Professional Documents
Culture Documents
December 2004
ApplicationXtender
Release 5.25
Administrator’s Guide
Final Document - Last Modified on 12/10/04
Legato Software
A Division of EMC Corporation
End-User License Agreement
THIS PRODUCT CONTAINS CERTAIN COMPUTER PROGRAMS AND OTHER PROPRIETARY MATERIAL, THE USE OF WHICH IS SUBJECT TO THIS
END-USER LICENSE AGREEMENT (THE "EULA"). DO NOT PROCEED WITH THE INSTALLATION OF THIS PRODUCT UNTIL YOU (LATER DEFINED
AS LICENSEE) HAVE READ THIS EULA AND AGREE TO BE BOUND BY AND BECOME A PARTY TO THIS EULA. BY PROCEEDING WITH THE
INSTALLATION OF THIS PRODUCT (OR AUTHORIZING ANY OTHER PERSON TO DO SO), YOU AND YOUR COMPANY ACCEPT THIS EULA AND
YOU REPRESENT THAT YOU ARE AUTHORIZED TO DO SO. IF YOU ARE ACCESSING THE PRODUCT ELECTRONICALLY INDICATE YOUR
ACCEPTANCE OF THESE TERMS BY SELECTING THE "ACCEPT" BUTTON AT THE END OF THE EULA. IF YOU DO NOT AGREE TO THE TERMS OF
THIS EULA, YOU MAY RETURN THIS PRODUCT, ALL MEDIA AND DOCUMENTATION, AND PROOF OF PAYMENT, TO THE PLACE YOU OBTAINED
THEM FOR A FULL REFUND WITHIN THIRTY (30) DAYS OF FIRST ACQUIRING THIS PRODUCT OR, IF THE PRODUCT IS ACCESSED
ELECTRONICALLY, SELECT THE "DECLINE" BUTTON AT THE END OF THIS EULA AND RETURN PROOF OF PAYMENT IN ACCORDANCE WITH THE
ABOVE REFERENCED RETURN/REFUND PROCESS. WRITTEN APPROVAL IS NOT A PREREQUISITE TO THE VALIDITY OR ENFORCEABILITY OF
THIS EULA AND NO SOLICITATION OF ANY SUCH WRITTEN APPROVAL BY OR ON BEHALF OF LEGATO SHALL BE CONSTRUED AS AN
INFERENCE TO THE CONTRARY. IF YOU HAVE ORDERED THIS PRODUCT, LEGATO'S ACCEPTANCE IS EXPRESSLY CONDITIONAL ON YOUR
ASSENT TO THESE TERMS TO THE EXCLUSION OF ALL OTHER TERMS; IF THESE TERMS ARE CONSIDERED AN OFFER BY LEGATO, ACCEPTANCE
IS EXPRESSLY LIMITED TO THESE TERMS.
1. DEFINITIONS 3.3 Restrictions on use. Licensee shall not, and shall not aid, abet, or permit
any third party to: (i) decompile, disassemble, or otherwise reverse engineer
1.1 Authorization Code: means the unique code provided to Licensee by or attempt to reconstruct or discover any source code or underlying ideas or
Legato for permanent activation of the Software. The Authorization Code is algorithms of the Software by any means whatsoever; (ii) remove any
provided to Licensee once the Enabler Code is registered with Legato. The identification, copyright, or other notices from the Software; (iii) provide,
Authorization Code may be tied to a unique machine ID code supplied by lease, lend, use for timesharing or service bureau purposes; (iv) create a
Licensee. derivative work of any part of the Software; or (v) develop methods to enable
1.2 Documentation: means the user reference materials on any media, unauthorized parties to use the Software. If EC law is applicable, the
provided by Legato for use with the Software. restrictions in Section 3.3 (i) are limited so that they prohibit such activity only
to the maximum extent such activity may be prohibited without violating the
1.3 Enabler Code: means the code provided by Legato for activation of the EC Directive on the legal protection of computer programs. Notwithstanding
Software. the foregoing, prior to decompiling, disassembling, or otherwise reverse
1.4 Licensee: means the person or entity acquiring this License or for whom engineering any of the Software, Licensee shall request Legato in writing, to
this License was acquired. provide Licensee with such information or assistance and Licensee shall
refrain from decompiling, disassembling, or otherwise reverse engineering
1.5 Software: means the object code copy of the software program provided any of the Software unless Legato cannot or has not complied with such
to You in association with this EULA, together with the associated original request in a commercially reasonable amount of time.
media and all accompanying Documentation, and together with all Updates
that may be provided by Legato to You from time to time. 3.4 Purchase Orders. Nothing contained in any purchase order,
acknowledgment, or invoice shall in any way modify the terms or add any
2. OWNERSHIP AND ADMINISTRATION OF SOFTWARE additional terms or conditions to this EULA.
2.1 Ownership and Title. As between the parties, Legato, and its licensors, 3.5 Updates. This section applies if the Software acquired is an update to the
own and shall retain all right, title, and interest in and to: (i) the Software original Software (the “Update”). An Update does not constitute a legally
including all intellectual property rights embodied therein; (ii) all of the licensed copy of the Software unless purchased as an Update to a previously
service marks, trademarks, trade names, or any other designations associated licensed version of the same Software. The Update may only be used in
with the Software; and (iii) all copyrights, patent rights, trade secret rights, accordance with the provisions of this EULA. The Update, together with the
and other proprietary rights relating to the Software. original Software, constitutes one (1) legally licensed copy of the Software.
2.2 Software Activation. Legato employs Enabler Codes and 3.6 Evaluation License. This Section applies if the Software is being used for
Authorization Codes that enable the use of the Software. The Software is an initial thirty (30) day evaluation period. The license is valid only for a
shipped in a ”Media Kit” which consists of object code software on CD-ROM period of thirty (30) days from the delivery of the Software, and is designed
and an Enabler Code for initial activation of the Software or the Software and to allow Licensee the right to evaluate the Software during such period. In
Enabler Code may be delivered electronically. Once Legato receives the event that Licensee desires to continue to license the Software, Licensee
confirmation from Licensee that the Software is installed with the correct must purchase a license to the Software. Upon such purchase, Licensee will
Enabler Code, and is provided with the host ID information, Legato will be provided with an Enabler Code in accordance with Section 2.2 above. In
provide the Authorization Code to Licensee. Legato administers the the event Licensee determines not to purchase a license for the Software at the
generation and distribution of Enabler and Authorization Codes, which end of such thirty (30) day evaluation period, then Licensee’s rights under
administration may be modified by Legato from time to time. this EULA shall terminate automatically and Licensee shall promptly return
2.3 Administration of Software. Legato may include on the media with the to Legato or destroy all copies of the Software and so certify to Legato.
Software additional computer programs which are not currently licensed for 3.7 General Public License ("GPL"). The Software may include one or more
use by Licensee and to which the Enabler Code or Authorization code will not components which are derived from software subject to a General Public
permit access. Inclusion of such additional computer programs in no way License. Any such components are licensed exclusively under the applicable
implies a license from Legato and access or use of such programs is strictly GPL and not under this EULA.
prohibited unless Licensee procures the right to use any such program and
the applicable Enabler Code is provided thereto. 4. MAINTENANCE AND SUPPORT
3. LICENSE GRANT 4.1 Legato has no obligation to provide support, maintenance, upgrades,
modifications, or new releases under this EULA. Legato may provide such
3.1 Grant. Legato grants to Licensee a non-exclusive, nontransferable, services under separate EULA.
non-sublicensable, perpetual (unless terminated in accordance with the
provisions of this EULA), license (the “License”) to (i) use the Software 5. LIMITED WARRANTY
installed in accordance with the Documentation and only on the licensed 5.1 Media and Documentation. Legato warrants that if the media or
computer(s) solely for its own internal operations; and (ii) move the Software documentation are damaged or physically defective at the time of delivery of
temporarily in case of computer system malfunction. The Software may be the first copy of the Software to Licensee and if defective or damaged product
licensed: (a) on a per copy or per seat basis, on a physical or virtual machine, is returned to Legato (postage prepaid) within thirty (30) days thereafter, then
(b) based upon the number of mailboxes or the number of non-concurrent Legato will provide Licensee with replacements at no cost.
users for which it may be used, or (c) based upon data volumes it supports.
The License granted under this EULA does not constitute a sale of the 5.2 Limited Software Warranty. Subject to the conditions and limitations of
Software or any portion or copy of it. Licensee may not use the Software on liability stated herein, Legato warrants for a period of thirty (30) days from
more than one computer system unless otherwise specifically authorized by the delivery of the first copy of the Software to Licensee that the Software, as
an explicit Software product, or additional licenses for additional computers delivered, will materially conform to Legato’s then current published
are purchased. Rights not expressly granted are reserved by Legato. Documentation for the Software. This warranty covers only problems
reported to Legato during the warranty period. For customers outside of the
3.2 Copies. Licensee may make copies of the Software provided that any such United States, this Limited Software Warranty shall be construed to limit the
copy is: (i) created as an essential step in utilization of the Software as warranty to the minimum warranty required by law.
licensed and is used in no other manner; or (ii) used for archival purposes.
All trademark and copyright notices must be reproduced and included on 5.3 Remedies. The remedies available to Licensee hereunder for any such
such copies. Licensee may not make any other copies of the Software. Software which does not perform as set out herein shall be either repair or
replacement, or, if such remedy is not practicable in Legato’s opinion, refund
of the license fees paid by Licensee upon a return of all copies of the Software
to Legato. In the event of a refund this EULA shall terminate immediately
without notice with respect to such Software.
Final Document - Last Modified on 12/10/04
6. WARRANTY DISCLAIMER 9.2 Government Restricted Rights. Any Software which is acquired directly
or indirectly for or on behalf of the United States of America, its agencies
6.1 Warranty Disclaimer. EXCEPT FOR THE LIMITED WARRANTY and/or instrumentalities ("U.S. Government"), is provided with Restricted
PROVIDED IN SECTION 5 ABOVE, ALL SOFTWARE IS PROVIDED "AS IS". Rights. Use, duplication, or disclosure by the U.S. Government is subject to
LEGATO AND ITS LICENSORS MAKE NO WARRANTIES WITH RESPECT restrictions as set forth in subparagraph (c)(1)(ii) of the Rights in Technical
TO ANY SOFTWARE AND DISCLAIMS ALL STATUTORY OR IMPLIED Data and Computer Software clause at DFARS 252.227-7013 or
WARRANTIES, INCLUDING WITHOUT LIMITATION WARRANTIES OF subparagraphs (c)(1) and (2) of the Commercial Computer Software -
MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, OR Restricted Rights at 48 CFR 52.227-19, as applicable. Manufacturer is Legato
ARISING FROM A COURSE OF DEALING OR USAGE OF TRADE AND Software, a division of EMC Corporation, 2350 W. El Camino Real, Mountain
ANY WARRANTIES OF NONINFRINGEMENT. LEGATO DOES NOT View, CA 94040. The Software is a commercial software product, licensed on
WARRANT THAT THE SOFTWARE WILL MEET ANY REQUIREMENTS the open market at market prices, and was developed entirely at private
OR THAT THE OPERATION OF SOFTWARE WILL BE UNINTERRUPTED expense and without the use of any government funds.
OR ERROR FREE. ANY LIABILITY OF LEGATO WITH RESPECT TO THE
SOFTWARE OR THE PERFORMANCE THEREOF UNDER ANY 9.3 Export and Import Controls. Regardless of any disclosure made by
WARRANTY, NEGLIGENCE, STRICT LIABILITY OR OTHER THEORY Licensee to Legato of an ultimate destination of the Products, Licensee may
WILL BE LIMITED EXCLUSIVELY TO THE REMEDIES SPECIFIED IN not directly or indirectly export or transfer any portion of the Software, or any
SECTION 5.3 ABOVE. Some jurisdictions do not allow the exclusion of system containing a portion of the Software, to anyone outside the United
implied warranties or limitations on how long an implied warranty may last, States (including further export if Licensee took delivery outside the U.S.)
so the above limitations may not be applicable. without first complying with any export or import controls that may be
imposed on the Software by the U.S. Government or any country or
7. LIMITATION OF LIABILITY organization of nations within whose jurisdiction Licensee operates or does
7.1 Limitation of Liability. EXCEPT FOR BODILY INJURY, LEGATO (AND business. Licensee shall at all times strictly comply with all such laws,
ITS LICENSORS) WILL NOT BE LIABLE OR RESPONSIBLE WITH regulations, and orders, and agrees to commit no act which, directly or
RESPECT TO THE SUBJECT MATTER OF THIS EULA UNDER ANY indirectly, would violate any such law, regulation or order.
CONTRACT, NEGLIGENCE, STRICT LIABILITY, OR OTHER LEGAL OR 9.4 Assignment. This EULA may not be assigned or transferred by Licensee
EQUITABLE THEORY FOR: (I) ANY INDIRECT, SPECIAL, INCIDENTAL without the prior written consent of Legato, which shall not be unreasonably
OR CONSEQUENTIAL DAMAGES, HOWEVER CAUSED AND withheld. Legato may assign or otherwise transfer any or all of its rights and
WHETHER OR NOT ADVISED IN ADVANCE OF THE POSSIBILITY OF obligations under this EULA upon notice to Licensee.
SUCH DAMAGES; OR (II) DAMAGES FOR LOST PROFITS OR LOST
DATA; OR (III) COST OF PROCUREMENT OF SUBSTITUTE GOODS, 9.5 Sole Remedy and Allocation of Risk. Licensee's sole and exclusive
TECHNOLOGY, SERVICES, OR RIGHTS; OR (IV) FOR AMOUNTS IN remedies are set forth in this EULA. This EULA defines a mutually
EXCESS OF THOSE RECEIVED BY LEGATO FOR THE PARTICULAR agreed-upon allocation of risk, and the License price reflects such allocation
LEGATO SOFTWARE THAT CAUSED THE LIABILITY . Because some of risk.
jurisdictions do not allow the exclusion or limitation of incidental or
consequential damages, Legato's liability in such jurisdictions shall be limited 9.6 Equitable Relief. The parties agree that a breach of this EULA adversely
to the extent permitted by law. affecting Legato's intellectual property rights in the Software may cause
irreparable injury to Legato for which monetary damages may not be an
8. TERM AND TERMINATION adequate remedy and Legato shall be entitled to equitable relief in addition
to any remedies it may have hereunder or at law.
8.1 Term. The term of this EULA is perpetual unless terminated in
accordance with its provisions. 9.7 No Waiver. Failure by either party to enforce any provision of this EULA
will not be deemed a waiver of future enforcement of that or any other
8.2 Termination. Legato may terminate this EULA, without notice, upon provision, nor will any single or partial exercise of any right or power
Licensee's breach of any of the provisions hereof. hereunder preclude further exercise of any other right hereunder.
8.3 Effect of Termination. Upon termination of this EULA, Licensee agrees 9.8 Severability. If for any reason a court of competent jurisdiction finds any
to cease all use of the Software and to return to Legato or destroy the Software provision of this EULA, or portion thereof, to be unenforceable, that
and all Documentation and related materials in Licensee's possession, and so provision of the EULA will be enforced to the maximum extent permissible
certify to Legato. Except for the License granted herein and as expressly so as to effect the intent of the parties, and the remainder of this EULA will
provided herein, the terms of this EULA shall survive termination. continue in full force and effect.
9. MISCELLANEOUS 10. ENTIRE EULA
9.1 Governing Law. This EULA shall be governed by the laws of the 10.1 This EULA sets forth the entire understanding and EULA between the
Commonwealth of Massachusetts, without regard to the principles of conflict parties and may be amended only in a writing signed by authorized
of laws or the United Nations Convention on Contracts for the International representatives of both parties. No vendor, distributor, reseller, dealer,
Sale of Goods. retailer, sales person, or other person is authorized by Legato to modify this
EULA or to make any warranty, representation, or promise which is different
than, or in addition to, the warranties, representations, or promises made in
this EULA. No pre-printed purchase order terms shall in any way modify,
replace or supersede the terms of this EULA.
Contents
Preface..................................................................................................................... 24.
Audience....................................................................................................................................... 24.
Product Documentation ................................................................................................................ 24.
Conventions.................................................................................................................................. 25.
Information and Services.............................................................................................................. 26.
General Information ............................................................................................................... 26.
Technical Support .................................................................................................................. 26.
Licensing and Registration..................................................................................................... 27.
Customer Feedback ..................................................................................................................... 27.
Database................................................................................................................................ 38.
Data Source ........................................................................................................................... 38.
Multiple Data Source Support ................................................................................................ 38.
Document Storage Locations ....................................................................................................... 38.
Document Write Paths ........................................................................................................... 39.
Dual Write Paths .................................................................................................................... 39.
DiskXtender............................................................................................................................ 39.
ArchiveXtender - Ascent Storage Edition............................................................................... 39.
ApplicationXtender Security ......................................................................................................... 40.
Security Providers .................................................................................................................. 40.
Application Level Security ...................................................................................................... 42.
Function Level Security.......................................................................................................... 42.
Document Level Security ....................................................................................................... 43.
Security Mapping ................................................................................................................... 43.
ApplicationXtender Components .................................................................................................. 44.
Administrative Components ................................................................................................... 44.
Application Generator ...................................................................................................... 44.
Index Server .................................................................................................................... 45.
Import Wizards ................................................................................................................ 45.
Index Image Import Wizard ....................................................................................... 45.
Key Reference Import Wizard ................................................................................... 45.
Auto Index Import Wizard.......................................................................................... 45.
Administrative Utilities ..................................................................................................... 45.
Archive Wizard .......................................................................................................... 46.
Migration Wizard ....................................................................................................... 46.
Queue Manager ........................................................................................................ 46.
Move Online .............................................................................................................. 46.
ArchiveXtender Configuration ................................................................................... 47.
User Components .................................................................................................................. 47.
ApplicationXtender .......................................................................................................... 47.
Data Source Selector ...................................................................................................... 47.
ScanXtender .................................................................................................................... 47.
XtenderSolutions License Server........................................................................................... 48.
Ways of Using ApplicationXtender ............................................................................................... 48.
Using the AX Interface ........................................................................................................... 48.
What is Check In/Check Out Mode? ............................................................................... 50.
What is Reason Audit Mode? .......................................................................................... 50.
Preface
Audience
The information in this guide is intended for system administrators who are
responsible for installing software and maintaining the servers and clients on a
network. Operators who monitor the daily backups may also find this manual useful.
Product Documentation
ApplicationXtender is one module in the ApplicationXtender Content Management
suite. The following is a list of documentation for related products that may be useful
when working with AX:
• XtenderSolutions Administrator’s Guide
• XtenderSolutions Administrator’s Quick Reference
• ApplicationXtender Installation Guide
• ApplicationXtender Administrator’s Quick Reference
• ApplicationXtender User’s Guide
• ApplicationXtender User’s Quick Reference
• ScanXtender User’s Guide
• ScanXtender User’s Quick Reference
• ApplicationXtender Add-on for Microsoft Outlook Integration Guide
• ApplicationXtender Add-on for Microsoft Outlook Quick Reference
• ApplicationXtender Technical Product Overview
Preface
Most of these documents can be found in the Documentation directory on the product
CD-ROM. All documents are in Adobe Acrobat Portable Document Format (PDF), and
can be viewed by downloading and installing the Adobe Acrobat Reader. The Reader
is available on the Documentum® AX/WX CD-ROM, or directly from Adobe at
www.adobe.com. To install and use the Reader on the preferred platform, refer to the
instructions on the Adobe web site.
Conventions
This document uses the following typographic conventions and symbols to make
information easier to access and understand.
boldface Names of line commands, The nsradmin command starts the command
daemons, options, programs, line version of the NetWorker Administrator
or scripts program.
italic in text Pathnames, filenames, Displayed messages are also written to
computer names, new terms /nsr/logs/daemon.log.
defined in the Glossary or
The specifications are created, one for each swap
within the chapter, or
file, in c:\pagefile.sys.
emphasized words
italic in command A variable that must be nwadmin -s server_name
line provided in the command line
fixed-width Examples and information media waiting: recover waiting for 8mm
displayed on the screen 5GB tape volume name
fixed-width, Commands and options that nsr_shutdown -a
boldface must be entered exactly as
shown
Menu_Name> A path or an order to follow for Volume>Change Mode>Appendable
Command making selections in the user
interface
Important: Information that must be read
and followed to ensure
successful backup and Important: Use the no_verify option with
recovery of data extreme caution.
Preface
General Information
The Documentum web site provides most of the information that customers might
need for ApplicationXtender product suite support. For specific sales or training
needs, e-mail or call Documentum.
Updates,
Patches,
Technical and Company
Bulletins and Service and Product
Service or Resource Documentation Packs Information Training
Technical Support
Documentum provides technical assistance for only those products sold by
Documentum. For assistance with third party products, please contact the third party
vendor.
The Documentum web site provides contact information, technical documentation,
and information about available support programs.
• Customers with an active support agreement have access to the integrated
product knowledge base. Help with software issues is also available through
Technical Support.
• Customers without an active support agreement can contact Support Sales and
Renewal to purchase annual software update subscriptions, or technical support
services for per-update/per-incident assistance.
Preface
Note: Documentum technical support and update subscription services apply only to
(i) Documentum price-listed software that Documentum supplies to its customers; and
(ii) customers that have entered into an authorized Documentum technical support
agreement.
Customer
Location Web Site Telephone Number Fax Number E-mail
Customer Feedback
Documentum welcomes comments and suggestions about its documentation.
To provide input on our documentation, complete the survey at
support.documentum.com/wcmprodData/docs/documentum_technical_publications_custome
r_survey.htm.
Chapter Summary
The following table summarizes each chapter of this document:
Chapter Description
"Using Audit This chapter contains information on the Audit Trails feature in
Trails" on page 69 Application Generator. Audit trails can be used to track user
activity within the AX system. You may want to enable audit
trail prior to creating applications and setting up users and
groups so that you can track the changes you make as you make
them.
"Managing This chapter describes how to set up users and groups for your
Security" on AX system. It also describes how to configure the Document
page 219 Level Security (DLS) feature.
"Managing the This chapter details configuration and use of the Index Server, an
Index Server" on optional AX module, to provide full-text indexing capabilities to
page 339 the AX system.
Chapter Description
"Managing This chapter discusses how print, OCR, and full-text queues can
Queues" on be managed through the Queue Manager.
page 383
"Importing and This appendix describes how to import data about applications
Exporting XML and security into Application Generator (AppGen), if that data
Data" on page 464 has been exported to an XML file. This appendix also describes
how to export this data from AppGen to an XML file.
Overview
Use of the ApplicationXtender content management system can be divided into two
areas of activity: administrative and user. For the most part, this manual describes
administrative tasks. This chapter, however, provides an overview of the entire
ApplicationXtender system, including definitions of central AX concepts and
descriptions of the functionality of AX modules.
This chapter contains the following sections:
• "Introduction to AX Concepts" on page 31 discusses the three central concepts:
applications, security, and document storage.
A primary responsibility of an AX system administrator is the creation and
maintenance of applications in ApplicationXtender. AX applications are data
storage structures where users can easily store and retrieve a variety of objects
(such as word processing files, scanned images, and text files) as documents.
Identifying index information is attached to each document when it is stored. The
repository of index information for all of the stored documents in an application
can be searched to retrieve documents. The functionality of the index-driven,
application-centered storage model of AX is discussed in greater detail in
"Introduction to AX Concepts" on page 31.
One important aspect of maintaining applications in ApplicationXtender is the
creation of security settings for those applications. A carefully planned security
strategy allows authorized users quick access to stored information while
protecting confidential applications and documents from unauthorized viewing.
A discussion of the security features in AX can be found in "Introduction to AX
Concepts" on page 31.
The AX system administrator must also decide where AX document files will be
stored. This chapter provides a discussion of document storage concerns,
including definitions of storage terminology and an overview of storage
considerations.
• Each of the modules of ApplicationXtender provides specific functionality, some
intended for use by users, some for use by administrators. "ApplicationXtender
Components" on page 44 describes the different modules of the
ApplicationXtender system and their potential uses.
• "System Administrator Best Practices" on page 53 discusses tasks that an AX
system administrator should undertake to successfully administer
ApplicationXtender. This section provides an overview of the role of the AX
system administrator, including descriptions of the typical duties and
responsibilities of the administrator.
Introduction to AX Concepts
The functionality of the ApplicationXtender (AX) system centers on a few key
concepts. An understanding of these concepts helps you to deploy AX effectively for
your organization.
Documents
Page Versions
Pages
Index Fields
(act as labels)
Application
Glossary of AX Terms
The AX terms listed below provide a better understanding of the ApplicationXtender
system and its functional components, such as the applications, documents, pages, and
indexes, and how they relate with each other.
Annotations
ApplicationXtender allows users to add annotations to any image or text document
page. An annotation is a note or a shape added to a document page, typically to focus
attention on a particular part of the page. Users can use annotations to comment on the
contents of a page, block areas of the page from view, or highlight important
information. When a user creates an annotation, it is associated with the AX document
page on which he/she created it. Annotations are edited and stored separately from
the image, but they are displayed along with the image in AX.
The types of annotations available include text, highlighting, lines, arrows, shapes, and
rubber stamps. Rubber stamp annotations allow users to place preset and custom text
annotations on a page as well as image files supported by the AX image library and
embedded foreign files. When any type of annotation (line, shape, text, highlight, or
rubber stamp) has the redaction property applied to it, the annotation is considered to
be a redaction.
You can use privileges to apply annotation-related security measures, so that
annotations and redactions of any type can be created, modified, hidden, moved, or
deleted only by users who have appropriate privileges. However, if you want to
control users’ access to specific annotations, you must use annotation groups.
Annotation groups allow you to create associations between users, groups, and
specific annotations. You can specify which users and groups can view or modify
specific annotations, and which users and groups can hide or modify specific
redactions. You use AppGen to create annotation groups and to populate them with
existing users and existing groups. Then, in AX, certain users who are members of
annotation groups can assign annotations to those annotation groups.
Applications
An application is the highest level of organization in ApplicationXtender. Users can
store documents in an application and retrieve documents from an application.
You create applications through an AX module called Application Generator
(AppGen). During application creation, you name the application and set up one or
more index fields for the application.
Every time a user stores a document in an application, they must enter index
information for that particular document into the index fields. After the document is
saved, it is compressed and stored in the document write path specified in Application
Generator as a BIN file. AX stores the index information in a database so that users can
search it later to retrieve documents.
Audit Trails
You can configure the Audit Trails feature in Application Generator to track user
activity within the AX system. System-wide activities, such as the creation,
modification, and deletion of applications, users, and groups can be tracked. You can
also track user activity in applications by tracking items such as the creation and
deletion of documents, the addition of pages, and the modification of index
information for documents. By default, AX logs audit trail events to a table in the AX
database, which can be accessed through your database software. You can configure
audit trails to log to this table, to a log file, or to both locations.
COLD/ERM Data
COLD (computer output to laser disk) data and ERM (enterprise report management)
data is report data generated for existing applications, indexed using an extraction
process, and downloaded into AX applications. COLD/ERM data can be added to AX
as documents through the use of ColdXtender® (CX) or ERMXtender™ (ERMX). CX
produces ASCII documents and ERMX produces ASCII or PDF documents. These
documents are known as CX/ERMX documents. Form overlays can be added to ASCII
CX/ERMX documents to allow users to view the report data in the context of a
standard form. (Form overlays can not be added to PDF documents.) AX can perform
text searches on CX/ERMX documents, allowing you to locate important data within
the report.
If you use ERMX to add ERM data to AX as documents, you can configure ERMX to
upload entire reports along with those documents. If you do so, the users who have
appropriate privileges can display, print, export, or delete these ERMX reports.
Digital Signatures
Digital signatures allow users to electronically sign any page version in AX and
WebXtender (WX). Like a written signature, the purpose of a digital signature is to
guarantee that the individual signing the page really is who he or she claims to be and
that the document has not changed since the date of the signature. When a page of a
document is signed, the signature is applied to the BIN file for the currently displayed
version of the page.
Digital signatures support compliance to standards such as the Health Insurance
Portability and Accountability Act of 1996 (HIPAA) and Title 21 Code of Federal
Regulations Part 11 (21 CFR 11) where digital signatures are a pre-requisite. For more
information, see "Configuring AX for Compliance to Standards" on page 51.
Documents
A document is a file or group of files stored in an application and identified by index
information. (See "Indexes" on page 34.) Each page of a document is a single object,
such as a scanned image file or a word processing document. Users create a document
by adding an object to an application and entering index information. The user can
then add additional objects as additional pages of the same document.
A document can be as small as one page, or can contain thousands of pages. Users can
store different types of data as pages within one document. For instance, a hospital
patient’s document could include a patient’s scanned admission forms, a doctor’s
report in Microsoft Word format, and an x-ray. Any combination of objects within a
document is possible.
When a user stores a document in an application, he/she must enter information for
each of the document’s index fields. The information acts as a label for the document,
and because the information is stored in a database, the user (or other AX users) can
search for that "label" to retrieve the document.
In order to retrieve the document later, the user searches for the record of index
information entered to identify the document. When a user makes a search request in
ApplicationXtender, all records of index information containing a match with the
information requested is displayed in the result set.
A user can retrieve any document by selecting its record from the result set, as long as
the user has adequate security privileges. Users can process all of the pages within a
document as a single unit (print, fax, e-mail, or export), or can process pages
individually. A user can print or fax several documents at once by selecting them from
the result set and choosing the appropriate command. If users have the proper security
privileges, they can modify documents and their indexes at any time.
Full-Text
Users can index documents for full-text searching by submitting them to the Index
Server. A full-text search is a search of document content, rather than index values. The
following types of documents can be full-text indexed in AX:
• Bi-level (black and white) images
• Rich Text Format (RTF) files
• Hypertext Markup Language (HTML) files
• Foreign files added by importing the files into AX
• Portable Document Format (PDF) files
With a full-text search, a user can find a document even if he does not know any of the
index values. Users can also use full-text searching to refine an index value search.
For more information, see:
• "Managing the Index Server" on page 339
Indexes
An ApplicationXtender index is a group of fields where information relating to
documents can be stored. When a user stores a document in an application, the index
values he/she enters identify the document.
The index for an AX application is its central component, and therefore indexes are an
important concept in understanding applications. The index is the part of the
ApplicationXtender system that allows users to organize stored documents efficiently.
Documents can be stored in ApplicationXtender in random order, and yet still be easily
retrieved, because every document stored has an index record attached to it. Users can
search all stored index values for an application and retrieve relevant documents.
As the AX system administrator, you can customize the index for an AX application.
During application creation, you decide what index information will be requested
from the user and what the format for that information will be. When the administrator
creates an index in AppGen, the administrator plans how many descriptive entries to
request for each stored document, what type of information to use to identify the
documents, how much space to provide for each entry, and how the information for a
particular entry will be entered.
Figure 2. Example of a Document Index
AX uses the fields specified during application creation to build an Index view.
Whenever a user adds a document to an application, this Index view requests exactly
the information that he/she needs to enter. This view provides a space for the user to
enter a value for each of the fields defined in the index definition.
OCR
Users can process bi-tonal images using optical character recognition (OCR). This
process converts an image of text into text. After a user processes an image using OCR,
it can then be submitted to the Index Server for full-text searching.
ODMA
Open Document Management API (ODMA) support allows users to work with AX
documents within other, ODMA-compliant, applications such as Microsoft Word. For
example, using ODMA’s check in process, users can save documents to AX. They can
save a non-AX document as a new AX document, adding AX index values and
document summary information. They can also check out and modify an existing AX
document, as long as the following is true:
• That document was added to AX as a foreign file
• The ODMA-compliant application is installed on the AX computer
• The file is a type of file supported for use with ODMA for AX
They can then check it back into AX as a major revision, as a minor revision, as a new
page version, or as a replacement page version. Through ODMA’s check out process,
they can retrieve previous document revisions and the most recent page version of the
first page in a document from AX.
