DM Designer, the Activity Log Purge utility, and the
Add an External Library utility.
Oracle databases can have owner names other than DOCSADM. The
same guidelines apply to these owner accounts.
If you designate DOCSADM as the common logon account, any user
with privileges to run DM Designer can use this tool to make changes
to the database without first entering the DOCSADM password.
Because this may not be advisable in your organization, we recommend
you use a common logon account other than DOCSADM.
The Default Administrator Account
Every database engine has an administrator account that serves as the
“superuser” logon account. The administrator account can alter
database objects and shut down the database. You must provide the SA
password to access Login Control in Library Maintenance.
The administrator accounts and default passwords for the database
engines supported by DM are listed below. Since these accounts and
their passwords are commonly known, a database cannot be properly
secured until the password is changed. For instructions on changing
passwords, refer to your SQL vendor’s documentation.
Database Administrator Accounts
Database Type
Logon Name
Default Password
Microsoft SQL Server
sa
null value
Oracle
system
manager
Database-Level Access Control
As we explained earlier, DM maintains an access-control list (ACL) for
every secured object in the library. The list designates the users and
groups who are current trustees of the item and the rights they are
granted. A user cannot access an object unless he or she is a current
trustee and has the appropriate rights.
Profile-Level Security
To further secure documents from unauthorized access, you can
implement profile-level security, either for specific groups or librarywide. When this option is enabled, a document does not even appear in
SQL DATABASE SECURITY
95
a search-results list unless the user has rights to it. By default, profilelevel security is turned on library-wide.
Disabling profile-level security allows all library users or members of
specific groups to see all document titles returned by a search,
regardless of access rights. Actual access to documents is not altered by
this option; the security settings remain in force.
The Profile Level Security option is set library-wide in Library
Maintenance>System Parameters>Defaults. To set it for a specific group, go
to Library Maintenance>Group Maintenance>Features. As with all Library
Maintenance settings where there are both System and Group settings,
the Group setting prevails unless it is set to Default, in which case the
System setting prevails.
Document Server Security
The network location where documents are stored is called a document
server. A document server can be a computer dedicated to the
document-storage purpose, or it can be a share or drive on a machine
used for multiple purposes. It’s not unusual for organizations to have
multiple document servers.
DM supports several different operating systems for document servers,
including Novell NetWare, Unix, Centera, and Windows Server. (See
the Release Notes for a complete list of the supported document
servers.) There are some differences in how DM accesses documents on
the different operating systems, but these differences are not noticeable
to users. (See “Accessing a Document Server” on page 108 for more
about document access on different operating systems.)
No NOS-Level
Security
96
CHAPTER 3
DM supports the following operating systems as Generic document
servers, without security at the network operating system (NOS) level.
Access rights assigned to documents apply when the document is
accessed from a DM client. Create a secure Generic document server by
restricting all access permissions to the DM Server service account
exclusively.
•
Windows NTFS or FAT file share.
•
Unix systems using NFS Maestro™ for connectivity.
•
Standalone: A FAT drive, such as D:, that does not have a
share name.
Note: We do not recommend the use of Standalone document servers for
sites implementing failover and load balancing, because the drive letter may
indicate a different drive to each server in the cluster.
NOS-Level Security
If you cannot secure your document servers by restricting access to the
DM service account—for example, if you are still supporting DOCS
Open users on the same document server—documents can be secured,
not only within the library, but at the NOS level as well. NOS-level
security means that when a document is secured in DM, the rights
assigned to the document apply regardless of whether the document is
accessed from a DM client or outside DM via an operating system
mechanism such as Windows Explorer. NOS-level security is available
on document servers running under:
•
Windows Server NTFS volumes running either the
Document Server Security Service (DSSS) or the Document
Server Sentry Agent (DSSA).
•
Novell NetWare
Only users and groups with associated network aliases in the library
have rights to secure documents at the NOS level. Library users can be
created from existing network IDs during library generation or via
Library Maintenance>Synchronize.
Group membership in the library must be consistent with group
membership at the NOS level. If groups of the same name do not have
the same members, DM reports an error when users attempt to assign
document access to the group.
On networked drives, you can protect your documents from access by
non-DM users by revoking all rights to the folder where documents are
located and reapplying rights only to the groups DOCS_USERS and
DOCS_SUPERVISORS.
See “Setting Up Document Servers with NOS-Level Security” on
page 100 for more information.
DOCUMENT SERVER SECURITY
97
Setting Up Security
To implement DM security, you need to perform the following
activities:
Setting Up Users
•
Add every client user to the DOCS_USERS group account
in the library. See “Setting Up Users” on page 98 for more
information.
•
Set up NOS-level security (if applicable) on the servers or
shares where documents are stored. See “Setting Up
Document Servers with NOS-Level Security” on page 100
for more information.
By default, all DM users are members of the DM library group account
DOCS_USERS.
To DM, every user is either:
•
a non-network user
or
•
a network user
Non-Network Users
Non-network users have no network aliases associated with their
DOCS_USERS account. Since they have no rights on the network, their
key to accessing documents on network document servers is an Attache
password. To log on to DM Server, all users must provide a user name
and password. For non-network users, the password must be the
Attache password for their DOCS_USERS account. The Attache
password is specified on the People dialog box in Library Maintenance
(DM Admin>Users and Groups>People.)
Non-network users are validated in the library only; they are not
authenticated against a network. However, this does not prevent nonnetwork users from accessing documents on the network. On the
contrary, they can access all documents to which they have rights on the
Document Profile. The access is handled through the DM Server
service account.
98
CHAPTER 3
Network Users
Network users have at least one network account aliased to their
DOCS_USERS account. When network users log on, DM Server
verifies that they are valid users of the library and then authenticates
them against the network resource.
It is permissible for network users to have an Attache password in
addition to one or more network passwords. Any valid password can be
used at logon. When a network user logs on with an Attache password,
the user is validated on the library only. Later, when that user requests
access to a document server—to view, read, write, or set trustees, for
example—DM Server will ask for a network password in order to
authenticate him or her against the requested document server.
Note: The description of what happens during logon is somewhat abbreviated
here to give you a general overview of the differences between network and
non-network users. For a detailed explanation of the logon process for the
various clients and networks, see “Logging On and Accessing Document
Servers” on page 104.
Setting Up Generic Document Servers with Security
DM supports the following operating systems as Generic document
servers, without security at the network operating system (NOS) level.
Access rights assigned to documents apply when the document is
accessed from a DM client. Create a secure Generic document server by
restricting all access permissions to the DM Server service account
exclusively.
•
Windows NTFS or FAT file share.
•
Unix systems using NFS Maestro™ for connectivity.
•
Standalone: A FAT drive, such as D:, that does not have a
share name.
To secure Generic document server shares, give only the DM Server
service account Full Control rights to each document storage location.
Permissions should be applied at the last static directory in the
document path template.
SETTING UP GENERIC DOCUMENT SERVERS WITH SECURITY
99
Setting Up Document Servers with NOS-Level Security
DM supports the following operating systems as document servers
with full network operating system (NOS)-level security. NOS-level
security means that the access rights assigned to documents by DM
client users are always in effect, regardless of whether the document is
accessed from a DM client or outside DM via an operating system
mechanism such as Windows Explorer. NOS-level security is available
on document servers running under:
•
Windows with NTFS running either the Document Server
Security Service (DSSS) or the Document Server Sentry
Agent (DSSA).
•
NetWare
To tell DM that you want security at the NOS level, go to Library
Paramenters>System Parameters>Features and select the option Secure
Documents at Network Level.
To implement NOS-level security on your document servers, see
below.
Windows NTFS Volumes
To implement NOS-level security on Windows NTFS volumes, you will
need to install one of the following security services on each document
server:
The Document Server Security Service (DSSS). This service allows DM to
secure documents on Windows document servers. Through
Library Maintenance, you associate a DM group—such as
DOCS_USERS—with one or more Windows groups by adding
the Windows group’s network alias to the DM group in the library.
The universal access defined for the DM group applies to all
documents on the server. When an author secures a document
using a DM group ID, the access rights he or she assigns to the DM
group also apply at the NOS level. See the eDOCS DM Installation
Guide for instructions on using DSSS.
The Document Server Sentry Agent (DSSA). This service prevents all users
from accessing documents outside DM. The sole access is through
DM clients, where the access rights set up by the document’s
100
CHAPTER 3
author apply. See the eDOCS DM Installation Guide for
instructions on using DSSA.
If your organization has multiple Windows document servers, you can
run the DSSA on some servers and the DSSS on others. If your server
has multiple shares, the shares can use different services.
Both security services are provided on the DM installation media. For
instructions on installing the DSSS or DSSA and setting up a document
server, see the eDOCS DM Installation Guide.
NetWare Document Servers
Setting Up a Document Server
To set up a NetWare document server for DM:
1. On the NetWare document server, create an account with
administrator privileges. DM Server uses this account to
access documents on the server. If your library has multiple
NetWare document servers, you must have a common user
name/password for all NetWare servers.
2. If you have multiple NetWare document servers, they must
all reside in the same NDS tree. On the DM Server, specify
the tree name:
2.1 Right-click Network Neighborhood.
2.2 Click Properties>Services>Novell NetWare Client for
Windows NT>Properties.
2.3 In the Preferred Tree field, enter the name of the NDS
tree.
Note: If you are using a Novell client that supports multiple trees and you have
more than one tree set up under Preferred Trees on the DM Server, users will
receive the following message when attempting to access a NetWare
document server:
You can not be authenticated on the Netware server...Fusion error 2147220927
The reason for this is that DM does not support multiple trees. To avoid this
error message, remove all trees except your primary logon tree under
Preferred Trees in your NetWare Client setup.
3. Configure DM Server to work with the NetWare document
server(s):
SETTING UP DOCUMENT SERVERS WITH NOS-LEVEL SECURITY
101
3.1 In Server Manager, choose the NetWare Servers tab and
select a document server in the Server Name field. (The
available server names are derived from the libraries
selected on the Server Manager Libraries tab.)
3.2 Specify the following:
NDS Tree
NDS Context
User Name
Password
Note: The account used for NetWare access must be aliased to the DM
service account in Library Maintenance Synchronization or People.
The DM Servers must have the NetWare client installed and must log on to
your NetWare resources.
Then enter the password again in the Confirm Password field
before clicking OK.
4. Verify that users have rights to the document server. See
“Granting Rights to Users,” below, for more information.
Granting Rights to Users
For NetWare document servers, verify that effective rights have been
given to the folder where documents are stored. Effective rights are the
rights that have been granted according to the trustee hierarchy. A
user’s effective rights are determined by the following:
•
The user’s rights on all parent folders of the current
subfolder.
•
The rights the user has been granted to a particular file.
•
The NetWare flags on the file, which apply to each user,
regardless of his or her trusteeship.
In other words, if a user or group has been granted full rights in the root
directory of a volume, the user or group has full rights to all files in all
subfolders of that volume. To deny rights at some lower level on the
volume, the rights must be specifically revoked at that level. The rights
must be revoked from the same trustee that was granted the rights. For
example, if rights were granted to the group EVERYONE at the root
level, rights must be revoked from the group EVERYONE at some lower
level to secure that subfolder.
102
CHAPTER 3
DM Server must have access to the Unicode tables located in the
PUBLIC\NLS directory on the document server.
Setting Up the Client Software
Before users can log on to DM, they must pass through DCOM
(Distributed Component Object Model) security. DCOM is a
Microsoft protocol that handles connections between clients and
remote servers. When a user logs on, DCOM performs an
authentication procedure to verify that the user has sufficient rights to
the DM Server.
The DM software includes preset DCOM configurations that handle
most user logons seamlessly. There is one exception: NetWare-only
environments supporting users who do not have Windows network
logons and are accessing DM via the DM extensions or integrated
applications.
Setting Up Client
Users in a
NetWare-Only
Environment
If you are a NetWare-only organization, and your client users do not
have individual Windows network logons, the Client for Microsoft
Networks must be installed on the users’ workstations. This is not
required for users who are accessing DM solely via their Web browsers;
it is required for those using application integration and any of the DM
extensions.
To verify that the Client for Microsoft Networks is installed on all
client workstations:
1. On each workstation, open the Control Panel and doubleclick the Network icon.
2. Select the Configuration tab and add the Client for Microsoft
Networking. You can keep the Primary Network Logon set for
the Novell NetWare Client, so that users will not be
prompted to log on to a Windows domain, but only onto
NetWare.
3. Reboot the workstation.
SETTING UP THE CLIENT SOFTWARE
103
Logging On and Accessing Document Servers
Information
Required for
Logons
When users log on to DM, they are required to enter at least:
•
a user name, which is the DOCS_USERS ID in the library.
•
a password
The user can optionally enter a network name. See “Use of the Network
Name in Logons” on page 106 for an explanation of why the user would
want to do this.
Notes: Users have three chances to execute a valid logon. If the user name or
password is incorrect, after three logon attempts, the user will not be allowed to
try again. An event noting the logon failure will be posted in the Event Viewer.
Using this information, third-party integrators can modify the client application
to notify an administrator of a potential security violation.
Users accessing DM can be set up to logon automatically. See “What Users See
When They Log On” on page 107 for more information.
From the user name and password, DM Server determines whether:
•
the user has a valid DOCS_USERS account in the library.
(The library must be selected on the Libraries tab in Server
Manager. See “Libraries Tab” on page 15 for instructions.)
•
the user is a network user or a non-network user.
Then DM Server authenticates the user. There are two types of
authentication:
•
library authentication, which is the only method of
authentication possible for non-network users.
•
network authentication.
The authentication type depends on the password supplied by the user.
Note: Null passwords are not accepted by DM Server.
Library Authentication
Under library authentication, DM Server uses its own network
credentials—rather than the user’s—to access files on network
document servers:
Windows document servers: The DM Server service account
Unix document servers: The DM Server service account.
104
CHAPTER 3
NetWare document servers: The NetWare account set up in Server
Manager
When users log on, DM Server first attempts to authenticate them on
the library. For library authentication, the user must supply a valid
DOCS_USERS ID with an Attache password. If the DOCS_USERS ID
is valid, but the password is not an Attache password, DM Server then
attempts to authenticate the user on the network.
If a network user supplies an Attache password at logon, he or she will
undergo library authentication only, rather than network
authentication. (This scenario is described in more detail in
“Authentication of Network Users Supplying an Attache Password” on
page 106.)
Library authentication may be less secure than network authentication
because users’ Attache passwords are stored unencrypted in the library.
If library authentication is unsuitable for your organization, you can
disable it in Server Manager and thus require all users to log on with a
valid network user name and password aliased to their user name in the
DM library. To disable library authentication, select the option Network
Alias Required on the Preferences tab in Server Manager. See “Network
Logon Settings” on page 13 for instructions.
Network Authentication
Network authentication occurs when the user supplies valid network
credentials at logon—at a minimum, a network user name and
password. If the password supplied is not an Attache password, DM
Server assumes the user name and password are network logon
credentials. It compares the logon credentials against each of the user’s
network aliases in the library. When it finds a valid entry, DM Server
passes the logon credentials to the network for authentication. Only
one network authentication is performed—for the first match DM
Server finds—even if the user has multiple network aliases matching
the user name/password.
There is no established order for which network alias is validated first.
If a user has multiple network aliases with the same password, he or she
will be authenticated only on the first network where the logon
credentials match. To be sure users are authenticated on a particular
network, their network passwords should be unique.
LOGGING ON AND ACCESSING DOCUMENT SERVERS
105
Authentication of Network Users Supplying an Attache Password
To access documents on document servers, a network user must be
authenticated against the target network, for example, Windows,
NetWare, or NDS. Non-network users can access documents via the
network credentials of the DM Server service account.
Because library authentication always occurs first, network users who
have an Attache password that matches their network password(s) will
be authenticated as Attache users—that is, they will undergo library
authentication only. When they attempt to access a network document
server, DM Server will ask them to log on again. Select one of the
following to avoid additional logon messages:
Use of the
Network Name in
Logons
•
Ensure that the user’s Attache password is different from
any of his or her network passwords, and require users to
log on using their network password.
•
Ensure that the user's Attache password matches any of his
or her network passwords. Configure DM Server to use the
password supplied at logon when a user requests access to
an unauthenticated document server. To do this, select the
option Default Password in Server Manager. See “Network
Logon Settings” on page 13 for instructions.
In addition to the required user name and password, DM client users
have the option of supplying a network name when they log on. Entry
of a network name is not necessary unless the user has the same user
name and password on two or more networks.
The network name can be:
•
a Windows network domain name
•
a NetWare context
The network name is optional for Windows and NetWare users.
Note: Users cannot specify a network name when the DM user ID and the
NOS user name are different.
If the user supplies a network name, DM Server passes his or her logon
credentials to the requested network for authentication of the user.
If the user does not supply a network name, DM Server proceeds with
the logon process described above.
106
CHAPTER 3
What Users See
When They Log On
Users logging on to the DM client, including DM Webtop, DM
Extensions, and integrated applications, are presented with a logon
request, the format of which may vary, depending on how the DM
administrator has set it up.
The user must enter a valid user ID and password to log on, and he
must also select the library. Entry of a network name is optional. If the
user selects “Log into default library only,” only the selected library will
be set for full-text searching. The entry of user logon credentials can be
automated:
Supply credentials one time; no logon requests for subsequent
logons. The first time a user logs on, he is presented with the logon
request and must enter his credentials, but he can opt to have
those credentials stored in the registry for future logons. If he
selects this option (Auto logon), he will not see the logon request
on subsequent logons; DM Server will obtain the credentials from
the registry.
No logon request appears; credentials obtained from network
logon. If the user is already logged on to the network, he will not
see a logon request. Instead, DM Server will obtain his logon
credentials from his network logon.
The logon methods are configurable with two options in Library
Maintenance>Allow Auto Logon and Accept User-Supplied Identification.
Allow Auto Logon
This option can be set library-wide (in System Parameters > Defaults) or at
the group level (Group Maintenance > Defaults), with the group level
prevailing when the settings differ.
If Allow Auto Logon is set to No, users must supply logon credentials every
time they log on. The Auto Logon check box on the logon request is
disabled so the user does not have the ability to store his credentials in
the registry for future use.
If Allow Auto Logon is set to Yes, you must also select Allow Auto Login in DM
Admin>DM Webtop Maintenance>DM Webtop Parameters>Logon. This applies
to both DM Webtop and DM Extensions. When Allow Auto Logon is
enabled in the library and in DM Webtop Maintenance, DM Webtop
users will be able to choose or disable this feature from My
Options>Display Options>Automatic Log on. The Auto Logon check box is
LOGGING ON AND ACCESSING DOCUMENT SERVERS
107
enabled on the DM Extensions logon screen. To disable Auto Logon in
DM Extensions, open Options>Defaults>General and clear the Auto Logon
check box.
In addition, DM Extensions and application integration support
obtaining credentials from the network logon. This depends on setting
the Accept User-Supplied Identification option.
Accept User-Supplied Identification
This option is set at the library level (in System Parameters>Features).
If set to no, the user will not see the logon request and DM Server
obtains the logon credentials from his network logon.
If this option is set to yes, the logon request appears with the Auto
Logon check box enabled, giving users the ability to have their
credentials stored in the registry for future use.
Authentication
Service Support
Accessing a
Document Server
DM includes support for Hummingbird Core Services (HCS). This
permits users to provide a single set of logon credentials to access the
DM Webtop via their organization’s Enterprise Webtop.
When a user requests access to a document server, DM Server checks
the security information in the library to verify that the user has rights
to perform the requested operation on the document. If the user has the
appropriate rights, DM Server then accesses the document server as
described in the following paragraphs.
Windows Document Servers with DSSS or DSSA
For Windows network users and non-network users, DM Server uses its
own service account to access the document server. The document
server’s security log and the DSSA Audit Trail will show access by DM
Server, not the user who requested the document.
NetWare Document Servers
For both network and non-network users, DM Server uses its own
NetWare accounts to access the document server. NetWare accounts are
set up using Server Manager. (See “NetWare Servers Tab” on page 46
for instructions.)
108
CHAPTER 3
Generic and Standalone Document Servers
For both network and non-network users, DM Server uses its service
account to access the document server for the user. Security is based on
the access defined in the document’s profile in the library.
Support for Integrated Windows Authentication
Configuring
Integrated
Windows
Authentication
You can configure IIS Integrated Windows Authentication (IWA) to
allow DM Webtop users using Microsoft Internet Explorer to
automatically access DM Webtop pages without having to manually log
on (using single sign-on). This functionality has been added to the
existing DM Admin settings for allowing auto-logon.
Without Application Integration, the existing feature stores the user’s
credentials as cookie information in the user’s browser. This
functionality is retained, but as a backup to IWA.
When you enable single sign-on for a user, DM will attempt to log on
the user following this process:
•
Attempt to log on the user using IWA. If successful, the user
can immediately start working within DM Webtop.
•
If the attempt to logon with IWA fails, DM Webtop will
check if the user has enabled automatic logon using saved
information (cookies) and will attempt to log on the user
using these credentials.
•
If that fails, the user is returned to the main logon page
where they must manually enter the necessary credentials.
IWA authentication is dependant on the use of Internet Explorerand a
compatible version of IIS. It may not work for sites employing a proxy server or
for any other web browser. In the case where IWA either will not work or fails
for other reasons, the web server will attempt logon either using stored cookies
(if configured for the user) or return to a logon screen.
SUPPORT FOR INTEGRATED WINDOWS AUTHENTICATION
109
Configuring Single Sign-on for DM Extensions Users
To set up single sign-on for DM Extensions users:
1. From the DM Admin tab, select Library Parameters>System
Parameters. Click the Features link.
2. Ensure that the Accept User-Supplied Identification option is
not selected.
3. From the DM Admin tab, select Users and Groups>Groups.
Click the Group ID link to display the settings for this group.
Click the Features link and ensure that the Allow Auto Logon
option is set to Yes. Repeat this step for each group for
which you want to allow single sign-on.
Configuring Single Sign-on for DM Webtop Users with Application
Integration
To set up single sign-on for DM Webtop users using Application
Integration:
1. From the DM Admin tab, select Library Parameters>System
Parameters. Click the Features link.
2. Ensure that the Accept User-Supplied Identification option is
not selected.
3. From the DM Admin tab, select Users and Groups>Groups.
Click the Group ID link to display the settings for this group.
Click the Features link and ensure that the Allow Auto Logon
option is set to Yes. Repeat this step for each group for
which you want to allow single sign-on.
4. From the DM Admin tab, select DM Webtop Maintenance>DM
Webtop Parameters. Ensure that the Allow Auto Logon option
is selected.
Configuring Single Sign-on for DM Webtop Users without Application
Integration
To set up single sign-on for DM Webtop users who are not
using Application Integration:
1. From the DM Admin tab, select Library Parameters>System
Parameters. Click the Features link.
2. Ensure that the Accept User-Supplied Identification option is
not selected.
3. From the DM Admin tab, select Users and Groups>Groups.
Click the Group ID link to display the settings for this group.
Click the Features link and ensure that the Allow Auto Logon
option is set to Yes. Repeat this step for each group for
which you want to allow single sign-on.
4. From the DM Admin tab, select DM Webtop Maintenance>DM
Webtop Parameters. Ensure that the Allow Auto Logon option
is selected.
5. On the DM Web Server, configure IIS administration to
allow IWA access by setting file security properties on the
loginact.asp page. You need to disable anonymous logon
for this page and ensure that no other authentication
method is configured. To do this, complete the following
steps:
5.1 Open the Internet Information Services (IIS)
Manager.
5.2 Expand the Web Sites node in the left pane, rightclick CyberDOCS, and select loginact.asp in the right
pane.
5.3 Right-click loginact.asp and select Properties.
5.4 Click the File Security tab.
5.5 Click the Edit button located in the Authentication and
access control section.
5.6 Clear the Enable anonymous access check box.
5.7 Select the Integrated Windows authentication check box
in the Authenticated access section.
5.8 Click OK.
SUPPORT FOR INTEGRATED WINDOWS AUTHENTICATION
111
You can perform these steps for the entire site if
required, but for this feature, these steps are required
only on the identified page.
If you leave anonymous access enabled, DM will attempt to use the
credentials configured for anonymous access rather than the credentials the
user supplied when logging on to their local machine.
Whatever credentials are used to grant access to the loginact.asp page
are the credentials that are passed to the DM API to attempt single
sign-on, whether they are anonymous, IWA, or any other configured
access authentication methods. The system administrator should
ensure that any anonymous logon credentials set up are not a valid
alias for an active DM user, otherwise configuration of single sign-on
will assume that configured user as the DM logon credentials. This
also requires that all valid DM users have system-level access rights to
IIS and the pages it references as well.
Using Mixed and Windows Authentication for SQL
Server Authentication
You can select the Use Trusted Connection check box on the Common
SQL Login or the Trusted Connection check box on the DB administrator
Login dialog box, which allows your users to authenticate using either
the common logon or through the new trusted connection. Doing so
replaces the username and password entries in the [DM Library] section of
the pcdocs.ini file.
This changes the SQL server connection from using the mixed mode
common logon (DOCSADM or DOCSUSER) to use the current
logged on Windows user (DOMAIN\FusionAdmin).
You must add the network user accounts to the SQL server to allow
the domain users to connect to the SQL server. The domain user
logons are not added to the SQL server by using the DM Admin tools.
If user accounts have not been added to the SQL server, a ***TRUSTED***
line appears in the logon dialog box for the Windows Administration
tools when users try to connect; entering a valid common logon such
as DOCSADM will not allow a connection to the database.
112
CHAPTER 3
Although rerunning Library Generator on the library will reinsert the
USERNAME and PASSWORD sections in the pcdocs.ini file, the DM server
will continue to connect through Windows authentication when the
TrustedConnection setting is enabled. After running Library Generator,
you must reset this pcdocs.ini file setting.
You can configure each library to run either mixed mode (common
logon) or to use Windows authentication, so it is possable to run both
connection types to different libraries from the same DM server.
Changing Database
Access from Trusted
Connection
When you create a database, you can select the Trusted Connection check
box when you generate the DM library in Library Generator.
However, there is no configuration user interface to revert to the other
database login method. When you create a library you must supply
the DM Admin user name so that the database objects can be created
and an operational login (Common SQL Login), which is used by
DM Server and the Server Admin Tools to access the newly created
database; this information is stored in the pcdocs.ini file.
The following procedure is for altering the operational login in the
pcdocs.ini file because the DM Admin user is only used once for the
creation of database objects.
The user DOCSUSER can be replaced with a database user of your
choice.
In Microsoft SQL Server:
1. Create the new user login if it doesn't already exist. You
can run this command if it already exists:
CREATE LOGIN [DOCSUSER] WITH
PASSWORD='your password'
GO
2. Add the DOCS_USERS role if it doesn't already exist. You
can run this command if it already exists
USE [librarydbname]
GO
sp_addrole [DOCS_USERS]
3. Add the DOCSUSER to the database.
USE [librarydbname]
GO
sp_adduser DOCSUSER,DOCUSER,DOCS_USERS
USING MIXED AND WINDOWS AUTHENTICATION FOR SQL SERVER AUTHENTICATION
113
GO
sp_grantdbaccess DOCSUSER
GO
Grant all to DOCSUSER
GO
4. Edit the pcdocs.ini file (run as Administrator rights
required). For example:
[Library Trusted]
Vendor=3
Database=Trusted
Owner=
Location=localhost
TrustedConnection=yes
Remove or comment out Trusted Connection=yes
and add UserName=DOCSUSER (or DOCSADM). See the
example below.
[Library Trusted]
Vendor=3
Database=Trusted
Owner=
Location=localhost
;TrustedConnection=yes
UserName=DOCSUSER
5. Change the Primary Library to your library name (if it
isn't already).
6. Save the pcdocs.ini file.
7. Start Library Maintenance. When the message appears
stating that the login failed, press OK.
8. You are prompted to enter the DOCSUSER password;
enter the password and press OK.
9. Edit the pcdocs.ini file again and copy the encrypted
password into your copy/paste buffer.
10. Update the REMOTE_LIBRARIES table with the new user
name and password.
Use [LibraryDBName]
GO
UPDATE DOCSADM.REMOTE_LIBRARIES SET
LIB_LOGIN_NAME='DOCSUSER',
SQL_PASSWORD='paste in your ENCRYPTED
password here' WHERE SYSTEM_ID = 0
USING MIXED AND WINDOWS AUTHENTICATION FOR SQL SERVER AUTHENTICATION
115
Chapter
4
Failover and Load Balancing
on Multiple DM Servers
In This Chapter
This chapter explains the failover and load-balancing (FOLB) features
of DM.
117
About Failover and Load Balancing
If your organization employs multiple DM Servers, you can connect
them in a cluster to implement failover and load balancing (FOLB) of
requests from DM client users. A cluster is a group of DM Servers on
the same network serving the same set of libraries.
Note: For the purposes of this discussion on FOLB, the term “DM client”
refers to the DM Webtop Server and end-users of integrated applications and
DM extensions. Requests from DM Webtop users are handled by the DM
Webtop Server and do not go directly to the DM Server cluster.
Failover
The failover feature automatically switches DM client users from one
DM Server to another in the cluster if the initial server fails for any
reason. You have the option of implementing the failover capability
alone or integrating it with the load-balancing capability. The failover
feature provides a high degree of fault tolerance to the cluster of DM
Servers. Typically, only the last user request will need to be resubmitted
in the event of a server failure.
Load Balancing
The load-balancing feature distributes users’ requests among the
servers in the cluster so that the load of user calls is distributed relatively
evenly. You can choose from two load-balancing methods: round robin
and CPU utilization.
•
Under the round-robin method, user requests are assigned
in rotation among the servers in the cluster.
•
Under the CPU utilization method, each DM client polls
the DM Servers to find one with less than 75 percent CPU
utilization and sends the request to that machine.
FOLB gives you the ability to scale DM deployment as your user load
increases, with minimal administrative effort and minimum
interaction on the DM client side. The only interaction necessary is
when you have changed the FOLB settings and want them to take effect
on the clients:
118
CHAPTER 4
•
The IIS Admin Service on the DM Web Server must be
stopped and restarted or the DM Web Server must be
rebooted.
•
Workstations using application integration or DM
Extensions must be rebooted.
All FOLB administration is performed on the DM Server side through
Server Manager. For example, when a change is made to the server
list—such as the addition of a new DM Server—DM clients
dynamically obtain the updated list and start using the new server.
System Requirements for Failover and Load Balancing
To implement failover and load balancing, your system must meet the
following requirements:
•
All DM Servers in the cluster must be comparable machines.
The hardware need not be identical, but the machines
should have similar processors with similar speeds, and they
should be running the same software. This is a general
requirement for optimization of load balancing, but it is
more crucial if you are using the round-robin method of
load balancing.
Note: An exception to this requirement exists for systems using DM
WorkFlow. As only one copy of the DM WorkFlow Server can be installed into
a DM system, only one server in the cluster can carry the DM WorkFlow Server.
•
All servers should be capable of communicating with each
other at the same rate. For this reason, we do not
recommend deploying a cluster across a wide-area network.
For example, an organization might define a cluster of five
servers, each in a different city. If two of the servers are
connected by a relatively slow link, communications among
all servers will be degraded.
•
All servers must be using the same version of the
PCDOCS.INI file. Copy the PCDOCS.INI file that you
want to use to each DM Server machine.
•
The date and time setting of each server must be roughly the
same. That is, they should be within a few minutes of each
other, at a minimum.
•
On the Libraries tab of Server Manager, the same libraries
must be selected for each server in the cluster.
•
A server cannot be a member of more than one cluster.
SYSTEM REQUIREMENTS FOR FAILOVER AND LOAD BALANCING
119
•
DM Servers that are dedicated as Indexing servers should
not be made members of a cluster. To verify this, run the
DM API Configuration Wizard on each Indexing server and
verify that the option Fail-over and Load-balancing Enabled is
not selected.
•
For optimum performance, all servers in the cluster should
be dedicated to DM. This is particularly important if you
are using the round-robin method of load balancing. Under
the round-robin method, performance will be negatively
affected if one server in the cluster is used for other major
processes. For example, a server in the cluster should not
also be the SQL server.
Setting Up a Server List
A server list identifies the members of a cluster used for failover and
load balancing. The creation and maintenance of a server list is
performed via Server Manager on any server in the cluster.
The server list is defined and propagated to the cluster via the FOLB
Settings tab of Server Manager. This procedure should preferably be
done when all servers in the cluster—including servers being removed
and those being added—are running with the DM Server service
started.
By default, the primary DM Server is added to the list when you install
DM Server, and each additional server in the cluster must be manually
added.
120
CHAPTER 4
To define a server list:
1. On a server in the cluster, run Server Manager and click the
FOLB Settings tab. The name of the server appears in the
Known Servers list.
2. In the Enter New Server field, type the name of another server
in the cluster and click Add. Its name will appear in the
Known Servers list.
3. Repeat step 2 for all servers in the cluster.
To remove a server from the list, select the server and click
Delete. The Clear All button removes all server names from
the list.
4. When the Known Servers list is correct, click Apply to record
the new server list. The server names are ordered
alphabetically.
SETTING UP A SERVER LIST
121
5. Server Manager asks if you want to propagate the new server
list now or later. Click Now to propagate the server list to all
servers in the cluster.
See “FOLB Settings Tab” on page 37 for more details on propagating
the server list.
During propagation of the server list, DM Server displays the status of
the propagation for each server, indicating whether the time stamp on
each machine’s server list matches the time stamp on the first server’s
server list. The time stamp is applied when you initiate the propagation.
When the server list is changed, the new list is propagated to both the
removed and the new servers. It is propagated to the removed servers so
that DM clients connected to them can obtain the new server list. If a
server is about to be temporarily shut down for maintenance reasons,
this eliminates the need for DM clients to repeatedly check whether the
machine is available.
Once the new server list is propagated, the clients automatically obtain
the new server list upon startup and begin using any new servers in the
list. The IIS Admin Service must be stopped and restarted on DM Web
Servers to have the new server list take effect.
If the Propagation Fails
If propagation of the server list fails, one or more servers in the cluster
may not be updated with the new server list. Inconsistent propagation
of server lists will cause users to experience delays in the processing of
requests while the system times out on offline servers.
If a machine fails to receive the new server list:
1. Verify that the machine is running and that the DM Server
service is started on all machines.
2. From any server in the cluster, run Server Manager, go to the
FOLB Settings tab, and click Propagate Current Server List to
bring up the Propagating New Server List dialog box.
3. Click Propagate Now. DM Server creates a new server list and
attempts to propagate it throughout the cluster.
If during a propagation a machine indicates its server list is newer than
the one being propagated, the machine’s time and date settings are
122
CHAPTER 4
probably not synchronized with the server where the propagation is
being done. If this happens:
1. Verify that all machines in the cluster are running and that
the DM Server service is started on all of them.
2. On the machine with the newer list, run Server Manager
and create a server list as you did on the first server.
3. Click Propagate Now as described above. DM Server creates a
new server list and propagates it to the other servers.
Note: The Propagating New Server List dialog box also has a Propagate Manually
button, which closes the dialog box without propagating the server list. If you
choose this option, you can either return to the dialog box later and select
Propagate Now or you can manually enter the server list on each member of the
cluster. However, we do not recommend manually entering the names because of
the possibility of typographical errors.
When DM client users log on to DM Server, they access the first server
in the cluster’s server list to obtain their server-list updates. Server lists
are ordered alphabetically, so the server at the top of the list will be
accessed, even if propagation was performed at another server.
Setting Up Failover Only
The failover capability can be implemented without using load
balancing. This is done via the Fail Over Only option in Server Manager
(see “Selecting FOLB Client Parameters” on page 40 for instructions).
With Fail Over Only, you must designate a primary server to process all
end-user transactions. If the primary server fails, user requests are sent
to the next online server in the server list until the primary server comes
back online. Then it will resume handling of client transactions.
With the Fail Over Only option, we recommend you select one of the
active polling parameters—either Poll All Servers or Poll Dead Servers.
Either option will prevent users from experiencing a delay when
requests are sent to an offline server. If you select Do Not Poll Servers, DM
clients are unable to detect that the primary server is down prior to
forwarding user requests. The requests will time out, causing users to
experience first a delay and then failure of the request. Subsequent
requests will be sent to the next server in the list, regardless of whether
it is online. Selecting an active polling parameter also ensures that
SETTING UP FAILOVER ONLY
123
processing will be returned to the primary server once it comes back up
after a failure. Under the Do Not Poll Servers option, when the primary
server comes back online, requests will not be sent to it until the DM
Server service is restarted. See page 125 for more information on the
FOLB polling options.
Selecting Options for Failover and Load Balancing
This section explains what happens when failover and load balancing
are deployed together. For a description of the failover-only capability,
see page 123.
There are two methods for implementing load balancing: round robin
and CPU utilization. Under the round-robin method, end-user
requests are assigned in rotation among the servers in the server list.
Under the CPU utilization method, the DM client polls the servers to
find one with low utilization and sends the request to that machine.
Round Robin. This load-balancing method distributes end-users’
requests among the servers in the server list so that the load of user
calls is distributed relatively evenly. User requests are assigned in
rotation among the servers on a per-operation basis. The server
list is ordered alphabetically, so the first request from a user goes to
Server A, the second request from the same user goes to Server B,
and so on. This method is the default for load balancing.
CPU Utilization. Under this method, the client polls the online servers in
the cluster until it finds a server whose CPU utilization is lower
than 75 percent and then sends the request to that machine. If,
during the polling process, the client detects an offline server, the
server will be suspended from the server list until it comes back
online.
The DM administrator sets the polling interval for the CPU
Utilization method. More frequent intervals will require more
network overhead, but will also provide a more up-to-date idea of
each server's CPU usage.
When DM clients first log on, they access the first DM Server in
the server list to obtain their server-list update. From then on,
users access servers based on polling results of CPU utilization.
124
CHAPTER 4
To select the load balancing method, go to the FOLB Settings tab in Server
Manager. See “Selecting FOLB Client Parameters” on page 40 for
instructions.
Polling Options
If a server in the cluster goes down for any reason, and a client sends a
request to that server, the transaction will time out. The user will
experience a delay and, after the transaction times out, the user will
have to resubmit the request. The likelihood of such delays in
processing can be reduced by having clients poll the DM Servers to
verify which members of the cluster are online and ready to accept
requests. Then requests can be sent only to the servers that are up and
running.
The DM administrator controls the interval at which polling occurs.
(This interval setting also applies to polling performed under the CPUutilization method of load balancing.) The default is every 10 seconds,
but we recommend you experiment to determine the appropriate
polling interval for your system.
There are three polling options:
Poll Failed Servers. If a client sends a transaction to an offline DM
Server, the DM Server is effectively suspended from the client’s
server list until it comes back up. The client will poll the DM
Server at the designated intervals to determine if it has returned to
service, but until that time, no transactions will be sent. Polling
ceases once all offline servers are online again.
Poll All Servers. At the designated intervals, clients poll all DM Servers in
the cluster to confirm they are online. Offline servers are
effectively suspended from each client’s server list until they come
back up. This polling option has the advantage of suspending an
offline server from the client’s server list before it sends a request,
preventing delays in the processing of transactions. It tends to
increase network traffic, but you can minimize this effect by
temporarily removing offline servers from the server list.
Do Not Poll Servers. Clients will not poll DM Servers. If a server is unable
to process a transaction, it is removed from a client’s server list.
When it comes back online, it is not returned to the server list, as
POLLING OPTIONS
125
it would be if polling were turned on. To restore the server to the
client’s server list, the client must be rebooted.
For instructions on setting up the failover and load-balancing features
using Server Manager, see page 37.
126
CHAPTER 4
Chapter
5
Generating Previews of Stored
Documents
In This Chapter
This chapter gives an overview of the document-preview feature and
explains what the DM administrator needs to do to set it up.
127
About Document Previews
DM gives users the option of displaying short previews of documents.
This feature saves document-retrieval time and helps users quickly
determine if a document is the one they want.
Previews are generated for documents whose formats are supported by
the viewer application Outside In by Stellent. Previews are not
generated for formats not supported by Outside In.
If a document has multiple versions, only one preview is generated.
This will be a preview of the last published version, if one exists;
otherwise the last version is previewed.
How Previews Are Displayed
Document previews are displayed in HTML format. The content of a
preview depends upon the native format of the document itself.
Word Processing
Formats
Presentation and
Chart Formats
Spreadsheet
Formats
Pixel-Type
Graphics Formats
The preview displays the first 6000 characters of the document.
The first slide or chart is displayed in a reduced format (300- to 400pixels wide). Examples of this type of format are PowerPoint and the
chart format of Microsoft Excel.
The preview displays the first 6000 characters of the document.
The first image is displayed in a reduced format (450-pixels wide).
How Previews Are Generated
To enable previewing, the DM administrator must:
128
CHAPTER 5
•
Start preview generation for the library. This is done on DM
Server’s Document Preview tab in Server Manager. See
“Document Previews Tab” on page 33 for instructions. By
default, preview generation is set to manual, which means
that preview generation must be started manually by the
DM administrator.
•
Allow users to see previews by enabling the Allow Preview
option on DM Web Server’s DM Admin tab under Library
Parameters>System Parameters>Default. See the Allow Preview
option in Chapter 6 for more information.
Previews are stored on the document server as an attachment to the
original document. The label of all previews is PR1. When a document
is updated, its preview is also updated.
A dedicated DM Server is not needed to support the previewgeneration process.
HOW PREVIEWS ARE GENERATED
129
P
A R T
2
Library and DM Web Server
Administration
In This Section
This section addresses administration of the DM library and of the DM
Web Server:
•
Library parameter settings.
•
User and group settings.
•
Validation tables.
•
Indexes and profiles.
•
DM Webtop user interface.
Except for the DM Webtop user interface, the features and settings
described in Part 2 can also be managed in Library Maintenance, one
of the DM Server Administration Tools.
131
Chapter
6
Library Parameter Settings
In This Chapter
The Library Parameters pages of the DM Admin tab in DM Webtop allow
you to control many different areas, including:
•
System Parameters
•
Document Servers
•
Remote Libraries
•
Terminology
To access this feature, log on to DM Webtop and select the DM Admin tab.
By default the Library Parameters tab is selected.
133
Setting System Parameters
When you click the DM Admin tab on the DM Webtop toolbar, the Library
Parameters>System Parameters page appears.:
The System Parameters page includes links to the following pages:
134
CHAPTER 6
•
Features: Displays the Features page. The page contains the
options for a library. See “Setting System Features” on
page 137.
•
Defaults: Displays the Defaults page. This page contains the
options for the system level. See “Setting System Default
Values” on page 138.
•
Permissions: Displays the Permissions page. This page sets
permissions for the library. See “Setting System
Permissions” on page 142.
•
Utilities: Displays the Utilities page. This page sets the default
access permission to the DM utilities. See “Allowing Access
to DM Utilities” on page 142.
•
Versions: Displays the Versions page. The Versions page
shows the current version handling parameters. See
“Specifying Version Control Options” on page 144.
•
Attache: Displays the Attache page. This page sets the values
for Shadowing and Simultaneous Edits. See “Setting Attache
Options” on page 146.
•
Preferences: Displays the Preferences page. This page sets the
control parameters. See “Setting System Preferences” on
page 149.
Below the links to the other System Parameters pages, there are two
buttons:
Save: Save changed data to the database and reload the current
page.
Restore: Reloads current page and restores data from the database.
Setting Default
Permissions
The following fields allow you to change certain system parameters:
•
Document Path Template: Allows you to define the document
storage directory structure. This field is required. The
maximum length is 100 characters. The default value of this
field is:
%LIBRARY_NAME\%AUTHOR.USER_ID
where %LIBRARY_NAME is the directory named for the
library, and%AUTHOR.USER_ID is a variable representing
the short name of the author of the document.
Documents must be filed using a hierarchy based on one or
more Document Profile fields. Any profile fields can be
included as path variables. A variable is specified with a
leading “%” and the SQL path of a field. If you are not sure
about the SQL path syntax, use DM Designer to check a
particular field's SQL path. The following are examples of
path template variables:

%AUTHOR.USER_ID

%DOCUMENTTYPE.TYPE_ID

%TYPIST.USER_ID

%APPLICATION.APPLICATION
The variable%LIBRARY_NAME is a special variable
representing the library in which the document resides. File
names, consisting of the document number and version
specification, are automatically added when documents are
saved.
Note: Keep in mind that a subdirectory can be created for each unique value
found in the Profile Library. The more subdirectories created, the slower your
file server can become. We suggest using %AUTHOR.USER_ID because
documents are easily located, and a moderate number of subdirectories are
SETTING SYSTEM PARAMETERS
135
created.
•
Shadow Path Template: DM offers the option of editing
documents locally and only updating the network copy
when the file is saved. Editing the local, or “shadowed,” copy
of a document increases editing performance and decreases
network traffic. The Shadow Path Template determines where
documents shadowed to the local drive should be stored.
The default value for this field is:
%LIBRARY_NAME\%AUTHOR.USER_ID
where %LIBRARY_NAME is a variable representing the
library of the shadowed document and
%AUTHOR.USER_ID is a variable representing the short
name of the document's author. This field is required. For
example, if the Document Path Template is:
\SHADOW\OPERATIONS\%AUTHOR.USER_ID
where the Library is named OPERATIONS, your Shadow
Path Template could be:
\OPERATIONS\%MATTER.MATTER_ID
This stores all Operations documents by Matter on the
users' hard drives. This setup would be most beneficial to
users that work primarily on their own files - they would
possibly be the only Author - but used several Matters. In
the event that the network server was down, the user could
look for their files among directories broken down by
Matter, rather than in one large Author directory holding all
their files. The maximum length is 100 characters.
136
CHAPTER 6
•
Log File Location: DM allows you to choose where the log files
will be stored. You may want to redirect log files to each
user's hard drive or to a separate server/volume. This field is
required. The maximum length is 128 characters.
•
Primary Document Server: This is the server on which all
documents will be stored by default. Use the Table Lookup
button (...) for a listing of valid entries. This field is
required.
•
Target Server Column: Choose from the Table Lookup button
(...) listing of valid entries. The value you enter in this
column will determine how documents are distributed
among the document servers. In People Maintenance, each
Author can then be assigned a "target" document server. If
you select Author, each document created would be stored
on the specified target document server based on the value
in the Profile field. In Document Type Maintenance, each
different defined Type can be stored on a particular server.
This feature is useful for load balancing purposes. The
maximum length is 18 characters.
•
Setting System
Features
Default Deployment Package: You can use the Table Lookup
button (...) for a listing of valid entries. Maximum length is
16 characters.
Click the Features link to display the Features page.
The three buttons below the tabs are:
Save: Save changed data to the database and return to the System
Parameters page.
Restore: Reload the page and restore data from the database.
Cancel: Return to the System Parameters page without saving any
of your changes.
The following fields allow you to set certain system features:
•
Secure Documents at Network Level: Select this option to have
documents secured at the NOS level. Clear it to have
documents secured only at the database level.
•
Accept User-Supplied Identification: If selected, users will be
prompted to enter user names and passwords for the Win
Admin Utilities. In addition, this feature can be used in
conjunction with the Allow Auto Logon settings on the DM
Webtop Parameters, Library Parameters Defaults, and
Groups Features pages. Refer to Allow Auto Logon on the
Library Parameters Defaults and Groups Features pages for
more information.
Important: The user name and password needed here is different than the one
needed to log on to DM. The user name should be your 'short name' specified
in the PEOPLE table and the password will be pulled from the Attache
Password specified in the PEOPLE table. If there is no Attache Password then
your password will be blank. Refer to “Maintaining User Listings” on page 159.
Note: To disable single sign-on the DM administrator must remove "Allow Auto
Logon" from the group or whole library OR add "Accept User-Supplied
Identification” to make it Auto Logon. Remember that there will be one logon
like the last successful logon before the new rules take effect on the next
subsequent logon.
SETTING SYSTEM PARAMETERS
137
Setting System
Default Values
•
Capture Keystrokes, Typing and Elapsed Time: Some
applications support tracking of keystrokes, typing time,
and total elapsed time. Clear this check box if you do not
want keystrokes and time to be tracked within these
applications.
•
Use Enhanced ACL Settings: ACL stands for Access Control List.
It controls whether you can set the new DM access rights;
DOCS Open does not recognize and therefore cannot
respect the new access rights. If you used them in an mixed
environment during a migration, they would not apply to
the DOCS Open users on your network.
•
Implied Century Rule Date: The date that the implied century
rule, the rule that converts a two-digit year to a four-digit
year based on the two-digit number, is set to. May be a
number in the range 0 - 99.
•
If a user enters a two-digit year date less than the number
entered here, the year is converted to the 21st century. If a
user enters a two-digit year date equal to or greater than the
number entered here, the year is converted to the 20th
century. For instance, if the Implied Century Rule Date is set
to 30, then when a user enters 1/1/29, the date is converted
to 1/1/2029. Likewise, if a user enters 1/1/31, the date is
converted to 1/1/1931.
Click the Defaults link to display the Defaults page.
The three buttons below the tabs are:
Save: Save changed data to the database and return to the System
Parameters page.
Restore: Reload the page and restore data from the database.
Cancel: Return to the System Parameters page without saving your
changes.
The following fields allow you to set certain system default values:
•
138
CHAPTER 6
Allow Document Checkout: Select this option to allow users to
check out documents for work away from the office. If a
user has checked out a document, it may not be used by
another user until it is checked in.
•
Allow Copy of In-Use Documents: Select this option to allow
users to retrieve a copy of a document if the document is in
use when they try to retrieve it.
•
Allow Check-in of Others' Docs: Select this option to allow
another user to check in a document that was checked out
by another user. Members of the group
DOCS_SUPERVISORS can always check in documents
regardless of the setting of this field.
•
Create/Edit Template Documents: Clear this option to prevent
users from overwriting DM Webtop Template documents.
Template documents are usually standard forms or
boilerplates used by users to create finished documents.
•
Allow Users to Delete Documents: Select this option to allow
users to delete all traces of a document (the profile, content,
versions, attachments, history, and full-text references) from
the system. Users will then have access to the Delete
Document option.
•
Allow Users to Delete Content: Select this option to allow users
to delete only the content of a document (document text,
versions, attachments, and full-text references) leaving the
profile and the history records in tact. Users will then have
access to the Delete Content option.
•
Allow Users to Queue for Deletion: Select this option to allow
users to queue documents for deletion using the menu
option Queue for Deletion on the Document menu. The Queue
for Deletion menu option sets the Document Type to Deleted
and the retention days to 0.
•
Profile Level Security : Select this option to prevent users from
viewing or searching the profiles of secured documents. If
cleared, users will see all documents in a search results list
regardless of the security. All Library security will still be
enforced. Users will only be able to view profiles and
documents if they have the appropriate rights.
•
Allow Save to Remote Library : Select this option allowing users
to save documents to Remote Libraries.
Note: If this option affects all documents including e-mail. For example, if an
email message is dragged from the Inbox into a folder that is not in the user’s
logon libray, and the user does not have "Save to Remote Libraries" permission
then the email will be saved to the user’s logon library and linked to the folder.
SETTING SYSTEM PARAMETERS
139
•
Allow Auto Logon: Select this option allowing users to store
their DM Webtop logon credentials to make the logon
process quicker.
Note: To disable single sign-on the DM administrator must remove "Allow Auto
Logon" from the group or whole library OR add "Accept User-Supplied
Identification" to make it Auto Logon. Remember that there will be one logon
like the last successful logon before the new rules take effect on the next
subsequent logon.
140
CHAPTER 6
•
Allow Users to Delete Versions: Select this option to allow users
to delete one or more versions of a document.
•
Pre-connect Search Libraries: Select this option to have DM
Webtop automatically connect to Search Libraries during
startup. In NetWare for example, this will speed the
searching for individuals but if overused can slow the system
as a whole.
•
Move Docs When Profile Changes: Select this option to have
DM Webtop move documents to the new Document Path
Template when users edit profiles. For example, if your
Document Path Template were %LIBRARY_NAME/
%AUTHOR.USER_ID and a user changed the profile
Author, the document would be moved to the new Author
name directory.
•
Allow Mass Update to Profiles: Select this option to allow users
to make changes to a selected group of profiles. This would
allow users to make changes on a more global level in the
event, for example, that someone leaves the organization
and you want to rename the author of that person's
documents.
•
Disable Native Open/Save: Select this option to ensure that
users cannot save a document outside DM Webtop. Disable
Native Save also insures that users cannot change settings in
Interceptor or disable Interceptor integration.
•
Allow notifications: Select this option to give users who access
DM Webtop through the Enterprise Webtop the ability to
receive wireless notification messages for certain events.
Event Notification allows events (such as a specific
document being checked out or a specific folder being
updated) to trigger a customized notification message sent
via wireless technology such as a cell phone or a PDA
(personal digital assistant).
•
Allow modify user settings: If you set this option to Yes, your
users will be able to modify settings in their My Options
pages.
•
Allow Preview : Allow users to preview documents. You must
also have preview generation started for the library on the
Document Previews tab in Server Manager for previews to be
available. This setting works with the preview settings in the
Group Features and DM Webtop Parameters sections, as
follows:
System
Parameters>
Defaults>Allow
Preview
Users & Groups>
Groups>
GROUP NAME>
Features>Allow
Preview
DM Webtop
Maintenance>
DM Webtop
Parameters>On
Document Select
(Preview)
Result
On
Off
On
The My Options
page does not
allow the user to
change
between View
and Preview.
On
On
On
The My Options
page does allow
the user to
change
between View
and Preview.
Off
On
On
The My Options
page does allow
the user to
change
between View
and Preview.
•
Inform when update available: Select this option to alert your
users when they need to update their downloaded
components.
•
Enable Workspaces: Select this option to enable Workspaces
for your users.
SETTING SYSTEM PARAMETERS
141
•
Setting System
Permissions
Allow SQL Passthrough: The SQL Passthrough feature allows
ad-hoc SQL statements to be issued on the database server.
When this feature is enabled in DM, the DM Server allows
SQL Passthrough. When the check box is cleared, SQL
Passthrough is disabled for any client applications which
have not provided a proper application ID certificate. For
more information on this feature, please contact Open Text
Technical Support.
Click the Permissions link to display the Permissions page.
The Permissions page contains permissions for system level settings
(which can be overridden on the Group level using the Group Permissions
tab). The three buttons below the tabs are:
Save: Save changed data to the database and return to the System
Parameters page.
Restore: Reload the page and restore data from the database.
Cancel: Return to the System Parameters page without saving your
changes.
The following fields allow you to set certain system features:
Allowing Access to
DM Utilities
•
Can Create Folders: Select this option so users can create
folders.
•
Can Create/Remove Public Folders: Select this option to allow
users to create and remove public folders.
•
Can Create Related Item: Select this option to allow users to
create relations between objects.
•
Can Show Related Item: Select this option for users to show
existing relations between objects.
•
Can Remove Related Item: Select this option to allow your
users to remove relationships between objects.
Click the Utilities link to display the Utilities page.
The Utilities page sets the default access to the various DM utilities.
This page allows editing options for system level settings. These settings
can be overridden at the group level using the Group Utilities tab. The
following buttons are available:
Save: Saves data in the database and returns to the System
Parameters page.
142
CHAPTER 6
Restore: Reloads the page and restores data from the database.
Cancel: Returns to the System Parameters page without saving your
changes.
The following fields allow you to set the default permission for each
utility listed:
•
Run Database Import Utility: Select this option to allow users
to run the Database Import utility, performing mass
imports to DM databases.
•
Run Document Import: Select this option to allow users access
to Document Import, a utility that enables the mass import
of documents into DM.
•
Run DM Admin: Select this option to allow users to have access
to the DM Admin pages. Allow users to run Library
Maintenance or the DM Administration Tools from DM
Webtop, giving access to view all setup options. You must set
this option to Yes for users to be able to access the Manage
Library Parameters, Manage Users and Groups, Manage
Validation Tables, Manage Index and Profile Parameters,
and Manage DM Webtop options.
•
Manage Library Parameters: Select this option to give users
access to the System Parameters in the DM Admin pages.
(They must also be given the Run DM Admin permission
above.)
•
Manage Users and Groups: Select this option to allow users to
set up or modify users and groups in the People and Group
Maintenance in the DM Admin pages. (They must also be
given the Run DM Admin permission above.)
•
Manage Validation Tables: Select this option to allow users to
edit Validation Tables (such as the Document Types,
Applications, etc.) in the DM Admin pages. (They must also
be given the Run DM Admin permission above.)
•
Manage Index and Profile Parameters: Select this option to
allow users to access the Index and Profile Parameters in the
DM Admin pages. (They must also be given the Run DM
Admin permission above.)
SETTING SYSTEM PARAMETERS
143
Specifying Version
Control Options
•
Manage DM Webtop: Select this option to allow users to have
access to the DM Webtop Maintenance page in DM Admin.
(They must also be given the Run DM Admin permission
above.)
•
Run Designer Utility: Select this option to allow users to run
DM Designer, enabling modification of the profile forms
and altering the database tables and columns.
•
Run Storage Management Utility : Select this option to allow
users to run Storage Management, a utility that provides a
means of archiving, deleting, and moving documents.
•
Run Cost Recovery Module: Select this option to allow users to
run Cost Recovery, a utility that allows the creation of cost
reports.
•
Rights Inheritance Scheme: This determines the security
scheme for folders and quick searches. File Security is
determined by the NOS.

Limited Inheritance. If a user is granted specific rights
to a folder or a quick search and is also a member of a
group granted rights to the folder or quick search, the
individual's rights take effect and the group's rights are
ignored.

