Getting Started with IBM FileNet P8 Content Manager Install, customize, and administer the powerful FileNet Enterprise Content Management platform William J. Carpenter [paf i/t1 enterpri I I flv»» IV I I professional expertise c se distilled 88 PUBLISHING BIRMINGHAM - MUMBAI
Preface 1 Chapter 1: What is ECM? 7 ECM in three sentences 8 Use cases 9 Central Document Repository 9 Compliance and governance 10 Document-centric workflow 11 Things to look for in an ECM platform 12 Safe repository 13 Strong security features 13 Platform support 13 Scalability 14 Extensibility and add-ons 14 Vendor and partner ecosystem 14 Enterprise interoperability 14 Strong APIs 15 Notifications and triggers 15 Traditional document management features 15 Versioning and history 15 Workflow integration 16 Search and navigation 16 Auditing and reporting 16 Metadata 16 ECM and standards 16 AIIM: DMA and ODMA 17 DMA 17 ODMA 18 WebDAV 18 JCR 19
CMIS 19 What ECM is not 19 ECM is not CMS 19 ECM is not a database 20 ECM is not source code management 21 A bit of FileNet history 22 Summary 23 Chapter 2: Installing Environmental Components 25 Some important IBM documents 25 Plan and prepare your environment 27 Fix Pack Compatibility Matrix 28 Environmental components 28 Hardware and software requirements 29 Tailored planning and installation guides 30 Our target environment 31 Configuring the environmental components 33 User and group accounts 34 Red Hat Enterprise Linux 36 Network addresses 37 System clocks 37 File storage area 38 Firewalls 39 Installing DB2 40 Create a new database 42 Drop default user tablespace 42 Create a buffer pool definition 42 Create tablespaces 43 Add a user to the database 44 Set DB2 parameters 45 Repeat for OSTORE1 45 WebSphere Application Server 45 Profiles and ports 46 WAS process attributes 48 WAS performance tweaks 50 WAS and DB2 51 Installing Tivoli Directory Server 52 Using the directory 54 Populating the directory 55 TDS web console setup 56 Server-side sorting 59 The suffix 59 Users 60 Groups 62 CE-specific entries 63 Manual TDS queries 64
Scripts and desktop shortcuts 64 Summary 67 Chapter 3: Installing the Content Engine 69 An aside about some names 69 P8 platform architecture 70 Content Engine (CE) 71 Other components 73 Application Engine (AE) 73 Content Search Engine (CSE) 74 Process Engine (PE) 74 Rendition Engine (RE) 74 Installing the CE 75 Getting the software 75 Running the CE server installer 76 Configuration Manager 76 WAS console tweaks 81 Installing FEM 83 Bringing up the P8 Domain 88 Create an ObjectStore 90 Summary 92 Chapter 4: Administrative Tools and Tasks 93 Domain and GCD 94 Topology levels 98 Using topology levels 100 Exploring Domain-level items 100 AddOns 102 Fixed Content Devices 103 Server Cache configuration 103 Content configuration 105 Trace logging 106 Content cache 109 Exploring Object Store-level Items 109 Content Access Recording Level 110 Auditing 111 Checkout type 111 Text Index Date Partitioning 112 Cache configuration 113 Metadata 114 Property templates 114 Choice lists 115 Classes 116 Subclassing example 117 [iii]
Table of Contents Object Browse and Query 124 Summary 126 Chapter 5: Installing Other Components 127 Content Search Engine (CSE) 129 The CSE user 130 Running the CSE installer 130 Command line configuration steps 133 Configuring CSE via the K2 Dashboard 134 Configuring CE for CSE via FEM 136 Configuring the P8 Domain 137 Configuring an Object Store 133 Process Engine server (PE server) 141 Users and groups 142 Database configuration 143 DB2 database and tablespaces 143 DB2 user permissions 144 DB2 client software PE server installation and configuration 145 PE server installation CE client installation PE server configuration 147 Shared memory 149 Test the connections CE configuration for PE PE client software Application Engine (AE) 151 Workplace XT (XT) 151 Configure LDAP 152 Trust relationships and LTPA 154 Run the installer 155 CE and PE client software 155 CE client PE client XT pre-deployment configuration 157 Deploying XT 158 Classloader configuration 159 Map special subjects ORB uniqueness Running XT the first time 150 IBM System Dashboard for ECM (SD) 1S2 Rendition Engine (RE) 163 Summary 164 144 146 140 150 150 151 15g 157 igg 16q