When users search for AX documents through ODMA, they can utilize all of the
normal search functionality in AX. The search dialog box that displays in the
ODMA-compliant application is similar to the Search tab that is used in AX. Through
ODMA, however, they can also add and then query document summary properties.
Pages
Page typically implies a single entity. Because ApplicationXtender supports multiple
object types, a page is defined as a single object. A very long word processing file is
considered a page by AX. A page could also be, for example, a single scanned image,
a 30-minute video clip, or an audio recording.
When a user creates a document in AX, the object added as the new document is the
first page of that document. Other pages can be added to the document using the New
command in the Page menu in AX. All of the pages for a document have the same
index record attached.
Users can use the Document menu commands to process all of the pages in a document
together. They can use the Page menu commands to process pages individually. They
can also insert or delete pages at any time. Up to 250,000 pages can be attached to a
document, and a page may come from one of many different types of sources.
Page Versions
The user may create different versions of the same page in order to add another layer
of organization within a document.
Different versions of the same page do not have to have the same object type. (For
example, the original page version might be a Microsoft Word file, but the new version
is a spreadsheet.)
Redactions
Users can use redactions to secure or hide portions of image and text document pages.
Redactions are annotation shapes that are filled and opaque. Users can apply redaction
to all available shapes: lines, freehand lines, arrows, rectangles, rounded rectangles,
and ovals. When applied, the area of the page behind the redaction is not visible.
OLE DB
OLE DB is a programming interface for accessing data, and is a fundamental building
block for storing and retrieving data using Microsoft’s Data Access Components
(MDAC). OLE DB provides flexible data architecture that offers applications, like AX,
efficient access to databases. Data is accessed through OLE DB data providers. Data
providers are installed on your workstation with some operating systems and their
service packs or with MDAC.
If MDAC 2.7 Service Pack 1 has not already been installed on your workstation, the AX
setup wizard installs it. MDAC 2.8 is also supported. MDAC installs data providers for
SQL Server, Oracle, and ODBC. The Microsoft OLE DB Provider for ODBC Drivers
provides access to Microsoft Access and Sybase SQL Anywhere. When you install the
IBM DB2 server or client, the IBM OLE DB Provider for DB2 is installed and can then
be used for access to IBM DB2 data sources.
In order to use OLE DB, three components are required:
• An OLE DB consumer (ApplicationXtender)
• An OLE DB data provider (installed with MDAC)
• A DBMS server (Microsoft SQL Server or Oracle, for example)
Because AX supports OLE DB, it can use many different databases. However, not all
OLE DB data providers have been tested with AX. The following table lists the
databases that have been tested with AX and the OLE DB data providers that you can
use to access each database:
Microsoft SQL Server version 2000 Microsoft OLE DB Provider for SQL Server
Microsoft Access (available only in the Microsoft Jet 4.0 OLE DB Provider
demonstration and standalone versions
Microsoft OLE DB Provider for ODBC
of AX)
Drivers
Microsoft SQL Server, IBM DB2, Oracle, and Sybase SQL Anywhere are multi-user
relational database management systems that are capable of supporting hundreds of
simultaneous users. They are intended for use with high volume systems.
Note: Microsoft Access is intended only for demonstration/evaluation purposes or
standalone systems of low volume (single user systems of fewer than 100,000
documents). High-volume or networked systems using Microsoft Access are not
supported.
ADO.NET
ADO.NET is a programming interface for accessing data in a .NET application such as
XSAdmin, WX, and the Component Setup Wizard. ADO.NET drivers provide access
to Oracle, Microsoft SQL Server, and IBM DB2. OLE DB .NET drivers provide access to
Microsoft Access and ODBC.
When you select a data provider for your data source, select an OLE DB data provider.
It will be automatically converted to an OLE DB .NET driver for XSAdmin, WX, and
the Component Setup Wizard.
Database
A database is a collection of data tables of a particular database format (such as Oracle
or Microsoft SQL Server). ApplicationXtender uses databases to store application
information. When an application is created, details such as the field definitions and
security information are stored in database tables. Once documents are added to an
application, index information is stored in a table, as are the pointers to the location of
the documents.
Data Source
A data source is the means by which ApplicationXtender accesses data from a
database. When a data source is defined, an OLE DB data provider is configured to
access the database. All of these characteristics in combination – where the data is
stored, the format of the data stored, and the data provider used to access the data –
comprise the data source. Data sources are created and managed in XtenderSolutions
Administrator. For more information, refer to the XtenderSolutions Administrator’s
Guide.
Although all document pages are compressed before storage, they can take up a
significant amount of storage space. The volume and nature of the data (image,
COLD/ERM, video, sound, and so on) requires special storage considerations. Optical
storage systems can be used as a cost-effective alternative to large amounts of magnetic
disk storage. ApplicationXtender can utilize any optical server product that can appear
as a logical volume to the workstation, including the LEGATO DiskXtender
software.
DiskXtender
The LEGATO DiskXtender (DX) software revolutionizes data storage management
for Windows. By intelligently controlling hardware devices and access to files on
media, DiskXtender allows you to save and retrieve files to and from extended NT file
system (NTFS) volumes (DX "extended drives"). DX moves files out to media, keeping
track of each file’s location. When files are needed, DX seamlessly retrieves and
delivers them to the user. DX lets you automate file migration through a user-friendly
interface that displays hardware, media and extended drives, all in one unified "tree"
structure. To write AX documents to DiskXtender, you must configure a DX connection
in XSAdmin and specify a document write path in AppGen that points to a
DiskXtender extended drive. For more information on configuring DX server
connectivity, refer to the XtenderSolutions Administrator’s Guide.
the application write path and for each AX workstation that will write AX documents
to ArcX-ASE or retrieve documents from ArcX-ASE. For instructions on performing
this configuration, refer to the "Using a Document Storage Server" chapter of the
XtenderSolutions Administrator’s Guide.
Note: ArcX-ASE is supported only for legacy purposes.
ApplicationXtender Security
Security is the combination of authentication and authorization. Authentication
requires all users to enter a valid user name and password to access most modules.
Authentication is configured within XtenderSolutions Administrator (XSAdmin) to
ensure that each user is who he or she claims to be. XSAdmin allows you to configure
authentication credentials and select a security provider for each data source.
XSAdmin offers two pre-packaged security providers (CM and Windows). You can
also create a directory service security provider, if necessary.
Authorization is the granting of specific access privileges according to the user name.
Security profiles contain information pertaining to a user’s specific privileges within
the AX system. Security profiles are configured within Application Generator
(AppGen), following standard user and group rules. AX offers three levels of security
(application, functional, and document) to prevent unauthorized users from gaining
access to sensitive information stored in the ApplicationXtender systems.
In addition, if you intend to use the Migration Wizard to migrate documents and
security information from one data source to another, you can configure security
mapping to "map" users and groups in the source database to users and groups in the
destination database. You can also configure security mapping if you intend to use the
ReportXtender® (RX) Extraction Wizard to extract documents and security
information to a CD-ROM.
For more information, see:
• "Security Providers" on page 40
• "Application Level Security" on page 42
• "Function Level Security" on page 42
• "Document Level Security" on page 43
• "Security Mapping" on page 43
• "Managing Security" on page 219.
Security Providers
Security providers implement authentication, which requires all users to enter a valid
user name and password to access most modules. XSAdmin offers two pre-packaged
security providers (CM and Windows) to ensure that each user is who he or she claims
to be. You can also create a directory service security provider, if necessary.
XSAdmin allows you to choose the security provider for each data source. Then,
Application Generator (AppGen) allows you to create users and groups and to import
users and groups. The following table lists the differences between the security
providers:
Security
Provider Description
Directory • If you are already using a directory service to maintain users and
service groups in your enterprise, you can configure the system to use the
directory service and create a new security provider in XSAdmin.
(Requires configuration of a web service.) For instructions, refer to
the XtenderSolutions Administrator’s Guide.
• You can import users and groups from a directory service via an
LDAP interface, such as Microsoft Active Directory or Netscape
Directory Server.
• When you change a user’s password or group membership in the
directory service user maintenance utility, the next time that user
logs into an XtenderSolutions module, the changes are reflected in
the authentication of that user and the functions available to that
user.
• You must use the directory service user maintenance utility to
maintain passwords and group membership.
If you want the AX system to use the Windows security provider, keep in mind the
following points:
• If any of the AX workstations have Windows 98 or Millennium (ME) as the
operating system, you must install the License Server on a workstation that has
Windows NT or 2000 as the operating system. This is necessary so that a security
agent associated with the License Server can implement the Windows security
provider on the Windows 98 or ME workstations.
• If you want to allow a user to log in to AX with user account information other
than what was used to log in to the workstation, you must give the "Act as part of
operating system" advanced user right either to the additional user account on
that workstation or to the License Server service account on the License Server
workstation. (Of the two methods, the latter is recommended.) For example, if
you log into your workstation as RFROST and you want to log into AX as
RSIMPSON, the account must have the "Act as part of operating system"
advanced user right.
For instructions on selecting a security provider for a new AX system or for an existing
AX system, refer to the XtenderSolutions Administrator’s Guide.
functions, such as creating, modifying, and deleting applications; and scanning and
printing documents. There are also settings for accessing commands on certain menus,
such as Image Enhancement.
For example, if a user will not be configuring the AX workstation, you can disable the
Configure WS privilege in the user’s security profile. The user will have access to only
four tabs on the AX Configuration dialog box (View, Display, Fonts, and Scan) and only
three tabs on the SX Configuration dialog box (View, Display, and Scan).
Note: The Configure WS privilege allows users to configure all aspects of workstation
configuration and should only be granted to administrative users.
Security Mapping
When the Migration Wizard is used to migrate documents and security information,
the administrator has the option to map users and groups in the source database to
users and groups in the destination database. Similarly, when the ReportXtender (RX)
Extraction Wizard is used to extract AX documents and security information before the
creation of an RX CD-ROM, the administrator has the option to map users and groups
in the source database to users and groups in the database on the CD-ROM (or in the
database where the CD-ROM will be reintegrated).
Consider a Migration Wizard example in which the only users who will need access to
the destination database are Sarah, Wei, and Mark, and those users do not exist in the
source database. In this example, the administrator who performs the migration
should select three user accounts in the source data source, the RUTH, JOHN, and REX
user accounts, which have privileges that Sarah, Wei, and Mark would need. The
administrator should enable alternative security (security mapping) for the RUTH,
JOHN, and REX user accounts and specify that those three users should be migrated
as SARAH, WEI, and MARK, with the appropriate passwords.
When a Migration Wizard migration is performed, if the Use alternative security
option is enabled in the Migration Wizard, only the users and groups with alternative
security information configured are migrated.
ApplicationXtender Components
ApplicationXtender has several components, or modules, each of which performs a
specific function within the AX system. For more information, see the following
section:
• "Administrative Components" on page 44 describes the AX components that
should be used by the AX system administrator.
• "User Components" on page 47 describes the AX components used by both
system administrators and users.
Administrative Components
The AX system administrator uses the components described in the following sections
to create and maintain the AX content management system:
• "Application Generator" on page 44
• "Index Server" on page 45
• "Import Wizards" on page 45
• "Administrative Utilities" on page 45
Application Generator
Application Generator (AppGen) provides access to many administrative functions.
Applications can be created, modified, purged of index information, or deleted. For
more information, see "Designing an Application" on page 84, "Creating an
Application" on page 134, and "Managing Existing Applications" on page 151.
System security on the application, functional, and document levels is configured
through user profiles, group profiles, and the Document Level Security feature.
AppGen is also used to configure security mapping prior to a Migration Wizard
migration or a ReportXtender (RX) Extraction Wizard extraction. For more
information, see "Managing Security" on page 219.
Customized specifications can be created to customize the import of specific index
information using the Auto Index Import Wizard, Key Reference Import Wizard, or
Index Image Import Wizard. For more information, see "Import Wizards" on page 290.
You can track actions taking place with the AX system using the Audit Trails feature in
AppGen. For example, the creation and deletion of documents and applications can be
tracked if you enable audit trails for those items. For more information, see "Using
Audit Trails" on page 69.
Index Server
The Index Server is a module that provides full-text search functionality and OCR
processing for AX systems. You can submit an image to the Index Server for OCR
processing or you can add text information to the Index Server for full-text indexing.
You can process scanned images using OCR, then add the resultant text version of the
document to the Index Server, allowing users to search on "key" words that might be
located anywhere on the document. The Index Server runs as a service. You can choose
from two full-text engines: ProIndex and Verity. For more information, see "Managing
the Index Server" on page 339.
Import Wizards
AX has three import wizards. For a brief description of each, see the following sections:
• "Index Image Import Wizard" on page 45
• "Key Reference Import Wizard" on page 45
• "Auto Index Import Wizard" on page 45
For more information, see "Import Wizards" on page 290.
Administrative Utilities
AX has utilities for the AX system administrator. For more information, see the
following sections:
• "Archive Wizard" on page 46
• "Migration Wizard" on page 46
Archive Wizard
Documents are usually accessed frequently for a period of time after they are added to
an application. Once they are no longer current, however, they are accessed
infrequently, if at all.
The Archive Wizard allows you to move less frequently accessed documents within an
application from more expensive, faster access storage, such as a hard drive, to less
expensive, larger capacity media, such as a CD-ROM. By archiving older documents to
removable media, you can free storage space on faster access media, then use that
space to store more frequently accessed documents. When documents are archived,
they can still be accessed by searching and retrieving them within the application
where they were originally stored; AX only changes the document’s physical storage
location and sets a new pointer to the document’s new location. For more information
on the Archive Wizard, see "Using the Archive Wizard" on page 161.
Migration Wizard
The ApplicationXtender Migration Wizard moves or copies AX application
definitions, application import specifications, application data, user lists and group
lists from one data source to another data source. The Migration Wizard can be used to
distribute information to other sites or to scale AX solutions to larger or smaller
databases. You can choose to migrate all AX application data or just a subset of the
information. Several applications can be migrated without exiting the wizard to
change the source database. You can automate application migration using the save
and load settings features in addition to using extensive command line options. Only
users who have been given AX Administrator privileges in Application Generator can
perform migrations. For more information on the Migration Wizard, see "Using the
Migration Wizard" on page 182.
Queue Manager
Queue Manager allows you to monitor all of your data sources and queues.
You can view the contents of a data source or set a data source as default. In each data
source, you can monitor various types of AX queues: Index Server queues for full-text
indexing, Index Server queues for OCR processing, and Image Print Server (IPS)
queues. You can also run saved queries from Queue Manager. For more information on
Queue Manager, see "Managing Queues" on page 383.
Move Online
This component allows users to move scanned documents from a local scan storage
area to the primary document write paths for the relevant applications. Move Online
can help you to reduce network traffic during peak times.
You can configure ApplicationXtender to store scanned documents locally. After you
have finished scanning documents locally, you can use Move Online to move all of the
locally stored documents to the document write paths for their respective applications.
AX tracks the locations of the documents and places them in the proper write paths.
An appendix to the ApplicationXtender User Guide describes how to move scanned
documents from a local scan storage area to the primary document write path for the
appropriate application.
ArchiveXtender Configuration
ArchiveXtender - Ascent Storage Edition (ArcX-ASE) can be used as a Document
Server for your AX document storage. The ArcX-ASE Configuration component allows
you to specify the name of an ArcX-ASE server for an AX workstation. This procedure
is necessary if the workstation will be used write AX documents to ArcX-ASE or
retrieve documents from ArcX-ASE.
Note: ArcX-ASE is supported only for legacy purposes.
User Components
All of the AX system users, including the administrator, use the components described
in the following sections:
• "ApplicationXtender" on page 47
• "Data Source Selector" on page 47
• "ScanXtender" on page 47
ApplicationXtender
ApplicationXtender (AX), the central program in the AX system, provides the interface
through which users store, retrieve, view, and process documents. Documents and
pages can be added one at a time, or can be imported in batches.
Users can perform index searches in AX to locate documents. Once a document has
been retrieved in AX, the user can adjust the display of the document. Users can add
comments to documents in the form of text annotations, can highlight areas of
documents, and can apply redactions to documents using a variety of shapes. Users
can print, fax (using the Print command), e-mail, or export documents and pages from
AX. The Configuration dialog box in AX provides a way to configure several features
that effect the way AX looks or performs.
ScanXtender
ScanXtender® (SX) is a scanning module integrated with ApplicationXtender. Batches
are scanned in SX and then released to AX for indexing. Each page in a batch can be
used to create a new document in AX.
The SX interface is based on the AX interface so that users who are familiar with AX
can start working immediately in SX. SX contains only the features of AX that are
needed for scanning batches of images into the AX system.
SX allows users to store, retrieve, view, and process batches. Batches and pages can be
added singly, or can be imported many at a time. A Batch List for each application is
shared between SX and AX, so that SX users can add pages to batches in the list while
AX users are creating indexed documents from other batches in the list.
Once a batch has been retrieved from the Batch List in SX, users can adjust the display
quality of images included in a batch. Users can print or fax (using the Print command)
pages from SX.
For more information on using ScanXtender, refer to the ScanXtender User Guide.
Check in/check out mode relates to the use of revision control in AX. Revision control
keeps track of who is working on a document and can be used to track previous
revisions of a document. When revision control is in use, a user must check a document
out before they can modify it. When users finish modifying documents, they must then
decide how (or whether) to resave the documents to the AX document repository.
When a user checks out a document, a copy of the document as it exists in the AX
repository is created by AX. This copy becomes the working copy for the user. The user
can close a checked out document and keep the document checked out so he/she can
continue working on it.
At any time, when a user finishes modifications, he/she can choose to check the
document back in. When the user checks a document in, the document that was
initially checked out is saved as a previous document revision (or deleted through
replacement) and the working copy is saved to the AX document repository as a new
(minor or major) document revision.
The user can also choose to cancel check out of the document. When a user cancels
check out of the document, the working copy created when he/she checked the
document out is deleted, and AX considers the revision of the document that was
originally checked out as the current revision. Any changes made to the working copy
are discarded.
Reason audit mode, which can be configured on the application level, requires users to
enter comments whenever they create, display, export, print, or e-mail documents.
When users display documents in reason audit mode, they must select options to print,
e-mail, or export if they want access to those functions once the documents are
displayed. Reason audit mode requires the use of Audit Trails, because it allows you to
audit the reasons users are displaying, exporting, printing, or e-mailing documents.
If you enable the Prompt for checkout when open documents option for the
application, when a user checks in a document in an application, the user can mark the
document as a final revision. Once this is done, users can open the document only in
read-only mode and cannot check out or modify the document. Users with the Delete
Doc privilege can delete final revisions. For information on enabling final revision
functionality when you set up AX applications, see "Entering Application Information"
on page 137.
As the system administrator, you may want to make sure that all users on your AX
system are operating AX in the same mode. Unless the mode is enabled for an entire
application, users can configure the use of check in/check out mode on the Data tab in
the AX Configuration dialog box on each AX workstation. You can, however, set check
in/check out mode or reason audit mode for an entire application when configuring
the application in AppGen to ensure consistency.
If you restrict access to the Data tab by not granting users the Configure WS right in
AppGen, you can prevent users from switching between modes. You can also
configure the use of check in/check out mode or reason audit mode in Application
Generator for each application. Enabling check in/check out mode for applications
supports compliance with the Health Insurance Portability and Accountability Act of
1996 (HIPAA). (For more information, see "Recommendations for Compliance with
HIPAA" on page 51.) Check in/check out mode is enabled for a user if it is enabled for
either the user’s current workstation or the user’s current application.
ODMA
The ODMA feature is an alternative way to create, index, and retrieve AX documents.
Before users can access this feature, ODMA support must be enabled on their AX
workstations. You can configure the use of ODMA on the Data tab in the AX
Configuration dialog box on each AX workstation.
ODMA uses the Open ApplicationXtender Document dialog box to interface with
ODMA-compliant applications and the ApplicationXtender system to create and
access AX documents. For example, on the Open ApplicationXtender Document
dialog box, users can open and save non-AX documents to AX using the File Selection
button, enter search criteria to perform queries to find existing AX documents from the
Search tab, and check out an existing AX document to modify, or open it as read-only
from a Result Set tab like the one in AX.
Once all modifications are completed, a user can check in the modified document to
AX as a major revision, as a minor revision, as a new page version, or as a replacement
page version. For more information on foreign file types that can be accessed using
ODMA, refer to the ApplicationXtender User Guide.
Extended Applications
Extended applications are AX applications that can be called from within other
software applications, adding document storage and processing functions via the AX
software development kit (SDK). With an extended application, index fields are
defined in AppGen to organize the images or other documents to be added. You can
then set up a way to call ApplicationXtender functions from within other applications.
The method for accessing those AX functions depends on the application being
enabled. In some applications, an ApplicationXtender menu can be added to the menu
bar or a button bar can be created; in others, shortcut keys can be assigned to particular
AX functions.
AX’s COM automation interface provides access to AX functions and its database.
ApplicationXtender functions (such as add document, display, fax, print, and many
others) can all be executed from within an extended application. As with a turnkey
application, documents are stored by attaching index information to be used for later
retrieval. However, data can be acquired from the extended application to index,
retrieve, or display AX documents. Storage of index information for extended
applications is handled by ApplicationXtender, just as it is in turnkey applications. The
AX SDK provides the COM automation interface documentation and samples. AX also
supports dynamic data exchange (DDE). DDE documentation is provided in PDF
format. For more information, contact your sales representative.
Application Information" on page 137. For instructions on enabling this option for
an existing application, see "Changing the Options for an Application" on
page 155.
5. For each AX workstation, you can specify a default certificate and provide a
default comment to be used when applying signatures. For instructions, see
"Document Signing Tab" on page 452.
Default certificate and comment settings can be saved to a workstation settings file,
which can be used to quickly load the same settings to other AX workstations. For
instructions, see "Saving and Loading Settings" on page 455.
If a workstation does not have default certificate or comment settings, the user will
be prompted to select a certificate and/or enter a comment when applying a
signature. For instructions, refer to the ApplicationXtender User’s Guide.
System Security
AppGen provides easy methods of protecting and controlling vital information. The
system contains various levels of security. You manage user and group security
profiles; issue new user names, passwords and privileges; remove inactive users;
manage group membership; and change passwords when needed.
In addition, AX allows for the usage of two pre-packaged security providers: CM or
Windows. You can also create a directory service security provider, if necessary. The
type of security provider used should be determined before implementing AX. For
more information about security providers, see "Security Providers" on page 40.
License Groups
If any license groups have been created in the License Server, you can specify their use
for individual users, for individual workstations, or for individual License Servers. The
following general guidelines apply:
• If you specify a license group for an individual user, then each time that user logs
on to an AX component on any workstation, using any License Server, that license
group is used. For instructions on specifying a license group for a user, see
"Changing an Existing User’s License Group" on page 257.
• If you specify a license group for an individual workstation, then each time any
user logs on to an AX component on that workstation, using any License Server,
that license group is used. For instructions on specifying a license group for a
workstation, see "The License Server Location" on page 66.
• If you specify a license group for an individual License Server, then each time any
user logs on to an AX component on any workstation and uses a license from that
License Server, that license group is used. For instructions on specifying a license
group for a License Server, see "The License Server Location" on page 66.
However, the license group for a user overrides the license group for the workstation
or for the License Server. For example, the license group GROUP1 is specified for the
AXUSER user, the license group GROUP2 is specified for the AXUSERWS workstation,
and the license group GROUP3 is specified for the Xtender License Server. If the
AXUSER user logs in using a license from the Xtender License Server, on the
AXUSERWS workstation, the GROUP1 license group is applied.
Also, the license group for a workstation overrides the license group for the License
Server. For example, the license group GROUP2 is specified for the AXUSERWS
workstation and the license group GROUP3 is specified for the Xtender License Server.
If any user logs in using a license from the Xtender License Server, on the AXUSERWS
workstation, the GROUP2 license group is applied.
Consider assigning license groups to users rather than to License Servers, to minimize
the number of licenses in use for each user. If license groups are assigned to License
Servers, each time a user logs in to a different data source, the user may be using a
separate license.
License groups can be created for AX licenses, Pro-Index full-text client licenses, Verity
full-text client licenses, SX licenses, WX licenses, WX PAL licenses, and ERMX client
licenses. For more information on configuring license groups, refer to the License Server
Administrator’s Guide.
Workstation Configuration
You can decide whether the configuration of the AX workstations in your AX system
is controlled by you or by the individual workstation user. If you restrict access to more
advanced configuration options by not granting users the Configure WS right in
AppGen, you can prevent users from changing configuration options that affect
workstation functionality and maintain more control over AX configuration. AX has
Save Settings and Load Settings features that allow you to copy workstation
configurations from one workstation to another. Using these features, you can set up a
single workstation, and then copy the configuration for that workstation to other
workstations. By using a combination of the Save/Load Settings features and the
Configure WS privilege in each user’s profile in AppGen, you can ensure uniformity
of configuration for all workstations on the AX system.
System Backups
Regular system backups are crucial for comprehensive data protection. A schedule
should be put in place for backing up the data in the document write paths for your
applications. As the final authority on ApplicationXtender, the AX system
administrator is ultimately responsible for the security of the data and is therefore
responsible for backing up the system. This task may be automated or delegated, but
you should follow up to be certain of data integrity and accuracy. Depending upon the
site’s configuration, a schedule should be put in place for backing up the document
storage server (such as the LEGATO DiskXtender software) as well.
Database Maintenance
Depending on the database you are using, you may need to perform the following
maintenance procedures on a regular basis:
• Database backups must be included in the regular system backup schedule.
• You must periodically check that there is sufficient available hard drive space on
the database server.
• In addition, in order to optimize database performance, you must periodically
rebuild indexes and check for database corruption, using the tools provided for
your database, such as SQL Server's database consistency checker (DBCC).
For more information on the maintenance required for your database, refer to the
documentation provided with your database software.
Hardware Maintenance
Along with the standard computers and printers, a variety of other hardware can be
used with ApplicationXtender, including scanners, fax equipment, optical drives and
libraries. You should be familiar with any hardware used in conjunction with the
system since these components significantly influence the performance of AX.
Maintenance contracts from hardware vendors are strongly suggested.
Software Maintenance
The AX system administrator upgrades the AX system as needed. This may include
installing service releases to products or upgrading when a new product comes out.
Some updates can be added to your License Server so that each AX workstation can be
updated through the Update Monitor. For instructions, refer to the
UpdaterApplication.pdf file on the AX setup CD-ROM.
The administrator also monitors the need for additional functionality. The following
table describes examples of modules that can be added to the system, and suggests a
reference for more information on each. The documents mentioned can be obtained
from your sales representative.
Helping Users
The AX system administrator is the first point of contact for all questions pertaining to
the ApplicationXtender system. You should be prepared to troubleshoot and provide
instructions on how to operate the system.
Documentation Maintenance
As part of assisting users, the AX system administrator stocks updated software
documentation. This includes the ApplicationXtender Installation Guide, the
ApplicationXtender User Guide, the ApplicationXtender Administrator’s Guide, and
ApplicationXtender online help, which are updated with every new release. Manuals
for any other software and hardware used with the system should be included as well,
such as word processing, spreadsheet, printer, or scanner guides. By providing easy
access to this information, you encourage more efficient use of ApplicationXtender.
Important: All of the settings that you enter in the Data Source Selector are stored in
C:\Documents and Settings\All Users\Application Data\XSCM.CONFIG. Do not edit the
contents of the XSCM.CONFIG file.
2. Double-click the data source to set it as default, or select the data source and click
Set as Default. A white check mark within a black background ( ) should appear
next to it.
3. Click OK or Apply. (OK saves your changes and closes the dialog box. Apply saves
your changes without closing the dialog box.)
Note: You must specify a data source as default before you can close the AX Data
Source Configuration dialog box.
Variation Description
If this is the first time Use the default user name for the AX system administrator:
you are logging into SYSOP. The initial password for the SYSOP user is xscm.
a new AX system
Note: The SYSOP user account has full privileges and cannot
be deleted or modified. For security reasons, the password for
this account should be changed to prevent administrative
access by unauthorized users.
If this is a Enter the user name for an administrative account that has
subsequent login been created for the selected data source. This user account
must have the AX Administrator privilege in AppGen.
If the current data When you attempt to start XtenderSolutions software, your
source is using the current Windows user account is checked for authentication
Windows security and authorization. Depending on your profile, you might be
provider automatically logged into the software without a Login dialog
box.
If you want the Login dialog box to appear, press [Shift] while
you attempt to start the software and until the Login dialog
box appears.
You must precede the user name with a domain and a
backslash. For example, typing CM\axadmin indicates the
"axadmin" user on the "CM" domain.
Note: If you do not specify a domain, the result depends on
your operating system. If you are using Windows NT or 2000,
the domain is taken from the currently logged on user
account. If you are using Windows 98 or Millennium (ME),
you will not be able to log in.
Passwords are case-sensitive.
Variation Description
If the security After you click Login, a message appears indicating that the
provider for the security provider for the current data source has been
selected data source changed in XSAdmin. See Figure 4. Click Yes to complete the
has recently been security provider switch or No to cancel. For more
changed in information on security providers, refer to the
XSAdmin XtenderSolutions Administrator’s Guide.
If the Remember You are automatically logged in using your current user name
Password option has and the same logon type that had been selected the last time.
been enabled in AX
or SX
Important: If you want the AX system to use a different security provider, all of the
workstations on the AX system must be upgraded to AX 5.25 before you switch
security providers.
Exploring AppGen
Once you have successfully logged in, AppGen displays its main window with a tree
structure on the left side, and a blank data entry view on the right side.
Figure 6. Figure 5: AppGen’s Main Window
AppGen’s tree structure contains six nodes: Applications, Users, Groups, Annotation
Groups, License Server, Audit Trail, and Data Types. You can expand the Applications,
Users, Groups, Annotation Groups, and Data Types nodes by clicking the plus sign (+)
or by double-clicking the node. If you expand the Applications node, the node expands
to list the applications that have been created for your system. If you expand the Users
node, it expands to list the users that have been created for your system. If you expand
the Groups node, it expands to list the groups that have been created for your system.
If you expand the Annotation Groups node, it expands to list the annotation groups
that have been created for your system. If you expand the Data Types node, it expands
to list the data types that have been configured for your system. If you click an item in
a list (such as an AX user name in the Users list), AppGen displays relevant
information in the form of tabbed dialog boxes in the data entry view. If you select the
License Server or Audit Trail nodes, AppGen displays relevant information in the data
entry view.
AppGen’s Toolbar
AppGen gives you a toolbar that provides point-and-click access to application and
user and group security commands. AppGen uses buttons to make accessing features
and commands more convenient. The following table shows and briefly describes each
of the buttons.
Button Description
Button Description
2. From the Network Transport drop-down list, select the network transport that you
want to use for the License Server connection. Table 8 on page 68 lists the available
options.
3. In the Network Address text box, type the address information for the License
Server computer. The following table provides the available transport options and
the address information to be entered for each type of transport.
4. If you want all users that log into the current workstation to use licenses from a
particular license group, enter the name of the license group in the License Group
text box. (Even if the Workstation License Server is not used, a license group can
still be entered for the workstation.)
For information on the interaction of license group settings, see "License Groups"
on page 54. For more information on configuring license groups, refer to the License
Server Administrator’s Guide.