Full Inheritance. If a user is granted specific rights to a
folder or quick search and is also a member of a group
granted rights to the folder or quick search, the user
has the sum of all rights associated with that user and
with the groups.
Click the Versions link to display the Versions page.
The Versions page shows the current version handling parameters. This
page allows editing options for system settings. These settings can be
overridden at the group level using the Group Versions tab (see
“Configuring Group Version Control” on page 170. The three buttons
below the tabs are:
Save: Save changed data to the database and return to the System
Parameters page.
Restore: Reload the page and restore data from the database.
Cancel: Return to the System Parameters page without saving any
of your changes.
144
CHAPTER 6
The following fields allow you to set certain system version control
features:
•
Edit Previous Versions: Selecting this option allows users to
edit older versions of documents. Clearing it forces users to
save the edited older version as a new document, a new
version, or a sub-version. This preserves the historical
record of changes since only sub-versions can be made from
the older versions. The major versions may not be modified
once the next major version is saved.
•
Make New Version from Any Version: Selecting this option
allows users to save changes to a previous version as a new
major version. For example, if the last major version of a
document is 5, the user could retrieve version 2 and save it
as the new major version 6. The original version 2 would
remain. This is especially helpful if the original version 2
had sub-versions, and the user wanted to create a new edit
trail.
•
Visit Author Requesting Edit: When a new document version is
created, the Author Requesting the Edits is displayed. The
value is taken from the Author profile field. Select this
option if you want to allow users to edit this field.
•
Visit Entered By: When a new document version is created,
the user who made the edits is also displayed. The value is
taken from the user's logon ID. Select this option to allow
users to edit this field.
•
Always Display Version Selection List: When a user opens a
multiple-version document from within an application, a
Version Selection list is always displayed. Select this option to
have the Version Selection list display even if only one version
of the document exists.
•
Multiple Published Versions: Select this option to allow using
multiple published versions.
If you set this option and a user selects multiple versions to
publish and a document or documents are already
published, the following message is displayed: “Do you want
to set the Last Recently Edited version of the selected
document (or documents) as published and set the
currently published versions, if any, as read-only?” Click Yes
to publish the Last Recently Edited Version. The previously
SETTING SYSTEM PARAMETERS
145
published version is then set as read-only. Click Cancel to
cancel the publish operation. If a user chooses to publish a
single currently published document, the following message
is displayed: “Version n of document # <document number,
"Document Name"> is currently set as published. Do you
want to set version x as published, and mark version n as
read-only?” Click Yes to publish the selected version. The
previously published version is then set as read-only. Click
Cancel to cancel the publish operation."
Setting Attache
Options
146
CHAPTER 6
•
Maximum Versions: This is the default number of versions
allowed for each document, which can be a number in the
range 1 - 99. This field is required. This option can also be
set at the group level, in the Group Versions page (see
“Configuring Group Version Control” on page 170), to a
number other than the default. The user will be limited to
the smallest number of maximum versions set in these three
places.
•
Maximum Sub-versions: In this box enter the maximum
allowable number of sub-versions, which can be a number
in the range 0 - 26. This field is required. The value entered
for each Document Type will override this value as well as
the value set at the Group level unless it is a higher number.
The lower number takes precedence.
•
Allow Publish Versions: Select this option to allow publishing
versions of a document.
•
Allow Unpublish of Version: Select this option to remove
published versions of a document.
•
Allow Make Read-Only: Select this option to allow making
documents read-only.
•
Allow Remove of Read-Only: Select this option to allow
making read-only documents editable.
•
Allow Make Version Read-Only: Select this option to allow
making document versions read-only.
•
Allow Remove of Version Read-Only: Select this option to allow
making read-only document versions editable.
Click the Attache link to display the Attache page.
The Attache page sets the values for the Attache parameters. This page
allows editing options for system level settings; these can be overridden
at the group level using the Group Attache tab. The three buttons below
the tabs are:
•
Save: Save changed data to the database and return to the
System Parameters page.
•
Restore: Reload the page and restore data from the database.
•
Cancel: Return to the System Parameters page without saving
your changes.
The following fields allow you to set certain system features:
•
Shadow Files to Local Drive: Select this option to have DM
Webtop save each document to the local drive as well as the
document server. If the shadowed file is edited, the time
stamp of both the network and shadowed files are
synchronized to the document server's clock upon closing
the document. When opening a document, DM Webtop
will retrieve the document from the local drive only when
the time stamps are identical, indicating that the person
retrieving the document was the last one to edit it. Since
shadowed documents are often retrieved from the local
drive, network traffic is reduced. If the local time stamp is
newer, a box appears alerting the user to select either the
network or local copy. If the network copy is newer, the
network copy is retrieved.
•
Shadow Secured Documents: This option is disabled if the
Shadow Files to Local Drive option is cleared. Select this option
to have DM Webtop shadow your secured documents to a
local drive.
Note: If you do select this option, DM Webtop cannot limit access to
documents shadowed to the local drive.
SETTING SYSTEM PARAMETERS
147
•
Allow Edit of Shadowed Documents: If set to Yes, users will
be allowed to edit copies of documents that are unlocked on
the network. This makes it possible for two copies of the
same document to be edited and then checked back in. In
this event, the following scenario will occur:
If two users edit copies of the same document, the first user
to check in the document will be successful. When the
second user tries to check in the document, they have the
choice of either overwriting the document (if the next
option is selected), creating a new version of the document
(if "Make New Version from any Version" is set in the System
Parameters>Versions tab and Group>Versions tab), or creating a
new document.
•
Allow Overwrite of Simultaneous Edits: If set, users in the
situation described above will be able to check in their
edited copies, thereby overwriting the previously edited
version.
Cleanup Options
148
CHAPTER 6
•
Force Cleanup of Shadowed Documents: Select this option to
have DM automatically purge shadowed documents from
the local drive. Documents that are older than the Minimum
Age For Delete option are deleted each time you start DM
Webtop. For shadowed documents, which do not have
corresponding profiles in the Unplugged Library, DM
Webtop starts with the first variable directory in the Shadow
Path Template and deletes all files and directories from that
level down. Creating directories in the shadow directory
structure is not recommended for this reason.
•
Minimum Age For Delete (Days): This field is disabled if the
Force Cleanup of Shadowed Documents option is cleared. Enter
the minimum number of days you want documents to
remain on the local drive without being edited before being
deleted. May be a number in the range 0 - 99999.
•
Minimum Local Disk Space (MB): Enter the minimum allowed
disk space on the local drive before shadowed documents
are purged. If the Force Cleanup of Shadowed Documents
option is selected, the purge will be run automatically. If it is
cleared, the user will be notified with a message that they
should purge shadowed documents. May be a number in
the range 0 - 99999. The default value is 5 MB.
Setting System
Preferences
Click the Preferences link to display the Preferences page.
The Preferences page allows you to set the date and time formats, page's
layout and default viewer. These settings can be overridden at the
Group level using the Group Preferences page.
The three buttons below the tabs are:
Save: Save changed data to the database and return to the System
Parameters page.
Restore: Reload the page and restore data from the database.
Cancel: Return to the System Parameters page without saving your
changes.
The following fields allow you to set certain system features:
•
Date Format: Select one of the following formats: M/D/Y, D/
M/Y, D.M.Y, Y/M/D, or Y-M-D.
•
Time Format: Select either: H:M or H:M:S.
•
Default Items per Page: The field specifies the maximum
number of items displayed on any single search results page
(the range is 1 - 10000).
•
Default Maximum Pages: The field specifies the maximum
number of search results pages returned for any one search
operation (the range is 1 - 10000).
•
Default Viewer: Specifies the default viewer for viewing
documents on the web.
SETTING SYSTEM PARAMETERS
149
Working with Document Servers
Click the Document Servers tab to display the Document Servers page.
The Document Servers page allows you to view, add, and edit
Document Servers. At the top of the list, you have these options:
Filter: Select the field to search for document servers.
By: Type a text fragment you wish to search for. If this box is
empty, all the document servers will be displayed in the list.
Search: Begin searching for document servers which satisfy the
criteria.
Add: Open the Document Server Maintenance page to add a new
document server.
The list shows the current document servers matching the filter criteria.
Click an entry or the Edit icon to modify the settings in the Document
Server Maintenance page.
Editing Document
Server Settings
•
Physical Location: This column contains links for editing
document servers.
•
Edit: Open the Document Server Maintenance page to view
or modify the existing document server entry.
•
Copy: Add a new document server. All fields are filled from
the current document server entry.
If you click an existing Document Server listing or the Edit or Copy
buttons, the Document Server Maintenance page appears.
The three buttons below the tabs are:
Save: Save changed data to the database and return to the
Document Servers page.
Restore: Reload the page and restore data from the database.
Cancel: Return to the Document Servers page without saving your
changes.
The following fields allow you to set certain document server features:
•
150
CHAPTER 6
Physical Location: Specify the physical location of the
document server. Maximum length is 64 characters.
•
Operating System: Allows you to select the operating system
installed on the document server. This may be one of:

Standalone

Generic

NetWare NDS

DSSS on NTFS (Document Server Security Service)

DSSA on NTFS (Document Server Sentry Agent)

Enterprise Library Server

Livelink

Centera
With eDOCS DM, the Generic option provides easy
configuration and can be secured to the DM Service
Account only. By only giving the DM Service Account access
to the Generic share, file security is ensured.
If your site requires file level security, you may use
Document Server Security Service (DSSS) to apply and
maintain the document ACL on the physical file on the
Document Server.
Document Server Sentry Agent (DSSA) adds an additional
level of security as only the specified Domain Admin
account can assess documents. If no legacy DOCS Open
clients exist in your environment, setting up a Generic
document server with exclusive access for the DM Service
Account achieves the same level of file security.
Both DSSS and DSSA must be installed on Windows NTFS
volumes.
•
Media Type: Select one of the available media types - Online,
Optical, or Jukebox. For the DSSA on NT Server operating
system this option is not available.
•
Read Only : Select this option if you wish to use the document
server in read-only mode. By default, this option is cleared.
Once you define a read-only server, you can select the readonly server and define which versions are moved when a
document is made read-only in Library Maintenance’s
File>Set Read Only Server function. See the Library
Maintenance guide or help system for instructions.
WORKING WITH DOCUMENT SERVERS
151
•
Disable Document Server: Select this option if you wish to
disable the document server. By default, this option is
cleared.
•
Free Space Threshold (MB): This field specifies the minimum
amount of disk space allowed during an archive, delete, or
move process. For example, if you enter a value of 10, DM
will stop archiving, deleting, or moving documents if less
than 10 MB are available. May be empty or a number in the
range 0-9999999.
Using the .pea File for EMC Centera Read-Only Document Servers (DM-Y
You can specify the location of the .pea file, which is used for EMC
Centera read-only document servers. Following are instructions for
doing this in DM Webtop; however, you can also perform these steps in
Library Maintenance.
To specify the .pea file location:
1. In DM Webtop, click DM Admin>Library Parameters>Document
Servers.
2. Click the Centera document server.
3. In the Physical Location field, type the IP address and the
location of the .pea file in the following format:
128.221.200.60?C:\\CenteraPEA\\us2_profile2_rdqe
cw.pea
where the IP address, in this example, is a public Centera
server, and C:\\CenteraPEA\\us_2_profile2_rdqecw.pea is
the location of the .pea file.
We recommend that you place the .pea file near the root
directory, which ensures a short .pea file path; otherwise,
you might need to expand the LOCATION column in the
DOCSERVERS table from nvarchar (64) to nvarchar (200)
characters to accommodate a longer .pea file path.
4. Click the Operating System drop-down menu and select
Centera.
5. Select the Read Only check box.
6. Click OK.
To set what is saved to your Centera read-only server, open the RM
Admin Tool and select Administration>Set Read Only Server.
152
CHAPTER 6
Various .pea files are available at http://www.EMC.com. Consult this
web site for definitions to the permission and rights of the .pea files.
You can also obtain IP addresses for public test Centera servers from the
EMC web site.
Working with Remote Libraries
Click the Remote Libraries tab to display the Remote Libraries page.
The Remote Libraries page allows you to view, add, and edit remote
libraries. At the top of the list, you have these options:
Filter: Select the field to search for remote libraries.
By : Type a text fragment you wish to search for. If this box is
empty, all the remote libraries will be displayed in the list.
Search: Begin searching for remote libraries which satisfy the
criteria.
Add: Open the Remote Library Maintenance page to add a new
remote library.
The items on the Remote Libraries page have the following meaning:
Editing Remote
Library Settings
•
Library Name: This column contains links for editing remote
libraries. Click one of the entries to display the Remote
Library Maintenance page for that remote library.
•
Description: This column contains brief descriptions of each
of the listed remote libraries.
•
Edit: Click to open the Remote Library Maintenance page to
edit the existing remote library.
•
Copy : Click to open the Remote Library Maintenance page
with the fields pre-filled from the current remote library
entry.
Click an existing Remote Library link or the Edit or Copy button to display
the Remote Library Maintenance page.
The three buttons below the tabs are:
Save: Save changed data to the database and return to the Remote
Libraries page.
Restore: Reload the page and restore data from the database.
WORKING WITH REMOTE LIBRARIES
153
Cancel: Return to the Remote Libraries page without saving your
changes.
The following fields allow you to set remote library features:
154
CHAPTER 6
•
Library Name: Specify a library name (the name must not
contain spaces). The maximum length is 20 characters.
•
Description: Type a short, informative description for the
library. The maximum length is 80 characters.
•
Disabled: Select this option to disable this library.
•
Search by Default: Select this option if you want users to
search this library by default. If you clear this option,
authorized users can select this library for searching.
•
Shadow this Library: Select this option to indicate that
documents stored on this library will be shadowed. This
option overrides the shadowing setting in the System
Parameters Attache page.
•
Server User Name: Specify the network user name on this
database server. Choose from DOCSADM, DOCSUSER, or
your user-defined common logon name. This option is not
available for the Primary Library. The maximum length is
30 characters.
•
Server Password: Enter the password for the Server User
Name. This option is not available for the Primary Library.
When Server Passwords are changed here, they are
automatically synchronized to all remote libraries. For
example, if you change the password for DOCSUSER in the
Primary library, the new password will be automatically
written to all libraries remote to the Primary. The maximum
length is 100 characters.
•
Database Vendor: Select the database engine being used.
•
Server Location: This field provides the method by which DM
connects with the Remote Library. The maximum length is
128 characters.
•
Database Name: Specify the database name. This option is
not available for Oracle. The maximum length is 18
characters.
•
Library Group: This option allows you to set groups of
libraries for searching. If you want to group libraries, type a
name in this field. Use the same name in this field for other
Remote Libraries to include the other libraries in this group.
The maximum length is 10 characters.
•
Owner: This option is used to support multiple DM libraries
on a single Oracle instance. When adding an Oracle library
as a remote library, you must enter the Owner name that
you entered when you ran the Library Generator tool
against the Oracle library. The maximum length is 80
characters.
Changing System Terminology
Click the Terminology tab to display the Terminology page. The
Terminology page allows you to rename words in the DM Webtop to
terms you use in your organization. At the top of the list, you have these
options:
Filter: Select the field to search for terms. You can select either Term
Name or Replacement Value.
By : Type a text fragment you wish to search for. If this box is
empty, all the terms will be displayed in the term list.
Search: Begin searching for terms which satisfy the criteria.
Add: Open the Term Maintenance page to add a new term.
The list shows the current settings for each of the replaceable terms.
Click a term or the Edit icon to modify the setting in the Term
Maintenance page. You can also click the Copy icon to use it to create a
new term.
Using the Term
Maintenance Page
Click an existing term link or click the Edit or Copy icon to display the
Term Maintenance page. The three buttons below the tabs are:
Save: Save changed data to the database and return to the
Terminology page.
Restore: Reload the page and restore data from the database.
Cancel: Return to the Terminology page without saving your
changes.
The following fields allow you to set term values:
CHANGING SYSTEM TERMINOLOGY
155
156
CHAPTER 6
•
Term Name: Type the term name (for new terms: existing
terms are not editable). The maximum length is 29
characters.
•
Replacement Value: Specify a replacement value for the term.
The maximum length is 29 characters.
Chapter
7
User and Group Settings
In This Chapter
The User and Group settings pages allow you to add, modify and
remove individual users and groups. To access this feature, log on to
DM Webtop, select the DM Admin tab, then the Users and Groups tab.
157
Listing Current Users
At the top of the list, you have these options:
Filter: Select the field to search for users.
By: Type a text fragment you wish to search for. If this box is
empty, all users will be displayed in the list.
Search: Begin searching for users which satisfy the criteria.
Add: Open the People Maintenance page to add a new user.
The list shows the current users matching the filter criteria.
•
Short Name: This column contains links for editing users.
•
Full Name: This column displays full names of the users.
•
Office: This column displays offices where users are working.
•
Edit: Opens the People Maintenance page for editing an
existing user.
•
Copy: Opens the People Maintenance page for adding a new
user. All fields are filled from an existing user.
Restricted User Accounts Not Supported in DM
The use of restricted user accounts is not supported in eDOCS DM.
User accounts must be either regular Microsoft Windows users or
power users. Restricted user accounts, although having access to the
HKEY_CURRENT_USER portion of the system registry, do not have
rights to other portions of the system registy, which eDOCS DM uses.
158
CHAPTER 7
Adding User
Accounts to DM
To add a user account to DM in DM Webtop:
1. Click the DM Admin tab.
2. Click the Users and Groups tab.
3. Click the Add icon.
4. Complete the fields described in User Account Information
below.
5. Click Save.
Maintaining User
Listings
Click an existing user entry to display the People Maintenance page for
that person (or click the Edit button). This page allows you to set certain
user values. There are two sub-tabs available:
Network Aliases: Allows you to add aliases for this user. Refer to
“Configuring Network Aliases” on page 160.
Group Access: The current groups this person belongs to. Refer to
“Setting Group Access for Users” on page 161.
The three buttons below the tabs are:
Save: Save changed data to the database and return to the People
page.
Restore: Reload the page and restore data from the database.
Cancel: Return to the People page without saving any of your
changes.
User Account Information
The following fields allow you to modify the settings for this person:
•
Short Name: Enter the user name the user will enter when
filling out Document Profiles. This is usually a shortened
form of the Network Alias.
•
Allow Login: Clear this option to prevent the user from
logging on to DM Webtop.
•
Attache Password: The password for this user. The value in
this field is masked as you type it.
LISTING CURRENT USERS
159
Configuring
Network Aliases
•
Primary Group: Each user is assigned to at least one group,
known as DOCS_USERS. They can also be members of
other groups for document security. Only one group, the
Primary Group, affects what features, utilities, and profiles
the user has access to in DM. Use the Table Lookup button
(...) to view a list of groups. Select a group name to have that
value added to the Primary Group field for this user, then click
OK to close the window and return to the People
Maintenance page.
•
Full Name: Type the person's full name in the field. If the
Short Name is the user's first name, you could type users' last
names followed by their first names, to make searching by
full name in a Table Lookup easier.
•
User Location: Type the user's office location. This field can
contain a city reference, a department reference, or even the
floor number where the user is located. This field, along
with the user's logon ID, full name, phone number,
extension, and fax number is displayed whenever you
attempt to retrieve a document that is being edited or is
checked out by another user.
•
Phone: Type the user's telephone number.
•
Extension: Type the user's telephone extension.
•
Fax Phone: Type the user's fax telephone number.
•
Target Document Server: If you specified Author or Typist in
the Target Server Column field in the System Parameters page,
type the name of the server on which to store this user’s
documents. If left blank, documents for this user will be
saved to the Primary Document Server location specified on
the System Parameters page.
Click the Network Aliases link on the People Maintenance page to display
the Network Aliases page. The Network Aliases page allows you to add
network aliases to DM Library users. Expand the Listed Network entry by
selecting an entry in the Network list and clicking Load Network. Highlight
the Network Resource for which you want to create an alias and click the
>> button to move that entry to the Library Users list.
To remove an alias, select the defined alias in the Library Users list and
click the << button. You will be prompted to confirm that you want to
remove this alias. Click OK.
160
CHAPTER 7
When you have finished working with Aliases, click Close to return to
the People Maintenance page for this group.
Setting Group
Access for Users
Click the Group Access link on the People Maintenance page to display
the Group Access page. The Group Access page shows the current
groups this person belongs to. This page allows adding and removing
the user to and from groups. The three buttons below the tabs are:
Save: Save changed data to the database and return to the People
Maintenance page.
Restore: Reload the page and restore data from the database.
Cancel: Return to the People Maintenance page without saving
your changes.
Below the buttons, you have two list boxes:
•
Member of: The list box showing the current groups this user
belongs to. Use the Select All or Clear selection buttons below
this box to highlight all or none of the current entries.
•
Non-Member of: Other groups to which this person can be
added. Use the Select All or Clear selection buttons below this
box to highlight all or none of the current entries.
•
<< : Adds groups to the Member of list. To add this person to a
group, highlight groups in the Non-Member of list and click
this button. When clicked, the group is added to the Member
of list. Use the CTRL key to select multiple entries.
•
>> : Removes this person from the group selected in the
Member of list. To remove this person from a group,
highlight the entries in the Member of list and click this
button. When clicked, the user is removed from the selected
group or groups. Use the CTRL key to select multiple entries.
When you finish changing this user's group memberships, click Save to
complete the process.
Filtering Members and Non-Members in Group Members Dialog Box
(SR4)
You can filter Members and Non-Members in the Group Members
dialog box. Both wildcard searching/filtering and initial letter filtering
are required.
LISTING CURRENT USERS
161
Two text fields have been added to the Group Members form; one is for
the Current Members list, and the other is for the Non-Members list. Type
text into one of the fields to apply it as an initial string filter. You can use
the wildcards `?', `(`, any single letter, and * (any string).
To enable the filtering feature:
1. Locate and open the pcdocs.ini file (by default, C:\Program
Files\Open Text\DM Server\Program) in a text editor, such
as Notepad.
2. Add the following entry:
[docsadm]
members_filter=1
3. Save and close the pcdocs.ini file.
4. Refresh the DM Server cache.
Managing Groups
If you click the Groups tab, the default page is the list of current groups.:
Listing Current Groups
At the top of the list, you have these options:
Filter: Select the field to search for groups.
By: Type a text fragment you wish to search for. If this box is
empty, all groups will be displayed in the list.
162
CHAPTER 7
Search: Begin searching for groups which satisfy the criteria.
Add: Open the Group Maintenance page to add a new group.
The list shows the current groups matching the filter criteria.
Adding or
Maintaining Group
Listings
•
Group ID: This column contains links for editing groups.
•
Group Name: This column displays full names of the groups.
•
Edit: Open the Group Maintenance page for editing an
existing group.
•
Copy : Open the Group Maintenance page to add a new
group. All fields for the new group are filled from the
selected existing group.
The Group Maintenance page appears when you click the name of an
existing group. This page allows you to set up the parameters for a
group. Below the tabs are links to the following pages:
Features: This page allows you to set the basic settings for this
group. This page is discussed in “Setting Group Features” on
page 164.
Permissions: Use the settings on this page to set the permissions for
members of this group. This page is discussed in “Setting Group
Permissions” on page 167.
Utilities: This page provides group members with access to certain
utilities. This page is discussed in “Adding Group Access to
Utilities” on page 168.
Versions: The settings on this page provide group members with
version rights. This page is discussed in “Configuring Group
Version Control” on page 170.
Members: Add or remove members from this group. This page is
discussed in “Adding Members to Groups” on page 172.
Forms: Assign DM Webtop forms and default field values for the
members of the current group. This page is discussed in “Setting
Default Forms for Groups” on page 173.
Aliases: Add network aliases to this group. This page is discussed in
“Setting Up Group Aliases” on page 177.
Attache: Set the values for the various Attache features. This page is
discussed in “Attache for Groups” on page 177.
LISTING CURRENT GROUPS
163
Preferences: Set date and time formats and the page defaults. This
page is discussed in “Setting Group Preferences” on page 179.
The three buttons below the tabs are:
Save: Save changed data to the database and return to the Groups
page.
Restore: Reload the page and restore data from the database.
Cancel: Return to the Groups page without saving your changes.
The following fields allow you to set certain group features:
Setting Group
Features
•
Group ID: The group ID describes its members and cannot
contain spaces. Examples are DOCS_USERS,
DOCS_SUPERVISORS, ADMIN, TEMP, SECURITY, etc.
This field is required. Maximum length is 16 characters.
•
Group Name: Enter a formal name for the group. This field
can contain spaces.
•
Universal Access: If users in this group will require access to
all documents in a particular library (including secured
documents), select the access level for this group (None,
Read, Write). If you add or remove a Universal Access group
to or from an existing library, you must run the Security
Regeneration utility to ensure that the setting for this group
is applied to or removed from all documents. This feature
also works for documents stored on a DSA server.
•
Disabled: Disable this group.
Click the Features link on the Group Maintenance page to display the
Group Features page. The three buttons below the tabs are:
Save: Save changed data to the database and return to the Group
Maintenance page.
Restore: Reload the page and restore data from the database.
Cancel: Return to the Group Maintenance page without saving
your changes.
The following fields allow you to set certain group features:
164
CHAPTER 7
•
Profile Level Security : Prevent users from viewing or searching
the profiles of secured documents. If you do not select this
option, users can see all documents in a search results list
regardless of the security. All Library security is enforced:
users will only be able to view profiles and documents if
they have the appropriate rights.
•
Pre-Connect Search Libraries: Have DM automatically connect
to Search Libraries during startup.
•
Move Documents When Profile Changes: Have DM move
documents to the new Document Path Template when users
edit Profiles. For example, if your Document Path Template
is
%LIBRARY_NAME\%AUTHOR.USER_ID
and the user changed the profile Author, the document
would be moved to the new Author name directory.
•
Allow Auto Logon: Allows users to store their logon settings in
a cookie to make the logon process quicker. This setting
works with the same setting on the Library Parameters
Defaults page and DM Webtop Parameters page: if both of
these settings are selected and the Accept User-Supplied
Identification option (on the System Parameters Features
page) is not selected, users who have application integration
installed can logon to DM Webtop without having to
provide their user names and passwords.
Note: To disable single sign-on the DM administrator must remove “Allow Auto
Logon” from the group or whole library OR add “Accept User-Supplied
Identification” to make it Auto Logon. Remember that there will be one logon
like the last successful logon before the new rules take effect on the next
subsequent logon.
•
Disable Native Open/Save: Select to ensure that users cannot
save a document outside DM. Disable Native Save also
insures that users cannot change settings in Interceptor or
disable Interceptor integration. This setting must be
changed at the group level for it to take effect and by default
is set to No.
•
Allow Notifications: Select this option to give users the ability
to receive notification e-mail for certain events.
LISTING CURRENT GROUPS
165
•
166
CHAPTER 7
Allow Preview: Allow users to preview documents. You must
also have preview generation started for the library on the
Document Previews tab in Server Manager for previews to be
available. This setting works with the preview settings in the
System Parameters and DM Webtop Parameters, as follows:
System
Parameters>
Defaults>Allow
Preview
Users & Groups>
Groups>
GROUP NAME>
Features>Allow
Preview
DM Webtop
Maintenance>
DM Webtop
Parameters>On
Document Select
(Preview)
Result
On
Off
On
The My Options
page does not
allow the user to
change
between View
and Preview.
On
On
On
The My Options
page does allow
the user to
change
between View
and Preview.
Off
On
On
The My Options
page does allow
the user to
change
between View
and Preview.
•
Inform when update available: Select this option to alert your
users when they need to update their downloaded
components.
•
Enable Workspaces: Select this option to make Workspaces
available to your users.
Setting Group
Permissions
Click the Permissions link on the Group Maintenance page to display the
Group Permissions page. The Group Permissions page contains
permissions for group level settings (which override the System level
settings in the System Parameters Permissions tab).
The three buttons below the tabs are:
Save: Save changed data to the database and return to the Group
Maintenance page.
Restore: Reload the page and restore data from the database.
Cancel: Return to the Group Maintenance page without saving
your changes.
The following fields allow you to set certain group permissions. If you
select Default, the System setting for that feature will apply to this
group:
•
Allow modify user settings: Determines if a user is allowed to
change their DM Webtop settings via the user Options page.
•
Can Create/Remove Public Folders: Select this option to allow
users to create and remove public folders.
•
Can Create Related Item: Select this option to allow users to
create relations between documents.
•
Can Show Related Item: Select this option for users to show
relations.
•
Can Remove Related Item: Select this option so that users can
remove relationships between documents.
•
Allow Document Checkout: Indicate Yes to allow group
members to check out documents.
•
Allow Copy of In-Use Documents: Allow users to retrieve a copy
of a document if the document is in use or checked out
when they try to retrieve it.
•
Allow Checkin of Others' Docs: Allow a user to check in a
document that was checked out by a different user. DM
administrators can always check in documents regardless of
the setting of this field.
•
Create/Edit Template Documents: Allow users to set up or edit
DM Template documents. Template documents are usually
standard forms or boilerplates used by users to create
finished documents.
LISTING CURRENT GROUPS
167
•
Allow Users to Delete Documents: Permit users to delete
documents from the system.
•
Allow Users to Delete Content: Let users delete the contents of
a document; the profile and document history records are
left in the library.
•
Allow Users to Queue for Deletion: Sets the document type to
deleted.
•
Allow Save to Remote Library: Allow users to save documents
to Remote Libraries. If this group has only one library,
indicate No to avoid the users from having to select the
library each time they create a document.
Note: If this option affects all documents including e-mail. For example, if an
email message is dragged from the Inbox into a folder that is not in the user’s
logon libray, and the user does not have "Save to Remote Libraries" permission
then the email will be saved to the user’s logon library and linked to the folder.
Adding Group
Access to Utilities
•
Remove Items from Profile New Docs: Allows users to remove
items from the Profile New Documents list, leaving them
unprofiled and stored with their DOS pathname.
•
Allow Users to Delete Versions: Select this option to allow your
users to remove specific versions of a document from the
system.
•
Allow Mass Update to Profiles: Allows users to make changes to
more than one profile at a time.
•
Can Create Folders: Select this option so that group members
can create folders.
•
Can Create New Documents: This allows users to add new
documents to the system.
•
Can See Unsecured Objects: Select this option to allow users to
see documents that do not have specific security settings.
Click the Utilities link on the Group Maintenance page to display the
Group Utilities page. The Utilities page sets the group access to the
various DM utilities. This page allows editing options which override
the system level settings (set in the System Parameters Utilities tab). The
following buttons are available:
Save: Saves data in the database and returns to the Group
Maintenance page.
Restore: Reloads the page and restores data from the database.
168
CHAPTER 7
Cancel: Returns to the Group Maintenance page without saving
your changes.
The following fields allow you to set the group permission for each
utility. If you leave the setting at Default, the system-level setting will
apply to this group.
•
Run Database Import Utility: Select this option to allow users
to run the Database Import Utility, thereby performing
mass imports to DM databases.
•
Run Document Import: Select this option to allow users to run
Document Import, a utility that enables the mass import of
documents into DM.
•
Run DM Admin: Select this option to allow users to have access
to the DM Admin pages. Allow users to run Library
Maintenance or the DM Administration Tools from DM,
giving access to view all setup options. You must set this
option to Yes for users to be able to access the Manage
Library Parameters, Manage Users and Groups, Manage
Validation Tables, Manage Index and Profile Parameters,
and Manage DM Webtop options.
•
Manage Library Parameters: Select this option to give users
access to the System Parameters portion of the DM Admin
pages. (Group members must also have the Run DM Admin
permission granted.)
•
Manage Users and Groups: Select this option to allow users to
set up or modify users and groups in the Users and Groups
portions of the DM Admin pages. (Group members must
also have the Run DM Admin permission granted.)
•
Manage Index and Profile Parameters: Select this option to
allow users to access the Index and Profile Parameters in the
DM Admin pages. (Group members must also have the Run
DM Admin permission granted.)
•
Manage DM Webtop: Select this option to allow users to
manage DM Webtop. (Group members must also have the
Run DM Admin permission granted.)
•
Manage Validation Tables: Select this option to allow users to
edit Validation Tables (such as the Document Types,
Applications, etc.) in the Library Maintenance utility.
(Group members must also have the Run DM Admin
permission granted.)
LISTING CURRENT GROUPS
169
Configuring Group
Version Control
•
Run Designer Utility: Select this option to allow users to run
the DM Designer utility, enabling modification of the
profile forms and altering the database tables and columns.
•
Run Storage Management Utility : Select this option to allow
users to run Storage Management, a utility that provides a
means of archiving, deleting, and moving documents.
•
Run Cost Recovery Module: Select this option to allow users to
run Cost Recovery, a utility that provides a means of
creating cost reports.
•
Manage Doc Import Information: This determines if members
of this group can create and edit Document Import sets.
Click the Versions link on the Group Maintenance page to display the
Group Versions page. The Group Versions page shows the current
version handling parameters for this group. This page allows editing
options which override the system settings (from the System Parameters
Versions tab). The three buttons below the tabs are:
Save: Save changed data to the database and return to the Group
Maintenance page.
Restore: Reload the page and restore data from the database.
Cancel: Return to the Group Maintenance page without saving
your changes.
The following fields allow you to set certain group features. If you leave
the setting at Default, the system-level setting will apply to this group.
•
170
CHAPTER 7
Edit Previous Versions: Selecting this option allows users to
edit older versions of documents. Clearing it forces users to
save the edited older version as a new document, a new
version, or a sub-version. This preserves the historical
record of changes since only sub-versions can be made from
the older versions. The major versions may not be modified
once the next major version is saved.
•
Make New Version from Any Version: Selecting this option
allows users to save changes to a previous version as a new
major version. For example, if the last major version of a
document is 5, the user could retrieve version 2 and save it
as the new major version 6. The original version 2 would
remain. This is especially helpful if the original version 2
had sub-versions, and the user wanted to create a new edit
trail.
•
Visit Author Requesting Edit: When a new document version is
created, the Author Requesting the Edits is displayed. The
value is taken from the Author profile field. Select this
option if you want to allow users to edit this field.
•
Visit Entered By: When a new document version is created,
the user who made the edits is also displayed. The value is
taken from the user's logon ID. Select this option to allow
users to edit this field.
•
Always Display Version Selection List: When a user opens a
multiple-version document from within an application, a
Version Selection list is always displayed. Select this option
to have the Version Selection list display even if only one
version of the document exists.
•
Allow Publish Versions: Select this option to allow publishing
versions of documents.
•
Allow Unpublish of Version: Select this option to prohibit
publishing versions of documents.
•
Allow Make Read-Only : Select this option to allow making
read-only documents.
•
Allow Remove of Read-Only : Select this option to allow
removing read-only documents.
•
Allow Make Version Read-Only : Select this option to allow
making read-only document versions.
•
Allow Remove of Version Read-Only: Select this option to allow
removing read-only document versions.
LISTING CURRENT GROUPS
171
Adding Members
to Groups
•
Maximum Versions: This is the default number of versions
allowed for each document. May be a number in the range 1
- 99. This field is required. This option is also set at the
system level, in the System Versions page (see “Specifying
Version Control Options” on page 144), to a number other
than the default. The user will be limited to the smallest
number of maximum versions set in these three places.
•
Maximum Sub-versions: In this box enter the maximum
allowable number of sub-versions. May be a number in the
range 0 - 26. This field is required. Each individual
Document Type may have its own maximum number of
sub-versions. The value entered for each Document Type
will override this value as well as the value set at the Group
level unless it is a higher number. The lower number takes
precedence.
Click the Members link on the Group Maintenance page to display the
Group Members page. The Group Members page shows the current
members of this group. This page allows adding and removing group
members. The three buttons below the tabs are:
Save: Save changed data to the database and return to the Group
Maintenance page.
Restore: Reload the page and restore data from the database.
Cancel: Return to the Group Maintenance page without saving
your changes.
The available users are shown in the two lists:
•
Current Members: The list box showing the existing group
members. Use the Select All or Clear selection buttons below
this box to highlight all or none of the current entries.
•
Non-Members: The other users who can be added to this
group. Use the Select All or Clear selection buttons below this
box to highlight all or none of the current entries.
Use the following two controls to move users from one list to the other:
•
172
CHAPTER 7
<<: Adds users to the Library Groups pane. To add users,
highlight entries in the Non-Members pane and click this
button. When clicked the user is added to the Current
Members pane. Use the CTRL key to select multiple entries.
•
>> : Removes users from the Current Members pane. To
remove a user, highlight the entries in the Current Members
pane and click this button. When clicked the user is
removed from the Current Members pane. Use the CTRL key to
select multiple entries.
When you finish moving users between the Current Members and NonMembers panes, click Save to complete the process.
Setting Default
Forms for Groups
Click the Forms link on the Group Maintenance page to display the
Group Forms page.
This page allows you to set up the form defaults for a group. DM allows
you to define multiple Profile Entry and Search Forms for your users.
Using DM Designer, you can create a variety of forms to be used by
different groups and with different applications. If you choose to use
only one Profile Entry and one Search Form, you will use Forms
Selection to enter the names of your forms. The tabs are links to the
following pages:
•
“Group Master Form” on page 174
•
“Group Paper Form” on page 175
•
“Group Profile Search Form” on page 175
•
“Group Quick Retrieve Form” on page 176
•
“Group Applications Forms” on page 176
The button below the tabs is:
Cancel: Return to the Groups page without saving any changes.
If you choose to use multiple forms, you can define which Profile Entry,
Profile Search, and Quick Retrieve forms the members of this group
have access to and to define form default values. You must define for the
members of this group a primary Profile Entry form, a paper form for
paper documents, and default field values for the group's Profile Entry
forms. Other Profile Entry forms can be set up by application. You must
also define Profile Search forms to correspond to each of your Profile
Entry forms.
When multiple forms are available to a user, the user is prompted with
a list of form options from which to choose. If none are defined for that
application, or if the user does not have access to the form being called,
LISTING CURRENT GROUPS
173
the user's primary group default profile form, also specified in this
section, is used.
Group Master Form
The Group Forms page is the default page displayed when you click the
Forms link from the Group Maintenance page. The button below the
tabs is:
Cancel: Return to the previous page without saving your changes.
This is the “master” Profile Entry form, and only the GROUP_DEF
form is available. If all of your Profile Entry forms do not share the same
fields, you must load this form in DM Designer and add to it every field
you include in any Profile Entry form. When groups are using different
profile forms with different foreign key fields, it is important that no
foreign keys are left NULL when they are not used on one of the forms.
For example, suppose you have two groups, Legal and Accounting. The
Legal forms use Case/File and Accounting uses Section/Group. In this
situation, each group would leave a NULL value in the database if not
added to the GROUP_DEF form in DM Designer. To correct this
situation, using DM Designer, you would have to add Case, File,
Section, and Group to the GROUP_DEF Master form.
Click the GROUP_DEF form to enter default values for Profile Entry
form fields for the active group. When you click the Defaults button, a
blank version of the GROUP_DEF form is displayed. Enter the default
Profile Entry field values for this group. All required fields in a ParentChild relationship such as Case and File must have default values
entered. Using the above example (assuming there is a parent-child
relationship), for the Accounting group, you must enter a value for
Case and File. For the Legal group, you must enter a value for Section
and Group. You will not be able to assign security defaults to the master
form. Security defaults can be added to the Primary and Applicationspecific profile forms and to the personal profile defaults in DM
Webtop.
Note: If you set up Profile Entry forms by application, you will be able to enter
default field values for those forms. The values entered in the application
Profile Entry forms will override the values entered in GROUP_DEF. Users will
be able to edit any of these values when filling out Profile Entry forms, but they
will not be allowed to leave any of the fields blank. The user's entries will
override both the Application form default values and the GROUP_DEF values.
If the user does not enter a value, the Group default will be used.
174
CHAPTER 7
Form Default
Values
Click the link on the Group Master Form to display the Form Default
Values page. Use the fields on this page to set the field defaults for users
in this group.
The buttons below the tabs are:
Save: Save changed data to the database and return to the previous
page.
Restore: Reload the page and restore data from the database.
Cancel: Return to the previous page without saving your changes.
Group Paper Form
Click the Paper sub-tab from the Group Forms page to display the
Group Paper Form page. The three buttons below the tabs are:
Save: Save changed data to the database and return to the Group
Maintenance page.
Restore: Reload the page and restore data from the database.
Cancel: Return to the Group Maintenance page without saving
your changes.
Select the Profile Entry form or forms you want to use for profiling
paper documents. If you enter nothing, the Primary form for the
current group will be used. Click Preview to view the form. Click Edit to
specify default values for the form fields.
Group Primary
Form
Click the Primary sub-tab from the Group Forms page to display the
Group Primary Form page. The three buttons below the tabs are:
Save: Save changed data to the database and return to the Group
Maintenance page.
Restore: Reload the page and restore data from the database.
Cancel: Return to the Group Maintenance page without saving
your changes.
Select the Profile Entry form or forms you want to use as the primary
form for profiling documents. Click Preview to view the form. Click Edit
to specify default values for the form fields.
Group Profile
Search Form
Click the Profile Search sub-tab from the Group Forms page to display
the Group Profile Search Form page. The three buttons below the tabs
are:
LISTING CURRENT GROUPS
175
Save: Save changed data to the database and return to the Group
Maintenance page.
Restore: Reload the page and restore data from the database.
Cancel: Return to the Group Maintenance page without saving
your changes.
Profile Search forms are not defined by application, since the
application desired would not be known until the user provided that
information.
Select the primary Profile Search form that members of this group will
use. Click Preview to view the form.
Group Quick
Retrieve Form
Click the Quick Retrieve sub-tab from the Group Forms page to display
the Group Quick Retrieve Form page. The three buttons below the tabs
are:
Save: Save changed data to the database and return to the Group
Maintenance page.
Restore: Reload the page and restore data from the database.
Cancel: Return to the Group Maintenance page without saving
your changes.
Choose a Quick Retrieve form for this group. You can highlight a form
and click Preview to view the form. You can make only one choice for a
particular group.
Group Applications
Forms
Click the Applications sub-tab from the Group Forms page to display the
Group Applications Form page. The three buttons below the tabs are:
Save: Save changed data to the database and return to the Group
Maintenance page.
Restore: Reload the page and restore data from the database.
Cancel: Return to the Group Maintenance page without saving
your changes.
This can be set for each application. If you choose not to select any
forms for a particular application, the Primary form will be used. Select
the application from the pull-down list to associate Profile Entry forms
and mark as many forms in the Form Name column as you want. Note
that both Profile Entry and Profile Search forms are listed: you should
only mark Profile Entry forms.
176
CHAPTER 7
For each form selected, you can click Preview to view the form and click
Defaults to enter default field values for that form. The default values
entered here will override the GROUP_DEF defaults. Users will be able
to override these defaults with their own personal profile defaults
defined in DM Webtop, or they can change them “on the fly”. Users will
not be able to leave any fields blank, however. If they leave a field blank,
the default entered here will be used.
When users create documents using an application with multiple
Profile Entry forms available, they will be prompted to select which
form they want to use.
Setting Up Group Aliases
The Group Aliases page allows you to add network aliases for this DM
group. Click the Aliases link on the Group Maintenance page to display
the Group Aliases page.Expand the Listed Network entry by selecting an
entry in the Network list and clicking Load Network. Highlight the Network
Resource for which you want to create an alias and click the >> button to
move that entry to the Library Groups list.
To remove an alias, select the defined alias in the Library Groups list and
click the << button. You will be prompted to confirm that you want to
remove this alias. Click OK.
When you have finished working with Aliases, click Close to return to
the Group Maintenance page for this group.
Attache for Groups
The Group Attache page shows the current Attache settings for this
group. Click the Attache link on the Group Maintenance page to display
the Group Attache page. This page allows editing options which
override the settings on the System Parameters Attache tab (see “Setting
Attache Options” on page 146). The three buttons below the tabs are:
Save: Save changed data to the database and return to the Group
Maintenance page.
Restore: Reload the page and restore data from the database.
SETTING UP GROUP ALIASES
177
Cancel: Return to the Group Maintenance page without saving
your changes.
The following fields allow you to set certain group features. If you leave
the setting at Default, the system-level setting will apply to this group.
•
Shadow Edited Files to Local Drive: Select this option to have
DM save each document to the local drive as well as the
document server. If the shadowed file is edited, the time
stamp of both the network and shadowed files are
synchronized to the document server's clock upon closing
the document. When opening a document, DM Webtop
retrieves the document from the local drive only when the
time stamps are identical, indicating that the person
retrieving the document was the last one to edit it. Since
shadowed documents are often retrieved from the local
drive, network traffic is reduced. If the local time stamp is
newer, a box appears alerting the user to select either the
network or local copy. If the network copy is newer, the
network copy is retrieved.
•
Shadow Secured Documents: This option is disabled if the
Shadow Files to Local Drive option is cleared. Select this option
to have DM shadow your secured documents to a local
drive.
Note: If you do select this option, DM cannot limit access to documents
shadowed to the local drive.
•
Allow Edit of Shadowed Documents: If set to Yes, users will be
allowed to edit copies of documents that are unlocked on
the network. This makes it possible for two copies of the
same document to be edited and then checked back in. In
this event, the following scenario will occur:
If two users edit copies of the same document, the first user
to check in the document will be able to successfully do so.
When the second user tries to check in the document, they
can either overwrite the document (if the next option is
selected), create a new version of the document (if Make New
Version from any Version is set in the System
Parameters>Versions tab and Group>Versions tab), or create a
new document.
178
CHAPTER 7
Cleanup Options
•
Allow Overwrite of Simultaneous Edits: If set, users in the
situation described in the topic Allow Edit of Shadowed
Documents will be able to check in their edited copies,
thereby overwriting the previously edited version.
•
Force Cleanup of Shadowed Documents: Select this option to
have DM automatically purge shadowed documents from
the local drive. Documents that are older than the Minimum
Age For Delete option are deleted each time you start DM
Webtop. For shadowed documents, which do not have
corresponding profiles in the Unplugged Library, DM
Webtop starts with the first variable directory in the Shadow
Path Template and deletes all files and directories from that
level down. Creating directories in the shadow directory
structure is not recommended for this reason.
•
Minimum Age For Delete (Days): This field is disabled if the
Force Cleanup of Shadowed Documents option is cleared. Enter
the minimum number of days you want documents to
remain on the local drive without being edited before being
deleted. May be a number in the range 0 - 99999.
•
Minimum Local Disk Space (MB): Enter the minimum allowed
disk space on the local drive before shadowed documents
are purged. If the Force Cleanup of Shadowed Documents
option is selected, the purge will be run automatically. If it is
cleared, the user will be notified with a message that they
should purge shadowed documents. May be a number in
the range 0 - 99999. The default value is 5 MB.
Setting Group Preferences
The Group Preferences page allows you to set the date and time
formats, page's layout and default viewer. Click the Preferences link from
the Group Maintenance page to display the Group Preferences page.
These settings will override the equivalent System Preference settings
(see “Setting System Preferences” on page 149).
The three buttons below the tabs are:
Save: Save changed data to the database and return to the Group
Maintenance page.
Restore: Reload the page and restore data from the database.
SETTING GROUP PREFERENCES
179
Cancel: Return to the Group Maintenance page without saving
your changes.
The following fields allow you to set certain group features:
•
Date Format: Select one of the following formats: M/D/Y, D/
M/Y, D.M.Y, Y/M/D, or Y-M-D.
•
Time Format: Select either: H:M or H:M:S.
•
Default Items per Page: The field specifies the maximum
number of items displayed on any single search results page
(the range is 1 - 10000).
•
Default Maximum Pages: The field specifies the maximum
number of search results pages returned for any one search
operation (the range is 1 - 10000).
•
Default Viewer: Specifies the default viewer for viewing
documents on the web.
User Synchronization
The User Synchronization page allows you to add users to your DM
library based on the organizational, or “container” units defined in the
network operating system. If multiple network operating systems are
used, for example, NetWare and Microsoft Network, a network alias for
each operating system can be created for each user. However, a user can
have only one network alias per network resource.
Note: Always synchronize Users before synchronizing Groups.
The two buttons on the toolbar are:
•
Auto Alias: Finds matching users and automatically creates
aliases for each match to the highlighted network resources.
This link is active only if you expand one of the network
resources.
•
Import User: Imports selected users to the Library and loads
the User Maintenance page for entering data to provide the
next step for synchronizing users. For further information
refer to Maintaining User Listings. This link is active only if
you expand one of the network resources.
The two lists are:
180
CHAPTER 7
•
Network: The list box (multiple selection) with network
resources. The list has three types:

Network Type: The type of network.

Container: Display all containers (domains) for the
network. You can open only one container for the
current level.

Users: The list of users for container.
This list displays one level only. The list has the special “[..]”
option that returns to the previous level. All previous levels
are displayed under the list as static text.
•
Library Users: The list of existing users and their aliases for
the selected domain. The list has two levels:

Users: Name of the user.

Network Alias: You can assign only one user for the
same network type.
Use the following controls to move aliases from one list to the other:
•
>> : Adds aliases to the Library Users pane. To add aliases,
select a user in the Network Resources pane and in the Library
Users pane and then click this button. You have the ability to
assign only one alias of the same network type for the
selected user. You can assign several aliases of different
network types for the selected user. When you click the
button the system uses the network user name as an alias for
the selected user and refreshes the current page.
•
<< : Removes aliases from Library Users pane. To remove an
alias, highlight the entry (you must select a user in the
second level) in the Library Users pane and click this button
to remove the selected alias from the selected user and
refresh the current page.
•
Load Network: Expands the selected network containers and
users for the selected container in the Network pane. The
system refreshes data and loads network resources for a new
container.
USER SYNCHRONIZATION
181
Group Synchronization
The Group Synchronization page allows you to add groups to your DM
library based on the organizational, or “container” units defined in the
network operating system.
Note: Always synchronize Users before synchronizing Groups.
The two buttons on the toolbar are:
•
Auto Alias: Finds matching groups and automatically creates
aliases for each match to the highlighted network resources.
This link is active only if you expand one of the network
resources.
•
Import Group: Imports selected groups to the Library and
loads the Group Maintenance page for entering data to
provide the next step for synchronizing groups. This link is
active only if you expand one of the network resources. See
Adding or Maintaining Group Listings for more
information on Group Maintenance.
The two lists are:
•
Network: The list box (multiple selection) with network
resources. The list has three types:

Network Type: Type of the network.

Container: Display all domains for the network. You
can open only one container for the current level.

Groups: The list of groups.
This list displays one level only. The list has the special “[..]”
option that returns to the previous level.
•
Library Groups: The list box with existing groups and their
aliases for the selected domain. The list has two levels:

Groups: The name of a group.

Network Aliases: The user may assign only one group
for the same network type.
Use the following controls to move aliases from one list to the other:
182
CHAPTER 7
•
>> : Adds aliases to the Library Groups pane. To add aliases,
select a group in the Network pane and in the Library Groups
pane and click this button. When clicked assigns selected
network group name as an alias for the selected group and
refreshes the current page.
•
<< : Removes aliases from the Library Groups pane. To remove
an alias, select a group in second level in the Library Groups
pane and click this button. You can assign several aliases of
the same or different network types for the selected group.
When clicked removes the selected alias from the selected
group and refreshes the current page.
•
Load Network: Loads network containers and groups for
selected container in the Network pane (you must select a
container). The system refreshes data and loads network
resources for a new container.
GROUP SYNCHRONIZATION
183
Chapter
8
Validation Tables
In This Chapter
The Validation Tables pages of the DM Administration Tools allow you
to configure applications, document types, and custom tables. To
access this feature, log on to DM Webtop, select the DM Admin tab, then
the Validation Tables tab.
185
Setting Up Applications
The Applications page allows you to view, add, and edit applications.
Click the Validation Tables tab of the DM Admin pages to display the
Applications tab:
At the top of the list, you have these options:
Filter: Select the field to search for applications.
By: Type a text fragment you wish to search for. If this box is
empty, all applications will be displayed in the list.
Search: Begin searching for applications which satisfy the criteria.
Add: Open the Application Maintenance page to add a new
application.
The list shows the current applications matching the filter criteria.
Click an entry or the Edit icon to view the current application settings.
or to modify the settings in the Application Maintenance page.
186
CHAPTER 8
•
Application ID: This column contains links for editing existing
applications. Click the entry to modify it.
•
Description: The name of the application.
Maintaining
Applications
•
Edit: Open the Application Maintenance page to view or
modify the existing application entry.
•
Copy : Add a new application. All fields are filled from the
current entry.
The Application Maintenance page allows you to set up or edit the
parameters for an application. To display the Application Maintenance
page:
Click the Application ID to edit an entry.
Click the Add button to create a new entry.
Below the tabs are links to the following pages:
Launch Methods: Provides different ways to launch the same
application from DM Webtop. The link is displayed only for
existing applications. See “Selecting Launch Methods” on
page 191 for more information.
Compatible Apps: Compatible applications are typically software
utilities that process files produced by some other application.
The link is displayed only for existing applications. See “Setting
Compatible Applications” on page 196 for more information.
File Types: Lists all file types that you can import into the selected
application. The link is displayed only for existing applications.
See “Working with File Types” on page 197 for more information.
The three buttons below the tabs are:
Save: Save changed data to the database and return to the
Applications page.
Restore: Reload the page and restore data from the database.
Cancel: Return to the Applications page without saving your
changes.
The following fields allow you to set certain application features:
SETTING UP APPLICATIONS
187
•
Application ID: Type an application ID to identify the
application throughout DM, including the Document
Profile dialog box. Integrated applications must use the
supplied Application ID. For non-integrated applications,
try to use an abbreviation or obvious representation of the
application. For example, Notepad could have the
Application ID NOTEPAD. This field is required. Maximum
length is 16 characters.
•
Description: Type a description for the application. It is a
good idea to include the version number of the application
in the description. This field is required. Maximum length is
60 characters.
•
Disabled: Select this option to prevent users from creating
documents using this application. Users will still be able to
use this application as criteria in a Profile search.
•
Print Application: This field refers to the ID of a utility that
can print a document and return without requiring
operator intervention. This allows users to print documents
from the profile. The field can also refer to an application
that loads the same application, but runs a macro to print
the document and return automatically. Use the Table
Lookup button (...) for a list of valid entries. The Print
Application must be defined separately in Application
Maintenance before it can be used. This field can be left
blank. Maximum length is 16 characters.
•
Viewer Application: This option refers to the ID of a utility
that only views documents for this application. Use the
Table Lookup button (...)to see a list of valid entries. The
Viewer Application must be defined separately in Application
Maintenance before it can be used. DM supplies a viewer
that easily handles many different file formats. This field can
be left blank. Maximum length is 16 characters.
•
Filing Scheme: There are three methods by which documents
are named in DM.

188
CHAPTER 8
Standard: The first seven digits are the document
number, and the extension designates the document
version and sub-version number.
•

Enhanced: The first five characters of the filename
represent the document number, the next three
represent the document version and sub-version
number, and the file extension designates the
application. Enhanced Filing Scheme allows no vowels
in any of the filenames, to prevent words from being
randomly formed. Some applications, such as Word
and Excel, require the Enhanced Filing Scheme for
proper integration with DM. Also, if you plan to use
the DM mail features, you must set your applications
to Enhanced Filing Scheme.