Chapter 6: End User Tools and Tasks 165 What is Workplace XT? 166 Browsing folders and documents 167 Adding folders 167 Adding documents 168 Viewing documents 170 Entry templates 171 Workflow interactions 172 One-time isolated region setup 173 Approval workflows 174 Tasks in XT 175 Versioning 176 Properties and security 179 Searches 180 Simple Search 181 Keyword Search 182 Advanced Search 182 Stored Searches and Search Templates 183 Summary Chapter 7: Major CM Features 187 Documents 188 Content 188 Multiple content elements 189 Content transfer and content reference 189 Content element numbering 190 Versioning Checkout and checkin 192 Freeze 193 Major and minor versions 194 Document lifecycles 195 Autoclassification 196 Compound documents 197 DITA publishing 198 Rendition Engine 198 Search 199 Merge mode 200 Selectable and searchable properties 201 Property searches and full-text searches 201 JDBC provider 202 Search Templates and Stored Searches 203 Folders and containment 204 185 191 [v]
Referential containment 204 Filing 205 Containment names 207 The decision to file documents 208 Custom properties and classes 209 Properties of Class Definitions 210 Properties of Property Definitions 210 Custom objects 212 Annotations 213 Links 214 Subscriptions, events, and auditing 215 What is an event? 216 Subscriptions 217 Audit logging 219 Content Access Recording Level 219 Event handlers 220 Workflow launch 220 AddOns 221 AddOn components 222 Creating and installing AddOns 222 Authoring an AddOn 223 Summary 224 Chapter 8: Security Features and Planning 225 Authentication or authorization? 225 Authentication in CM 226 Java Authentication and Authorization Service (JAAS) 227 Where authentication actually happens 230 Application Server trust relationships 230 Thick EJB clients 231 CEWS clients 232 Single Sign-on 235 Anonymous and guest access 236 Impersonation and run-as 237 Enterprise directories 239 Authorization in CM 240 Discretionary and Mandatory Access Control 240 Access Control Lists 241 User and group access 243 Rights 243 Levels 244 Unused bits 245 Implicit rights 245
Object Owner 246 Object Store administrator 246 Special query right 247 Extra access requirements 247 Modification Access Required 247 Target Access Required 248 Default instance security 249 #CREATOR-OWNER 250 Security policy and document lifecycle policy 250 Security Policy and Security Templates 251 Document lifecycle policy 252 Dynamic security inheritance 252 Inheritable depth 253 Parent and child security objects 253 System-defined inheritance 255 Roles and adapters 256 Project team example 256 Project team adapters 257 Folders as adapters 259 Marking sets 259 A marking set example 261 The final veto 262 A hypothetical scenario 263 The players The business requirements The strategy The implementation The test Summary Chapter 9: Planning Your Deployment 269 Distributed deployments in functional tiers 270 Web browsers 270 Web servers CE, PE, and friends 272 Databases and filesystems 272 Custom applications 273 Parallel environments 273 Pre-production Development and testing How many domains? 275 How many Object Stores? 277 Network security 278 TLS/SSL 278 Firewalls 279 263 263 265 265 267 268 271 274 274