5. Click Apply.
The Audit Trail capability allows you to track user activities on a global or
per-application basis. Audit events, such as the creation, use, or deletion of documents,
document pages, batches, queries, ODMA operations, and various AX tools, can be
tracked for each AX application. In addition, activity related to the creation and
deletion of users, groups, and applications can be tracked on a system-wide basis. Use
of queues and import tools can also be tracked. The Audit Trail capability also supports
compliance with the Health Insurance Portability and Accountability Act of 1996
(HIPAA).
When a user activity triggers an audit event, details of the audit event are recorded in
the audit trail database table (or in a log file, or both a log file and the database table).
Each option in the Audit Trail tab represents one audit event. You can specify the
location to store the audit trail (for example, the AX database table in the current
related AX data source and the directory where the AXAUDIT.LOG file is saved).
You can configure global audit trail options to track the creation, deletion, and
modification of applications, users, and groups. On the global Audit Trail tab, you can
also enable tracking of users logging into and out of AX, and tracking of the use of
import tools with AX.
In addition to tracking system-wide changes such as those listed above, you can use
the global Audit Trail tab to configure default audit settings for user activities within
AX applications. When you set options globally for user activities within applications,
you set audit defaults for all applications.
You can then choose to either use the default settings for user activities within
applications, or you can configure specific audit settings for user activities within each
application on each individual application’s Audit Trail tab. When you enable or
disable an auditing option on an individual application’s Audit Trail tab, that setting
overrides the global setting for that option, but only for that application.
Note: Only users with the User Security Maint privilege can modify global audit trail
settings. To modify each application’s audit trail settings, the user must have the
Modify App privilege on that application.
For more information, see the following sections:
• "Starting an Audit Trail" on page 70
• "Configuring Audit Trail Settings" on page 71
The global audit settings and command buttons become available, with the
exception of the Browse button. (The Browse button becomes available if you
enable logging to a file.)
2. Click within the Audit Trail check box to enable it.
If an application node is expanded in the tree structure, AppGen collapses the node
and adds the Audit Trail tab and node to each application in the AppGen tree structure.
Note: You can stop the auditing process at any time. To do so, disable the Audit Trail
option in the global Audit Trail tab. You must have the User Security Maint privilege
to disable the global Audit Trail option. Once audit trails are disabled on the global
Audit Trail tab, the Audit Trail node is removed from the tree structure in all AX
applications.
If the Reason Code option is enabled for any application, the global Audit Trail option
is enabled automatically and cannot be disabled.
Each option that is checked in the global Audit Trail tree is audited for all AX
applications (unless you choose to disable the setting on specific applications’
Audit Trail tabs). Any option that is not checked in the global Audit Trail tree is not
audited for any AX applications (unless you choose to enable the setting on
specific applications’ Audit Trail tabs).
Note: For a definition of what user activity is tracked by each of the global audit
settings, see "Global Audit Trail Settings for all AX Applications" on page 73.
3. Enable the options that you want to use. For instructions, see "Enabling Global
Audit Trail Options" on page 77.
The following table describes the information that can be tracked for each global audit
setting:
Button Description
Note: For a complete explanation of the application audit settings, see "Audit
Settings for an AX Application" on page 79.
2. Enable the options that you want to use. For instructions, see "Enabling Audit Trail
Options for an Application" on page 81.
3. Specify at least one location to log audit events:
• If you want to log the audit events to an AX database table, enable the Log to
the database table option. The database table name is always AE_AUDIT.
• If you want to log the audit events to a log file, enable the Log to the file
located at option. The Log to the file located text box and Browse button are
enabled. Type the directory name to store the log file, or use the Browse
button or drop-down arrow to locate the directory to store the audit trail. The
file name is always AXAUDIT.LOG.
Note: All users who are using the application must have write access to the log file
path. It is recommended that the path be on the network so all users have access.
Locating the log file on the database server is recommended, because all users
already have access to that server to access AX. Be sure that the location of the log
file is shared in a way that provides write access to all users.
Note: If you set the log file write path to a local hard drive (for example, C:\Temp
or C:\Log), a log file is written on each user’s local machine.
4. Click Apply to automatically set the audit settings for the indicated application.
The information logged to the audit trail log or table depends on the action being
tracked. Some or all of the following items may be logged:
• The user ID or user name for the user performing the action (If the data source is
using Windows security provider, the user domain is also tracked. If the data
source is using a directory service security provider, the "Name Attribute" name is
tracked.)
• The workstation ID for the workstation where the action is performed
• The workstation name for the workstation where the action is performed
• The time stamp indicating the time when the action is performed
• The event ID or event description for the action being performed
• The application ID for the application where the action is performed (if
applicable)
• The document ID for the document where the action is performed (if applicable)
• The status description for the action being performed
• The module where the action takes place
The following table describes the information that can be tracked for a specified AX
application:
Tools→Import utilities Import operations for the Index Image Import, Auto Index
Import, and Key Reference Import wizards
This
Appearance Indicates this Option Status
This
Appearance Indicates this Option Status
This option is not audited for the application based on the global
audit trail setting for the option. If the option is enabled in the global
audit trail settings, the option is automatically enabled here as well.
This option is audited for the application based on the global audit
trail setting for the option. If the option is disabled in the global
audit trail settings, the option is automatically disabled here as well.
You can use several methods to enable options on the Audit Trail tree.
• Enable individual options as needed by selecting each option that you would like
to enable in the Audit Trail tree.
• Selecting a dimmed option (whether checked or unchecked) disables it and
causes it to no longer inherit global audit trail settings (the check box is
unchecked and clear);
• Selecting a locally disabled (unchecked and clear) option enables it, but does
not cause it to inherit global audit trail settings (the check box is checked and
clear);
• Selecting a locally enabled (checked) option causes it to inherit global audit
trail settings (the check box is dimmed and checked or unchecked depending
on the global audit trail settings for that option clear).
• Use the command buttons to the right of the Audit Trail tree to quickly enable or
disable auditing of actions in all AX applications. The following table describes
the command buttons:
Button Description
Set Default Click this button to set the audit trail settings for the
application to match the default settings defined in the
global Audit Trail tab. When an application’s audit trail
settings are configured to match the global audit settings,
whenever an option is enabled or disabled in the global audit
trail settings, the change is reflected in the application’s audit
trail settings.
When you first open an application’s Audit Trail tab, all
options are set to match the global audit trail settings.
Clear All Click this button to disable all audit trail options for an
application. Note that when you use this button to clear all
options, you remove the connection between the settings for
this application and the global audit trail settings.
Button Description
Select All Click this button to enable all audit trail options for an
application. Note that when you use this button to enable all
options, you remove the connection between the settings for
this application and the global audit trail settings.
Legend Click this button to display a legend that explains how the
appearance of each check box corresponds to the option
status. The Audit Trail Settings Legend dialog box appears.
To begin using ApplicationXtender to store and manage documents, you must first
design and then create applications in which to store your documents. Different
applications can be created to meet different content management requirements.
When preparing to create an application, you should first establish a design plan. It is
important to assess current and future user requirements, and then design an
application to accommodate your users’ needs. Although applications can be
modified, careful planning reduces the need for future redesign.
This chapter provides extensive information that is useful to AX system administrators
who will be designing applications, including details on planning data entry and
security for an application. It is recommended that you review each of the following
sections carefully before creating the first application for an AX system:
• "Design Considerations" on page 84 provides information about available
configuration options used in defining index fields within an application design.
It also discusses other potential design planning issues.
• "Application Design Outline" on page 120 provides a helpful planning tool that
can be used whenever you need to create a new application.
• "Application Examples" on page 127 provides some case studies depicting
specific content management and storage solutions designed in
ApplicationXtender.
When you have finished the planning stage and are ready to create an application, see
"Creating an Application" on page 134.
Design Considerations
Developing a design plan for an application is recommended prior to creating the
application in Application Generator (AppGen). A design plan can help prevent
situations in which an application does not meet the requirements of the users for
whom it was created. Additionally, efficiency of data entry and document retrieval is
controlled in large part by the application design. Each of the following sections
discusses specific factors you may want to consider when designing an AX application:
• "Planning the Index Fields" on page 85
• "Field Attributes" on page 85
• "Using Custom Data Types and Formats" on page 104
• "Ordering Fields for Efficient Data Entry" on page 118
• "Designing Fields to Simplify Data Entry" on page 118
Field Attributes
When designing an application, you must enter the name, type, and length of each
index field. The field name may be up to 64 alphanumeric characters. The first
character must be a letter of the alphabet; it may not be a number, blank space, or
symbol. The following characters are not allowed in field names: double quotation
mark ("), single quotation mark (‘), and backslash (\).
ApplicationXtender allows you to choose from a variety of data types and formats for
each field, which can aid in customizing a field’s functionality. You can also "flag" fields
to cause them to perform particular functions or to have particular attributes. For more
information, see the following sections:
• "Data Types" on page 86 describes each of the data types available.
• "Field Flags" on page 96 describes each of the field flags available.
Data Types
AppGen supports many data types and provides standardized formatting options for
each data type. For example, some formats insert special characters (such as hyphens
in a social security number).
Several of the data types available for index fields within ApplicationXtender have
pre-configured formatting choices. When you add a field with one of these data types,
the Format list becomes active. The list contains all available formats, and you must
choose one of these formats.
The data types that activate the Format list are as follows: Integer, Decimal/Numeric,
Date, SSN, Telephone, Zip Code, Currency, and Boolean Choice. For all of these data
types except Boolean Choice, values entered for the data type are automatically
converted to the applicable format. (Users choose items from a list for Boolean Choice
data type fields and no reformatting is necessary.)
The data types that do not activate the Format list are as follows: Text (unless the
Validation Mask field flag is enabled for the field), Time, Time Stamp, and User-defined
List. The Time and Time Stamp data types each have only one format available, which
you select by selecting the data type.
The following sections describe all of the data types supported by AX, a description of
the formatting options available for each of the data types, and their maximum field
length:
• "Text Data Type" on page 87
• "Integer Data Type" on page 87
• "Decimal/Numeric Data Type" on page 88
• "Date Data Type" on page 89
• "Time Data Type" on page 90
• "Time Stamp Data Type" on page 91
• "SSN Data Type" on page 91
• "Telephone Data Type" on page 92
• "Zip Code Data Type" on page 93
• "Currency Data Type" on page 93
• "Boolean Choice Data Type" on page 94
• "User-defined List Data Type" on page 95
• "Selecting a Locale" on page 96
If these data types or their formats do not meet your requirements, you can create
custom data types or custom data formats. This feature is most useful for international
customers. For example, you can create a custom data format for Japanese phone
numbers within the Telephone data type. For instructions, see "Using Custom Data
Types and Formats" on page 104.
Item Description
Prohibited The index values entered in this field cannot contain question
Characters mark (?) or asterisk (*) characters. These characters are reserved
for wildcard searches.
Available Field Required, Search, Read-Only, Doc Level Security, Part of Unique
Flags Key, Dual Data Entry, Key Reference, Data Reference, Auto
Index, Validation Mask
Automatic If you apply the Validation Mask flag to a text field, AX permits
Formatting the user to enter only values that match the validation mask. For
more information on the Validation Mask flag, see "Validation
Mask Flag" on page 102. Otherwise, no automatic formatting is
performed.
Item Description
Maximum Length 10 digits (The range of values that a user may enter into an
integer field is from -2,147,483,648 to 2,147,483,647.)
Available Formats You can select a format that combines any of the following:
• With or without commas
• Negatives shown with or without parentheses
Item Description
Available Field Required, Search, Read-Only, Doc Level Security, Part of Unique
Flags Key, Dual Data Entry, Key Reference, Data Reference, Auto
Index, Leading Zeroes (for more information about field flags,
see "Field Flags" on page 96).
Automatic AX does not allow the user to enter a decimal value. Also,
Formatting depending on the format you select:
• AX inserts or strips commas.
• AX converts a minus sign to parentheses or vice versa.
• If you apply the Leading Zeroes flag to an Integer field, and
the user enters the necessary leading zeroes, AX preserves the
zeroes.
You can select a locale (a language and country combination) to customize integer
settings. For details, see "Selecting a Locale" on page 96.
Item Description
Maximum Length 38 digits in Microsoft SQL Server and Oracle databases; 31 digits
in IBM DB2 databases; 28 digits in Microsoft Access databases;
and 20 digits in Sybase databases
Available Formats You can select a format that combines any of the following:
• With or without commas
• Negatives shown with a minus sign or with parentheses
• Whole numbers or decimals to 5 places
Item Description
Available Field Required, Search, Read-Only, Doc Level Security, Part of Unique
Flags Key, Dual Data Entry, Key Reference, Data Reference, Auto Index
(for more information about field flags, see "Field Flags" on
page 96).
Automatic If the user enters a value with greater precision than the format
Formatting allows (that is, if the value has too many digits after the decimal),
the value will be rounded. For example, if the decimal/numeric
data type is formatted as nnnn.n, and 1.99 is entered, 2.0 will be
saved.
Also, depending on the format you select:
• AX inserts or strips commas.
• AX converts a minus sign to parentheses or vice versa.
• AX adds zeroes after the decimal (if necessary to store a value
with the appropriate number of decimal places).
Item Description
Format Numeric
Available Formats You can select a format that combines any of the following:
• Month, day, and year in any order
• 2-digit or 4-digit year
• 3-character abbreviated month (for example, JAN) or 2-digit
month (for example, 01)
• Dashes or slashes
Two additional formats spell out the month and use spaces and a
comma:
• mmmm dd, yyyy (for example, March 26, 2001)
• dd mmmm, yyyy (for example, 26 March, 2001)
Item Description
Available Field Required, Search, Read-Only, Doc Level Security, Part of Unique
Flags Key, Dual Data Entry (unless Date Stamp is used), Key
Reference, Data Reference (unless Date Stamp is used), Auto
Index, Date Stamp (for more information about field flags, see
"Field Flags" on page 96).
Automatic If you select a format that uses 3-character months, and the user
Formatting enters a 3-character month in lower case, AX converts it to
uppercase.
If you apply the Date Stamp flag to a date field, AX
automatically stores the date of entry in the selected format. For
more information on the Date Stamp flag, see "Date Stamp Flag"
on page 103.
Otherwise, depending on the format you select:
• AX converts a 2-digit year to a 4-digit year or vice versa. The
parameters AX uses to do the conversion can be set on the
Data tab of the Configuration dialog box.
• AX converts a 3-character month to a 2-digit month or vice
versa. For example, AX converts FEB to 02.
• AX converts dashes to slashes or vice versa.
Item Description
Format Numeric values for hour, minute, and second, where the hour is
expressed in terms of a twenty-four hour clock
Item Description
Available Field Required, Search, Read-Only, Doc Level Security, Part of Unique
Flags Key, Dual Data Entry (unless Time Stamp is enabled), Key
Reference (unless Time Stamp is enabled), Data Reference
(unless Time Stamp is enabled), Auto Index, Time Stamp (for
more information about field flags, see "Field Flags" on page 96).
Item Description
Available Field Search, Doc Level Security, Part of Unique Key (for more
Flags information about field flags, see "Field Flags" on page 96).
Item Description
Format Integers
Item Description
Available Field Required, Search, Read-Only, Doc Level Security, Part of Unique
Flags Key, Dual Data Entry, Key Reference, Data Reference, Auto
Index (for more information about field flags, see "Field Flags"
on page 96).
Item Description
Format Numeric
Available Field Required, Search, Read-Only, Doc Level Security, Part of Unique
Flags Key, Dual Data Entry, Key Reference, Data Reference, Auto
Index (for more information about field flags, see "Field Flags"
on page 96).
Item Description
Format Numeric
Available Formats You can select a format with or without a four-digit extension.
The format with the extension has a dash to separate the
extension from the main part of the zip code.
Available Field Required, Search, Read-Only, Doc Level Security, Part of Unique
Flags Key, Dual Data Entry, Key Reference, Data Reference, Auto
Index (for more information about field flags, see "Field Flags"
on page 96).
Automatic If you select the format with the four-digit extension and the
Formatting user enters only the five-digit zip code, AX responds with an
error message to prompt the user to enter the four-digit
extension.
If you select the format without the four-digit extension, AX
does not permit the user to enter more than five digits.
Important: For currency data types, values will be truncated after two decimal places.
For example, if 9.689 is entered, $9.68 will be saved, not $9.69. Numbers will not be
automatically rounded by AX for currency data types.
Item Description
Maximum Length 38 digits in Microsoft SQL Server and Oracle databases; 31 digits
in IBM DB2 databases; 28 digits in Microsoft Access databases;
and 16 digits in Sybase 9 databases
Format Numeric
Item Description
Available Formats You can select a format that combines any of the following:
• Negatives shown with minus sign or with parentheses
• With or without 2 decimal places
• With or without commas
Available Field Required, Search, Read-Only, Doc Level Security, Part of Unique
Flags Key, Dual Data Entry, Key Reference, Data Reference, Auto
Index (for more information about field flags, see "Field Flags"
on page 96).
Automatic AX always inserts a dollar sign. If the user enters data that
Formatting extends to three decimal places, only two will be saved. AX will
not round the numbers.
Also, depending on the format you select:
• AX converts a minus sign to parentheses or vice versa.
• AX adds zeroes after the decimal (if necessary to store a value
with 2 decimal places).
• AX inserts or strips out commas.
You can select a locale (a language and country combination) to customize currency
settings. For details, see "Selecting a Locale" on page 96.
Item Description
Format Creates a list box on data entry and search screens with a pair of
choices
Item Description
Available Field Required, Search, Read-Only, Doc Level Security, Part of Unique
Flags Key, Data Reference, Auto Index (for more information about
field flags, see "Field Flags" on page 96).
Item Description
Number of Unlimited
User-Defined Lists
that Can Be
created
Format Creates a list box on data entry and search screens with all
entries specified
Available Field Required, Search, Read-Only, Doc Level Security, Part of Unique
Flags Key, Key Reference, Data Reference, Auto Index (for more
information about field flags, see "Field Flags" on page 96).
Selecting a Locale
You can select a language and country to customize currency, integer, and
decimal/numeric display settings by using the Locale option. AX supports formatting
for more than 75 language and country combinations.
When you select a language and country, AX identifies the appropriate currency,
integer, and decimal/numeric display format for the locale that corresponds to that
language and country. Whenever index fields with the Currency data type, Integer
data type, and Decimal/Numeric data type are viewed on an AX workstation or WX
browser, AX converts data in those fields to cause the data to display in the appropriate
display format for that locale.
Note: You can select a Locale for the entire AX database, or just for individual custom
data formats. The Locale setting for the entire AX database is provided only for legacy
purposes. If you want to change the locale for an index field, it is highly recommended
that you create a custom data format, specify the locale for that custom format (instead
of specifying a locale for the entire database), and specify that custom format for the
index field. For instructions on creating custom data formats, see "Creating Custom
Data Formats" on page 109.
To configure the locale for the entire AX database:
1. From the Tools menu, select Options. The Options dialog box appears.
2. Select the Locale tab.
3. From the Locale drop-down list, select a language and country combination that
you want to use. The selected combination appears in the Locale text box.
4. Click OK.
Field Flags
You can set a variety of field flags for each index field. When you are actually defining
the application in AppGen, the flags for the current index field being created or
modified are displayed. If desired, different combinations of field flags can be
configured for each field in an application. The following sections explain each field
flag that can be set for an index field:
• "Required Flag" on page 97
• "Search Flag" on page 97
• "Read-Only Flag" on page 97
• "Doc Level Security Flag" on page 98
• "Part of Unique Key Flag" on page 99
• "Dual Data Entry Flag" on page 99
• "Key Reference Flag" on page 100
• "Data Reference Flag" on page 100
• "Auto Index Flag" on page 101
• "Validation Mask Flag" on page 102
• "Leading Zeroes Flag" on page 103
• "Date Stamp Flag" on page 103
• "Time Stamp Flag" on page 104
Required Flag
When enabled, the Required flag designates the field as required. If a field is
designated as required, the user must enter data in that field to save a document’s
index. AX will not accept an empty required field.
Item Description
Available for these data types Boolean Choice, Currency, Date (unless the Date
Stamp flag is enabled), Decimal/Numeric, Integer,
SSN, Telephone, Text, Time (unless the Time Stamp
flag is enabled), User-defined List, or Zip Code (for
more information about data types, see "Data Types"
on page 86).
Always enabled (cannot be Date (when flagged with Date Stamp), Time (when
disabled) for these data types flagged with Time Stamp), or Time Stamp
Search Flag
When enabled, the Search flag designates the field as a search field. If a field is
designated as a search field, then users can use this field to search for documents.
Item Description
Available for these data types All (Boolean Choice, Currency, Date,
Decimal/Numeric, Integer, SSN, Telephone,
Text, Time, Time Stamp, User-defined List, or
Zip Code) (for more information about data
types, see "Data Types" on page 86).
For more information on using a field flagged with the Search flag to search for
documents, refer to the "Retrieving Documents" chapter of the ApplicationXtender
User’s Guide.
Read-Only Flag
When enabled, the Read-Only flag designates the field as read-only. If a field is
designated as read-only and not required, and the document has been saved with the
field value as null, AX allows the field to be edited only once. If a field is designated as
read-only and required, then it cannot be modified after the document’s index is saved.
AX will not allow index modification of a read-only field. Index fields using the Time
Stamp data type, the Time Stamp flag, or the Date Stamp flag are automatically added
as read-only.
Item Description
Available for these data types Boolean Choice, Currency, Date (unless flagged
with Date Stamp), Decimal/Numeric, Integer, SSN,
Telephone, Text, Time (unless flagged with Time
Stamp), User-defined List, or Zip Code (for more
information about data types, see "Data Types" on
page 86).
Always enabled (cannot be Date (when flagged with Date Stamp), Time (when
disabled) for these data types flagged with Time Stamp), or Time Stamp
Enabled by default? No, except for index fields using the Time Stamp
data type, the Time Stamp flag, or the Date Stamp
flag
Item Description
Available for these data types All (Boolean Choice, Currency, Date,
Decimal/Numeric, Integer, SSN, Telephone,
Text, Time, Time Stamp, User-defined List, or
Zip Code) (for more information about data
types, see "Data Types" on page 86).
Enabled by default? No
Note: If you intend to use the Multiple indexes referencing single document option for
an application, it is recommended that you not apply the Doc Level Security flag to any
index field in the same application. If you use the Multiple indexes referencing single
document option, users that have access to a document through at least one index
record will have access to that document and all index records associated with it. For
example, if Document Level Security is configured in an application so that documents
with Yes as a value in the Protected index field are inaccessible to the Data Entry group,
and if a particular document has one index record with Yes in the Protected field and
another index record with No in the Protected field, the Data Entry group can view the
document and both index records. To make a document inaccessible to the Data Entry
group, the value in the Protected field must be Yes in all of that document's index
records.
For more information on Document Level Security, see "Managing Document Level
Security" on page 269.
Item Description
Enabled by default? No
Item Description
Available for these data types Currency, Date (unless the Date Stamp field flag
is enabled), Decimal/Numeric, Integer, SSN,
Telephone, Text, Time (unless the Time Stamp
field flag is enabled), or Zip Code (for more
information about data types, see "Data Types"
on page 86).
Not available for these data types Boolean Choice, Time Stamp, or User-defined
List
Item Description
Enabled by default? No
For more information on enabling dual data entry, see "Enable Dual Data Entry" on
page 433.
Item Description
Available for these data types Currency, Date (unless the Date Stamp flag is
enabled), Decimal/Numeric, Integer, SSN,
Telephone, Text, Time (unless the Time Stamp
field flag is enabled), User-defined List, or Zip
Code (for more information about data types,
see "Data Types" on page 86).
Not available for these data types Boolean Choice or Time Stamp
Enabled by default? No
For more information on importing with Key Reference Import, see "Key Reference
Import" on page 294.
If you apply the Key Reference and Data Reference flags to fields, the Key Reference
File Setup tab appears so that you can configure Key Reference Import.
Item Description
Available for these data types Boolean Choice, Currency, Date (unless the
Date Stamp flag is enabled), Decimal/Numeric,
Integer, SSN, Telephone, Text, Time (unless the
Time Stamp flag is enabled), User-defined List,
or Zip Code (for more information about data
types, see "Data Types" on page 86).
Enabled by default? No
For more information on importing with Key Reference Import, see "Key Reference
Import" on page 294.
Item Description
Available for these data types Boolean Choice, Currency, Date (unless the
Date Stamp flag is enabled),
Decimal/Numeric, Integer, SSN, Telephone,
Text, Time (unless the Time Stamp flag is
enabled), User-defined List, or Zip Code (for
more information about data types, see "Data
Types" on page 86).
Item Description
Enabled by default? No
For more information on importing with Auto Index Import, see "Auto Index Import"
on page 292.
Item Description
Available for this data type Text (for more information about data types, see
"Data Types" on page 86).
Not available for these data types Boolean Choice, Currency, Date,
Decimal/Numeric, Integer, SSN, Telephone,
Time, Time Stamp, User-defined List, or Zip
Code
Enabled by default? No
For more information on establishing a field validation mask, see "Validation Mask" on
page 147.
Item Description
Available for this data type Integer (for more information about data types,
see "Data Types" on page 86).
Not available for these data types Boolean Choice, Currency, Date,
Decimal/Numeric, SSN, Telephone, Text, Time,
Time Stamp, User-defined List, or Zip Code
Enabled by default? No
For more information on the Integer data type, see "Integer Data Type" on page 87.
Item Description
Available for this data type Date (for more information about data types,
see "Data Types" on page 86).
Not available for these data types Boolean Choice, Currency, Decimal/Numeric,
Integer, SSN, Telephone, Text, Time, Time
Stamp, User-defined List, or Zip Code
Cannot be used for a field in Dual Data Entry, Key Reference, Data Reference
combination with these flags (Validation Mask and Leading Zeroes are
unavailable because of the use of the Date data
type)
Enabled by default? No
For more information on the Date data type, see "Date Data Type" on page 89.
Item Description
Available for this data type Time (for more information about data types,
see "Data Types" on page 86).
Not available for these data types Boolean Choice, Currency, Date,
Decimal/Numeric, Integer, SSN, Telephone,
Text, Time Stamp, User-defined List, or Zip
Code
Cannot be used for a field in Dual Data Entry, Key Reference, Data
combination with these flags Reference, Auto Index (Validation Mask and
Leading Zeroes are unavailable because of the
use of the Time data type)
Enabled by default? No
For more information on the Time data type, see "Time Data Type" on page 90.
Icon Description
A blue folder indicates a custom data type. You can create, and
subsequently edit, custom data types.
Icon Description
A blue format icon indicates a custom format. You can create, and
subsequently edit, custom formats.
• If you would like to create a new data type, proceed to "Creating a Custom Data
Type" on page 105 for information about creating a new custom data type.
• After you have created a data type (or if you are adding a format to an existing
data type), see "Creating Custom Data Formats" on page 109 for information
about creating new custom data formats.
Note: The Migration Wizard cannot migrate custom data types or formats. If you want
to migrate an application that has custom data types or formats, you must recreate the
custom data type or format in the destination application before performing the
migration.
Important: When creating custom formats for currency, Boolean Choice, date, and time
stamp data types, you must create the format beneath the existing standard data type
for the format to be correctly implemented. Do not create new data types for currency,
Boolean Choice, date, and time stamp fields.
Note: You can also modify or delete data types. Be aware that you should not modify
or delete data types that are being used in a live application. You should create, test,
and finalize your new data types and formats using a test application before deploying
them within a live application. See "Modifying and Deleting Custom Data Types" on
page 107 for more information.
To create a custom data type:
1. Start AppGen. For more information, see "Starting Application Generator" on
page 60.
2. Right-click the Data Types node in AppGen’s tree (if the Data Types node does not
appear, choose Show Data Types from the View menu to display it). A shortcut
menu appears. From the shortcut menu, select New. The Custom Data Type
wizard appears.
3. In the Data Type Name text box, type a name for the custom data type.
4. You will notice that the Type Id text box is dimmed. It shows the Data Type ID that
identifies the data format in the AX database. This value cannot be changed.
5. You will also notice that the Region Code box is dimmed. This feature is not
implemented for AX 5.25 and will be enabled in a future version.
6. From the Database Type drop-down list, select the database type for the data type
that you want to create. The database type for the data type determines the set of
characters allowed for that data type. You have the following choices:
• If the index values will have alphabetical characters, symbols, or formatted
numbers (ANSI or ASCII characters, like the SSN, Telephone, Text, and Zip
Code data types), select DBTYPE_STR.
• If the index values will be numeric characters without a decimal point (whole
numbers, like the Integer data type), select DBTYPE_I4.
• If the index values will be numeric characters with a decimal point (numbers
that may have a fractional component, like the Decimal/Numeric data type),
select DBTYPE_NUMERIC.
Note: User-defined lists cannot be created using the custom data type
functionality.
7. Enable the Variant Size check box if you want the data type to have a variable (not
unlimited) size. If you leave the Variant Size box disabled, proceed to step 9.
8. If you enabled the Variant Size check box, in the Max Size and Min Size text boxes,
specify the maximum size and minimum size for the data type, in number of
characters. (For example, the Currency data type has a minimum size of 1 and a
maximum size of 38.)
When calculating how many characters to allow, if the index value will be stored
to the database with formatting marks, remember to count the formatting marks.
For example, xxx-xx-xxxx is 11 characters, not 9.
9. In the Available Attributes box, select the flags that you want to be available for the
custom data type. (For example, the Time Stamp data type has only the Doc Level
Security, Search, and Part of Unique Key flags available.)
10. In the Default Attributes box, select the flags that you want to be enabled by
default for the custom data type. (For example, the Text data type has the Required
and Search flags enabled by default.)
11. Click Finish. AppGen creates the custom data type according to the information
that you specified and adds the custom data type to the tree list. You will notice
that the new data type appears in the AppGen tree with a red X over its icon. This
indicates that it cannot be used until you add data formats.
12. You are now ready to add new data formats for your data type. Proceed to
"Creating Custom Data Formats" on page 109 for information about creating data
formats.
Note: For information about modifying and deleting custom data types, see
"Modifying and Deleting Custom Data Types" on page 107.
Important: You should not modify or delete data types that are being used in a live
application. You should create, test, and finalize your new data types and formats
using a test application before deploying them within a live application.
2. In the Data Type Name text box, you can change the name for the custom data type.
3. From the Database Type drop-down list, you can select a different type of data
type. You have the following choices:
• If the index values will have alphabetical characters, symbols, or formatted
numbers (ANSI or ASCII characters, like the SSN, Telephone, Text, and Zip
Code data types), select DBTYPE_STR.
• If the index values will be numeric characters without a decimal point (whole
numbers, like the Integer data type), select DBTYPE_I4.
• If the index values will be numeric characters with a decimal point (numbers
that may have a fractional component, like the Decimal/Numeric data type),
select DBTYPE_NUMERIC.
4. Enable the Variant Size check box if you want the data type to have a variable (not
fixed) size. If you leave the Variant Size box disabled, proceed to step 6.
5. If you enabled the Variant Size check box, in the Max Size and Min Size text boxes,
specify the maximum size and minimum size for the data type, in number of
characters. (For example, the Currency data type has a minimum size of 1 and a
maximum size of 38.)
6. In the Available Attributes box, you can change the flags that you want to be
available for the custom data type. (For example, the Time Stamp data type has
only the Doc Level Security, Search, and Part of Unique Key flags available.)
7. In the Default Attributes box, you can change the flags that you want to be enabled
by default for the custom data type. (For example, the Text data type has the
Required and Search flags enabled by default.)
8. When you have made all of the changes to the custom data type that you want to
make, click Apply. To refresh applications so that the changes to the data type are
accessible from the Application Fields page, expand and collapse the Applications
node in the AppGen tree view.