Unix-Compatible: This third method is similar to the
Enhanced Filing Scheme. The difference is that some
systems do not allow special characters (nonalphanumeric such as # - !) in their DOS filenames.
This filing scheme names files with alphanumeric
characters only. Unix-Compatible Filing Scheme allows
no vowels in any of the file names, to prevent words
from randomly being formed.
MIME Type: MIME (Multi-Purpose Internet Mail Extension)
allows you to set the MIME type mapping for the associated
Application ID. Upon a file download request, the DM Web
Server uses this setting to inform the browser what the
expected file type is and the appropriate application to
launch on the client machine. Note that the MIME Type
must be set for the DM Webtop to properly display
documents. Maximum length is 100 characters. Here are the
default supported MIME types:
Application
Description
MIMEtype
Extension
ACROBAT
Adobe Acrobat
application/pdf
pdf
BINDER
DOCS Binder
text/plain
bnd
CITERITE
CiteRite for Windows
application/citerite
cit
COMPRITE
Compare Rite
application/comprite
red
DELTAVIEW
DeltaView
application/dcwin
duc
DOCSIMAGE
DOCS Imaging
image/tiff
tif
GROUPWISE
GroupWise
SETTING UP APPLICATIONS
189
190
Application
Description
MIMEtype
Extension
FAWIN
Full Authority for
Windows
application/fawin
toa
L123-97
Lotus 123-97
application/lotus
wk4
LOTUS WORD PRO
Lotus Word Pro
application/lotus
wk4
MS EXCEL
Microsoft Excel
application/vnd.ms-excel
xls
MS OUTLOOK
Microsoft Outlook
MS POWERPOINT
Microsoft PowerPoint
application/vnd.mspowerpoint
ppt
MS PROJECT
Microsoft Project
application/vnd.msproject
mpp
MS WORD
Microsoft Word
application/msword
doc
PRESENTATIONS
Presentations
QPW
Quattro Pro
application/quattro
wb2
RM
DOCSRM Application
- DO NOT DELETE
RM VIEW
RM Report Viewer
WORDPERFECT
WordPerfect
application/wordpfct
wpd
CHAPTER 8
•
Default Extension: Type the default extension for files stored
with this application. Some applications require certain file
extensions. Others can accept any extension you choose.
The extension is the portion of a DOS file name that follows
a period. This field is used only if you are using the
Enhanced or Unix-Compatible Filing Scheme. Maximum
length is 25 characters.
•
Disable Multiple Extensions: Select or clear this check box to
disable or enable the file type extensions for that particular
application.
•
Shows on Desktop: Select whether this should appear for the
user in DM Webtop.
•
Valid on Profile: Should this appear as the application on a
profile.
•
Selecting Launch
Methods
Supervisor Application: Select this option to allow the
application to open documents created in any other
application (using the application's own conversion filters),
without making the applications compatible through DM.
This feature is intended for applications that do not create
their own documents, but use other applications'
documents. If an application is set to act as a Supervisor
Application, when filling out the Document Profile, the
Application ID is not automatically pre-filled. The user
must select the correct application from the Application
table lookup.
Click the Launch Methods link on the Application Maintenance page to
display the Launch Methods page.
At the top of the list, you have these options:
Filter: Select the field to search for launch methods.
By : Type a text fragment you wish to search for. If this box is
empty, all launch methods will be displayed in the list.
Search: Begin searching for launch methods which satisfy the
criteria.
Add: Open the Launch Method Maintenance page to add a new
launch method.
The list shows the entries matching the filter criteria.
•
Enabled: Open the Launch Method Settings page. The link is
displayed only for existing launch methods.
•
Description: This column displays a descriptive text for each
launch method.
•
Edit: Opens the Launch Method Maintenance page for
editing an existing launch method.
•
Copy : Opens the Launch Method Maintenance page for
adding a new launch method. All fields are filled from an
existing launch method.
•
Delete: Removes an existing launch method.
Note: Users who are upgrading from DOCS Open or DOCSFusion will see
their old launch methods in DM Admin, and might even be able to use them,
but the Enabled flag will be automatically set only for launch methods that are
newly installed by DM.
SETTING UP APPLICATIONS
191
Setting Up Launch
Methods
Click the Add button to display the Launch Method Maintenance page.
The DDE Settings link opens the DDE Settings page (see “Configuring
DDE Settings” on page 195). Dynamic Data Exchange (DDE) is a
Windows feature that allows two programs to share data or send
commands directly to each other.
The buttons below the tabs are:
Save: Save changed data to the database and return to the Launch
Methods page.
Restore: Reload the page and restore data from the database.
Cancel: Return to the Launch Methods page without saving your
changes.
The following fields allow you to set certain application features:
•
Application: Specify an application ID.
•
Description: Type a description of the current application
(required). The maximum length is 80 characters.
•
Location: Specify the path to the application (required). The
maximum length is 250 characters.
•
Command line parameters: Any switches or text sent to the
application upon execution. The command line parameters
are defined by each application vendor in the application
documentation. The maximum length is 250 characters.
A number of standardized DM system variables are
available for this field. They are distinguished by a leading
percent symbol (%) and are listed below.
192
CHAPTER 8

%FF[file_format_string]. File format string is built out
of characters that represent parts of a full path name
for a file. This makes it possible to use parts of the path
name of the selected document in the command line
string. Its components are:
d - drive or server/volume
p - path excluding drive and filename
f - filename only (no extension)
e - extension
l - version or attachment label
These replacement variables can be used in lieu of the
%FF variable to denote the corresponding piece of the
full path name. The full path would correspond to:
d:pl.e

%PROMPT[prompttext]. Prompttext is any string that
will be used as the prompt of the input field, which
accepts documents for the command line. This variable
always gets replaced by the file name of the document
selected in a window that appears when %PROMPT
appears.

%VALUE[profilecolumnname]. This variable would be
replaced by the value in any column of the PROFILE
table row for the selected document.

%FULLPATH. Passes the full path of a file to the
application.
SETTING UP APPLICATIONS
193

%OUTPUT [vtype [[,label] , fileformatstring]].
Denotes the type and name of the output file to be
generated by the application being launched. This
variable is used now for CompareRite and DocuComp,
which accepts an output file on the command line.
vtype - The version type of the output file. Values are:
V - Major Version
S - Sub-Version
A - Attachment
If A is used, both a label and file format string must be
given.
label - Optional. Version label of the attachment when
vtype is A.
fileformatstring - Optional. The way that the path name
and/or file name of the output should be specified on
the command line. This is constructed exactly as the
argument for %FF described above.

%EXTLABEL[appname]. Replaced by the default
extension for the application in the brackets.

%ATFILE[:::]. The information within the brackets is
written to a temporary file and the entire %ATFILE
entry will then be replaced with the temporary file
name preceded by an @ symbol. You can have more
than one %ATFILE in a command line parameter
entry, but be sure that they do not overlap or that one
is not imbedded in the other. The temporary file(s)
created will be deleted when the application is closed.
The parameter is useful to be stored in a data file.
•
Default Directory: Set the default directory for this
application. The maximum length is 250 characters.
•
Integration: Select one of the available integration methods:
No Integration, Full Integration, Full Integration with
Quick Save, or ODMA Compliant.

194
CHAPTER 8
No Integration. When this option is selected, there is no
use of the DM Toolkit. Use this option for applications
that do not create documents but run in conjunction
with other applications, such as grammar checkers,
redlining programs, or mail packages.
•
Configuring DDE
Settings

Full Integration. Use this option for integrated
applications such as Lotus 1-2-3 and Quattro Pro. If
Shadowing is implemented, when a File/Save is issued,
a copy of the document is saved to the shadow drive,
then to the network.

Full Integration with Quick Save: This option can be
used with any integrated word processing application.
Choosing this option will cause DM to save the
document on screen more quickly when a File/Save is
issued. This occurs because the Document History is
updated and shadow copies are saved only when a File/
Close is issued.

ODMA Compliant: This option is used with
applications integrated through ODMA, such as
WordPerfect 8.0 and Quattro Pro 8.0.
Enabled: Select this check box if you want to this application
to be enabled.
Click the DDE Settings button on the Launch Methods Maintenance page
to display the DDE Settings page. The DDE Settings page allows editing
the DDE settings for a launch method. Dynamic Data Exchange (DDE)
is a feature of Windows that allows two programs to share data or send
commands directly to each other. Integrated applications have preinstalled DDE settings, and you only need to alter this information if
you are creating a new launch method for one of these applications.
The three buttons below the tabs are:
Save: Save changed data to the database and return to the Launch
Method Maintenance page.
Restore: Reload the page and restore data from the database.
Cancel: Return to the Launch Method Maintenance page.
The following fields allow you to set DDE features:
Open settings
•
Application Name: Specify the application name to open. The
maximum length is 128 characters.
•
Topic Name: Type a topic name. The maximum length is 128
characters.
SETTING UP APPLICATIONS
195
•
Command: Specify the command line. The maximum length
is 200 characters.
•
Command (not running): In this box enter the non-running
command line for opening. The maximum length is 200
characters.
Print settings
Setting Compatible
Applications
•
Application Name: Specify an application name for printing.
The maximum length is 128 characters.
•
Topic Name: Type a topic name for printing. The maximum
length is 128 characters.
•
Command: Specify the command line for printing. The
maximum length is 200 characters.
•
Command (not running): In this box enter the non-running
command line for printing. The maximum length is 200
characters.
The Compatible Applications page sets applications that process files
produced by some other application. For example, you might run a
Read-line or grammar checking application against a word processing
document. To do so, you must setup the word processor and the
grammar checker as compatible.
To allow files to be converted from one application format to another,
they must be set up as compatible. For example, if you want to import
a WordPerfect document into Microsoft Word, the latter must be
configured as a compatible application of WordPerfect.
Click the Compatible Apps link on the Application Maintenance page to
display the Compatible Apps page. The three buttons below the tabs
are:
Save: Save changed data to the database and return to the
Application Maintenance page.
Restore: Reload the page and restore data from the database.
Cancel: Return to the Application Maintenance page without
saving any of your changes.
The two lists are:
•
196
CHAPTER 8
Compatible Apps: Contains the list of compatible
applications. Multiple selections are allowed.
•
Non-Compatible Apps: Contains the list of non-compatible
applications. Multiple selections are allowed (use CTRL+click
to select multiple items).
Use the following controls to move applications from one list to the
other:
Working with File
Types
•
>> : Remove the selected application from the Compatible
Apps list.
•
<< : Add the selected application to the Compatible Apps list.
•
Select All: Selects all items in the Compatible Apps or NonCompatible Apps lists.
•
Clear Selection: Clears selection for all selected items in the
Compatible Apps or Non-Compatible Apps lists.
The File Types page displays all the file types that the user may want to
import into the selected application. Click the File Types link on the
Application Maintenance page to display the File Types page.
Note: This page does not have sorting, filtering, or paging features.
Add: Opens the File Type Maintenance for adding a new file type.
Close: Closes the File Type page and returns to the Application
Maintenance page.
The following fields show the current file type settings:
Modifying or
Adding File Types
•
File Extension: This column displays the links for editing a file
type.
•
Description: This column displays a descriptive text for each
file type.
•
Edit: Opens the File Type Maintenance page for editing an
existing file type.
•
Delete: Removes the selected existing file type.
Use the File Type Maintenance page to add or edit file types.
Save: Saves data into the database and returns to the File Types
page.
Cancel: Returns to the File Types page without saving your
changes.
The following fields allow you to set the file type value:
SETTING UP APPLICATIONS
197
•
File Extension: Enter the three-character extension of the file
type that you would like associated with the application.
This field is required. The maximum length is five
characters.
•
Description: Enter a description of the application. For
instance, if you are entering DOC in the File Extension field,
enter Word 2007 in the Description field. This field is
required. The maximum length is 250 characters.
Using Multiple File Extensions
The ability to use multiple file extensions is introduced in eDOCS DM
5.3. This allows users to save versions of a document with different file
extensions that are supported within that application. For example,
Word documents can be saved in other file extensions besides *.doc,
such as *.docx or *.rtf.
The File Type drop-down menu appears on the Save As Version dialog
box and in the Save user interface for any type of document that has
multiple file type support. Some file extensions require that only a new
document be created. For example, if a user wants to save a PDF version
of a Word document, a “New Doc Only” flag is entered into the
database, which means that all options except for New Document will
appear unavailable to the user.
Supported File
Extensions
The following tables show the multiple file extensions supported per
application.
MS WORD
198
CHAPTER 8
Extension
Description
Save to
Order Disabled
New
Document
Only
.docx
Word Document
(*.docx)
N
1
N
.docm
Word MacroEnabled
Document
(*.docm)
N
3
Y
Extension
Description
Save to
Order Disabled
New
Document
Only
.doc
Word 97-2003
Document (*.doc)
N
2
N
.dotx
Word Template
(*.dotx)
N
4
N
.dotm
Word MacroEnabled Template
(*.dotm)
N
5
Y
.pdf
PDF (*.pdf)
Y
6
N
.xps
XPS Document
(*.xps)
Y
7
Y
.rtf
Rich Text Format
(*.rtf)
N
8
N
.txt
Plain Text (*.txt)
N
9
Y
.xml
Word XML
Document (*.xml)
N
10
Y
.odt
OpenDocument
Text (*.odt)
Y
11
Y
.wps
Works 6.9
Document (*.wps)
Y
12
Y
Extension
Description
Save to
Order Disabled
New
Document
Only
.xlsx
Excel Workbook
(*.xlsx)
N
1
Y
.xlsm
Excel MacroN
Enabled
Workbook (*.xlsm)
4
N
.xlsb
Excel Binary
Workbook (*.xlsb)
10
Y
MS EXCEL
N
USING MULTIPLE FILE EXTENSIONS
199
200
CHAPTER 8
Extension
Description
Save to
Order Disabled
New
Document
Only
.xls
Excel 97-2003
Workbook (*.xls)
N
2
N
.xml
XML Data (*.xml)
Y
5
Y
.xltx
Excel Template
(*.xltx)
N
6
Y
.xltm
Excel MacroEnabled Template
(*.xltm)
N
7
Y
.xlt
Excel 97-2003
Workbook (*.xlt)
N
8
Y
.txt
Text (Tab
Delimited) (*.txt)
N
9
Y
.csv
Comma Delimited
(*.csv)
N
3
Y
.prn
Formatted Text
(*.prn)
Y
11
Y
.dif
Data Interchange
Format (*.dif)
Y
12
Y
.slk
SYLK (Symbolic
Link) (*.slk)
Y
13
Y
.xlam
Excel Add-in
(*.xlam)
N
14
Y
.xla
Excel 97-2003
Add-in (*.xla)
N
15
Y
.pdf
PDF (*.pdf)
Y
16
N
.xps
XPS Document
(.xps)
Y
17
Y
.ods
OpenDocument
Spreadsheet
(*.ods)
Y
18
Y
MS POWERPOINT
Extension
Description
Save to
Order Disabled
New
Document
Only
.pptx
PowerPoint
Presentation
(*.pptx)
N
1
N
.pptm
PowerPoint
Macro-Enabled
Presentation
(.pptm)
N
3
Y
.ppt
PowerPoint 972003 Presentation
(*.ppt)
N
2
N
.pdf
PDF (*.pdf)
Y
4
N
.xps
XPS (*.xps)
Y
5
Y
.potx
PowerPoint
Template (*.potx)
N
6
Y
.potm
PowerPoint
Macro-Enabled
Template (*.potm)
N
7
Y
.thmx
Office Theme
(*.thmx)
N
8
Y
.ppsx
PowerPoint Show
(*.ppsx)
N
9
N
.ppsm
PowerPoint
Macro-Enabled
Show (.ppsm)
N
10
Y
.pps
PowerPoint 97N
2003 Show (*.pps)
11
N
.ppam
PowerPoint Addin (*.ppam)
N
12
Y
.ppa
PowerPoint 972003 Add-in
(*.ppa)
N
13
Y
USING MULTIPLE FILE EXTENSIONS
201
Adding File
Extensions
202
CHAPTER 8
Extension
Description
Save to
Order Disabled
New
Document
Only
.xml
PowerPoint XML
Presentation
(*.xml)
N
14
Y
.wmv
Windows Media
Video (*.wmv)
Y
15
Y
.gif
GIF Graphics
Interchange
Format (*.gif)
Y
16
Y
.jpg
JPEG File
Interchange
Format (*.jpg)
Y
17
Y
.png
PNG Portable
Network Graphics
Format (*.png)
Y
18
Y
.tif
TIFF Tag Image
File Format (*.tif)
Y
19
Y
.bmp
Device
Independent
Format (*.bmp)
Y
20
Y
.wmf
Windows Metafile
(*.wmf)
Y
21
Y
.emf
Enhanced
Windows Metafile
(*.emf)
Y
22
Y
.rtf
Outline/RTF (*.rtf)
Y
23
Y
.odp
OpenDocument
Presentation
(*.odp)
Y
24
Y
File extension maintenance is performed through the DM Webtop’s DM
Admin tab.
To add a file extension:
1. In DM Webtop, click the DM Admin tab.
2. Click Validation Tables.
3. In the Applications tab, click the Application ID in which you
want to add file extensions. For example, click MS EXCEL.
4. The application maintenance form appears. Click the File
Extensions link.
5. The file extensions list for the application appears. Click
Add.
6. The file extension maintenance form appears. Complete the
fields that require entry:
•
Application — The Application field is populated with the
Application ID. For example, MS EXCEL.
•
Language — Click the ellipses (...) button to select the
language code.
•
Extension — Type the file extension that you are adding.
For example, type XLSX.
•
Description — Type a description of the file extension.
•
Order — The number that you enter determines the order
in which all defined file extensions appear in the File
Type drop-down list when users save items within that
application. For example, if you type 3, this file extension
will be the third choice in the drop-down list.
•
File Format Code (optional) — This field is used to
differentiate between different file formats available for
the file extension. This field is optional.
•
New Document Only — Select this check box if you want
users to be able to save only new documents with this
particular file extension. All other save options will
appear unavailable except for New Document. For
example, when a user saves a PDF version of a Word
document (.docx), the document must be saved as a new
document.
•
Disabled — Select the Disabled check box if you want to
prevent users from using this file extension.
7. Click Save.
USING MULTIPLE FILE EXTENSIONS
203
Editing File
Extensions
You can edit defined file extensions for an application from the DM
Admin tab in DM Webtop.
To edit a file extension:
1. In DM Webtop, click the DM Admin tab.
2. Click the Validation Tables tab; the list of Application IDs
appears.
3. Click the Application ID in which you want to edit a file
extension.
4. Click the File Extensions link. A list of file extensions for that
application appears.
5. Click the Edit icon that appears next to the file extension. A
form containing the details for the file extension appears.
6. Edit the fields as necessary and then click Save.
Deleting File
Extensions
You can delete file extensions for an application from the DM Admin tab
in DM Webtop.
To delete a file extension:
1. In DM Webtop, click the DM Admin tab.
2. Click the Validation Tables tab; the list of Application IDs
appears.
3. Click the Application ID in which you want to delete a file
extension.
4. Click the File Extensions link. A list of file extensions for that
application appears.
5. Click the Delete icon that appears next to the file extension
that you want to delete.
6. The following prompt appears: “Do you really want to
delete the file extension?” Click Yes. The file extension is
deleted.
Disabling/
Enabling File
Extensions
204
CHAPTER 8
You can quickly disable or enable all file extensions for an application
through the DM Admin tab in DM Webtop.
To disable or enable file extensions for an application:
1. In DM Webtop, click the DM Admin tab.
2. Click the Validation Tables tab; the list of Application IDs
appears.
3. Click the Application ID where you want to disable or enable
the file extensions.
4. Select or clear the Disable Multiple Extensions check box to
disable or enable the file extensions for that particular
application.
5. Click Save.
Document Types
The Document Types list validates any entry entered in the Document
Type Profile field. Each Document Type has a default value for three
associated fields: Full Text, Storage Type, and Retention Days. The
Document Type also helps determine if the document will allow
multiple versions. At the top of the list, you have these options:
Filter: Select the field to search for document types.
By : Type a text fragment you wish to search for. If this box is
empty, all document types will be displayed in the list.
Search: Begin searching for documents types which satisfy the
criteria.
Add: Open the New Document Type page to add a new document
type.
The list shows the current applications matching the filter criteria.
Click an entry or the Edit icon to view the current application settings.
or to modify the settings in the Application Maintenance page.
•
Document Type: This column contains links for editing
existing Document Types. Click the entry to modify it.
•
Description: The name of the Document Type.
•
Maximum Versions: The maximum number of versions
allowed for this Document Type. To see maximum subversions, you must edit the item.
•
Storage Type: The default Storage Type:
DOCUMENT TYPES
205
New Document
Type

Archive: If documents of this type are important, but
can be removed from the system to offline storage after
a period of non-use, select this option.

Delete: If the document type is for letters, memos, or
other documents of perishable content, select this
option.

Keep: If the document type is for litigation, contracts,
or other permanent material, select this option.
Documents of this type will remain on the system
indefinitely.

Optical: If documents of this type are important but
can be removed from the system after a period of nonuse, and you want to store them on optical disk or
other near-line storage, select this option.
•
Edit: Opens the Document Type Maintenance page to view
or modify the existing entry.
•
Copy: Add a New Document Type. All fields are filled from
the current entry.
To add a new Document Type:
1. In the Validation Tables tab, select Document Types, then select
the Add button.
Note: If you want to base this new Document Type from an existing one, select
the Copy option from the Document Types list. If you choose Copy, the form is
completed with the settings of the selected Document Type. Modify the
Document Types form as described below.
2. The Document Types Maintenance form is blank. Complete
the Document Types form as described below.
206
CHAPTER 8
•
Type ID: Type a Document Type identifier for use on the
Document Profile.
•
Full Text Index: Select this option to indicate future Full
Text indexing of this Document Type. Leave the box
blank to indicate that documents of this type will not be
indexed. Full Text indexing would be useful for
important documents that require search and retrieval
based on the text of the entire document. If you leave the
Full Text check box available to your users on the
Document Profile, they can override this default setting.
•
Description: Type a description (maximum of 30
characters).
•
Default Storage Type: Select the option for this Document
Type.
Archive. If documents of this type are important, but can
be removed from the system to offline storage after a
period of non-use, select this option.
Delete. If the document type is for letters, memos, or
other documents of perishable content, select this
option.
Keep.If the document type is for litigation, contracts, or
other permanent material, select this option. Documents
of this type will remain on the system indefinitely.
Optical. If documents of this type are important but can
be removed from the system after a period of non-use,
and you want to store them on optical disk or other
near-line storage, select this option.
Retention Days: If you chose Archive, Delete, or Optical for
your default Storage Type, type a minimum Retention Days
value. Retention Days specifies the number of days before
the document can be archived or deleted and is calculated
from the last edit date. For documents designated as Keep,
Retention Days will be disabled.
Maximum Versions: Enter the maximum number of versions
(up to 99) you want to allow for documents created with
this Document Type. Enter 1 if you do not want to allow
multiple versions. The maximum number of versions
allowed is also determined in the System Parameters utility
and in Group Maintenance. The lower of the three settings
will take precedence.
Document Attachments are not available to documents that
allow only one version. If you plan to use applications that
create attachments (such as redlining applications), you
should allow multiple versions.
DOCUMENT TYPES
207
Maximum Sub-versions: Enter the maximum number of subversions (up to 26) to allow for documents created with this
Document Type. Enter 0 if you do not want to allow
multiple sub-versions. The maximum number of subversions allowed is also determined in the System
Parameters and in Group settings. The lower of the three
settings takes precedence.
Versions to Keep: Enter the number of versions you want to
keep online for documents created with this Document
Type. The Storage Management module has the capability
of archiving or deleting all versions other than the number
you specify here.
Keep Criteria:
•
By Last Edit. If you want to keep the versions online based
on the date they were last edited, choose this option.
•
By Versions. If you want to keep the versions online based
on their sequential version number, choose this option.
Second Retention Storage Type: This option is available only if
you select Optical as your Default Storage Type. If you plan
to use near-line (optical) storage, you may want to save your
documents in a different fashion after another period of
time. Choose from Archive, Delete, and Keep.
Second Retention Days: Use this field to set a second level of
retention days. For example, if you want to move a
document to optical disk (near-line storage) after 30 days
and to tape (offline) after 90 days, enter 30 in the Retention
Days field, 90 in the Second Retention Days field.
Target Document Server: If you entered Document Type in the
Target Server Column field in System Parameters, enter the
name of the server where you want to store documents
created with this Document Type. The file server name
automatically defaults to the current file server.
3. Click Save to save the Document Type or Cancel to return to
the Document Types listing.
208
CHAPTER 8
Other Tables
This help topic covers all the Custom Tables you may set up. As such,
the fields that appear on the Custom Tables will follow this general
pattern.
At the top of the list, you have these options:
Filter: Select the field to search.
By : Type a text fragment you wish to search for. If this box is
empty, all entries will be displayed in the list.
Search: Begin searching for entries which satisfy the criteria.
Add: Open the Custom Table Maintenance page to add a entry.
The list shows the current entries matching the filter criteria.
Custom Table
Maintenance
•
Edit: Opens the special Custom Table Maintenance page for
viewing and editing information about an existing entry.
•
Copy : Opens the special Custom Table Maintenance page for
adding a new entry. All fields are filled from an existing
entry.
This page allows you to maintain Custom Tables.
The three buttons below the tabs are:
Save: Save changed data to the database and return to the Custom
Tables page.
Restore: Reload the page and restore data from the database.
Cancel: Return to the Custom Tables page without saving your
changes.
Note: The Custom Table tabs will not be shown unless there is a maintenance
form created in DM Designer for the custom table.
Dynamic Views
Dynamic Views are used to create a virtual tree view of hierarchical
structures based on lookup data within a DM library.
For example, you could create a legal hierarchy of Client, Matter, and
Submatter, in which your users subscribe to the clients, matters, and
OTHER TABLES
209
submatters that they wish to see in the tree structure. You can also use
enumerations, which filter search results based on a lookup value from
a profile form field.
An example Dynamic View will be used to demonstrate the steps
necessary for this process. In these examples, a Legal library is used to
set up a Dynamic View consisting of a hierarchical structure of Client,
Matter, and Document Type. The LAWPROF Profile form referenced in
these examples is specific to legal libraries; however, you can base
Dynamic Views on any type of library using a different profile form.
The Client and Matter structure are the upper two levels, with Client
being the top-most level, and an enumeration of Document Type at
level number three. An enumeration filters search results by additional
criteria. In this instance, the criteria is filtered by Document Type.
Creating a
Dynamic View
In order for your users to see the Dynamic Views in the DM Extensions
tree, you must first set up the Dynamic View.
To create a Dynamic View:
1. In DM Webtop, click the DM Admin tab.
2. Click the Validation Tables tab.
3. Click the Dynamic Views tab.
210
CHAPTER 8
4. The Dynamic Views page appears with the View ID, # days for
Recent, Default language, Show view node, Edit, and Delete
columns. Click Add. The Dynamic View page appears.
5. In the View Name field, type a name for the Dynamic View
that will be visible to users.
NOTE: This is only applicable if you select the Show view node
check box.
For example, type Legal View.
6. In the View ID field, type a name to uniquely identify the
Dynamic View.
For example, type LEGAL.
7. In the Default language field, click the lookup (...) button to
define the default language to be used. This is based on the
default language of the machine. For example, select ENU to
specify English as the default language.
DYNAMIC VIEWS
211
The default language is considered the “fallback” language
for a multilingual system. This means that if a user accesses
the Dynamic View on a machine that does not have a View
Level Language that corresponds to the default language of
the operating system, then the specified default language is
used. This ensures that the Dynamic View appears in at least
one language. For example, a user’s machine might use the
FRC French Canadian language setting; however, if the
Dynamic View does not have the FRC View Level Language
defined, the Dynamic View would appear in the default
language.
•
In the Form Name field, click the lookup (...) button to
define the Profile form that will be used as the basis for
all lookups for this Dynamic View.
For example, select LAWPROF to use the Legal Profile form.
Depending on the industry type of your DM library, a
different Profile form might be available, such as DEF_PROF,
which is used for the Default industry type.
8. In the Order No. field, enter a number to specify the order in
which the Dynamic View will appear in the hierarchical tree
view. For example, if you have three Dynamic Views and
you want this particular Dynamic View to appear first, type
1 in this field.
NOTE: This is applicable only if more than one Dynamic View is
defined.
9. Select the Show view node check box if you want the top-level
node to appear in the tree node with the View Name.
9.1 Designate the icon to be used in the Top node icon field.
For example, type TOP_NODE_ICON.
See the Using Node Icons section for information
about using Dynamic Views icons.
10. Select the Show ALL Node check box if you want the entire
hierarchical lookup structure to appear in the tree view. The
users will see all lookup values in the hierarchy in which
they have privileges to view.
212
CHAPTER 8
10.1 Type the node name in the All node name field. For
example, type All Clients/Matters. This is the
name that will appear in the tree view.
10.2 Designate the icon to be used in the All node icon field.
For example, type ALL_NODE_ICON.
11. Select the Show Subscription Node check box if you want the
user’s subscribed lookup items to appear in the tree view.
11.1 Type the node name in the Subscription node name field.
For example, type My Subscriptions. This is the
name that will appear in the tree view.
11.2 Designate the icon to be used in the Subscription node
icon field. For example, type SUBSCRIP_NODE_ICON.
12. Select the Show Recent Node check box if you want to show a
list of lookup values that a user has recently used or created
a profile against.
12.1 Type the node name in the Recent node name field. For
example, type Recent Clients/Matters. This is
the name that will appear in the tree view.
12.2 In the # days for Recent field, type a number that defines
whether a lookup value is considered recent. For
example, type 30.
12.3 Designate the icon to be used in the Recent node icon
field. For example, type RECENT_NODE_ICON.
13. Click the Security button to view and/or assign specific
Dynamic Views security items. The Dynamic Views Trustees
dialog box appears.
See the Using Security section for a description of each
security setting.
13.1 To assign a group or member to the Current Trustees list,
select the name from the Groups or People section and
then click the double-right (>>) arrow.
Conversely, to remove a member, select the name from
the Current Trustees list and then click the double-left
(<<) arrow.
13.2 In the Current Trustees list, select a name to view or set
the security settings. Select or clear the check boxes to
apply the security.
13.3 When you are finished assigning security, click Save.
DYNAMIC VIEWS
213
14. Select the Supports Security check box if you want the
Dynamic View to support security in any hierarchical level.
15. Click Save.
The newly created Dynamic View appears on the Dynamic Views page,
which is accessed from DM Admin>Validation Tables>Dynamic Views.
The View ID, #days for Recent, Default Language, and Show view node values
for the Dynamic View appear, along with the Edit and Delete icons.
When you click the name of the View ID, the Dynamic View details will
appear. You can configure the languages that a Dynamic View supports
and their corresponding View Levels.
By default, only the default language that you specified is created. To
support a multilingual environment, add extra languages as needed.
Using Security
You can specify the groups and/or users that have access rights to a
Dynamic View. You can configure different rights for different users
and/or groups.
To set security on a Dynamic View:
1. Click DM Admin>Validation Tables>Dynamic Views, and then
click the View ID of the Dynamic View.
2. Click the Security button. The Dynamic Views Trustees
dialog box appears.
214
CHAPTER 8
3. The Groups pane lists all of the DM groups. To see the group
user names listed in the People pane, click the group’s name.
For example, click DM Supervisors (DOCS_SUPERVISORS).
4. You can select items from the Groups or People panes and
assign them to the Current Trustees list.
You can also set different rights for a particular user in a group than the other
group members. For example, select DM Supervisors (DOCS_SUPERVISORS)
and click the double-right (>>) arrow. The group appears in the Current
Trustees list.
5. Click a group or member’s name in the Current Trustees pane
to view or set the following security settings:
•
Can see the Dynamic View—Select this check box to allow
the group or user to see the Dynamic View.
•
Can edit the Dynamic View—Select this check box to allow
the group or user to edit the Dynamic View.
•
Can see the subscribed View Node—Select this check box to
allow the group or user to see the subscribed View Node
when it is available.
•
Can see the recent View Node—Select this check box to
allow the group or user to see the recent View Node
when it is available.
•
Can see the “All” node for the view—Select this check box
to allow the group or user to see the All View Node.
•
Can subscribe to the view—Select this check box to allow
the group or user to subscribe to the Dynamic View.
•
Can set security against a level node in this dynamic view, for
inheritance purposes when creating items under the dynamic
view—Select this check box to allow the group or user to
set security against a level. Any items that are added to
the Dynamic View will inherit the security from that
virtual folder.
•
Can add/create folders at levels where defined as supporting
adhoc foldering—Select this check box to allow the group
or user to create folders at the level that supports ad hoc
folder creation.
DYNAMIC VIEWS
215
Using Custom
Dynamic Views
Security
Users can override the set security on any available Dynamic Views level
node, such as Client, Matter, or Submatter if having the rights to do so.
This means that any security set on a level that is pushed down to all
documents or items saved within can be altered by a user with
applicable rights. Just as with default DM security, the security is set
through the Access Control List using the Trustee list.
With this Dynamic Views security, it is possible that the Author and/or
Typist creating a document will no longer have access or edit rights
once the document is saved within the secured Client or Matter. This is
different than default DM security, where the Author and Typist have
full rights to any document they create. Dynamic Views security
overrides default DM security and group or personal profile form
defaults. See the Security Scenarios below on what would happen if a
user would not have rights to access or edit a document in a secured
Client or Matter.
How Security Is Determined
When a user saves a document to a secured level, either by selecting the
Client or Matter on the Profile form when saving, or by dropping a
document on the secured level, DM first checks the Matter to see if it
has security set, and if so, that security is applied to the document. If the
Matter does not already have security set up, DM checks the Client
level, and if security exists there, the document inherits that security.
When a document does inherit security from a Client or Matter, the
Restricted check box on the Document Profile form appears selected.
When the user clicks the Security button, the Document Access dialog
box appears with the Inherit Rights From: Matter/Client (depending on
where security is set) check box appearing in the upper left corner.
When users save a document to a Client or Matter that does not have
security defined, the Inherit Rights From: Matter/Client check box will not
appear, and the Author and Typist will have Full Access Rights.
Changing Security
If a user has Access rights to the document when saving, either through
explicit access or through Group access rights, he/she can clear the
Restricted check box, or click the Security button to change the security
on the profile form. To change the inherited security, clear the Inherit
216
CHAPTER 8
Rights From: Matter/Client check box on the Document Access dialog box;
the user can then add or remove Trustees and assign Access Rights.
When the Inherit Rights From: Matter/Client check box is cleared, security is
overwritten and thus, the document will no longer receive the pushed
security from the Client or Matter. Even if the security is changed on the
level itself, the changes will not be pushed to the document with the
changed security; that document will retain the individual security that
is set.
If the user decides not to change the security, or later decides to
reenable the inherited security, the Inherit Rights From: Matter/Client check
box should be selected. The document will then receive the pushed
security from the Client or Matter.
Security Scenarios
What happens when users do not have full access rights to a secured
Client or Matter? For example, a user imports a document to a Client
or Matter and selects the Restricted check box or clicks the Security button
on the profile form; instead of the Document Access dialog box
opening, the following message appears: “Security is being inherited
from the following Dynamic View level: Matter” (or Client, depending
on where the security is set).
If users try to save a document to a Client or Matter where they do not
have Edit rights (for example, they have only Read-only rights), they
will not be able to complete the process. The following message will
appear: “Cannot save a new document: <Server name>: the current user
would lose the rights to edit the document, operation cancelled.” The Save
user interface will appear for the user to complete the profile form.
Determining a Document’s Security
The INH_LUP_SEC_FROM column on the PROFILE table reflects the
values for a document’s security (or lack thereof):
Value
Definition
-1
The security that this document would have
inherited from a Dynamic View node has been
overridden.
DYNAMIC VIEWS
217
218
CHAPTER 8
Value
Definition
0 (or null)
The document does not have any Dynamic View
security inheritance because there is no Dynamic
View security set.
Any value
greater than 0
The security for this document is being inherited
from a Dynamic View node. The value of this
column is actually the SYSTEM_ID value of the
Dynamic View node that the security is inherited
from (for example, the SYSTEM_ID of a Matter).
Using Node Icons
Each node name uses an icon. You specify the icon you want to use by
providing the name of an .ico image that is installed on the client
machine. The icon that you assign to a node or level will appear in the
DM Extensions tree.
By default, the icon images are stored in C:\Program Files\Open
Text\DM Extensions\Icons. The following icons are available:
Icon Image
Icon Name
recent_node_icon.ico
search_icon.ico
subscrip_node_icon.ico
all_node_icon.ico
client_icon.ico
doc_type_icon.ico
grouping_icon.ico
matter_icon.ico
You can use your own icon images; however, you must store the .ico
files in the location mentioned above, and the images must be at least
16 x 16 pixels in size.
Creating Dynamic
View Languages
When you define a Dynamic View and select the default language, the
system automatically creates the first language for you, which is
whatever you defined in the Default Language field.
If you require a multilingual setup, you will need to create a Dynamic
View Language for each language. This means that the Dynamic View
can be displayed in different languages for different users.
DYNAMIC VIEWS
219
To create a Dynamic View Language:
1. In DM Admin>Validation Tables>Dynamic Views, click the View ID
of the Dynamic View to which you want to add a new
language.
For example, click LEGAL.
2. Above the Save, Restore, and Cancel buttons, click Dynamic
Views Languages.
NOTE: The Dynamic View Languages, View Levels, and Set base for
Template Folders links do not appear until after you save the
Dynamic View and click the View ID to reopen the page.
3. The Dynamic View Languages page appears with the
Dynamic View listed. Click Add.
4. The Dynamic View Language page appears with the
following fields:
•
•
•
•
•
•
•
View ID
View Name
Language Code
Form Name
All node name
Recent node name
Subscription node
The View ID field is automatically populated (for example,
LEGAL appears). You cannot edit this field.
In the View Name field, type a name for the view. For
example, type Legal View.
If you are setting up a different language, such as FRC
French Canadian, then you would need to type the name in
that language. For example, type Vue Légale.
5. Click the Language Code lookup (...) button.
6. Select a Language Code check box, and then click OK. This is
the language code to be used for the view.
220
CHAPTER 8
For example, select the ENU check box.
Or, select a different language for a multilingual setup. For
example, select the FRC check box.
7. Click the Form Name lookup (...) button.
8. Select the Form Name check box of the profile form that you
want to use, and then click OK. This is the form that will be
used as the basis for lookup values.
For example, select the LAWPROF (Legal Profile Form) check
box.
The profile form’s lookups are used when adding
subscriptions, so if you have a translated profile form for the
extra language, select that form. For example, if you are
using the FRC language, select the FR_LAWPROF check box.
9. In the All node name field, type the name that you want to
appear for the All Node view in the DM Extensions tree.
For example, type All Clients/Matters.
Or, type the name in the different language. For example,
type Tous Les Clients/Sujets.
10. In the Recent node name field, type the name that you want
to appear for the Recent Node view in the DM Extensions
tree.
For example, type Recent Clients/Matters.
Or, type the name in the different language. For example,
type Clients/Sujets Récents.
11. In the Subscription node name field, type the name that you
want to appear for the Subscription Node view in the DM
Extensions tree.
For example, type My Subscriptions.
Or, type the name in the different language. For example,
type Mes Souscriptions.
12. Click Save.
13. In the Dynamic View Languages page, click Close.
Creating a View
Level
After creating a Dynamic View Language, the next step in the process is
to create a view level for the Dynamic View.
DYNAMIC VIEWS
221
To create a view level for the dynamic view:
1. In DM Admin>Validation Tables>Dynamic Views, click the View ID
of the Dynamic View in whcih you want to create a view
level.
For example, click LEGAL.
2. Above the Save, Restore, and Cancel buttons, click View Levels.
The View Levels page appears.
3. Click Add. The View Level page appears.
The View ID, which is automatically populated, represents
the Dynamic View for which the view level is created. For
example, LEGAL appears.
222
CHAPTER 8
The Language field is also populated with the language code
that you specified for the view level, and is not editable. For
example, ENU appears.
The Level No. field will be automatically generated after you
click Save. There is no need to enter a number in this field.
The first index starts with a value of “1”.
4. The Candidate ID column for the current level section indicates
the candidate key to use as a lookup value for the view level.
The Column identifies the name of the column to be used for
the lookup.
When you select a candidate ID column, the ID field name
and Table fields are automatically populated.
Click the Column drop-down menu and select a candidate ID
column:
• USER_ID (AUTHOR) (PEOPLE)
• CLIENT_ID (CLIENT_ID) (CLIENT)
• MATTER_ID (MATTER_ID) (MATTER)
• TYPE_ID (DOCUMENTTYPES)
• USER_ID (TYPIST) (PEOPLE)
• APPLICATION (APPLICATION) (APPS)
For example, select CLIENT_ID (CLIENT_ID) (CLIENT) as the
candidate ID column. The CLIENT_ID value appears in the ID
field name field.
The Table field is also populated with the name of the table
to be used for the lookup. For example, CLIENT appears.
The list of candidate ID columns includes any lookup field
on the profile form that you use. In this case, the list
includes lookup fields from the LAWPROF profile form.
You can add additional lookup fields to the profile form, in
which case, they would appear in the list of available
candidate ID columns.
5. The Type field indicates the type of view level. A view level is
an enumeration or a level in a view. The Type drop-down
menu is already populated with Level.
In the Level Name field, type the name that you want to
appear for this Levels node.
For example, type Client.
DYNAMIC VIEWS
223
6. In the Level icon field, type the name of the icon you want to
appear in the Dynamic View tree. The icon name must
correspond to an .ico image that is installed on the client
machine. By default, these are stored in C:\Program
Files\Open Text\DM Extensions\Icons. You can also use
your own custom icon images. See Using Node Icons for
more information.
For example, type CLIENT_ICON.
7. The Display format field indicates the display format of the
level to appear in the tree. This is a format string that can
contain column references for the table defined in the view
level. You can use custom defined strings with column
values. Column values are specified by the form name
within brackets (“{}”). For example, Client:{CLIENT_ID}.
This field is automatically populated after you select the
candidate ID column. In our example, (CLIENT_ID) appears.
You can modify the value that appears. For example, you
could enter:
{CLIENT_NAME} - {CLIENT_ID}
8. The Level options section allows you to select options for a
view level. Select the check boxes for any options that you
want to enable.
For example, select the Show grouping level, Supports Disabled,
and Supports Security check boxes, and then type 2 in the No.
of characters to show field.
224
CHAPTER 8
•
Show view level data before searches and adhoc folders—
Select this check box if you want the Dynamic View tree
to display data before searches and any ad hoc folders.
•
Show grouping level—Select this check box if you want the
view level to display a set number of characters of
groupings. This applies to the All Node only.
•
If you have a large number of clients and matters,
selecting this check box allows you to view groups of
these items instead of a long list of each client and
matter.
•
No. of characters to show—This field works in conjunction
with the Show grouping level check box. Enter the number
of characters to show in the grouping level. You can enter
any number between 1 and 9. For example, type 2. The
client names will appear within a grouping of AA, AB,
etc., instead of a long list of client names. This field is
disabled when the Show grouping level check box is
cleared.
•
Users can drop documents onto this level—Select this check
box to allow users to drop documents onto the View
Level.
•
Users can assign/create adhoc folders to this level—Select
this check box to allow users to assign and/or create ad
hoc folders in the View Level.
•
Hide the ‘New document’ menu option for this level—Select
this check box if you do not want users to see the New
document menu option.
•
Hide the ‘New email’ menu option for this level—Select this
check box if you do not want users to see the New email
menu option.
•
Supports Disabled—Select this check box if you want
disabled entries for this view level not to appear in the
Dynamic View. If there aren’t any disabled columns, then
this field will not be enabled.
•
Supports Security—Select this check box if you want this
view level to support security. This means that an
appropriate user can set up security trustees against the
lookup value. The security settings override the security
set on the documents, and inherit the trustees and
security settings. For example, if a user sets security on a
matter, that matter will override the client’s security. In a
Dynamic View, the lower level overrides the higher level.
9. The Sublevel defaults field indicates the defaults for sublevels
when a user drops a document on this level. This is used
when a user drags and drops an item to a top-level Dynamic
View node. If this field is defined, the format would be
ID=???|ID=????, where the ID is replaced with the next
DYNAMIC VIEWS
225
level’s key field and value, repeated as required to cover
other sublevels. For example, a client might have the
following default value:
‘MATTER_ID=DEFAULT|TYPE_ID=LETTER’. This would
then populate the lower levels in the profile.
10. Click Save.
After you click Save, the View Levels page appears with the CLIENT_ID and
MATTER_ID levels listed. The MATTER level is automatically created for
parent tables.
Adding a View
Level Language
If you are setting up a multilingual environment, then you will need to
add a View Level Language for each language. The view language
determines how the view level appears.
The default language’s view level is already configured. If you are using
a multilingual environment, you will need to use the following
instructions to create View Level Languages for the other languages.
To add a view level language to a view level:
1. If not already on the View Levels page, click DM
Admin>Validation Tables>Dynamic Views, and then click the
View ID name. For example, click LEGAL. Then click View
Levels.
For example, the following will appear:
Level
no.
Candidate ID
column
Level type
View
ID
1
CLIENT_ID
L (Level)
LEGAL
2
MATTER_ID
L (Level)
LEGAL
2. Click 2 (or the level number for the matter level that was
automatically created) in the Level no. column.
3. Above the Save, Restore, and Cancel buttons, click View Level
Languages. The View Level Languages page appears.
4. Click Add. The View Level Language page appears with the
following fields:
• Level Name
• Language
• Sub Level Defaults
226
CHAPTER 8
• Display Format
5. Type a name in the Level Name field.
For example, type MATTER.
6. Click the lookup (...) button in the Language field.
7. Select the language code to use for this view level and click
OK.
For example, select ENU.
8. The Sub Level Defaults field indicates the defaults for
sublevels when a user drops a document on this level. This is
used when a user drags and drops an item to a top-level
Dynamic View node. If this field is defined, the format
would be ID=???|ID=????, where the ID is replaced with the
next level’s key field and value, repeated as required to cover
other sublevels. For example, a client might have the
following default value:
MATTER_ID=DEFAULT|TYPE_ID=LETTER. This would
then populate the lower levels in the profile.
9. In the Display Format field, type the display format of the
level that you want to appear in the tree. This is a format
string that can contain column references. You can use
custom defined strings with column values.
For example, type the following: {CLIENT_ID}{MATTER_ID}
10. Click Save. The View Languages page appears. The newly
created level appears.
11. Click Close. The View Level page appears.
The next process is to add a level search item for the view level.
Adding a Level
Search Item to a
View Level
From the View Level page, you can create a level search item. These
search items are queries sent to the database based on the current view
level. You can configure each level to have its own search item. These are
used to execute the document searches based on the subscription and
enumeration levels.
There are several predefined search items that are installed by default.
However, you must have already set up the default language for the
Dynamic View for these search items to appear. You can also set up
custom search items.
DYNAMIC VIEWS
227
To add a level search item to a view level:
1. If not already on the View Levels page, click DM
Admin>Validation Tables>Dynamic Views, and then click the
View ID name. For example, click LEGAL. Then click View
Levels.
2. Click 2 (or the level number for the matter level that was
automatically created) in the Level no. column. The View
Level page appears.
3. Above the Save, Restore, and Cancel buttons, click Level Search
Items. The Level Search Items page appears with the Assigned
Searches and Unassigned Searches panes.
4. In the Unassigned Searches pane, select one of the following
search items and then click the double-left arrow (<<) to add
it to the Assigned Searches pane:
228
CHAPTER 8
•
ALL_DOCS_AND_EMAILS—This search item returns all
documents and e-mails that the user has privileges to
view.
•
MY_DOCUMENTS—This search item returns all documents
authored by the user. The search is based on the Typist
field, not the Author field.
•
MY_DOCUMENTS_AND_EMAILS—This search item returns all
documents and e-mail messages authored by the user.
The search is based on the Typist field, not the Author
field.
•
MY_EMAILS—This search item returns all e-mails
authored by the user. The search is based on the Typist
field, not the Author field.
•
RECENT_DOCUMENTS—This search item returns all
documents, excluding e-mail messages, that the user has
edited or saved within a set number of days. You can
configure the number of days considered to be recent;
the default is 30 days.
•
RECENT_EDITS—This search item returns all documents,
including e-mail messages, that the user has edited or
saved within a set number of days. You can configure the
number of days considered to be recent; the default is 30
days.
•
RECENT_EMAILS—This search item returns all e-mails that
the user has edited or saved within a set number of days.
You can configure the number of days considered to be
recent; the default is 30 days.
For example, select ALL_DOCS_AND_EMAILS.
To add all of the predefined search items, simply click the Select all
button and then click the double-left arrow (<<).
5. Click Add to save your changes.
6. The Level name appears on the View Level Languages page.
Click Close.
The next process is to add an enumeration to the Dynamic View.
Adding an
Enumeration
An enumeration allows you to further filter of search results based on
the enumeration’s criteria. An enumeration can be based on the
Document Type, but it can also be any lookup field on the profile form.
For example, a user is subscribed to Clients and Matters, but that user
only wants to see items that have the RM document type. The
enumeration allows the search results to filter through all of the
subscribed Clients and Matters, and return only those items matching
the RM document type.
DYNAMIC VIEWS
229
To add an enumeration:
1. If not already on the View Levels page, click DM
Admin>Validation Tables>Dynamic Views, and then click the
View ID name. For example, click LEGAL.
2. Above the Save, Restore, and Cancel buttons, click View Levels.
3. On the View Levels page, click Add. The View Level page
appears. Notice that the View ID is already populated with
the view level name. For example, LEGAL.
Although the Level no. field appears blank, you do not need
to enter a number here. Once you set up your enumeration
and click Save, this field becomes populated. For example, 3
will be used as the level number.
4. Type a name in the Level Name field.
For example, type Document Type.
5. Type the icon name in the Level icon field.
For example, type DOC_TYPE_ICON.
6. Click the Column drop-down menu and select an item.
For example, select TYPE_ID (DOCUMENTTYPES).
The ID field name field is populated with TYPE_ID, the Table
field is populated with DOCUMENTTYPES, and the Display format
field is populated with (TYPE_ID). You can modify the Display
format field, if desired.
7. Click the Type drop-down menu and select Enumeration.
8. Select the check boxes of the following options that you
want to enable.
For example, select the Users can drop documents to this level
check box.
•
230
CHAPTER 8
Show view level data before searches and adhoc folders—
Select this check box if you want the Dynamic View tree
to display data before searches and any ad hoc folders.
•
Show grouping level—This check box is unavailable.
Grouping levels apply only to level types.
•
No. of characters to show—This field works in conjunction
with the Show grouping level check box, which is
unavailable for enumerations.
•
Users can drop documents onto this level—Select this check
box to allow users to drop documents onto the View
Level.
•
Users can assign/create adhoc folders to this level—Select
this check box to allow users to assign and/or create ad
hoc folders in the View Level.
•
Hide the ‘New document’ menu option for this level—Select
this check box if you do not want users to see the New
document menu option.
•
Hide the ‘New email’ menu option for this level—Select this
check box if you do not want users to see the New email
menu option.
•
Supports Disabled—Select this check box if you want the
tree to not display disabled columns.
•
Supports Security—This check box is unavailable. You
cannot set security on enumerations.
9. Click Save. The View Levels page appears with the new
enumeration level listed.
10. Click 3 (or the number of the enumeration level that you
created). The View Level page appears.
11. Click Level Search Items.
12. Select MY_DOCUMENTS_AND_EMAILS from the Unassigned
Searches pane, and then click the double-left (<<) arrow.
13. Click Add.
14. Click Save.
15. You must now refresh the cache in DM Server Manager. To
do so, select Start>Programs>Open Text>DM Server>DM Server
Manager.
16. Click the Caches tab.
17. Click Refresh All.
The next time users log on to DM Extensions, they should see the
enumeration and view levels appear in the tree.
DYNAMIC VIEWS
231
Setting the Base
for Template
Folders
In DM Admin>Validation Tables>Dynamic Views>Dynamic View, you can set the
base for template folders.
Base Template Folders allow for uniform folder structures in the
navigation tree. Note the following conditions:
•
You must designate a folder that will serve as the base folder
for your templates. You can set one base folder (such as
Document Number) per Dynamic View.
•
Any subfolders within the base folder are the template bases.
The folder names are equivalent to the template name.
•
You will need to create the folders that you want to be part
of the actual template as subfolders of the Template Folder
(as noted above).
•
Your library must be set to allow duplicate document
names.
Following is an example structure. The folder document number
appears in brackets.
Base template folder [100]
+ Template #1
+ Folder 1 for Template 1
+ Subfolder 1.1 for Template 1
+ Folder 2 for Template 1
+ Folder 3 for Template 1
+ Folder 4 for Template 1
+ Template #2
+ Folder 1 for Template 2
+ Folder 2 for Template 2
+ Folder 3 for Template 2
+ Template #3
+ Folder 1 for Template 3
+ Subfolder 1.1 for Template 3
+ Subfolder 1.2 for Template 3
+ Folder 2 for Template 3
+ Subfolder 2.1 for Template 3
+ Subfolder 2.2 for Template 3
+ Template #4
232
CHAPTER 8
+ Folder 1 for Template 4
+ Subfolder 1.1 for Template 4
+ Folder 2 for Template 4
+ Subfolder 2.1 for Template 4
+ Folder 3 for Template 4
+ Subfolder 3.1 for Template 4
+ Folder 4 for Template 4
+ Subfolder 4.1 for Template 4
For example, if a user wants to add a new template to Client 10, a list of
available templates will appear; assuming that the DM administrator
has set the base folder for this Dynamic View to be Document #100, the
user would see the following:
1. Template #1
2. Template #2
3. Template #3
4. Template #4
If the user selects Template #3 from the list above, the system would
duplicate the folder structure and then attach the new structure to that
Client (or whatever node was specified). After this operation and a
refresh of the tree, the tree would appear like the following:
…
Client 10
+ Folder 1 for Template 3
+ Subfolder 1.1 for Template 3
+ Subfolder 1.2 for Template 3
+ Folder 2 for Template 3
+ Subfolder 2.1 for Template 3
+ Subfolder 2.2 for Template 3
To set up a base template folder:
1. Click DM Admin>Validation Tables>Dynamic Views.
2. On the Dynamic Views page, click the View ID.
For example, click LEGAL.
DYNAMIC VIEWS
233
3. Above the Save, Restore, and Cancel buttons, click Set base for
Template Folders.
The View Name field is automatically populated. For
example, LEGAL appears. You cannot edit this field.
4. Click the lookup (...) button in the Document Number field.
The Select an item dialog box appears with a list of folder
items identified by Document Number, Document Name, and
Type ID.
5. Select the check box for the folder item that you want to be
the base template folder.
The Document Number field is populated with the folder’s
document number, and the document’s name appears next
to this field.
6. Click Save.
Configuring Level
Searches
Level Searches are custom search items, which uses fields from the
search forms to which they are assigned.
The Level Searches page shows existing Level Searches and allows you
to create new custom searches. You can then add these searches to a
View Level in Dynamic Views.
A group of level searches are already defined in DM Admin>Validation
Tables>Level Searches. Following are the Level Search IDs:
ALL_DOCS_AND_EMAILS—The All Documents and E-mails level search returns
all documents and e-mails within the subscribed dynamic views.
RECENT_EDITS—The My Recent Edits level search returns all documents,
including e-mail messages, that the user has edited or saved within the
last 30 days. The number of days is configured by the DM
administrator; the default is 30 days.
RECENT_DOCUMENTS—The My Recent Documents level search returns all
documents, excluding e-mail messages, that the user has edited or
234
CHAPTER 8
saved within the last 30 days. The number of days is configured by the
DM administrator; the default is 30 days.
RECENT_EMAILS—The My Recent E-mails level search returns all e-mails that
the user has edited or saved within the last 30 days. The number of days
is configured by the DM administrator; the default is 30 days.
MY_DOCUMENTS—The My Documents level search returns all documents
authored by the user. The search is based on the Typist field, not the
Author field.
MY_EMAILS—The My E-mails level search returns all e-mails authored by
the user. The search is based on the Typist field, not the Author field.
MY_DOCUMENTS_AND_EMAILS—The My Documents and E-mails level search
returns all documents and e-mail messages authored by the user. The
search is based on the Typist field, not the Author field.
On the Level Searches page, the Level Search ID, Search icon, and Order no.
fields and values are shown. You can edit the level searches by clicking
the Edit button, or change their order by using the Up and Down buttons.
Creating Custom Level Searches
You can create your own custom level searches by using any field on
your search form. Enter the field name and the values separated by the
| character.
To create a custom level search:
1. Click DM Admin>Validation Tables>Level Searches. The Level
Searches page appears.
2. Click Add.
3. In the Search name field, type the name that you want to
appear for this custom level search. For example, type
Author Search.
4. In the Search ID field, type the ID. For example, type
AUTHOR_ID.
5. In the Search criteria field, type the criteria for your search.
For example, to search for a particular author, type
Author_ID=%USERNAME (where USERNAME is the user
ID of the author).
NOTE: You can use any valid field on the search form for your search
criteria.
DYNAMIC VIEWS
235
6. You can also add search variables to the Search criteria field.
For example, if you want to locate all profiled items edited
by the author in the last 30 days, type the following after
Author_ID=%USERNAME: |LASTEDITDATE=%TODAY MINUS
30 TO %TODAY
NOTE: You must insert the | symbol between field names and search
variables.
7.In the Language field, click the lookup (...) button to select
the language. For example, select ENU (English - United States).
8. In the Form Name field, click the lookup (...) button and
select the search form name. For example, select LAWQBE
(Legal Search Form).
9. In the Order no. field, type a number for the order in which
you want this custom search to appear. For example, type 3.
10. In the Search icon field, type the name of the icon you want
to appear. For example, type SEARCH_ICON.
11. Click Save.
The custom search appears in the list of Level Search IDs.
Assigning Level
Search Languages
236
CHAPTER 8
If you are using a multilingual environment, you will need to assign
Level Search Languages for each language (other than the default,
which is automatically configured).
To assign a level search language:
1. Click DM Admin>Validation Tables>Level Searches. The Level
Searches page appears with predefined search items.
2. Click the Level Search ID name (or click its corresponding Edit
button).
For example, click RECENT_EDITS.
3. The Level Search page appears with the Search Id (for
example, RECENT_EDITS), Search icon, and Order no. fields. The
Search Id field is not editable; however, you can enter a new
icon name in the Search icon field.
4. Above the Save, Restore, and Cancel buttons, click Level Search
Languages.
5. In the Level Search Languages page, click Add.
DYNAMIC VIEWS
237
6. The Level Search Language page appears with the Search Id,
Search name, Search criteria, Language, and Form Name fields.
The Search Id is already populated with the name (for
example, RECENT_EDITS).
7. Click the lookup (...) button next to the Search name field.
All of the predefined level searches appear under the Search
Name and Criteria columns.
Select the check box for the Search Name that you want to
use. For example, select the My Recent Edits check box.
8. Click OK.
238
CHAPTER 8
Notice that the Search criteria field is automatically
populated. In this example, the search criteria uses the
following:
TYPIST_ID=%USERNAME|LASTEDITDATE = %TODAY MINUS 30 TO
%TODAY
9. Click the Language lookup (...) button.
10. Select a Language Code check box, and then click OK.
11. For example, select the ENU check box.
12. Click the Form Name lookup (...) button.
13. Select the Form Name check box of the search form to use,
and then click OK.
For example, select the LAWQBE (Legal QBE Search Form) check
box.
14. If you want to change the name of the Search name, type the
name that you want users to see.
15. Click Save.
16. In the Level Search Languages page, the level search you
created appears with the Search ID, Search name, Language,
and Form Name fields.
17. Complete these steps for each predefined level search that
you want to use.
Using MatterCentric Security in
Dynamic Views
Dynamic Views support inherited security, which is also known as
matter-centric security. Security can be set on any level in the
hierarchical levels, such as client and matter. When a user creates a
document and assigns it to a level that has security assigned, that
security is automatically inherited by the document.
Matter-centric security applies only to DM folders, physical (paper)
documents, and electronic documents. RM containers cannot use this
type of security; any documents that are inheriting RM security by
default will override the dynamic view security settings.
Designating the Ability to Set Security
The following security settings enable a user to be able to set security
against a lookup value in a dynamic view:
DYNAMIC VIEWS
239
•
The user or group is designated as a Current Trustee for the
dynamic view with the right Can set security against a level
node in this dynamic view, for inheritance purposes when
creating items under the dynamic view. This is configured in
DM Admin>Validation Tables>Dynamic Views><Dynamic View
Name> by clicking the Security button.
•
The user is assigned as the security person for a particular
lookup value. To apply individual security on a lookup row,
you must add a new column on the table for the lookup
value. This column name must end in _PERSON (for
example, BILL_PERSON or RESP_PERSON), and must be
a foreign link column to the PEOPLE table. After you create
this column, add the lookup to the maintenance form for
the lookup value and add users, as required, for the ablity to
set security for the row.
•
When a user is the security person, that user can delegate
the responsibility to another user.
Users cannot delegate the top security right, which is described in the
top bullet item. Only the DM administrator can assign the top security
right.
Security Menu Items
Users with the ability to set security will see the following menu options
when they right-click a a hierarchical lookup node, such as client or
matter:
•
Set Security—This menu option appears if security has not
been set against the lookup value.
•
Change Security—This menu option appears when security
already exists for a lookup value.
•
Remove Security—This menu option appears when security
has been set and the user has been assigned the access right
to remove security.
When users select the Set Security menu option, the Security dialog box
appears in which they can assign users to the Current Trustees list for that
particular lookup value. The user can assign the following access rights:
•
240
CHAPTER 8
Custom—Users can select the Allow or Deny check boxes for
the individual access rights they want to allow or deny.
•
View Profile—The Allow check box is selected for the View
Profile access right.
•
Read Only—The Allow check box is selected for the View
Profile, View Document, Retrieve Document, and Copy access
rights.
•
Normal Access—The Allow check box is selected for the View
Profile, Edit Profile, View Document, Retrieve Document, Edit
Content, and Copy access rights.
•
Full Rights—The Allow check box is selected for all access
rights.
When security has not already been set for an item, when users access
the Security dialog box, the user selected for the Current Trustees list is
assigned, by default, full access rights. When a lookup value already has
security set, then the access rights shown are the security that has been
previously defined for that user.
Lookup Value Changes
When a document is created in a dynamic view, DM determines if there
is security set for the combination of lookup values assigned, and if the
lookup values do have security, then the security will be inherited from
the lookup values. A profile form field maintains a link value to the
lookup that the document from which the document is inheriting
security; if a user changes the security of the lookup, that security will
be replicated to the documents or folders that are inherting security.
When a document’s lookup value changes, due to a move in the
dynamic view tree, or a user has manually changed the lookup values,
the security is changed to reflect the new inherited security, if any
applies.
If a user removes security from a lookup, the inherited security link is
removed. Removing security does not reset all of the security on the
existing documents.
Applying Security at Different Levels
Security can be applied at any hierarchical level. If security is applied to
a top level and to a lower level, the the security on the lower level
overrides. Therefore, the security on the lower level is inherited by the
document or folder.
DYNAMIC VIEWS
241
Creating the _PERSON Column
In order to set individual security on a lookup row, you must add the
_PERSON column to the lookup value’s table. For example, create a
RESP_PERSON column.
To create the RESP_PERSON column:
1. Start DM Designer.
2. Click the Database tab.
3. In the Select Field to Edit dialog box, select MATTER in the
Tables pane, and then click New Column.
3.1 In the Column Name field, type RESP_PERSON.
3.2 In the Type field, click the drop-down list and select
Integer.
3.3 In the Key? field, click the drop-down list and select
Foreign.
3.4 A Link field appears; click the lookup (...) button to
view the available tables to link to.
3.5 In the Pick a Table dialog box, select PEOPLE and then
click OK.
3.6 Verify that the link to the PEOPLE table appears in the
Link field.
3.7 Click OK to create the column.
4. In the Select Field to Edit dialog box, the RESP_PERSON
appears as a column for the MATTER table. Click Close.
5. Click the Maintenance tab.
6. In the Available Forms dialog box, select MATTER and then
click OK.
7. The SQL Columns window appears. Expand the
RESP_PERSON entry and scroll to the USER_ID column.
8. Select the USER_ID column in the SQL Columns window and
drag it to the Matter form.
9. Double-click the USER_ID field you dragged to the form; the
Edit Attributes dialog box appears.
10. Change the USER_ID Prompt to RESP_PERSON.
11. In the Lookup Name field, click the lookup (...) button.
242
CHAPTER 8
12. In the Lookup Name dialog box, select PEOPLE and then click
OK.
13. In the Edit Attributes dialog box, click OK.
14. Select File>Save and then close the form.
15. Exit DM Designer.
16. Refresh the cache in DM Server Manager.
DYNAMIC VIEWS
243
Chapter
9
Indexes and Profiles
In This Chapter
The Index and Profiles pages of the DM Administration Tools allow
you to define and modify Attachments to Index, Keyword, and Custom
Profile Defaults. To access this feature, log on to DM Webtop, select the
DM Admin tab, then the Index and Profile tab.
245
Attachments to Index
The Attachments to Index function is designed for applications
integrated through a third party. By default, the Full-Text Indexer
indexes the last major version of a document. Since documents
integrated through a third party can have attachments, you can choose
to index the attachment in place of the last major version. To have the
Indexer index the attachment rather than the last major version, add
the attachment extension in the Attachments to Index Maintenance
page.
For example, assume you have an integrated application that saves an
attachment with every version of a document. This attachment, having
a.TXT extension, would not be indexed by default. If your Attachments
to Index listing contained the TXT extension, the major version of the
document would be ignored and the TXT file would be the file indexed
for this document.
The Attachment to Index page allows you to view, add, edit, and delete
Attachments to Index. The Attachments to Index page displays the list
of existing attachments.
At the top of the list, you have these options:
Filter: Select the field to search for attachments.
By: Type a text fragment you wish to search for. If this box is
empty, all attachments will be displayed in the list.
Search: Begin searching for attachments which satisfy the criteria.
Add: Open the Attachments to Index Maintenance page to add a
new attachment extension.
The list shows the current attachments matching the filter criteria.
Click an entry or the Edit icon to modify the settings.
246
CHAPTER 9
•
Extension: The filename extension for currently defined
attachments. The column contains links for editing
attachment definitions.
•
Description: Text describing the entry.
•
Delete: Click to remove this entry.
Using the
Attachment to
Index
Maintenance Page
Click an existing entry or the Add button to display the Attachment To
Index Maintenance page.
The two buttons below the tabs are:
Save: Save changed data to the database and return to the
Attachments to Index page.
Cancel: Return to the Attachments to Index page without saving
your changes.
The following fields allow you to define the attachment type:
•
Attachment to Index: The file extension used for this kind of
attachment. This field is required. The maximum length is
10 characters.
•
Description: Text describing this kind of attachment. The
maximum length is 40 characters.
Keywords
Using Keywords is a simple way to obtain faster and more accurate
search results. Since text fields on Document Profiles can be full-text
indexed, adding keywords to your searches allows users to enter more
specific criteria when searching. All keywords must be entered into this
validation table if they are to be used in profile searching.
At the top of the list, you have these options:
Filter: Select the field to search for keywords.
By : Type a text fragment you wish to search for. If this field is
empty, all keywords will be displayed in the list.
Search: Begin searching for keywords which satisfy the criteria.
Add: Open the Keyword Maintenance page to add a new keyword.
The list shows the current keywords matching the filter criteria. If no
criteria are entered, all current keywords are listed.
•
Keyword: This column displays links for editing or viewing
existing keywords.
•
Description: Contains the descriptive text for the keyword.
•
Copy : Opens the Keyword Maintenance page for adding a
new keyword. All fields are filled from an existing keyword.
KEYWORDS
247
Using the Keyword
Maintenance Page
Click an existing Keyword entry or the Add button to display the Keyword
Maintenance page. The two buttons below the tabs are:
Save: Save changed data to the database and return to the
Keywords page.
Cancel: Return to the Keywords page without saving.
The following fields allow you to define a keyword:
•
Keyword: Contains a keyword. This field is required. The
maximum length is 30 characters.
•
Description: Contains the descriptive text describing a
keyword. The maximum length is 254 characters.
Custom Profile Defaults
Custom profile defaults can be set for any profile criteria. They can be
based upon specific key values, such as Client/Matter or Document
Type, or based upon a specific purpose, such as billable clients or
payroll documents. To have access to the custom profile defaults that
you create, the Profile Defaults button must be added to the Document
Profile using DM Designer.
Filter: Select the field to search.
By: Type a text fragment you wish to search for. If this box is
empty, all profiles will be displayed in the list.
Search: Begin searching for profiles which satisfy the criteria.
Add: Open the Custom Profile Default Maintenance page to add a
new custom profile default.
The list shows the current profiles matching the filter criteria. Click an
entry or the Edit icon to modify the settings.
The items of the Custom Profile Defaults page have the following
meaning:
248
CHAPTER 9
•
Name: The name of the custom profile default. Click the
name to edit this custom profile default.
•
Description: Contains the description for this custom profile
default.
•
Delete: Remove this custom profile default.
Custom Profile
Default
Maintenance
The Custom Profile Default Maintenance page allows you to add and
edit custom profile default values. The page uses existing DM Webtop
applet for displaying the form. The page displays the primary profile
form assigned to the primary group of the current user.
The two buttons below the tabs are:
Save: Save changed data to the database and return to the Custom
Profile Defaults page.
Cancel: Return to the Custom Profile Defaults page without saving
your changes.
The following fields allow you to set the name and description for this
custom profile default:
•
Name: Contains the name of this custom default profile.
This field is required. The maximum length is 80 characters.
•
Description: Contains the description for this custom profile
default. The maximum length is 254 characters.
•
Profile Form: This applet displays the default profile form. Fill
in appropriate defaults for this form. If you specify an
invalid value, the lookup applet will display the list of valid
entries for that field; specify a valid entry and you can save
this set of defaults. If you select the Secure Document option,
the Edit button becomes active (click Edit to set the specific
document security options you want in the Security
Applet).
CUSTOM PROFILE DEFAULTS
249
Chapter
10
DM Webtop Maintenance
In This Chapter
The DM Webtop Maintenance tab of the DM Administration Tools allow
you to set the DM API configuration parameters, the DM Webtop
parameters and the Custom Parameter definitions.
DM API Configuration
The DM API Configuration page allows you to choose the target DM
server and set the Fail-Over and Load Balancing option for DM on the
DM Web Server side. To select this tab, log on to DM Webtop, and then
DM API CONFIGURATION
251
select the DM Admin tab. Using the navigation arrows, scroll to the DM
Webtop Maintenance tab and select it. Select the DM API Configuration tab.
The buttons below the tabs are:
Save: Save changed data to the database. If the Enable Fail-Over and
Load Balancing option is selected, the DM API configuration is
performed using the command-line utility provided by Open
Text.
Restore: Reload the page and restore data from the database.
The following fields allow you to set certain system features:
252
CHAPTER 10
•
DM Server Name: The name of the DM server machine that
the client application will initially log on to. If the fail-over
and load-balancing features are used, the cluster of servers
associated with that server will be available to the client
application. This field is required.
•
Enable Fail-Over and Load Balancing: If this option is selected,
the DM API configuration is performed using the
command-line utility provided by Open Text. This check
box is cleared by default.
DM Webtop Parameters
The DM Webtop Parameters page allows you to set various values for
Timeout, Guest Logon, Language, Logon, and Install Options.
The buttons below the tabs are:
Save: Save changed data to the database.
Restore: Reload the page and restore data from the database.
The following fields allow you to set certain DM Webtop features:
•
DM Web Server: Sets the server in use and becomes part of
various internal paths for determining installation details.
This field is required.
•
eDOCSDM Server Name: Path setting for some application
integration and related functions. This field is required.
•
Number of Characters to TRIM document/folder name: In the
navigation list (breadcrumbs), the length of the folder or
document name is constrained by this setting. (The entire
folder/document name is displayed in the tool tip.)
•
Number of Groups in Security Dialog: In the Security page, if the
user expands the Group folder, the number of groups that
show is constrained by this setting. If there are more groups
than this setting, subgroups are created.
•
Maximum tabs on Quick Reference page: Change this value to
restrict the number of tabs allowed on your users' Quick
Reference pages. The default value is 8.
•
Enable Application Integration Prompt on Logon: Select this
option to provide your users with an enable Application
Extension in DM Webtop option on the logon page.
•
Enable Drag'n Drop: Set this option to allow your users to take
advantage of the drag and drop capabilities in the DM
Webtop.
•
Use Common Search Form: Allows you to set the type of search
form displayed when searching across multiple libraries of
different industry types: if you select this option, the search
form will not display any industry-specific fields. The
default is to display any industry-specific fields.
DM WEBTOP PARAMETERS
253
Timeout
On Document
Select
•
Enable Pre-logon Prompt: Select this option to prompt your
users before logging on to verify that they have permission
to log on.
•
Timeout Script: The maximum time (in minutes) a web script
is allowed to take. May be a number in the range 0 - 240.
This field is required.
•
Timeout Logon Info: The number of days that cached logon
information will be retained before it is purged. May be a
number in the range 0 - 10000. This field is required.
•
Timeout Session: The number of minutes of inactivity
permitted for a session. May be a number in the range 0 1440. When this number is reached, the session is
terminated and the user must log on again. This field is
required.
•
View: When selecting a document in the results list, the
document will be opened to view.
•
Preview: When selecting a document in the results list, the
document will be opened in a preview pane using DM
Viewer.
•
Allow User to Change: Give the user the ability to select View
or Preview from the My Options page.
This setting works with the preview settings in the Group Features and
System Parameters>Default sections, as follows:
254
CHAPTER 10
System
Parameters>
Defaults>Allow
Preview
Users & Groups>
Groups>
GROUP NAME>
Features>Allow
Preview
DM Webtop
Maintenance>
DM Webtop
Parameters>On
Document Select
(Preview)
Result
On
Off
On
The My Options
page does not
allow the user to
change
between View
and Preview.
Guest Logon
Language
On
On
On
The My Options
page does allow
the user to
change
between View
and Preview.
Off
On
On
The My Options
page does allow
the user to
change
between View
and Preview.
•
Guest Name: The default name for a guest user.
•
Guest Password: The default password for a guest user.
•
Guest Network Name: The network name to be used for a
guest user.
•
Query Language: This setting allows you to specify the
language to be used by DM Server when doing content
searching. It is not a required setting because DM Server can
automatically detect the language being used, and we
recommend that it is not set by default. However, in some
situations where you have documents or users of different
languages, you can specify the Query Language to be used:

Danish: 0x06

Dutch: 0x013

English (UK): 0x089

English (US): 0x049

Finnish: 0x0b

French: 0x0c

German: 0x07

Greek: 0x08

Italian: 0x10

Japanese: 0x11

Korean: 0x12

Norwegian: 0x014
DM WEBTOP PARAMETERS
255
•

Portuguese: 0x0816

Portuguese (Brazil): 0x0416

Spanish: 0x0a

Swedish: 0x1d
Default Character set: Sets the default character set to use in
DM Webtop pages. The character set symbol adds a meta
HTML tag specifying the character set to be used for all DM
Webtop display pages.
Important: To configure DM Webtop to support multi-lingual content search,
type "UTF-8" in Default Character Set field.
Logon
•
HTML-Rendering Character set: This symbol is used to support
national characters in HTML-rendering. For example, set
the value to 0x13A40000 to view using Japanese characters
(the default value is blank).
•
Default Network Name: If this field is set to a value, the
Network field on the logon page will be filled with that
value.
•
Allow the User to enter a network name: If this option is not
selected, the Network field will not appear on the logon
page.
•
Allow Auto Logon: If this option is selected, after a user logs
on, that user can access DM Webtop based on the logon
information stored in a cookie for future accesses. The user
must select this option on the My Options page to take
advantage of it. This option also works with the Allow Auto
Logon settings on the Library Parameters Defaults and
Groups Features pages: if both of these settings are selected
and the Accept User-Supplied Identification option (on the
System Parameters Features page) is not selected, users who
have application integration installed can log on to DM
Webtop without having to provide their user names and
passwords.
Note: To disable single sign-on the DM administrator must remove “Allow Auto
Logon” from the group or whole library OR add “Accept User-Supplied
Identification” to make it Auto Logon. Remember that there will be one logon
like the last successful logon before the new rules take effect on the next
subsequent logon.
256
CHAPTER 10
Webtop Tree
•
Tree Refresh time: This setting sets the expiration time on the
Tree cache. When the cache expires, the Tree refreshes its
data from the server.
•
Tree Rendering Mode: The DM Webtop tree has been
modified so that its nodes can either be drawn in chunks or
all at once. The advantage of drawing in chunks is that the
tree will be redrawn faster.
•
User Format
Group Format

Automatic: To use this mode you must specify a
threshold number in the Incremental threshold field.
The tree will automatically switch to incremental mode
if the number of nodes is greater than the threshold
number you set.

Incremental: The threshold number should be set to 0.
This means that the tree will always be in incremental
mode.

Full: Threshold number set to 2147483647 (2^31-1)
This means the tree will always be in full mode.
Incremental threshold: This field is only required if the Tree
Rendering Mode field is set to Automatic. Use this field to
determine how many nodes to handle without switching to
Incremental mode.
This setting controls the display format of the User list in the Security
dialog box. The available setting are:
•
ID only
•
Full Name only
•
ID plus Full Name
•
Full Name plus ID
This setting controls the display format of the Group list in the Security
dialog box. The available setting are:
•
ID only
•
Full Name only
•
ID plus Full Name
•
Full Name plus ID
DM WEBTOP PARAMETERS
257
Recent Edits
This setting controls the number of items and how many days worth of
active items should appear on the Quick Reference page. This setting
works in conjunction with the My Options page setting in the DM
Webtop. For example:
Number of
Documents
edited in last 90
Days
Scenario A
Scenario B
Scenario C
232
232
232
10
10
10
My Options
>Display
Options>Item List
Recent Edit
Activity Check
box
Not selected
(default setting)
Selected
Selected
Max Days
n/a
90
90
Max Items
n/a
100
8
Result
10 documents
shown on the
Quick
Reference tab
10 documents
shown on the
Quick
Reference tab
8 documents
shown on the
Quick
Reference tab.
The All Recently The All Recently
Edited choice
Edited choice
available.
available.
Clicking on All
Recently Edited
produces a list
of documents 125 of 232.
Clicking All
Recently Edited
products a list of
documents 1-25
of 100.
Select the Recent Edit Activity check box and two fields will appear:
258
CHAPTER 10
•
Max Days: The number entered here will restrict the
documents being viewed to those documents and folders
which were actively used within the specified time period.
For example, if you set the number to 30, all documents and
folders used within the last 30 days will be shown.
•
Max Items: Enter the maximum number of documents to be
displayed on the Quick Reference page.
Custom Parameters
The Custom Parameters page allows you to create, modify, and delete
custom parameters. The Custom Parameters page lists all existing
custom parameters defined in the system.
Note: This page does not provide sorting, filtering, or paging features.
The items of the Custom Parameters page have the following meaning:
Custom Parameter
Definition
•
Add: Open the Custom Parameter Definition page to add a
new parameter.
•
Name: Click the name of the parameter to modify its value.
•
Value: The current value of the custom parameter.
•
Edit: Click to view or edit the existing parameter value.
•
Delete: Click to remove the current parameter.
Click an existing entry or the Add button to display the Custom
Parameter Definition page.
The buttons below the tabs are:
Save: Save changed data to the Registry and return to the Custom
Parameters page.
Restore: Reload the page and restore data from the Registry.
Cancel: Return to the Custom Parameters page.
The following fields allow you to set certain system features:
•
Name: Specify the parameter name. This field is required.
The maximum length is 16 characters. The field is disabled
for an existing parameter.
•
Value: Contains the parameter value.
CUSTOM PARAMETERS
259
P
A R T
3
Application Integration
In This Section
This section contains three chapters that will assist adminstrators with
the following:
•
Understanding application integration with DM.
•
Using the Client Deployment Utility to manage aspects of
DM.
•
Setting up Lotus Notes integration with DM.
261
Chapter
11
Configuring Application
Integration
In This Chapter
This chapter explains the steps necessary to configure and use
applications with DM. These steps assume that you already have a DM
library set up.
263
Integration Methods
There are several ways to integrate applications with DM:
•
Active Integration Active Integration is a document
management integration method that controls the Open
and Save functions so that those features are directly
integrated with the document management system.
•
Passive Integration This is an integration method that
allows you to profile Microsoft Word, Microsoft Excel, and
Microsoft Project in DM via a menu that is added to the
application. You can bypass DM and save documents using
the native application menu commands. For more
information on using applications with Passive Integration,
refer to the DM Webtop Help system.
•
Check in/Check out This disables native ODMA integration
for the selected application. Users can obtain documents by
checking them in and out of the library. Documents created
with an application using Check in/Check out integration
can be added to the library using the document import
feature.
•
Interceptor This is an integration method that monitors
when Open and Save As dialog boxes are called.
Applications monitored through Interceptor should be set
to Full Integration in the application’s launch method in the
DM Library Application table. The launch method will then
need to be enabled in the Interceptor Settings. Adobe
applications use Interceptor integration.
Note: As the DM administrator, you can restrict access to native application
dialog boxes. Refer to “Restricting Access to Interceptor Settings and Native
Dialog Boxes” on page 287.
Applications that are integrated using Passive Integration should not be further
integrated using Interceptor or Active Integration.
•
ODMA Integration Use this integration for ODMA compliant
applications not already shown in the DM Library
Applications table.
For more information on setting up launch methods, refer to “Selecting
Launch Methods” on page 191.
264
CHAPTER 11
Application
Integration
Components
DM Application Integration
Components necessary to integrate several popular software
applications and install Linking capabilities.
Adobe Acrobat
•
Adobe Acrobat Interceptor Integration
•
Check-in and Check-out only
Note: If you initially install Check-in and Check-out integration it will
automatically disable ODMA integration.
Corel Applications
Components necessary to integrate Corel WordPerfect, Quattro Pro
and Presentations.
Note: If you initially install Check-in and Check-out integration it will
automatically disable ODMA integration.
Corel Presentations
•
Corel Presentations Integration via Interceptor
•
Check-in and Check-out Only
Components necessary to integrate Corel Presentations via Interceptor
or via Check-in and Check-out. Refer to Application Integration for
Corel Applications.
Corel Quattro Pro
•
Corel Quattro Pro Integration via Interceptor
•
Check-in and Check-out Only
Components necessary to integrate Corel Quattro Pro via Interceptor
or via Check-in and Check-out. Refer to Application Integration for
Corel Applications.
Corel WordPerfect
•
Corel WordPerfect Active Integration
•
with Front-End Profiling
•
with Front-End Profiling and Cost Recovery
•
Active Integration without Front-End Profiling
•
Check-in and Check-out only
INTEGRATION METHODS
265
Components necessary to integrate Corel WordPerfect Pro via Active
Integration or via Check-in and Check-out. ReferApplication
Integration for Corel Applications.
E-mail Applications
•
Microsoft Outlook E-mail Integration
•
Lotus Notes E-mail Integration
Components necessary to install e-mail integration files for Microsoft
Outlook, Lotus Notes, and Novell GroupWise. Refer to Mail Client
RequirementsLotus WordPro
•
Active Integration for WordPro
•
Check-in and Check-out only
Components necessary to integrate Lotus WordPro via Active
Integration or via Check-in and Check-out.
Note: If you initially install Check-in and Check-out integration it will
automatically disable ODMA integration.
Microsoft Applications
Components necessary to integration Microsoft Excel, PowerPoint,
Project, Visio, and Word
Microsoft Excel
•
Microsoft Excel Active Integration
•
with Front-End Profiling
•
with Front-End Profiling and Cost Recovery
•
Active Integration without Front-End Profiling
•
Microsoft Excel Passive Integration Check-in and Checkout only
Components necessary to integrate Microsoft Excel via Active or
Passive Integration or Check-in/Check-out.
Microsoft PowerPoint
266
CHAPTER 11
•
Microsoft PowerPoint Active Integration
•
with Front-End Profiling
•
with Front-End Profiling and Cost Recovery
•
Active Integration without Front-End Profiling
•
Check-in and Check-out only
Components necessary to integrate Microsoft PowerPoint via Active or
Passive Integration or Check-in/Check-out.
Microsoft Project
•
Microsoft Project Active Integration
•
Microsoft Project Passive Integration Check-in and Checkout only
Components necessary to integrate Microsoft Project via Active or
Passive Integration or Check-in/Check-out.
Microsoft Visio
•
Microsoft Visio Active Integration
•
Check-in and Check-out only
Components necessary to integrate Microsoft Visio via Active
Integration or Check-in/Check-out.
Microsoft Word
•
Microsoft Word Active Integration
•
with Front-End Profiling
•
with Front-End Profiling and Cost Recovery
•
Active Integration without Front-End Profiling
•
Microsoft Word Passive Integration Check-in and Checkout only
•
Components necessary to integrate Microsoft Word via
Active or Passive Integration or Check-in/Check-out.
The following table shows other applications that are predefined in the
DM library and may be integrated with DM without additional setup.
Other Integrated
Applications
Full Authority for Windows
Refer to Using DM for more information on using Full Authority.
Lotus 1-2-3
Must be enabled through Interceptor.
INTEGRATION METHODS
267
Applications Using DDE Settings
When you regenerated your library for use with DM 5., launch
methods for supported applications were added to the DM database.
The DM 5. launch methods are enabled by default, as shown in the
example below. To see this feature, log on to DM , select DM
Admin>Validation Tables>Applications and select the desired application.
Launch methods previously used by your organization will be disabled.
You will need to manually enable these applications by clearing the
Disabled check box in DM Admin>Validation Tables>Applications.
Many of the new applications added to the database utilize Dynamic
Data Exchange (DDE) settings to communicate with DM.
In the event that you need to modify or update these settings in the
future, refer to the tables , DDE Settings for Microsoft Applications,
and Microsoft Visio DDE Settings for settings provided with the DM
installation program.
Important: Launch methods used in previous versions of DM or DOCS Open
products may still be present in your DM Library. Your library may contain
multiple launch methods for the same product. You should review all the launch
method settings in the library to insure that integrated applications are properly
configured, being sure to disable any launch methods that are no longer valid
for your organization. Additionally, you may want to edit the titles of application
launch methods to be more specific in order to assist end-users that will be
installing optional components. For more information on setting up and editing
launch methods, refer to “Selecting Launch Methods” on page 191.
DDE Settings for
Microsoft
Applications
Table 11.1
Microsoft Excel Launch Method Settings for Active and Passive
Integration
Integration Type
ODMA Compliant
Command Line Parameters
NOTE: Leave the Command Line Parameters field blank to make Excel open
with a blank workbook.
If you are using Front End Profiling, you should add the -e command line
268
CHAPTER 11
parameter.
Microsoft Excel DDE Settings - Open
Application Name
EXCEL
Topic Name
SYSTEM
Command
[RUN("'DDEOpen ""%1""'")]
Command (not running)
[RUN("'DDEOpen ""%1""'")]
Microsoft Excel DDE Settings - Print
Application Name
EXCEL
Topic Name
SYSTEM
Command
[RUN("'DDEPrint ""%1"", ""1""'")]
Command (not running)
[RUN("'DDEPrint ""%1"", ""0""'")]
Note: If your users will be importing Excel documents into Word, you need to
set the applications as being compatible to one another.
Table 11.2
Microsoft Word Launch Method Settings for Active Integration and
Passive Integration
Integration Type
ODMA Compliant
Command Line Parameters
/ND
Tip: To have Word open with a blank document, remove the /ND from
Command Line Parameters. The setting /ND indicates ‘no document’.
Microsoft Word DDE Settings - Open
Application Name
WINWORD
Topic Name
SYSTEM
Command
[DDE.DDEOpen(“%1”)]
Command (not running)
[DDE.DDEOpen(“%1”)]
APPLICATIONS USING DDE SETTINGS
269
Microsoft Word DDE Settings - Print
Application Name
WINWORD
Topic Name
SYSTEM
Command
[DDE.DDEPrint (“%1”, “1”)]
Command (not running)
[DDE.DDEPrint (“%1”, “0”)]
Note: When integrating Microsoft Word, Background Saves and Background
Printing should be disabled.
If your users will be importing Word documents into Excel, you need to set the
applications as being compatible to one another.
270
CHAPTER 11
Table 11.3
Microsoft PowerPoint Launch Method Settings
Integration Type
ODMA Compliant
Command Line Parameters
%FULLPATH
Microsoft PowerPoint DDE Settings - Open, None
Table 11.4
Microsoft PowerPoint DDE Print Settings
Application Name
AIM
Topic Name
POWERPOINT.SHOW
Command
Print
Command (not running)
Print
Note: To enable printing when using Microsoft PowerPoint XP, be sure to
download and install Microsoft Office XP Service Pack 2.
Table 11.5
Microsoft Project Launch Method Settings for Active and Passive
Integration
Integration Type
ODMA Compliant
Command Line Parameters
Microsoft Project DDE Settings - Open
Application Name
WINPROJ
Topic Name
SYSTEM
Command
DDEOpen "%1"
Command (not running)
DDEOpen "%1"
Microsoft Project DDE Settings - Print
Application Name
WINPROJ
Topic Name
SYSTEM
Command
DDEPrint "%1", 1
Command (not running)
DDEPrint "%1", 0
APPLICATIONS USING DDE SETTINGS
271
Microsoft Visio DDE
Settings
Table 11.6
Microsoft Visio Launch Method Settings
Integration Type
ODMA Compliant
Command Line Parameters
%FULLPATH
Microsoft Visio DDE Settings - Open, None
Microsoft Visio DDE Settings - Print
Application
Integration for
Corel Applications
Application Name
AIM
Topic Name
Visio.Drawing
Command
Print
Command (not running)
Print
Prior to using Corel Suite applications with DM, contact Corel to
obtain the latest service packs. Active integration will not work unless
these Corel service packs are installed.
Integrating Quattro Pro and Presentations
To integrate Quattro Pro and Presentations with DM, you will
need to:
1. Disable ODMA integration. If you initially install Check-in
and Check-out integration for Quattro Pro and
Presentations, this will automatically disable ODMA
integration.
2. Set up Interceptor launch methods in the DM library. To do
this, copy an existing launch method, rename it and change
the Integration type to Full Integration.
Important: Select the launch method specific to the version of Quattro Pro or
Presentations with which you are working. Be sure to disable the current
launch method and enable the new Full Integration launch method.
3. Launch Interceptor and enable the launch method in
Interceptor.
272
CHAPTER 11
For more information on setting up launch methods, refer
to “Selecting Launch Methods” on page 191. For more
information on Interceptor, refer to “The Interceptor
Module” on page 280.
4. In Quattro Pro and Presentations, go to Tools>Settings and
clear the Use Enhanced File Dialog setting.
Table 11.7
WordPerfect Launch Method Settings - Open
Integration Type
ODMA Compliant
Command Line Parameters
WordPerfect DDE Settings - Open
Application Name, version 9
WPWin9_Macros
Application Name, version 10
WPWin10_Macros
Application Name, version 11
WPWin11_Macros
Topic Name
COMMANDS
Command
FileOpen("%1") WPActivate
Command (not running)
FileOpen("%1") WPActivate
WordPerfect DDE Settings - Print
Application Name, version 9
WPWin9_Macros
Application Name, version 10
WPWin10_Macros
Application Name, version 11
WPWin11_Macros
Topic Name
COMMANDS
Command
FileOpen("%1")Print()CloseNoSave(1)
Command
(not running)
FileOpen("%1")Print()CloseNoSave(1)E
xitWordPerfect()
Table 11.8
Quattro Pro Launch Method Settings - Open
Integration Type
Full Integration
Command Line Parameters
APPLICATIONS USING DDE SETTINGS
273
Quattro Pro DDE Settings - Open
Application Name
QPW
Topic Name
SYSTEM
Command
[open("%1")]
Command (not running)
[open("%1")]
Quattro Pro DDE Settings - Print
Application Name
QPW
Topic Name
SYSTEM
Command
[print("%1")]
Command (not running)
[print("%1")]
Table 11.9
Corel Presentations Launch Method Settings
Integration Type
ODMA Compliant
Command Line Parameters
/ddeex
Corel Presentations DDE Settings - Open
274
CHAPTER 11
Application Name
PRESENTATIONS
Topic Name
COMMAND
Command
ShellFileOpen(“%1”) PRActivate()
Command (not running)
ShellFileOpen("%1") PRActivate()
Corel Presentations DDE Settings - Print
DDE Settings for
Lotus Applications
Application Name
PRESENTATIONS
Topic Name
COMMAND
Command
ShellPrintTo("%1")
Command (not running)
ShellPrintTo("%1")FileExit()
Table 11.10 Lotus 1-2-3 Launch Method Settings - Open
Integration Type
Full Integration
Command Line Parameters
%FULLPATH
Note: If you have Lotus 1-2-3 97 integrated with DOCS Open, after DM is
installed you will need to reset your toolbars so that the "PC DOCS" toolbar
reference is removed. Simply launch Lotus 1-2-3, right-click on the toolbar,
then clear "PC DOCS".
Lotus 1-2-3 97 and Millennium DDE Settings - Open, None
Lotus 1-2-3 97 and Millennium DDE Settings - Print
Application Name
AIM
Topic Name
123Worksheet
Command
Print
Command (not running)
Print
Table 11.11 Lotus 1-2-3 Launch Method Settings - Print
Integration Type
Full Integration
Command Line Parameters
%FULLPATH
Lotus 1-2-3 97 and Millennium DDE Settings - Open, None
Lotus 1-2-3 97 and Millennium DDE Settings - Print
Application Name
AIM
Topic Name
123Worksheet
APPLICATIONS USING DDE SETTINGS
275
Command
Print
Command (not running)
Print
Table 11.12 Lotus WordPro 97 and Millennium Launch Method Settings
Integration Type
ODMA Compliant
Command Line Parameters
Lotus WordPro DDE Settings - Open
Application Name
WORDPRO
Topic Name
SYSTEM
Command
[QuickOpen("%1")]
Command (not running)
[QuickOpen("%1")]
Lotus WordPro DDE Settings - Print
276
CHAPTER 11
Application Name
AIM
Topic Name
WordPro.Document
Command
Print
Command (not running)
Print
DDE Settings for
Other Applications
Table 11.13 DOCS Imaging
Integration Type
Full Integration
Command Line Parameters
-f%FULLPATH
DOCS Imaging DDE Settings - Open
Application Name
PCDIMG
Topic Name
Commands
Command
OPEN("%1")
Command (not running)
OPEN("%1")
DOCS Imaging DDE Settings - Print
Application Name
PCDIMG
Topic Name
COMMANDS
Command
PRINT("%1")
Command (not running)
PRINTEXIT("%1")
APPLICATIONS USING DDE SETTINGS
277
Setting up BI
Query Reports
BI Query Reports needs to be added to the Applications table, refer to
“Setting Up Applications” on page 186 for more information. The
Application ID values for BI Query Reports are as follows:
Application ID: BIQ Reports
Description: BI Reports
Filing Scheme: Enhanced
Default Extension: REP
Shows on Desktop: Yes
The Launch Methods values are as follows:
Enabled: <On>
Description: BI Reports
Location: <Full Path to executable>.
Note: If you plan to access the DM/RM Data Model, the default path to the
executable will be \PROGRAM FILES\OPEN TEXT\
BI\DMMODEL\DM_RM.GQL. If you plan to access a database other than
the DM/RM Data Model, the default path to the executable will be \PROGRAM
FILES\OPEN TEXT\BI\BI-QUERYREPORTS\REPORTS.EXE.
Command Line: NONE
Integration: ODMA Compliant
DDE settings: NONE
278
CHAPTER 11
Setting Up Application Integration
Application Integration is set up via the DM Server Admin Tools
Library Maintenance application. In the Application Maintenance
section you will find a listing of applications already set up to be used
with DM. You can use the Application Maintenance utility to edit these
settings, add applications, or create alternate methods for launching an
application. For more instructions on setting up applications in
Application Maintenance, see “Setting Up Applications” on page 186.
Active Integration
Active Integration is a document management integration method that
controls the Open and Save functions so that those features are directly
integrated with the document management system.
Passive
Integration
This is an integration method that allows you to profile Microsoft
Word, Microsoft Excel, and Microsoft Folder,documents in DM via a
menu that is added to the application. You can bypass DM and save in
the native application using standard menus. For more information on
using applications with Passive Integration, refer to the DM Help
system.
Check-in/Checkout
Interceptor
This disables native ODMA integration for applications. Users can
obtain documents by checking them in and out of the library.
Documents created with an application using Check-in/Check-out
integration can be added to the library using the document import
feature.
Interceptor is the module that monitors when Open and SaveAs dialog
boxes are called for specific applications integrated with DM. It is
represented by the system tray icon that is displayed when the user
starts DM. Applications that are not currently integrated can be added
to Interceptor manually.
Interceptor can be selected as a component from the My Options page
in DM Webtop. Prior to integrating an application with Interceptor, a
launch method must be created in Library Maintenance. For more
information on setting up launch methods, refer to “Selecting Launch
Methods” on page 191.
SETTING UP APPLICATION INTEGRATION
279
The Interceptor Module
The Interceptor allows you to integrate new applications that do not
already exist in Interceptor’s list of launch methods. Prior to enabling
an application in Interceptor, you must create a launch method using
the DM Administration Tools.
Launching
Interceptor
1. Select Start>Program>Open Text>DM Extensions
5.3>Interceptor. If you are not logged on to DM, the Logon
dialog box appears.
Note: If you are logged on to DM Extensions, the Interceptor will already be
running. Proceed to step 3.
2. Once you are logged on to DM, the Interceptor program
icon is displayed along the bottom right corner of the
desktop, in the system tray.
3. Double-click the Interceptor icon in the system tray. The DM
Interceptor dialog box appears.
It contains a list of launch methods that are stored in
Application Maintenance. The launch methods for the
library you are logged on to are displayed by default.You can
switch to a remote library by clicking the down arrow of the
Library combo box.
Note: Only applications that use Full Integration are listed.
Configuring New Applications for Interceptor
To configure a new application in Interceptor:
1. Launch Interceptor, using the instructions in “Launching
Interceptor” on page 280. The DM Interceptor window
appears, displaying all applications that are set to Full
Integration. The application you are configuring will not
appear in the list until you complete the subsequent steps
and restart Interceptor.
2. Click the Application Settings tab. This window will be empty
if you have never configured a new application in
Interceptor. If you have previously integrated new
applications, this list appears in the active window. Click Add
to add a new application.
280
CHAPTER 11
3. With the Common Properties tab selected, complete the
following fields:
•
Application ID: Specify the Application ID you chose when
creating this application’s launch method in Application
Maintenance. If these Application IDs do not match,
DM may have trouble reconciling the application with
its launch method.
•
Description: Specify the application name in this field.
•
Keyword: Specify the Application ID you chose when
creating this application’s launch method. DM attempts
to match the value(s) in the Keyword field to words in
the Launch Methods.
4. Click the Window Properties tab. This tab has two Autodetect
check boxes that are selected by default. We highly
recommend leaving these boxes selected. If you clear these
boxes, you will have to enter all application settings
manually. If you leave them checked, Interceptor attempts to
automatically detect all settings.
5. Click the Application Dialogs tab to display the Dialogs
window. This window will be empty until you add
commands to be integrated with Interceptor.
6. Click Add to display the Dialog window. Fill out the fields as
described.
Dialog Type: Select the dialog type that most closely matches
the nature of the dialog box you are integrating.
•
Open Select this type if you want the Search Results
dialog box presented and the selected document opened.
•
Save As Select this type if you want the Document Profile
form displayed so the user can profile and save the open
document. When this type is selected, the original
document is replaced by the new one.
•
Import Select this type if you want the Search Results
dialog box presented and the selected document opened
into the current document. Some applications may not
support Import and Export.
CONFIGURING NEW APPLICATIONS FOR INTERCEPTOR
281
•
Export Select this type if you want the Document Profile
form displayed so the user can profile and save the
exported document. Some applications may not support
Import and Export. When this type is selected, the
original document remains open. This is useful for
Microsoft Outlook and for graphics programs where you
want to use the “Save Copy As” command.
Dialog Caption: Type the caption title of the dialog box.
Not full caption: Select this check box if you want to use the
same settings for several dialog boxes with equal
functionality and similar headings. In the Dialog Caption
field, type the common part of the headings and select Not
full caption.
Autodetect: This check box is selected by default, and it is
strongly recommended that you leave it selected.
7. Click OK to save your settings. The dialog box you
configured appears in the Dialogs window. You can repeat
step 6 to configure other commands in this application.
8. When you have finished integrating commands, click OK
and close the Application Settings dialog box.
9. Your new application should appear in the Application
Settings list.
10. Enable the application in Interceptor.
Enabling
Applications
Within Interceptor
After creating a launch methods in Application Maintenance and in
Interceptor, complete the following steps to enable the integration.
1. Launch DM Interceptor, as described in “Launching
Interceptor” on page 280.
2. From the Launch Methods tab of the DM Interceptor window,
highlight the launch method for the application that you
want to integrate and click Enable.
282
CHAPTER 11
•
The Application ID and Description fields are filled in by
default.
•
Click the Browse button to ensure that your program
path is correct. The Open dialog box appears. If you do
not have the full path to the application in your system
path, select the Full Path option button before you select
the executable (*.EXE) file.
If this information is in your system path, you can accept the
default of Only File Name.
3. Click Open.
4. In the Launch Method Settings dialog box, click the down
arrow of the Use settings for drop-down list and select the
correct application from the list.
5. Click OK to enable Interceptor to monitor the application’s
launch method. A green dot is then displayed next to the
application, indicating that the application is now set to be
monitored by Interceptor.
If the Program Path on the users’ individual workstations is
different from the Location defined in Application
Maintenance, you need to point Interceptor to the
application’s executable. See “Editing the Interceptor
Launch Method Settings” on page 283.
6. Click Close to exit Interceptor.
Once you have enabled each application that you want integrated, you
can create a registry file that can be run on users’ workstations to
duplicate the integration information that you have created on your
workstation. See “Exporting Interceptor Settings” on page 285.
Disabling
Integration with
Interceptor
If you want to disable integration for an application that you have
integrated with Interceptor, complete the following steps.
1. Launch DM Interceptor as described in “Launching
Interceptor” on page 280.
2. Select the application that you want to disable from the
Launch Methods tab of the DM Interceptor dialog box.
3. Click Disable. The green dot to the left of the application
description will change to a red dot, indicating that the
application launch method will no longer be monitored by
Interceptor.
Note: A yellow dot to the left of an application description means a setting
(launch method) exists in the registry but is missing or incorrect in the
database.
Editing the
Interceptor Launch
Method Settings
Interceptor allows you to edit the path to an application that
Interceptor will monitor. When you edit the launch method settings
from Interceptor, your edits do not apply to Application Maintenance
CONFIGURING NEW APPLICATIONS FOR INTERCEPTOR
283
in the DM Administration Tools. You are only editing the path that
Interceptor will monitor. This allows more flexibility in the location of
your users’ integrated applications.
Reminder: You need launch methods configured in both Application
Maintenance and Interceptor.
For example, suppose you selected Microsoft Excel to be monitored by
Interceptor and the Location defined in the Application Launch
Methods is:
…\Program Files\Microsoft\Office\Excel.EXE
If you have users who have Excel installed on their D:\ drive, you would
have multiple launch methods set up. In Interceptor, you only need to
enable one of those launch methods. Specify only the file name of the
executable in the Program Path field and select the Only File Name option
on the Open dialog box.
This allows Interceptor to monitor the application independent from
where it is launched, as long as the executable is in the user's search
path.
To edit the launch method that Interceptor will monitor:
1. From the Interceptor dialog box, select the launch method
that you want to edit and click Edit from the Launch Methods
tab. The Launch Method Settings dialog box is displayed.
2. Fill out the fields as described below:
Program Path: Specify the path to the application that you
want Interceptor to monitor. The path can be a whole or
partial path or simply the executable file name. If you have a
company whose individual workstations have different
configurations, use the executable file name. Click Browse to
ensure that your program path is correct. The Open dialog
box appears. If you do not have the full path to the
application in your system path, select the Full Path option
button before selecting the executable (*.EXE) file. If this
information is in your system path, you can accept the
default of Only File Name.
Note: Click the Full Path button to save the information you
enter in the Program Path field.
Use Settings for: Select the appropriate launch method from
this drop-down box.
284
CHAPTER 11
Interceptor Settings
The Interceptor Settings tab of the DM Interceptor dialog box contains
three general settings that affect how Interceptor behaves when errors
occur.
Open Document Notification: If this option is selected, users will be
notified when an application format or a version incompatibility
causes an error while opening a document. If this option is
selected, and a conflict occurs, DM will lock the document and
release it only if you have selected Show Confirm on Releasing
Document.
Show Confirm on Releasing Document: If you selected Open Document
Notification, you must also select this option. If this option is
selected, users will be prompted to release the document after the
designated time if an error occurs while opening it.
Wait n seconds before releasing document: The default value is 30
seconds. If you accept the default, DM will try to open the
document for 30 seconds before prompting you to release it. You
can override the default value.
After making these changes, you can export your settings to a registry
file for your users. For more information, refer to “Exporting
Interceptor Settings” on page 285.
Exporting Interceptor Settings
The Export option in DM Interceptor enables you to create a registry
file that you can distribute to users to duplicate the Application
Integration settings you created using Interceptor. This registry file
should be included as a custom component; otherwise, you will need to
distribute the file to individual users. See “Importing a Registry File” on
page 286.
Only the applications that you enabled in Interceptor before creating
the registry file will be enabled and actively integrated in the user’s
Interceptor.
EXPORTING INTERCEPTOR SETTINGS
285
1. Launch DM Interceptor as described in “Launching
Interceptor” on page 280.
2. From the Launch Methods tab of the DM Interceptor dialog
box, select Export.
3. The Export Settings dialog box appears.
4. The default setting on this dialog box is All Settings. We
recommend that you leave this selected and click Export. The
Save As dialog box is displayed. If you select All Settings, DM
assigns a default file name for the registry file of
InterceptorSettings.reg.
Export Settings:
•
All Settings This option exports application settings and
launch method settings for all applications and all
libraries. This is the most common setting when
exporting a registry file. Selecting this option creates a
registry file named InterceptorSettings.reg, by default.
•
Only Application Settings This option exports the settings
that relate to application properties and creates a registry
file named InterceptorAppDB.reg, by default.
•
All Launch Method Settings This option exports only the
launch method settings for your applications and creates
a registry file named LaunchMethodSettings.reg, by default.
•
Launch Method Settings for the Selected Library This option
exports only the enabled launch methods for the
currently selected library and creates a registry file
named LibraryName.reg, by default, where your library
name is inserted.
5. Select a location for the registry file and click Save.
Importing a
Registry File
286
CHAPTER 11
Inform your users of the location of the registry file to be imported.
Instruct your users to double-click the registry file(s). The following
dialog box appears, confirming that the registry settings were installed
on their workstation.
Restricting Access to Interceptor Settings and Native
Dialog Boxes
By design, DM is set up to allow users to open and save files both within
and outside the document management system. Users can also disable
Interceptor integration on an application-by-application basis using
the Interceptor Setting menu or by using the Interceptor shortcut
menu.
If you, as the DM administrator, do not want to allow the users and/or
certain groups in your organization to save documents outside of DM,
enable (set to Yes) the Disable Native Open/Save option in the DM
Administration Tool>System Parameters>Defaults or DM
Administration Tool>Users and Groups>Groups>Features.
Enabling this option will result in the following:
•
The Disable Native Save check box located in the Windows
Explorer DM Options dialog box will be unavailable for
modification.
•
The Settings option in Interceptor will be unavailable.
Note: Disabling Native Save and Open dialog boxes and access to Interceptor
work hand in hand. You cannot disable one without disabling the other.
RESTRICTING ACCESS TO INTERCEPTOR SETTINGS AND NATIVE DIALOG BOXES
287
DM Macros for Microsoft Word and Corel WordPerfect
When you install DM application integration for Microsoft Word and
Corel WordPerfect, two sets of macros are included. Both macros allow
the user to add DM information to the footer of a document.When the
macro is installed in Microsoft Word, additional features are added,
including the ability to use DM documents for mail merge.
Instructions for using the features offered in these macros are found in
DM Help.
You can customize these macros for your organization and include
them as a custom component.
The WordPerfect
Footer Macro
The WordPerfect Footer macro is added to the WordPerfect document
template automatically when you install WordPerfect application
integration. The macro will be accessible to your users through the
Tools>Macro menu. When applied to a document, the footer will show
the Document Name, Document number, and Author ID.
If you want to include additional information in the footer, open the
macro file in WordPerfect and scroll down to the second page of the
macro. The section shown below will be found on page two.
// Please, uncomment lines to insert additional information into
the footer
//AuthorName := GetProfileInfo(Profile; "AUTHOR_FULL_NAME")
//TypistID := GetProfileInfo(Profile; "TYPIST_ID")
//DocTypeID := GetProfileInfo(Profile; "TYPE_ID")
//DocTypeDsc := GetProfileInfo(Profile; "DOCTYPE_FULLTEXT")
//CreationDate := GetProfileInfo(Profile; "CREATION_DATE")
//LastEditDate := GetProfileInfo(Profile; "LASTEDITDATE")
//Abstract := GetProfileInfo(Profile; "ABSTRACT")
//Description := GetProfileInfo(Profile; "DESCRIPTION")
Remove the comment marks (//) from those items you want to have
shown in the footer, and save the file. Proceed with step 1, below.
1. Click File>New From Folder.
2. Choose a category from the first list box, then choose a
template from the second list box.
3. Click Options>Edit WP Template.
288
CHAPTER 11
4. On the Template toolbar, click the Copy/Remove Object
button.
5. If the Template toolbar is not displayed, click View>Toolbars,
then enable the Template check box.
6. Choose the template that contains the macro from the
Template To Copy From list box.
7. Choose Macros On Disk from the Object Type list box.
8. In the Macros On Disk section, click the Browse button.
9. Choose the drive where the macro is stored from the Look
In list box. The default location for the file is …\Program
Files\ Open Text\DM Extensions\WPFooter.wcm.
10. Double-click the folder in which the macro is stored.
11. Click Select.
12. Click one of the following buttons:
•
Copy Copies only selected items in the Source list box
•
Copy All Copies all items in the Source list box
13. Click Close.
Distribute the new document template to your WordPerfect users. You
can do this by including this macro as a custom component.
DM MACROS FOR MICROSOFT WORD AND COREL WORDPERFECT
289
Mail Client Requirements
The e-mail clients supported for DM integration are:
•
Microsoft Outlook
•
GroupWise
•
Lotus Notes
Consult the release notes for supported versions.
You can use the DM Client Deployment Utility to further customize
DM E-mail Integration. See “E-mail Integration Node” on page 311. To
use the Client Deployment Utility you must be a Supervisors Group
member and have local administrator rights on your computer.
Important:
For all versions of Microsoft Outlook, Internet Mail mode should not be installed
as it interferes with the installation of DM Extension for Microsoft Outlook.
E-mail Integration
Options
290
CHAPTER 11
If you installed DM E-mail Integration, the following features are
available.
•
GroupWise Mail messages and attachments are stored in DM
as simple, separate documents.
•
Lotus Notes Mail messages and attachments are stored in
DM as simple, separate documents.
•
MS Outlook The most complete integration method, DM Email Integration for Microsoft Outlook allows you to search
for related documents, such as attachments and threads.
This integration method supports the storing of message
parameters:
Parameter Name
Description
MAIL_ID
This is the message’s unique identifier
and is used to detect a message saved
to the library.
PARENTMAIL_ID
This is the unique identifier of a parent
mail message in an e-mail thread.
THREAD_NUM
This identifies a message’s position in a
saved e-mail thread.
Parameter Name
Description
ATTACH_NUM
This identifies the position of an
attachment in an e-mail message.
MSG_ITEM
This column indicates that a message
was saved with enhanced integration.
DELIVER_REC
This column stores the delivery
notification ID.
EMAIL_SENT
Date and time when the message was
sent.
EMAIL_RECEIVED
Date and time when the message was
received.
PD_ORIGINATOR
This is the e-mail sender.
PD_ADDRESSEE
This is the main recipient of the e-mail.
PD_EMAIL_CC
Persons carbon copied on the e-mail.
PD_EMAIL_BCC
Persons blind copied on the e-mail.
PD_EMAIL_DATE
Date/time when it was received
These parameters are added to the database automatically. If you
want to view these message parameters on a profile form, you
must add them to the desired profile form using DM Designer.
Tip: You can add these parameters to search forms to give your users even
more options when locating documents.
If you select the Automated E-mail Management profile forms
(DEF_MPROF, LAW_MPROF or the RM e-mail profile form
PD_MPROF), the parameters are already added to the profile form.
You can use DM Designer to remove or rearrange the fields shown on
these forms. The fields available are as follows:
Field Name
DEF_MPROF
LAW_MPROF
PD_MPROF
PD_ORIGINATOR
X
X
X
PD_EMAIL_CC
X
X
X
EMAIL_RECEIVED
X
X
PD_ADDRESSEE
X
X
X
PD_EMAIL_BCC
X
X
X
EMAIL_SENT
X
X
MAIL CLIENT REQUIREMENTS
291
Modifying the
Profile Forms
To add columns such as MAIL_ID, PARENTMAIL_ID, and so forth, to
your Profile form(s) and GROUP_DEF forms.
It is recommended that you hide these fields once they have been added
to the form:
•
MAIL_ID
•
PARENTMAIL_ID
•
THREAD_NUM
•
ATTACH_NUM
•
MSG_ITEM
•
DELIVER_REC
1. Open DM Designer by going to Start>Programs>Open
Text DM Web Server>Server Admin Tools>DM Designer.
2. Log on with the DOCSADM username and password.
3. In DM Designer, select File>Open Profile Form or click the
Profiles button located on the toolbar. The Available Forms
dialog box appears.
4. Select your Profile Form or Group Profile Defaults form
from the Available Forms dialog box and click OK. The form
will open in edit mode.
4.1 If you will be creating a separate e-mail profile form,
select File>Save As.
4.2 Enter the new form name and description for the file
and click OK.
5. From the SQL Columns window, select each of the newly
added columns and drag and drop them into the Profile
form design, placing the fields where you want them on the
form.
6. After all the new columns have been added and placed on
the forms, select File>Close. When asked if you want to save
your changes, select Yes.
7. Close DM Designer.
Note: After the columns have been added and saved, it is necessary to refresh
caches on the DM Server Manager program.
292
CHAPTER 11
MAIL CLIENT REQUIREMENTS
293
294
CHAPTER 11
Chapter
12
The DM Client Deployment
Utility
In This Chapter
The DM Client Deployment Utility (CDU) allows you to configure
various DM Extensions options and distribute these configuration
settings to end-user machines by creating a registry file. The registry file
can be given to the users who then merge these settings into their local
system registries.
The Client Deployment Utility includes configuration of the DM User
Interface, custom forms, add-ons, plug-ins, e-mail integration, and
much more.
295
The Client Deployment Utility works from within the Microsoft
Management Console (MMC) utility.
Note: To use the Client Deployment Utility, you must be a member of the
DOCS_Supervisors group in Library Maintenance>Groups.
ForWindowsoperating systems, the account used to log on to the workstation
must be a member of the local Administrators group. Even if the account is a
Domain Administrator, it must be a part of the Administrators group.
Starting the Client Deployment Utility
To use the CDU, you must be a member of the DOCS_SUPERVISORS
group.
To start the Client Deployment Utility:
1. Click Start>Programs>Open Text>DM Extensions>Client
Deployment Utility. The Client Deployment Utility opens in
the Microsoft Management Console. Each node contains
configuration options applicable to a DM feature. For
example, the E-mail Integration node contains
configuration options specific to e-mail integration.
1. Expand the eDOCS DM Client Deployment Utility node.
2. When you expand all of the nodes, the navigation pane
appears as the following:
eDOCS DM Client Deployment Utility
Plug-ins
Document Management Plug-in
Forms
Event Handlers
Application Integration
Integration Schemes
E-mail Integration
Logging Options
User Interface
Add-ons
296
CHAPTER 12
Tabs
Tree Nodes
The CDU provides configuration options, including the DM user
interface, custom forms, add-ons, plug-ins, logging, and e-mail
integration.
NOTE: The Application Integration node, which is the parent node of Integration
Schemes, does not contain a user interface. The User Interface node is the parent
node of the Add-ons, Tabs, and Tree Nodes nodes, and also does not contain a user
interface.
The following describes each of the CDU nodes and the configuration
options within each.
DM Client Deployment Utility Node
The DM Client Deployment Utility is the top node in the navigation pane.
When you click this node, an Export button appears in the right pane.
Once you set all of the CDU configurations, you can save and export
those settings to a registry file.
Exporting the
Registry File
To save CDU configuration settings to a registry file:
1. Click the DM Client Deployment Utility node.
2. In the right pane, click the Export button.
3. The Export to Registry File dialog box appears. Type a name
in the File name field and then click Save.
Importing a
Registry File
If you are providing a new registry file to your users, inform your users
of the location of the registry file to be imported.
Instruct your users to double-click the *.reg registry file(s). A dialog
box appears, confirming that the registry settings were installed on
their workstation. Click OK.
DM CLIENT DEPLOYMENT UTILITY NODE
297
Configuration Settings
The following configuration settings can be made using the Client
Deployment Utility:
Plug-ins Node
•
Plug-ins Node
•
Document Management Plug-in Node
•
Forms Node
•
Event Handlers Node
•
Integration Schemes Node
•
E-mail Integration Node
•
Logging Options Node
•
Add-ons Node
•
Tabs Node
•
Tree Nodes Configuration
The Plug-ins node lists all of the plug-ins that are available to the user.
A plug-in is a DM Extensions module that provides additional
functionality to DM. For example, the Attaché plug-in allows users to
work with DM documents while disconnected from the network.
If you have more than one plug-in installed, you can change the load
order of the plug-in; select the plug-in and use the up and down arrows
to move its position within the list.
To configure plug-ins:
1. Expand the eDOCS DM Client Deployment Utility node.
2. Click Plug-ins.
3. The Plug-ins Configuration pane appears.
4. Select a plug-in. You can view its Location at the bottom of
the pane, or you can change the order in which the plug-ins
load.
5. To change the order, select the plug-in names and use the up
and down arrows.
Document
Management
Plug-in Node
298
CHAPTER 12
The Document Management Plug-in Configuration pane contains three tabs:
•
General Tab
•
Performance Tab
•
Logon Tab
Use these tabs to set general DM plug-in options.
General Tab
The General tab allows you to configure the location of the Download folder,
Quick Searches and Folder options, Recently Edited Documents options, in
addition to version and save options.
In the Download section, click the lookup (...) button to specify the
Download folder in which temporary download files will be created. This is
the folder that DM uses to manage in-process copies of documents. You
can specify the exact path or use an environment variable, such as %TEMP%.
In the Quick searches and Folders section, the following options are available:
•
Use the same columns for all Folders check box.
•
Use the same columns for all quick searches check box.
NOTE: You can change the columns that appear in a folder or search results
list by right-clicking the column header and selecting Edit Columns. If either of
the above check boxes are selected, then any change will affect all such folder
or search views. Otherwise, any change affects only the current folder or
search view.
•
Quick search list: 500 documents—Click the up or down arrows
in the number field or manually type a number to define the
maximum number of documents in a Quick Search list. The
default is 500.
In the Recently Edited Documents (RED) section, the following options are
available:
•
Use DM Server RED check box—If you do not want your users
to use the default Recently Edited Documents list, clear this
check box, which is selected by default. When you clear this
check box, the Show documents in RED not older than: X days
option becomes available. You can then specify the
maximum number of documents to show and the
maximum number of days since the last activity on
documents to be shown.
•
Specify maximum number of documents: 30 documents—Enter
the maximum number of documents you want to appear in
the RED list. The default is 30.
CONFIGURATION SETTINGS
299
NOTE: Changing the RED setting from the default will control the number of
documents displayed in the RED list, but the amount of RED data sent to the
client is governed by the default (that is, the Server Manager) value, regardless
of the setting in the Client Deployment Utility. So, to prevent unused data being
sent to the user's workstation, we recommend the Server Manager setting
match the setting in the Client Deployment Utility.
•
Show documents in RED not older than: 90 days—Enter the maximum
number of days since the last activity on documents. The default is 90.
This option is available only when you clear the Use DM Server RED
check box.
In the bottom section, the following options are available:
•
Allow Save As Subversion From Any Version or Subversion check
box—Select this check box to allow users to save
subversions from any version or subversion of a document.
For example, a document contains five versions (1-5), and
version 5 contains a subversion (5a). If this option is
enabled, users can save a new version or subversion of any of
these document versions, whether version 1, 2, 3, 4 or 5, or
even the existing subversion 5a. In this example, saving a
new version would result in version 6; saving a new
subversion of the existing 5a would result in 5b.
•
Apply To All (default) check box—Select this check box to
make the Apply to All button appear on the save user
interface when profiling multiple documents at once.
Performance Tab
The Performance tab allows you to configure cache, logon, and save
options. These settings help optimize data caching in DM. You can
configure the following:
•
Cache Settings
•
Cache on Logon Dialog Box
•
Clean Shadow Check Box
•
Cache Lookups Dialog Box
•
Chunk Factor Settings
•
Quick Save Settings
Cache Settings
In the Cache section, the following options are available:
300
CHAPTER 12
•
Cache folder—This is the location where cache data will be
stored on the user’s workstation. Click the lookup (...)
button to browse for a file location.
•
Cache users and groups check box—This caches the list used
in the Access Control list.
•
Cache lookups—This caches the lookup information (such as
Client, Matter, or Author) locally, which results in quicker
lookup performance because contact with the server is not
necessary.
If lookup data is not likely to change frequently, then you
should select this check box; otherwise, if the lookup data
changes frequently, you would want to clear this check box.
In the Cache on logon section, the following option is available:
•
Cache level—You can set the cache level for the following:

No caching on logon

Balanced caching

Maximum caching

Custom caching
With the exception of the No caching on logon setting, the
Cache on logon settings are stored in the Cache on logon
dialog box.
CONFIGURATION SETTINGS
301
Cache on Logon Dialog Box
To access the Cache on logon dialog box:

Click Settings to view the Cache on logon dialog box.
The Cache on logon dialog box allows you to modify pre-cache
parameters. For each parameter, the following columns appear:
•
Primary—Select the Primary check box to apply the
parameter to the primary library.
•
Searchable—Select the Searchable check box to apply the
parameter to remote libraries that are searched by default.
•
Others—Select the Others check box to apply the parameter
to remote libraries that are not set to be searched by default.
The following Cache Parameters are available:
302
CHAPTER 12
•
Applications
•
Compatible applications
•
Document types
•
Form definitions
•
Forms
•
Launch methods
•
Lookup definitions
•
Lookups
•
Parameters from DOCSPARMS
•
RED document numbers
•
RED document properties
•
Users and groups
•
User’s primary group parameters
•
User’s systems ID and primary group
•
Terminology
Clean Shadow Check Box
•
Select the Clean shadow check box if you want DM to clean
shadowed documents according to the Cleanup Options
section of the Groups>Group name>Attaché tab in Library
Maintenance.
These settings are as follows:
•
Force Cleanup of Shadowed Documents — This field is disabled
if Shadow Documents to Local Library is set to No. Select this
check box to have DM automatically purge shadowed
documents from the local drive. Documents that are older
than the Minimum Age For Delete (specified below) are
deleted each time you start DM.
•
Minimum Age For Delete (Days) — This field is disabled if
Shadow Documents to Local Library is set to No. Enter the
minimum number of days you want documents to remain
on the local drive without being edited before being deleted.
•
Minimum Local Disk Space (MB) — Enter the minimum
allowed disk space on the local drive before shadowed
documents are purged. If Force Cleanup of Shadowed
Documents is enabled, the purge will run automatically. If
disabled, the users will be notified with a message that they
should purge shadowed documents.
CONFIGURATION SETTINGS
303
If you leave the Clean shadow check box blank, DM will not delete
shadowed documents during startup and will only delete shadowed
documents when the user selects Options>Delete Shadowed Documents in
the DM Extension for Windows Explorer.
The chart shown below gives examples of how the Shadow Document
settings work to control document shadowing.
Remote
Library>
Shadow this
library
System
Parameters>
Attaché>
Shadow local
files
Groups>
Attaché>
Shadow local
files
Is Shadowing On or Off?
Yes
No
Default
Off for everyone
Yes
No
Yes
On for everyone
Yes
No
No
Off for everyone
Yes
Yes
Default
On for everyone
Yes
Yes
Yes
On for everyone
Yes
Yes
No
Off for this group
On for everyone else
No
No
Default
Off for everyone
No
No
Yes
On for this group
Off for everyone else
No
No
No
Off for everyone
No
Yes
Default
On for everyone
No
Yes
Yes
On for everyone
No
Yes
No
Off for this group
On for everyone else
After Cache settings have been implemented, users will see a Caching
dialog box upon logging on to DM. The exception to this will be when
No caching on logon setting is being used.
The Caching dialog box shows a progress bar and will show the details
of the caching process if the Details check box is selected.
304
CHAPTER 12
1. To hide the progress bar during the caching process, click
the Hide button.
2. To view Details, click the Details check box. To hide details,
clear the check box.
3. The Details area of the Caching dialog box tracks the history
of the current caching process, listing the cache being
processed, the library and status of that caching process.
If the user does not wish to see the cache progress form the next time
they log on to DM, The setting can be controlled using the Show cache
progress form check box on the General tab of the Defaults form in DM
Extensions.
Cache Lookups Dialog Box
You can change individual lookup settings from the Cache Lookups
dialog box.
To change individual lookup settings:
1. In the Cache on logon dialog box, select the Lookups
parameter.
2. Notice that a lookup (...) button appears next to the Primary
check box; click the lookup button.
3. The Cache Lookups dialog box appears; it will change
depending on which Cache level was selected. The following
options are available under Cache lookups for section:

Applications—This caches lookups for the APPS table.