Supported platforms 280 Integrating content with workflow 281 Content storage 281 Database Storage Area 282 File Storage Area 282 Fixed content devices 283 Content Federation Services (CFS) 283 Clustering, High Availability, and Disaster Recovery 284 Clustering 284 High Availability 285 Disaster Recovery 285 Distributed deployments 286 CE topology 287 PE considerations 288 CSE considerations 288 CE distributed deployment features 289 Content cache 289 Request Forwarding 290 Typical distributed deployments 291 Remote application tier 291 Remote application and CE tier 292 Summary 292 Chapter 10: Included and Add-On Components 293 Standard CM components 294 Server components 294 Applications and connectors 295 Environmental components 296 Initiatives and scenarios 297 Compliance management 297 IBM Enterprise Records (IER) 298 Declaration 298 Classification 299 Protection 299 Disposition 299 Audits and reporting 301 IBM ediscovery 301 IBM ediscovery Analyzer (eda) 302 IBM ediscovery Manager (edm) 303 IBM Content Collector 303 ICC for File Systems 304 ICC for Microsoft SharePoint 304 ICC for Email 304 Task connectors 304
IBM Classification Module 305 Smart Archive Strategy 306 Ingestion 307 Infrastructure 307 Management 307 IBM FileNet Business Process Manager 308 IBM FileNet Business Process Framework 308 IBM Enterprise Content Management Widgets 309 Other components 309 IBM FileNet System Monitor 309 IBM FileNet Image Services 309 IBM FileNet Capture and Datacap 310 Content Management Interoperability Services 310 Darwin Information Typing Architecture 311 IBM Content Analytics 311 Summary 312 Chapter 11: A Taste of Application Development 313 The Content Engine APIs 314 Don't bypass the APIs 314 Reading 314 Updating 315 API transports 316 CEWS transport 316 EJB transport 317 User transactions 318 JAAS context 319 Transport-specific coding 319 CE.NET and Java APIs 320 CEWS protocol 321 Attachment formats 322 Compatibility layers 323 Java Compatibility Layer 324 COM Compatibility Layer 325 CEWS 3.5 protocol 325 Other APIs 326 PE APIs 326 CMIS 326 ECM Widgets 327 AE/XT customization and integration 328 Development environments 328 CE Java API in Eclipse 329 The project 330 CE API dependencies 332
The application code 333 Running the application 335 Some things we didn't show 336 CE.NETAPI in VS C# Express 337 The project 337 CE API dependencies 339 The application code 340 Running the application 342 Some things we didn't show 342 Summary 342 Chapter 12: The DUCk Sample Appiication 343 Business requirements 344 Restricted quantity documents 344 Restricted circulation documents 345 Design of end-user view 345 Common login screen 346 Find documents 347 Content download 348 Adding a document 349 Viewing details for a document 350 Restricted quantity documents 351 Restricted circulation documents 352 Modifying a document 352 Enterprise mandates 354 Navigational overview 354 Data model and security model 356 Document properties 356 Restriction indicators 357 Restricted circulation 357 Access logging 358 Access control 359 Requests for access 359 Restricted Quantity 361 Technical implementation details 363 CE metadata changes 363 The annotation subclass 364 Custom document properties 364 Custom events 364 Audit logging configuration 365 Deploying the event handler code module 366 The DuckRQB project 367 New code module 368 Modifying a code module 368 Debug logging 370 The Duck project 371 [X]
Exporting and deploying Duck.war 374 Deployment descriptor 375 Deploying to WAS 376 Selecting the JSF Runtime 376 Configure role mapping 377 Starting the application 377 Summary 378 Chapter 13; Support, Fix Packs, and Troubleshooting 379 Resources 379 Documentation 380 Information center 380 Standalone documents 381 Other links 382 IBM Redbooks 383 IBM developerworks 384 Worldwide IBM ECM Community 384 Online support resources 385 Support portal 385 PMRs and APARs 385 Technotes 385 Personalized notifications 386 Fix Central 386 Information on demand conferences 387 Releases and fixes 387 Product releases 387 Interim fixes 389 Fix packs 391 Installing fix packs 393 Supporting components 393 CM components 394 CE 4.5.1.4 server 395 CSE 4.5.1.1 client 396 CSE 4.5.1.1 server 397 Redeploying the updated CE server 398 CE 4.5.1.4 clients 401 XT 1.1.4.8 402 Troubleshooting 404 Prevention 404 Configuration Control 404 Snapshots 405 Backups 405 Looking for trouble 406 Initial configuration 406 Authentication 407 WAS bootstrap information 409 Performance 409
Trace logging Isolation Database tuning Summary Index 410 410 ^ 412 413 [xii]