2. In the Format Name text box, type a name for the custom data format.
3. You will notice that the Format Id text box is dimmed. It shows the Data Format ID
that identifies the data format in the AX database. This value cannot be changed
from AppGen.
4. If the data type for which you are creating a custom format is of the
DBTYPE_NUMERIC type, the Scale text box is available. In the Scale text box,
specify the number of digits after the decimal point for the custom format. (For
example, the Decimal/Numeric data type has a n,nnn.nnn format which has a
scale of 3.)
5. In the Format Width text box, specify the width of the index value as it will appear
in AX, including all formatting characters. For example, if you were creating a
simple date format of YYYY-MM-DD, you would enter 10 as the Format width.
6. In the DB Width text box, specify the width of the index value as it will be stored
in the database. For example, if you were creating a simple date format of
YYYY-MM-DD, you would enter 8 as the DB width, as you would not want to save
the dashes in your database.
7. In the Validation Expression text box, use regular expression syntax to define the
format as it will appear in AX. For example, to create a format that appears as
YYYY-MM-DD, you would enter:
(\d{4})-?(\d{2})-?(\d{2})
in the Validation Expression text box.
For more detailed information about creating validation expressions in AppGen,
see "Using Regular Expression Syntax to Define Custom Data Formats" on
page 111.
8. If the format that is stored in the database will be different than the format
displayed in AX, use regular expression syntax in the Data Conversion Expression
text box to define the information that should be included in the database. For
example, to store the YYYY-MM-DD format in the database, you would use:
$1$2$3
where $1, $2, and $3 represent the subexpressions (\d{4}), (\d{2}), (\d{2})
in the expression we placed in the Validation Expression text box.
For detailed information about creating data conversion expressions, see "Using
Regular Expression Syntax to Define Custom Data Formats" on page 111.
9. What you type in the Formatting 1 and Formatting 2 boxes is dependent on the
type of format you have added:
• If you are creating a simple string expression (like the one in our example),
type the format that you would like AX to use to display your expression. For
example, you would type $1-$2-$3 in the Formatting 1 text box, where $1,
$2, and $3 match our sample expression’s subexpressions, to display text that
is typed into an AX document index as 20020626 as 2002-06-26 after the index
is saved.
• If you are creating a Boolean format (for example, an expression like
(^\bPublic$|^\bPrivate$), where users can only type one or two
values), type the first string (in this case, Public) in the Formatting 1 text box,
and the second (Private), in the Formatting 2 text box. These choices will then
appear in the Boolean Choice list box in AX.
• If you are using a numeric or integer format that can contain negative values,
enter the positive format in the Formatting 1 box (for example, $1), and the
negative format in the Formatting 2 box (-$1, for example).
10. If you want to specify a default value for the format, enter it in the Default Value
box.
Note: Each index field using a custom data format with a default value should also
be set as Read-Only. In this case, the index field will be automatically populated
with the default value.
11. In the Locale drop-down box, select the locale you would like to use as default.
This allows AX to display currency symbols specific to the locale you have chosen.
12. Click Finish. AppGen creates the custom data format according to the information
that you specified and adds the custom data format to the tree list.
13. Collapse and expand the Applications node in the AppGen tree view to refresh
applications. The data format can now be selected from the Format drop-down list
on the Fields page or tab for an application.
. * ( ) ? +
^ $ { } \
[ ]
The list of regular expression rules that follow should help you to gain an
understanding of basic regular expression command syntax and how regular
expressions are composed. (See "Example Data Formats in Application Generator" on
page 113 for specific examples of data formats that work in AX.)
• Any character besides those listed in the table above matches itself.
Example: (abc) will match abc.
• A period (.) matches any character.
Example: (ab.) will match abc, abd, ab3, ab5, and so on.
• An asterisk (*) matches zero or more occurrences of a character or expression.
Example: (abc)* matches null, abc, abcabcabc, and so on. abc* matches abc, abcc,
and so on.
• A plus sign (+) matches one or more occurrences of a character or expression.
Example: (abc)+ matches abc, abcabc, and so on.
• A question mark (?) matches zero or one occurrence of a character or expression.
Example: (abc)? matches null or abc only.
• A pipe (|) matches one of the listed choices.
Example: (a|b|c) would match a, b, or c.
• A caret (^) is used to mark the beginning of a line, and the dollar sign ($) is used
to mark the end of a line. You need only to use this in AppGen when you have
two options in a single expression (as is used in Boolean Choice).
Example: ^Choice1$|^Choice2$
When the caret is used within square brackets ([ ]), it excludes values. See the
example for usage of square brackets ([ ]).
• Parentheses () are used to group items together in a subexpression, which can
then be called using $1, where 1 represents the number of the subexpression
within a sequence.
Example: In the expression (a|b|c)(a*), $1 would represent (a|b|c) in the Data
Extraction and Formatting boxes within AppGen, and $2 would represent (a*).
• A question mark and colon within parentheses (?:n) indicate a grouping that will
not be considered a subexpression.
Example: In the expression (a|b|c)(?:\$)(a*), $1 would represent (a|b|c) in the
Data Extraction and Formatting boxes within AppGen, and $2 would represent
(a*). (?:\$) would not be represented for extraction at all.
• Braces ({}) indicate bounds (in other words, values within the braces indicate the
number of characters to match).
Example: Within an expression, {5} would match any combination of five
characters.
• Sets ([ ]) indicate a range of values that can be selected.
This figure shows a data format that accommodates a long series of numbers,
n-nn-nnn-nnnnnnn, which might be used for international phone numbers. Only the
numbers (no dashes) will be saved to the database, as is illustrated in the Data
Conversion Expression text box. It will be formatted as n-nn-nnn-nnnnnnn.
This figure shows a data format that accommodates a date in YYYY-MM-DD format. If
you wanted to be more stringent, and, for example, require that only the years 1999,
2001, and 2002 be accepted, you could change the Validation Expression to:
(1999|2001|2002)-?(\d{2})-?(\d{2})
Figure 20. A Boolean Format
This figure shows a Boolean data format. In this example, users can choose either Print
Version or Online Version when indexing a document with this format. If Print Version
is chosen, "Print" will be stored in the database. If Online Version is chosen, "Online"
will be stored in the database.
This figure shows a currency data format. Since the locale selected is English (United
Kingdom), the British pound symbol is displayed instead of the American dollar sign
when the index is saved in AX.
Important: You should not modify or delete data formats that are being used in a live
application. You should create, test, and finalize your new data types and formats
using a test application before deploying them within a live application.
3. In the Format Name text box, you can change the name for the custom data format.
4. If the data type for which you are modifying a custom format is of the
DBTYPE_NUMERIC type, the Scale text box is available. In the Scale text box, you
can change the number of digits that appear after the decimal point for the custom
format.
5. In the Format Width text box, you can change the width of the index value as it will
appear in AX, including all formatting characters. For example, if you were
creating a simple date format of YYYY-MM-DD, you would enter 10 as the Format
width.
Note: To specify an unlimited width for formatting, use 0 as the Format Width
value.
6. In the DB Width text box, you can change the width of the index value as it will be
stored in the database. For example, if you were creating a simple date format of
YYYY-MM-DD, you would enter 8 as the DB width, as you would not want to save
the dashes in your database.
7. In the Validation Expression text box, use regular expression syntax to define the
format as it will appear in AX. For example, to create a format that appears as
YYYY-MM-DD, you would enter:
(\d{4})-?(\d{2})-?(\d{2})
in the Validation Expression text box.
For more detailed information about creating validation expressions in AppGen,
see "Using Regular Expression Syntax to Define Custom Data Formats" on
page 111.
8. If the format that is stored in the database will be different than the format
displayed in AX, use regular expression syntax in the Data Conversion Expression
text box to define the information that should be included in the database. For
example, to store the YYYY-MM-DD format in the database, you would use:
$1$2$3
where $1, $2, and $3 represent the subexpressions (\d{4}), (\d{2}), (\d{2})
in the expression we placed in the Validation Expression text box.
For detailed information about creating data conversion expressions, see "Using
Regular Expression Syntax to Define Custom Data Formats" on page 111.
9. What you type in the Formatting 1 and Formatting 2 boxes is dependent on the
type of format you have added:
• If you are editing a simple string expression (like the one in our example),
type the format that you would like AX to use to display your expression. For
example, you would type $1-$2-$3 in the Formatting 1 text box, where $1,
$2, and $3 match our sample expression’s subexpressions, to display text that
is typed into an AX document index as 20020626 as 2002-06-26 after the index
is saved.
• If you are editing a Boolean format (for example, an expression like
(^\bPublic$|^\bPrivate$), where users can only type one or two
values), type the first string (in this case, Public) in the Formatting 1 text box,
and the second (Private), in the Formatting 2 text box.These choices will then
appear in the Boolean Choice list box in AX.
• If you are using a numeric or integer format that can contain negative values,
enter the positive format in the Format 1 box (for example, $1), and the
negative format in the Format 2 box (for example, -$1).
10. If you want to specify a default value for the format, enter it in the Default Value
box.
Note: Each index field using a custom data format with a default value should also
be set as Read-Only. In this case, the index field will be automatically populated
with the default value.
11. In the Locale drop-down box, select the locale you would like to use as default.
This allows AX to display currency symbols specific to the locale you have chosen.
12. When you have made all of the changes to the custom data format that you want
to make, click Apply. To refresh applications so that the changes to the data format
are accessible from the Application Fields page, expand and collapse the
Applications node in the AppGen tree view.
To delete a custom data format:
1. Expand the Data Types node in AppGen’s tree. Expand the node for the data type
that contains the custom data format you want to delete.
2. Right-click the custom data format. A shortcut menu appears. From the shortcut
menu, select Delete. A message appears asking you to confirm the deletion.
3. Click Yes. The custom data format is deleted.
An administrator can create a new specification to import data into only some of the
available fields. An administrator can also change the order in which fields are
imported. If field values are formatted in a different format than is configured for the
field in the application, an administrator can configure the specification to convert the
imported data to the correct data format.
For a complete description of each of the three import methods, including instructions
on actually performing an import, see "Import Wizards" on page 290.
Number of Maximum
Note: The maximum number of pages per document for each full-text engine is as
follows: ProIndex supports up to 2,000 and Verity supports up to 250,000.
Once the application design process is complete, the application name and description,
indexing options, and field definitions can be specified in the AppGen module, and the
application can be built. To assist you in relating this conceptualization process to the
procedure for implementing the design, portions of the AppGen application creation
wizard are used to illustrate any relevant options relating to each question.
Attaching multiple indexes to a single document allows users to classify the same
document in more than one way. Take, for example, an application that will be used to
store documents relating to individual people. If a document relates to more than one
person, this feature can reduce the amount of storage space used by referencing the
same document for each person (rather than storing several copies of the document,
one for each person).
Note: If document level security and the Multiple indexes referencing a single
document option have both been enabled for an application, and if a user with delete
privileges can access a document through at least one of its index records, keep in mind
that the user can delete that document even if DLS does not allow the user to access the
document through any of its other index records.
• Do you need to configure the application to comply with HIPAA?
The Part of Unique Key field flag can be used to mark fields as part of a group of fields
that must contain, as a whole, a unique combination of values for each document. For
example, a name field and a social security number field in an application both have
the Part of Unique Key field enabled. A user indexes one document with the values
"John Doe" and "111-22-2222." When the user tries to index another document with the
same two values, AX rejects the index entries as invalid. Any number and combination
of the fields in an application can be enabled as Part of Unique Key.
For more information on the Part of Unique Key flag, see "Part of Unique Key Flag" on
page 99.
The data type determines the kind of data that can be stored in the field. Some data
types, such as text, are inclusive of other data types; other data types, such as social
security number, allow entry of only a narrow range of values. From the Data Type list
box, you can choose any of the following field data types: Text, Integer,
Decimal/Numeric, SSN, Telephone, Zip Code, Currency, Boolean Choice, Time, Time
Stamp, Date, and User-defined List.
Note: If you are planning to configure the application for retention administration or
records management, for each AX field that will be mapped to Records Manager (RM)
fields, select a data type equivalent to that of the RM field. For example, if an AX field
will be mapped to an RM picklist field, configure the AX field as a User-defined List
field. For more information, refer to the Records Manager for ApplicationXtender
Integration Guide.
For more information on data types, see "Data Types" on page 86.
• If the data type requires that you specify a field length, what should it be?
For several data types, the field length is configured when the data format is chosen.
However, for the data types listed in the following table, the field length must be
specified. The following table also indicates the maximum length that can be specified
for each data type, and refers you to other sections for more information.
Maximum
Data Type Field Length For More Information, See
A field length should be long enough to accommodate reasonably long entries. The
length of the field, however, determines the amount of storage space set aside each
time a value is stored for that field. For a text field where only a single word is likely to
be entered, for example, a field length of 100 would waste database space.
Note: If you are planning to configure the application for retention administration or
records management, for each AX field that will be mapped to Records Manager (RM)
fields, select a length equal to that of the RM field. An AX field length longer or shorter
than that of the corresponding RM field results in truncation of index data and can
cause accidental data loss. For more information, refer to the Records Manager for
ApplicationXtender Integration Guide.
• Should the user be required to enter a value into the field when indexing a
document?
Figure 29. Required Field Flag
Enabling the Required field flag for a field requires users to enter data into that field
when documents are added to the application. AX will not add the document until
valid values have been entered for each required field during document indexing.
For more information on the Required flag, see "Required Flag" on page 97.
• Should the user be able to search the values stored in the field?
Enabling the Search field flag makes the values stored in the field searchable by users
retrieving documents.
For more information on the Search flag, see "Search Flag" on page 97. For more
information on using a field flagged with the Search flag to search for documents, refer
to the "Retrieving Documents" chapter of the ApplicationXtender User’s Guide.
• Should the values entered in the field be modifiable after the initial data entry, or
should they be read-only?
Figure 31. Read-Only Field Flag
If the Read-Only field flag is enabled for a field, the user can enter a value into the field
when a document is first added to an application. However, that value cannot be
modified after the initial indexing process is complete.
For more information on the Read-Only flag, see "Read-Only Flag" on page 97.
• Should the values entered into the field be used as a basis for granting or denying
access to documents?
Figure 32. Document Level Security Field Flag
You can ensure that a "unique key," or unique combination of index values, is assigned
to only one document in an application by enabling the Part of Unique Key field flag
for one or more fields in the application’s index. If, for example, a name field and an
account number field each have the Part of Unique Key field flag enabled, a user
cannot enter the combination of "John Doe" and "12345" for more than one document.
For more information on the Part of Unique Key flag, see "Part of Unique Key Flag" on
page 99.
• Should data validation features be employed to ensure accurate data entry for the
field?
For some fields, it is crucial that data be entered accurately. Fields used to store the
values that will be the primary tool for document retrieval are good candidates for data
validation precautions. For example, the first search field in an index is likely to contain
data that will be frequently used to retrieve documents. Several field flag and field
formatting options can be used to help guarantee that mistakes are not made during
data entry.
The first step in building data integrity precautions into a field definition involves
choosing a data type. Several of the data types available for fields in AX have pre-set
data formats. The Integer, Decimal/Numeric, Date, Time, SSN, Telephone, Zip Code,
and Currency data types are all pre-set. When you choose one of these data types, AX
will not accept values that are not the correct type of data, that cannot be formatted to
match the data format, or that exceed the length of the field. AX also reformats valid
data entered to the correct display format.
The Boolean Choice and User-defined List data types can also be used to ensure
accurate data entry. Users enter values into a field of either of these data types by
choosing an item from a drop-down list, eliminating the possibility of typographical
errors. Whenever the same entries will repeatedly be made in a field, you should
consider using a user-defined list to minimize the potential for user error.
Figure 34. Validation Mask Field Flag
Field flags can also be set to help validate data entry. The Time Stamp field flag, which
can be set for fields with the Time data type, and the Date Stamp field flag, which can
be set for fields with the Date data type, automatically enter the current time and date.
This feature makes data entry for those fields unnecessary. When a field has a Text data
type, you can enable the Validation Mask field flag and then create a validation mask,
or template, for data entered into the field. AX then checks any data entered into the
field against that mask. Enabling the Dual Data Entry flag for a field forces users to
enter data twice for the field.
For more information on the Validation Mask flag, see "Validation Mask Flag" on
page 102. For more information on establishing a field validation mask, see "Validation
Mask" on page 147.
• Can values for the field be imported using a batch import mechanism or will they
be entered one document at a time?
If the values can be imported, consider using a Key Reference Import or an Auto Index
Import.
Figure 35. Key Reference Field Flag
With the Key Reference feature, the user enters a unique piece of data into the "key"
reference file field, then presses the [TAB] key to populate the "data" reference file fields
for the document. AX fills the data fields with values from the index record with that
key value in the Key Reference table. In order to enable the Key Reference feature for a
field, you must enable the Key Reference field flag if the field will be a Key field or
choose the Data Reference field flag if it will be a Data field.
For more information on the Key Reference and Data Reference flags, see "Key
Reference Flag" on page 100 and "Data Reference Flag" on page 100. For more
information on importing with Key Reference Import, see "Key Reference Import" on
page 294.
The Auto Index field flag lets users or administrators import index values for Auto
Index enabled fields. AX takes the imported values and builds a table of index records.
Users can then invoke the Auto Index function by pressing the [F7] key during the
indexing process and picking an index record from the table. When a user picks a
record from an Auto Index table, that index record is deleted from the table. In order
to enable the Auto Index feature for a field, you must enable the Auto Index field flag.
For more information on the Auto Index flag, see "Auto Index Flag" on page 101. For
more information on importing with Auto Index Import, see "Auto Index Import" on
page 292.
Application Examples
This section provides some examples of ApplicationXtender applications designed to
meet certain organizational needs:
• "Document Level Security for Employee Records" on page 127, illustrates the use
of the Doc Level Security field flag, the Part of Unique Key field flag, the
User-defined List data type, and the Key Reference Import wizard.
• "Importing Customer Information" on page 129 also involves import of index
information; in this case, however, the use of Auto Index Import is shown.
• "Importing an Existing Litigation Database" on page 130 includes use of the Doc
Level Security field flag and the User-defined List data type. The focus of this
scenario is illustration of a situation where the Index Image Import wizard would
be useful.
• "Data Entry Validation for Accounts Payable" on page 133 describes a situation
where field flags are used to ensure data entry accuracy.
Reference Import option would be best. She enables the Key Reference field flag for the
SOCIAL SECURITY NUMBER field and the Data Reference field flag for the
EMPLOYEE NAME and DEPARTMENT fields.
Figure 36. Index for RECORDS Application
By importing the information using Key Reference, the administrator makes it easier
to manage employee information in the future. She can create a Key Reference table
containing index records for each employee. When the user adds each of an employee’s
two documents, AX will use the social security number entered to locate the
corresponding employee name and department information. The two data fields will
be automatically populated with the information stored in the table for each document.
If the employee’s name or department changes in the future, the administrator can
update the information in the index of one document and, because that information is
stored in the Key Reference table and also used to populate the index for the
employee’s other document, the information will be updated in that index as well.
The following table summarizes the field names, data types, data formats and field
flags used for the application. The SOCIAL SECURITY NUMBER field is used as the
primary search field for the application, because the number is the piece of index
information most likely to be known by a user retrieving documents. Additionally,
placement of the social security number first will facilitate use of the Key Reference
Import wizard, because the SOCIAL SECURITY NUMBER field is the key field. The
users can enter the key field value, press [TAB], and populate the data fields
immediately. This saves the user from using additional keystrokes to move to the key
field.
Data
Field Name Type Length Format Field Flags
Data
Field Name Type Length Format Field Flags
The administrator names the application LOANS, and describes it as holding loan
information. The mainframe database can export information in whatever order is
needed, so the administrator decides that the field order for the application should be
ACCOUNT NUMBER, NAME, SOCIAL SECURITY NUMBER, and then LOAN TYPE.
He makes each of the fields a search field and enables the Auto Index field flag for each.
He flags the ACCOUNT NUMBER, NAME, and SOCIAL SECURITY NUMBER fields
as required. He chooses the Integer data type for the ACCOUNT NUMBER field.
Because account numbers are only eight digits long, he sets the field length for that
field to eight to help prevent incorrect data entry. Although he would prefer to make
the LOAN TYPE field a user-defined list, the entries from the previous database vary
too much to do so, so he makes it a text field.
The following table lists the fields and field attributes for the LOANS application:
The litigation manager names the application DOEVDOE to indicate the name of the
case. For the description, she chooses the full name of the case. The design of the index
for this application is based on the index in the existing application, which contains
several index fields: DESCRIPTION, PRODUCED BY, PROTECTED, KEYWORDS,
DOCUMENT TYPE, AUTHOR, RECIPIENT, DATE OF DOCUMENT, and
DOCUMENT ID. All of these fields will be defined as AX index fields except for the
PRODUCED BY and DOCUMENT ID fields. All fields will be marked as search fields,
and the first two fields will have the Required field flag enabled. The KEYWORDS and
DOCUMENT TYPE fields both have a User-defined List data type and the
PROTECTED field has a Boolean Choice data type in order to help ensure accuracy of
data entry for these fields.
Figure 38. Index for DOEVDOE Application
The images to be imported for the application are named by document ID. To prepare
for an Index Image Import, the litigation manager exports all of the information in the
existing database as records with the fields delimited (separated) by commas. The
document ID field is exported as the last field in each record. In order to import the
data using Index Image Import, the manager edits each of the exported document ID
fields to include the following:
• An @ symbol (which lets AX know that an image location follows)
• The volume label for the media where the image is located
• The directory path to the file
• A file extension
Security for this application will be somewhat complex. Users accessing the
application will include paralegals and attorneys. Whereas normally secretaries have
privileges to display, print, and fax documents within the law firm’s
ApplicationXtender system, they will not have privileges to perform any functions in
this application. The administrator creates an application security profile with no
privileges enabled and associates the Secretaries group with the profile.
Because of the level of sensitivity of information for this case, only certain attorneys
and high-level paralegals can view documents that have a "Yes" value in the
PROTECTED field. In order to ensure that access to these documents is controlled, the
manager enables Document Level Security for the PROTECTED field. She then denies
access to the value "Yes" for a group of users who are not allowed to access protected
documents by using the Document Level Security field flag within the application
(found in AppGen).
The following table summarizes the field names, data types, data formats, and field
flags that will be used for the application.
The name of the application is INVOICE, and they describe it as an invoice tracking
application. The index for this application contains two fields: INVOICE NUMBER
and CUSTOMER NAME.
For the INVOICE NUMBER field, because it is critical that the data is entered
accurately, they enable both the Validation Mask field flag and the Dual Data Entry
field flag. Every invoice number starts with three letters, which are followed by five
numbers, so they put the following validation mask on the field: aaannnnn. They also
enable the Dual Data Entry field flag to force the users to enter the invoice number
correctly twice. In addition, they set the field length to 8 to prevent invoice numbers
that are too long.
The following table summarizes the fields and field attributes for the application:
Data
Field Name Type Length Format Field Flags
Once an application has been designed, you can open the Application Generator
(AppGen) module of ApplicationXtender (AX) to create it. Each data source can
support up to 2048 different applications. The procedures used to create an application
are detailed in this chapter. The following procedure provides an overview of this
chapter:
To create an application:
1. If you will be using the LEGATO DiskXtender (DX) or ArchiveXtender - Ascent
Storage Edition (ArcX-ASE) software as a document storage server, install and
configure it.
• If you will be using DX as your document storage system, installing and
configuring DX prior to starting Application Generator's New Application
wizard allows you to enter DX paths and verify that they are correct.
• If you will be using ArcX-ASE as your document storage system, installing
and configuring ArcX-ASE prior to starting Application Generator's New
Application wizard allows you to enter ArcX-ASE paths and verify that they
are correct.
Note: ArcX-ASE is supported only for legacy purposes.
For details on AX/DX connectivity or AX/ArcX-ASE connectivity, refer to the
XtenderSolutions Administrator’s Guide.
2. Make sure that your workstation has read and write privileges to all paths that the
AX system will use.
3. Start Application Generator. For more information, see "Starting Application
Generator" on page 60.
4. Right-click the Applications node in Application Generator’s tree. A shortcut
menu appears. From the shortcut menu, select New. The New Application wizard
begins, starting with the application’s Application page.
5. On the Application page, name and describe the new application, enable (or
disable) the indexing option, and select a full-text engine. For more information,
see "Entering Application Information" on page 137. Click Next. The application’s
Paths page appears.
6. On the Paths page, identify document, annotation, OCR, and full-text database
write path settings for the application. For more information, see "Setting Write
Paths" on page 139. Click Next. When AX has verified that the paths entered are
valid, the application’s Fields page appears.
7. On the Fields page, configure the index fields that will be used to store information
for each document in the application. Configuring the index fields includes
specifying field names, field data types, data formats, and field flags. For more
information, see "Defining Index Fields" on page 144. Click Next. The page that
appears next depends on the field flags you have selected.
8. If you choose to use any of ApplicationXtender’s import features, or
ApplicationXtender’s Document Level Security feature, you need to configure the
remaining New Application wizard page or pages.
Configuring any of the import pages entails defining index specifications for use
in importing index data and/or documents into your application. Configuring the
Document Level Security page entails specifying how you want to configure group
access on a document-level basis. For more information, see the following sections
in later chapters:
• "Setting up DLS in an Existing Application" on page 277
• "Custom Specification in a New Application" on page 300
9. After configuring each New Application wizard page for these features, click Next
or Finish.
When you click Finish, Application Generator builds all screens and database tables
according to the information that you specified during creation. A status box appears
indicating the processing status. Once the application has been built, Application
Generator adds the new application to the tree list. The application can now be opened
in ApplicationXtender, and documents can be added to the application for storage.
Important: Only AX system administrators (users who have been given the AX
Administrator privilege in Application Generator) can access applications that begin
with an underscore. Therefore, only AX system administrators can access the _FORMS
and _RSTAMP applications.
Once created, you can view the configuration of the _RSTAMP application the same
way you would view the configuration of any other application.
For each user who will be applying rubber stamps to documents, you must assign that
user the Display privilege either in the _RSTAMP application or in a global profile.
Rubber stamps are pre-defined annotations that exist as documents within the
_RSTAMP application. The AX _RSTAMP application is used to store and manage
rubber stamps. Each document in the _RSTAMP application consists of only one page
and one version, containing the contents of the rubber stamp as a compressed text file,
image file, or embedded icon foreign file. When a rubber stamp is selected, the cursor
turns into an RS icon, and AX places the rubber stamp on the AX page wherever the
user clicks. To turn the rubber stamp off, click the Rubber Stamp toolbar button to
disable it.
applications in AX. You should take this into account when creating applications
to be accessed by users – normal applications should not be named with leading
underscores, as regular AX users will not be able to access them.
2. In the Application Description text box, type a description that will help identify
the application. The description may be up to 128 alphanumeric characters. The
following characters cannot be used in application descriptions: double quote ("),
single quote ('), or percent (%).
3. You have the following choices:
• If you want the new application to store a single document once but make it
available for indexing many times, click the Multiple indexes referencing
single document check box to enable the option.
Enabling this option could save storage space. For example, the application
for a Human Resources department has an index field for Employee Name.
When the entire Documentation department won an award, this award was
scanned and entered as a new document for each employee in the
Documentation department. With the Multiple indexes referencing single
document option enabled, this document is saved as one BIN file, but has an
index record for each employee in the Documentation department.
• If you want each document to have a separate index record, click the check
box again to disable this option.
Note: If you intend to use the Doc Level Security flag for any index field in this
application, it is recommended that you disable the Multiple indexes referencing
single document option. For more information, see "Doc Level Security Flag" on
page 98.
4. To cause users to be prompted to check out documents from the current
application when they open them for display, enable the Prompt for checkout
when open documents option. This option performs the following functions:
• This option enables check in/check out mode for the application. (A similar
option on the Data tab of the AX Configuration dialog box enables check
in/check out mode for the workstation. However, to ensure consistent use of
the mode by all users of an application, it is recommended that you enable
check in/check out mode on an application basis.)
• This option also enables the final revision feature. Documents in this
application can be marked as a final revision, which can be opened only in
read-only mode and which cannot be checked out or modified. Users with the
Delete Doc privilege can delete final revisions.
For information on operational modes, see "Using the AX Interface" on page 48.
5. To require users to enter a comment whenever they check a document out of the
current application, enable the Checkout comments required option. Each
comment is saved to the audit trail database table or log file, depending on the
audit trail configuration. For information on configuring audit trails, see "Using
Audit Trails" on page 69.
6. To require users to enter a comment whenever they check a document into the
current application, enable the Checkin comments required option. Each comment
is saved to the audit trail database table or log file, depending on the audit trail
configuration. For information on configuring audit trails, see "Using Audit Trails"
on page 69.
7. To require users to enter comments and select the functionality they intend to use
whenever they create, display, export, print, or e-mail a document in the current
application, enable the Reason Code option. Enabling this option facilitates
compliance with the Health Insurance Portability & Accountability Act of 1996
(HIPAA) by allowing you to capture information about the use of documents
within AX. For more information about the use of the reason audit mode for an
application, see "Using the AX Interface" on page 48.
If you enable this option and you do not have the Audit Trail option enabled in
AppGen, a message appears indicating that Audit Trail is disabled and HIPAA
messages will not be logged. Even if you enabled the Reason Code option, no
logging occurs unless you also enable audit trails; users are prompted for
comments, but the comments they enter are not logged. For information on
configuring audit trails, see "Using Audit Trails" on page 69.
8. To cause users to be prompted to sign for each newly created BIN file (document,
page, or version), enable the Document signing option. Enabling this option
facilitates compliance with the Health Insurance Portability & Accountability Act
of 1996 (HIPAA) and the Title 21 Code of Federal Regulations (21 CFR Part 11) by
allowing you to require a signature for each BIN file within AX. For more
information about use of the Document signing option for an application, see
"Configuring Digital Signatures" on page 52.
9. Under Full-text Engine, select a full-text engine for the application. This is the
engine that will be used to process documents in this application when they are
submitted for full-text indexing. You have the following choices:
• Verity K2 full-text engine
• Pro-Index full-text engine
For a comparison of these two engines, see "Verity vs. ProIndex" on page 340.
10. If you selected the Verity K2 full-text engine, enter the name and port number of
the Verity K2 server in the appropriate text boxes. (Verity’s default port number for
the K2 Server is 9920.) Enter the same port number that was displayed on the
Finish page of the Verity K2 setup wizard. See Figure 180 on page 346. Then, enter
a collection name in the (case-sensitive) Collection Name text box. For instructions
on configuring the K2 server and creating a collection for each application, see
"Configuring the AX System to Use Verity" on page 343.
11. When all the application information has been entered, click Next. Your new
application is added to AppGen’s tree, and the Paths page appears.
You are now ready to set write paths for the new application. For more information,
see "Setting Write Paths" on page 139.
During this application generation procedure, you configure the initial storage location
for an application’s documents, annotations, OCR output, and full text. You or another
AX system administrator can overwrite the active application’s write paths later. For
more information, see "Changing Write Paths" on page 157.
Figure 42. New Application Wizard: Paths Page
configured in XSAdmin for the data source, the annotation write path could be a
remote or primary path. For more information, see "Supported Write Paths" on
page 142.
3. If you intend to use optical character recognition (OCR), specify where you want
OCR output text to be stored. You can enter the appropriate path in the OCR Write
Path text box, choose an existing directory path name from the OCR Write Path text
box drop-down list, or click Browse to navigate to the appropriate location.
OCR output text is the text associated with document pages, entire documents, or
selected regions of document pages that have been processed using OCR. AX can
be configured to automatically OCR pages during scanning (refer to the
"Scanning" chapter of the ApplicationXtender User Guide) or when there is not
currently a text view of an image (see "View Tab" on page 407).