Authors—This caches lookups for the PEOPLE table.

Document types—This caches lookups for the
DOCUMENTTYPES table.

Keywords—This caches lookups for the KEYWORDS
table.

Library standard specific—This caches lookups for the
CLIENT, MATTER, USER_ORG, and USER_DEPT
tables.

Other—This caches lookups for all other lookups.
Click the check box next to the lookup entry to select or
clear the setting for that lookup.
CONFIGURATION SETTINGS
305
4. The Cache on all forms check box determines whether
lookups are cached on all forms, or only on the
GROUP_DEF form. Select this check box if you want the
lookups to be cached on all forms.
5. Click OK.
Chunk Factor Settings
The Chunk factor section of the Performance tab determines the number of
rows that are sent in a group (or chunk) from the DM Server machine
to the client. This prevents rows from needing to be sent back to the
client one at a time.
Two settings are available:
•
Quick searches—Select a number using the up or down
arrows. The default is 50.
•
Lookups—Select a number using the up or down arrows. The
default is 50.
Logon
The Logon section contains the following options:
•
Online logon wait timeout—This field specifies the number of
seconds that DM Extensions should wait while connecting to the
DM Server machine before switching to Offline mode. The default
value is 7 seconds. The suggested timeout range is from 2-15
seconds.
If you want DM to optimize the wait timeout setting, you should
select the Intelligent timeout check box; the value you specify will
then be updated automatically. Otherwise, the value is static.
•
Intelligent timeout check box—If you select the Intelligent timeout
check box, which is cleared by default, DM measures the time it
takes users to log on to the DM server machine. If this time
measurement is one increment less than the timeout value you set
in the Online logon wait timeout field, then DM records a successful
logon in the registry. Once the number of successful logons
reaches the value specified in the registry (the default is 7), DM
decreases the wait timeout value by 1 and resets the number of
successful logon attempts to 0.
306
CHAPTER 12
Conversely, if DM does not log on to the DM server machine in
the specified wait timeout time, the number of successful logon
attempts stored in the registry is reset to 0 and the Online logon wait
timeout field is increased by 1.
Quick Save Settings
In the Save section, the following option is available:
•
Quick save check box—When this check box is selected, users
do not have to upload DM documents each time they save
their work. Instead, the document is saved locally and
uploaded to the document server only when the document
or application is closed. This check box is cleared by default.
By activating the Quick save feature, you can avoid potential
issues in Microsoft Word:

The DM client stops responding during a Save
operation, which typically happens when a user opens
multiple documents.

The DM client closes all opened documents, even
though the user has not closed them. This happens
when a user has multiple documents open. When a
user is in the process of saving a document, the other
documents are closed by DM.
Logon Tab
The Logon tab allows you to set the following options:
•
Enable Log Off check box—This setting allows the user to disconnect
from DM and use DM Extensions in logged-off mode. In this
mode, Windows Explorer and Microsoft Outlook are
disconnected from DM, but are not considered to be online or
offline. A new Log Off menu entry is added to the File menus in
Windows Explorer and Microsoft Outlook, and to the shortcut
menu of the DM Explorer icon in the system tray.
•
Force Attaché Import for New Documents check box—When you enable
this setting, users can no longer opt out of importing documents
create during an offline DM session. Users must import the
documents or remove them from Attaché.
•
Enables the display of a Pre-Logon dialog each time a user logs into eDOCS
DM check box—When you enable this setting, users will be
CONFIGURATION SETTINGS
307
required to accept the message in order to complete logging on.
Note that this option does not require you to distribute a registry
file.
The following text appears by default when you select this check
box:
“You are required to have a personal authorization from the system
administrator before you use this computer and you are strictly
limited to the use set out in that written authorization.
Unauthorized access to or misuse of this systems is prohibited and
constitutes an offense. Check box to signify agreement to above terms
prior to accessing the system.”
To change this wording, select and delete the text, and then type
the text you want to appear.
Forms Node
Click the Forms node to view the Custom Forms Configuration pane. This
section designates which custom forms DM will display.
NOTE: You must use the DM Extensions API to create or modify custom forms.
Each form is set to use the default DM internal form. Each form is
associated with a CLSID or ProgID. This is the location where you enter a
CLSID or ProgID to associate a form’s context with a custom form
created in code.
A CLSID is a universally unique identifier (UUID) that identifies a type
of Component Object Model (COM) object. Each type of COM object
item has its CLSID in the registry so that it can be loaded and used by
other applications. For example, a spreadsheet can create worksheet
items, chart items, and macrosheet items. Each of these item types has
its own CLSID that uniquely identifies it to the system.
A ProgID, or programmatic identifier, is a registry entry that can be
associated with a CLSID. The format of a ProgID is
<Vendor>.<Component>.<Version>, separated by periods and with
no spaces, as in Word.Document.14. Like the CLSID, the ProgID
identifies a class, but with less precision.
The following options appear under the Forms section:
•
308
CHAPTER 12
AccessForm
•
ChangeDisplayNameForm
•
CompatibleAppsForm
•
GroupCheckinForm
•
GroupCheckoutForm
•
HistoryForm
•
LaunchMethodChooserForm
•
LibrariesForm
•
LookupForm
•
MailForm
•
ProfileForm
•
ProfileFormChooser
•
ProjectChooseForm
•
ProjectForm
•
ProjectMembershipForm
•
PropertiesForm
•
QuickRetrieveForm
•
RelatedItemsForm
•
SaveOptionsForm
•
SearchCriteriaForm
•
SearchFormChooser
•
SearchOptionsForm
•
SelectVersionsForm
•
SelectVersionTypeForm
•
TemplatesForm
•
VersionChooserForm
For example, the TemplateForms listed above, is the context wherein a
form appears when a user selects a template. Which template selection
form appears depends on several factors, including what information is
entered on this page.
On the Custom Forms Configuration pane, you can view the custom form’s
location and/or enter a value in the CLSID or ProgID field.
CONFIGURATION SETTINGS
309
To view the custom form location:
 Select the custom form in the Forms list; the Location appears
in the lower portion of the pane.
To change the CLSID or ProgID:
1. Select the custom form in the Forms list.
2. Enter the CLSID or ProgID of the form in the CLSID or ProgID
field, or click the Modify button. CLSID and ProgID entries
are found in the Windows registry under
HKEY_CLASSES_ROOT
Conversely, you can click the Use internal button to use the
internal form.
For more information, consult the DM Extensions API Toolkit, which
contains the DM Extensions API Programmer’s Guide. There are three
relevant samples in the toolkit: CustomProfileForm,
CustomSearchForm, and CustomSearchFormChooser.
Event Handlers
Node
Click the Event Handlers node to view the Event Handlers Configuration pane.
Event handlers are custom components that extend the DM menu and
provide additional functionality. For example, the PDSearch event
handler provides the E-mail Threads feature in e-mail integration.
You can disable event handlers or change the order in which they load.
To disable an event handler:

Clear the check box next to the Event handler name.
To change the load order of event handlers:

Select an event handler and click the Up or Down arrows to
change the load order.
NOTE: You cannot disable the Attaché event handler.
310
CHAPTER 12
Integration
Schemes Node
Expand the Application Integration node to select the Integration Schemes
node.
When you click Integration Schemes, the Integration Schemes Configuration
pane appears.
You can enable or disable an integration scheme, view the integration
scheme’s .dll file location, or change the load order of integration
schemes.
To disable an integration scheme:

In the Integration schemes section, clear the check box next to
the integration scheme name.
NOTE: Disabling an integration scheme in the Client
Deployment Utility only affects DM integration; it does not
affect the integration scheme for a particular application.
To change the load order of integration schemes:

Select an integration scheme and click the Up or Down
arrows to change the load order.
To view an integration scheme’s .dll file location:

Select the integration scheme and view its Location in the
lower portion of the pane.
E-mail Integration Node
When you click the E-mail Integration node, the E-mail Integration
Configuration pane appears. E-mail Integration can be configured in this
section of the Client Deployment Utility. E-mail integration must be
installed on the same machine as the Client Deployment Utility so that
you can access the E-mail Integration settings.
There are four tabs on the E-mail Integration dialog box:
•
General Tab
•
Header Fields Tab
•
Dialogs Tab
•
Profile on Send Tab
In the top portion of the pane, the following options appear:
E-MAIL INTEGRATION NODE
311
General Tab
•
Library—Click the drop-down list to select a library in which
the e-mail integration configuration applies.
•
Apply to All Libraries—Click this button to apply the e-mail
configuration settings to all libraries.
In the General Save options section, you can set the following options:
•
•
Integration check box—Clear this check box if you do not
want e-mail integration to be available. The Integration
check box, which is selected by default, provides integration
with the following e-mail clients:

GroupWise—Message parameters are not stored. Email messages and attachments are stored in DM as
separate documents.

Microsoft Outlook and Lotus Notes—Message
parameters are stored. For example, MAIL_ID,
ATTACH_NUM, MSG_ITEM, DELIVER_REC,
PARENTMAIL_ID, and THREAD_NUM.
E-mail group—Click the drop-down list to select the e-mail
group name from DM, such as DOCS_SUPERVISORS,
DOCS_USERS, or RECORDS_MANAGERS. This helps to
maintain Security and is optional.
Note: The group you choose will be added to the Current
Trustees list for Document Access if you select the Grant
Access to Email Users Group for the Apply Security combo box of
the Save Email to eDOCS DM dialog box.
•
Profile form—Click the drop-down list to select a profile
form for saving e-mail messages to DM, such as LAWPROF.
This setting is optional.
•
Enable MSG format—Select this option to save e-mail
messages in MSG format for use with Microsoft Outlook.
NOTE: This check box is available only when Microsoft
Outlook is installed.
•
312
CHAPTER 12
Enable RTF Format—Select this option to save e-mail messages
in Rich Text Format (RTF).
•
Prevent Message Modification check box—Select this check
box to ensure that the profiled e-mail message remains
intact as received. This means that original attachments are
kept with the message, even if the attachments are profiled
separately.
Because the simple interface is used in DM 5.x, the Enable both formats
option appears unavailable.
The following three options are used in conjunction with each other.
•
Document type and application for—Click this drop-down list
to select one of the following options:

RTF messages

MSG messages

unknown attachments
To set the document type and application for these options,
you must select each option in turn. For example, select RTF
messages in the Document type and application for drop-down
list, and then select the applicable options in the Document
type and Application drop-down menus.
These entries must be valid in the DOCUMENTTYPES
table. Messages will be saved with the specified Document
Type and Application values.
Header Fields Tab
•
Document type—Click this drop-down menu to select a valid
entry in the DOCUMENTTYPES table. For example,
DEFAULT, FOLDER, RM, or any other valid Document
Type that you create.
•
Application—Click this drop-down menu to select the
application to be associated with RTF messages, MSG
messages, or unknown attachments.
The Header Fields tab allows you to assign e-mail header information to
a particular field on the profile form. For example, you can use the
EMAIL_TO column as a source for the To: field on the profile form, by
selecting the EMAIL_TO column from the To: drop-down list.
This header information must be added to the default profile form
using DM Designer.
You can set the following header fields:
•
From
E-MAIL INTEGRATION NODE
313
•
To
•
CC
•
Bcc
•
Subject
•
Sent Date
•
Rcv Date (received date)
NOTE: Some columns are available only when you use the
MPROF (e-mail) forms, such as DEF_MPROF or
LAW_MPROF. For example, the EMAIL_TO column will
not appear as a selection unless you use this particular form.
To use header fields:
1. In the From field, select the drop-down list and select the
applicable SQL column, such as EMAIL_FROM.
2. Complete the above step for the To, Cc, Bcc, Subject, Sent Date,
and Rcv Date fields.
Dialogs Tab
The Dialogs tab allows you to configure save, attachment, and insert
options for e-mail integration.
In the Save options section, the following check boxes are available:
•
Show User Options Dialog — Select this check box if you want
users to be able to set their own e-mail integration options
within Microsoft Outlook. In Outlook 2010, this dialog box
appears under File>DM Options. In Outlook 2007 and 2003,
this appears under Tools>Options.
•
Save attachments separately—Select this check box if you
want the Save attachments separately check box to be selected
by default on the Save to Hummingbird DM dialog box.
•
Delete original message(s) after save—Select this check box if
you want the Delete original message(s) after save option to
be selected by default on the Save to eDOCS DM dialog box.
•
Skip profiling forms while saving message(s)—Select this check
box if you want to suppress the Save to eDOCS DM dialog
box and Document Profile form when users save e-mail
messages.
NOTE: If there are required fields that require user input, the dialog box and
314
CHAPTER 12
profile form will appear. Users can also enable this feature in the Save to
eDOCS DM dialog box.
The following attachment options are available:
•
•
Attachment document name—Select this drop-down list to
select one of the following values:

Attachment file name—Indicates that the document
name of an attachment will be the attachment’s file
name.

E-mail subject—Indicates that the document name of
an attachment will be the information that appears
in the e-mail message’s Subject field.
Attachment version comments—Select this drop-down list to
select one of the following values:

E-mail subject—Indicates that the version comments
will be the information that appears in the e-mail
message’s Subject field.

Attachment file name—Indicates that the version
domments will be the attachment’s file name.

Custom comments—Allows you to enter your own
comments.
•
Message version comments—Select this drop-down list to
select one of the following values:

E-mail subject—Indicates that the message comments
will be the information that appears in the e-mail
message’s Subject field.

Custom comments—Allows you to enter your own
comments.
In the Insert options section, the Send drop-down list allows you to select
a default value to appear in the Insert Type field of the Insert from
eDOCS DM dialog box. The following options are available:
•
Copy—A copy of the DM document will be inserted as the
attachment.
•
Copy and checkout—A copy of the DM document will be
inserted into the e-mail message, and the document status
will be changed to checked out.
E-MAIL INTEGRATION NODE
315
•
Profile on Send
Tab
Reference—A reference to the DM document will be
inserted into the e-mail message. Note that the recipient
must have access to the DM library in order to access the
document.
The Profile on Send tab allows you to configure whether users are
prompted to profile outgoing e-mail messages.
The following options are available:
•
Profile e-mail message before sending e-mail—Select this
check box if you want users to profile e-mail messages
before sending them.
•
Require profiling sent e-mails—Select this check box if you
want to force users to profile e-mail messages. If you leave
this check box cleared, users can selectively profile or cancel
saving sent e-mail messages to DM.
•
Enable File and Send — Select this check box to enable the
File and Send toolbar button on Microsoft Outlook’s toolbar;
this allows the user to profile an e-mail message prior to
sending.
Logging Options Node
The Logging Options node allows you to enable a variety of logging
options and enter the location of the Log directory.
Log files are used for troubleshooting purposes. Open Text Technical
Support staff will advise you what logging options you should enable.
When you enable a log file, a registry key and value is placed in the
System registry. Most of these registry values are stored in the following
location: HKEY_LOCAL_MACHINE\SOFTWARE\Hummingbird\PowerDOCS
To enable logging:
1. In the Module field, click the drop-down list and select the
module you want to log:
• Core
• Document Management Plug-in
• Attaché Plug-in
316
CHAPTER 12
•
eDOCS DM Desktop
•
Windows Explorer DM Extension
•
Download File Manager
•
ODMA Manager
•
ODMA Document Management System
•
Viewer Add-on
•
Interceptor
•
Interceptor Core
•
Acrobat Plug-in
•
Document Management Plug-in API
•
Attaché Plug-in API
•
eDOCS DM Linking
• Extended Log
• DM Outlook Addin
2. Select the Log check box. The default name of the log file will
appear in the File name field.
3. In the Log directory field, click the lookup (...) button to
specify the log file location. The default location is C:\;
however, you should specify a directory to output generated
logs, such as C:\DMLogs.
See the individual module descriptions below for the complete registry
key and values.
All of the following modules contain the default log file name and the
default log file location.
Acrobat Plug-in
File name: AcrobatPlugin.log
Log directory: C:\AcrobatPlugin.log
This is the log file for the DM Acrobat plug-in PDPlugin.API.
Attaché Plug-in
File Name: UnPlugin.log
Log directory: C:\UnPlugin.log
This log file should be enabled only when an issue involves DM going
offline anytime during a working session.
LOGGING OPTIONS NODE
317
If you enable this log file, you should also enable the Attaché Plug-in
API log file. The Attaché Plug-in and Attaché Plug-in API log files work
in conjunction with each other.
Attaché Plug-in
API
Name: UnPAPI.xml
Log directory: C:\UnPAPI.xml
This log file provides a more in-depth version of the Attaché Plug-in log
file. This XML-based log file provides the actual API calls that are being
made, including the parameters that are being passed. Open Text
Development or Technical Support might use this log in conjunction
with the Attaché Plug-in log file for troubleshooting issues. If you
enable the regular log file (Unplugin.log), you should also enable the
API version (UnPAPI.xml) log file.
When you enable the Attaché Plug-in API module log file, an Overwrite
check box appears next to the File Name field. If you select Overwrite, the
log file’s existing data will be replaced with new data.
Core
Name: DECore.log
Log directory: C:\DECore.log
This log file is generated from the DM executable file (DM.exe) and
shows the loading and unloading of plug-ins, the reference count of the
core objects, and the locking and unlocking of modules. It is useful to
review this log if the DM.exe process stops responding.
DM Outlook Addin
Name: Outlook.log
Log directory: C:\Outlook.log
This is the log file for the DM Outlook add-in.
Document
Management
Plug-in
File Name: FsPlugin.log
Log directory: C:\FsPlugin.log
This log records what actually happens inside the FsPlug-in.
If you enable this log, you should also enable the Document
Management Plug-in API log file. The Document Management Plug-in
and Document Management Plug-in API log files work in conjunction
with each other.
318
CHAPTER 12
Document
Management
Plug-in API
Download File
Manager
File Name: FsPAPI.xml
Log directory: C:\FsPAPI.xml
The Document Management Plug-in API is a non-standard XMLrendition of all FsPlugin API calls. Open Text Development or
Technical Support might use this log in conjunction with the
Document Management Plug-in log file for troubleshooting issues. If
you enable the regular log file (FsPlugin.log), you should also enable
the API version (FsPAPI.xml) log file.
File Name: CacheMgr.log
Log directory: C:\CacheMgr.log
This log tracks all uploads to the server and all downloads from the
server.
Extended Log
File Name: Support.log
Log directory: C:\Support.log
This log tracks user actions in DM Extensions, which is useful for
troubleshooting DM Extensions issues.
You should enable the Extended Log only if you have been instructed to
do so by Open Text Technical Support. The Extended Log option tracks
all locking and unlocking of code sections, and therefore increases the
size of the log file.
To enable the Extended Log logging option:
1. Start the eDOCS DM Client Deployment Utility.
2. Click the plus sign to expand the eDOCS DM Client Deployment
Utility tree.
3. Select Logging Options.
4. In the Module field, select Extended Log.
5. Select the log check box. The log file name field will be filled
automatically.
6. Select the directory to which the file should be saved.
You should enable this option only when directed to do so by technical support staff.
eDOCS DM Desktop
File Name: PwDUI.log
LOGGING OPTIONS NODE
319
Log directory: C:\PwDUI.log
This log is deprecated and will be removed from future versions.
eDOCS DM Linking
File Name: Linking.log
Log directory: C:\Linking.log
This log tracks all activity related to DM linking between documents.
Interceptor
File Name: Interceptor.log
Log directory: C:\Interceptor.log
This is the high-level log for the Interceptor.exe process. It records
operations such as the opening and closing of documents.
Interceptor Core
File Name: InterceptorCore.log
Log directory: C:\InterceptorCore.log
This is the low-level log for the Interceptor.dll file. This log records the
low-level activities that Interceptor sees while monitoring the
document window.
ODMA Document
Management
System
ODMA Manager
File Name: DOCS_DMS.log
Log directory: C:\DOCS_DMS.log
This log records all calls made from the ODMA32.dll file to the
Hummingbird DOCS_DMS.dll file. The DOCS_DMS.dll file is the
entry point into DM for calls made from the ODMA32.dll file. The
information in this log can be helpful in troubleshooting issues with
ODMA-integrated applications.
File Name: ODMA32.log
Log directory: C:\ODMA32.log
This log records all ODMA-call information made from an application
to the ODMA32.dll file. This information can be useful in
troubleshooting issues with ODMA-integrated applications.
Viewer Add-on
File Name: FulViewOCX.log
Log directory: C:\FulViewOCX.log
This log records operations by the DM Viewer, both from the viewer
pane of the DM Extension for Windows Explorer and the standalone
document viewer. In addition to recording the usual viewer operations,
this log also records the document being downloaded and the file being
opened by the viewer.
Windows Explorer
DM Extension
File Name: DOCSShl.log
Log directory: C:\DOCSShl.log
This log is generated from the DM plug-in for Windows Explorer. It
records the main actions taking place inside the plug-in—such as the
creation of windows—and tracking the focus. This log can be useful if
there are behavior problems when using the DM Extension for
Windows Explorer.
User Interface
Add-ons Node
Expand the User Interface node and then click the Add-ons node to access
the Add-ons Configuration pane. From here you can manage the add-ons
that will appear on the DM desktop.
You can rename an add-on, view the location of an add-on, hide or
make visible an add-on, or change the order in which add-ons appear.
The following Add-ons check boxes are available:
•
Profile
•
Preview
•
Viewer
•
Versions
•
Where Used
•
Contents
•
Related
•
Description
By default, all check boxes are selected except for Description.
USER INTERFACE
321
To rename an add-on:
1. Select the add-on, right-click, and then select Rename.
2. Type the text that you want to appear for the name of the
add-on.
3. Press ENTER.
To hide an add-on:

Select the add-on and clear its check box.
To make an add-on visible:

Select the add-on and select its check box.
To change the order in which add-ons appear:
1. Select an add-on.
2. Click the Up or Down arrows to change its order.
To view the location of an add-on:

Select an add-on. The Profile Location appears in the lower
portion of the pane.
NOTE: You must use the DM Application Program Interface (API) Toolkit to
create or modify add-ons.
Tabs Node
You can use the DM Application Program Interface (API) to create or
modify custom tabs. If you have custom tabs, use the Tabs node to
manage the tabs configuration.
When you click Tabs, the Custom Tabs Configuration pane appears. Use this
window to manage the custom tabs that will appear on the DM
desktop.
To rename a tab:
1. Select a tab, right-click, and then select Rename.
2. Type the text that you want to appear for the tab’s name.
3. Press ENTER.
To hide a tab:

Select the tab and clear its check box.
To make a tab visible:

322
CHAPTER 12
Select the tab and select its check box.
NOTE: You must use the DM Application Program Interface (API) Toolkit to create or
modify custom tabs.
Tree Nodes
Configuration
Click Tree Nodes to access the Tree Node Configuration pane appears.
Use this window to set which feature nodes appear in the DM
Extension tree view, including Quick Searches.
The following Add-ons are available:
•
All Folders
• Checked Out Documents
•
Applications
•
Templates
•
Template Documents
•
Deleted Documents
•
Attaché
All check boxes are selected by default.
To remove an item from appearing in the DM Extensions tree:
 Select the item and clear its check box. For example, if you
clear the All Folders check box, the <All Folders> Quick Search
will not appear in the DM tree.
You can hide the <Template Documents>, <Checked-out Documents>, <Deleted
Documents>, and/or <All Folders> Quick Searches from appearing in the DM
tree by clearing the check box(es).
USER INTERFACE
323
Chapter
13
Setup Information for DM
Extension for Lotus Notes
This chapter contains the following information for the DM and Lotus
Notes administrators.
•
Supported Versions
•
Prerequisites for Database Setup
•
Installing DM Extension for Lotus Notes
•
Configuring Launch Methods for Lotus Notes
•
Configuration Options and Settings
•
Setting up Drag-and-Drop Functionality
•
Installing the Root Node Image
•
Setting up the Advanced Interface on Integrated Databases
•
Troubleshooting DM Integration with Lotus Notes
•
Configuration Notes for Indexing Attachments in Lotus
Notes E-mails
325
Supported Versions
See the current version of release notes for supported versions of Lotus
Notes.
Prerequisites for Database Setup
The administrator and end-user must have at least Lotus Notes
Designer access rights to set up any Notes database. You must enable
the Create LotusScript/Java agents option in the Lotus Notes Access
Control List (ACL ).
The administrator must have experience and knowledge with Lotus
Notes administration, including setting up users, assigning user rights
and security, and maintaining the Domino server.
The administrator and end-user must have the following Lotus Notes
rights:
•
Add LotusScript agents.
•
Add design elements, such as images, folders, and outline
entries.
•
Add forms.
Refer to the HLE_readme.txt file for information on configuring Lotus
Notes (also contained in this chapter).
Installing DM Extension for Lotus Notes
DM Extension for Lotus Notes adds the DM tree item to the Lotus
Notes navigation tree. You can use DM functionality from within the
Lotus Notes application.
To install DM Extension for Lotus Notes:
1. Run the eDOCS Suite Installer (eDOCSSuiteInstall.exe).
2. Select eDOCS DM Extensions and click Next.
3. Select the Create a log file option if desired and then click
Install.
326
CHAPTER 13
4. Continue installing DM Extensions; when the Custom
Setup dialog box appears, select Lotus DM Extension and then
click Next.
5. In the Connection Information dialog box, enter the name
of the DM Server. Click Next.
6. Review the installation settings in the Start Copying Files
dialog box and then click Next.
If you are installing on Windows XP SP2, you might be
prompted with a Windows Security Alert that states the
Windows firewall has blocked the PAPIHost WWW Server
application. Select Unblock.
Configuring Launch Methods for Lotus Notes
The following Lotus Notes Application IDs are used:
LOTUS NOTES DOC (Lotus Notes Documents) — The LOTUS NOTES DOC
Application ID is used for profiling Lotus Notes documents (*.lnd files)
to DM. When you open a profiled document, it opens in Lotus Notes.
LOTUS NOTES EMAIL (Lotus Notes E-mails) — The LOTUS NOTES EMAIL
Application ID is used for profiling Lotus Notes e-mail messages (*.lne
files) to DM. When you open a profiled e-mail message, it opens in
Lotus Notes.
LOTUS NOTES FORM (Lotus Notes Forms) — Each Lotus Notes document or e-
mail message is associated with a Lotus Notes form, which determines
how the document or message appears. The LOTUS NOTES FORM
Application ID is used for profiling the form (*.dxl file) associated with
the document or e-mail message. This process is automatic; the user is
not prompted to profile the form separately.
When you save a document, DM determines if that version of the form
exists in DM. If not, the form is saved to DM as a new document. Once
saved, DM creates a technical relation on the document to this new
form. If the form version already exists in DM, only the document is
saved, and a relation to the existing form in DM is added to the
document.
You must complete the setup for the launch methods for these Lotus
Notes Application IDs in either DM Webtop or Library Maintenance.
CONFIGURING LAUNCH METHODS FOR LOTUS NOTES
327
Using DM Webtop
to Configure Lotus
Notes Launch
Methods
Following are instructions on using DM Webtop to configure the Lotus
Notes launch methods.
To set up launch methods for Lotus Notes documents and e-mail
messages from DM Webtop:
1. In DM Webtop, click DM Admin>Validation Tables. The
Applications tab opens automatically.
2. Click LOTUS NOTES DOC.
3. Click Launch Methods.
4. Click the Edit icon.
5. In the Location field, enter the complete path to the
HLVIEW.EXE file.
6. Click Save.
7. In the Navigation trail, click Applications to return to the
main Applications page.
8. Click LOTUS NOTES EMAIL.
9. Click Launch Methods.
10. Click the Edit icon.
11. In the Location field, enter the complete path to the
HLVIEW.EXE file.
12. Click Save.
Using Library
Maintenance to
Configure Lotus
Notes Launch
Methods
Following are instructions on using Library Maintenance to configure
the Lotus Notes launch methods.
To set up launch methods for Lotus Notes documents and e-mail
messages in Library Maintenance:
1. Start Library Maintenance. The Applications window
appears.
2. Double-click LOTUS NOTES DOC.
3. Click Launch Methods.
4. Click Details.
5. In the Location field, enter the complete path to the
HLVIEW.EXE file.
6. Click OK.
7. Click Close.
328
CHAPTER 13
8. Click OK.
9. Double-click LOTUS NOTES EMAIL.
10. Click Launch Methods.
11. Click Details.
12. In the Location field, enter the complete path to the
HLVIEW.EXE file.
13. Click OK.
14. Click Close.
15. Click OK.
Associating Profile
Forms with Lotus
Notes Application
IDs
You must now configure your DM groups to use the appropriate Lotus
Notes forms associated with the Lotus Notes Applications IDs. You can
do this in Library Maintenance or in DM Webtop.
To associate the profile forms in Library Maintenance:
1. Start Library Maintenance.
2. Click Groups.
3. Double-click a Group ID. For example, double-click
DOCS_SUPERVISORS.
4. On the General tab of the Group Maintenance dialog box,
click Forms. The Form Selection dialog box appears.
5. In the left pane, double-click Profile Entry. The tree expands.
6. Scroll down the list and select LOTUS NOTES DOC.
7. In the right pane, select the DEF_LNDPROF Lotus Notes
Document profile check box.
8. In the left pane, select LOTUS NOTES EMAIL.
9. In the right pane, select the DEF_LNEPROF Lotus Notes E-mail
profile check box.
10. In the left pane, select LOTUS NOTES FORM.
11. In the right pane, select DEF_LNFPROF Lotus Notes Form profile
check box.
12. Click Close.
13. Click OK.
14. Repeat these steps for each DM group.
CONFIGURING LAUNCH METHODS FOR LOTUS NOTES
329
If you do not have access to the Library Maintenance tool, you can use
DM Webtop to associate the profile forms.
To associate the profile forms in DM Webtop:
1. In DM Webtop, click the DM Admin tab.
2. Click Users and Groups.
3. Click Groups.
4. Click the name of a Group ID. For example, click
DOCS_SUPERVISORS.
5. Click Forms.
6. Click Applications.
7. In the Applications drop-down list, select LOTUS NOTES DOC.
8. Select the DEF_LNDPROF Lotus Notes Document profile check
box.
9. Click Save.
10. In the Applications drop-down list, select LOTUS NOTES EMAIL.
11. Select the DEF_LNEPROF Lotus Notes E-mail profile check box.
12. Click Save.
13. In the Applications drop-down list, select LOTUS NOTES FORM.
14. Select the DEF_LNFPROF Lotus Notes Form profile check box.
15. Click Save.
16. Repeat these steps for each DM group.
Configuration Options and Settings
The configuration settings for the Lotus Notes client are provided
through profile settings, which are set and maintained by the Domino
administrator, using standard Domino tools. These settings are
replicated from the Domino server to all Lotus Notes clients.
The administrator has control over the settings in the Lotus Notes
client, and may choose to lock any (or all) settings, which makes those
locked to the end user. Any unlocked settings can be changed by the
user.
330
CHAPTER 13
Configuring the
HLE_Template.ntf
File
The HLE_Template.ntf file is a template profile document that the
Domino Server administrator uses to initialize and maintain client
settings, which are then replicated to the user client machines.
You must install the HLE_Template.ntf file on the Domino Server’s
data directory.
To install the HLE_Template.ntf file:
1. Locate the HLE_Template.ntf file in ...\Tools\DM
Extensions\Domino Server.
2. Install the file on the Domino Server’s Data directory. The
default location is C:\Program Files\Lotus\Domino\Data on
Lotus 7.x or C:\[Program Files]\IBM\Lotus\Domino\data
on Lotus 8.5.x. The HLE_Template.ntf'is used by the
eDOCS Lotus Notes Extension system database and does
not affect any database or template at clients location.
You set various preferences values by modifying the
SetAdministrativeSettings agent in the HLE_Template.ntf file on the
Domino server. These settings automatically replicate to the client
machines.
Administrative
Settings
The following Administrative settings are available in the
SetAdministrativeSettings agent.
NOTE: All of the settings have a corresponding “<function name>_Lock” setting. If
set to 1 (Locked), then the user cannot change the setting. ( 0=Unlocked)
DataSource
The data source to be used.
0 = DM 5.2 (default)
IntegrationScope
This setting determines whether Full Integration or Small Footprint is
used.
0 = Full Integration (default)
1 = Small Footprint
LNEProcessingTab
Determines which processing options are shown to the user on the Lotus
Notes E-mail tab.
CONFIGURATION OPTIONS AND SETTINGS
331
0 = Show Advanced (default)
1 = Show Simple
2 = Hide
LNDProcessingTab
Determines which processing options are shown to the user on the Lotus
Notes Document tab.
0 = Show Advanced (default)
1 = Show Simple
2 = Hide
MaxLotusTreeNodes
Specifies the maximum number of Lotus tree nodes that Lotus Notes
will allow. IBM determines what the default value should be for each
version of Lotus Notes. This value should be set once and not be
changed.
20,000 (default)
MaxRecommendedLotusTreeNodes
Set the maximum number of usable Lotus tree nodes. This value must
be equal to, or less than, the value specified in MaxLotusTreeNodes. This
value should be set at a level where the Lotus Notes client remains
responsive. Having too many tree nodes might cause Lotus Notes to
run slowly. The default value should work in most instances.
5,000 (default)
MenuBackgroundColor
Specify the pop-up menu background color for the Advanced Interface.
Light Cyan (default)
MenuTextColor
Specify the pop-up menu text color for the Advanced Interface.
Windows Menu Text color (default)
MenuHighlightColor
332
CHAPTER 13
Specify the pop-up menu text highlight color for the Advanced
Interface.
Windows Selected Items color (default)
UseAdvancedInterface
Determines whether the Advanced Interface is used.
0 = No
1 = Yes (default)
Cache Settings
The following Cache settings are available in the SetAdministrativeSettings
agent.
NOTE: All of the settings have a corresponding “<function name>_Lock” setting. If
set to 1 (Locked), then the user cannot change the setting. ( 0=Unlocked)
TreeExpiration
Determines the cache expiration time (in minutes) for the tree.
960 (default)
FolderContents
Determines if the folder contents are cached.
0 = No
1 = Yes (default)
FolderContentsExpiration
Determines the cache expiration time (in minutes) for the folder
contents.
60 (default)
SearchResults
Determines if search results can be cached.
0 = No
1 = Yes (default)
SearchResultsExpiration
Determines the cache expiration time (in minutes) for search results.
CONFIGURATION OPTIONS AND SETTINGS
333
10 (default)
Data Source
Related LNE E-mail
File Settings
The following data-source-related e-mail LNE file settings are available
in the SetAdministrativeSettings agent.
NOTE: All of the settings have a corresponding “<function name>_Lock” setting. If
set to 1 (Locked), then the user cannot change the setting. ( 0=Unlocked)
LNEImportedDocumentOption
Determines how to process the Lotus Notes document being uploaded.
0 = Keep Intact
1 = Replace Attachments with DRF (default)
2 = Remove Attachments
3 = Do Not Profile Lotus Notes Document
LNEImportedDocument_AE_Option
Determines how to process the Lotus Notes document being uploaded
if it already exists.
0 = Skip Profiling
1 = Only Save Attachments
2 = Save As New Document (default)
3 = Save As New Version
LNEImportedDocumentAttachmentOption
Determines how to process the attachments of the Lotus Notes
document.
0 = Profile Separately (default)
1 = Ignore Attachments
LNEImportedDocumentAttachmentErrorOption
Determines how to process the main Lotus Notes document if errors
are generated while processing attachments.
0 = Skip Profiling Main Document (default)
1 = Keep - Profile with Attachments Saved Successfully
2 = Attempt to Profile with Attachments Embedded
334
CHAPTER 13
LNEImportedDocumentAttachment_AE_Option
Determines how to process attachments if they already exist.
0 = Skip Attachment
1 = Save As New Document (default)
2 = Save As New Version
LNEErrorHandlingForAttachments
Determines what action should be taken if errors are generated during
processing attachments.
0 = Ignore the Error
1 = Abort the Profiling Process of the Particular Attachment and
Continue (default)
LNESourceNoteOption
Determines how to handle the Source Note after the Lotus Notes
document is profiled.
0 = Keep Intact (default)
1 = Replace in Source Note Attachments with DRF
2 = Remove Attachments from Source Note
3 = Delete Document from Notes Database
LNEErrorHandlingForMainDocument
Determines how to handle errors generated when profiling the Lotus
Notes document.
0 = Abort Profiling Silently (do not notify user)
1 = Abort Profiling and Notify User (default)
2 = Ignore Errors
LNEConfirmFrequency
Determines how often to confirm profiling preferences.
0 = Never (default)
1 = Per Session
2 = Per Action
CONFIGURATION OPTIONS AND SETTINGS
335
LNEDocumentLevelControl
Determines whether to have document-level control.
0 = No
1 = Yes
LNEGenerateTitleAutomatically
Determines whether to generate the title automatically.
0 = No
1 = Yes (default)
LNEShowImportForm
Determines whether to show the import form.
0 = Always (default)
1 = If Required
2 = Never
LNEShowDestinationForm
Determines whether to show the destination form.
0 = Always (default)
1 = If Required
2 = Never
LNESkipDXLFileValidation
Determines whether to skip the DXL File Validation test.
0 = No (default)
1 = Yes
Data Source
Related LND
Document File
Settings
The following data-source-related document LND file settings are
available in the SetAdministrativeSettings agent.
NOTE: All of the settings have a corresponding “<function name>_Lock” setting. If
set to 1 (Locked), then the user cannot change the setting. ( 0=Unlocked)
LNDImportedDocumentOption
Determines how to process the Lotus Notes document being uploaded.
336
CHAPTER 13
0 = Keep Intact
1 = Replace Attachments with DRF (default)
2 = Remove Attachments
3 = Do Not Profile Lotus Notes Document
LNDImportedDocument_AE_Option
Determines how to process the Lotus Notes document being uploaded
if it already exists.
0 = Skip Profiling
1 = Only Save Attachments
2 = Save As New Document (default)
3 = Save As New Version
LNDImportedDocumentAttachmentOption
Determines how to process the attachments of the Lotus Notes
document.
0 = Profile Separately (default)
1 = Ignore Attachments
LNDImportedDocumentAttachmentErrorOption
Determines how to process the main Lotus Notes document if errors
are generated while processing attachments.
0 = Skip Profiling Main Document (default)
1 = Keep - Profile with Attachments Saved Successfully
2 = Attempt to Profile with Attachments Embedded
LNDImportedDocumentAttachment_AE_Option
Determines how to process attachments if they already exist.
0 = Skip Attachment
1 = Save As New Document (default)
2 = Save As New Version
LNDErrorHandlingForAttachments
CONFIGURATION OPTIONS AND SETTINGS
337
Determines what action should be taken if errors are generated during
processing attachments.
0 = Ignore the Error
1 = Abort the Profiling Process (default)
LNDSourceNoteOption
Determines how to handle the Source Note after the Lotus Notes
document is profiled.
0 = Keep Intact (default)
1 = Replace with DRF
2 = Remove Attachments
3 = Delete Document from Notes Database
LNDErrorHandlingForMainDocument
Determines how to handle errors generated when profiling the Lotus
Notes document.
0 = Abort Profiling Silently (do not notify user)
1 = Abort Profiling and Notify User (default)
2 = Ignore Errors
LNDConfirmFrequency
Determines how often to confirm profiling preferences.
0 = Never (default)
1 = Per Session
2 = Per Action
LNDDocumentLevelControl
Determines whether to have document-level control.
0 = No
1 = Yes (default)
LNDGenerateTitleAutomatically
Determines whether to generate the title automatically.
338
CHAPTER 13
0 = No
1 = Yes (default)
LNDShowImportForm
Determines whether to show the import form.
0 = Always (default)
1 = If Required
2 = Never
LNDShowDestinationForm
Determines whether to show the destination form.
0 = Always (default)
1 = If Required
2 = Never
LNDSkipDXLFileValidation
Determines whether to skip the DXL File Validation test.
0 = No (default)
1 = Yes
Data Source
Related LNE
Related Mapping
Settings
The following entries in the SetAdministrativeSettings agent are internal
fields used by the Lotus Notes client when mapping to a data source:
LNE_SendTo—This field is mapped to the EMAIL_TO column.
LNE_From—This field is mapped to the EMAIL_FROM column.
LNE_CopyTo—This field is mapped to the EMAIL_CC column.
LNE_BlindCopyTo—This field is mapped to the EMAIL_BCC column.
LNE_Subject—This field is mapped to the EMAIL_DOCNAME column.
LNE_DeliveredDate—This field is mapped to the EMAIL_RECEIVED
column.
LNE_PostedDate—This field is mapped to the EMAIL_SENT column.
CONFIGURATION OPTIONS AND SETTINGS
339
Data Source
Related LND
Related Mapping
Settings
The following entries in the SetAdministrativeSettings agent are mappings
that are available for Lotus Notes (LND) Documents:
LND_LN_Default_Doc_Title
LND_DS_Default_Doc_Title
These internal fields are mapped to the Lotus Notes Document Title
and Data Source Title, respectively.
340
CHAPTER 13
Setting up Drag-and-Drop Functionality
To set up drag-and-drop functionality for all Lotus Notes users, you
must apply the following changes to the corporate mail template. If
only a small subset of Lotus Notes users will be using the DM Extension
for Lotus Notes, you can make the changes in each user’s mail database
directly.
To set up drag-and-drop functionality:
1. Log on to the client workstation.
2. In Notes Designer, open the Mail Database template.
3. when the database opens, in the navigation tree, select
Other>Database Resources and then open Database Script on
Lotus 7.x or select Code>Database script on Lotus 8.5.x.
4. Under Database Resources, open Database Script.
5. In the [Declarations] section, add the following lines of code:
'//=========== Added for handling the Drag-Drop to
OpenText-DM folders =================
Declare Function GetDataSourceFileNameW Lib
"HLBridge.dll" (Byval DataSourceFileName As
Unicode String, Byval BufferSize As Integer) As
Boolean
6. In the PostDragDrop event of the Mail Database template,
locate the following lines:
Dim note As notesdocument
Dim newnote As notesdocument
Dim uidoc As notesuidocument
NOTE: For non-email integrated databases, the location could be different.
7. Add the following lines of code directly after the three lines
of code you located in step 6.
'//=========== Added for handling the Drag-Drop to OpenText-DM
folders ================
If Left$(Entryname,4) = "Humm" Then
Dim dbName As String *255
Dim LNSession As New notessession
Dim status As Boolean
status = GetDataSourceFileNameW(dbName, 255)
If (( (Isnull(dbName)) Or (Trim$(dbName) = "")
False)) Then
) Or (status =
SETTING UP DRAG-AND-DROP FUNCTIONALITY
341
continue = False
Else
Dim db As New NotesDatabase("", dbName)
Dim doc As NotesDocument
Set doc = New NotesDocument(db)
doc.FullPath = EntryName
Call doc.Save(True, False)
'Run the drag-drop agent
Dim agent As NotesAgent
Set agent = db.GetAgent( "DragDrop" )
Call agent.Run(doc.NoteID)
'Cancel the standard drag-drop functionality.
'We want to capture a drag-drop to our entry and provide
custom functionality
continue = False
End If
End If
'=================================================================
====================
8. Save the database.
Installing the Root Node Image
You can use the DM image in user mail databases as the root node
image. To do this, you will need to apply the following to all user mail
databases.
To install the root node image:
1. Open Notes Designer.
2. Open the Lotus Extension Template (HLE_Template.ntf)
file on the user’s local machine.
3. From the DM Extension for Lotus Notes database
navigation tree, select Shared Resources>Images (or
Resources>Images on 8.5x).
4. From the list of images, locate and copy the OpenText.gif
file.
342
CHAPTER 13
5. Open the Mail Database template.
6. From the navigation tree, select Shared Resources>Images (or
Resources>Images on 8.5x).
7. Paste the OpenText.gif file into the list of images for the
Mail Database template.
8. You might be prompted with an alert stating "The source
database, 'Hummingbird Lotus Extension Template', is a
Design Template named 'HLE_Template'. After being pasted,
would you like these Images to be automatically updated when
those in 'HLE_Template' change?".
Click No.
9. Save the database.
10. Repeat this process for each integrated database that you
want the DM tree to appear.
Setting up the Advanced Interface on Integrated
Databases
The Integrated Databases (IDB) feature allows users to identify the
Lotus Notes databases (.nsf files) in which they want the DM tree to
appear. They can also specify the level of integration for that database
and which features of the Advanced Interface (AI) to utilize when a
particular database is open on their desktop.
The Advanced Interface provides context-sensitive menus for DM
actions that the user can use by CTRL+right-clicking in either the tree
or list views. It also dynamically modifies the Lotus Note’s Action menu.
Right-clicking items in those same areas continues to show the Lotus
Notes pop-up menus. The DM pop-up menus have a background color
of Cyan, so they are easily distinguishable from the Lotus Notes pop-up
menus.
In order for the DM tree to appear, you must designate the database as
an Integrated Database. The user’s mail .nsf file is added as an
Integrated Database by default, but can be removed if needed.
Ensure that you have the correct data for entry on the form before you
begin this process. You can do this by viewing the database in Designer.
SETTING UP THE ADVANCED INTERFACE ON INTEGRATED DATABASES
343
To set up integrated databases:
1. Start Lotus Notes.
2. In the Actions menu, select Integrated Databases.
3. In the Integrated Database Maintenance window, click Add.
4. Enter the File Details as follows:
File Name—The file name of the Notes Database. If the file is
in a subdirectory in the Lotus Notes Data directory, you
must include the path, for example: ...\mail\mjones.nsf.
Server Name—The name of the Domino server. If you are
using a local file, leave the field blank.
Title—The database title.
Display Title—The display name that Lotus Notes uses for the
tab title when that database is open. This is usually the same
as the database title; however, in some cases, Notes removes
special characters. If this Display Title field does not match
the exact Display Title that Lotus Notes displays on the tab
when that database is open, the Advanced Interface
functionality will not work for this database.
5. Enter the Data Source Tree Settings as follows:
Attach—Indicates that the DM tree should be added to this
database.
Outline—The name of the Outline where the DM tree
should be added.
Frame—The name of the Frame where the DM documents
list should appear.
6. To enable Advanced Interface, select from the following
options:
List CTRL+right-click—Allows you to use the DM context
menu in a list by using CTRL+right-click.
Tree CTRL+right click—Allows you to use the DM context
menu in the DM tree by using CTRL+right-click.
Stale Notification—Alerts you when the information in the
tree is outdated, and prompts you to refresh the system.
7. Save the changes to the Integrated Database settings.
8. Close the Integrated Database Maintenance window.
9. Restart Lotus Notes.
344
CHAPTER 13
Designating the
Home Page in
Lotus Notes
In order for Advanced Interface to function correctly, Lotus Notes relies
on the Welcome page being set as the user’s “Home Page.” If users want
to bookmark a different home page other than the Welcome page, you
must add a line to the Notes.ini file.
To use a different home page other than the Welcome page:
1. On the user’s workstation, locate and open the Notes.ini file.
2. Add the following line of text:
HECLN_NotesHomePageTitle=HomePageTitle
3. Replace HomePageTitle with the text that appears on the
window tab in Lotus Notes.
Configuration Notes for Indexing Attachments in
Lotus Notes E-mails
You can index any item that is attached to Lotus Notes e-mail messages
(.lne files) and Lotus Notes documents (.lnd files). However, you
cannot index an .lne or .lnd file that is attached to another .lne or .lnd
file.
In order to handle attachments properly, the XML text reader list must
include the /s option, which references a specification file that resides
in the fultext directory.
An attachment can be indexed only if it is encoded and included as
element content in the .lne document. The specification file tells the
XML text reader which elements represent such attachments. The XML
text reader then decodes the attachment and passes it through another
text reader, such as ftmf, in order to obtain a text stream to replace the
original encoded attachment.
Troubleshooting DM Integration with Lotus Notes
The following information is provided in case you need to troubleshoot
DM integration with Lotus Notes. This is not necessary for setting up
the DM Extension for Lotus Notes.
This section describes how to reinitialize Lotus Notes databases and the
client machine (which has DM Extension for Lotus Notes installed) to
CONFIGURATION NOTES FOR INDEXING ATTACHMENTS IN LOTUS NOTES E-MAILS
345
revert to a first-run state where the integration has never been used.
Doing so will remove any settings, options, images, and other data that
the DM Extension for Lotus Notes may have stored on the client
machine or in the Lotus Notes databases. This does not, however,
remove the integration from the client machine.
Removing Lotus
Notes Integration
To reinitialize Lotus Notes databases and client machine using
DM Extension for Lotus Notes:
1. Open the user's mail database in Domino Designer.
2. Navigate to Shared Code\Outlines. In the list of Outlines,
locate NotesMailOutline.
3. Double-click NotesMailOutline to open.
4. Locate and delete all of the DM entries. The Root Outline
Entry will appear with the DM user name, and followed by
the library name.
NOTE: To remove Lotus Notes integration for a particular data source, remove
only the DM entry for that data source.
5. Save the NotesMailOutline Outline.
6. Repeat steps 1 through 5 for each of the user’s integrated
databases. Note that the Outline name will be different,
which is specified on the integrated database.
7. In Domino Designer, locate Shared Resources\Images (or
Resources>Images on 8.5x) in the mail database.
8. Locate and delete all .gif files that begin with DOCSOPEN,
ATTACHE, and ROUTING.
9. Close Domino Designer.
10. On the Lotus Notes client machine, navigate to the Lotus
Notes data directory.
11. Locate and delete all .nsf, .dsf, .sif, and .upf files that begin
with HECLN.
12. In Windows Explorer, locate and open the Notes.ini file.
13. Locate the line that begins with $HECLN and delete the entire
line.
14. Save the Notes.ini file.
346
CHAPTER 13
DM-Lotus
Integration
Maintenance for a
Specific Data
Source
This section describes how to remove a particular tree node, which
corresponds to a DM library, from an integrated database without
removing all of the corresponding DM library tree nodes. This does not
remove the integration from the client machine.
To remove DM Extension for Lotus Notes integration for a
particular data source:
1. Open the user's mail database in Domino Designer.
1. Navigate to Shared Code\Outlines (or Shared
Elements\Outlines in 8.5x). In the list of Outlines, locate
NotesMailOutline.
1. Double-click NotesMailOutline to open.
1. Locate the DM entry for the particular data source. The
Root Outline Entry will appear with the DM user name,
followed by the library name.
1. Delete only that particular DM entry.
1. Save the NotesMailOutline Outline.
1. Repeat steps 1 through 6 for each integrated database you
want to remove DM Extension for Lotus Notes integration.
Note that the Outline name will be different, which is
specified on the integrated database.
1. Close Domino Designer.
1. On the Lotus Notes client machine, navigate to the Lotus
Notes data directory.
1. Locate and delete all .nsf and .dsf files that begin with
HECLN.
1. Locate and delete the .nsf and .dsf files that correspond to
the data source you want to delete. The file name will
contain the DM user name, followed by the library name.
1. In Windows Explorer, locate and open the Notes.ini file.
1. Locate the line that begins with $HECLN and delete the entire
line.
1. Save the Notes.ini file.
TROUBLESHOOTING DM INTEGRATION WITH LOTUS NOTES
347
Manually
Removing DM
Extension for Lotus
Notes Integration
This section contains information on how to remove DM Extension for
Lotus Notes integration.
To remove DM Extension for Lotus Notes integration:
1. Open the user's mail database in Domino Designer.
2. Navigate to Shared Code\Outlines. In the list of Outlines,
locate NotesMailOutline.
3. Double-click NotesMailOutline to open.
4. Locate and delete all DM entries. The Root Outline Entry
will appear with the DM user name, followed by the library
name.
5. Save the NotesMailOutline Outline.
6. Repeat steps 1 through 5 for each integrated database. Note
that the Outline name will be different, which is specified on
the integrated database.
7. Navigate to Shared Code\Agents.
8. In the list of Agents, locate and delete the DM agents:
•
For the mail database, the agents are:
Insert file(s) from eDOCS DM
CallPD
InsertAgent
InsertCleanup
•
For the integrated databases, the agents are:
Insert file(s) from eDOCS DM
HLC_Display_Document_List
HLC_Insert_Document
HLC_Parameter_Cleanup
9. In Domino Designer, navigate to Shared Resources\Images
in the mail database.
10. Delete all .gif files that begin with DOCSOPEN, ATTACHE,
and ROUTING.
11. Close Domino Designer.
12. Click Start>Run and type regedit in the Open field. The
Registry Editor opens.
13. Locate and remove the following user registry key:
348
CHAPTER 13
HKEY_CURRENT_USER\Software\Hummingbird\Email
Integration\1.5\Settings\AgentsInstalledFor
14. Close Registry Editor.
15. Remove the code entry for the drag-and-drop feature. To do
this, in Notes Designer, open the Mail Database template.
16. When the database opens, in the navigation tree, select
Other>Database Resources.
17. Under Database Resources, open Database Script.
18. In the [Declarations] section, remove the following lines of
code:
//=== Added for handling the Drag-Drop to
Hummingbird-DM folders ======
Declare Function GetDataSourceFileName Lib
"HLBridge.dll" () As String
19. In the PostDragDrop event of the Mail Database template,
locate the following lines:
Dim note As notesdocument
Dim newnote As notesdocument
Dim uidoc As notesuidocument
20. Remove the following lines of code that appear directly after
the three lines of code you located in the previous step.
'//===== Added for handling the Drag-Drop to Open
Text-DM folders
======
If Left$(Entryname,4) = "Humm" Then
Dim dbName As String *255
'Get a handle to the users local database
dbName = GetDataSourceFileName()
If ( (Isnull(dbName)) Or (Trim$(dbName) = "") )
Then
continue = False
Else
Dim db As New NotesDatabase("", dbName)
Dim doc As NotesDocument
Set doc = New NotesDocument(db)
doc.FullPath = EntryName
Call doc.Save(True, False)
'Run the drag-drop agent
Dim agent As NotesAgent
Set agent = db.GetAgent( "DragDrop" )
Call agent.Run(doc.NoteID)
TROUBLESHOOTING DM INTEGRATION WITH LOTUS NOTES
349
'Cancel the standard drag-drop functionality.
'We want to capture a drag-drop to our entry and
provide custom
functionality
continue = False
End If
End If
'==================================================
====================
21. Save the database.
22. On the Lotus Notes client machine, navigate to the ...\Lotus
Notes data directory.
23. Locate and delete all .nsf, .dsf, .sif, and .upf files that begin
with HECLN.
24. Locate and open the Notes.ini file.
25. Locate and delete the following lines:
AddInMenus
EXTMGR_ADDINS
$HECLN'
26. Save the Notes.ini file.
350
CHAPTER 13
Setting Up Logging
This section provides information on how to generate a log file to use
for troubleshooting.
The default log file location is C:\Documents and Settings\<user
name>\Local Settings\Application Data\Open Text\Lotus Client.
The log file name prefix is "OLTC_Trace." For example, the log file
name is: OTLC_Trace<Day of Week>,<Month Name> <Day of
Month>, <Four-Digit Year>_<Time in 24-hour format>.log.
For example, OLTC_Trace_Thursday, October 25, 2009_1657.log.
To generate a DM Extension for Lotus Notes log file:
1. Start Lotus Notes. If prompted, enter your logon
credentials.
2. Log on to DM when prompted.
3. Select Actions>Open Text System Configuration.
4. In the HLC Configuration window, select the System Startup
tab.
5. To enable full logging, set each value in the Logging section
to 4. If you do not want to enable full logging, select the
individual logging level for each type of process.
6. Click OK.
7. Restart Lotus Notes.
TROUBLESHOOTING DM INTEGRATION WITH LOTUS NOTES
351
352
CHAPTER 13
P
A R T
4
Appendices
In This Section
This section contains the following appendices:
•
A—Configuration Settings
•
B—Performance Monitor Settings
•
C—Other DM Server Admin Tools
•
D—Security Regeneration utility
•
E—Multilingual Support for DM Webtop Users and Indexed
Documents
•
F—Configuring DM Extensions Per-User Based
•
G—Configuring the Save User Interface
353
APPENDIX
A
Configuration Settings
In This Appendix
This appendix contains configuration settings for various features in
eDOCS DM, most of which are configured through registry key
settings.
355
Bypassing Multi-Level Circular Reference Checks
You can configure a registry key to bypass multi-level circular reference
checks. If you do not specify a value, a default depth of five levels is
used. There is a maximum of 10 levels of circular reference depth
checking. Regardless of the value, basic one-one relationship and direct
reciprical parent/child relationship circular reference checking is still
performed.
The code dynamically builds the SQL statement used for circular
reference checking based upon the depth value acquired by looking at
the CircRefCheckDepth value.
T o bypass multi-level circular reference checks:
1. Click Start>Run, type regedit, and then click OK.
2. In the Registry Editor, locate the following registry key:
HKEY_LOCAL_MACHINE\SOFTWARE\Hummingbird\
DOCSFusion
3. Right-click DOCSFusion and select New>DWORD Value.
4. Type CircRefCheckDepth and press ENTER.
5. Double-click CircRefCheckDepth and type a value:
0 - Multi-level circular reference checking is bypassed.
If you do not specify a value, the default of five levels is used. There is a
maximum of 10 levels.
Caching to an XML File for Troubleshooting Purposes
As a troubleshooting option, you can set a flag in the system registry so
that when a user selects Options>Refresh Cache in DM Extensions, the
cache in memory and disk is dumped to XML files, instead of clearing
the cache.
Registry Setting
To enable the cache dumping feature, you must create the
DumpCacheOnRefresh registry setting for the following registry key:
HKEY_LOCAL_MACHINE\SOFTWARE\Hummingbird\
PowerDOCS\Settings
356
APPENDIX A
To create the DumpCacheOnRefresh registry key setting:
1. Click Start>Run, type regedit, and then click OK.
2. In the Registry Editor, locate the following registry key:
HKEY_LOCAL_MACHINE\SOFTWARE\Hummingbird\
PowerDOCS\Settings
3. Right-click Settings and select New>DWORD Value.
4. Type DumpCacheOnRefresh and press ENTER.
5. Double-click DumpCacheOnRefresh.
6. Enter one of the following values in the Value data field:
• 1 - The entire cache will be dumped, except for items
that are marked for exclusion.
• 2 - The only portion of the cache that will be dumped
are those items marked for inclusion.
If the value for the DumpCacheOnRefresh key is 1, the system looks
under HKEY_LOCAL_MACHINE\SOFTWARE\
Hummingbird\PowerDOCS\Settings\DiagnosticsCache\Exclude
for items to exclude from the cache dump.
Excluding or
Including Items
Following is a table of items that you can exclude or include in the
cache dump:
Data
Key Name
Database Table Name
Application
Information
CAppInfoData
APPS
Launch Methods
CLMInfo
LAUNCH_METHODS
Lookup
Definitions
LookupDefs
LOOKUPS.LISTBOX
Forms
Forms
FORMS
All Groups
Groups
GROUPS (Short
Group Name, Long
Group Name,
Universal Access)
CACHING TO AN XML FILE FOR TROUBLESHOOTING PURPOSES
357
Data
Key Name
Database Table Name
Each Lookup
Lookup Name,
followed by N (for
non-searches) or S
(for searches).
Table name of the
lookup.
For example, enter
PEOPLES to
search the PEOPLE
lookup, or CLIENTN
for the non-search
CLIENT lookup.
Each Group
The group name.
For example,
DOCS_USERS.
Subset of PEOPLE,
per group.
Library and Group
Options
LibraryUserParams
GROUPS (Options)
and DOCSPARMS
(Options)
Document Types
DocumentTypes
DOCUMENTTYPES
To mark an item for exclusion:
1. To mark an item for exclusion, first create the
DiagnosticsCache and Exclude registry keys. See the
Registry Setting section for instructions.
2. Right-click Exclude and select New>DWORD Value.
3. Type the key name of the item to exclude (for example,
GROUPS), and then press ENTER.
4. Double-click the item’s name (for example, GROUPS), and
type 1 in the Value data field.
If the value for the DumpCacheOnRefresh key is 2, the system looks under
HKEY_LOCAL_MACHINE\SOFTWARE\Hummingbird\
PowerDOCS\Settings\DiagnosticsCache\Include for items to include
in the cache dump.
To mark an item for inclusion:
1. To mark an item for inclusion, first create the
DiagnosticsCache and Include registry keys. See the
Registry Setting section for instructions.
2. Right-click Include and select New>DWORD Value.
358
APPENDIX A
3. Type the key name of the item to exclude (for example,
GROUPS), and then press ENTER.
4. Double-click the item’s name (for example, GROUPS), and
type 1 in the Value data field.
5. Create a new DWORD Value with the key name of the item to
include (for example, GROUPS), and type 1 in the Value data
field.
Viewing the
Output File Layout
Generated output XML files have the same names as their registry key
names. In order to view the generated XML files, you must place the
DiagnosticCache.xslt file in the same directory as the generated XML
files. These files are stored, by default, in ..\Documents and
Settings\<User Name>\Local Settings\Temp.
All generated XML files share the following format:
•
Time Stamp—The time stamp of when the cache was
dumped.
•
Cache File Name—The name of the cache file that contains
the data. This file is located in ..\Documents and
Settings\<User Name>\Application
Data\Hummingbird\DM\Cache\<Library Name>.
•
Cache File Version—The file version of the cache file.
•
Time Stamp of Cache File—The time stamp of when the cache
file was created.
The next item in the XML file is a grid composed of three columns. The
first row, which is a heading row, is highlighted in green and contains
the following column names:
Interpreting
Output Values
•
Name—The SYSTEM_IDs or names of the items in the
cache dump.
•
Disk—The value of each item as it exists on disk.
•
Memory—The value of each item as it exists in memory. If
the item does not exist in memory, then this column
appears blank.
Following is an explanation of the output values for each type of data
in the output XML file.
CACHING TO AN XML FILE FOR TROUBLESHOOTING PURPOSES
359
Application Information and Launch Methods
Each column of a database row is given a row in the output grid. A
green heading row separates each database’s output.
Lookup Definitions
The Name entry corresponds to the LOOKUPID in the LOOKUP table.
The Disk/Memory values correspond to LISTBOX in the LOOKUP table.
Each Lookup
The data corresponds to the table for each lookup. For example,
CLIENTN, which is the non-search lookup for Client, corresponds to
the CLIENT table. The Name value is the SYSTEM_ID. The Disk/Memory
value corresponds to the row of data that is cached, which can be
delimited by a comma (,) or colon (:).
For CLIENTN, the data is:
[CLIENT_ID];[CLIENT_NAME];[DISABLED];[TARGET_DOCSRVR]
Another example, PEOPLES, which is the search lookup for People,
corresponds to the PEOPLE table. The Name value is the SYSTEM_ID.
The Disk/Memory value corresponds to the row of data that is cached,
which can be delimited by a comma (,) or semi-colon (;).
For PEOPLES, the data is:
[USER_ID];[FULL_NAME];[DISABLED];[SYSTEM_ID]
All Groups
The data corresponds to the GROUP table. The Name value is the
SYSTEM_ID. The Disk/Memory value is the value of the following
columns, “;” delimited.
The Disk value is:
[GROUP_ID];[GROUP_NAME];[UNIV_ACCESS]
Each Group
The data corresponds to the subset of the PEOPLE table that belongs to
the group. The Disk/Memory value is the value of the following delimited
columns, “;” delimited.
The Disk value is:
[USER_ID];[FULL_NAME]
360
APPENDIX A
Forms
The data corresponds to the FORMS table. The Name value is the
FORM_NAME in the FORMS table. Unlike the other files, the Disk and
Memory values differ.
The Disk value is:
[SYSTEM_ID];[FORM_TITLE];[FORM_TYPE];[FORM_DEFINITION]
The Memory value is [SYSTEM_ID], and for each column, the column
attributes interpreted into memory. This is followed by the line:
[SQL name],[flags],[type],[kind],[lookup
name],[display name],[checked trigger],[unchecked
trigger],[multi-value info]
The [SQL name] entry may be “;” delimited.
Document Types
The data corresponds to the DOCUMENTTYPES table. The Name
value is the SYSTEM_ID. Each column of a database row is given a row
in the output grid.
Library and Group Options
The data corresponds to the Options data in the GROUPS and
DOCSPARAMS tables. Each column of a database row is given a row in
the output grid. The first set of data that appears under the green line
is the logged-on group’s options. The next green line delimits the
Library options. The Library options also contains data that are system
parameters, and thus, have no corresponding entry in the group item.
Troubleshooting
In the event of a failed cache dump, the first time a failure occurs, no
output file is generated; however, on subsequent failures, the XML file,
along with where and why the parse failed, will be appended to the
CacheDumpProblem.log file. The information is this file is useful to
developers in examining why code has failed.
Configuring Dynamic Views to Expand Ad-Hoc Folders
Containing Other Folders
You can configure a registry key setting to enable ad-hoc folders to
expand in the Dynamic View tree in DM Extensions. This ensures that
CONFIGURING DYNAMIC VIEWS TO EXPAND AD-HOC FOLDERS CONTAINING OTHER FOLDERS
361
any ad-hoc folder containing another folder will expand and appear in
the dynamic view tree.
To configure ad-hoc folders to expand in the tree:
1. Click Start>Run, type regedit, and then click OK.
2. In the Registry Editor, locate the following registry key:
HKEY_LOCAL_MACHINE\SOFTWARE\Hummingbird\
PowerDOCS\Core\Plugins\Fusion\Settings
3. Double-click LazyExpandIndicator.
4. Type 1 in the Value data field.
5. Click OK.
Any ad-hoc folders appearing in the dynamic view virtual structure will
now expand in the DM tree.
Configuring Dynamic Views to Limit Sub Nodes Under
Subscription Level
When a user subscribes to a Client that contains a large number of
Matters (such as 1,000), when attempting to expand the Client under
the Subscribed/My Matters node, the system appears to be frozen. You
can modify a registry key that will limit the sub nodes under a
Subscription level to improve performance.
The DM Server checks to see how many sub nodes are under a
Subscribed node, for example, how many Matters exist under a Client,
and if more than 300, will return an error message stating, “The item
you are subscribing to has too many children nodes, subscribe at a lower
level.”
The default value is 300 children nodes as the limit; however, you can
change this on the DM Server through the following registry key
setting:
[HKEY_LOCAL_MACHINE\SOFTWARE\Hummingbird\
DOCSFusion\DynamicViews]
"MaxSubNodesForSubscription"=dword:00000100
Set the value for this registry key to a number below 300, depending on
your site’s needs.
362
APPENDIX A
Configuring the File and Send E-mail Save Option
NOTE: In eDOCS DM 5.3, you can enable the File and Send feature in
the Client Deployment Utility.
The File and Send toolbar button on Microsoft Outlook’s toolbar allows
the user to profile an e-mail message prior to sending. The File and Send
toolbar button appears next to the Send button, unless you are using
Microsoft Word as your e-mail editor; in that case, the File and Send
button appears above the Send button.
When you use Microsoft Word as your e-mail editor in Microsoft
Outlook 2003, you will need to enable the Standard toolbar in order to
access the File and Send toolbar button. The Standard toolbar is hidden by
default, so you will need to right-click any toolbar and select Standard
(or select View>Toolbars>Standard); otherwise, the File and Send toolbar
button will not appear.
NOTE: When you enable the File and Send feature, Outlook’s Send button
is not used for any DM functionality.
The File and Send button is disabled by default. To enable this feature,
you must ensure that the EnableFileAndSend setting is enabled, and
ensure that the ProfileOnSend value is disabled in the following registry
key:
HKEY_LOCAL_MACHINE\SOFTWARE\Hummingbird\
Email Integration\1.5\Settings
To enable the File and Send feature:
1. Click Start>Run, type regedit, and click OK.
2. In the Registry Editor, navigate to
HKEY_LOCAL_MACHINE\SOFTWARE\Hummingbird\E
mail Integration\1.5\Settings.
3. Right-click Settings and select New>DWORD Value.
4. Type EnableFileandSend and press ENTER.
5. Double-click EnableFileandSend.
6. Type 1 in the Value Data field and click OK.
7. Double-click ProfileOnSend.
CONFIGURING THE FILE AND SEND E-MAIL SAVE OPTION
363
NOTE: This key does not exist unless you go into the Client
Deployment Utility’s E-mail Integration node and select and
clear the Profile on Send check box.
8. Type 0 in the Value Data field.
9. Exit Registry Editor.
If you have the Profile on Send feature enabled in the Client Deployment
Utiltiy, you will need to disable this feature to enable the File and Send
feature.
Configuring Modified Paper Profiles to Appear in
Recently Edited Documents List
You can modify a registry key so that when users make modifications to
a Paper profile, the Paper profile will appear in their Recently Edited
Documents list.
To configure modified paper profiles to appear in the Recently
Edited Documents list:
1. Start the Client Deployment Utility and ensure that the Use
DM Server RED option is enabled on the Document Management
Plug-in>General tab.
2. On DM Server, click Start>Run.
3. In the Run dialog box, type regedit in the Open field, and
then click OK. The Registry Editor opens.
4. Locate the following registry key:
HKEY_LOCAL_MACHINE\SOFTWARE\Hummingbird\
DOCSFusion
5. Right-click DOCSFusion and select New>DWORD Value.
6. In the Value name field, type Paper2Red and press ENTER.
7. Right-click Paper2Red and select Modify.
8. In the Value data field, type 1 to enable the feature, click the
Decimal option, and then click OK. NOTE: To disable the
feature, type 0 (zero).
Once you enable the feature, when users modifiy a Paper profile, they
must select View>Refresh to update the Recently Edited Documents list
364
APPENDIX A
to see the edited item on the list. This modification does not apply to
edits made to the profile of an electronic document.
Configuring the Recently Used Items List to Hide
Disabled Validation Items
You can configure a registry key in order to exclude disabled validation
items, such as Document Types, from appearing as a selection in the
Recently used items list.
To configure disabled validation items from appearing in the
Recently Used Items list:
1. Click Start>Run, type regedit, and then click OK.
2. In the Registry Editor, locate the following registry key:
HKEY_CURRENT_USER\Software\Hummingbird\
PowerDOCS\Core\Plugins\Fusion\Forms\Lookup
3. Right-click Lookup and select New>DWORD Value.
4. Type CheckForEnableChanges and then press ENTER.
5. Double-click CheckForEnableChanges and type 1 in the Value
data field.
6. Click OK.
7. Start DM Server Manager.
8. Click the Caches tab.
9. Click Refresh All.
10. Click OK.
11. In DM Extension for Windows Explorer, click
Options>Refresh Cache.
After you configure this registry key value, the next time a user clicks a
Lookup (...) button for a validation field, such as Document Type or
Author, any disabled item will not appear in the Recently used items or
Full list tabs.
CONFIGURING THE RECENTLY USED ITEMS LIST TO HIDE DISABLED VALIDATION ITEMS
365
Configuring the Remember Last Location
You can configure a registry key to make DM Extensions remember the
last location from which a user opened a document, and the
navigational tree in the Quick Retrieve window will expand to that
location.
To configure the Remember Last Location feature:
1. On the client workstation, click Start>Run, type regedit,
and click OK. The Registry Editor opens.
2. Locate the following registry key:
HKEY_CURRENT_USER\Software\Hummingbird\
PowerDOCS\Core\Plugins\Fusion\Forms\QR
3. Double-click OpenFirst.
4. In the Value data field, type 3, and then click OK.
5. Exit the Registry Editor.
The next time the user opens a document, the navigational tree in the
Quick Retrieve window will automatically expand to the last location
from which the user opened a document, whether from a Dynamic
View, Quick Search, Workspace, etc.
Configuring Whether Prompt to Profile Appears When
Saving an E-mail Attachment
A registry key allows you to configure whether a Document Profile
form appears when you save an e-mail attachment. If you do not create
this registry key, edits are automatically saved to the user’s default
Outlook folder.
To configure the prompt to profile when saving an e-mail
attachment:
1. Click Start>Run, type regedit, and then click OK.
2. In the Registry Editor, locate the following registry key:
HKEY_LOCAL_MACHINE\Software\Hummingbird DM
Application Integration\Installation\
Microsoft
3. Right-click Microsoft and select New>DWORD Value.
366
APPENDIX A
4. Type ProfileAttachments and press ENTER.
5. Double-click ProfileAttachments and type one of the
following values:
0 - Disabled
1 - Enabled
6. Click OK.
Once enabled, when you double-click the attachment in the Preview
Add-on pane to open the attachment (as opposed to opening the
message and then opening the attachment), the attachment opens in
read-only mode. A Document Profile dialog box always appears for a
read-only document when you initiate a Save process.
Configuring Which Items Appear in the Recently
Edited Documents (RED) List
You can you can create a registry key to configure which types of edited
documents will appear in a user’s Recently Edited Documents (RED)
list. For example, you can exclude documents that have been added or
removed from folders or other containers from appearing in the RED
list.
By default, the standard RED list shows items with the following
Activity Types:
1 — Create Document
2 — Edit Document
8 — Create New Version
18 — Copied from Document
45 — Link Added
46 — Link Removed
47 — Link Updated
By creating a new string that contains a comma-separated list of
Activity Type values, you can specify the items that will appear in the
user’s RED list.
CONFIGURING WHICH ITEMS APPEAR IN THE RECENTLY EDITED DOCUMENTS (RED) LIST
367
To configure which types of items appear in the RED list:
1. On the DM Server machine, select Start>Run.
2. Type regedit in the Open field and then click OK.
3. The Registry Editor opens. Locate the following registry key:
HKEY_LOCAL_MACHINE\SOFTWARE\Hummingbird\DOCSFusion
4. Right-click DOCSFusion and select New>String Value.
5. Type REDListActivityTypes and press ENTER.
6. Double-click REDListActivityTypes and type the Activity Type
values, separated by commas, that you want to appear in the
user’s RED list. For example, type:
1,2,8,18,104,105,106
The RED list will show the following Activity Types:
Create Document (1), Edit Document (2), Create New
Version (8), Copied from Document (18), Remove from
Container - Parent (104), Added to Container (105),
Removed from Container - Item (106)
Any document added to a folder will appear in the user’s
RED list when you use the above values.
Or, you can type the following values:
1,2,8,18
Any document added to a folder will not appear in the user’s
RED list when you use the above values.
7. Click OK.
For a list of all Activity Types, consult the DM/RM Data Dictionary.
Controlling the Display of Lookup Data
Two registry setting modifications enhance performance when retrieving
lookup data.
The following information applies to the
HKEY_CURRENT_USER\Software\Hummingbird\PowerDOCS\
Core\Plugins\Fusion\Forms\Lookup\ registry key.
The NotLoadOnStartup setting controls whether the Full List tab of a lookup
dialog box is displayed empty or with all data displayed. If a user
configures this setting for empty lists, the user does not need to wait for
the entire lookup to be populated before selecting a value. This saves
368
APPENDIX A
time and improves system performance by reducing requests to DM
Server.
The StartInRecent setting causes the lookup dialog box to open with the
Recently Used Item tab selected. The user can set individual lookup dialog
boxes to open with the Recently Used Item tab selected by selecting the
Start in Recent Items tab check box on the Lookup dialog box. All of the
lookup dialog boxes can be set to open with the Recently Used Item tab
displayed by setting a registry key value.
These settings can be applied to individual lookups or to all lookups.
NotLoadOnStartup
Setting
The NotLoadOnStartup setting controls whether the Full List tab of a lookup
is populated on startup or if the tab remains empty. This setting applies
to two types of lookups:
•
Lookups that have a parent-child relationship, such as
Client and Matter. To understand the outcome of the
NotLoadOnStartup setting, first consider how the lookup
behaves without it being set. When the user selects a Client
name and then clicks the Matter lookup button, only the
Matters related to the selected Client appear. However, if the
user clicks the Matter button without first selecting a Client,
all Matters in the library appear in the Full List tab. If the user
sets the NotLoadOnStartup DWORD registry value to 1 for
the Matter lookup, selecting Matter without first selecting a
Client displays an empty Matter list from which the user can
search for the desired Matter.
•
Lookups that have no other lookups associated with them,
such as Author, Client, Document Type, Keyword, and
Application. When NotLoadOnStartup is set to 1 and the user
clicks the Author lookup button, no data will be displayed on
the Full List tab. The user can simply search for the desired
author without waiting for the list to be populated with all
Author records in the library.
To set the NotLoadOnStart function:
1. Click Start>Run, type regedit, and then click OK.
2. In the Registry Editor, locate the following registry key:
HKEY_CURRENT_USER\Software\Hummingbird\Power
DOCS\Core\Plugins\Fusion\Forms\Lookup\
<library_name>\<lookup_name>
CONTROLLING THE DISPLAY OF LOOKUP DATA
369
The <library_name> is the name of the DM library and the
<lookup_name> is the name of the lookup containing the
lookup data.
3. Click Edit>New>DWORD Value.
4. Enter NotLoadOnStartup.
5. Double-click NotLoadOnStartup and enter one of the
following values:
1- Enabled
0 - Disabled
6. Click File>Exit.
StartInRecent
Setting
The StartInRecent setting causes the Lookup dialog box to appear with
the Recently Used Item tab selected.
To set the StartInRecent function:
1. Click Start>Run, type regedit, and then click OK.
2. In the Registry Editor, locate the following registry key:
HKEY_CURRENT_USER\Software\Hummingbird\
PowerDOCS\Core\Plugins\Fusion\Forms\Lookup\
3. Click Edit>New>DWORD Value.
4. Enter StartInRecent.
5. Double-click StartInRecent and enter one of the following
values:
1 - Enabled for all Lookups
0 - Disabled for all Lookups
The StartInRecent setting for an individual Lookup will override the
StartInRecent setting for the Library. For example, if the user has cleared
the Start in Recent Items tab check box on a particular Lookup dialog box,
that dialog box will open with the Full List tab selected.
Setting Individual
Lookups
370
APPENDIX A
You can set an individual Lookup dialog box to open with the Recently
Used Item tab selected by selecting the Start in Recent Items tab check box
on the Lookup dialog box, or by editing the registry. The Start in Recent
Items tab check box sets the StartInRecent registry value.
To set an individual Lookup dialog box to show recently used
items:
1. Click Start>Run, type regedit, and then click OK.
2. In the Registry Editor, locate the following registry key:
HKEY_CURRENT_USER\Software\Hummingbird\
PowerDOCS\Core\Plugins\Fusion\Forms\Lookup\
<library_name>\<lookup_name>
The <library_name> is the name of the DM library and the
<lookup_name> is the name of the lookup containing the
data.
3. If the StartInRecent DWORD value does not exist, click
Edit>New>DWORD Value, and enter StartInRecent.
4. Double-click StartInRecent and enter one of the following
values:
1 - Enabled for this individual Lookup
0 - Disabled for this individual Lookup
5. Select File>Exit.
Converting Links to External Native Files
A registry key controls whether or not the system automatically
converts links to external native files when they contain UNC links
(PCDOCS links). By default, the registry key is configured to ignore
these links.
To change the default value, perform the following steps:
1. Click Start>Run, type regedit, and then click OK.
2. In the Registry Editor, locate and click the following registry
key:
HKEY_CURRENT_USER\Software\Hummingbird\
PowerDOCS\Settings\Linking
3. Double-click IgnoreDOCSOpenLinks in the right pane and type
one of the following values:
0 - If PCDOCS links exist, convert them (default setting).
1 - Ignore any PCDOCS links; do not convert.
4. Click OK.
CONVERTING LINKS TO EXTERNAL NATIVE FILES
371
Determining Which Library to Save to When Using
Drag and Drop
You can configure a registry key to determine whether a document or
e-mail is saved to the user’s current or remote library when the user
drags and drops the item on a folder or workspace.
To configure which library to save to when a user drags and
drops an item:
1. Click Start>Run, and then type regedit in the Open field.
2. The Registry Editor opens. Locate the following registry key:
HKEY_CURRENT_USER\Software\Hummingbird\
PowerDOCS\Core\Plugins\Fusion\Settings\Libraries\
<logon_library>
3. Right-click your logon library name and select New>DWORD
Value.
4. Type CreateInLibrary and click ENTER.
5. Double-click CreateInLibrary and enter one of the following
values in the Value data field:
0 - The document will be saved in the remote library
(default setting).
1 - The document will be saved in the logon library and a
reference to this document will be created in the remote
libary.
2 - The document will be saved in the current library and a
reference to this document will be created in the remote
library.
6. Press ENTER.
Disabling the Unmanaged Document Notification
You can configure a registry key to prevent the "This document has
become unmanaged in DM..." notification from appearing when a user
prints a Microsoft Word document from the Recently Edited
Documents (RED) list.
372
APPENDIX A
To disable the unmanaged document notification:
1. Click Start>Run, type regedit, and then click OK.
2. In the Registry Editor, create one of the following registry
keys:
HKEY_LOCAL_MACHINE\SOFTWARE\Hummingbird\
Hummingbird DM Application Integration\Installation\
Microsoft\DM17341
or
HKEY_CURRENT_USER\Software\Hummingbird\
PowerDOCS\AppIntegration\DM17341
Once one of these registry keys is created, the “This document has
become unmanaged in DM” message will no longer appear.
Document Recovery Dialog Box Options
When a workstation stops responding while a user is editing a
document, upon recovery, the following message appears:
“eDOCS DM was terminated improperly and the following documents
remain checked out. Select an action and click OK.”
The three options are:
•
Discard edits and unlock
•
Check in Edits
•
Continue Editing
The default value is Discard edits and unlock. To choose a different option,
the user must select the option and then click OK. However, when
multiple documents are shown in the dialog box, the option must be
changed individually for each document. When you click the option
button, it changes the information in the Action column only for the
highlighted document. This is not clear to users. For example, a user
might select Check in Edits but not realize that this choice only applies to
the first document in the list. When the user clicks OK, all other
documents in the list still have Discard edits and unlock option selected.
Any edits made to the other documents will be lost.
DOCUMENT RECOVERY DIALOG BOX OPTIONS
373
The information in the Action column should be Check in Edits for all
documents that appear in the list, thereby matching the default value in
the option buttons.
You can change the default option for the Document Recovery dialog
box options through changing the value for a registry setting.
To set the default option for the Document Recovery dialog box:
1. Click Start>Run, type regedit, and then click OK.
2. The Registry Editor opens; locate the following registry key:
HKEY_LOCAL_MACHINE\SOFTWARE\Hummingbird\
PowerDOCS\Core\Plugins\Fusion
3. Double-click DefaultGPF.
4. In the Value data field, enter one of the following values:
0 - Discard edits and unlock
1 - Check in edits
2 - Continue editing
5. Click OK.
6. Click File>Exit.
Enabling Continuous Logging for COM Automation
You can enable continuous logging for COM Automation by manually
creating and setting a registry key.
To enable continuous logging for COM Automation:
1. Click Start>Run.
2. In the Run dialog box, type regedit in the Open field, and
then click OK. The Registry Editor opens.
3. Locate the following registry key:
HKEY_LOCAL_MACHINE\Software\Hummingbird\
Hummingbird\DM Application
Integration\Installation\Microsoft
4. Select Edit>New>DWORD Value; enter the following: Debug.
5. Double-click Debug. In the Value data field, enter 2 (this
value enables COM logging).
374
APPENDIX A
6. Select Edit>New>DWORD Value; enter the following:
ContinuousLog.
7. Double-click ContinuousLog; enter one of the following
values:
0 - Disables continuous logging.
1 - Enables continuous logging.
8. Select File>Exit, or if you need to export the file to use as a
custom component in a deployment package, select
File>Export and export the key to a .reg file.
Enabling or Disabling Auto Update Component
During the DM Extensions setup process, you can choose to include an
optional Auto Update component that will enable automatic updates
on end-user workstations when an update is installed on the DM Web
Server. The update is triggered when users log on. You can enable or
disable the Auto Update component to a DM Extensions client
installation by adding a setting to the componentslist.ini file on the
machine on which the DM Web Server is installed.
To enable or disable the Auto Update feature:
1. Install the DM 5.1.0.5 Service Release 3 for DM Server and
Web Server.
2. Open the componentslist.ini file. This file is located in the
\DMExtensions directory on the machine where DM Web
Server is installed.
3. Add the following section to the componentslist.ini file:
[DMExtensions]
Version=5.1.0.5
Update=0
Update ValueDescription
The value 0 disables Auto Update and no subsequent
updates will be entered into the autoupdate.log in the
C:\Temp\HUMCLogs directory.
The value 1 enables Auto Update and a new autoupdate.log
will be created in the C:\Temp\HUMCLogs directory.
ENABLING OR DISABLING AUTO UPDATE COMPONENT
375
4. Save your changes to the componentslist.ini file. When
users log on to DM Extensions, Auto Update will not
download updates from the server.
Enabling Logging for Microsoft Outlook E-mail
Integration
You can enable logging for Microsoft Outlook E-mail Integration. Log
files are generated from the EMICore.dll and DMExch.dll files, which
record certain operations, such as saving. These log files can be used for
troubleshooting purposes.
To enable logging for Microsoft Outlook E-mail Integration:
1. Click Start>Run, type regedit, and then click OK.
2. Locate the following registry key:
HKEY_LOCAL_MACHINE\SOFTWARE\Hummingbird\
EMail Integration\Settings
3. Enter the following values and settings:
LogFile {REG_SZ} = C:\EmailIntegration.log
LogMask {REG_DWORD} = 0xffffffff
LogFlush {REG_DWORD} = 0x1
HKEY_LOCAL_MACHINE\SOFTWARE\Hummingbird\
Email Integration\CoreSettings
LogFile {REG_SZ} = C:\DMSManager.log
LogMask {REG_DWORD} = 0xffffffff
LogFlush {REG_DWORD} = 0x1
The LogFile parameter can be any valid path and file name.
The LogFlush parameter determines how often log entries are
written to disk. The higher the number you enter, the better
performance will be, because there are fewer and larger log
file write operations. However, it is possible that the most
recent events will not be recorded, because they have not
been written to the file.
4. Click File>Exit.
376
APPENDIX A
Ensuring Application Integration Works When You Do
Not Install All Microsoft Office 2007 Applications
You can use a workaround to ensure that DM application integration
works after installing only one or two of the Microsoft Office 2007 Basic
applications. Application integration is broken when you do not install
all of the Microsoft Office 2007 applications (Word, Excel, and
PowerPoint).
To implement the workaround:
1. In Control Panel>Add or Remove Programs, select Microsoft Office
2007 Primary Interop Assemblies, and then click Remove.
2. Select Start>Run, type regedit, and then click OK.
3. In the Registry Editor, create the following registry keys:
HKEY_CLASSES_ROOT\TypeLib\{00020813-0000-0000C000-000000000046}\1.6
(Default) Value: Microsoft Excel 12.0 Object Library
HKEY_CLASSES_ROOT\TypeLib\{00020905-0000-0000C000-000000000046}\8.4
(Default) Value: Microsoft Word 12.0 Object Library
HKEY_CLASSES_ROOT\TypeLib\{91493440-5A91-11CF8700-00AA0060263B}\2.9
(Default) Value: Microsoft PowerPoint 12.0 Object
Library
4. Reinstall the Microsoft Office 2007 Primary Interop
Assemblies using Microsoft’s redistributable package. You
should read the package’s readme for additional
information. Download the Microsoft redistributable
package from Microsoft’s web site at the following location:
http://www.microsoft.com/downloads/
details.aspx?FamilyID=59daebaa-bed4-4282a28c-b864d8bfa513&DisplayLang=en
ENSURING APPLICATION INTEGRATION WORKS WHEN YOU DO NOT INSTALL ALL MICROSOFT OFFICE 2007
Ensuring the Microsoft Word, Excel, and Project Status
Bars Are Populated
You can configure a registry key to ensure that the Microsoft Word,
Excel, and Project Status bars appear populated. Configuring this
registry key prevents the Status bars from appearing blank.
NOTE: The Status bars must be enabled within the Microsoft applications.
In Word and Project, the Status bar check box is located in
Tools>Options>View tab. In Excel, the Status Bar option appears within the
View menu.
To ensure the Microsoft Word, Excel, and Project Status bars
appear populated:
1. Click Start>Run, type regedit, and then click OK.
2. In the Registry Editor, locate either of the following registry
keys:
HKEY_CURRENT_USER\Software\Hummingbird\
PowerDOCS\AppIntegration\<application
name>\Options
or
HKEY_CURRENT_USER\Software\Hummingbird\
Hummingbird DM Application
Integration\Installation\Microsoft\<application
name>\Options
where the <application name> is Word, Excel, or Project.
3. Right-click Options and select New>DWORD Value.
4. Type UPDATE_STATUS_BAR and press ENTER.
5. Double-click UPDATE_STATUS_BAR and type one of the
following values in the Value data field:
1—Enabled (updates the Status bar)
2—Disabled
6. Click OK.
7. Complete steps 2 - 6 for each application.
378
APPENDIX A
Excluding the DOCS_USERS Group from Quick Search
Queries
If you have a very large number of DM users, when you execute a Quick
Search, there might be a noticeable delay before results are returned.
This issue occurs as the DOCS_USERS group is queried in the
SECURITY table.
You can modify a registry key to exclude the DOCS_USERS group from
being queried against the SECURITY table when you perform a Quick
Search.
To configure excluding DOCS_USERS group in Quick Search
queries
1. Click Start>Run, type regedit, and then click OK.
2. In the Registry Editor, locate the following registry key:
[HKEY_LOCAL_MACHINE\Software\Hummingbird\
DOCSFusion
3. Right-click DOCSFusion and select New>String Value.
4. Type QSSExcludeDocUser and press ENTER.
5. Double-click QSSExcludeDocUser and type one of the
following values in the Value data field:
Enabled
Disabled
6. Click OK.
Forcing User Interface within DM Application
Integration to Execute on Separate Thread
You can set a registry key to force all user interfaces within DM
application to execute on a separate thread.
Use this key only when instructed by Open Text technical customer
support to do so.
EXCLUDING THE DOCS_USERS GROUP FROM QUICK SEARCH QUERIES
379
To configure the ThreadedUI registry key::
1. Click Start>Run, type regedit, and then click OK.
2. In the Registry Editor, locate the following registry key:
HKEY_CURRENT_USERS\Software\Hummingbird\Powe
rDOCS\AppIntegration]
3. Create a new DWORD value named ThreadedUI.
4. Set the value to 1 to enable; 0 to disable.
Improving Performance When Accessing Documents
Added to a Folder from Remote Library
You can implement a registry setting that improves performance when
you access a document in a folder that was added from a remote library.
To adjust performance when accessing documents added to a
folder from a remote library:
1. Click Start>Run, type regedit, and then click OK.
2. In the Registry Editor, locate the following registry key:
HKEY_LOCAL_MACHINE\SOFTWARE\Hummingbird\
DOCSFusion\Libraries\[login library]
3. Right-click the logon library name and click New>DWORD
Value.
4. Type SQLPoolLingerMinutes and click OK.
NOTE: The SQLPoolLingerMinutes setting should only be set for the logon
library. This setting will automatically propagate to every remote library.
This registry setting currently requires that the connection information
to every remote library specify DOCSADM as the owner in the
pcdocs.ini file and in the logon libraries REMOTE_LIBRARIES table.
Example: Owner=DOCSADM
This also requires that the SQL Server name and database owner name
be the same in the pcdocs.ini file and in the REMOTE_LIBRARIES
table. The default setup adds an equal sign (=) after the server name in
the pcdocs.ini file, and makes the Owner field of the
REMOTE_LIBRARIES table appear blank. Manually update these
entries to be the same.
380
APPENDIX A
Improving Performance in Microsoft Excel When DM
Linking Is Installed
You can implement a registry key that improves the performance in
opening Microsoft Excel documents larger than 4 MB. When you use
COM or ODMA integration with Microsoft Excel and have DM
Linking installed, the PWDMonikerConverter.xla file can cause
considerable delays in opening documents, or cause DM Extensions to
stop responding.
This registry key controls whether or not the system automatically
checks for DOCS Open links to convert them to DM style links. If the
registry key does not exist, or if the value is 0, DM Linking is configured
to scan and convert these links.
To add the registry key:
1. Locate the following in the registry:
HKLM\Software\Hummingbird\PowerDOCS\
AppIntegration\
2. Right-click Viewer and select New>DWORD Value.
3. Type BypassLinkUpdate and press ENTER.
4. Double-click BypassLinkUpdate and type one of the following
values:
0—Scan for DOCS Open links, and if they exist, convert
them (default).
1—Ignore any DOCS Open links, and do not convert them.
5. Click OK.
Inserting URLs and Attachments in E-mail Messages
When you e-mail a document from DM, you can include a URL to the
document, as well as the attachment; however, you must first create two
registry settings.
To enable the feature:
1. On the sender’s workstation, select Start>Run.
2. Type regedit in the Open field and then click OK.
IMPROVING PERFORMANCE IN MICROSOFT EXCEL WHEN DM LINKING IS INSTALLED
381
3. The Registry Editor opens. Locate the following key in the
registry:
HKEY_LOCAL_MACHINE\SOFTWARE\Hummingbird\
PowerDOCS\Settings
4. Right-click Settings and select New>String Value.
5. Enter the name CyberDOCSHost and press ENTER.
6. Right-click CyberDOCSHost and select Modify.
7. Enter the name of the DM Web Server and press ENTER.
8. Locate the following registry key:
HKLM\SOFTWARE\Hummingbird\EMail
Integration\1.5\Settings
9. Select the Settings key, and then select Edit>New>DWORD Value.
10. In the Value field, enter UseClipboardInsert.
11. Double-click UseClipboardInsert, and then type 1 in the Value
data field.
Microsoft Office Registry Key Settings
You can configure integration options for Microsoft Word, Excel, and
PowerPoint using COM Automation integration through registry
settings.
General Options
Apptrans1.ini File Location
The APP_TRANS_INI setting indicates the apptrans1.ini file location. This
file contains all of the localization and user interface strings.
To set the apptrans1.ini file location:
1. In the system registry editor, locate the following registry
key:
HKEY_LOCAL_MACHINE\SOFTWARE\Hummingbird\Hummingbird
DM Application Integration\Installation\Microsoft
2. Modify the existing APP_TRANS_INI String Value and enter
one of the following values:
•
DEFAULT—The DEFAULT setting indicates to use the
default location where you installed DM Extensions on
your client machine.
382
APPENDIX A
•
INTERNAL—The INTERNAL setting indicates to use the
internal English strings (set programatically if DM
cannot locate the apptrans.ini file).
•
Custom Value—You can enter a custom value;
however, you must include the complete path. For
example, C:\Documents and Settings\<user name>\My
Documents.
3. Click OK.
Profile Attachments
The PROFILE_ATTACHMENTS setting indicates whether attachments should
be profiled when opened from an e-mail message. When this setting is
disabled, attachments are saved to a \Temp folder.
To configure the Profile Attachments setting:
1. In the system registry editor, locate the following registry
key:
HKEY_LOCAL_MACHINE\SOFTWARE\Hummingbird\Hummingbird
DM Application Integration\Installation\Microsoft
2. Create or modify the PROFILE_ATTACHMENTS DWORD Value
using one of the following values:
•
1 (Enabled)
•
0 (Disabled)
3. Click OK.
Show DM Tab
The SHOW_DMTAB setting indicates whether the DM tab appears in
Microsoft Word, Excel, and PowerPoint 2007 using COM integration.
This feature is enabled by default.
To configure the DM tab’s visibility:
1. In the system registry editor, locate the following registry
key:
HKEY_LOCAL_MACHINE\SOFTWARE\Hummingbird\Hummingbird
DM Application Integration\Installation\Microsoft
2. Create or modify the SHOW_DMTAB DWORD Value using one
of the following values:
•
1 (Enabled)
MICROSOFT OFFICE REGISTRY KEY SETTINGS
383
•
0 (Disabled)
3. Click OK.
NOTE: Any registry setting that you configure at the
HKEY_LOCAL_MACHINE\SOFTWARE\Hummingbird\
Hummingbird DM Application Integration\Installation\
Microsoft level will affect all integrated Microsoft Office applications. For
example, if you disable the Show DM Tab, the DM tab will not appear in any
Microsoft Office 2007 application.
Passive Integration Consideration
If you disable the Show DM Tab setting and you use passive integration,
you will not be able to use any of the available DM integration.
Microsoft Office
Menu Options
The following registry key settings determine which DM menu items
appear within Microsoft Word, Excel, and PowerPoint 2007. Disabling
any of the following options removes only the menu items; the items
will remain on the DM tab.
If you are using passive integration, you should not disable any
of these menu items as integration will not work with DM.
Show Save to eDOCS DM
The SHOW_EDOCS_SAVE_TO_DM setting determines if the Office Button>Save
to eDOCS DM menu option appears. This feature is enabled by default for
active integration.
To configure the Save to eDOCS DM option:
1. In the system registry editor, locate the following registry
key:
HKEY_LOCAL_MACHINE\SOFTWARE\Hummingbird\Hummingbird
DM Application Integration\Installation\Microsoft
2. Create or modify the SHOW_EDOCS_SAVE_TO_DM DWORD
Value using one of the following values:
•
1 (Enabled)
•
0 (Disabled)
3. Click OK.
384
APPENDIX A
Show Save as DM Version
The SHOW_SAVE_AS_DM_VERSION setting determines if the Office
Button>Save As DM Version menu option appears. This feature is enabled
by default for active integration.
To configure the Save as DM Version option:
1. In the system registry editor, locate the following registry
key:
HKEY_LOCAL_MACHINE\SOFTWARE\Hummingbird\Hummingbird
DM Application Integration\Installation\Microsoft
2. Create or modify the SHOW_SAVE_AS_DM_VERSION DWORD
Value using one of the following values:
•
1 (Enabled)
•
0 (Disabled)
3. Click OK.
Show Save with Options
The SHOW_SAVE_WITH_OPTIONS setting determines if the Office Button>Save
With Options menu option appears. This feature is enabled by default for
active integration.
To configure the Save with Options option:
1. In the system registry editor, locate the following registry
key:
HKEY_LOCAL_MACHINE\SOFTWARE\Hummingbird\Hummingbird
DM Application Integration\Installation\Microsoft
2. Create or modify the SHOW_SAVE_WITH_OPTIONS DWORD
Value using one of the following values:
•
1 (Enabled)
•
0 (Disabled)
3. Click OK.
Show Save As>Other Formats
The SHOW_MSO_SAVE_OTHER_FORMATS setting determines if the Microsoft
Office Save As>Other Formats option appears in the Office Button>Save As
menu options. This feature is disabled by default for active integration.
MICROSOFT OFFICE REGISTRY KEY SETTINGS
385
To configure the Save As>Other Formats option:
1. In the system registry editor, locate the following registry
key:
HKEY_LOCAL_MACHINE\SOFTWARE\Hummingbird\Hummingbird
DM Application Integration\Installation\Microsoft
2. Create or modify the SHOW_MSO_SAVE_OTHER_FORMATS
DWORD Value using one of the following values:
•
1 (Enabled)
•
0 (Disabled)
3. Click OK.
Show Native Save As Menu Options
The SHOW_MSO_ADVERTISE setting determines whether you have the
ability to save in other file formats using Office add-ins. This is
applicable only to active integration.
To configure the native Save As menu option:
1. In the system registry editor, locate the following registry
key:
HKEY_LOCAL_MACHINE\SOFTWARE\Hummingbird\Hummingbird
DM Application Integration\Installation\Microsoft
2. Create or modify the SHOW_MSO_ADVERTISE DWORD Value
using one of the following values:
•
1 (Enabled)
•
0 (Disabled)
3. Click OK.
Hide Compare and Merge Function
The HIDE_COMPARE_AND_MERGE setting allows you to hide the Compare and
Merge button on the Review tab. This applies to both active and passive
integration.
To hide the Compare and Merge button:
1. In the system registry editor, locate the following registry
key:
HKEY_LOCAL_MACHINE\SOFTWARE\Hummingbird\Hummingbird
DM Application Integration\Installation\Microsoft
386
APPENDIX A
2. Right-click Microsoft and select New>DWORD Value.
3. Type HIDE_COMPARE_AND_MERGE and click ENTER.
4. Double-click HIDE_COMPARE_AND_MERGE.
5. Type 1 in the Value data field and then click ENTER.
Hide Document Information
The HIDE_EDOCSDM_DOCINFO setting allows you to hide the Document
Information item from the Office Button>Prepare drop-down menu. This
applies to both active and passive integration; however, for passive
integration, this appears on the DM tab.
To hide the Document Information item:
1. In the system registry editor, locate the following registry
key:
HKEY_LOCAL_MACHINE\SOFTWARE\Hummingbird\Hummingbird
DM Application Integration\Installation\Microsoft
2. Right-click Microsoft and select New>DWORD Value.
3. Type HIDE_EDOCSDM_DOCINFO and click ENTER.
4. Double-click HIDE_EDOCSDM_DOCINFO.
5. Type 1 in the Value data field and then click ENTER.
Hide About DM
The HIDE_EDOCSDM_ABOUT setting allows you to hide the About DM item
located in the Office Button drop-down menu. This is applicable only to
active integration.
To hide About DM:
1. In the system registry editor, locate the following registry
key:
HKEY_LOCAL_MACHINE\SOFTWARE\Hummingbird\Hummingbird
DM Application Integration\Installation\Microsoft
2. Right-click Microsoft and select New>DWORD Value.
3. Type HIDE_EDOCSDM_ABOUT and click ENTER.
4. Double-click HIDE_EDOCSDM_ABOUT.
5. Type 1 in the Value data field and then click ENTER.
MICROSOFT OFFICE REGISTRY KEY SETTINGS
387
Hide Insert>Footer
The HIDE_EDOCSDM_InsertFooter setting allows you to hide the Insert DM
Footer button from the Insert tab. This is applicable only to active
integration.
To hide the Insert DM Footer button:
1. In the system registry editor, locate the following registry
key:
HKEY_LOCAL_MACHINE\SOFTWARE\Hummingbird\Hummingbird
DM Application Integration\Installation\Microsoft
2. Right-click Microsoft and select New>DWORD Value.
3. Type HIDE_EDOCSDM_InsertFooter and click ENTER.
4. Double-click HIDE_EDOCSDM_InsertFooter.
5. Type 1 in the Value data field and then click ENTER.
Hide Update Links
The HIDE_EDOCSDM_UpdateLinks setting allows you to hide the Update Links
button from the Insert tab. This is applicable only to active integration.
This information is applicable only if you have DM Linking installed.
To hide the Update Links button:
1. In the system registry editor, locate the following registry
key:
HKEY_LOCAL_MACHINE\SOFTWARE\Hummingbird\Hummingbird
DM Application Integration\Installation\Microsoft
2. Right-click Microsoft and select New>DWORD Value.
3. Type HIDE_EDOCSDM_UpdateLinks and click ENTER.
4. Double-click HIDE_EDOCSDM_UpdateLinks.
5. Type 1 in the Value data field and then click ENTER.
Hide Mail Merge
The HIDE_EDOCSDM_MailMerge setting allows you to hide the Start Mail
Merge button on the Mailings tab. This applies to both active and passive
integration.
388
APPENDIX A
To hide the Start Mail Merge button:
1. In the system registry editor, locate the following registry
key:
HKEY_LOCAL_MACHINE\SOFTWARE\Hummingbird\Hummingbird
DM Application Integration\Installation\Microsoft
2. Right-click Microsoft and select New>DWORD Value.
3. Type HIDE_EDOCSDM_MailMerge and click ENTER.
4. Double-click HIDE_EDOCSDM_MailMerge.
5. Type 1 in the Value data field and then click ENTER.
Hide DM Merge Section
The HIDE_EDOCSDM_MAIL_MERGE_GROUP setting allows you to remove the
DM Merge section from the Mailings tab. This applies to both active and
passive integration.
To hide the DM Merge section:
1. In the system registry editor, locate the following registry
key:
HKEY_LOCAL_MACHINE\SOFTWARE\Hummingbird\Hummingbird
DM Application Integration\Installation\Microsoft
2. Right-click Microsoft and select New>DWORD Value.
3. Type HIDE_EDOCSDM_MAIL_MERGE_GROUP and click
ENTER.
4. Double-click HIDE_EDOCSDM_MAIL_MERGE_GROUP and then
click ENTER.
5. Type 1 in the Value data field and then click ENTER.
Hide Hyperlink Button
The HIDE_EDOCSDM_InsertHyperlink setting allows you to hide the Insert DM
Hyperlink button on the Insert tab. This is applicable only to active
integration.
This information is applicable only if you have DM Linking installed.
MICROSOFT OFFICE REGISTRY KEY SETTINGS
389
To hide the Insert DM Hyperlink button:
1. In the system registry editor, locate the following registry
key:
HKEY_LOCAL_MACHINE\SOFTWARE\Hummingbird\Hummingbird
DM Application Integration\Installation\Microsoft
2. Right-click Microsoft and select New>DWORD Value.
3. Type HIDE_EDOCSDM_InsertHyperlink and click ENTER.
4. Double-click HIDE_EDOCSDM_InsertHyperlink and then click
ENTER.
5. Type 1 in the Value data field and then click ENTER.
Hide DM Options from Insert Menu
The HIDE_EDOCSDM_GROUP setting allows you to hide the DM group of
options from appearing in the Insert tab. This is applicable only to active
integration.
To hide DM options in the Insert tab:
1. In the system registry editor, locate the following registry
key:
HKEY_LOCAL_MACHINE\SOFTWARE\Hummingbird\Hummingbird
DM Application Integration\Installation\Microsoft
2. Right-click Microsoft and select New>DWORD Value.
3. Type HIDE_EDOCSDM_GROUP and click ENTER.
4. Double-click HIDE_EDOCSDM_GROUP and then click ENTER.
5. Type 1 in the Value data field and then click ENTER.
Microsoft Word
Footer Options
The Microsoft Word DM footer custom functions settings are stored
within the following application-specific location in the registry:
HKEY_CURRENT_USER\Software\Hummingbird\PowerDOCS\AppIntegration\
Word\Options
Show DM Footer Options Dialog Box
The SHOW_OPTIONS_DIALOG setting determines if the DM Footer Options
dialog box appears when a user inserts a DM footer. The user can select
which items appear in the DM footer from this dialog box. This setting
390
APPENDIX A
is enabled by default. This applies to both active and passive
integration.
To configure the Show DM Footer Options Dialog Box option:
1. In the system registry editor, locate the following registry
key:
HKEY_CURRENT_USER\Software\Hummingbird\PowerDOCS\
AppIntegration\Word\Options
2. Create or modify the SHOW_OPTIONS_DIALOG DWORD Value
using one of the following values:
•
1 (Enabled)
•
0 (Disabled)
3. Click OK.
NOTE: All of the following registry settings do not exist until the DM
Footer Options dialog box is displayed and closed. Once the user
makes or clears the check boxes on this dialog box and clicks OK, the
settings are then written to the registry.
Run Footer on Save As Operation
The RUNONSAVEAS setting determines if the footer runs when the user
performs a Save As operation. This applies to both active and passive
integration.
To configure the Run Footer on Save As Operation option:
1. In the system registry editor, locate the following registry
key:
HKEY_CURRENT_USER\Software\Hummingbird\PowerDOCS\
AppIntegration\Word\Options
2. Create or modify the RUNONSAVEAS DWORD Value using one
of the following values:
•
1 (Enabled)
•
0 (Disabled)
3. Click OK.
Run Autosave When Footer Runs
The AUTOSAVE setting determines if Word performs a save every time the
footer is run. This applies to both active and passive integration.
MICROSOFT OFFICE REGISTRY KEY SETTINGS
391
To configure the Run Autosave option:
1. In the system registry editor, locate the following registry
key:
HKEY_CURRENT_USER\Software\Hummingbird\PowerDOCS\
AppIntegration\Word\Options
2. Create or modify the AUTOSAVE DWORD Value using one of
the following values:
•
1 (Enabled)
•
0 (Disabled)
3. Click OK.
Include Document Number
The INCLUDE_DOC_NUMBER setting indicates if the document number
appears in the Microsoft Word DM footer. This applies to both active
and passive integration.
To configure the Include Document Number option:
1. In the system registry editor, locate the following registry
key:
HKEY_CURRENT_USER\Software\Hummingbird\PowerDOCS\App
Integration\Word\Options
2. Create or modify the INCLUDE_DOC_NUMBER DWORD Value
using one of the following values:
•
1 (Enabled)
•
0 (Disabled)
3. Click OK.
Include Version Label
The INCLUDE_VERSION_LABEL setting indicates if the version label appears
in the Microsoft Word DM footer. This applies to both active and
passive integration.
To configure the Include Version Label option:
1. In the system registry editor, locate the following registry
key:
HKEY_CURRENT_USER\Software\Hummingbird\PowerDOCS\App
Integration\Word\Options
392
APPENDIX A
2. Create or modify the INCLUDE_VERSION_LABEL DWORD Value
using one of the following values:
•
1 (Enabled)
•
0 (Disabled)
3. Click OK.
Include Document Name
The INCLUDE_DOC_NAME setting indicates if the document name appears
in the Microsoft Word DM footer. This applies to both active and
passive integration.
To configure the Include Document Name option:
1. In the system registry editor, locate the following registry
key:
HKEY_CURRENT_USER\Software\Hummingbird\PowerDOCS\AppIn
tegration\
Word\Options
2. Create or modify the INCLUDE_DOC_NAME DWORD Value
using one of the following values:
•
1 (Enabled)
•
0 (Disabled)
3. Click OK.
Include Document Author
The INCLUDE_DOC_AUTHOR setting indicates if the document author
appears in the Microsoft Word DM footer. This applies to both active
and passive integration.
To configure the Include Document Author option:
1. In the system registry editor, locate the following registry
key:
HKEY_CURRENT_USER\Software\Hummingbird\PowerDOCS\App
Integration\Word\Options
2. Create or modify the INCLUDE_DOC_AUTHOR DWORD Value
using one of the following values:
•
1 (Enabled)
•
0 (Disabled)
MICROSOFT OFFICE REGISTRY KEY SETTINGS
393
3. Click OK.
Include Document Type
The INCLUDE_DOC_TYPE setting indicates if the document type appears in
the Microsoft Word DM footer. This applies to both active and passive
integration.
To configure the Include Document Type option:
1. In the system registry editor, locate the following registry
key:
HKEY_CURRENT_USER\Software\Hummingbird\PowerDOCS\AppIn
tegration\
Word\Options
2. Create or modify the INCLUDE_DOC_TYPE DWORD Value
using one of the following values:
•
1 (Enabled)
•
0 (Disabled)
3. Click OK.
Include Application
The INCLUDE_APPLICATION setting indicates if the application ID appears
in the Microsoft Word DM footer. This applies to both active and
passive integration.
To configure the Include Application option:
1. In the system registry editor, locate the following registry
key:
HKEY_CURRENT_USER\Software\Hummingbird\PowerDOCS\App
Integration\Word\Options
2. Create or modify the INCLUDE_APPLICATION DWORD Value
using one of the following values:
•
1 (Enabled)
•
0 (Disabled)
3. Click OK.
394
APPENDIX A
Include Abstract
The INCLUDE_ABSTRACT setting indicates if the abstract (description)
appears in the Microsoft Word DM footer. This applies to both active
and passive integration.
To configure the Include Abstract option:
1. In the system registry editor, locate the following registry
key:
HKEY_CURRENT_USER\Software\Hummingbird\PowerDOCS\App
Integration\Word\Options
2. Create or modify the INCLUDE_ABSTRACT DWORD Value using
one of the following values:
•
1 (Enabled)
•
0 (Disabled)
3. Click OK.
Include Date and Time
The INCLUDE_DATE_TIME setting indicates if the last edited date and time
appears in the Microsoft Word DM footer. This applies to both active
and passive integration.
To configure the Include Date and Time option:
1. In the system registry editor, locate the following registry
key:
HKEY_CURRENT_USER\Software\Hummingbird\PowerDOCS\
AppIntegration\Word\Options
2. Create or modify the INCLUDE_DATE_TIME DWORD Value
using one of the following values:
•
1 (Enabled)
•
0 (Disabled)
3. Click OK.
Microsoft Excel
Footer Options
The Microsoft Excel DM footer custom functions settings are stored
within the following application-specific location in the registry:
HKEY_CURRENT_USER\Software\Hummingbird\PowerDOCS\AppIntegration\
Excel\Options
MICROSOFT OFFICE REGISTRY KEY SETTINGS
395
Show DM Footer Options Dialog Box
The SHOW_OPTIONS_DIALOG setting determines if the DM Footer Options
dialog box appears when a user inserts a DM footer. This dialog box
allows the user to select which items appear in the DM footer. This
setting is enabled by default. This applies to both active and passive
integration.
To configure the Show DM Footer Options Dialog Box option:
1. In the system registry editor, locate the following registry
key:
HKEY_CURRENT_USER\Software\Hummingbird\PowerDOCS\App
Integration\Excel\Options
2. Create or modify the SHOW_OPTIONS_DIALOG DWORD Value
using one of the following values:
•
1 (Enabled)
•
0 (Disabled)
3. Click OK.
NOTE: All of the following registry settings do not exist until the DM
Footer Options dialog box is displayed and closed. Once the user
makes or clears the check boxes on this dialog box and clicks OK, the
settings are then written to the registry.
Run Footer on Save As Operation
The RUNONSAVEAS setting determines if the footer runs when the user
performs a Save As operation. This applies to both active and passive
integration.
To configure the Run Footer of Save As Operation option:
1. In the system registry editor, locate the following registry
key:
HKEY_CURRENT_USER\Software\Hummingbird\PowerDOCS\App
Integration\Excel\Options
2. Create or modify the RUNONSAVEAS DWORD Value using one
of the following values:
•
1 (Enabled)
•
0 (Disabled)
3. Click OK.
396
APPENDIX A
Run Autosave When Footer Runs
The AUTOSAVE setting determines if Excel performs a save every time the
footer is run. This applies to both active and passive integration.
To configure the Run Autosave When Footer Runs option:
1. In the system registry editor, locate the following registry
key:
HKEY_CURRENT_USER\Software\Hummingbird\PowerDOCS\App
Integration\Excel\Options
2. Create or modify the AUTOSAVE DWORD Value using one of
the following values:
•
1 (Enabled)
•
0 (Disabled)
3. Click OK.
Include Document Number
The INCLUDE_DOC_NUMBER setting indicates if the document number
appears in the Microsoft Excel DM footer. This applies to both active
and passive integration.
To configure the Include Document Number option:
1. In the system registry editor, locate the following registry
key:
HKEY_CURRENT_USER\Software\Hummingbird\PowerDOCS\
AppIntegration\Excel\Options
2. Create or modify the INCLUDE_DOC_NUMBER DWORD Value
using one of the following values:
•
1 (Enabled)
•
0 (Disabled)
3. Click OK.
Include Version Label
The INCLUDE_VERSION_LABEL setting indicates if the version label appears
in the Microsoft Excel DM footer. This applies to both active and
passive integration.
MICROSOFT OFFICE REGISTRY KEY SETTINGS
397
To configure the Include Version Label option:
1. In the system registry editor, locate the following registry
key:
HKEY_CURRENT_USER\Software\Hummingbird\PowerDOCS\AppIn
tegration\Excel\Options
2. Create or modify the INCLUDE_VERSION_LABEL DWORD Value
using one of the following values:
•
1 (Enabled)
•
0 (Disabled)
3. Click OK.
Include Document Name
The INCLUDE_DOC_NAME setting indicates if the document name appears
in the Microsoft Excel DM footer. This applies to both active and
passive integration.
To configure the Include Document Name option:
1. In the system registry editor, locate the following registry
key:
HKEY_CURRENT_USER\Software\Hummingbird\PowerDOCS\App
Integration\Excel\Options
2. Create or modify the INCLUDE_DOC_NAME DWORD Value
using one of the following values:
•
1 (Enabled)
•
0 (Disabled)
3. Click OK.
Include Document Author
The INCLUDE_DOC_AUTHOR setting indicates if the document author
appears in the Microsoft Excel DM footer. This applies to both active
and passive integration.
To configure the Include Document Author option:
1. In the system registry editor, locate the following registry
key:
HKEY_CURRENT_USER\Software\Hummingbird\PowerDOCS\AppIn
tegration\Excel\Options
398
APPENDIX A
2. Create or modify the INCLUDE_DOC_AUTHOR DWORD Value
using one of the following values:
•
1 (Enabled)
•
0 (Disabled)
3. Click OK.
Include Document Type
The INCLUDE_DOC_TYPE setting indicates if the document type appears in
the Microsoft Excel DM footer. This applies to both active and passive
integration.
To configure the Include Document Type option:
1. In the system registry editor, locate the following registry
key:
HKEY_CURRENT_USER\Software\Hummingbird\PowerDOCS\
AppIntegration\Excel\Options
2. Create or modify the INCLUDE_DOC_TYPE DWORD Value
using one of the following values:
•
1 (Enabled)
•
0 (Disabled)
3. Click OK.
Include Application
The INCLUDE_APPLICATION setting indicates if the application ID appears
in the Microsoft Excel DM footer. This applies to both active and
passive integration.
To configure the Include Application option:
1. In the system registry editor, locate the following registry
key:
•
HKEY_CURRENT_USER\Software\Hummingbird\PowerDOCS\
AppIntegration\Excel\Options
2. Create or modify the INCLUDE_APPLICATION DWORD Value
using one of the following values:
•
1 (Enabled)
•
0 (Disabled)
3. Click OK.
MICROSOFT OFFICE REGISTRY KEY SETTINGS
399
Include Abstract
The INCLUDE_ABSTRACT setting indicates if the abstract (description)
appears in the Microsoft Excel DM footer. This applies to both active
and passive integration.
To configure the Include Abstract option:
1. In the system registry editor, locate the following registry
key:
HKEY_CURRENT_USER\Software\Hummingbird\PowerDOCS\
AppIntegration\Excel\Options
2. Create or modify the INCLUDE_ABSTRACT DWORD Value using
one of the following values:
•
1 (Enabled)
•
0 (Disabled)
3. Click OK.
Include Date and Time
The INCLUDE_DATE_TIME setting indicates if the last edited date and time
appears in the Microsoft Excel DM footer. This applies to both active
and passive integration.
To configure the Include Date and Time option:
1. In the system registry editor, locate the following registry
key:
HKEY_CURRENT_USER\Software\Hummingbird\PowerDOCS\App
Integration\Excel\Options
2. Create or modify the INCLUDE_DATE_TIME DWORD Value
using one of the following values:
•
1 (Enabled)
•
0 (Disabled)
3. Click OK.
Microsoft
PowerPoint Footer
Options
400
APPENDIX A
The Microsoft PowerPoint DM footer custom functions settings are
stored within the following application-specific location in the registry:
HKEY_CURRENT_USER\Software\Hummingbird\PowerDOCS\AppIntegration\
PowerPoint\Options
You cannot customize the Microsoft PowerPoint footer like you can in
Microsoft Word and Excel; this is a Microsoft limitation.
Run Footer on Save As Operation
The RUNONSAVEAS setting determines if the footer runs when a user
performs a Save As operation. This setting is enabled by default. This
applies to both active and passive integration.
To configure the Run Footer on Save As Operation option:
1. In the system registry editor, locate the following registry
key:
HKEY_CURRENT_USER\Software\Hummingbird\PowerDOCS\
AppIntegration\PowerPoint\Options
2. Create or modify the RUNONSAVEAS DWORD Value using one
of the following values:
•
1 (Enabled)
•
0 (Disabled)
3. Click OK.
Run Autosave When Footer Runs
The AUTOSAVE setting determines if PowerPoint performs a save every
time the footer is run. This setting is disabled by default. This applies to
both active and passive integration.
To configure the Run Autosave When Footer Runs option:
1. In the system registry editor, locate the following registry
key:
HKEY_CURRENT_USER\Software\Hummingbird\PowerDOCS\
AppIntegration\PowerPoint\Options
2. Create or modify the AUTOSAVE DWORD Value using one of
the following values:
•
1 (Enabled)
•
0 (Disabled)
3. Click OK.
Log File Options
You can set the following debugging and log file options for COM
Automation:
MICROSOFT OFFICE REGISTRY KEY SETTINGS
401
Generate Log File
The LOG_TO_FILE setting determines if a log file is generated. This setting
is enabled by default.
To generate a log file for COM Automation:
1. In the system registry editor, locate the following registry
key:
HKEY_LOCAL_MACHINE\SOFTWARE\Hummingbird\Hummingbird
DM Application Integration\Installation\Microsoft
2. Create or modify the LOG_TO_FILE DWORD Value using one
of the following values:
•
1 (Enabled)
•
0 (Disabled)
3. Click OK.
Log File Location
The LOG_FILE_LOCATION setting indicates the log file location.
To define the log file location:
1. In the system registry editor, locate the following registry
key:
HKEY_LOCAL_MACHINE\SOFTWARE\Hummingbird\
Hummingbird DM Application
Integration\Installation\Microsoft
1. Create or modify the LOG_FILE_LOCATION String Value using
one of the following:
•
Any complete, valid path to a location.
•
My Documents location.
•
%USER% - When set to %USER%, the log file is created in
the user’s specific Application Data location. For
example, C:\Documents and Settings\<user
name>\Application Data\Hummingbird\DM.
2. Press ENTER.
Continuous Log Option
The CONTINUOUS_LOG setting determines if the log file is overwritten each
time an Office application is started. When this setting is enabled, the
log file is appended. This setting is disabled by default.
402
APPENDIX A
NOTE: You should enable this setting only when instructed to do so
by Open Text technical support or for troubleshooting purposes.
To configure whether the log file is overwritten:
1. In the system registry editor, locate the following registry
key:
HKEY_LOCAL_MACHINE\SOFTWARE\Hummingbird\Hummingbird
DM Application Integration\Installation\Microsoft
2. Create or modify the CONTINUOUS_LOG DWORD Value using
one of the following values:
•
1 (Enabled)
•
0 (Disabled)
3. Click OK.
Modifying the Attaché Menu
A registry key determines whether the Replace Original Attaché menu
option appears in the Import Undocked Documents dialog box when you
save new documents, versions or subversions, or when you import a
document.
To configure the Replace Original menu option through a registry
key:
1. Click Start>Run.
2. In the Run dialog box, type regedit in the Open field, and
then click OK. The Registry Editor opens.
3. Locate the following key:
HKEY_CURRENT_USER\Software\Hummingbird\
PowerDOCS\Core\Plugins\Fusion\Settings
1. Select Edit>New>DWORD Value; enter the following:
NoReplaceOriginal.
1. Double-click NoReplaceOriginal. In the Value data field, type
one of the following values:
0= If NoReplaceOriginal=0 or no value exists, the
Replace Original option is available on the Import Undocked
Documents window in the Action menu.
MODIFYING THE ATTACHÉ MENU
403
1 = If NoReplaceOriginal=1, then the Replace Original
menu item is not an available option.
2. Select File>Exit, or if you need to export the file to use as a
custom component in a deployment package, select
File>Export and export the key to a .reg file.
Preventing Content Searches in Easy Searches
An Easy Search combines content and profile searches; however, you
can restrict the content search type by manually creating a registry key:
To prevent content searches in Easy Searches:
1. Select Start>Run.
2. Type regedit in the Open field and then click OK.
3. The Registry Editor opens. Locate the following key in the
registry:
HKEY_CURRENT_USER\Software\Hummingbird\
PowerDOCS\Core\Plugins\Fusion\Forms\QR
4. Select the QR key, and then select Edit>New>DWORD Value.
5. In the Value field, enter SearchType.
6. Double-click SearchType, and then enter 0 in the Value data
field.
NOTE: This registry setting is for the three-pane Quick Retrieve form
only.
Preventing Non-English Characters from Being
Replaced when Using Document Import Utility
To prevent invalid characters from replacing non-English characters
(Windows extended character set) when using the ASCII text option in
the Document Import Utility, you must place the following lines in the
pcdocs.ini file:
[Translator]
Translate=Yes
404
APPENDIX A
For example, if importing the ASCII file from an English DM server,
this pcdocs.ini file setting prevents the [é] character from being
replaced with [T]. Similarily, if importing the same file from a French
DM server, this prevents the letter [é] from being replaced with [Ù].
Renaming Documents E-mailed as Attachments
When you e-mail a document, you can rename the document file or the
.drf file that links to the document. You can set the file name manually,
or you can set DM Extensions to create a file name based on criteria you
specify.
To use the Rename on Mail feature:
1. Ensure that DM Extensions and DM Extension for
Microsoft Outlook are installed.
2. Click Start>Run, type regedit, and then click OK.
3. The Registry Editor opens; locate the following registry key:
HKEY_CURRENT_USER\Software\Hummingbird\
PowerDOCS\Core\Plugins\Fusion\Forms\Mail
If the Forms\Mail node does not exist in the registry, you can
create it automatically by using the Mail function in DM
Extension for Microsoft Outlook. Complete the steps below.
To create the Forms\Mail node automatically using DM Extension
for Microsoft Outlook:
1. Close the Registry Editor.
2. Open DM Extension for Microsoft Outlook.
3. Select a document and click the Mail icon or right-click the
document and select Mail. The Document Mailing Options
dialog box appears.
4. Click Cancel to close the Document Mailing Options dialog
box.
5. Open the Registry Editor and return to step 3 above; the
Forms\Mail node will appear in the registry.
6. Click Edit>New>DWORD Value; enter AllowEditDocName.
4. Double-click AllowEditDocName.
5. In the Value data field, enter one of the following values:
RENAMING DOCUMENTS E-MAILED AS ATTACHMENTS
405
0 - User cannot edit the document name.
1 - User can edit the document name.
6. Click OK.
7. In the Forms\Mail node, click Edit>New>String Value.
8. Type AttachNameFormat.
9. Double-click AttachNameFormat.
10. In the Value data field, enter one of the following parameters:
[DocName] - Inserts the Document Name in the
document file name.
[DocNumber] - Inserts the Document Number in the
document file name.
[Version] - Inserts the Document Version in the
document file name.
[Library] - Inserts the document’s Library in the
document file name.
You can also enter plain text in the AttachNameFormat string to
further describe the file. For example, a user e-mails a Word document
named “Report” from the library named “Main.” If you
enter"[DocName] from the [Library] library" in the
AttachNameFormat string, the resulting file name would be “Report
from the Main library.DOC.DRF”.
When you use the [DocName], [DocNumber], [Version], or
[Library] parameters, ensure that the parameters are enclosed in
brackets ([]).
You must enter text in the AttachNameFormat string. If no text is
entered, the file name will contain only the document file-type
extension (such as “.DOC” for Word files or “.XLS” for Excel files). If a
reference is being mailed, the file name will only contain the document
file-type extension and the extension “.DRF”.
You must include the [DocName] parameter in the
AttachNameFormat string if you want user-edited document names
to appear in the file name. If the [DocName] parameter is not used, the
document name will not be included in the file name, even though the
user may have edited the name.
After you define the AllowEditDocName and AttachNameFormat
keys, click File>Exit .
406
APPENDIX A
Renaming E-mail Attachments in GroupWise
You have the ability to rename GroupWise e-mail attachments by
adding the following registry key values. There are two new registry
keys under:
HKEY_CURRENT_USER\Software\Hummingbird\PowerDOCS\
Core\Plugins\Fusion\Forms\Mail
•
AllowEditDocName — DWORD, Values of 1 or 0
•
AttachNameFormat — String
If the first key exists and is equal to 1, the user can edit the Document
name field.
If the second key exists and has the following format, then the
attachment name is changed, regardless of the format values;
otherwise, the behavior will be the same as in previous DM versions.
•
Doc Number - [DocNumber]
•
Doc Name - [DocName]
•
Version - [Version]
•
Library - [Library]
•
My Library # - [Library]
•
Document Number # - [DocNumber]
•
Name - [DocName]
•
[Library] - [DocNumber]
There are four possible values that could be used and replaced with real
document values:
•
•
[DocNumber] - document number
[DocName] - document name (the one that could be
edited)
•
[Version] - document version
•
[Library] - library name
RENAMING E-MAIL ATTACHMENTS IN GROUPWISE
407
Renaming Workspace and Public Folder Nodes in the
Explorer View
You can rename the Workspace and Public Folder nodes in DM Extension
for Windows Explorer.
To rename Workspace and Public Folder nodes:
1. Open the Patchresources6.ini file from Program Files\Open
Text\DM Extensions.
2. Make the following changes:
•
To rename the Workspace node, edit the value for
16=string.
•
To rename the Public Folders node, edit the value for
18=string.
3. Save the changed file. The edited string will now appear in
the Explorer view.
This will only change the visible labels in the tree; it will not change any
menu or search labels.
Requirement for Users to Select Destination Folder
When Using Profile on Send Feature
In DM Extension for Microsoft Outlook, a feature enables you to
require users to select a destination folder when using the Profile on Send
e-mail feature.
You must enable the Profile on Send feature for this enhancement to
work. If the option Require profiling of sent e-mails is selected, when users
send a new e-mail, they must select a folder to which the profiled
message is added. If the Require profiling of sent e-mails option is not
selected, the user may optionally cancel out of this process. The option
Require profiling of sent e-mails can be accessed using the Client
Deployment Utility on the Document management Plug-in>E-mail
Integration>Profile on Send tab.
408
APPENDIX A
To enable requiring users to select a folder to which a saved
message will be added:
1. Select Start>Run from the Windows desktop.
2. Enter regedit in the Open field. The Registry Editor opens.
3. Locate the following key:
HKEY_LOCAL_MACHINE\SOFTWARE\Hummingbird\
Email Integration\1.5\Settings\LIBRARY
4. Double-click the SaveToFolder value; enter the number 1 in
the Value data field.
5. Click OK.
6. Click File>Exit.
Saving Full E-mail Addresses in Outlook Integration
You can configure a registry key to capture the e-mail addresses in the
To, From, CC, and BCC fields as the full e-mail addresses when you save an
e-mail message. For example, the profiled e-mail message would show
John Doe <jdoe@xyz.com> instead of only saving the display name, John
Doe.
To configure Outlook Integration to capture full e-mail addresses:
1. Click Start>Run, type regedit, and click OK. The Registry
Editor opens.
2. Locate the following registry key:
HKEY_LOCAL_MACHINE/Software/Hummingbird/
Email Integration/1.5/Settings
3. Double-click UseOldEmailAddresses.
4. Type 0 (the default is 1), to save the full e-mail address in
the format Display Name <email@address>.
Setting Folder Display Names in Workspaces
The UseDocNameInFolderContents setting in the pcdocs.ini file determines
whether users can edit the display name for selected workspaces and
folders.
SAVING FULL E-MAIL ADDRESSES IN OUTLOOK INTEGRATION
409
If you have multiple DM libraries listed in your pcdocs.ini file, you
must configure the UseDocNameInFolderContents setting for each library.
Any library section not configured will use the default setting.
Set the UseDocNameInFolderContents entry to
UseDocNameInFolderContents=0 (the default setting), to use
display names in the workspace tree, in workspace contents, and in
folders. If a display name has not been set, the display name uses the
document name.
Set the UseDocNameInFolderContents entry to
UseDocNameInFolderContents=1 to use document names in the
workspace tree, in workspace contents, and in folders. The document
name is correctly updated in the workspace when it is edited in the
Profile, Recently Edited Documents, or Search Results list.
Setting the Default View in Recently Edited
Documents
In DM Extension for Microsoft Outlook, you can set the default view
in the Recently Edited Documents (RED) list to show all documents,
only e-mail messages, or documents without e-mail messages. In order
to implement this feature, you must add a registry key and modify
another registry key, which will disable the use of the DM Server RED
list.
NOTE: You must disable the DM Server RED list in order to implement
this enhancement.
To set the Default view in the Recently Edited Documents list:
1. Select Start>Run from the Windows desktop.
2. Enter regedit in the Open field. The Registry Editor is
opened.
3. Locate or create the following key:
HKEY_CURRENT_USER\Software\Hummingbird\
PowerDOCS\Core\Plugins\Fusion\Settings\QuickSearches
4. Select the registry key and select Edit>New>String Value.
5. Enter RED Filter as the new string value.
410
APPENDIX A
6. Double-click RED Filter. Enter one of the following values in
the Value data field:
0 - Display all documents in the RED list. This is the default
value.
1 - Exclude e-mail messages from the RED list.
2 - Display only e-mail messages in the RED list.
You must disable the DM Server Recently Edited Documents list in
order to complete the implementation of this enhancement. Use one of
the methods in the sections below.
Disabling DM
Server RED List
Using Client
Deployment Utility
Disabling DM
Server RED List
Using Registry
Editor
One method of disabling the DM Server RED list is through the Client
Deployment Utility.
To disable the DM Server Recently Edited Documents list using
the Client Deployment Utility:
1. Open the Client Deployment Utility. The Microsoft
Management Console opens.
2. Click the plus sign (+) to expand the DM Client Deployment
Utility tree.
3. Click the plus sign (+) to expand the Plug-ins tree. If
prompted, log on to DM.
4. Select the Document Management Plug-in>General tab.
5. Clear the Use DM Server RED option.
Another method of disabling the DM Server RED list is through
Window’s Registry Editor.
To disable the DM Server Recently Edited Documents list through
the registry:
1. Select Start>Run from the Windows desktop.
2. Enter regedit in the Open field. The Registry Editor opens.
3. Locate the following key:
HKEY_CURRENT_USER\Software\Hummingbird\
PowerDOCS\Core\Plugins\Fusion\Settings\QuickSearches
4. Double-click the Use DOCSFusion RED key and then enter 0
(zero) in the Value data field.
5. Click File>Exit.
SETTING THE DEFAULT VIEW IN RECENTLY EDITED DOCUMENTS
411
Sorting the Library List Alphabetically
In DM, the primary library appears first in the list, and subsequent
libraries are sorted alphabetically. When you implement the following
registry change, all libraries are sorted alphabetically, regardless of the
primary library.
To create the registry setting to sort all libraries alphabetically:
1. Select Start>Run from the Windows desktop.
2. Enter regedit in the Open field. The Registry Editor opens.
3. Create the following registry key:
HKEY_LOCAL_MACHINE\Software\Hummingbird\
PowerDOCS\Explorer
4. Select the Explorer key, and then select Edit>New>DWORD
Value.
5. In the Value field, enter SortPrimaryLibrary.
6. Double-click SortPrimaryLibrary, and then enter 1 in the Value
data field.
Specifying the Location of DM Server DMP Files
You can specify the location where DM Server DMP files will be
created, as well as limit the number of DMP files created, by modifying
a registry key.
To configure, you must add or modify the following registry
values:
1. Select Start>Run from the Windows desktop.
2. Enter regedit in the Open field. The Registry Editor opens.
3. Locate or create the following key:
[HKEY_Local_Machine\Software\Hummingbird\
DOCSFusion]
4. Select the registry key and select Edit>New>String Value.
5. Enter DumpPath as the new string value.
6. Double-click DumpPath.
412
APPENDIX A
7. In the Value data field, enter the path where you want to
create the DMP files.
8. Click OK.
9. Select the registry key and select Edit>New>DWORD Value.
10. Enter DumpLimit as the new value.
11. Double-click DumpLimit.
12. In the Value data field, enter the maximum number of DMP
files that you want to create.
13. Click OK.
Supporting the Microsoft Excel Indirect Function
An enhancement enables support for the Microsoft Excel Indirect
function. The Indirect function returns the reference specified by a text
string; however, the structure of DM file names interferes with this
feature.
This enhancement provides support for a File Name template registry
setting which can be used to remove symbols from the DM file name.
To enable this feature:
1. Click Start>Run.
2. In the Run dialog box, type regedit in the Open field, and
then click OK. The Registry Editor opens.
3. Locate the following key:
HKEY_LOCAL_MACHINE\SOFTWARE\Hummingbird\P
owerDOCS\Core\Plugins\Fusion\Settings
4. Double-click (Default) REG_SZ; in the Value data field, enter
the File Name Template value. You should set it to a value
that does not contain the “#” symbol. For example:
%LibraryName%-n%DocumentNumber%v%VersionLabel%-%DocumentName%
•
Do not change the order of the field values or the field
values themselves.
•
You can only use alphanumeric characters.
•
You must use an underscore for blank spaces between
the field values.
SUPPORTING THE MICROSOFT EXCEL INDIRECT FUNCTION
413
5. Select File>Exit, or if you need to export the file to use as a
custom component in a deployment package, select
File>Export and export the key to a .reg file.
Supporting OTDS Authentication
As of eDOCS DM 5.3 Patch 3, the UseEnhancedDST DWORD registry
value was added to the DM Server configuration to control how a DST
is constructed and parsed:
HKEY_LOCAL_MACHINE\Software\Hummingbird\DOCSFusion\
Security\UseEnhancedDST
To support OTDS authentication you must add an additional token
value to the DST structure; this change makes DSTs created by nonOTDS-aware and OTDS-aware servers incompatible. Any value greater
than zero (0) will cause an OTDS-aware server to construct the DST
with the new token value; otherwise, the server will continue to use the
non-OTDS-aware DST structure.
All servers in a cluster must use the same DST structure to retain
compatibility. The UseEnhancedDST value will be populated with a
value of 1 to enable OTDS-aware behavior by the DM/OTDS
Configuration Tool.
Tracking Open DM Documents When a Windows
Session Terminates
A utility, Term Tracker (DMTermTracker.exe), allows DM to track
documents remaining open for editing when a Windows session
terminates from a user logoff, reboot, or shutdown. If any documents
are found, DM alerts the user through the following warning prompt
dialog box, which allows the user to save any unsaved edits before the
Windows session terminates.
“Please close the following open document(s) before DM can close:
<LIBRARY-#XXXXXX - vX - Document Name.xxx>
Select Cancel to ignore this alert.
OK Cancel”
414
APPENDIX A
To use the Term Tracker utility, you must place the
DMTermTracker.exe file in the ..\Startup directory on the user’s
machine.
Using Front-End Profiling in Mixed Microsoft Word
2003/2007 Environments
To allow your users the ability to use front-end profiling with both
Microsoft Word 2003 and 2007 *.doc and *.docx file extensions, you
must configure a registry key setting on the user workstations.
To configure the registry key:
1. Open Registry Editor (regedit.exe).
2. Ensure the following registry key exists (this enables frontend profiling):
[HKEY_LOCAL_MACHINE\SOFTWARE\Hummingbird\
PowerDOCS\AppIntegration\FrontEnd]
"MS WORD"=dword:00000001
3. To handle the *.doc file extension, locate and/or create the
following registry keys:
[HKEY_CLASSES_ROOT\.doc]
"Content Type"="application/msword"
@="Word.Document.8"
[HKEY_CLASSES_ROOT\.doc\Word.Document.8\
ShellNew]
"FileName"="winword8.doc"
4. To handle the *.docx file extension, locate and/or create the
following registry keys:
[HKEY_CLASSES_ROOT\.docx]
"Content Type"="application/vnd.openxmlformatsofficedocument.wordprocessingml.document"
@="Word.Document.12"
"PerceivedType"="document"
[HKEY_CLASSES_ROOT\.docx\Word.Document.12\Shell
New]
"FileName"="winword12.docx"
USING FRONT-END PROFILING IN MIXED MICROSOFT WORD 2003/2007 ENVIRONMENTS
415
5. Start Windows Explorer and navigate to the
C:\Windows\ShellNew folder.
6. Place a blank Word 2003 formatted document named
winword8.doc in the ShellNew folder.
7. Place a blank Word 2007 formatted document named
winword12.docx in the ShellNew folder.
Front End Profiling will use winword8.doc if the eDOCS DM database
is configured to use the *.doc file extension. It will use winword12.docx
if the database is configured to use the *.docx file extension.
Using the dmviews.dat File to Configure Views for
Multiple Users
After a user opens Microsoft Outlook, accesses the DM node, and then
closes Outlook, the dmviews.dat file is created, by default, in
C:\Documents and Settings\<user name>\Application Data\Open
Text\DM\Settings.
The dmviews.dat file is an OLE Structured Storage file with a section
for each view that is stored. The name of each section comes from the
DetailColKey property for the folder in DM Extensions; all folders with
the same DetailColKey will share the same view. You can use this file to
configure a default view and then push the file out to other users, by
replacing their dmviews.dat file with the one you configure.
To configure a default view in DM Extension for Microsoft
Outlook:
1. Locate and delete the dmviews.dat file in C:\Documents
and Settings\<user name>\Application Data\Open
Text\DM\Settings.
• Start Microsoft Outlook.
• Click View>Current View>Customize Current View.
• The Customize View: PowerDOCS dialog box appears,
and configure any of the following:
• Fields
• Group By
• Sort
416
APPENDIX A
•
Filter
•
Other Settings
•
Automatic Formatting
•
Format Columns
2. Click OK.
3. Use the View menu to configure any other type of view, such
as the Reading Pane.
4. When you are finished, exit Microsoft Outlook.
5. A new dmviews.dat file is created in the default location,
which now contains the configuration information for the
views in Microsoft Outlook. Copy the dmviews.dat file and
paste it in any other users ...\Open Text\DM\Settings
location to use the same views configuration. This will
replace their current dmviews.dat file.
Using the IgnoreProcess Registry Key for Applications
Using Interceptor
A registry key allows you to identify a process (or multiple processes)
that Interceptor should ignore, in case those applications conflict with
Interceptor, or are adversely affected by Interceptor (such as causing
100 percent CPU utilization).
To ignore processes with the IgnoreProcess registry key:

Modify one of the following registry keys with a semicolondelimited list of process names:
HKEY_LOCAL_MACHINE\SOFTWARE\Hummingbird\
PowerDOCS\AppIntegration\Interceptor
IgnoreProcess : REG_SZ
or
HKEY_CURRENT_USER\Software\Hummingbird\
PowerDOCS\AppIntegration\Interceptor
IgnoreProcess : REG_SZ
USING THE IGNOREPROCESS REGISTRY KEY FOR APPLICATIONS USING INTERCEPTOR
417
Using the SaveSeparately Registry Key to Select or
Clear the Save Separately Check Box
You can use the SaveSeparately registry key to automatically select or
clear the Save Separately check box on the users’ Profile forms when they
save e-mail messages and/or attachments.
To use the SaveSeparately registry key:
1. Open the Registry editor on the user’s computer.
2. Locate the following registry key:
HKEY_CURRENT_USER\Software\Hummingbird\Email
Integration\1.5\SaveForm
3. Right-click SaveForm and select New DWORD Value.
4. Type SaveSeparately and press ENTER.
5. Double-click SaveSeparately and type one of the following
values in the Value data field:
0 - Clears the Save Separately check box.
1 - Selects the Save Separately check box.
6. Click OK.
Viewing TIFF Images in Viewer Add-ons Pane
You can ensure that a TIFF file image appears in the Viewer Add-ons
pane when you open one from a search results list by modifying a
registry key.
To set TIFF files to open in the Viewer Add-on pane:
1. Click Start>Run, type regedit, and then click OK. The
Registry Editor opens.
2. Locate the following registry key:
HKEY_LOCAL_MACHINE\SOFTWARE\Hummingbird\
PowerDOCS\Settings\Viewer
3. Right-click Viewer and click New>DWORD Value.
4. Type ShowTif and press ENTER.
5. Double-click ShowTif and type one of the following values:
1 = Enabled
418
APPENDIX A
0 = Disabled
6. Click OK.
Warning Message Indicates Document Profile Form Is
Already in Use
You can configure a registry key to make a warning message appear
when multiple users edit a Document Profile form simultaneously.
To make a warning message appear when multiple users edit a
Profile form:
1. Click Start>Run, type regedit, and click OK. The Registry
Editor opens.
2. Locate the following registry key:
HKEY_LOCAL_MACHINE\SOFTWARE\Hummingbird\
PowerDOCS\Core\Plugins\Fusion\Settings
3. Right-click Settings and select New>DWORD Value.
4. Type ProfileValidationType and click ENTER.
5. Double-click ProfileValidationType.
6. Type 1 in the Value data field.
7. Click OK.
Windows Communication Foundation (WCF) Tuning
WCF provides capabilities to configure various aspects of the network
communication infrastructure. By default, most of the available
settings are somewhat conservative in their value definitions; however,
this is done on purpose to provide safeguards against certain types of
security threats such as denial-of-service attacks. The eDOCS DM
integration to WCF resets the defaults for some of these settings to
match the requirements of the eDOCS application set.
The overridden default values defined by eDOCS DM are established
within the eDOCS DM application code; however, these values can be
modified by setting equivalent values in the eDOCS DM registry
configuration. The following binding global defaults are overridden by
eDOCS DM. The eDOCS DM default can be overridden by setting an
WARNING MESSAGE INDICATES DOCUMENT PROFILE FORM IS ALREADY IN USE
419
equivalently named registry value under the registry key
HKLM\Software\Hummingbird\DOCSFusion\NetworkBindings.
MaxArrayLength
The MaxArrayLength registry setting controls the maximum size of an
array that can be serialized within a WCF request/response. For eDOCS
DM this value affects the size of the array that can be used for
constructs, such as search result and read/write stream byte arrays.
The WCF default value for this setting is 16,384. The default for this
setting is increased by eDOCS DM to 262,144.
MaxReceived
MessageSize
The MaxReceivedMessageSize setting controls the overall maximum
message size in bytes that is processed by the binding. The WCF default
value for this setting is 65,536. The default for this setting is increased
by eDOCS DM to 524,288. Processing of large file transfers were
encountering problems, which indicated that the maximum message
size was being exceeded when using the WCF default value of 65,536.
Extensive testing revealed that the message size errors disappeared
when the MaxReceivedMessageSize value was increased to 263,284. To
allow for some cushion and to maintain a byte boundary relative
number, the eDOCS DM default for this value was increased to
524,288.
InactivityTimeout
Minutes
The InactivityTimeoutMinutes setting controls the amount of time a
server-side WCF session will remain available without any incoming
call activity. The WCF default value for this setting is 10 minutes. The
eDOCS DM system does not inherently alter this default; however,
certain client configurations may make it desirable to increase the
inactivity timeout.
Sessions in WCF are used to manage message conversations and
enforce multi-message transactions. Using the SQL metaphor, this
means that client connections on a session capable network binding in
WCF must be treated more like a SQL transaction than a SQL
connection. The client connection must be opened — used as needed
— and closed as quickly as possible. Opening a session-based WCF
client connection and keeping it open basically pins a valuable server
side session resource to a specific client for the duration of the
connection lifetime, or until the session inactivity timeout is reached.
This can dramatically limit the number of concurrent users capable of
accessing the WCF service.
420
APPENDIX A
MaxConcurrent
Sessions
The MaxConcurrentSessions setting controls the maximum number of
concurrent sessions the server will allow. The WCF default value for
this setting is 10. The eDOCS DM system does not inherently alter this
default; however, certain client configurations may make it desirable to
increase the maximum number of concurrent sessions. This may be
applicable for sites that have a large number very active batch processes
or an unusually large number of users actively creating content.
WINDOWS COMMUNICATION FOUNDATION (WCF) TUNING
421
APPENDIX
B
Performance Monitor Settings
In This Appendix
DM has two objects in the Windows Performance Monitor:
•
DM Server
•
DM Server Libraries
This appendix explains the counters established for both objects and,
where applicable, how these counters can be interpreted to gauge DM
Server system performance.
423
Counters for DM Server
The counters for this object apply to the entire server.
Active Interfaces
Indicates how many clients are interfacing with the DM
Server.
Content received bytes/
Sec
Shows the number of bytes being streamed to the server by
clients that are uploading documents. The counter reflects file
I/O operations only; it does not apply to full-text searches.
Content sent bytes/Sec
Shows the number of bytes being streamed to clients by the
DM Server when downloading documents. The counter
reflects file I/O operations only; it does not apply to full-text
searches.
Full-Text Deleted
Documents/Sec
Displays the current rate of documents being deleted from the
full-text index.
Full-Text Indexed
Documents/Sec
Displays the current rate that documents are being full-text
indexed.
Full-Text Indexing Failures/ Displays the current full-text indexing error rate.
Sec
424
Indexer Thread Count
Displays the number of active indexer threads.
Internal Counter
Reserved for future use.
Internal Rate
Reserved for future use.
Results set sent by bytes/
Sec
When a client user executes a search, retrieves a list of
recently edited documents, or performs some other operation
where a list of documents is compiled, DM Server creates a
results set (sometimes called a rowset).
Rowset Cache Size
This counter is an indicator of how many searches are
currently taking place. It is the sum of all results sets sent from
the DM Server to clients.
APPENDIX B
SQL Object % Usage
Reflects the overall usage percent of the SQL Connection
Cache. Each DM library has a SQL connection cache setting
that specifies the number of open SQL connections to the
database. This counter indicates how many connections in
the cache are being used. If the Performance Monitor shows
your system is running at levels near 100%, you need to
increase the SQL connections for your library. We
recommend you increase the connections in increments of
five until the SQL response time improves to an acceptable
level.
On the Results tab in Server Manager, you can specify the
maximum amount of virtual memory that can be used for
caching of results sets (Maximum Total Size). The cache
holds the results of all searches performed by DM Server. The
Rowset Cache Size counter in the Performance Monitor
indicates how much of this cache is being consumed.
See “The SQL-Connection Cache Size” on page 18 for
instructions on changing the cache size.
Transactions/Sec
Reflects the current rate of transactions handled by DM
Server. It is an indicator of how busy the server is.
Worker Thread Count
Used by Hummingbird development staff only.
Counters for DM Server Libraries
Each library selected in DM Server Manager has counters in the
Performance Monitor.
Internal Counter
Reserved for future use.
Internal Rate
Reserved for future use.
SQL Connection Cache Shows the number of SQL connections to the library that are
specified in DM Server Manager.
Size
SQL Object % Usage
Represents the number of SQL connections currently being used,
divided by the number of connections specified by the SQL
Connection Cache Size option in DM Server Manager.
SQL Objects used
Indicates the number of SQL objects currently in use.
COUNTERS FOR DM SERVER LIBRARIES
425
Adding Counters in Performance Monitor
When you install DM Server, counters for DM Server and DM Server
Libraries are automatically added to the Windows Performance
Monitor. From the Performance Monitor console, you can add any of
the counters listed in this appendix to monitor your DM Server system
performance.
Windows Server/
Advanced Server
Instructions
To add an object:
1. Start Performance Monitor. Run perfmon.exe from a
command line.
2. Select System Monitor from the tree. The Monitor will
appear on the right.
3. Click the Add icon (
Counters dialog box.
) on the toolbar to display the Add
4. In the Performance object box, select one of the following
eDOCS objects:
•
DM Server
•
DM Server Libraries
5. In the Select counters from list box, select the counter and
click Add.
426
APPENDIX B
6. Continue selecting counters in this manner until all desired
counters are added to Performance Monitor.
ADDING COUNTERS IN PERFORMANCE MONITOR
427
APPENDIX
C
Other Server Admin Tools
In This Appendix
This appendix provides information about the Activity Log Purge, Add
an External Library, and E-mail Attachment Update utilities.
This appendix describes three administration utilities that are not
documented elsewhere:
•
Activity Log Purge (page 430)
•
Add an External Library (page 431)
•
E-Mail Attachment Update (page 432)
429
Activity Log Purge
The Activity Log Purge utility allows the DM administrator to purge
unnecessary records from the ACTIVITYLOG table of a library. You
have the option of archiving the purged records in a text file. From this
file, you can restore purged records to the library from which they were
deleted.
Note: The purpose of this utility is to delete records from a database. This
type of activity imposes the inherent risk of data being lost. It is the
responsibility of the DM administrator to ensure that this utility is used as
intended. Though the utility attempts to prevent improper use through timely
prompts, it cannot guarantee proper use.
Purging the
Activity Log
To run the Activity Log Purge utility:
1. From the Start menu, run Programs>Hummingbird >DM
Server>Server Admin Tools>Activity Log Purge.
2. On the Activity Log Purge dialog box, select the following
options.
430
APPENDIX C
•
Keep last [0] Days of Activity: The utility saves records
created in the date range of today’s date minus the
number of days you specify here. To save this
information for future executions of the utility, select
Save Range.
•
All Types: Select this option to select all activity types in
the Select Types list.
•
All Libraries: Select this option to select all libraries in
the Libraries list.
•
Save Range: Select this option to save the number
specified in the Keep last [0] Days of Activity field for
future executions of the utility.
•
Archive to File: To archive the deleted activity-log
records in a text file, specify a path and file name here.
Click the table lookup button (...) to see your folder
structure.
The activity-log archive file contains columns of commadelimited activity-log table records. Each column is
separated by a percent sign (%)-delimited library name.
Because multiple libraries can be processed during a single
purge session, the archive file can contain archived records
from multiple libraries. Do not modify the activity-log
archive file, because you may need it to restore the purged
records.
Libraries: Select the libraries to be purged. To purge all
libraries, select the option All Libraries. The total number
of files that were deleted are displayed after the utility runs.
Select Types: This pane lists the activity types tracked by the
activity log. Select the activity types you want to purge. To
purge all types, select the option All Types.
3. Click Start to initiate the purge utility.
To stop the purge utility before it finishes, click Cancel.
Restoring Purged
Records
If you created an activity-log archive file, the records listed in the file
can be restored to the library or libraries from which they were purged.
To restore purged records:
1. Run the Activity Log Purge tool as described previously in
“Purging the Activity Log” on page 430.
2. On the Activity Log Purge dialog box, click Import.
3. In the Import from File dialog box, enter the name of the
activity-log archive file and click OK to start restoring the
records.
To stop the import before it finishes, click Cancel.
Add an External Library
The Add An External Library tool lets you create a new library from an
existing library.
431
To create a new library using the Add An External Library tool:
1. From the Start menu, select Programs>Hummingbird>DM
Server>Server Admin Tools/Add an External Library.
2. Enter a name for the new library. A library name can be up
to 20 characters in length but cannot contain spaces.
3. Select your SQL vendor.
4. If you want to copy the information in the
DOCUMENTTYPES table, PEOPLE table, any industryspecific tables, and any tables added using DM Designer,
select Duplicate All Validation Table Data. Click OK.
Depending on the database vendor you select, you are prompted to
enter the appropriate connection and database information. See the
DM Installation Guide for library generation instructions.
When you have completed the SQL vendor-specific information, the
Add Library utility creates the new library and copies the appropriate
data. When library generation is finished, click OK.
E-Mail Attachment Update
Question to Reviewers: Is this still valid for DM 5.3?
The E-Mail Attachment Update tool updates a DM library to enable the
icon indicating when an e-mail message profiled prior to DM
Extension for Microsoft Outlook 5.1.0.5 has an attachment. The utility
examines all profiled e-mail messages for attachments. When it finds a
message with an attachment, it alters the value of the ATTACH_NUM
column in the Profile table to the appropriate value.
The utility needs to be run against the library only if your organization
meets both of the following criteria:
Prerequisites
•
Your organization has users who run DM Extension for
Microsoft Outlook.
•
Those users use the Save E-mail Thread check box when
profiling e-mail messages.
Prior running the utility, the DM administrator must:
•
432
APPENDIX C
Update the library by running Library Generator. (See the
DM Suite Installation Guide for instructions.)
•
Enable the Allow SQL Passthrough setting in DM
Admin>Library Parameters>System Parameters>Defaults
or in Library Maintenance>System Parameters>Defaults.
If you change the setting, you must either restart DM Server
or refresh the DM Server cache in DM Server Manager to
recognize the changed setting.
Note: If your organization normally disables SQL pass-through, the setting
can be disabled again after the E-Mail Attachment Update program finishes.
•
Upgrade user workstations to DM Extensions 5.3.
If all user workstations are not upgraded to DM Extensions
5.3 at the same time, the E-Mail Attachment Update utility
should be run after each set of upgrades to scan for e-mail
messages profiled in the library from workstations not yet
upgraded to 5.3.
Running the Utility
The E-Mail Attachment Update utility is located in on the installation
media in the folder \Tools\DMExtensions\Email Update Conversion.
It can be executed on any workstation where the DM Extensions
software is installed.
•
You can copy the files EMAILUPD.EXE and
EMAILUPDRES.DLL to the workstation and run the utility
from there.
•
Or you can copy the installation media image to your
network and on the workstation, map to the drive where the
copy is located.
To execute the utility:

Run EMAILUPD.EXE from a command line or from
Windows Explorer.
The length of time required to scan the profiled e-mail messages
depends on how many are profiled and how many have profiled
attachments. E-mail messages with no profiled attachments are
downloaded from the library to check for embedded attachments.
The E-Mail Attachment Update utility creates a log file in the folder
from which it is run (or in the \TEMP folder if running from the
installation media or a read-only drive). If errors occur, they are
recorded in the log, and the administrator is notified when the utility
finishes.
433
APPENDIX
D
Security Regeneration
In This Appendix
This appendix describes the Security Regeneration utility.
435
About Security Regeneration
When an organization must recover documents from backup (as
opposed to their DM archive), file-level trustees are often lost. The
Security Regeneration utility provides a method for reapplying the
trustees. The utility can also be used when a user leaves your
organization and you want to give a new user rights to his or her
documents.
The Security Regeneration utility checks the network-operatingsystem (NOS)-level security of documents to verify that security at the
NOS level is the same as the access rights assigned on the document
profile. It does this by selecting each profile from the library and
reapplying security at the NOS level for each version of that profile’s
document. To avoid checking every document, the utility processes
only documents selected from the Search Results dialog box. Simply
perform a profile search on any documents for which you need security
regenerated, and run the utility.
For NetWare document servers, the user must have a NetWare
administrator or equivalent account and be a member of the
DOCS_SUPERVISORS group to run Security Regeneration. For
Windows document servers, the user need only be a member of the
DOCS_SUPERVISORS group.
The Security Regeneration utility is run from the DM Extensions for
Windows Explorer and Microsoft Outlook. The user must be a member
of DOCS_SUPERVISORS in order for Security Regeneration to appear
as an option.
Performing Security Regeneration
To run the Security Regeneration utility:
1. Perform a profile search to obtain a list of the documents for
which you want to reapply file-level security.
2. With the search results displayed in the Quick Retrieve
dialog box, choose Options>Security Regeneration.
436
APPENDIX D
3. Enter a time for the utility to begin processing, or leave the
field Time to start processing blank to start processing as
soon as you click OK. Because the utility generates heavy
document-server activity, we recommend that you run it
when demands on the document server are low. Click OK.
4. When the utility is finished, click OK.
Note: If you are prompted to log on to other libraries or document servers, do
so as an administrator or supervisor who will have access to all files and
directories being processed.
The utility processes profiles in batches of 250. If you press Cancel, that
command will be detected when the utility starts processing the next batch of
documents. This means that after you cancel the utility, it may continue to run
for a short while.
PERFORMING SECURITY REGENERATION
437
APPENDIX
E
Multilingual Support for DM
Webtop Users and Indexed
Documents
In This Appendix
This appendix:
•
Explains how to install and configure multiple language
versions of DM Webtop in a single DM system. See page
440.
•
Describes how to set up a full-text index to index
documents from multiple languages. See page 443.
•
Lists the full-text search operators supported for
SearchServer indexes in all versions of DM. See page 445.
439
About Multilingual Support for DM Webtop Users
A single DM system can be configured to run multiple versions of DM
Webtop, giving users the ability to log on to DM Webtop in their
preferred language.
To support multilingual versions of DM Webtop, each language version
of the DM Web Server software is installed on the same server machine.
Users then access DM Webtop in the language of their choice via a
unique URL for the desired language. The number of DM Web Servers
that can be installed and run on a server machine is entirely dependent
upon the machine’s resources.
The following diagram illustrates a possible configuration for the
support of three-languages—French, German, and Italian. On the DM
Web Server machine, three versions of DM Web Server are installed,
one for each supported language. French-speaking users access DM
Webtop via the French version of DM Web Server. At the same time,
German- and Italian-speaking users access the appropriate DM
Webtop from the German and Italian versions of DM Web Server,
respectively.
To give each language version of DM Web Server a unique identity, each
version is installed to use a different network port. The port number is
included as part of the URL for DM Webtop, to differentiate among the
different language versions.
All language versions of DM Web Server communicate with the same
DM Server through a single copy of the DM API.
There are no special requirements for sites using failover and load
balancing (FOLB) clusters of DM Servers. Nor are there any
considerations pertaining to full-text indexing. Note, however, that a
single index can be set up to index and search documents from multiple
languages. See “Multilingual Indexing and Searching” on page 443 for
more information.
440
CHAPTER E
French
German
Italian
DM Webtop
DM Webtop
DM Webtop
Port 2
Port 1
DM Web
Server
DM Web
Server
DM Web
Server
—
—
—
French
German
Italian
Port 3
DM API
DM Server
(French version)
In a multilingual system, any language version of DM Server can be
used, even a language other than those installed for DM Webtop. In the
example above, the DM Server is French, but it could just as easily be
the German, Italian, English, or any other language version provided by
DM.
When deciding which version of DM Server to install, however, you
should be aware that error messages generated by DM Server are not
translated for end users. For example, if the French DM Server above is
unable to find a valid Author ID when processing a request, the error
message it returns to the user will be in French, even though the request
might have come from a user of the Italian DM Webtop.
ABOUT MULTILINGUAL SUPPORT FOR DM WEBTOP USERS
441
Installing for
Multilingual
Support
Note: If you intend to install the French version, see “Special Considerations for
French Installations” on page 443.
If you plan to install the English-language version of DM Web Server,
the English version should be the first version of DM Web Server that
you install. Should the DM Web Server software need to be uninstalled
at some later time, the English version should be removed last.
Each language version of DM must be installed into its own folder. Do
not install any portions of the translated versions of DM into the same
folder as the English version.
To set up multilingual support, take the following steps at the
DM Web Server machine:
1. Install the first language version of DM Web Server as
described in the DM Installation Guide. Remember, if you
are planning to offer English to DM Webtop users, the
English version of DM Web Server must be the first version
that is installed.
The URL for users of this language will be:
http://<DM Web Server machine name>/CyberDOCS/
where <machine name> is the name of the machine where
DM Web Server is installed. For the first language, no port
number is included in the URL.
2. On the same machine, install the second language version of
DM Web Server. During the installation, you will be asked
to specify the port number for this version. The port
number should be between 7010 and 9500, inclusive.
The URL for users of this second language will be:
http://<DM Web Server machine name>:<port
number>\CyberDOCS\
where:
<DM Web Server machine name> is the name of the
machine where DM Web Server is installed
<port number> is the number you specified for this
language version.
3. Repeat step 2 for any other languages you want to support,
specifying a unique port number for each language version.
4. Advise users of the unique URL to use to access the desired
language version of DM Webtop from their browsers.
Special
Considerations for
French
Installations
Order of Installation for French/English Systems
If you are building a French/English system, install the components in
the following order:
1. French DM Server (or English DM Server with the latest
patch) with components.
2. French DM WorkFlow Server Components.
3. English DM Web Server with components and the latest
Web Server patch.
4. French DM Web Server with components.
French Operating System and Locale Setting
In French-only systems and in multilingual systems where French is a
supported language:
•
The French operating system must be installed on server
machines and on end-user workstations.
•
The locale setting in Control Panel>Regional
Options>General must be set to French (France).
This applies to all French installations, including those
supporting Canadian users.
These requirements must be met to eliminate “not found”errors and
the appearance of non-French elements in the user interface, such as
dialog boxes.
Multilingual Indexing and Searching
DM can perform full-text indexing against documents from multiple
languages—including documents containing multiple languages—and
store the results in a single SearchServer index. Users of a DM client,
regardless of the client machine’s language, can then perform full-text
searches against the index. For example, the user of a Traditional
MULTILINGUAL INDEXING AND SEARCHING
443
Chinese client could issue a full-text search of the index through an
English DM Server. Full-text search strings can contain mixedlanguage search criteria, such as a combination of Traditional Chinese,
Simplified Chinese, and English, or any language supported by the
client machine’s default locale/code page (that is, the character set).
Indexing
To enable multilingual indexing, the index’s Language option should be
set to Unicode during index creation. The option is set in either DM
Server Manager or the DM Indexer Configuration Wizard. The default
locale setting for the indexer server has no effect on multilingual index
processing.
Certain tradeoffs are necessary with multilingual indexes:
Searching
444
CHAPTER E
•
In a multilingual index, language-specific, advanced
linguistic processing ,such as stemming and segmenting,
cannot be performed.
•
Plain-text documents do not index properly due to their
non-Unicode formatting.
To enable multilingual searches, the DM Server(s) and the DM clients
must be set to the UTF-8 (Unicode)character set:
•
DM Server. A check box on DM Server Manager’s
Preferences tab—Use UTF8 Format Full Text Searches—
enables UTF8-based full-text searching.
•
DM Webtop: In DM Webtop Maintenance>DM Webtop
Parameters>Language, the option Default Character Set
should be set to UTF-8.
•
DM Extensions: Multilingual searching is enabled in DM
Extensions. No action is needed by the user.
Creating a
Multilingual Index
To set up a multilingual index:
1. Using either the DM Indexer Configuration Wizard or DM
Server Manager on the indexer server, create an index and
select Unicode as the Language option on the Index
Properties tab. Unicode defaults to the character set value
“Unicode UTF8” and sets the defaults for related index
properties. After the index is initialized, it can be populated
with documents from multiple languages.
If all user workstations and DM Servers handling user
transactions are configured to use the same default locale,
setup for the multilingual index is complete and users may
begin performing searches against the index.
If the DM Servers process transactions from workstations
using various locale settings, continue with step 2.
2. On each DM Server that handles end-user transactions, go
to DM Server Manager’s Preferences tab and select the
option Use UTF8 Format Full Text Searches. It is not
necessary that this option be selected on the indexer server.
Full-Text Search Operators in All Language Versions
All language versions of DM support the full-text search operators
shown in the following list. For information on how to use each
operator, see the manuals Using DM Webtop and Using DM Extensions.
English
German
Italian
Spanish
French
AND
UND
E
Y
ET
OR
ODER
O
O
OU
NOT
NICHT
NON
NO
NON, SAUF
NEAR
NAHE
VICINO
CERCA DE
PRES, PRES DE,
PROCHE DE
PARAGRAPH
ABSCHNITT
PARAGRAFO
PÁRRAFO
PARAGRAPHE
SENTENCE
SATZ
FRASE INTERA
ORACIÓN
PHRASE ENTIERE
PHRASE
PHRASE
FRASE
FRASE
EXPRESSION
WORD
WORT
PAROLA
PALABRA
MOT
THESAURUS
WÖRTERBUCH
DIZIONARIO
TESAURO
SYNONYMES
FULL-TEXT SEARCH OPERATORS IN ALL LANGUAGE VERSIONS
445
STEM
Note: %TODAY, though not officially a search operator, is supported by DM for
use in full-text searches. Each non-English version of DM has an equivalent
term for %TODAY, but the equivalent terms are not included in all language
versions.
446
CHAPTER E
APPENDIX
F
Configuring DM Extensions
Per-User Based
In This Appendix
This appendix provides information on configuring DM Extensions
per user. This gives you the ability to change eDOCS DM Extensions
and Application Integration from machine based to per-user based.
447
DM Extensions Per-User Configuration
Machine based is defined as allowing all users of a particular machine
access to integrated applications. Per-user based is defined as allowing
access to integrated applications for a specific user on a machine.
Refer to the following topics:
•
Per-User DM Extensions Installation Configuration
•
Configuring Per-User Based ODMA Active Integration
•
Configuring Per-User Based ODMA Passive Integration
•
Configuring Per-User Based COM Automation Active and
Passive Integration
•
Configuring Per-User Document Viewer Control
•
Per-User Configuration of the eDOCS DM Search Feature
•
Per-User Configuration of Interceptor
•
Configuring Per-User DM Linking
•
Setting Outlook E-Mail Integration and DM Extension for
Microsoft Outlook on Per-User Basis
For all instructions listed in this document, replace the text $user$ with
the username (and possibly the domain name), of the person for whom
you are configuring DM Extensions.
For example, if you are instructed to copy the ODMA32.dll file to the
user’s ODMA directory, the instructions show the following directory
path:
…\$user$\Application Data\Open Text\DM\ODMA\
If the user’s network name is Joe.Smith, the directory you want to locate
will be:
…\Joe.Smith\Application Data\Open Text\DM\ODMA\
Per-User DM
Extensions
Installation
Configuration
After DM Extensions is installed on the machine, you can configure it
as a per-user installation using these instructions.
To configure DM Extensions per user:
1. Select Start>Run and type regedit.
2. Click OK. The Windows Registry Editor will open.
448
CHAPTER F
3. Remove the following registry key:
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Wind
ows\CurrentVersion\Explorer\Desktop\NameSpa
ce\{4577EA30-A1DF-11D0-BA3E-00A024746296}]
@="Hummingbird DM"
4. Add the Following key in the registry:
[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windo
ws\CurrentVersion\Explorer\Desktop\NameSpac
e\{4577EA30-A1DF-11D0-BA3E-00A024746296}]
@="eDOCS DM"
Configuring DM
Icons to Appear
If you log on to the machine with a different user name, you will not see
the DM Extensions icon on the desktop; however, you can make the
Start>Programs>Open Text icons appear on a per-user basis.
Creating per-user icons:
1. Locate the Open Text directory in ..\Documents and
Settings\All Users\Start Menu\Programs\.
2. Select the Open Text directory and then select Edit>Cut.
3. Navigate to ..\Documents and Settings\$user$\Start
Menu\Programs\.
4. Select Edit>Paste.
Configuring Per-User Based ODMA Active Integration
The instructions below apply to the following ODMA integrated
applications:
•
Microsoft Word
•
Microsoft Excel. Refer to Additional Setup Configuration
for Microsoft Excel.
•
Microsoft Project. Refer to Additional Setup Configuration
for Microsoft Project.
•
Microsoft PowerPoint
CONFIGURING PER-USER BASED ODMA ACTIVE INTEGRATION
449
To configure DM Extensions per-user based with ODMA active
integration:
1. Using Windows Explorer, navigate to the
…\Windows\system32 or …\Winnt\system32 folder.
The folder name is determined by the version of Windows
installed on the machine.
2. Select the file ODMA32.dll and select Edit>Cut.
3. Navigate to the user’s ODMA directory, and select
Edit>Paste. For example:
C:\Documents and Settings\$user$\Application
Data\Open Text\ODMA
Where $user$ represents the name, and possibly the
domain, of the user. If your user name is Joe.Smith, you
would copy the ODMA32.dll file to C:\Documents and
Settings\Joe.Smith\Application Data\Open
Text\DM\ODMA\ directory.
4. Next, select the My Computer icon in Windows Explorer,
right-click and select Properties.
5. Select the Advanced tab.
6. Select Environment Variables.
7. In the User Variables section, select New.
8. Type PATH as the Variable Name.
9. Enter C:\Documents and Settings\$user$\Application
Data\Open Text\ODMA as the Variable Value.
10. Click OK to close the New User Variable dialog box.
11. Click OK to close the Environment Variables dialog box.
12. Click OK to close the Properties window.
This will make all the ODMA integration per-user based; you cannot have both
per-user and machine based configurations.
Additional Setup
Configuration for
Microsoft Excel
After performing the steps above, Microsoft Excel requires additional
steps be performed as described below.
To configure additional setup configuration for Excel:
1. Peform all the steps outlined in Configuring Per-User Based
ODMA Active Integration.
2. Move the .xla file from from C:\Program Files\Microsoft
Office\Office11\XLSTART to C:\Documents and
Settings\$user$\Application
Data\Microsoft\Excel\XLSTART.
where Office11 indicates the directory for Microsoft Office
2003.
Additional Setup
Configuration for
Microsoft Project
After performing the steps above, Microsoft Project requires additional
steps be performed as described below.
To configure additional setup configuration for Project:
1. Peform all the steps outlined in Configuring Per-User Based
ODMA Active Integration.
2. Move the global.mpt file from C:\Program Files\Open
Text\DM Extension\CustomIntegration to C:\Documents
and Settings\$user$\Application Data\Microsoft\MS
Project\12\1033.
where 11 indicates the directory for Microsoft Office 2003.
3. Select Start>Run and type regedit.
4. Click OK. The Windows Registry Editor will open.
5. Set the value of the RootKey as follows in the following
registry key:
[HKEY_CURRENT_USER\Software\Policies\Micros
oft\Office\10.0\MS Project\GlobalSearch]
"RootKey"="C:\Documents and
Settings\$user$\Application
Data\Microsoft\MS Project\12\1033"
where 11 indicates the directory for Microsoft Office 2003.
CONFIGURING PER-USER BASED ODMA ACTIVE INTEGRATION
451
Configuring Per-User Based ODMA Passive Integration
Microsoft Word
To configure Microsoft Word:
1. Using Windows Explorer, locate the Microsoft Word
Startup directory. The location of the directory varies based
on the version that has been installed.
2. Locate the file named CDWordXPPI.dot. The file name
varies based on the version of Word that has been installed.
Select the file and choose Edit>Cut.
3. Paste the file into the user's Word startup directory, for
example, C:\Documents and
Settings\Joe.Smith\Application
Data\Microsoft\Word\STARTUP.
Microsoft Excel
To configure Microsoft Excel:
1. Using Windows Explorer, locate the Microsoft Excel
XLStart directory. The location of the directory varies based
on the version that has been installed.
2. Locate the file named CDExcelXPPI.xla. The file name
varies based on the version of Excel that has been installed.
Select the file and choose Edit>Cut.
3. Paste the file into the user's Excel startup directory, for
example, C:\Documents and
Settings\Joe.Smith\Application
Data\Microsoft\Excel\XLSTART.
Microsoft Project
To configure Microsoft Project:
1. Move the global.mpt file from C:\Program Files\Open
Text\DM Extension\CustomIntegration to C:\Documents
and Settings\$user$\Application Data\Microsoft\MS
Project\12\1033.
The directory 11 indicates the directory for Microsoft Office
2003.
2. Select Start>Run and type regedit.
3. Click OK. The Windows Registry Editor will open.
4. Set the value of the RootKey as follows in the following
registry key:
452
CHAPTER F
[HKEY_CURRENT_USER\Software\Policies\Micros
oft\Office\10.0\MS Project\GlobalSearch]
"RootKey"="C:\Documents and
Settings\$user$\Application
Data\Microsoft\MS Project\12\1033"
Configuring Per-User Based COM Automation Active
and Passive Integration
The following instructions are for Microsoft Word and Excel 2007.
Microsoft Word
To configure Microsoft Word:
1. Select Start>Run and type regedit.
2. Click OK. The Windows Registry Editor will open.
3. Remove the following registry key from
HKEY_LOCAL_MACHINE:
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Offi
ce\Word\Addins\DM_COM_Addin.WordAddin]
"FriendlyName"="DMWord"
"Description"="COM Add-in to enable
integration between eDOCS DM and Word"
"LoadBehavior"=dword:00000003
"CommandLineSafe"=dword:00000000
4. Add the following key to HKEY_CURRENT_USER:
[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Offic
e\Word\Addins\DM_COM_Addin.WordAddin]
"FriendlyName"="DMWord"
"Description"="COM Add-in to enable
integration between eDOCS DM and Word"
"LoadBehavior"=dword:00000003
"CommandLineSafe"=dword:00000000
5. Close Registry Editor.
Microsoft Excel
To configure Microsoft Excel:
1. Select Start>Run and type regedit.
2. Click OK. The Windows Registry Editor will open.
CONFIGURING PER-USER BASED COM AUTOMATION ACTIVE AND PASSIVE INTEGRATION
453
3. Remove the following registry key from
HKEY_LOCAL_MACHINE:
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Offi
ce\Excel\Addins\DM_COM_Addin.ExcelAddin]
"FriendlyName"="DMExcel"
"Description"="COM Add-in to enable
integration between eDOCS DM and Excel"
"LoadBehavior"=dword:00000003
"CommandLineSafe"=dword:00000000
4. Add the following key to HKEY_CURRENT_USER:
[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Offic
e\Excel\Addins\DM_COM_Addin.ExcelAddin]
"FriendlyName"="DMExcel"
"Description"="COM Add-in to enable
integration between eDOCS DM and Excel"
"LoadBehavior"=dword:00000003
"CommandLineSafe"=dword:00000000
Configuring Per-User DM Linking
To configure per-user DM linking integration, you must change certain
HKEY_LOCAL_MACHINE registry keys to HKEY_CURRENT USER
registry keys.
To configure per-user DM linking integration:
1. Select Start>Run and type regedit.
2. Click OK. The Windows Registry Editor will open.
3. Change the following registry keys from
HKEY_LOCAL_MACHINE to HKEY_CURRENT_USER
registry keys.
For example, before the change, the registry keys are as
follows:
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\
PwDMoniker.Document]
@="eDOCS DM Document"
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\
PwDMoniker.Document\CLSID]
@="{F60772EE-0722-4d9e-B9D4-62B3C3A5DD17}"
454
CHAPTER F
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\
PwDMoniker.Document\CurVer]
@="PwDMoniker.Document.1"
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\
PwDMoniker.Document\DocObject]
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\
PwDMoniker.Document\Insertable]
6. After the change, the keys are as follows:
[HKEY_CURRENT_USER\Software\Classes\PwDMoniker.
Document]
@="eDOCS DM Document"
[HKEY_CURRENT_USER\Software\Classes\PwDMoniker.
Document\CLSID]
@="{F60772EE-0722-4d9e-B9D4-62B3C3A5DD17}"
[HKEY_CURRENT_USER\Software\Classes\PwDMoniker.
Document\CurVer]
@="PwDMoniker.Document.1"
[HKEY_CURRENT_USER\Software\Classes\PwDMoniker.
Document\DocObject]
[HKEY_CURRENT_USER\Software\Classes\PwDMoniker.
Document\Insertable]
4. Close Registry Editor.
Configuring Per-User Document Viewer Control
To configure per-user Document Viewer Control, you must change
certain HKEY_LOCAL_MACHINE registry keys to HKEY_CURRENT
USER registry keys.
To configure per-user Document Viewer Control:
1. Select Start>Run and type regedit.
2. Click OK. The Windows Registry Editor will open.
3. Change the following registry keys from
HKEY_LOCAL_MACHINE to HKEY_CURRENT_USER
registry keys.
For example, before the change, the registry keys are as
follows:
CONFIGURING PER-USER DOCUMENT VIEWER CONTROL
455
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\FULVIE
WOCX.FulViewOCXCtrl.1]
@="eDOCS DM Viewer Control"
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\FULVIE
WOCX.FulViewOCXCtrl.1\CLSID]
@="{2183C61B-2DFF-11D3-9018-00A02479C68D}"
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\FULVIE
WOCX.FulViewOCXCtrl.1\Insertable]
7. After the change, the registry keys are as follows:
[HKEY_CURRENT_USER\SOFTWARE\Classes\FULVIEW
OCX.FulViewOCXCtrl.1]
@="eDOCS DM Viewer Control"
[HKEY_CURRENT_USER\SOFTWARE\Classes\FULVIEW
OCX.FulViewOCXCtrl.1\CLSID]
@="{2183C61B-2DFF-11D3-9018-00A02479C68D}"
[HKEY_CURRENT_USER\SOFTWARE\Classes\FULVIEW
OCX.FulViewOCXCtrl.1\Insertable]
8. You must also make the following application changes:
•
Microsoft Word—Move the pwdMonikerConverter.dot
file from Microsoft Office’s startup directory to the user’s
startup directory.
•
Microsoft Excel—Move the pwdMonikerConverter.xla
and pwdMonikerHelper.xlt files from the Microsoft
Office XLSTART directory to the user’s XLSTART
directory.
•
Microsoft PowerPoint—Move the
PwDMonikerConverter.ppa and
PwDMonikerConverter.ppt files from Microsoft Office
Addins directory to the user’s Addins directory. Next,
open Registry Editor and navigate to:
HKEY_LOCAL_USER\Software\Microsoft\
Office\8.0\PowerPoint\AddIns\
and set the path to C:\Documents and
Settings\$user$\Application
Data\Microsoft\Addins\PwDMonikerConverter.ppa.
456
CHAPTER F
Per-User Configuration of the eDOCS DM Search
Feature
To make the eDOCS DM Search Handler per-user based, you have to
restrict the registry key that registers the handler with Windows.
To restrict the registry key:
1. Select Start>Run and type regedt32.
2. Click OK. The Registry Editor will open.
3. Locate the following key:
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
Windows\CurrentVersion\Explorer\
FindExtensions\Static\DocsQR]
4. Select the key.
5. Select Edit>Permissions.
6. Remove the users for whom you do not wish to grant access.
7. Click OK.
8. Close Registry Editor.
Per-User Configuration of Interceptor
To make the Interceptor System Tray icon per-user based:
1. Select Start>Run and type regedit.
2. Click OK. The Windows Registry Editor will open.
3. Change the following registry keys from
HKEY_LOCAL_MACHINE to HKEY_CURRENT_USER
registry keys.
For example, before the change, the registry keys are as
follows:
[HKEY_LOCAL_MACHINE\SOFTWARE\Hummingbird\
PowerDOCS\AppIntegration\Interceptor\
Components]
"InterceptorHooks"="C:\\Program Files\\Open
Text\\DM Extensions\\InterceptorHooks.dll"
4. After the change, the registry keys should be the following:
PER-USER CONFIGURATION OF THE EDOCS DM SEARCH FEATURE
457
[HKEY_CURRENT_USER\SOFTWARE\Hummingbird\
PowerDOCS\AppIntegration\Interceptor\
Components]
"InterceptorHooks"="C:\\Program Files\\Open
Text\\DM Extensions\\InterceptorHooks.dll"
5. Close Registry Editor.
To make the Interceptor Start Menu entry per-user based:
1. Navigate to C:\Documents and Settings\All Users\Start
Menu\Programs\Open Text\DM Extensions and select the
Interceptor shortcut icon.
2. Select Edit>Copy.
3. Navigate to C:\Documents and Settings\$user$\Start
Menu\Programs\Open Text\DM Extensions select
Edit>Paste.
Setting Outlook E-Mail Integration and DM Extension
for Microsoft Outlook on Per-User Basis
You can configure an end-user machine for access to Outlook E-mail
Integration and DM Extension for Microsoft Outlook based on the
machine or the individual user logged on to the machine.
To configure end-user access to Outlook E-mail Integration:
1. Select Start>Run from the Windows desktop.
2. Enter regedit in the Open field. The Registry Editor opens.
3. Create the following key:
HKEY_LOCAL_MACHINE\SOFTWARE\Hummingbird\E
mail Integration
4. Select Edit>New>DWORD Value. In the Value field, enter
OutlookPerUser.
5. Double-click OutlookPerUser. Enter one of the following
values in the Value data field:
0 - Outlook E-mail Integration is accessible on a machine
basis.
1 - Outlook E-mail Integration is accessible on a per-user
basis.
458
CHAPTER F
6. If the value for OutlookPerUser is set to 1, the administrator
should log on as the user who will access Outlook E-mail
Integration and create the key shown below.
HKEY_CURRENT_USER\Software\Hummingbird\Email
Integration
7. Select Edit>New>DWORD Value. In the Value field, enter
OutlookInstalled.
8. Double-click OutlookInstalled. Enter the value of 1 in the
Value data field.
9. Click File>Exit.
To configure end-user access to DM Extension for Microsoft
Outlook:1. Select Start>Run from the Windows desktop.
2. Enter regedit in the Open field. The Registry Editor opens.
3. Locate or create the following key:
HKEY_LOCAL_MACHINE\SOFTWARE\Hummingbird\E
mail Integration
4. Select Edit>New>DWORD Value. Enter DMPerUser in the Value
field.
5. Double-click DMPerUser. Enter one of the following values in
the Value data field:
0 - DM Extension for Microsoft Outlook is accessible on a
machine basis.
1 - DM Extension for Microsoft Outlook is accessible on a
per-user basis.
6. If the value for DMPerUser is set to 1, the administrator
should log on as the user who will access DM Extension for
Microsoft Outlook and create the key shown below:
HKEY_CURRENT_USER\SOFTWARE\Hummingbird\
Email Integration
7. Select Edit>New>DWORD Value. In the Value field, enter
DMInstalled.
8. Double-click DMInstalled. Enter 1 in the Value data field.
9. Click File>Exit.
SETTING OUTLOOK E-MAIL INTEGRATION AND DM EXTENSION FOR MICROSOFT OUTLOOK ON PER-USER BASIS
459
APPENDIX
G
Configuring the Save User
Interface
When a user saves an e-mail message, creates a document, container,
paper document, or edits an existing file/archive import, the save user
interface appears.
The save user interface includes the following elements:
•
Collapsible Navigation Pane
•
Location Selection Panel
•
Profile Form Selection Panel
•
Profile Form Panel
•
Security Selection Panel
•
Save User Interface Frame and Buttons
461
You can configure the save user interface to show all elements, some
elements, or show only the profile form panel.
•
Resizing and Layout Options
•
Configuration Options
Below is an example of the save user interface with all elements enabled:
462
APPENDIX G
Collapsible Navigation Pane
The collapsible Navigation pane, located in the left portion of the save
user interface, contains the All Locations and Search buttons.
Stick Pin icon allows you to hide the Navigation pane and show
The
only the right portion of the save user interface. When you click this
button, a Navigation tab appears on the upper left portion of the save
user interface. To reenable the Navigation pane, simply click the
Navigation tab.
You can also hide the All Locations and Search buttons by dragging the
dotted line pane separator to the bottom. To reenable the buttons,
simply drag the dotted line pane separator to the desired location.
COLLAPSIBLE NAVIGATION PANE
463
All Locations
Button
Search Button
The All Locations button allows you to view the standard DM tree, where
depending on the configuration, you can select as a parent location, a
workspace, public folder, an applicable Dynamic Views enumeration,
or RM file part.
The Search button allows you to search folders located in the DM
repository.
To perform a search, type the folder document name in the Search field,
and then click ENTER (or click the Execute Search icon). The search results
will appear under the Document Name section. When you select an item
in the search results, the inherited metadata will appear in the Profile
form panel.
You can use other search options by clicking the drop-down combo
menu in the Search field. This allows you to select the Content Search check
box or select a predefined search item, such as <Recently Edited>, <All
Workspaces>, or <All Folders>. Any saved searches will also appear here.
In order to search for workspaces, you must run the <All Workspaces>
search. You will not receive any search results specific to individual
workspaces.
Although saved searches appear and can be selected, if the searches do
not contain any criteria meant to return folders, the searches will not
return any results.
The <Recently Edited> and <All Workspaces> search items are
visible only under the user’s logon library.
Navigation Pane
Configuration
Options
You can configure the Navigation pane to enable or disable any of the
available navigation pane buttons, or add a third-party pane button.
You can use configuration options to hide the Navigation pane
completely and use the currently or previously selected container/
library as the default location.
See The Navigation Tree section for more information.
NOTE: In order to be able to save to a remote library, the
Navigation pane or Location Selection panel must be enabled.
COLLAPSIBLE NAVIGATION PANE
465
Location Selection Panel
The Location selection panel consists of the Location selection drop-down
list and the lookup (...) button.
When you select a valid container from the DM tree in the Navigation
pane or from the Quick Retrieve dialog box, the container is selected
and populated in the Location field. The same behavior occurs when you
drag and drop a document to a container; the container name appears
in the Location field when the save user interface appears. The Location
selection panel keeps track of the locations used on successful saves.
Parent Locations
The following parent locations are supported in the save user interface:
•
Logon/Remote Libraries
•
Workspaces
•
DM Folders
•
Dynamic View Enumerations
•
RM File Parts
Only one parent location can be selected by the user (or autoselected by
the system).
Changing Parent Locations
Because you can change parent locations during the profiling process,
the following rules apply.
466
APPENDIX G
•
Each time a user changes the parent location, the Profile
form is repopulated with metadata inherited from that
location, in addition to group or personal profile form
defaults. Inherited metadata takes precedence over group
and personal profile form defaults.
•
When a user modifies a particular field value on a selected
profile form and then changes the parent location, the user’s
edits are remembered and reapplied. Manually-entered data
or edited data takes precedence over inherited metadata or
profile defaults. The same rule applies when there is more
than one Profile form available in the Profile Form selection
list.
•
Location Selection
Panel
Configuration
Options
Each time a user selects a library as a parent location, any
value that was previously inherited on the Profile form from
a parent container (that was not manually modified), will
either be cleared or overridden by the group or personal
profile form defaults, if they exist.
All previously-used parent locations are tracked, regardless where they
were selected. You can configure the maximum number of history
items.
You can also configure the save user interface to hide the Location
selection panel.
See the The Location Selection Field section for more information.
NOTE: In order to be able to save to a remote library, the
Navigation pane or Location Selection panel must be enabled.
LOCATION SELECTION PANEL
467
Profile Form Selection Panel
The Profile Form selection panel contains a drop-down list in which you
select the appropriate Profile form based. By default, this panel is visible
only when more than one Profile form is available.
For each available Profile form, the drop-down list shows the Profile
form’s ID and name. For example, LAWPROF - Legal E-mail Profile Form.
Profile Form
Selection Panel
Configuration
Options
You can use a configuration option to make this panel visible even
when only one Profile form is available, in which case the drop-down
list will appear unavailable.
See the The Profile Form Selection Field section for more information.
Profile Form Panel
The Profile Form panel itself represents the standard view of the Profile
form created in DM Designer, and consists of the same functionality as
in previous versions of DM, with the following exceptions.
468
APPENDIX G
•
Security Controls—The Restricted check box and Security
button no longer appear on the Profile form; they appear in
the Security panel instead.
•
Save/Cancel Buttons—The Save/Cancel (formerly OK/Cancel)
buttons no longer appear on the Profile form panel; instead,
they appear at the bottom of the save user interface.
•
Apply to All Check Box—When you profile a batch of items,
the Apply to All check box does not appear on the Profile
form panel; instead, it appears on the bottom of the save
user interface.
Entering Invalid
Values
If a user enters an invalid value into a non-lookup Profile form field and
then switches to a different save user interface item or clicks Save, a popup error message will appear on the form that indicates the name of the
invalid field value. For example, “Document Type: Control has invalid lookup
data” will appear in the title bar of the Profile Form panel.
Security Selection Panel
The Security selection panel, which consists of the Restricted check box
and Security button, is located at the bottom of the save user interface
form. Security controls have the same behavior as in previous versions
of DM.
Security Selection
Panel
Configuration
Options
A configuration setting is available to permanently hide the Security
panel for a given user on a given machine.
There is a different configuration setting that allows you to place the
Access Control panel on the Profile form instead.
See The Security Panel section for more information.
Save User Interface Frame and Buttons
If you remove all of the other panels (besides the Profile form itself), the
save user interface will appear the same as in previous versions. The
Apply to All check box and the Save/Cancel buttons, which were formerly
on the Profile form, are now located in the bottom frame of the save
user interface.
SECURITY SELECTION PANEL
469
NOTE: The Apply to All check box appears only when you profile a batch
of items to DM.
Resizing and Layout Options
You can resize the save user interface form so that complete
information is visible. To resize the form, select the gripper control on
the lower right portion of the form and drag it to the desired size.
When you resize the form, the Location Selection drop-down list and Profile
Form Selection drop-down list extend to the left or right, and the
Navigation pane extends to the top or bottom.
You can use the splitter that divides the Navigation pane and the rest of
the form to adjust the width of the pane. The dimensions of other
controls on the form remain fixed.
The form’s size and position is stored in the FormsList_<library
name>.xml file each time it is used, and is applied the next time the
form is used.
Configuration Options
You can configure the save user interface through the
SaveUIConfig.xml file, which is located on the machine where DM
Extensions is installed. This configuration file is configurable per user.
SaveUIConfig.xml
File Location
On Windows 7 operating systems, this file is located on the machine in
C:\Users\<user
name>\AppData\Roaming\OpenText\DM\Settings\<user
name>\SaveUIConfig.xml.
On Windows XP operating systems, this file is located in
C:\Documents and Settings\<user name>\Application
Data\OpenText\DM\Settings.
To edit the SaveUIConfig.xml file:
1. Open the SaveUIConfig.xml file in a text editor (such as
Notepad) or an XML editor.
2. After you make changes, save and close the file.
470
APPENDIX G
The
SaveUIConfig.xml
Default
Configuration File
The following XML code contains the default configuration of the
SaveUIConfig.xml file with all panels and fields visible:
<?xml version="1.0" encoding="utf-8"?>
<SaveUIConfigSettings>
<FormSettings>
<NavControlWidth>200</NavControlWidth>
<LocationControlEnabled>True</LocationControlEnabled>
<LocationControlVisible>True</LocationControlVisible>
<ProfileSelectComboVisible>False</ProfileSelectComboVisible>
<ProfileFormComboEnabled>False</ProfileFormComboEnabled>
<SecurityPanelEnabled>True</SecurityPanelEnabled>
<SecurityPanelVisible>True</SecurityPanelVisible>
<LocationHistoryListSize>5</LocationHistoryListSize>
<NavControlVisible>1</NavControlVisible>
<LastActiveNavGroup>navBarGroupAllDMLocations1 All
L&ocations</LastActiveNavGroup>
<NavPanelClasses>Hummingbird.DM.Extensions.Controls.LocationTreeCo
ntrol,Hummingbird.DM.Extensions.Controls.LocationTreeControl.Locat
ionTreeNavInfo;Hummingbird.DM.Extensions.Controls.SearchControl,Hu
mmingbird.DM.Extensions.Controls.SearchControl.SearchNavControlInf
o</NavPanelClasses>
<FormMinimumWidth>1</FormMinimumWidth>
<FormMinimumHeight>1</FormMinimumHeight>
<UseAccessDialogOnForm>False</UseAccessDialogOnForm>
<UseOKCancelOnForm>False</UseOKCancelOnForm>
<ShowProfileInTaskbar>False</ShowProfileInTaskbar>
</FormSettings>
</SaveUIConfigSettings>
The LastActiveNavGroup entry represents the control name of the last
Navigation panel that was selected. This stores the user’s last location
selection, which defaults to this location the next time the save user
interface appears.
The NavPanelClasses entry contains text in the format of “<class name>,
<assembly name>” for each Navigation panel to display (for example,
search control or relation control). By default, all panels are displayed.
You could remove some of the panels by modifying this field.
CONFIGURATION OPTIONS
471
The UseOKCancelOnForm entry, if set to True, will place the Save and Cancel
buttons as defined in the form definition (on the Profile form), instead
of placing them at the bottom of the Save user interface.
The ShowProfileInTaskbar entry, if set to True, will create a taskbar entry
when the Profile form is displayed.
The UseAccessDialogBoxOnForm entry, if set to True, will display the
security panel on the profile form.
See Displaying the Access Control Panel on the Profile Form for more
information about using the UseAccessDialogBoxOnForm entry.
The Location
Selection Field
The LocationControlEnabled (true/false) and LocationControlVisible (true/
false) entries determine whether the Location selection field is enabled/
disabled and/or visible.
Enabling the Location Selection Field
Enabling the Location selection field allows the user to select the location
in which to save an item.
To enable the Location selection field:

Ensure the LocationControlEnabled entry is set to True:
<LocationControlEnabled>True</LocationControlEnabled>
To disable the Location selection field:

Ensure the LocationControlEnabled entry is set to False:
<LocationControlEnabled>False</LocationControlEnabled>
If the LocationControlEnabled setting is False, the Location selection field will
be visible, but will appear unavailable. The user can see the location in
which the document is being saved, but cannot change the location
through this control.
Making the Location Selection Field Visible
If the LocationControlVisible setting is False, the Location selection control
will not appear on the Save user interface.
To show the Location selection field:

Ensure the LocationControlVisible entry is set to True:
<LocationControlVisible>True</LocationControlVisible>
472
APPENDIX G
To hide the Location selection field:
 Ensure the LocationControlVisible entry is set to False:
<LocationControlVisible>False</LocationControlVisible>
The Profile Form
Selection Field
The ProfileSelectComboVisible (true/false) and ProfileFormComboEnabled
(true/false) entries determines whether the Profile Form selection field is
visible and/or editable.
Making the Profile Form Selection Control Visible
The ProfileSelectComboVisible (true/false) entry determines if the Profile
Form selection control is visible.
To show the Profile Form selection:

Ensure the ProfileSelectComboVisible entry is set to True:
<ProfileSelectComboVisible>True</
ProfileSelectComboVisible>
To hide the Profile Form selection:

Ensure the ProfileSelectComboVisible entry is set to False:
<ProfileSelectComboVisible>False</
ProfileSelectComboVisible>
If the ProfileSelectComboVisible setting is False, the Profile Form selection
control will not appear in the Save user interface. However, if two
different Profile forms are assigned to an application in a library, the
control will appear in order to continue with the save process.
Enabling the Profile Form Selection Control
The ProfileFormComboEnabled (true/false) entry determines if the Profile
Form selection value is editable.
To enable the Profile Form selection control:

Ensure the ProfileFormComboEnabled entry is set to True:
<ProfileFormComboEnabled>True</
ProfileFormComboEnabled>
To disable the Profile Form selection control:

Ensure the ProfileFormComboEnabled entry is set to False:
<ProfileFormComboEnabled>False</
ProfileFormComboEnabled>
If the ProfileFormComboEnabled setting is False, the control will be visible
but not editable. (Note that the ProfileSelectComboVisible entry must be
set to True in order for the control to appear.)
CONFIGURATION OPTIONS
473
The Security Panel
The SecurityPanelEnabled (true/false) and SecurityPanelVisible (true/false)
entries determine whether the Restricted and Security fields are enabled/
disabled and/or visible.
Enabling the Security Panel
The SecurityPanelEnabled entry determines if the Security panel is
editable.
To enable the Restricted and Security fields panel:

Ensure the SecurityPanelEnabled entry is set to True:
<SecurityPanelEnabled>True</SecurityPanelEnabled>
To disable the Restricted and Security fields panel:
 Ensure the SecurityPanelEnabled entry is set to False:
<SecurityPanelEnabled>False</SecurityPanelEnabled>
Making the Security Panel Visible
The SecurityPanelVisible entry determines whether the Restricted check
box and Security button appear in the Save user interface.
To show the Security panel:
 Ensure the SecurityPanelVisible entry is set to True:
<SecurityPanelVisible>True</SecurityPanelVisible>
To hide the Security panel:
 Ensure the SecurityPanelVisible entry is set to False:
<SecurityPanelVisible>True</SecurityPanelVisible>
Change the SecurityPanelVisible setting to False to remove the Security
Panel from the Save user interface.
Displaying the Access Control Panel on the Profile Form
To display the Access Control panel on the profile form, the following
settings must be used in the SaveUIConfig.xml file:
<UseAccessDialogOnForm>True</UseAccessDialogOnForm>
<SecurityPanelVisible>False</SecurityPanelVisible>
Note that if both entries are set to True, you will see both security
panels.
The Location List
Size
474
APPENDIX G
The LocationHistoryListSize entry (1-20) determines how many recently
used entries the Location selection field will maintain.
To set the LocationHistoryListSize entry:
 Enter the number in the LocationHistoryListSize entry:
<LocationHistoryListSize>5</LocationHistoryListSize>
After a document is saved to a selected location, that location will be
stored in the location history list.
The Navigation
Tree
The NavControlVisible entry (0,1,2) determines whether the Navigation tree
control is visible.
If this value is set to 0, the Navigation panel will not appear. If this value
is set to 1, the Navigation pane appears. If this value is set to 2, the
Navigation pane is in auto-hide mode.
To show the Navigation tree:
 Ensure the NavControlVisible entry is set to 1:
<NavControlVisible>1</NavControlVisible>
To hide the Navigation tree:
 Ensure the NavControlVisible entry is set to 0:
<NavControlVisible>0</NavControlVisible>
To auto-hide the Navigation tree:

Ensure the NavControlVisible entry is set to 2:
<NavControlVisible>2</NavControlVisible>
In auto-hide mode, the Profile form will appear with a Navigation tab on
the left side. Click the Navigation tab to view the Navigation panel.
Configuring the
Save User Inteface
to Show Only the
Document Profile
Form
You can customize the save user interface to display only the Profile
Form panel.
To display only the Profile Form panel:
1. Open the SaveUIConfig.xml configuration file. See the
SaveUIConfig.xml File Location section for the default file
location.
2. Replace the contents with the following:
<?xml version="1.0" encoding="utf-8" ?>
- <SaveUIConfigSettings>
- <FormSettings>
<NavControlWidth>200</NavControlWidth>
<LocationControlEnabled>False</LocationControlEnabled>
<LocationControlVisible>False</LocationControlVisible>
<ProfileSelectComboVisible>False</ProfileSelectComboVisible>
CONFIGURATION OPTIONS
475
<ProfileFormComboEnabled>False</ProfileFormComboEnabled>
<SecurityPanelEnabled>True</SecurityPanelEnabled>
<SecurityPanelVisible>True</SecurityPanelVisible>
<LocationHistoryListSize>5</LocationHistoryListSize>
<NavControlVisible>0</NavControlVisible>
<LastActiveNavGroup>navBarGroupAllDMLocations1 All Locations</
LastActiveNavGroup>
<NavPanelClasses>Hummingbird.DM.Extensions.Controls.LocationTreeCo
ntrol,Hummingbird.DM.Extensions.Controls.LocationTreeControl.Locat
ionTreeNavInfo;Hummingbird.DM.Extensions.Controls.SearchControl,Hu
mmingbird.DM.Extensions.Controls.SearchControl.SearchNavControlInf
o;Hummingbird.DM.Extensions.Controls.RelationViewControl,Hummingbi
rd.DM.Extensions.Controls.RelationViewControl.RelationViewNavInfo<
/NavPanelClasses>
</FormSettings>
</SaveUIConfigSettings>
3. Save and close the SaveUIConfig.xml configuration file.
4.
476
APPENDIX G
Index
A
About DM Extensions Per User
Configuration 448
Accept User-Supplied Identification 137
ACL Settings 138
Active Integration
definition 264
integrating applications 279
Active integration
COM Automation 453
ODMA 453
Activity Log Purge utility 430
Add
Custom Parameters 259
Add an External Library utility 431
adding members to groups 172
ADDLIB utility 431
aliases
Group 177
user network 160
Allow Auto Logon
DM Webtop Parameters 256
Group Features 165
System Parameters Defaults 140
Allow Check-in of Others’ Docs
Group Permissions 167
System Parameters Defaults 139
Allow Copy of In-Use Documents
Group Permissions 167
System Parameters Defaults 139
Allow Document Checkout
Group Permissions 167
System Parameters Defaults 138
Allow Edit of Shadowed Documents
Attache 148
Group Attache 178
Allow Logon 159
Allow Make Read-Only
Group Versions 171
Versions 146
Allow Make Version Read-Only
Group Versions 171
Versions 146
Allow Mass Update to Profiles
Group Permissions 168
System Parameters Defaults 140
Allow modify user settings
Group Permissions 167
System Parameters Defaults 141
Allow Notifications
Group Features 165
System Parameters Defaults 140
Allow Overwrite of Simultaneous Edits
Attache 148
Group Attache 179
Allow Preview
Group Features 166
System Parameters Defaults 141
Allow Publish Versions
Group Versions 171
Versions 146
Allow Remove of Read-Only
Group Versions 171
INDEX
477
Versions 146
Allow Remove of Version Read-Only
Group Versions 171
Versions 146
Allow Save to Remote Library
Group Permissions 168
System Parameters Defaults 139
Allow the User to enter a network name
DM Webtop Parameters 256
Allow Unpublish of Version
Group Versions 171
Versions 146
Allow Users to Delete Content
Group Permissions 168
System Parameters Defaults 139
Allow Users to Delete Documents
Group Permissions 168
System Parameters Defaults 139
Allow Users to Delete Versions
Group Permissions 168
System Parameters Defaults 140
Allow Users to Queue for Deletion
Group Permissions 168
System Parameters Defaults 139
Always Display Version Selection List
Group Versions 171
Versions 145
Application
Launch Method Maintenance 192
Application ID
Application Maintenance 188
Applications 186
Application integration
components 265–267
DDE settings 268–272
types of 264
478
Application Name
DDE Settings 195
DDE Settings, Print 196
applications
defining 187
maintaining 187
setting up 186
Apply to all libraries setting 311, 312
Archive
Keep 205
Attache
Group settings 177
System Parameters 146
Attache Password 159
Attachment to Index
Attachment to Index Maintenance 247
defining 247
details 246
Auto Alias
Group Synchronization 182
User Synchronization 180
Automated E-mail Management 291
B
BI Query Reports 278
C
Cache Lookups Dialog Box 305
Cache settings 300
Can Create Folders
Group Permissions 168
Permissions 142
Can Create New Documents 168
Can Create Related Item
Group Permissions 167
Permissions 142
Can Create/Remove Public Folders
Group Permissions 167
Permissions 142
Can Remove Related Item
Group Permissions 167
Permissions 142
Can See Unsecured Objects 168
Can Show Related Item
Group Permissions 167
Permissions 142
Capture Keystrokes, Typing and Elapsed
Time 138
Check in/Check out, definition 264
Checkin/Checkout
integrating applications 279
client applications
forms location 11
Client Deployment Utility
about 295
Add-ons configuration 321
Custom tabs configuration 322
Document management configuration
Cache settings 300
Chunk Factor settings 306
General tab 298, 299
Logon Option tab 306
Logon settings 306
Performance tab 300
Quick save settings 306, 307
Shadow document settings 303
E-mail integration 311–??, 311–316, ??–316
Apply to all libraries setting 311, 312
Dialogs tab 314
General tab 312
GroupWise 312
Header Fields tab 313
Lotus Notes 312
Microsoft Outlook 312
prevent message modification 313
Profile on Send tab 316
Event handlers configuration 310
Exporting registry files 297
Forms configuration 308
Integration schemes configuration 311
Logging Options 316
clustering servers for fail-over and load
balancing 37
COM Automation
Active integration 453
Passive integration 453
Command
DDE Settings, Open 196
DDE Settings, Print 196
Command (not running)
DDE Settings, Open 196
DDE Settings, Print 196
Command line parameters
Launch Method Maintenance 192
Compatible Apps
Compatible Applications 196
defining 196
Configuration Settings 298
Configuring Single Sign-on for DM
Extensions Users 110
Configuring Single Sign-on for DM Webtop
Users with Application Integration 110
Configuring Single Sign-on for DM Webtop
Users without Application
Integration 111
cookie information 109
Copy
INDEX
479
Application 187
Custom Tables 209
Document Servers 150
Document type 206
Groups 163
Keywords 247
Launch Methods 191
People Maintenance 158
Remote Libraries 153
Corel Suite
Presentations
DDE settings integration 275
disabling ODMA integration 272
Quattro Pro
DDE settings 274
disabling ODMA integration 272
WordPerfect
DDE settings 272
footer macro 288
Create/Edit Template Documents
Group Permissions 167
System Parameters Defaults 139
Current Members 172
Custom Parameter Definition
description 259
Custom Parameters
defining 259
description 259
Custom Profile Default Maintenance
overview 249
Custom Profile Defaults
overview 248
Custom Table Maintenance
overview 209
Custom Tables
help available 209
480
D
Database Name 154
Database Vendor 154
Date Format
Group Preferences 180
System Parameter Preferences 149
DCOM 43
DDE settings
applications using 268–272
configuring 195
Imaging 277
Lotus 1-2-3 275
Lotus WordPro 275
Microsoft Excel 268
Microsoft PowerPoint 271
Microsoft Project
Microsoft Visio 272
Microsoft Word 269
Presentations 275
Quattro Pro 274
WordPerfect 273
Default Character set
DM Webtop Parameters 256
Default Deployment Package 137
Default Directory
Launch Method Maintenance 194
Default Extension
Application Maintenance 190
Default Items per Page
Group Preferences 180
System Parameter Preferences 149
Default Maximum Pages
Group Preferences 180
System Parameter Preferences 149
Default Network Name
DM Webtop Parameters 256
Default Viewer
Group Preferences 180
System Parameter Preferences 149
Delete 205
Attachments to Index 246
Custom Parameters 259
Custom Profile Defaults 248
File Types 197
Launch Methods 191
Description
Application 186
Application Maintenance 188
Attachment to Index Maintenance 247
Attachments to Index 246
Custom Profile Default Maintenance 249
Custom Profile Defaults 248
Document Type 205
File Type Maintenance 198
File Types 197
Keyword Maintenance 248
Keywords 247
Launch Method Maintenance 192
Launch Methods 191
Remote Libraries 153
Remote Library Maintenance 154
Disable Document Server 152
Disable Native Open/Save
Group Features 165
System Parameter Defaults 140
Disabled
Application Maintenance 188
Remote Library Maintenance 154
Disabling Interceptor integration 283
DM API configuration 251
DM clients
security 106
security in NetWare-only environment 103
DM Extensions
installation configuration 448
per-user icons 449
DM Linking, configuration 454
DM Search Feature 457
DM Server
performance monitor settings 423
starting and stopping the server 6
DM Webtop
Custom Parameters 259
defining Custom Parameters 259
DM API configuration 251
DM Webtop Parameter
recent edits setting 258
Document Path Template 135
Document Sentry Agent 100
document server
defining 150
listing 150
document servers
access 108
NetWare 46, 101
purging the activity log 430
security 96, 104
Document type 205, 206
maximum sub-versions 205
maximum versions 205
new 206
new, from existing 206
storage type 205
Document Viewer Control 455
DSA. See Document Sentry Agent
Dynamic View Languages
INDEX
481
creating 219
Dynamic Views 209
assigning level search languages 236
configuring level searches 234
creating 210
custom security 216
Matter-Centric Security 239
security 214
Template Folders
setting 232
View Level
adding level search item 227
Dynamic Views Enumeration
adding 229
Dynamic Views Level
creating 221
Dynamic Views Level Language
adding 226
E
Edit 206
Application 187
Custom Parameters 259
Custom Tables 209
Document Servers 150
document type 206
File Types 197
Groups 163
Launch Methods 191
People Maintenance 158
Previous Versions
Group Versions 170
Versions 145
Remote Libraries 153
eDOCS DM Server Name
DM API Configuration 252
482
eDOCS DM Web Server
DM Webtop Parameters 253
E-mail Address 160
E-mail integration 164
Client Deployment Utility settings 311
supported clients 290
Enable Application Integration Prompt on
Logon
DM Webtop Parameters 253
Enable Drag’n Drop
DM Webtop Parameters 253
Enable Fail-Over and Load Balancing
DM API Configuration 252
Enable Pre-logon Prompt
DM Webtop Parameters 254
Enable Workspaces
Group Features 166
System Parameter Defaults 141
Enabled
Launch Method Maintenance 195
Launch Methods 191
Event Notification Level 12
Exporting
Interceptor settings 285
registry files 297
Extension
Attachments to Index 246
People Maintenance 160
F
fail-over and load balancing
about 37
propagating the server list 122
propagation failures 122
setting up a server list 39, 120
system requirements 119
with Indexer server 63
Fax Phone 160
File Extension
File Type Maintenance 198
File Types 197
File Extensions
adding 202
deleting 204
disabling 204
editing 204
enabling 204
file type
defining 197
listing 197
Filing Scheme
Application Maintenance 188
Force Cleanup of Shadowed Documents 148,
179
Force Import of Attache Documents 306
form default values 175
forms for client applications, location 11
Free Space Threshold (MB) 152
Full Name
People 158
People Maintenance 160
G
Group Format
DM Webtop Parameters 257
Group ID 163
Group Maintenance 164
Group Name 163
Group Maintenance 164
Groups
adding new groups 163
aliases 177
Attache settings 177
default forms 173
features 164
Group Applications Form 176
Group Master Form 174
Group Paper Form 175
Group Preferences 179
Group Primary Form 175
Group Profile Search Form 175
Group Quick Retrieve Form 176
listing 162
members 172
parameters 163
permissions 167
synchronization 182
utility access 168
versions 170
GroupWise e-mail integration 290, 312
Guest Name
DM Webtop Parameters 255
Guest Network Name
DM Webtop Parameters 255
Guest Password
DM Webtop Parameters 255
H
HTML-Rendering Character set
DM Webtop Parameters 256
HTTP 43
HTTP binding 43
I
Icons, per-user configuration 449
IIS 109
Imaging DDE settings 277
INDEX
483
Implied Century Rule Date 138
Import Group 182
Import User 180
Importing
Interceptor settings 286
registry files 297
Incremental threshold
DM Webtop Parameters 257
index settings 17
Indexes and Profiles
adding keywords 248
Attachment to Index 246
Custom Profile Defaults 248
defining Attachment to Index 247
keywords 247
maintaining Custom Profile Defaults 249
indexing
index selection 17
log files 74, 80, 88
indexing with DM Indexer
administering an index from a different
server 79
backing up and restoring an index 80
compressing an index 26, 32, 77
creating an index 21, 66
deleting an index 23
immediate mode vs. periodic mode 61
index location 66, 76
index log files 80, 88
index properties 24
Indexer server 63
Indexer user 65
monitoring index activities 80
overview 60
pausing an index for system backups 79
reindexing an index 31, 78
484
SearchServer password 36
starting the Indexer 23, 75
stopwords 82
system requirements 63
troubleshooting problems 88
wildcards 81
Inform when update available
Group Features 166
System Parameter Defaults 141
Inteceptor
integrating applications 279
Integration
Launch Method Maintenance 194
Interceptor
adding new applications to 280
configuring new applications 280
definition 264
deny access to settings 287
disabling integration 283
editing launch method settings 283
exporting settings 285
integrating applications 279
launching 280
settings tab 285
Interceptor, Per-user Configuration of 457
K
Keyword
Keyword Maintenance 248
Keywords 247
keywords
adding 248
listing 247
L
launch methods
selecting 191
setting up 192
libraries
default 16
inability to find 19
purging the activity log 430
security 94
library generation, creating a new library from
an existing library 431
Library Group 155
Library Groups 182
Library Name 153, 154
Library Parameters
changing terminology 155
editing document server settings 150
listing document servers 150
listing remote libraries 153
setting up a remote library 153
System Attache settings 146
system default values 138
system defaults 135
system features 137
system permissions 142
system preferences 149
system utilities 142
system version settings 144
terminology, listing 155
Library Users 181
load balancing. See fail-over and load
balancing
Load Network
Group Synchronization 183
User Synchronization 181
Location
Launch Method Maintenance 192
log file
settings 8
Log File Location 136
loginact.asp 112
logins and passwords
access to SQL 94
Attache 98
document server security 104
Logon Option 306
Enable Log Off 306
Force Import of Attache Documents 306
Logon Settings 306
Logon Tab 307
Lotus applications
Lotus 1-2-3 DDE settings 275
Lotus Notes 312
Lotus WordPro DDE settings 275
M
Make New Version from Any Version
Group Versions 171
Versions 145
Manage DM Webtop 144, 169
Manage Doc Import Information 170
Manage Index and Profile Parameters 143,
169
Manage Library Parameters 143, 169
Manage Users and Groups 143, 169
Manage Validation Tables 143, 169
Maximum Sub-versions 146, 172
Maximum sub-versions 205
Maximum tabs on Quick Reference page
DM Webtop Parameters 253
Maximum Versions 146, 172, 205
Media Type 151
Member of 161
INDEX
485
Microsoft
Excel
Active integration, additional setup 450
Active integration, COM automation 453
Active integration,ODMA 449
Passive integration,ODMA 452
PowerPoint
Active integration,ODMA 449
Project
Active integration, additional setup 451
Active integration,ODMA 449
Passive integration,ODMA 452
Word
Active integration,COM automation 453
Active integration,ODMA 449
Passive integration,COM
automation 453
Passive integration,ODMA 452
Microsoft applications
DDE settings 268–272
Excel DDE settings 268
Outlook
e-mail integration 290
PowerPoint DDE settings 271
Project DDE settings 271
Visio DDE settings 272
Word
DDE settings 269
footer macros 288
MIME Type
Application Maintenance 189
Minimum Age For Delete (Days) 148, 179
Minimum Local Disk Space (MB) 148, 179
Move Docs When Profile Changes 140
Move Documents When Profile Changes 165
multi-lingual support 256
486
multilingual support
DM Webtop 440
full-text searches 14
full-text searching 443
Multiple File Extensions 198
Multiple Published Versions 145
N
Name
Custom Parameter Definition 259
Custom Parameters 259
Custom Profile Default Maintenance 249
Custom Profile Defaults 248
Native dialog boxes, restricting access to 287
NetTCP 43
NetWare
document servers 46
security for users 103
Network 181
Group Synchronization 182
network accounts
security 99
Network Bindings Configuration 43
network logon preferences 13
Node Icons 219
Non-Compatible Apps 197
Non-Member of 161
Non-Members 172
NT Security Service 100
Number of Characters to TRIM document/
folder name
DM Webtop Parameters 253
Number of Groups in Security Dialog
DM Webtop Parameters 253
O
ODMA
Active integration 449
Passive integration 452
ODMA integration
definition 264
Office 158
On Document Select 254
Operating System 151
Optical 205
Owner 155
P
Passive Integration
integrating applications 279
Passive integration
COM automation 453
ODMA 452
Passive Integration, definition 264
PCDOCS.INI file, location 11, 19
performance monitor settings 423
Per-user DM Linking Configuration 454
Phone 160
Physical Location 150
Document Server 150
Plug-ins, configuring 298
Pre-Connect Search Libraries 165
Pre-connect Search Libraries 140
Presentations, See Corel Suite
Prevent Message Modification 313
preview generation 127
Primary Document Server 136
Primary Group 160
Print Application
Application Maintenance 188
Profile Form
Custom Profile Default Maintenance 249
Profile Level Security 139, 165
Profile on Send 316
Project, See Microsoft applications
purging the Activity Log 430
Q
Quattro Pro, See Corel Suite
Query Language
DM Webtop Parameters 255
Quick Save 306, 307
R
Read Only 151
Recent Edits setting 258
Registry
exporting files to users 297
exporting Interceptor settings 285
importing Interceptor settings 286
importing new file 297
remote libraries 16
listing 153
setting up 153
Remove Items from Profile New Docs 168
Replacement Value 156
results set settings 47
Rights Inheritance Scheme 144
Run Cost Recovery Module 144, 170
Run Database Import Utility 143, 169
Run Designer Utility 144, 170
Run DM Admin 143, 169
Run Document Import 143, 169
Run Storage Management Utility 144, 170
INDEX
487
S
Search
multi-lingual 256
Search by Default 154
SearchServer. See indexing with DM Indexer
Secure Documents at Network Level 137
security
about 92
DM clients 106
document 91
Document Sentry Agent (DSA) 100
document server access 108
library 94
library authentication 104
NetWare document servers 101
network authentication 105
network operating system level 97
NT Security Service 100
reapplying trustees after recovery from
backup 436
setting up 98
setting up client software 103
users 98
Windows NT/2000 NTFS volumes 100
Security Regeneration utility 436
security, users in NetWare-only
environment 103
server clusters, defining 120
Server Location 154
Server Manager
client application forms 11
creating and managing indexes 20
default library 16
fail-over and load balancing 37
index settings 17
internal caches 50
488
libraries 15
location of PCDOCS.INI file 11
log settings 8
NetWare document servers 46
network logon preferences 13
results set settings 47
SearchServer password 36
starting and stopping 5
starting and stopping the DM Server 6
Server Password 154
Server User Name 154
Shadow documents settings 303
Shadow Edited Files to Local Drive 178
Shadow Files to Local Drive 147
Shadow Path Template 136
Shadow Secured Documents 147, 178
Shadow this Library 154
Short Name 158, 159
Shows on Desktop 190
SQL connection cache size, changing 19
SQL logins and passwords 94
SQL-Connection Cache Size 18
stopwords
DM Indexer 82
Storage Type
archive 205
Delete 205
Keep 205
Optical 205
Sub-version, maximum 205
Supervisor Application 191
Supported File Extensions 198
synchronization
group 182
groups 182
user 180
System Parameters
Attache 146
attache options, setting 146
default values 138
defaults 135
features 137
preferences 149
system permissions 142
utilities 142
versions 144
T
Target Document Server 160
Target Server Column 136
Term Name 156
terminology
changing 155
listing current 155
Time Format 149, 180
Timeout Logon Info
DM Webtop Parameters 254
Timeout Script
DM Webtop Parameters 254
Timeout Session
DM Webtop Parameters 254
Topic Name
DDE Settings, Open 195
DDE Settings, Print 196
transaction monitoring 13
Tree Nodes Configuration 323
Tree Refresh time
DM Webtop Parameters 257
Tree Rendering Mode
DM Webtop Parameters 257
U
Universal Access 164
Use Common Search Form
DM Webtop Parameters 253
Use Enhanced ACL Settings 138
User Format
DM Webtop Parameters 257
User Interface
tree nodes configuration 323
User Location 160
users
adding new 159
adding to groups 172
group membership 161
network aliases 160
synchronization 180
Users and Groups
adding new groups 163
adding new users 159
adding users to groups 161
default Group forms 173
form default values 175
Group aliases 177
Group Applications Form 176
Group Attache settings 177
Group Features 164
Group Master Form 174
group members 172
Group Paper Form 175
group permissions 167
Group Preferences 179
Group Primary Form 175
Group Profile Search Form 175
Group Quick Retrieve Form 176
group synchronization 182
INDEX
489
group utility access 168
group version settings 170
listing current groups 162
user network aliases 160
user synchronization 180
users, security setup 98
utilities
Activity Log Purge 430
ADDLIB 431
group access 168
Security Regeneration 436
system parameters 142
V
Valid on Profile 190
Validation Tables
Custom Ttables 209
DDE settings
configuring 195
defining applications 187
defining compatible applications 196
file type 197
file type, modifying 197
maintaining Custom Tables 209
selecting launch methods 191
setting up applications 186
setting up launch methods 192
Validation tables
document types 205
Value
Custom Parameter Definition 259
Custom Parameters 259
versions
group settings 170
system settings 144
Versions, maximum 205
490
Viewer Application
Application Maintenance 188
Viewer Control Configuration 455
Visit Author Requesting Edit 145, 171
Visit Entered By 145, 171
W
WCF
InactivityTimeoutMinutes 420
MaxArrayLength 420
MaxConcurrent Sessions 421
MaxReceived MessageSize 420
ports 44
tuning 419
URL Components 44
Webtop Parameters 253
wildcards in content searches 81
Windows Communication Foundation
(WCF) 43
Windows NT NTSF volumes, security 100
WordPerfect, See Corel Suite