If needed, an OCR write path can be specified for each application so that
document pages can be processed using OCR. When users process documents
and/or pages using OCR, AX creates a text version of those documents and or
pages. The OCR output files are stored as text files in the directory specified in the
OCR Write Path text box. If the OCR Write Path text box does not specify a path,
OCR output files are stored as text files in the directory specified in the Document
Write Path text box.
The OCR write path could be a local hard drive, network file server, DiskXtender
server, ArchiveXtender - Ascent Storage Edition server, or volume of
interchangeable media, such as an optical disk. Also, if dual write paths have been
configured in XSAdmin for the data source, the OCR write path could be a remote
or primary path. For more information, see "Supported Write Paths" on page 142.
4. If you selected the ProIndex full-text engine and if you are going to use a full-text
database, specify the location (or path) of the full-text database, where you want
the full text of your documents to be stored. You can enter the appropriate path in
the Full-Text DB Path text box, choose an existing directory path name from the
Full-Text DB Path text box drop-down list, or click Browse to navigate to the
appropriate location.
AX offers an optional full-text database engine. This optional module allows text
to be added to a database for full-text searches. When used in combination with the
OCR module, scanned pages can be turned into text and then added to the full-text
database. A full-text database path must be set for each application in order for AX
to add documents to the full-text database engine.
Full-text information is stored in the directory specified in the Full-Text DB Path
text box. If the Full-Text DB Path text box does not specify a path, full-text
information is stored in the directory specified in the Document Write Path text
box.
The full-text database write path could be a local hard drive or network file server.
Also, if dual write paths have been configured in XSAdmin for the data source, the
full-text database write path could be a remote or primary path. For more
information, see "Supported Write Paths" on page 142.
Note: You cannot use DiskXtender, ArchiveXtender - Ascent Storage Edition, or a
volume label as a Full-Text Database path.
5. Click Next. When AppGen has verified that all paths entered are valid, the Fields
page appears.
You are now ready to define index fields for the new application. For more
information, see "Defining Index Fields" on page 144.
Note: An ArcX-ASE volume name is always three characters. For simulated volumes,
the corresponding directory name starts with either an "O" or "B" prefix (for original or
backup volume), followed by ASCII codes for the three characters in the volume name.
ArcX-ASE uses hexadecimal characters for the ASCII character codes.
Note: To write to the root of an extended drive in AX, you must use a DX server name
instead of <DXSERVER> in the DiskXtender tab of the Configuration dialog box, and
you must precede the DX server name with two slashes when you specify a write path.
This is necessary because \\ is not a valid write path for AX and \\<DXSERVER> is
not a valid write path for AX.
If you intend to write documents, annotations, or OCR output to media with a volume
label or to a document storage server such as DiskXtender or ArchiveXtender - Ascent
Storage Edition, see the following sections:
• "Write Paths for Volume Labels" on page 143
• "Write Paths for DiskXtender" on page 143
• "Write Paths for ArchiveXtender - Ascent Storage Edition" on page 144
To write AX documents to the root of an extended drive, you must use a DX server
name instead of <DXSERVER> in the DiskXtender tab of the Configuration dialog
box, and you must precede the DX server name with two slashes when you specify
a write path. This is necessary because \\ is not a valid write path for AX and
\\<DXSERVER> is not a valid write path for AX.
Note: DX 5.5 introduced file retention as a new feature that applies to certain EMC
media and NAS media. When file retention is enabled, files stored on that media
cannot be modified or deleted for the configured retention period. This causes the
following problems with AX and WX:
• If a path managed by DX and using file retention is assigned to the application’s
document write path, you may not be able to create or modify document pages
that contain embedded OLE objects.
• If a path managed by DX and using file retention is assigned to the application’s
annotation write path, annotations can no longer be modified once created and
saved.
• If a path managed by DX and using file retention is assigned to the application’s
OCR write path, once an image has been processed using OCR and a text view of
the image has been created, a new text view can not be produced via OCR
processing.
A path managed by DX and using file retention may be used as a document write path.
However, do not use such a path as an annotation or OCR write path.
Adding a Field
Repeat this procedure for each index field that you want to add to the application.
To add a field:
1. In the Field Name text box, type a name for the index field. The field name may be
up to 64 alphanumeric characters. The first character must be a letter of the
alphabet; it may not be a number, blank space, or symbol. The following characters
cannot be used in field names: double quote ("), single quote (‘), backslash (\), or
percent (%).
2. From the Data Type drop-down list, select the data type that you want to associate
with this index field.
Note: If you select User-defined List as a field’s data type, see "User-defined List"
on page 148 for information about using the User-defined List dialog box. Also, if
the standard data types or their formats do not meet your requirements, you can
create custom data types or custom data formats. For instructions, see "Using
Custom Data Types and Formats" on page 104.
3. If you are defining a Currency, Decimal/Numeric, Integer, or Text field, you must
specify a length. In the Length text box, enter the number of characters or digits
that you want the index field length to be.
The maximum field length varies, depending on the data type you have chosen. If
the length specified is invalid for the data type, AppGen displays the number in
red and does not allow the field to be added.
Note: AppGen automatically fills in the length for the following field types:
Boolean Choice, Date, SSN, Telephone, Time, Time Stamp, User-defined List, or
Zip Code.
4. If you are defining a Currency, Date, Decimal/Numeric, Integer, SSN, Telephone,
or Zip Code field, you must select a format. From the Format drop-down list, select
the format that you want to use for the field.
Note: If you want to specify a format for a Text field, you can create a validation
mask. For more information on creating a validation mask, see "Validation Mask"
on page 147.
5. Under Flags, enable or disable the flags that you want to apply to the field. Flags
further specify index field functionality. The following table provides a brief
description of each flag. For full explanations of all field flags, see "Field Flags" on
page 96.For tips on choosing field flags, see "Application Design Outline" on
page 120.
Require unique data in this field for each document Part of Unique Key
Require users to enter this data twice as a validation Dual Data Entry
measure
Allow this field to be used for key reference file Key Reference
indexing. If you set a Key Reference field, you must also
define at least one Data Reference field.
Allow this field to be used for key reference file Data Reference
indexing. If you set a Data Reference field, you must
also define a Key Reference field.
Create and set a template format for this field (see Validation Mask
"Validation Mask" on page 147)
Note: The Required and Search field flags are enabled by default. Be certain to
check field flags for each index field before proceeding.
6. When all the information for a field has been entered, click Add. The new field
appears in the Application Field Order list box at the bottom of the screen and in
the application’s tree.
Validation Mask
If you enabled the Validation Mask field flag for a text field when defining your index
fields, the Format text box activates so that you can create a validation mask. Enter a
template for the data to be contained in this field in the Format text box, using the exact
characters that reflect an allowable entry.
The mask you enter will be used as a character-by-character validation of the text field.
Users will be required to enter the same character pattern in this index field when
adding documents. The characters in the following table are allowable in the validation
mask (these characters must be entered in lower case).
x Non-space character
? Any character
To enter a letter as an exact match requirement, you must use the upper case. For
example, the Tnnna mask would require users to enter the letter "T" followed by any
three numbers and a letter.
The field length in index creation must be at least as long as the mask. After you have
entered the mask requirements in the field, other characters can be added, provided the
overall length of the entry does not exceed the allowable length as defined in index
creation.
While z is the special mask character representing a number or space, a space is not
allowed as the leading entry in an index field.
User-defined List
If you selected User-defined List as a field’s data type when defining your index fields,
the User-defined List dialog box appears when you click Add.
To create a user-defined list:
1. In the Item text box, type an item to add to the list, and then click Add.
Note: You can add an unlimited number of items to the list. Each item can contain
up to 132 characters.
2. You have several choices:
• To import text from a file for use as a list item, click Import. Choose the
desired file from the Open dialog box.
• To change the order of items in a user-defined list, select the item that you
want to move, hold down the left mouse button, drag the item to the new
position, and release the mouse button.
• To alphabetize the list in ascending order, click the User-defined List Item
heading with the left mouse button. To alphabetize the list in descending
order, click the User-defined List Item heading with the right mouse button.
• To change an entry, double-click the item and make the necessary
modifications, then click Modify.
• To remove an entry from the list, select it and click Delete.
Note: If you are planning to configure the application for retention administration
or records management, and you plan to map an AX User-defined List field to a
Records Manager (RM) picklist field, make sure the longest item in the AX list is
equal to that of the RM picklist. An AX field length longer or shorter than that of
the corresponding RM field results in truncation of index data and can cause
accidental data loss. For more information, refer to the Records Manager for
ApplicationXtender Integration Guide.
3. Click OK to accept your list entries.
Note: To modify a User-defined List, double-click the field you want to modify to
enable the User-defined List button.
Inserting a Field
If you want to insert a field prior to building the application, you should do so now
before advancing to the next page.
To insert a field:
1. Select the field that will follow the newly inserted field in the Application Field
Order list box.
2. Set the new field’s attributes.
3. Click Insert. The new field appears above the selected field in the box.
Changing a Field
If you want to make changes to fields that you have added prior to building the
application, you should do so now before advancing to the next page.
To change a field’s attributes:
1. Double-click the field’s name in the Application Field Order list.
2. Make the necessary modifications.
3. Click Modify. The field is changed.
Re-ordering Fields
If you want to reorder the fields prior to building the application, you should do so
now before advancing to the next page. Repeat the following procedure for each field
that you want to move.
To move a field:
• Drag the field to the desired position.
You can drag a field from either Application Field Order or from the Application’s
Field Node.
Deleting a Field
If you want to delete a field prior to building the application, you should do so now
before advancing to the next page.
To remove a field:
1. Select the field’s name in the Application Field Order list.
2. Click Delete. The field is removed from the box and from the application’s tree.
The role of the AX system administrator includes not only the creation of AX
applications, but also the maintenance of those applications. There are certain tasks
that may need to be performed periodically in order to keep the ApplicationXtender
system functioning at peak efficiency. The following application management tasks are
described in this chapter:
• Modifying applications
The storage needs associated with a particular project often change. You may want
to redesign the index fields of an AX application to reflect those new requirements.
Existing applications can be easily modified using the AppGen module of AX (the
same function used to create applications). Changes can be made to any of a field’s
attributes, including the name and length of the field and the field flag settings.
Fields can be added to or deleted from existing applications. Once modifications
to the application are complete, the application is rebuilt with all dialog boxes and
application tables reflecting the modifications. For more information, see
"Modifying an Application" on page 153.
• Using the Archive Wizard
The AX Archive Wizard can be used to move documents from one document
storage location to another. Documents are often frequently accessed for a period
of time after they are added to an application. Once they are no longer current,
however, they are accessed infrequently, if at all. The Archive Wizard allows you
to move less frequently accessed documents within an application from more
expensive, faster access storage, such as a hard drive, to less expensive, larger
capacity media, such as a CD-ROM. By archiving older documents to removable
media, you can free storage space on faster access media, then use that space to
store more frequently accessed documents. When documents are archived, they
can still be accessed by searching and retrieving them within the application where
they were originally stored; AX only changes the document’s physical storage
location and sets a new pointer to the document’s new location. For more
information, see "Using the Archive Wizard" on page 161.
• Using the Migration Wizard
The AX Migration Wizard can be used to move index data from one database to
another. If you decide that you want to use AX with a different database, you can
create applications identical to your existing applications in the new database. You
can then use the Migration Wizard to move document records to the new database.
You can move all document records to the new database, or you can selectively
migrate document records. Users can then connect to the new database through a
new data source for that database. When you move document records from one
database to another, you do not have to change the document storage location for
the documents (although you can if you choose to). For more information, see
"Using the Migration Wizard" on page 182.
• Managing saved queries
In ApplicationXtender, you can perform and save queries that search for
documents in an application. (For more information on performing and saving
queries, refer to the "Retrieving Documents" chapter of the ApplicationXtender User
Guide.) You can manage these saved queries in Queue Manager. For more
information, see "Managing Saved Queries" on page 209.
• Troubleshooting
If a message appears (when a user attempts to create a document) indicating that
the AE_SEQ table has been locked, you need to fix a database collision. For more
information, see "Fixing Database Collisions" on page 211.
If you need to clear a user’s login from an application, you can do so by showing
the PID table and deleting the user. For more information, see "Using the PID
Table" on page 213.
If a user has checked out a document and is unable to check it back in for some
reason, you can cancel check out of the document from AppGen. You can also view
all of the currently checked out documents in an application if you need to
determine who has a document checked out. For more information, see "Managing
Document Check Out Status" on page 214.
If the status of a batch is Scanning or Indexing, but no users on your entire AX
system have the batch open, either in SX or in AX, you can reset the status of that
batch. For instructions, see "Resetting the Status of a Batch" on page 215.
• Removing obsolete data from the ApplicationXtender system
If the data stored in an application is no longer needed, you can delete or purge
that application, again through the AppGen module. When an application is
deleted, the index information relating to each stored document is deleted and the
index field definitions for the application are deleted. Purging an application
deletes all index records, but keeps the application definition in place.
If the data stored in an application is no longer needed, but you anticipate using
the same application in the future, the data in the application should be purged. If
you do not foresee a future need for the application, the application should be
deleted. When an application is either purged or deleted, the disk space occupied
by the index information is reclaimed for other uses. The .BIN files containing the
documents themselves are not deleted. These .BIN files can be deleted by deleting
the document files within ApplicationXtender before deleting the application, or
through Windows Explorer. For more information, see "Deleting or Purging an
Application" on page 216.
Modifying an Application
If the storage requirements for a project change, you can modify the application to
accommodate the new storage needs. Within AppGen, the names, data types and
formats, and field flag settings for existing fields can be modified. New fields can be
added or existing fields can be deleted.
Before making changes to an application, you should be aware of how changing
formats may affect the existing data in the application. If the data type of an index field
is changed from Decimal/Numeric to Integer, for example, any stored data with digits
after the decimal point will be truncated in the conversion to the new data type. If a
new index field is added to an application that already has documents stored in it, it
may be necessary to retrieve those existing documents and manually update their
index records to include values for the new field. AppGen alerts you to any potential
loss of data before changing or deleting a field.
Note: Rebuilding an application may be time-consuming, depending on the number of
documents in the application. Careful consideration should be given to the timing of
the rebuild.
To modify an application:
1. Close AX on all workstations.
2. Back up the AX database that contains the application you want to modify. This is
a precaution against accidental loss of data.
3. Start AppGen. For more information, see "Starting Application Generator" on
page 60.
4. In AppGen's tree, expand the Applications node. A list of applications appears.
5. From the list of applications, select the application that you want to modify.
6. You have several choices. For more information, see the following sections in this
chapter and later chapters:
• "Changing the Application Description" on page 154
• "Changing the Options for an Application" on page 155
Option Description
Multiple indexes The application stores each document once but makes it
referencing single available for indexing many times.
document
Select the certificate that you want to use and enter a comment. Click OK.
5. Click Apply.
Telephone Text
Note: When converting a field with a Date data type to a Text field type, ensure that
the field length is ten characters or more. This will avoid the truncation of existing
information.
If you apply the Key Reference flag to a field in an application that already contains
documents, there may be missing values in that field. For instructions on checking for
missing values, see "Checking for Missing Key Reference Values" on page 315.
To change a field:
1. Click the Fields tab on the right side of AppGen’s main window. The Fields tab
appears.
2. Double-click the name of the field to be changed. Once a field definition is active,
the field name appears in the Field Name text box. The field attributes also appear.
If you change the field name, note that the following characters cannot be used in
AX field names: double quotation mark ("), single quotation mark (‘), percent sign
(%), and backslash (\). The field name may be up to 64 alphanumeric characters.
The first character must be a letter of the alphabet; it may not be a number, blank
space, or symbol.
3. Click or tab to the appropriate text box to make any additional changes to the
selected field. To enable or disable field flags, click the check box next to the field
flag option. Make any desired changes to the data format by selecting a new option
from the Format list box. To make additions, deletions, or changes to the
User-defined List, select the User-defined List button. For more details on field flag
settings and defining data formats, see "Data Types" on page 86 and "Field Flags"
on page 96.
4. To update the Fields tab with the new index field changes, click Modify. When a
field is modified (if the application contains documents), AppGen alerts you to the
changes that will result once the command is executed. Application tables will be
adjusted to accommodate the changes, and existing data may be truncated under
the new format. A warning message may appear.
Figure 46. AppGen Edit Warning
Important: You should exercise caution when deleting fields; all index values already
stored in the application for that particular field are deleted when the field is deleted.
Note: You cannot delete all of the original fields. All least one original field must
remain in the application.
To delete a field from an application:
1. In the Fields tab, select the field in the Application Field Order list box that you
want to delete.
2. Click the Delete button. A warning message appears.
Figure 48. Delete Field Warning
3. Click Yes to delete the selected index field, or No to cancel the process. If you click
Yes, the field is removed from the Application Field Order list box and from the
application’s tree.
4. Click Apply to save the changes and rebuild the application. To quit without
deleting the index field, click Cancel.
Important: When the application is rebuilt, AppGen deletes the field and all the data
contained in this index field throughout the database. Caution should be exercised
because recovery of the data is not possible.
Icon Description
Gray filing cabinets with a clock icon represent applications with retention
administration.
Green filing cabinets with a clock icon represent applications with both
records management and retention administration.
For information on modifying the retention mode of an application, refer to the Records
Manager for ApplicationXtender Integration Guide.
write path specified in the application, not to the archive media path. The change in
document location only applies to the set of documents archived, not to new
documents.
Note: The Archive Wizard does not move documents that are under retention via the
Records Manager for ApplicationXtender integration.
For more information, see the following sections:
• "Planning the Archive" on page 162
• "Possible Archive Configurations" on page 165
• "The Archiving Process" on page 168
• "Automating Archive Processes" on page 176
user to simply write to a DX media folder without concern for which particular piece
of media will be used to store the documents. For the remainder of this Archive Wizard
section, whenever a storage subsystem is discussed, DiskXtender will be used as an
example as it is the storage system most frequently used with ApplicationXtender.
Stationary Specify
Specialty Determine Yes
Media Archive
Media Premastering (including DX?) Media Path
Requirements
Only
No
Specify Archive
CD-ROM Yes Media Path,
Jukebox or Media Size, and
Tower? Premastering
Directory
No
Specify Media
Size and
Premastering
Directory Only
If you are archiving to removable media that will be stored off-line, you only need to
enter the Media Id Prefix in the Media page of the Archive Wizard; an Archive Media
Path is not necessary in this storage scenario. In the Pre-master page of the Archive
Wizard, you need to enable the Pre-master Archive Media to option, enter a
pre-mastering directory, and specify a Media Size.
the Archive Wizard will look in the configured directory path for documents; when
Off-line is configured, the Archive Wizard will look for the correct piece of media and
prompt you to load it if it is not loaded.
Figure 50. Choosing an Archive Retrieval Method
Select
Archive Jukebox or No Hard No
Retrieval Tower? Drive?
Method
Stand-
Yes Yes alone
Choose
On-line as Removable Media
Archive Drive (CD-ROM,
Retrieval Diskette,
Method WORM,
Choose
Off-line as
Archive
Retrieval
Method
Type of Archive
Configuration Includes
Stationary Media On-line Hard drives, DiskXtender, and other storage subsystems
(optical jukeboxes and towers are usually managed by
DX or another subsystem)
Important: The media containing the archived documents must be located in the
Archive Media Path in order for them to be retrieved.
7. Archive documents.
8. Move archived documents from pre-mastering path to CD-ROM using
CD-mastering software or to other types of removable media using the Move or
Copy functions in Windows Explorer.
9. Place media in one of the paths specified as a volume label search drive in AX for
retrieval. (AX prompts for media if it is not mounted.)
5. Select the application you want to archive and click Next to continue. The Method
page appears. For more information, see "Selecting an Archive Retrieval Method"
on page 170.
Note: Only one application can be archived at a time.
4. Click Done to exit the Status box. The Search Criteria page is now active.
5. You have the following choices:
• If you want to archive a new application from the same source database, a
new application from a different source database, or change any other
settings, click Back.
• If you want to exit the program, click Exit.
3. Navigate to the directory where you want to save the settings file, and type the
name you want to save it as in the File Name box.
Figure 62. Save Archive Settings Save As Dialog Box
4. Click Save to return to the Settings page and proceed with the archive. To return to
the Settings page without saving archive settings, click Cancel. For more
information about completing the archive process, see "Reviewing Archive
Settings" on page 173.
3. The Open dialog box appears. Navigate to the directory where the settings file has
been saved, and then select the appropriate file so that it appears in the File name
box.
Figure 64. Archive Wizard Load Settings Open Dialog Box
4. Click Open to load the specified settings and to return to the Data Source page. To
Cancel the Load Settings process, click Cancel.
5. After you have clicked Open and the Data Source page reappears, settings from the
.ARW file automatically populate the page. Click the Next button to move to the
next page of the wizard. If any settings need to be altered, change them so that they
are correct and then click Next to proceed.
6. Repeat step 5 for each page of the wizard until you reach the Search Criteria page.
For more information about completing the archive process, see "Configuring the
Search Criteria Page" on page 173.
Option Description
Option Description
Option Description
If the application does not exist on the destination database, Migration Wizard creates
a new application identical to the source application. If the application already exists
on the destination database, you can choose to merge the documents into the
destination application or to overwrite all existing documents in the destination
application with the source application.
Note: Only users who have been granted the AX Administrator privilege can perform
migrations. In addition, the Migrate App privilege must be enabled for the user or
group’s application security profile in order for the applications to be viewed in
Migration Wizard and subsequently migrated.
Migration Wizard allows you to perform several migrations without exiting to change
the database, because source and destination databases are specified within the
Migration Wizard. In instances where the same application needs to be migrated
periodically, Migration Wizard also works efficiently. Settings from a migration can be
saved and reused, making the migration process almost automatic for subsequent
migrations. Command line options are also available, allowing for quick, efficient
migrations.
Keep in mind the items that are not migrated:
• If an application is migrated with batches waiting to be indexed, the non-indexed
batches are not migrated. Batches should be indexed before an application is
migrated.
• Full-text and OCR information from the full-text database is not migrated. (If you
enable the Migrate Indexes Only option and if the destination application is
created before the migration, Verity full-text engine settings are migrated.
Otherwise, Verity full-text engine settings are not migrated.)
• The Migration Wizard does not move documents that are under retention via the
Records Manager for ApplicationXtender integration.
Note: During a migration, users can continue to retrieve and view documents in the
source and destination applications, but cannot add new documents, edit existing
documents, or delete documents in the source or destination application until the
migration process is complete.
Migrating an Application
Migration Wizard provides a step-by-step wizard interface for application migration
between databases. When migrating an application using Migration Wizard, you select
the documents to be migrated by specifying search criteria that describe which
documents will be included in the migration. You can choose to:
• Migrate an application to a database which does not already contain the
application
• Merge the application with an existing application in the destination database
• Write the application over an existing application in the destination database
• Append the application to an existing application in the destination database
• Migrate an application within the same database
• Migrate index information only
• Migrate security information
Note: If saved settings exist from previous migrations, you can load those settings
using the Load Settings button located within the Select Source Database page. For
further information, see "Load Migration Settings" on page 199.
To continue the Migration Wizard:
1. In the Data Source Name list, select the name of the data source where the
application to be migrated resides.
Note: You can select a data source that is using a previous version of AX (version
5.0 and higher).
2. Under ApplicationXtender Login, in the User Name text box, type a valid user
name for the selected data source.
Note: Your login procedure may vary depending on the security provider in use
for the current data source. For information, see "Variations on Login Procedures"
on page 61.
3. In the Password text box, type a valid password for the selected user name and
database.
4. Click Next. The Migration Wizard connects to the selected source database. The
Select Destination Database page appears. For instructions, see "Selecting the
Destination Database" on page 186.
Note: If the User Name and Password text boxes are not filled in correctly prior to
clicking the Next button, a login dialog box appears. Enter the correct account
information, and then click Login to proceed to the Destination Database page. To
return to the Source Database page, click Cancel.
Replace Destination
Place a check mark next to the Replace Destination option to delete the existing
application in the destination database and replace it with the application from the
source database.
When Replace Destination is enabled, the Merge option is disabled automatically and
the Allow duplicate indexes option is checked and disabled.
Important: Selecting the Replace Destination option will permanently delete the existing
documents in the destination application. Recovery of the data is not possible through
ApplicationXtender.
Important: Selecting this option will permanently delete the migrated documents and
the index information referencing the documents from the source database. Recovery
of the data is not possible through ApplicationXtender.
Merge
Place a check mark next to the Merge option to merge migrated source documents into
pre-existing applications in the destination database, adding pages from source to
destination that have matching index information.
When Merge is enabled, the Allow Duplicate Indexes option is disabled automatically.
If the source application has "Multiple indexes referencing a single document" enabled
in Application Generator, Merge is not available.
Note: If duplicate index records already exist in the destination database, duplicate
index records in the source database are merged with only the first matching index
record.
Migrate Security
Place a checkmark next to the Migrate Security option to migrate user security settings
from the source to the destination database. Each user and group that has privileges in
the source application will be migrated. Document Level Security is also migrated
during a security migration.
Note: Security is migrated only if Replace Destination is checked or if the destination
application does not already exist.
The following rules are in effect during a security migration:
• When an application is migrated with migrate security checked, source security is
copied to the destination database for all users and groups that have access to the
migrated application.
• When group security is migrated, all users that belong to the group are migrated
to the destination database.
• For both user and group profiles, the application-specific profile located in the
source database always overrides the application-specific profile in the
destination database.
• For both user and group profiles, the source global profile is copied to the
destination application if it does not already exist. If a global profile already exists
on the destination database, it is not overwritten.
For user profiles, permissions are verified for all individual users, and if the destination
permissions are not the same as the source (possibly due to membership in multiple
groups), the application-specific profile is created or altered to match the user
permissions in the source database. If the source data source is using a different
security provider than the destination data source, keep in mind the information in the
following table:
What is • All users and groups that • All users and groups that have privileges in
migrated? have privileges in the source the source application
application • All users who are members of those groups
Which migrated • All migrated user accounts Only valid user accounts:
user accounts can • For the Windows security provider, the user
be used after accounts that have domain name in the user
migration? account name
• For a directory service security provider, the
user accounts that match the value for the
Name Attribute specified in XSAdmin
If the source data source is using a different security provider than the destination data
source, keep in mind the information in the following table:
What is • All annotation groups in the • All annotation groups in the data source
migrated? data source • All users and groups that have been added to
• All users and groups that have those annotation groups
been added to those annotation • All users who are members of those groups
groups
What needs to be • Assign privileges to each • Assign privileges to each migrated user
done after migrated user account account
migration? • Assign passwords to each user
account that has been migrated
as a result of the annotation
group migration
Important: If you do not enable this option during the migration, all users and groups
will be migrated, even if you have configured specific users or groups for security
mapping.
• If you enabled the ERMX report search option, the Report Search Criteria
page appears. For instructions, see "Selecting Reports by Specifying Criteria"
on page 194.
• If you did not enable the ERMX report search option and if the destination
application does not already exist in the destination data source, the
Application Path Configuration page appears. For instructions, see
"Specifying Write Paths for the Destination Application" on page 195.
• If you did not enable the ERMX report search option and if the destination
application does already exist in the destination data source, the Summary
page appears. For instructions, see "Completing the Migration" on page 196.
Note: No result set appears to indicate which reports would be migrated. To view
the selected reports prior to migration, open the application in AX and search for
reports using the same search criteria. If the criteria are the same, the number of
reports that match the criteria on the Report Search Criteria page should match the
number of reports that appear in the result set in AX.
3. In the Migration Wizard message, click OK.
4. If you want to include all documents that are associated with the selected reports,
enable the Include associated documents option.
5. Click Next. The page that appears next depends on the destination application:
• If the destination application does not already exist in the destination data
source, the Application Path Configuration page appears. For instructions,
see "Specifying Write Paths for the Destination Application" on page 195.
• If the destination application does already exist in the destination data source,
the Summary page appears. For instructions, see "Completing the Migration"
on page 196.
4. If the Volume Label Search Drives dialog box appears, select the drive in which the
CD-ROM is located and click OK.
Automating Migration
For users who perform the same migrations on a routine basis, Migration Wizard’s
built-in automation features can be used to script some or all of the migration process.
You can save settings files to load for future use, use Migration Wizard’s extensive
command line options, or both to facilitate a quick and accurate migration.
For more information on automating application migration through the Migration
Wizard, see the following sections:
• "Save and Load Migration Wizard Settings" on page 198
• "Command Line Options" on page 200
2. The Open dialog box appears. Select a migration settings (.MIG) file to load and
click Open; or click Cancel to return to the Migration Wizard without loading a
settings file.
Figure 80. Migration Wizard: Open Dialog Box
3. Settings from the .MIG file should automatically populate the Migration Wizard.
Click the Next button to move to the next dialog of the wizard. If any settings need
to be altered, change them so that they are correct and click the Next button to
proceed.
4. Repeat step 3 for each page of the wizard until you reach the Select Applications
page. Change any options as needed, and then click the Migrate button to begin
with the migration. For more information about completing a migration, see
"Completing the Migration" on page 196.
In addition, you can use the /? command line option to open command line help. To
do this, use the following syntax in the Windows Run dialog box or from the Windows
command line:
"C:\Program Files\XtenderSolutions\Content
Management\MigrateWiz32.exe" /?
To run Migration Wizard using command line options:
1. From the Windows Start menu, select Run. The Windows Run dialog box appears.
Figure 81. Run Dialog Box
Note: You can also use Windows shortcuts and batch files to run Migration Wizard
with command line options. For more information, see "Using Batch Files and
Shortcuts with Command Line Options" on page 206.
2. In the Open text box, enter the following syntax:
"C:\Program Files\XtenderSolutions\Content
Management\MigrateWiz32.exe" optional-settings-file switches
In this command, "C:\Program Files\XtenderSolutions\Content
Management" is the directory to which AX has been installed, optional-settings-file is the
location and filename of the settings file you want to use, and switches are a series of
command line switches.
Note: If you are using Windows 98, be sure to surround paths and filenames that
include spaces (such as C:\Program Files\XtenderSolutions\Content
Management) with quotation marks. Otherwise, Windows may not be able to find the
directory.
For more information about using command line options to perform application
migrations, see the following sections:
• "Specifying a Migration Settings File" on page 201
• "Command Line Switches with Arguments" on page 202
Note: You can also use Windows shortcuts and batch files to run Migration Wizard
with command line options. For more information, see "Using Batch Files and
Shortcuts with Command Line Options" on page 206.
2. In the Open text box, enter the following syntax:
"C:\Program Files\XtenderSolutions\Content
Management\MigrateWiz32.exe" C:\AX\AEG.MIG switches
Where C:\Program Files\XtenderSolutions\Content Management\ is the
directory AX was installed to, C:\AX\AEG.MIG is the path and filename of the
migration settings file you want to use, and switches are any optional switches you
would like to use. For more information about additional command line options you
can use, see "Command Line Switches with Arguments" on page 202 and "Command
Line Switches without Arguments" on page 204.
Note: If you are using Windows 98, be sure to surround paths and filenames that
include spaces (such as C:\Program Files\XtenderSolutions\Content Management)
with quotation marks. Otherwise, Windows may not be able to find the directory.
For more information about saving Migration Wizard settings files for use with
Migration Wizard, see "Save Migration Settings" on page 198.
Note: When using a migration settings file and command line switches together,
Migration Wizard uses information from the migration settings file for information not
included as a command line switch. If a parameter included in the migration settings
file has also been specified using a command line switch, the command line switch
parameters override settings contained in the settings file.
Option Description
/SD DataSourceName Specifies the name of the data source to be used as the
source database
/SU UserName Specifies the user name for logging into the data source
to be used as the source database.
Note: Your login procedure may vary depending on the
security provider in use for the current data source. For
information, see "Variations on Login Procedures" on
page 61.
/SP Password Specifies password for the user name specified with the
/SU switch
/DD DataSourceName Specifies the name of the data source to be used as the
destination database
/DU Username Specifies user name for logging into the data source to
be used as the destination database.
Note: Your login procedure may vary depending on the
security provider in use for the current data source. For
information, see "Variations on Login Procedures" on
page 61.
/DP Password Specifies password for the user name specified with the
/DU switch
Option Description
/RS "n^z~a%b%c" Specifies ERMX report search criteria. The rules for
document search criteria also apply to ERMX report
search criteria.
Note: When entering search criteria for a list of values search in a batch file, two percent
signs (%%) should be used instead of one. For example, a search for documents whose
first index terms match 1,2, or 5 should appear as follows in a batch file: /S
"1%%2%%5". For more information about using batch files with command line options,
see "Using Batch Files and Shortcuts with Command Line Options" on page 206.
In this example, Migration Wizard uses the pre-created settings saved in the AX
migration file C:\AX\AEG.MIG, and migrates all documents whose first index field
contains either "Smith" or "Jones". For more information about using migration settings
files, see "Specifying a Migration Settings File" on page 201.
/NOIO Migrates indexes and images "Migrate Indexes Only" on page 189
(default)
/NOMS Does not migrate security (default) "Migrate Security" on page 190
Note: If you are using Windows 98, be sure to surround paths and filenames that
include spaces (such as C:\Program Files\XtenderSolutions\Content Management)
with quotation marks. Otherwise, Windows may not be able to find the directory.
"C:\Program Files\XtenderSolutions\Content
Management\MigrateWiz32.exe" C:\AX\AEG.MIG /S "1^9" /MRG /MS /A
In this example, Migration Wizard uses the pre-created settings saved in the AX
migration file C:\AX\AEG.MIG, and migrates all security settings and documents
whose first index fields contain values between 1 and 9 into the destination database.
Documents from the source database are merged with the destination database. The
migration runs in automatic mode.
4. If the Shortcut tab is not forward, click the Shortcut tab to reveal it.
5. Within the Target text box, add command line options after the program directory
and executable, leaving the quotation marks around the program directory and
executable intact. For more information about command line option syntax, see
"Command Line Options" on page 200.
Figure 84. Adding Command Line Options to the Shortcut Target
Important: While you can enable Text Wrap from the Format menu in Notepad to
provide for ease of editing, do not use manual line breaks. Using a manual line break
within a command line causes all options after the line break to be ignored.
Note: When entering search criteria for a list of values search in a batch file, two
percent signs (%%) should be used instead of one. For example, a search for
documents whose first index terms match 1,2, or 5 should appear as follows in a
batch file: /S "1%%2%%5".
3. After you have finished entering command line syntax, select Save from the File
menu. The Save As dialog box appears.
4. Navigate to the directory where you want to save the batch file. In the Save as type
list box, click the down-arrow and choose All Files.
5. In the File name text box, type the name you want to save the file as, using a .BAT
extension (for example, MYBATCHFILE.BAT). Click Save to save the file.
Important: Be sure to change the Save as type to All Files. Otherwise, Notepad saves
the batch file as a non-executable text (.txt) file.
4. From the list on the right, double-click an application name. A list of the
application's saved queries appears on the right. For each query, information is
provided including the query's name and ID number.
The AE_SEQ table is an internal AX system table that allows AX to keep track of
application information. In this table, AX assigns each application an identification
number called AppID. During some operations, AX sets the AppID value to a negative
value in the AE_SEQ table to avoid any possible ID duplication. While the value of
AppID is negative, AX does not allow document creation. AX resets AppID to a
positive value after each of these operations. In the unlikely event of an AX crash
during one of these operations, AX may neglect to reset AppID to a positive value. This
is considered a database collision.
Important: Do not attempt to fix a database collision unless you are certain that an
AE_SEQ table has been locked. Verify that there no users adding documents or pages
to the system prior to fixing the database collision. It is recommended that all users be
logged out of the system when you fix the database collision. Multiple indexes can
mistakenly be added to the same document or document files can be accidentally
overwritten if you fix a database collision while additions are in progress.
You must start AppGen with the /allowfixdbcollision switch in order to have
access to the Fix Database Collision command.
To fix a database collision:
1. Close ApplicationXtender on your AX workstation (and preferably on all other AX
workstations on the system).
2. From the Start menu, select Run. The Run dialog box appears.
Figure 91. Run Dialog Box
3. In the Open text box, enter the path to the Application Generator executable file
(APPGEN32.EXE) on your system. (You can use the Browse button to browse for
the APPGEN32.EXE file.) Enter the /allowfixdbcollision switch after the
path.
The Open text box should contain the following: "C:\Program
Files\XtenderSolutions\Content Management\AppGen32.exe"
/allowfixdbcollision (where C:\Program Files\XtenderSolutions\Content
Management is the installation location that you selected during
ApplicationXtender installation).
Figure 92. Run Dialog Box with AppGen32 Path and Fix Database Collision
Switch
8. Right-click the node for the application in which the problem has occurred. A
shortcut menu appears. From the shortcut menu, select Fix Database Collision. A
message confirming that you want to attempt to fix the database collision displays.
9. Click Yes to fix the database collision.
Figure 93. Fix Database Collision Confirmation Message
Important: When you cancel the check out of a document, all changes that the user
may have made to the document since check out are discarded. Canceling check out
causes AppGen to delete the working copy of the document that is created when the
user checks out the document. It is recommended that whenever possible you have
users check documents in or cancel document check out themselves.
Important: Do not reset the status of a batch unless you are certain that no users on
your entire AX system have the batch open, either in SX or in AX.
Delete an The index information relating The files that make up the
application to each stored document. (AX documents themselves.
deletes all index records.)
The index field definitions for
the application.
Purge an The index information relating The index field definitions for
application to each stored document. (AX the application. (AX keeps the
deletes all index records.) application definition in place.)
The files that make up the
documents themselves.
If the data stored in an application is no longer needed, but you anticipate using the
same application in the future, the data in the application should be purged. If you do
not foresee a future need for the application, the application should be deleted. When
an application is either purged or deleted, the disk space occupied by the index
information is reclaimed for other uses. The .BIN files containing the documents
themselves are not deleted. These .BIN files can be deleted by deleting the document
files within ApplicationXtender before deleting the application, or through Windows
Explorer.
For more information, see:
• "Deleting an Application" on page 216
• "Purging Data from an Application" on page 217
Deleting an Application
Applications that are no longer needed can be deleted through AppGen. Deleting an
application through AppGen deletes all tables, stored index information, and index
field definitions relating to the application. The compressed document files (.BIN files)
referenced by the application’s index entries, however, are not deleted.
When an application is deleted through AppGen, the entire application is permanently
removed from the AX system. Deleted applications cannot be restored. AppGen
provides a warning message to remind you; however, once the deletion is confirmed,
none of the information can be recovered. Strong discretion is advised when executing
any delete command.
Important: Clicking Yes will permanently delete the application and index values it
contains. The .BIN files referenced by the application’s index entries are not deleted,
but recovery of the data in AX is only possible from backup media.
If the application that you have deleted contained index fields that used custom data
types or formats, and if you are certain that no other application uses these custom data
types and formats, you can delete them. For instructions, see "Modifying and Deleting
Custom Data Types" on page 107 and "Modifying and Deleting Custom Data Formats"
on page 116.
Important: This feature permanently purges all index values currently stored in the
selected application(s). Caution should be exercised because recovery of the data is not
possible.
Note: If Yes is selected, the contents of the selected application(s) are purged. Because
the application definition remains intact, the application name still appears in the
applications list.
A privilege is enabled if the check box for an item contains a check mark. If the check
box is clear, the privilege is disabled. If the check box is dimmed, the user inherits the
privilege setting from any groups in which the user is a member:
• When the data source is using the CM security provider, the user’s Profile tab
indicates the inherited privilege setting for each privilege. If the check box is
dimmed and has a checkmark next to it, the privilege is enabled. If the check box
is dimmed with no checkmark, the privilege is disabled.
• When the data source is using the Windows security provider or a directory
service security provider, the user’s Profile tab does not indicate the inherited
privilege setting for each privilege. If the check box is dimmed and you want to
determine what privilege setting has been inherited, you must refer to the Profile
tab for the group.
To view the User and Group Privileges Legend:
• On the Profile page or tab for a user or group, click Legend. The User and Group
Privileges Legend appears.
Figure 100. User and Group Privileges Legend (CM Security)
Figure 101. User and Group Privileges Legend (Windows or Directory Service
Security Provider)
License Groups
If any license groups have been created in the License Server, you can specify their use
for individual users, for individual workstations, or for individual AX databases. The
following general guidelines apply:
• If you specify a license group for an individual user, then each time that user logs
on to an AX component on any workstation for any AX database, that license
group is used. For instructions on specifying a license group for a user, see
"Changing an Existing User’s License Group" on page 257.
• If you specify a license group for an individual workstation, then each time any
user logs on to an AX component on that workstation for any AX database, that
license group is used. For instructions on specifying a license group for a
workstation, see "Configuring License Server Settings for the Workstation" on
page 67.
• If you specify a license group for an individual AX database, then each time any
user logs on to an AX component on any workstation for that AX database, that
license group is used. For instructions on specifying a license group for an AX
database, refer to the XtenderSolutions Administrator’s Guide.
However, the license group for a user overrides the license group for the workstation
or for the AX database. For example, the license group GROUP1 is specified for the
AXUSER user, the license group GROUP2 is specified for the AXUSERWS workstation,
and the license group GROUP3 is specified for the Xtender database. If the AXUSER
user logs into the Xtender database in AX, on the AXUSERWS workstation, the
GROUP1 license group is applied.
Also, the license group for a workstation overrides the license group for the AX
database. For example, the license group GROUP2 is specified for the AXUSERWS
workstation and the license group GROUP3 is specified for the Xtender database. If
any user logs into the Xtender database in AX, on the AXUSERWS workstation, the
GROUP2 license group is applied.
Consider assigning license groups to users rather than to databases, to minimize the
number of licenses in use for each user. If license groups are assigned to AX databases,
each time a user logs in to a different data source, the user uses a separate license.
License groups can be created for AX licenses, Pro-Index full-text client licenses, Verity
full-text client licenses, SX licenses, WX licenses, WX PAL licenses, and ERMX client
licenses. For more information on configuring license groups, refer to the License Server
Administrator’s Guide.
DLS Keywords
DLS Keywords can be used to restrict access to documents based on user name and/or
workstation. To configure this for an actual application, fields should be set up to
correspond to the keyword being compared. For instance, if you wanted an application
to restrict access to documents based on user name, you would create an index field
(such as "Username") to contain user names, and assign it the %u keyword on the
Document Level Security page within Application Generator. Within the actual
document indexes, the field "Username" should be populated with an actual user
name. When the user runs a query on the application with DLS keywords set up for
user, only those documents that contain their user name in the "Username" index field
will be retrieved. The same process would be followed using the %w keyword in DLS
with a field designed to hold workstation names to restrict documents based on
individual workstations. For detailed information about configuring DLS in
ApplicationXtender using DLS keywords, see "Adding a DLS Keyword as a Secured
Value" on page 274.
DLS Wildcards
Wildcard characters can be used within DLS secured values to restrict or allow access
to a wider range of documents. The asterisk (*), when used in a secured value, replaces
several characters and the question mark (?) replaces a single character. For instance, a
secured value set as 1*1 could restrict all documents where the index field data begins
and ends with a 1 (101, 10021, 1541, etc.), and a secured value set as 1?1 would restrict
all documents where the index field data contains three digits and begins and ends
with a 1 (101, 111, 121, etc.). For detailed information about configuring DLS in
ApplicationXtender using DLS wildcards, see "Adding a DLS Wildcard as a Secured
Value" on page 275.
Security Providers
Security providers implement authentication, which requires all users to enter a valid
user name and password to access most modules. XSAdmin offers two pre-packaged
security providers (CM and Windows) to ensure that each user is who he or she claims
to be. You can also create a directory service security provider, if necessary.
XSAdmin allows you to choose the security provider for each data source. Then,
Application Generator allows you to create and import users and groups. The
following table lists the differences between the security providers:
Security
Provider Description
Security
Provider Description
Directory • If you are already using a directory service to maintain users and
service groups in your enterprise, you can configure the system to use the
directory service and create a new security provider in XSAdmin.
(Requires configuration of a web service.) For instructions, refer to the
XtenderSolutions Administrator’s Guide.
• You can import users and groups from a directory service via an
LDAP interface, such as Microsoft Active Directory or Netscape
Directory Server.
• When you change a user’s password or group membership in the
directory service user maintenance utility, the next time that user logs
into an XtenderSolutions module, the changes are reflected in the
authentication of that user and the functions available to that user.
• You must use a directory service user maintenance utility to maintain
passwords and group membership.
3. If you are using a Windows NT Server as your operating system, make sure that
the local computer is the active domain. For instructions, see "Selecting the Local
Computer as the Active Domain" on page 226.
4. Make sure that the account that you want to configure has the "Act as part of the
operating system" advanced right. For instructions, see "Adding the Advanced
Right to the Account" on page 227.
5. In the User Manager, select Exit from the User menu.
6. If the account that you have configured is the same as the active account (the
account with which you have logged on), you must log off and log on again.
Note: This step is necessary because any changes made to an active account do not
take effect until the user has logged off and logged on again. (Windows security
sets all rights for the active user account when the user logs on.)
The account is configured. When a user logs on to a workstation using this account,
additional users will be able to log on to AX components on that workstation.
2. In the Domain text box, type the name of the local computer. Click OK.
3. From the Right drop-down list, select Act as part of the operating system.
4. Click Add. The Add Users and Groups dialog box appears.
5. From the List Names From drop-down list, select the name of the domain on which
the intended account was created.
6. Under Names, select the account that you want to configure. Click Add. Under
Add Names, an entry appears in the following format:
DOMAINNAME\Account
In this format, DOMAINNAME represents the name of the domain and Account
represents the name of the account.
7. Click OK. The Add Users and Groups dialog box closes. In the User Rights Policy
dialog box, the account name appears under Grant To.
Figure 106. User Rights Policy Dialog Box
8. Click OK.
2. Expand the Local Policies node, and then select User Rights Assignment. All user
rights should appear in the right-side pane of the Local Security Settings Console.
3. Right-click Act as part of the operating system and choose Security. The Local
Security Policy Setting dialog box appears.
Figure 108. Local Security Policy Setting Dialog Box
5. Select the domain from the Look in drop-down list, select the account from the top
pane, and click Add. It should appear in the bottom pane as
DOMAINNAME\Account Name. Click OK. Click OK again to return to the Local
Security Settings Console.
6. Close the Local Security Settings Console. The account is configured. When a user
logs on to a workstation using this account, additional users will be able to log on
to AX components on that workstation.
Provider dialog box in XSAdmin. For example, if the Name Attribute specified for
users in the Create Directory Service Provider dialog box is "e-mail address", then
the name you enter when creating a user must match the e-mail address attribute
for that user.
For more information, see:
• "Creating a Group" on page 236
• "Importing Group Accounts" on page 242
• "Creating a User" on page 249
• "Importing User Accounts" on page 255
Icon Description
This icon indicates that a domain has been specified for the group. In a data
source that uses the CM or Windows security provider, domains are
automatically specified for imported groups.
This icon indicates that a domain was not specified for the group. If the data
source is using the Windows security provider, this icon indicates a group
that is not valid for use in the data source. For details, see "Troubleshooting
Invalid Users and Groups" on page 231.
This icon indicates that a domain has been specified for the user. In a data
source that uses the CM or Windows security provider, domains are
automatically specified for imported users.
This icon indicates that a domain was not specified for the user. This icon is
also used for the SYSOP user. If the data source is using the Windows
security provider, this icon indicates a user that is not valid for use in the
data source. For details, see "Troubleshooting Invalid Users and Groups" on
page 231.
Security Mapping
When the Migration Wizard is used to migrate documents and security information,
the administrator has the option to map users and groups in the source database to
users and groups in the destination database. Similarly, when the ReportXtender (RX)
Extraction Wizard is used to extract AX documents and security information before the
creation of an RX CD-ROM, the administrator has the option to map users and groups
in the source database to users and groups in the database on the CD-ROM (or in the
database where the CD-ROM will be reintegrated).
When a Migration Wizard migration is performed, if the Use alternative security
option is enabled in the Migration Wizard, only the users and groups with alternative
security information configured are migrated. For more information on enabling this
option, see "Use Alternative Security" on page 192.
When an RX Extraction Wizard extraction is performed, if the Use alternative security
information option is enabled in the Extraction Wizard, only the users and groups with
alternative security information configured are extracted. Therefore, only those users
and groups exist on the resulting RX CD-ROM. When you reintegrate the resulting
CD-ROM, all of the users and groups that are on the CD-ROM are reintegrated. For
more information on enabling this option, refer to the ReportXtender Administrator’s
Guide.
Note: The availability of the security mapping feature depends on the security
provider in use by the destination data source and the source data source. The
following table indicates whether users or groups can be mapped from one security
provider to another.
Mapping To
Directory
CM Windows Service
Mapping From
Number of Maximum
Group security profiles, like user security profiles, can be used to grant privileges to all
applications in the data source, or to assign privileges to a specific application. A global
security profile allows the members of the group to access the AX functions enabled in
the profile in all AX applications. An application security profile allows the members
of the group to access the functions enabled in the application to which the profile
applies.
Groups are also used when assigning Document Level Security (DLS) settings. You
associate a group with an index field and assign values for that field that either grant
or deny access to documents. For more information on DLS, see "Managing Document
Level Security" on page 269.
Similarly, adding a user to a group causes any security settings in place for the group
to apply to the user. Because Document Level Security settings are assigned by
association with groups, by adding a user to a group you may accidentally deny a user
access to documents that the user should be able to access. When a user is added to a
group, you should make sure that no settings in the user’s user security profile will
cause the user to have different privileges than you intend the user to have.
If a global profile does not exist for a group, AX displays a blank global profile.
Similarly, if an application name is selected for which the group does not already have
a security profile, a blank profile for the application appears. Privileges must be
configured in the blank profile and the profile saved in order for the group members
to have access to all AX applications (in the case of the global profile) or to the specific
application (in the case of an application profile).
Creating a Group
The New Group wizard allows you to create a new group. The following procedure
provides an overview of this section.
Note: If you intend to use the same user and group structure in your AX system as in
Windows, consider using the Windows user maintenance utility to create groups, and
then importing them into AppGen. For instructions on importing groups into AppGen,
see "Importing Group Accounts" on page 242.
Note: If the data source is using the Windows security provider, a group that you create
in AppGen is valid only when a group of the same name exists in Windows. If the data
source is using a directory service security provider, it is highly recommended that you
import groups rather than creating them in AppGen. For more security provider
considerations, see "Best Practices for each Security Provider" on page 230.
After a group has been created, you can change any group setting except the group
name. For more information, see "Changing Group Settings" on page 243.
To create a new group:
1. Right-click the Groups node in AppGen's tree. A shortcut menu appears. From the
shortcut menu, select New. The New Group wizard begins, starting with the
Group page.
2. On the Group page, enter a unique name for the group. (If the data source is using
the Windows security provider, you must precede the group name with its domain
name and a backslash. If the data source is using a directory service security
provider, you must provide the "Name Attribute" name.) You can also specify a
description for the group. For more information, see "Configuring the Group Page
for a New Group" on page 237.
3. Click Next. If the data source is using the CM security provider, the Users page
appears.
4. On the Users page, you have the following choices:
• Specify the group’s membership now. (You can add users to the Members list
for the group by dragging them from the Non-Members list.) For more
information, see "Configuring the Users Page for a New Group" on page 238.
• Specify the group’s membership later.
5. Click Next. The Profile page appears. By default, when a group is being added, it
has no security profiles configured.
6. On the Profile page, you have the following choices:
• Assign security profiles to the group for all applications or for particular
applications now. For more information, see "Configuring the Profile Page for
a New Group" on page 239.
• Assign security profiles to the group for all applications or for particular
applications later.
7. Click Next. The Security Mapping page appears.
8. On the Security Mapping page, you have the following choices:
• Configure alternative security for the group now. For more information, see
"Configuring the Security Mapping Page for a New Group" on page 240.
• Configure alternative security for the group later.
9. Click Finish. The new group now appears in AppGen’s Groups list. For a
description of each of the icons that represent groups in AppGen, see "User and
Group Icons" on page 231.
3. If necessary, remove a user from the Members list by double-clicking the user name
in the Members list or by dragging the user name from the Members list to the
Non-Members list. The user name moves to the Non-Members list.
4. Repeat step 3 for each user that you want to remove from the Members list.
5. Click Next. The Profile page appears. For more information, see "Configuring the
Profile Page for a New Group" on page 239.
Button Description
3. If you want to configure more profiles for the group, repeat step 1 and step 2 for
each profile.
4. Click Next. The Security Mapping page appears. For more information, see
"Configuring the Security Mapping Page for a New Group" on page 240.
By default, the Alternative security option is disabled, and the Overwrite options and
Group Name and Description text boxes are dimmed.
To configure security mapping for a new group:
1. If you would like to map this group, enable the Alternative security option. The
Overwrite options become available.
2. You have the following choices:
• If you want to map this group to a group with the same name, then enable the
Same group name option. If you enable this option, the Group name and
Description text boxes remain dimmed.
• If you want to map this group to a group with a different name, then enable
the Different group name option. The Group name and Description text boxes
become available for you to change the information in them.
3. If you have enabled the Different group name option, type a new name for the
group in the Group Name text box. The group name can be up to 64 characters
long. (If the destination database is using the Windows security provider, you must
precede the group name with its domain name and a backslash. The domain name
may be up to 64 characters. If the destination database is using a directory service
security provider, you must provide the "Name Attribute" name.)
4. If you have enabled the Different group name option, you can type a new
description for the group in the Description text box. The description can be up to
132 characters long.
5. Click Finish. The new group now appears in AppGen’s Groups list.
You have now completed the creation of a new group. If you need to make changes to
this group’s security information, you can do so at any time. For more information, see
"Changing Group Settings" on page 243.
2. For each group that you want to import, select the group name and click Add. The
selected groups appear in the Groups to be Imported list. (To remove group names
from the Groups to be Imported list, select the group and click Remove.)
For each of the groups that you have imported, you can change the group’s
description, membership, and profile. For more information, see "Changing Group
Settings" on page 243.
3. In the Description text box, type a new description of the group. The description
may be up to 132 characters.
4. Click Apply.
3. If necessary, add a user to the Members list by double-clicking the user name in the
Non-Members list or by dragging the user name from the Non-Members list to the
Members list. The user name moves to the Members list.
4. Repeat step 3 for each user that you want to add to the Members list.
5. If necessary, remove a user from the Members list by double-clicking the user name
in the Members list or by dragging the user name from the Members list to the
Non-Members list. The user name moves to the Non-Members list.
6. Repeat step 5 for each user that you want to remove from the Members list.
7. Click Apply.
Note: For a complete explanation of user privileges, see "User and Group
Privileges" on page 262.
3. In the Application drop-down list, you have the following choices:
• To assign the same privileges for all AX applications, select <Global Profile>.
• To define privileges for one application only, select the application name from
the list.
4. Under Privileges, select the items appropriate to the responsibilities of the users in
the group. Enable an option by clicking a checkmark in its check box, disable an
option by clearing its check box, or when applicable accept the default settings.
When configuring group profiles, you can also use the buttons described in the
following table:
Button Description
5. Click Apply.
6. If you want to configure more profiles for the user, repeat step 3 to step 5 for each
profile.
3. If you would like to map this group, enable the Alternative security option. The
Overwrite options become available.
4. You have the following choices:
• If you want to map this group to a group with the same name, then enable the
Same group name overwrite option. If you enable this option, the Group
name and Description text boxes remain dimmed.
• If you want to map this group to a group with a different name, then enable
the Different group name overwrite option. The Group name and Description
text boxes become available for you to change the information in them.
5. If you have enabled the Different group name option, type a new name for the
group in the Group Name text box. The group name can be up to 64 characters
long. (If the destination database is using the Windows security provider, you must
precede the group name with its domain name and a backslash. The domain name
may be up to 64 characters. If the destination database is using a directory service
security provider, you must provide the "Name Attribute" name.)
6. If you have enabled the Different group name option, you can type a new
description for the group in the Description text box. The description can be up to
132 characters long.
7. Click Apply.
Deleting a Group
Groups can be deleted from the AX system. When a group is deleted, all of the group’s
security settings are deleted as well.
• If the data source is using the CM security provider, users who were members of
the group are not deleted, but no longer have any of the privileges that were
granted in the group’s security profiles.
• If the data source is using the Windows security provider or a directory service
security provider, users who were members of the group and who are listed in
AppGen’s Users list are not deleted, but no longer have any of the privileges that
were granted in the group’s security profiles. If you have deleted a group in
Windows, consider also deleting it from AppGen as well, to avoid confusion.
To delete a group:
1. In AppGen's tree, expand the Groups node. A list of existing groups appears.
2. Click the name of the group in AppGen’s Groups list. The Group tab for the
selected group appears.
3. Right-click the group name in AppGen’s Groups list. A shortcut menu appears.
From the shortcut menu, select Delete. A warning message appears.
4. Click Yes to delete the group, or No to cancel the deletion process.
Creating a User
The New User wizard allows you to create a new user. The following procedure
provides an overview of this section.
Note: If you intend to use the same user and group structure in your AX system as in
Windows, consider using the Windows user maintenance utility to create users, and
then importing them into AppGen. For instructions on importing Windows users into
AppGen, see "Importing User Accounts" on page 255.
Note: If the data source is using the Windows security provider, a user that you create
in AppGen is valid only when a user of the same name exists in Windows. If the data
source is using a directory service security provider, it is highly recommended that you
import users rather than creating them in AppGen. For more security provider
considerations, see "Best Practices for each Security Provider" on page 230.
After a user has been created, you can change any user setting except the user name.
For more information, see "Changing User Settings" on page 256.
To create a new user:
1. Right-click the Users node in AppGen’s tree. From the shortcut menu, select New.
The New User wizard begins, starting with the User page.
2. On the User page, enter a unique user name. If the data source is using the
Windows security provider, you must precede the user name with its domain
name and a backslash. If the database is using a directory service security provider,
you must provide the "Name Attribute" name. If the data source is using the CM
security provider, you must also enter a personal password for the user and verify
the password by typing it again. You can also specify the user's full name and a
license group for the user. For more information, see "Configuring the User Page
for a New User" on page 250.
3. Click Next. If the data source is using the CM security provider, the Groups page
appears.
4. On the Groups page, you have the following choices:
• Specify the user’s group membership now. (Drag groups from the Not
Member Of box to the Member Of box to assign group membership.) For
more information, see "Configuring the Groups Page for a New User" on
page 251
• Specify the user’s group membership later.
3. If the data source is using the CM security provider, in the Password text box, type
a password for the new user. The password may be up to 64 characters. In the
Verification text box, type the same password in exactly the same format.
4. If your system uses license groups, type the name of the license group from which
the user’s license should be pulled in the License Group text box. The license group
name may be up to 32 characters.
Note: For more information on configuring license groups, refer to the License
Server Administrator’s Guide.
5. Click Next. The page that appears next depends on the security provider that the
data source is using:
• If the data source is using the CM security provider, the Groups page appears.
For more information, see "Configuring the Groups Page for a New User" on
page 251.
• If the data source is using the Windows security provider or a directory
service security provider, the Profile page appears. For more information, see
"Configuring the Profile Page for a New User" on page 252.
Note: For a complete explanation of user privileges, see "User and Group Privileges"
on page 262.
To configure the Profile page for a new user:
1. In the Application drop-down list, you have the following choices:
• To assign the same privileges for all AX applications, select <Global Profile>.
• To define privileges for one application only, select the application name from
the list.
2. Under Privileges, select the items appropriate to the user’s responsibilities. Enable
an option by clicking a checkmark in its check box, disable an option by clearing
its check box, or when applicable accept the default settings.
When configuring user profiles, you can also use the buttons described in the
following table:
Button Description
3. If you want to configure more profiles for the user, repeat step 1 and step 2 for each
profile.
4. Click Next. The Security Mapping page appears. For more information, see
"Configuring the Security Mapping Page for a New User" on page 253.
By default, the Alternative security option is disabled, and the Overwrite options and
User Name, Full Name, Password, and Verification text boxes are dimmed.
2. For each user that you want to import, select the user name and click Add. The
selected users appear in the Users to be Imported list. (To remove user names from
the Users to be Imported list, select the user and click Remove.)
3. To import groups associated with the selected users, enable the Import Groups
check box.
4. When you have completed your Users to be Imported list, click OK. The selected
users now appear in AppGen’s Users list as imported users. For a description of
each of the icons that represent users in AppGen, see "User and Group Icons" on
page 231.
To display the domain names with each imported group and user in AppGen, click the
Show Domain button on the toolbar. (See Figure 116 on page 243.)
For each of the users that you have imported, you can change certain user settings. For
more information, see "Changing User Settings" on page 256.
3. In the Password text box, type a new password for the user. The password may be
up to 64 characters.
4. In the Verification text box, type the same password in exactly the same format.
5. Click Apply.
Note: Passwords are case-insensitive when the data source is using the CM security
provider.
3. If necessary, add a group to the Member Of list. Double-click the group name in the
Not Member Of list. The group name moves to the Member Of list.
4. Repeat step 3 for each group that you want to add to the Member Of list.
5. If necessary, remove a group from the Member Of list. Double-click the group
name in the Member Of list. The group name moves to the Not Member Of list.
6. Repeat step 5 for each group that you want to remove from the Member Of list.
7. Click Apply.
Note: For a complete explanation of user privileges, see "User and Group
Privileges" on page 262.
3. In the Application drop-down list, you have two choices:
• To assign the same privileges for all AX applications, select <Global Profile>.
• To define privileges for one application only, select the application name from
the list.
4. Under Privileges, select the items appropriate to the user’s responsibilities. Enable
an option by clicking a checkmark in its check box, disable an option by clearing
its check box, or when applicable accept the default settings.
When configuring user profiles, you can also use the buttons described in the
following table:
Button Description
5. Click Apply.
6. If you want to configure more profiles for the user, repeat step 3 to step 5 for each
profile.
8. If you have enabled the Same user name, but different password option, or the
Different user name and different password option, retype the new password in
the Verification text box. The password can be up to 64 characters long.
9. Click Apply.
Deleting a User
If the data source is using the CM security provider, you can use AppGen to completely
delete users from an AX system. When a user is deleted, all of the user’s security
settings are deleted and the user is removed from all groups.
Note: If the data source is using the Windows security provider or a directory service
security provider, and if a group exists in which the deleted user is a member, the user
is automatically recreated in AppGen if the user logs into AX. However, although the
user is recreated, the profile for that user is deleted when you delete the user through
AppGen.
To delete a user:
1. In AppGen's tree, expand the Users node. A list of existing users appears.
2. Click the name of the user in AppGen’s Users list. The User tab for the selected user
appears.
3. Right-click the user name in AppGen’s Users list. A shortcut menu appears. From
the shortcut menu, select Delete. A warning message appears.
4. Click Yes to delete the user, or No to cancel the deletion process.
You can copy user permissions to and from existing profiles. For instructions, see
"Copying User Privileges" on page 267.
The following table describes each privilege, and indicates whether another privilege
is required. (For example, a user with the Scan/Index Online privilege can perform
online indexing of scanned documents, but only if the user also has the Add Page
privilege.)
Required
This Privilege Grants This Ability Co-Privileges
Scan/Index The user can perform online indexing of scanned Add Page
Online documents.
Enhance Pages The user can perform image enhancement Add Page and
functions such as deskew, inverse text correction, Display
and dot shading removal.
Batch Index The user can perform batch indexing. Add Page
Modify Index The user can modify the document indexes. Display
Required
This Privilege Grants This Ability Co-Privileges
Delete Page The user can delete pages in the document. This
privilege also allows ODMA users to check in
and replace the current document revision. (The
Delete Page and Display privileges are both
necessary in order to perform these functions.)
COLD Import The user can maintain COLD/ERM extract COLD Import
Maint definitions.
Required
This Privilege Grants This Ability Co-Privileges
Key Ref Maint The user can configure the Key Reference File
Setup tab for an application in AppGen.
Auto Index The user can configure the Auto Index Import
Maint Setup tab for an application in AppGen.
Key Ref Import The user can import Key Reference files.
Edit Annotations The user can edit, delete, or hide the annotations Display
created by the same user.
Edit Redactions The user can edit, delete, or hide redactions Edit
created by the same user. Annotations
and Display
Global The user can add annotations; can edit, delete, or Edit
Annotations hide annotations created by other users, and can Annotations
view the text of text annotation icons created by and Display
other users. In addition, if Edit Redactions is
selected, the user can add redactions and can
edit, delete, or hide redactions created by other
users.
Required
This Privilege Grants This Ability Co-Privileges
WX PAL User Public Access Licenses are used when you are
using WebXtender in combination with AX to
make AX documents available over the World
Wide Web or over intranets. If this privilege is
enabled, the user’s privileges are restricted when
using WebXtender. The user can only access
ApplicationXtender documents in read-only
mode using the WX Thin Client. (A user with the
WX PAL User privilege cannot log into any AX
component, regardless of the other privileges in
the user security profile.)
The following privileges are available only on the Global Profile. These privileges are
not available for individual applications:
• Configure WS
• Create App
• AX Administrator
• Multiple Logins
• User Security Maint
• WX PAL User
5. Select a user or multiple users that will assume the new Profile and Group
privileges defined in the template account.
6. Click Copy. The Profile and Group privileges in the template profile are copied to
the selected user(s).
Figure 135. Document Level Security Page with Group and Field Associated
The selected field and group are temporarily associated for the purpose of configuring
Document Level Security. If you click Back, Next, or Cancel without completing
Document Level Security configuration, the association is lost. The next step in this
configuration is described in "Selecting a Security Type" on page 272.
2. In the Secured Value text box, type the string that you want to use as DLS criteria.
Data entered into the DLS field during a search will be measured against the value
entered here.
3. Click OK. The value is added to the secured values list (under Data Values).
Important: Once the list for an associated group and field has been created using a
particular security type, do not toggle the security type option buttons; this reverses
the security setting for all values already added.
2. Enter the appropriate DLS keyword value in the Secured Value text box. You have
the following choices:
4. In the Secured Value text box, enter a value that contains the appropriate DLS
wildcard character. You have the following choices:
• Type * to substitute any character or set of characters.
• Type ? to substitute a single character within a specific string of text.
5. Click OK. The value is added to the secured values list (under Data Values).
An index field’s DLS status is determined by the enabling of the DLS field flag for the
field. This status is first determined when the application is first generated. However,
you can modify an existing application to enable Document Level Security by enabling
the field flag for a field in the application. For details on application design, see
"Application Design Outline" on page 120. For details on application creation, see
"Creating an Application" on page 134. For more information on modifying an
application, see "Modifying an Application" on page 153.
4. In the Secured Value text box, make the appropriate modification to the secured
value.
5. Click OK. The change is reflected in the Data Values list.
6. Repeat step 3 to step 5 for each value that you want to change.
7. Click Apply.
5. Select a drive, folder, and file name for the file and click Save. AppGen saves the
secured values as a text file.
2. In the Name text box, type a unique name for the annotation group. An annotation
group name may be up to 64 characters.
3. Click Add. The Select Users and Groups dialog box appears.
Figure 148. Select Users and Groups Dialog Box
4. Select the users and/or groups that you want to include in the annotation group.
Note: You can select multiple sequential users or groups by selecting the first user
or group in the sequence, pressing [SHIFT], and selecting the last user or group in
the sequence. You can select multiple non-sequential users and groups by pressing
[CTRL] and selecting each user or group, one at a time.
5. Click OK. The users and groups that you have selected appear in the New
Annotation Group wizard. By default, each one is configured to follow legacy
rules, which means that each user’s ability to view or edit annotations or to hide
or edit redactions is governed by the privileges assigned to their user or group
profile.
Figure 149. New Annotation Group Wizard with Users and Groups
6. If you want to change the configuration for a user or group, select that user or
group from the list and disable the Follow Legacy Rules option. Other check boxes
become available. The following table lists your choices:
For more information on the abilities that each option allows, see "Annotation
Group Example" on page 283.
Note: For ease of administration, it is recommended that you assign the same
options to all members of each annotation group. For example, one annotation
group can contain users and groups who all have the Annotations > View option
and another group can contain users and groups who all have the Redactions >
Hide option.
7. If you want to remove a user or group from the annotation group, select the user
or group from the list and click Delete.
8. Click Finish.
Note: The flexibility of this feature allows you to customize it to your needs. However,
this same flexibility may be somewhat confusing to your users. You should provide
them with guidelines as to what they should be able to do with various annotations.
For those users who can assign annotations to annotation groups, you should provide
guidelines as to which annotations they should assign to each annotation group.
the COMMON annotation group (but are not members of the RESTRICTED annotation
group). All of these users have full privileges in their user profiles. The following table
lists each of these users:
EAGE Annotations > View, Annotations > Edit, and Global Edit
ER Annotations > View, Annotations > Edit, Redactions > Hide, and
Redactions > Edit
ERGE Annotations > View, Annotations > Edit, Redactions > Hide,
Redactions > Edit, and Global Edit
Seeing Annotations
The following table indicates which annotations each of the users in the COMMON
annotation group can see:
VA EA EAGE HR ER ERGE
Annotations
Redactions
VA EA EAGE HR ER ERGE
Hiding Annotations
The following table indicates which annotations each of the users in the COMMON
annotation group can hide:
VA EA EAGE HR ER ERGE
Annotations
Redactions
Editing Annotations
The following table indicates which annotations each of the users in the COMMON
annotation group can edit:
VA EA EAGE HR ER ERGE
Annotations
Redactions
Note: This table indicates "One’s own" in cases where the user can edit only the
annotations that he or she has created. For example, the only COMMON annotations
that the EA user can edit are the ones that EA created.
Assigning Annotations
The following table indicates which annotations each of the users in the COMMON
annotation group can assign to the COMMON annotation group:
VA EA EAGE HR ER ERGE
Annotations
VA EA EAGE HR ER ERGE
Redactions
Note: This table indicates "One’s own" in cases where the user can assign only the
annotations that he or she has created. For example, the only COMMON annotations
that the EA user can assign are the ones that EA created.
Annotation groups can also be assigned to annotations when the annotation is created
or when current default settings are applied to the annotation. This is accomplished
through a default annotation group setting. Only the EA and EAGE users can set the
annotation group COMMON as default. The VA, HR, ER, and ERGE users cannot set
the annotation group COMMON as default.
Note: You can select multiple sequential users or groups by selecting the first user
or group in the sequence, pressing [SHIFT], and selecting the last user or group in
the sequence. You can select multiple non-sequential users and groups by pressing
[CTRL] and selecting each user or group, one at a time.
5. Click OK. The users and groups that you have selected appear in the New
Annotation Group wizard. By default, each new user or group in an annotation
group is configured to follow legacy rules, which means that each users’ ability to
view or edit annotations or to hide or edit redactions is governed by the privileges
assigned to their user or group profile.
6. If a user or group is configured to follow legacy rules and if you want to change
the configuration, select that user or group from the list and disable the Follow
Legacy Rules option. Other check boxes become available. The available choices
are described in Table 72 on page 282.
For more information on the abilities that each option allows, see "Annotation
Group Example" on page 283.
Note: For ease of administration, it is recommended that you assign the same
options to all members of each annotation group. For example, one annotation
group can contain users and groups who all have the Annotations > View option
and another group can contain users and groups who all have the Redactions >
Hide option.
7. If a user or group is configured to view or edit annotations or to hide or edit
redactions, and if you want the user or group to be configured to follow legacy
rules, select that user or group from the list and enable the Follow Legacy Rules
option.
8. If you want to remove a user or group from the annotation group, select the user
or group from the list and click Delete.
9. Click Finish.
Note: The flexibility of this feature allows you to customize it to your needs. However,
this same flexibility may be somewhat confusing to your users. You should provide
them with guidelines as to what they should be able to do with various annotations.
For those users who can assign annotations to annotation groups, you should provide
guidelines as to which annotations they should assign to each annotation group.
Import
Feature Brief Description
Auto Index An Auto Index Import allows you to use the [F7] key to import index
values from a text file, so users adding documents can automatically
populate indexes using the imported data. Auto Index is ideal for the
import of index records that are applicable to only one document. In an
Auto Index Import table, once a record (or a group of index values) has
been used to index a document, the record is deleted. For more
information, see "Auto Index Import" on page 292.
Key A Key Reference Import allows you to use the [TAB] key to import
Reference index values from a text file. Key Reference is most effectively utilized
in situations where each imported record may be used to describe
several documents. Key Reference Import maintains the index records
in the Key Reference table even after records have been used to index
documents. Any change made to a record in the Key Reference table is
reflected in the indexes of all documents described by that record. For
more information, see "Key Reference Import" on page 294.
Index An Index Image Import allows you to import index data and document
Image files in a single step. A text file is created which contains a line of text
for each document to be imported, with a value for each index field and
a reference to the location of the file to be imported. You can import all
index information and documents using the import wizards found in
the AX programs menu. No manual document indexing is required. For
more information, see "Index Image Import" on page 295.
Import of index data (or index data and documents) using these features is performed
through separate import wizards by the system administrator. In most cases, the
information in the import file matches the index field order and data format of the AX
application. In those cases, a default specification can be used to import the data. If a
default specification can be used, you do not need to create a custom import
specification.
There are certain circumstances, however, where changing the rules used to import
data can either make an otherwise infeasible import possible or remove the need to
reformat import files. For instructions, see "Import Specifications" on page 298, which
You can remove the Delete button, the Delete All button, or both from this dialog box
for all users of an AX data source. In effect, removal of these buttons can make it more
difficult for AX users to delete index records from the Auto Index table.
To remove the deletion buttons:
1. Login to AppGen as SYSOP or as a user that has the AX Administrator privilege.
2. From AppGen’s Tools menu, select Options. The Options dialog box appears.
Figure 151. Options Dialog Box
Note: If you import a multi-page PDF file, the result in AX is a single page with
multiple subpages. If necessary, you can convert these subpages to pages. For
instructions, refer to the "Managing Documents" chapter of the ApplicationXtender
User’s Guide.
When AX processes an import file with file names preceded by two @@ symbols, AX
honors the file type mappings and image storage format settings for those file names.
The following table explains the trade-off between using one @ symbol or two:
All of the files listed in Precede each file name and AX imports the file without
the import file are of a path with only one @ checking the file type. Each
format that is natively symbol. file must be a natively
supported by AX. supported file format.
Some of the files listed Precede each file name and AX checks the file type and
in the import file are of path with two @@ symbols. treats the file as the detected
a format that is type (such as image, text, or
natively supported by foreign file format). The
AX and some are not, number of files that AX must
and you do not have check increases the import
time to edit the import time.
file.
Some of the files listed For each supported file, If one @ precedes the file
in the import file are of precede the file name and name and path, AX imports
a format that is path with only one @ the file without checking the
natively supported by symbol. file type.
AX and some are not,
For each unsupported file, If two @@ signs precede the
and you do have time
precede the file name and file name and path, AX
to edit the import file.
path with two @@ symbols. checks the file type and treats
the file as the detected type.
None of the files listed Precede each file name and AX checks the file type and
in the import file are of path with two @@ symbols. treats the file as the detected
a format that is type (in this case, foreign file
natively supported by format).
AX.
The file name should appear immediately after the index fields. The data for insertion
in index fields must be formatted and ordered to correspond exactly to the fields as
defined and ordered in the AX application. For example, one line, which references an
image file, could read as follows:
123121234,JOHN DOE,092964@c:\windows\cars.bmp
The social security number, name and birth date make up the first part of the record in
the import file, and the CARS.BMP image is attached to that record. Both the index data
and the image are imported as a document in ApplicationXtender. An example of a
line referencing a text file would be:
123121234,JOHN DOE,092964@@c:\windows\cars.txt
In this example, again the social security number, name and birth date on the record
are taken from the first three entries in the line, but here the CARS.TXT text file is
attached to the index. The same format would be used to import a file of foreign file
format.
@$VOLUME_01\images\castle*.bmp
@c:\images\*.bmp
@c:\images\new\*.*
The first two lines each import a single page. The third line imports all bitmap files
with the prefix "castle" in the images directory on the disk labeled Volume_01 as pages.
The fourth line imports all bitmap files in the C:\IMAGES directory. The fifth line
imports all files in the C:\IMAGES\NEW directory.
Import Specifications
A specification is a set of rules followed by ApplicationXtender when importing data
from an import file using one of the three import wizards available. In most cases, the
data can be imported using a default import specification provided in AX. Whenever
data will be imported into all available fields in an application, and the data format and
field length of those fields does not need to be altered, a default specification can be
used to perform the import. If an existing default specification is not sufficient for an
import, you can either modify a default specification or create a new, customized
specification for the import.
For a successful import, AX must correctly read the data to be imported from the file.
Each line of data in the import file must be organized in a specific format. AX stores
each line of the file as a separate record, or group, of index field values, using the hard
return character as an indicator of the end of a record. Within each record, there should
be a value for each field into which data is being imported. These values are separated
by a delimiter, such as a comma or a tab. When AX parses a line of the import file, it
creates a record and stores the data preceding the first delimiter in the first field of the
record, the data preceding the second delimiter in the second field, and so on.
A specification provides the following information to AX during the import process:
• The fields into which data should be imported
• The order in which fields should be imported
• The data format and length of each field
• The delimiter which will be used to separate one field value from another in the
import file
A default specification automatically imports data into every available field in an
application in the order specified in the application, and uses the data format
configured when the application was created. The only difference between one default
specification and another is the delimiter used to separate data. The default
specifications, therefore, are each named for the delimiter used in the specification. The
following default specifications are available.
Delimiter Description
, Comma
| Pipe
Delimiter Description
~ Tilde
\t Tab
Adding Fields
You can add fields to a specification. For each field you want to add, repeat the
following procedure.
To add a field:
1. From the Field Name list, select the new field.
2. If necessary, modify the maximum width for the field. The maximum width
indicates the maximum number of characters to import from the file.
3. If necessary, modify the format for the field. The format indicates the format of that
field in the import file.
4. Click Add. The field is appended to the end of the Field List.
Inserting Fields
You can insert fields into a specification. For each field you want to insert, repeat the
following procedure.
To insert a field:
1. In the Field List, select the field that will follow the new field. (The new field will
be inserted before the selected field.)
2. From the Field Name list, select the new field.
3. If necessary, modify the maximum width for the field. The maximum width
indicates the maximum number of characters to import from the file.
4. If necessary, modify the format for the field. The format indicates the format of that
field in the import file.
5. Click Insert. The new field is inserted in the Field List, after the selected field.
Re-ordering Fields
You can change the order of fields in a specification by moving fields, one at a time. For
each field you want to move, repeat the following procedure.
To move a field:
• Drag the field to its new location. The Field List reflects your changes.
Deleting Fields
You can delete fields from a specification. For each field you want to delete, repeat the
following procedure.
To delete fields:
1. In the Field List, select the field you want to delete.
2. Click Delete. The field is removed from the Field List.
5. Click Yes to delete the specification, or No to return to the File Setup tab.
6. Click Apply.
4. Navigate to and select the file containing the import data and click Open.
5. You have the following choices:
• If you want to test the Auto Index Import setup before performing the import,
click Preview. The Auto Index Import Preview dialog box appears. For more
information, see "Previewing the Auto Index Import" on page 308.
• If you want to continue the wizard without previewing the Auto Index
Import, click Next. The options page of the Auto Index Import Wizard
appears. For more information, see "Configuring the Auto Index Import
Options Page" on page 310.
The following table describes each element of the Auto Index Import Preview dialog
box:
Line Number: # Contains the specified line (record) of data from the
import file, and displays it as it appears in the file.
Line Status Indicates the status of the specified line (record) of data
(OK, in the preceding figure).
Table 82. Auto Index Import Preview Dialog Box Elements (Continued)
Recognized Fields Contains the specified line (record) of data from the
import file, and displays it as it will appear after being
parsed according to the option selected under Format
Specifications. If one of the fields fails during the
attempt to preview the line, no other fields are
displayed after that field.
These options (Append data and Replace existing data) are mutually exclusive.
You can select one or the other, but not both.
Important: If you select the Replace existing data option, AX deletes all existing
data in the Auto Index table before importing records. Therefore, all the records in
the database are deleted, even if the import is unsuccessful.
2. If you want to omit from the import a record or a group of records at the beginning
of the import file, you need to specify the number of lines that you want AX to skip
when processing the import file. In the Skip text box, type the number of leading
lines that you want AX to skip.
3. If you want to omit from the import a record or a group of records at the end of the
import file, you need to specify the number of lines that you want AX to load when
processing the import file. In the Then Load text box, type the number of lines that
you want AX to load.
Note: You can use the Skip and Then Load text boxes simultaneously. For example,
if you want AX to process only lines 21 through 30, specify 20 in the Skip text box
and 10 in the Then Load text box. AX skips the 20 leading lines in the import file,
and then processes only the subsequent 10 lines (lines 21 through 30).
4. Click Import. The import wizard processes the records in the import file. When the
import is completed, the Auto Index Import Status dialog box appears. For more
information, see "Using the Auto Index Import Status Dialog Box" on page 311.
Processing Completed At: Date and time the import was completed.
2. If any records were rejected and you want to see more information on these
rejections, click View Rejection File. The Auto Index Import rejection log appears.
When you have viewed the log, close the file and return to the Auto Index Import
Status dialog box.
3. Click Exit. The Auto Index Import Status dialog box closes.
5. Configure the options page of the wizard and perform the import. For details, see
"Configuring the Key Reference Import Options Page" on page 317.
6. If you want to view the status of the completed import, use the status dialog box.
For details, see "Using the Key Reference Import Status Dialog Box" on page 319.
4. Navigate to and select the file containing the import data and click Open.
5. You have the following choices:
• If the Key Reference flag has been applied to a field in an existing application
and you want to check for missing values in that field, see "Checking for
Missing Key Reference Values" on page 315.
• If you want to test the Key Reference Import setup before performing the
import, click Preview. The Key Reference Import Preview dialog box appears.
For more information, see "Previewing the Key Reference Import" on
page 315.
• If you want to continue the wizard without previewing the Key Reference
Import, click Next. The options page of the Key Reference Import Wizard
appears. For more information, see "Configuring the Key Reference Import
Options Page" on page 317.
3. In the text box, enter the value that you want to use as a placeholder. Consider
using a unique value so that you can search for the documents later.
4. Click OK. AX inserts the specified value in each record, where values were
missing. The welcome page of the Key Reference Import Wizard reappears.
5. To continue with the Key Reference import, click Next. The options page of the Key
Reference Import Wizard appears. For more information, see "Configuring the Key
Reference Import Options Page" on page 317.
Consider performing a query in AX, using as search criteria the placeholder value that
you specified, to find the documents in which the Key Reference value had been
missing. Then you can change the placeholder value for each document to a more
useful value. For instructions on searching for documents and modifying document
indexes, refer to the "Retrieving Documents" and "Managing Documents" chapters in
the ApplicationXtender User’s Guide, respectively.
The following table describes each element of the Key Reference Import Preview
dialog box:
Line Number: # Contains the specified line (record) of data from the
import file, and displays it as it appears in the file.
Recognized Fields Contains the specified line (record) of data from the
import file, and displays it as it will appear after being
parsed according to the option selected under Format
Specifications. If one of the fields fails during the
attempt to preview the line, no other fields are
displayed after that field.
• Make sure that you have selected the correct application. Click Back, specify a
different application, and click Preview again.
• Make sure that the specification setup meets your needs. Exit the import
wizard. In AppGen, reconfigure the specification or create a new one. For
more information on configuring a specification or creating a new one, see
"Import Specifications" on page 298. Restart the import wizard. On the
welcome page of the import wizard, specify the application, specification,
and import file. Click Preview again.
3. When the status is OK and the text under Recognized Fields appears as you expect,
click Next Line.
4. Repeat step 1 to step 3 until you are satisfied with the preview.
5. Click Close. The Key Reference Import Preview dialog box closes and any changes
you have made are saved.
6. In the welcome page of the Key Reference Import Wizard, click Next. The options
page of the Key Reference Import Wizard appears. For more information, see
"Configuring the Key Reference Import Options Page" on page 317.
Merge with the records Merge with AX compares the key field values of the
in the existing Key existing imported records with the key field values
Reference table data of records already in the Key Reference
table. If an imported record and an
existing record have the same value in the
key field, the values in the data fields for
the imported record overwrite the values
in the data fields for the existing record.
All other records are added as new records
in the table.
Replace all of the Replace AX replaces all existing data in the Key
records in the existing existing Reference table with the imported records.
Key Reference table data
These options (Append data, Merge with existing data, and Replace existing data)
are mutually exclusive. You can select only one.
Important: If you select the Replace existing data option, AX deletes all existing
data in the Key Reference table before importing records. Therefore, all the records
in the database are deleted, even if the import is unsuccessful.
2. If you want to omit from the import a record or a group of records at the beginning
of the import file, you need to specify the number of lines that you want AX to skip
when processing the import file. In the Skip text box, type the number of leading
lines that you want AX to skip.
3. If you want to omit from the import a record or a group of records at the end of the
import file, you need to specify the number of lines that you want AX to load when
processing the import file. In the Then Load text box, type the number of lines that
you want AX to load.
Note: You can use the Skip and Then Load text boxes simultaneously. For example,
if you want AX to process only lines 21 through 30, specify 20 in the Skip text box
and 10 in the Then Load text box. AX skips the 20 leading lines in the import file,
and then processes only the subsequent 10 lines (lines 21 through 30).
4. Click Import. The import wizard processes the records in the import file. When the
import is completed, the Key Reference Import Status dialog box appears. For
more information, see "Using the Key Reference Import Status Dialog Box" on
page 319.
Processing Completed At: Date and time the import was completed.
If any records were rejected and you want to see more information on these
rejections, click View Rejection File. The Key Reference Import rejection log
appears. When you have viewed the log, close the file and return to the Key
Reference Import Status dialog box.
Figure 166. Key Reference Import Rejection Log
2. Click Exit. The Key Reference Import Status dialog box closes.
If you will be importing data for all fields in an application, in the order and format
they occur in the application, you can use one of the default import specifications.
Otherwise (if you want to include a subset of the fields, if you want to change the
field order, or if you want to change any of the field formats), you must use a
custom import specification. For instructions on creating and managing custom
import specifications, see "Import Specifications" on page 298.
3. Click Import From. A standard Windows Open dialog box appears.
Figure 169. Open Dialog Box
4. Navigate to and select the file containing the import data and click Open.
5. If a WorkflowXtender™ (WfX) client has been installed, you can import into WfX.
For instructions, see "Importing into WorkflowXtender" on page 322.
6. On the Index Image Import Wizard welcome page, you have the following choices:
• If you want to test the Index Image Import setup before performing the
import, click Preview. The Index Image Import Preview dialog box appears.
For more information, see "Previewing the Index Image Import" on page 323.
• If you want to continue the wizard without previewing the Index Image
Import, click Next. The options page of the Index Image Import Wizard
appears. For more information, see "Configuring the Index Image Import
Options Page" on page 325.
5. Click OK. The Index Image Import Wizard welcome page indicates whether the
application into which you intend to import documents is linked to a workflow
business process.
Figure 170. Index Image Import Wizard: Logged in to WfX
The following table describes each element of the Index Image Import Preview dialog
box:
Line Number: # Contains the specified line (record) of data from the
import file, and displays it as it appears in the file.
Recognized Fields Contains the specified line (record) of data from the
import file, and displays it as it will appear after being
parsed according to the option selected under Format
Specifications. If one of the fields fails during the
attempt to preview the line, no other fields are
displayed after that field.
5. Click Close. The Index Image Import Preview dialog box closes and any changes
you have made are saved.
6. In the welcome page of the Index Image Import Wizard, click Next. The options
page of the Index Image Import Wizard appears. For more information, see
"Configuring the Index Image Import Options Page" on page 325.
Created as new Create new AX creates a new index and document for
indexes and indexes and each import item. AX does not check for
documents documents duplicate document indexes.
Merged with existing Merge data AX checks the selected application for
documents with duplicate document indexes. If AX finds
existing an existing document with the same index
documents information as an imported item, AX adds
the item as a new page to that document.
AX imports any documents with new
index information as new documents.
These options (Create new indexes and documents and Merge data with existing
documents) are mutually exclusive. You can select one or the other, but not both.
2. If full-text queues have been created, you can select one from the FT Queue
drop-down list. If the selected queue has been properly configured, the documents
imported by the Index Image Import wizard are processed using the selected
queue.
3. Under Other Options, specify options to control how the import is processed. The
following table describes each option:
Option Description
Check for If any of the fields in the application have been flagged as
unique key unique keys, and if you want the import wizard to check the
values imported into these fields, enable this option. If the
import wizard discovers multiple documents listed in the
import file with the same values in the unique key fields, the
import wizard imports the first such document and rejects all
remaining redundant documents. If the import wizard
discovers any documents listed in the import file with values in
the unique key fields that duplicate the values for a document
already in the application, the import wizard rejects all
redundant documents.
Allowed # of Type the highest number of consecutive errors that you want
consecutive the import wizard to tolerate. When the import wizard has
errors encountered the number of errors specified, the import wizard
stops processing.
Then Load If you want to limit the size of record or a group of records at the
end of the import file, you need to specify the number of lines
that you want AX to load when processing the import file. In the
Then Load text box, type the number of lines that you want AX
to load.
Note: You can use the Skip and Then Load text boxes
simultaneously. For example, if you want AX to process only
lines 21 through 30, specify 20 in the Skip text box and 10 in the
Then Load text box. AX skips the 20 leading lines in the import
file, and then processes only the subsequent 10 lines (lines 21
through 30).
Option Description
Batch Size During the Index Image Import, database transactions commit
document records to the database. Enter the number of records
that each database transaction should commit to the database.
The default batch size is 100 records, but you can enter any
integer from 1-10,000.
Note: If you enable Allow document additions while importing,
the Batch Size is set to 1 and this option is dimmed. When you
allow document additions while importing, the import wizard
commits each record from the import as a separate database
transaction rather than committing multiple document records
to the database at a time.
Use bulk If you have placed database triggers on the DT and DL tables in
objects your AX application, you should disable this option. The option
is enabled by default; to disable it, click the check box to clear
the checkmark and disable use of database bulk objects.
Convert If you are importing TIFF images that have Eastman Imaging
Annotations annotations, and you want those annotations to be converted to
AX annotations, enable this option. The Annotation Properties
dialog box does not display user information for converted
annotations. The line widths and fonts may differ from the
original. In the import file, you must precede the path and file
name with two "at" symbols (@@).
Import If you are importing TIFF images that have Eastman Imaging
Annotation annotations assigned to annotation groups, and you want those
Group annotations groups to be imported into AX, enable this option.
These annotation groups are created with <ALL> following
legacy rules. For instructions on changing the configuration of
an annotation group, see "Modifying an Annotation Group" on
page 287. This option is available only when the Convert
Annotations option is enabled.
Option Description
Preserve file If you want the imported files to retain their file time after
time import, enable this option. This option can be used if you are
using the LEGATO DiskXtender (DX) software to store AX
documents in an extended drive, and you have configured DX
to move or purge files according to their file time.
Note: This option works only with DX 5.2, Service Release 1, or
later and only via RPC.
Apply a digital If you want imported files to be digitally signed, enable this
signature to option. (This option is available only when the Document
each document signing option has been enabled for the application into which
you are importing files.)
4. Click Import. The import wizard processes the records in the import file.
5. If the Signature Properties dialog box appears, select a certificate, enter a comment,
and click OK.
When the import is completed, the Index Image Import Status dialog box appears. For
more information, see "Using the Index Image Import Status Dialog Box" on page 328.
Note: If you have not enabled the Allow document additions while importing option,
a wait message appears and the import wizard waits until it can place a lock on the
application before beginning the import. You can click Cancel to stop the import
process or wait until the import wizard is able to obtain an application lock and begin
the import process.
2. If any records were rejected and you want to see more information on these
rejections, click View Rejection File. The Index Image Import rejection log appears.
When you have viewed the log, close the file and return to the Index Image Import
Status dialog box.
Figure 174. Index Image Import Rejection Log
4. Click Exit. The Index Image Import Status dialog box closes.
2. In the Open text box, enter the import command you want to use. The following
sections describe each of the import commands:
• "Index Image Import Command" on page 331
• "Key Reference Import Command" on page 334
• "Auto Index Import Command" on page 336
3. Click OK.
Note: If you are using Windows 98, be sure to surround paths and filenames that
include spaces (such as C:\Program Files\XtenderSolutions\Content Management) with
quotation marks. Otherwise, Windows may not be able to find the directory.
Option Description
/F PathAndFileName Specifies the path and file name of the import file.
If any of the fields in /Q If you use this switch and the import
the application have wizard discovers multiple documents
been flagged as unique listed in the import file with the same
keys, and if you want values in the unique key fields, the
the import wizard to import wizard imports the first such
check the values document and rejects all remaining
imported into these redundant documents.
fields
If you want to omit /K SkipNumber Specify the number of lines that you
from the import a want AX to skip when processing the
record or a group of import file.
records at the
beginning of the
import file
If you want to omit /L LoadNumber Specify the number of lines that you
from the import a want AX to load when processing the
record or a group of import file.
records at the end of
the import file
Note: If you are using Windows 98, be sure to surround paths and filenames that
include spaces (such as C:\Program Files\XtenderSolutions\Content Management)
with quotation marks. Otherwise, Windows may not be able to find the directory.
For more information, see the following sections:
• "Required Key Reference Import Switches" on page 335
• "Optional Key Reference Import Switches" on page 335
Option Description
/F PathAndFileName Specifies the path and file name of the import file
If you want to omit /K SkipNumber Specify the number of lines that you
from the import a want AX to skip when processing the
record or a group of import file.
records at the
beginning of the
import file
If you want to omit /L LoadNumber Specify the number of lines that you
from the import a want AX to load when processing the
record or a group of import file.
records at the end of
the import file
Option Description
/F PathAndFileName Specifies the path and file name of the import file
If you want to omit /K SkipNumber Specify the number of lines that you
from the import a want AX to skip when processing the
record or a group of import file.
records at the
beginning of the
import file
If you want to omit /L LoadNumber Specify the number of lines that you
from the import a want AX to load when processing the
record or a group of import file.
records at the end of
the import file
The Index Server is an optional module that adds full-text indexing and OCR
functionality to ApplicationXtender systems.
You can submit text to the Index Server for full-text indexing. After text is processed by
the server, users can search for any string of text contained in the full-text database.
Users can add entire AX documents to the server for indexing. Scanned documents and
pages can be processed using OCR and the resultant text can be added to the Index
Server in one step. With full-text indexing, users can search for documents in AX by
index values and/or keyword content within the document. The Index Server adds
text from AX documents to the full-text database (located in the full-text database path
set in AppGen).
You can also submit text to the Index Server for OCR processing. If you submit an OCR
job to the Index Server, you can keep track of the job as easily as you would a full-text
indexing job.
The Index Server consists of a few components that work together to provide full-text
indexing and OCR processing. The Index Server itself is responsible for processing all
full-text indexing jobs and for processing all OCR jobs submitted to the Index Server.
The Index Server polls full-text queues and OCR queues for the next job (document or
page) to process. Full-text and OCR queues are set up to accommodate jobs from
multiple workstations, and can be configured at any Index Server workstation. The
queues are database table rows (in the AX database) that track which documents are
processed by the Index Server.
Note: Full-text queues and OCR queues can be created and monitored in the Index
Server or in the Queue Manager. However, after you create a full-text or OCR queue,
you must designate the queue as a processing queue, and this procedure can only be
performed in the Index Server Configuration dialog box. For more information on
creating or monitoring queues in the Queue Manager, see "Adding a New Queue" on
page 364. For more information on designating a queue as a processing queue, see
"Adding Queues to be Processed" on page 365.
For more information on installing Index Server, refer to the ApplicationXtender
Installation Guide.
The following sections describe how to manage the Index Server:
• "Configuring the AX System to Use the Index Server" on page 340
• "Creating the Impersonation Account" on page 353
• "Configuring the Index Server" on page 359
Image The Index Server uses OCR on The Index Server uses OCR on the
each image file to generate a each image file to generate a text file
text file for ProIndex to index. for Verity to index.
PDF The Index Server uses PDF The Index Server does not convert
Library 5.0 to convert each PDF files into text files. Verity
PDF file into a text file. Then indexes each PDF file directly. (Text
ProIndex indexes the text file. hidden behind redactions is not
(Text hidden behind redactions removed.)
is not removed.)
RTF The Index Server uses The Index Server does not convert
KeyView to convert each RTF RTF files to text files. Verity indexes
file to a text file. Then each RTF file directly.
ProIndex indexes the text file.
HTML The Index Server uses The Index Server does not convert
KeyView to convert each HTML files to text files. Verity
HTML file to a text file. Then indexes each HTML file directly.
ProIndex indexes the text file.
Foreign The Index Server uses The Index Server does not convert
KeyView to convert each foreign files to text files. Verity
foreign file to a text file. Then indexes each foreign file directly.
ProIndex indexes the text file.
OLE The Index Server does not The Index Server does not process
Embedded process OLE files. OLE files.
files
Note: The Index Server converts image, PDF, RTF, HTML, and foreign file types to text
only if configured to do so on the Full-Text tab of the AX Index Server Configuration
dialog box. Also, the configuration settings for non-image file types apply only to
applications using the ProIndex full-text engine. These configuration settings do not
apply to applications using Verity full-text engine, because Verity does not need to
convert PDF, RTF, HTML, or foreign files before processing them.
Image AX highlights the hit results AX highlights the hit results using
using the text view of the the text view of the image in
image. KeyView.
The Verity K2 license determines the number of processors that you can use in a
multi-processor Verity server, based on the number of Verity users, as the following
table indicates. (This table applies to Verity K2, not the Index Server.)
Up to 49 1
50 to 99 2
100 to 149 3
150 or more 4
Note: Submitting documents from applications using ProIndex and from applications
using Verity to the same Index Server queue may cause a serialization of full-text
processing, defeating the purpose of this multiple processor configuration.
4. Configure the Index Server. For instructions, see "Configuring the Index Server" on
page 359.
When you have configured the AX system to use a full-text engine and the Index
Server, you can begin submitting documents to the Index Server. For instructions,
refer to the ApplicationXtender User Guide.
5. If the applications that you have configured contain documents that have already
been processed with ProIndex, you can use the Full-Text Indexing Wizard to
process them again with Verity. For instructions, see "Resubmitting Documents to
the Index Server" on page 350.
Important: The vsetup.exe file in this directory was created specifically for
installing Verity in an AX system. The Setup.exe file was not.
The Verity K2 Setup wizard appears, starting with the Welcome page.
Continue with the setup wizard as described in the Verity documentation until the
License Key page appears. On this page, the license key for Verity K2 is already
provided.
4. Accept the license key provided for Verity K2.
Continue with the setup wizard as described in the Verity documentation until the
Additional Data Folders page appears.
5. Specify at least one location where you want to place collections and click Next.
The Installation Type page appears.
Figure 178. Verity K2 Setup Wizard - Installation Type Page
6. Select Basic and click Next. The Administration Service Account page appears.
8. Take note of the port number for future reference. (You will need this information
if you need to log in to the K2 Dashboard from another computer.) Click Next. The
Select Administrator page appears.
9. Enter a user name, password, and domain for the user who administers your K2
domain, as described in the Verity documentation. Take note of the account
specified for future reference. (You will need this information when you first log
into the Verity K2 Dashboard and when you configure the AX Index Server.)
Continue with the setup wizard as described in the Verity documentation until the
Finish page appears.
Figure 182. Verity K2 Setup Wizard - Finish Page
10. Take note of the settings displayed on the Finish page for future reference. (You
will need the K2 Server port number when you configure the Index Server. You
will need the Master Admin port number when you configure AX application to
use the Verity K2 server for full-text indexing.)
Note: Do not enable the Launch the K2 Dashboard option. The Dashboard should
not be launched until after the computer has been restarted.
11. Click Finish. A message appears asking whether you want to restart the computer.
12. Click Yes.
After the computer has been restarted, installation of the Verity K2 Administration
Server service is complete. It is responsible for both the K2Server.exe and K2Ticket.exe
server processes. The K2 Dashboard is also installed.
Creating a Collection
A collection is a Verity full-text database. You must create collections on the computer
where the AX Index Server and Verity servers are installed. You should create one
collection for each application.
To create a collection:
1. From the Windows Start menu, select Run. In the Open text box, type cmd. Click
OK. A Windows command prompt window opens.
2. At the prompt, type the following command:
mkvdk -collection <path>\<collname> -create
where path is the location in which you want to create the collection and collname is
the name that you want to use for the collection.
Note: It is recommended that you do not create a collection within the directory of
another collection. Also, take note of the capitalization of your collection name.
When you specify the collection name in AppGen, you must use the same
capitalization.
If you intend to process documents that are written in languages other than
English, you can use -locale to specify the language. Each collection (and
therefore each application) may have only one locale. For details, refer to the
documentation provided with the Verity software.
3. Press [Enter]. The collection is created in the location you specified.
3. In the Index Alias text box, enter an alias name for the collection that you want to
assign. (The alias name is usually the same as the collection name.)
4. From the Index Type set of options, select Collection.
5. Enable the Override default path option. In the Path text box, specify the location
of the collection that you want to assign.
6. From the Document Access set of options, select Public.
7. Click Register. A message appears indicating that you must perform a quick restart
in order for changes to take effect.
8. Click OK.
2. Select the data source in which you want to process documents. In the User Name
and Password text boxes, enter your user name and password. (This user account
must have the AX Administrator privilege.) Click Next. The Application Selection
page appears.
3. Select the application in which you want to process documents. Click Next. The
Queue Selection and Other Options page appears. This page lists the queues that
are available for processing.
Figure 186. Full-Text Indexing Wizard - Queue Selection and Other Options Page
4. If you want to add another queue, click Add. The Create New Full-text Queue
dialog box appears.
5. In the Queue Name text box, enter a name for the new full-text queue. You can also
enter a description in the Description text box. Click OK. The Queue Selection and
Other Options page reappears.
6. Under Queue Selection, select the queue in which you want to process documents.
7. If the selected application contains documents that have already been processed by
ProIndex, the Only documents already full-text indexed in ProIndex check box is
available. Use this check box to specify whether you want to process only those
documents. You have the following choices:
• If you want to process only the documents that have already been processed
by ProIndex, enable the check box.
• If you do not want to exclude documents based on whether they have already
been processed by ProIndex, clear the check box.
Keep in mind that processing takes longer if this check box is enabled, because of
the time it takes to determine which documents have already been processed.
8. Click Next. The Query Documents page appears.
Figure 188. Full-Text Indexing Wizard - Query Documents Page
9. Enter criteria to match the documents that you want to process. (To select all
documents in the application, leave all search fields blank.) Click Next. The Status
page appears and the selected documents are submitted to the specified queue.
When the documents have been submitted, the Status page indicates the number
of documents successfully submitted and the name of the queue to which they
were submitted.
10. Click Finish.
3. Expand the System Tools tree item, and then expand Local Users and Groups.
Right-click Users, and select New User. The New User dialog box appears.
4. Enter a User name, Full name, Description, Password, and Password confirmation
in the available text boxes.
5. Disable the User must change password at next logon check box, and enable the
Password never expires check box.
6. Click Create. The new AX Index Server impersonation account is created. Click
Close to exit the New User dialog box. When you return to the Computer
Management console, the list of local users should appear in the console’s
right-side pane (if it does not appear, click the Users folder, located beneath Local
Users and Groups).
7. Right-click the AX Index Server impersonation account you just created and select
Properties. The User Properties pages appear.
Figure 191. User Properties Pages
10. Select Administrators from the top Groups pane, and click Add.
DOMAINNAME\Administrators should appear in the bottom pane. Click OK to
return to the User Properties page. Click OK again to exit the User Properties page
and return to Computer Management.
11. Close Computer Management. You now need to configure the new account to have
the following advanced right: Log on as a service.
For full instructions on adding the required advanced rights to the Index Server
impersonation account, see "Adding Advanced Rights to the AX Index Server
Impersonation Account" on page 357.
2. Expand the Local Policies folder, and then select User Rights Assignment. All user
rights should appear in the right-side pane of the Local Security Settings Console.
3. Right-click Log on as a Service and choose Security. The Local Security Policy
Setting dialog box appears.
5. Select the account you created to use as the AX Index Server impersonation
account from the top pane, and click Add. It should appear in the bottom pane as
DOMAINNAME\Account Name. Click OK. Click OK again to return to the Local
Security Settings Console.
6. Close the Local Security Settings Console. Your impersonation account for AX
Index Server can now be entered onto the Setup tab of AX Index Server
Configuration. For more information, see "Specifying an Index Server
Impersonation Account" on page 362.
Locate and refresh the list of data sources, and "Data Sources Tab" on page 361
set one data source as default.
3. If necessary, the Index Server Configuration dialog box allows you to perform the
following additional configuration functions:
You can use the Full-Text tab to select the page "Full-Text Tab" on page 366
types that can be converted to text.
You can use the OCR tab to select the OCR "OCR Tab" on page 368
result format.
You can use the Log File tab to set a log file "Log File Tab" on page 369
path.
You can use the Misc tab to configure "Configuring Index Server Error
stopping of jobs on error. Behavior" on page 370
You can use the Misc tab to configure the "Remove Job from Queue when
automatic removal of a job from a queue Finished" on page 371
when the job is finished.
4. After you have finished configuring the Index Server, click OK.
Note: Once you have configured the Index Server and created an OCR or full-text
queue, make sure that the AX workstations on which users need to submit jobs to these
queues are configured to allow OCR or full-text processing on the OCR and Full-Text
tabs, respectively, of the AX Configuration dialog box. In addition, if the workstation
that is submitting a full-text or OCR job has the local write path enabled on the Paths
tab of the AX Configuration dialog box, or has documents stored in a local write path,
then the jobs will result in error. If you update the configuration settings on the
workstation, you must exit AX and re-login for the changes to take effect. For more
information, see "Configuring AX Workstations" on page 392.
Note: If you are using the LEGATO Automated Availability Manager® (AAM)
software to monitor the Index Server, use one of the methods described in "Stopping
the Index Server" on page 374 to stop the Index Server and then use the AAM Console
to start the Index Server. For instructions on starting a service in the AAM Console,
refer to the AAM User’s Guide.
3. Click the Queues tab. Confirm that the correct queues have been configured for the
selected data source. For instructions, see "Queues Tab" on page 363.
4. Click OK.
Setup Tab
The Setup tab allows you to specify the user account that the Index Server needs in
order to access AX. The Setup tab also allows you to specify an Index Server
impersonation account.
2. Under AX Login, specify the user account that the Index Server needs in order to
access AX.
3. In the User Name text box, a user name that is valid for the Index Server default
data source.
Note: Your login procedure may vary depending on the security provider in use
for the current data source. For information, see "Variations on Login Procedures"
on page 61.
4. In the Password text box, type the password for the user name that you entered.
5. If you have not yet specified an Index Server impersonation account, see
"Specifying an Index Server Impersonation Account" on page 362.
6. Click the Queues tab. For more information on configuring the Queues tab, see
"Queues Tab" on page 363.
Queues Tab
Queues are used by the Index Server to collect full-text jobs and OCR jobs. A full-text
job is created in a full-text processing queue when a document is submitted to the
Index Server for full-text indexing. An OCR job is created in an OCR processing queue
when a document is submitted for OCR processing.
Initially, there are no queues for the Index Server. Therefore, to add documents to the
full-text database, you must create full-text queues. To submit OCR jobs to the Index
Server, you must create OCR queues. The Queues tab allows you to add to the
Available Queues list by creating new queues.
To initiate processing of an available queue, you must move it to the Processing Queues
list. When you add a document to the full-text database, you select an Available Queue
for the document. The document is not processed, however, until that queue is added
to the Processing Queues list. Once a queue has been added to the Processing Queues
list, the documents in the queue are either processed and added to the full-text
database or processed with OCR.
Figure 199. Index Server Configuration Dialog Box: Queues Tab
You can add new queues and move the queues from the Available Queues list to the
Processing Queues list or remove queues from the Processing Queues list. For more
information, see the following sections:
• "Adding a New Queue" on page 364
• "Adding Queues to be Processed" on page 365
• "Removing Queues from the Processing Queues List" on page 366
The name of the queue is moved back to the Available Queues list.
4. Repeat the above procedure for each queue you want to remove from the
Processing Queues list.
5. Click the Full-Text tab. For more information on configuring the Full-Text tab, see
"Full-Text Tab" on page 366.
Full-Text Tab
The Full-Text tab allows you to configure the Verity full-text engine for the Index
Server, to select the type of pages that can be converted to full text for indexing, and to
specify the number of full-text processors.
Figure 203. Index Server Configuration Dialog Box: Full-Text Tab
Group Description
Server Enter the host name, alias, and port number for the Verity K2
Configuration Administration Server.
• The host name may be in the form of an IP address,
127.0.0.01, localhost, or the computer name.
• The alias is usually the same as the Administration Server
computer name.
• Verity’s default port number for the Administration Server
is 9950.
Enter the same alias and port number that was displayed on
the Finish page of the Verity K2 setup wizard. See Figure 182
on page 347.
3. Enable or disable page types to be converted as appropriate. The page types are as
follows:
• Bi-level images (black and white)
• PDF files (Portable Document Format)
• RTF files (Rich Text Format)
• HTML files (Hypertext Markup Language, with either an .HTML or .HTM
file extension)
• Foreign files (all types of files that AX does not natively support)
All of these file types need to be converted before the ProIndex full-text engine can
process them. However, PDF files, RTF files, HTML files, and foreign files do not
need to be converted for the Verity full-text engine.
For more information on these file types, as well as on which files are supported in
AX and which are considered foreign files, refer to the ApplicationXtender User
Guide.
Note: Pages or documents added to AX using the Insert Object command cannot
be submitted to the Index Server for full-text indexing or OCR.
OCR Tab
The OCR tab allows you to configure the OCR engine to be used by
ApplicationXtender and to select the format of the page that results when a page is
processed using OCR.
To configure the OCR tab:
1. On the Index Server Configuration dialog box, click the OCR tab.
2. Select an OCR engine from the drop-down list. The FineReader 6.0 OCR Engine is
always available as an OCR engine because it is always installed with AX. (If you
have purchased, installed, and configured FineReader 4.0 Professional, the
"FineReader" option is also available. However, this engine is not recommended
for use with the Index Server.)
Note: The OCR engine selected here is the engine used when a user submits a
document for OCR using the Submit OCR job option in the AX Result Set shortcut
menu or the Document menu. If the user selects OCR Entire Document from the
Document Display shortcut menu or OCR from the Document menu, the OCR
engine configured on the AX workstation is used.
Figure 204. Index Server Configuration Dialog Box: OCR Tab
The OCR tab also allows you to select the OCR result format (the OCR output file
format).
3. Under OCR Result Format, you have the following choices:
• If you want the OCR result format to be plain text, click Plain text.
• If you want the OCR result format to be RTF, click Rich Text Format (RTF).
Option Description
Plain text The plain text format is an ASCII text format, readable on
MS-DOS/Windows operating systems.
Rich Text Rich Text Format is a format that can be read on all platforms. This
Format format should be used if the document text will be exported for
(RTF) use on non-MS-DOS/Windows systems. Rich Text Format retains
most formatting.
Note: This OCR Result Format setting applies only to documents submitted to an
Index Server OCR queue. If an image is submitted to an Index Server full-text
queue (and the OCR (if necessary) option is enabled), the Index Server always
converts it to plain text before full-text indexing it, regardless of any OCR Result
Format setting.
4. Click the Log File tab. For more information on configuring the Log File tab, see
"Log File Tab" on page 369.
Misc Tab
The Misc Tab allows you to configure miscellaneous settings.
Figure 206. Index Server Configuration Dialog Box: Misc Tab
Important: Make sure that a local write path is not configured for any AX workstation
submitting full-text index jobs. If a local write path is configured, the Index Server will
not process the documents saved to that local write path, an error message may appear,
and the Index Server may automatically shut down.
2. Select the AX Index Server service and click the Start Service button.
2. Select the AX Index Server service and click the Pause Service button.
Figure 211. Pause Service Button
2. Select the AX Index Server service and click the Restart Service button.
Figure 213. Restart Service Button
2. Select the AX Index Server service and click the Stop Service button.
Figure 215. Stop Service Button
Note: If the end of a line of the log extends beyond the edge of the screen, you can open
the log file to see the details that cannot be viewed.
When the Index Server Monitor Always on Top option is checked and when the Index
Server Monitor is open, the Index Server Monitor dialog box remains in front of all
other open dialog boxes.
3. In the Proxy Name text box, enter a name for the proxy (such as
AXIndexServerProxy).
4. Click Apply. The New Process Configuration dialog box appears.
Figure 220. New Process Configuration Dialog Box
6. In the Operation text box, enter the full path to CMAAMProxy.exe in the directory
where AX was installed (which is by default, C:\Program
Files\XtenderSolutions\Content Management). You can click Operation to navigate
to and select CMAAMProxy.exe.
7. In the Parameters text box, type /axindexserver.
8. Under Login Info, type information for the user account under which you want to
run the process and specify the directory from which you want the process to be
started.
9. Click Apply. The new process proxy is added to the tree.
3. In the Service Name text box, type a name for the service (such as
AXIndexServerService).
4. Click the Application-Class check box to enable the option. In the text box, type a
unique name for the application class (such as axindexserver).
5. From the Proxy Process drop-down list, select the proxy process that you created
for the AX Index Server.
6. From the Service to run drop-down list, select AXIndexServer.
7. Click Apply. The new service is added to the tree.
Under Process Sensors, several sensors are listed. The following table describes
each of the sensors specific to the AX Index Server:
Sensor Description
Sensor Description
Queue Manager allows you to manage various types of AX queues: Index Server
queues for full-text indexing, Index Server queues for OCR processing, and Image
Print Server (IPS) queues. Queue Manager allows you to manage the queues in all of
your AX data sources.
Note: Only users with the AX Administrator privilege in their user profiles may
manage queues.
For instructions, see the following sections:
• "Starting Queue Manager" on page 383
• "Logging into Data Sources" on page 384
• "Viewing the Contents of a Data Source" on page 384
• "Creating a New Queue" on page 385
• "Viewing the Properties of a Queue" on page 386
• "Viewing Jobs in a Queue" on page 386
• "Unlocking a Queue" on page 387
• "Viewing the Properties of a Job" on page 388
• "Viewing Elements of a Job" on page 389
• "Resubmitting a Job" on page 389
• "Deleting Jobs" on page 389
• "Deleting all Jobs in a Queue" on page 390
• "Deleting a Queue" on page 390
You can also run saved queries from Queue Manager. For instructions, see "Managing
Saved Queries" on page 209.
The left pane of the Queue Manager window lists the existing data sources. For
instructions on logging into each data source you want to manage, see "Logging into
Data Sources" on page 384.
3. Once logged in, the contents of the data source appear on the right.
• If you want to show or hide a list of the queues in the data source, from the
View menu, select View Queues. For each queue in the data source (when
queues are shown), information is provided including a name, a type, a queue
status, an ID number, and a description.
• If you want to show or hide a list of the applications in the data source, from
the View menu, select View Applications. For each application in the data
source (when applications are shown), information is provided including a
name, a type, an application status, an ID number, and a description.
5. In the Name text box, type a name for the new queue.
6. From the Type drop-down list, select a queue type. You have the following choices:
• If you want to create a queue for submitting full-text jobs to the Index Server,
select FULLTEXT.
• If you want to create a queue for OCR jobs, select OCR.
• If you want to create a queue for submitting print jobs to the Image Print
Server, select IPS.
7. In the Description text box, you can type a description for the new queue.
8. Click OK. The new queue is added to the list of queues.
Note: If the new queue does not appear in the list of queues on the left, select
Refresh from the View menu.
9. If the newly created queue is for OCR jobs or full-text jobs, you must add the queue
to the Index Server's Processing Queues list. Jobs sent to the queue are not
processed until the queue has been added to the Processing Queues list. For more
information, see "Configuring the Index Server" on page 359.
Note: Once you have created an OCR or full-text queue and configured the Index
Server, make sure that the AX workstations on which users need to submit jobs to
these queues are configured to allow OCR or full-text processing. These
configurations are performed on the OCR tab and Full Text tab of the AX
Configuration dialog box. For more information, see "Allow OCR" on page 446
and "Allow Full-Text" on page 443.
3. Make sure that the contents of a data source are listed on the right. For instructions,
see "Viewing the Contents of a Data Source" on page 384.
4. If the existing queues are not listed on the right, select View Queues from the View
menu.
Figure 227. Viewing Queues
Note: Depending on configuration in the Index Server, jobs may be removed from the
job listing upon successful completion. For more information, see "Remove Job from
Queue when Finished" on page 371.
Unlocking a Queue
If Queue Manager indicates (in the status column) that a queue is locked, you can
unlock the queue. If a queue is locked, it does not accept any new jobs. Unlocking the
queue allows the queue to accept jobs normally.
Note: If the status column does not indicate that the queue is locked, do not attempt to
unlock the queue.
To unlock a queue:
1. Start Queue Manager. For instructions, see "Starting Queue Manager" on page 383.
2. Log in to the data source. For instructions, see "Logging into Data Sources" on
page 384.
3. Make sure that the contents of a data source are listed on the right. For instructions,
see "Viewing the Contents of a Data Source" on page 384.
4. If the existing queues are not listed on the right, select View Queues from the View
menu.
5. From the list on the right, right-click a queue name. A shortcut menu appears.
From the shortcut menu, select Unlock queue. A message appears, requesting
confirmation.
Figure 229. Queue Manager Message: Unlock Queue?
6. Click Yes.
3. If you want to see more details in the text box below the job status, click Details.
Resubmitting a Job
You can resubmit a job in Queue Manager. The resubmit function is useful if you
believe a previous job has failed. Even the job was processed successfully, resubmitting
it results in no action, so there is no consequence to resubmitting a successful job.
In addition, multiple jobs can be resubmitted at the same time, if appropriate.
To resubmit a job:
1. Make sure that a list of jobs appears on the right. For instructions, see "Viewing
Jobs in a Queue" on page 386.
2. Right-click a job. A shortcut menu appears. From the shortcut menu, select
Resubmit. The job is resubmitted.
Deleting Jobs
You can delete jobs in Queue Manager. You may delete jobs individually or select
multiple jobs and delete them all at once.
Note: Do not attempt to delete a job that is currently processing.
To delete jobs:
1. Make sure that a list of jobs appears on the right. For instructions, see "Viewing
Jobs in a Queue" on page 386.
2. From the list of jobs on the right, select one or more jobs for deletion.
Note: To select two or more jobs in sequence, select the first job, then press and
hold the [SHIFT] key while selecting the last job. To select two or more jobs out of
sequence, press and hold the [CTRL] key while selecting jobs.
3. Right-click the selection. A shortcut menu appears. From the shortcut menu, select
Delete. The selected jobs are deleted from the queue.
Deleting a Queue
You can delete an empty queue in Queue Manager.
Note: A queue must be empty before you can delete it. If you want to delete a full
queue, you must first purge the queue, and then you may delete it using the following
procedure.
To delete a queue:
1. Start Queue Manager. For instructions, see "Starting Queue Manager" on page 383.
2. Log in to the data source. For instructions, see "Logging into Data Sources" on
page 384.
3. Make sure that the contents of a data source are listed on the right. For instructions,
see "Viewing the Contents of a Data Source" on page 384.
4. If the existing queues are not listed on the right, select View Queues from the View
menu.
5. From the list on the right, right-click a queue name. A shortcut menu appears.
From the shortcut menu, select Delete. A message appears, requesting
confirmation for the deletion.
Figure 233. Queue Manager Message: Delete Queue?
toolbars, and the location and display settings of the Application view, Query view,
Thumbnail view, or WorkflowXtender Workbox can be copied to another AX
workstation by saving and loading settings. For a detailed description of what options
are saved, see "Saving and Loading Settings" on page 455.
Note: The WorkflowXtender Workbox view is only available if the WorkflowXtender
client (Workbox) is installed on the AX workstation.
Toolbar Description
Image The Image toolbar provides shortcuts for manipulating images. Some
of the buttons available are pan mode, process a page using OCR,
show index value, rotating, and zooming.
Toolbar Description
Batch Index The Batch Index toolbar provides shortcuts to the batch indexing
feature. From the Batch Index toolbar, you can create new documents
and pages from a batch, delete a page from a batch, and navigate from
page to page in a batch or document.
Scan The Scan toolbar contains shortcuts for scanning options and
configuration settings such as manual feed, auto feed, single feed,
rescan, and different automatic-rotation options.
Customizing Toolbars
Any AX toolbar can be customized to meet your needs. Buttons can be deleted from
the toolbar, added to the toolbar, or re-ordered.
To customize a toolbar:
1. Right-click the toolbar to be customized. From the shortcut menu that appears,
select Customize. The Customize Toolbar dialog box appears.
Figure 235. Customize Toolbar Dialog Box
3. Specify whether you want the name of the AX data source to appear in the
Document Display view title bar. You have the following choices:
• To include the name of the AX data source, enable the Data Source Name
check box.
• To leave out the name of the AX data source, clear the Data Source Name
check box.
4. Specify whether you want the name of the application to appear in the Document
Display view title bar. You have the following choices:
• To include the name of the application, enable the Application Name check
box.
• To leave out the name of the application, clear the Application Name check
box.
5. In the Field Value of drop-down list, select the name of the index field that you
want to include in the Document Display view title bar.
6. Save your changes. You have the following choices:
• To save changes and keep the Properties dialog box open, click Apply.
• To save changes and close the Properties dialog box, click OK.
The next time you display a document, the Document Display view title bar reflects
your changes.
Customizing AX Views
The Applications, Query, Workflow, and Thumbnail views can be modified to set up
the AX desktop according to the user’s needs. By changing the way AX views display,
you can customize the AX desktop.
The Applications, Query, Workflow, and Thumbnail views can each be configured to
appear as a docked view, as a dialog box, or as a subwindow. The Applications view
and the Query view can also be configured to "hide on use."
Note: The WorkflowXtender Workbox view is only available if the WorkflowXtender
client is installed on the AX workstation.
For more information, see the following topics:
• "Docking a View" on page 398
• "Displaying a View as a Dialog Box" on page 399
• "Displaying a View as Subwindow" on page 400
• "Hiding a View on Use" on page 401
Docking a View
An AX docked view has a grab bar. A grab bar is similar to a title bar except that it does
not contain a title.
Figure 237. AX Docked View Grab Bar
You can drag the view to the left, right, top, or bottom of the AX window by dragging
this bar. A docked view automatically aligns with the AX window borders and cannot
be moved beyond the AX window borders. By default, the Applications, Query,
Workflow, and Thumbnail views appear as docked views.
Note: The WorkflowXtender Workbox view is only available if the WorkflowXtender
client is installed on the AX workstation.
Note: The following procedure applies to only the Applications, Query, Workflow, and
Thumbnail views. It does not apply to the Document Display view or the Index view.
To dock a view that is now a dialog box:
1. Right-click inside the dialog box. From the shortcut menu that appears, select
Allow Docking. Allow Docking can be toggled on or off.
2. Click the grab bar, and drag the view to the desired position on the AX desktop.
For the view to dock, you must drag it to the left, right, top or bottom edge of the
AX desktop. When you release the mouse button, the view moves to that location.
Figure 238. AX Desktop with Docked Views
• To display all index fields and a small folder icon next to each record, select
Details.
Figure 244. Displaying Details in the Result Set
• To display only the first index field of each record and a large folder icon
above each record, select Folders.
Figure 245. Displaying Folders in the Result Set
2. Click the check box next to the name of the column that you want to hide or show.
3. When each column that you want to hide has no check mark and each column that
you want to show has a check mark, click OK.
Data Sources
One aspect of configuring the AX desktop is the selection of data sources. You can use
the Data Source Selector to specify the default data source for AppGen and the three
import wizards. For instructions, see "Selecting Data Sources" on page 58. You can use
the Data Source Selector to select multiple data sources for display in
ApplicationXtender. For instructions, refer to the ApplicationXtender User’s Guide.
When you set an application as the "active" application within ApplicationXtender, the
data source that contains that application also becomes active. Setting a data source as
active within AX is not the same as setting a data source as default in the Data Source
Selector or Queue Manager. For instructions on setting an application (and its data
source) as active, refer to the ApplicationXtender User’s Guide.
When you save AX workstation settings, each of these settings is saved:
• Default data source
• Selected data sources
• Active data source
For instructions on saving AX workstation settings, see "Saving Settings" on page 455.
The ApplicationXtender User’s Guide and the ScanXtender User’s Guide include
information on the configuration options that are available to users regardless of their
security settings. This topic contains information relating to the more advanced
configuration options.
• Each AX workstation has an AX Configuration dialog box, accessible through
ApplicationXtender, which can be used to customize the behavior of AX on the
workstation.
• Each SX workstation also has an SX Configuration dialog box, accessible through
ScanXtender, which can be used to customize the behavior of SX on the
workstation.
Many configuration options are available to accommodate individual operational
needs. Some of the options on the AX Configuration dialog box are not available on the
SX Configuration dialog box, because they configure features that are not necessary in
SX.
Some configuration options are cosmetic and do not alter the way the system performs,
such as options controlling the look and feel of the main screen. Others are integral to
the functionality of AX, such as a default digital certificate; the file types and formats
that AX and SX use; and interface options for e-mail, fax server, and optical character
recognition (OCR) packages.
This topic explains the configuration options available in ApplicationXtender,
including: export formats, font types for text, COLD/ERM display settings, display
zoom default, OCR settings, full-text settings, and various other AX system settings.
System defaults are in place for most features, such as zoom and tile. These defaults
can be changed in the AX or SX Configuration dialog box. Changes that you make to
the options in the AX Configuration dialog box are saved when you save workstation
settings. For a detailed description of what options are saved, see "Saving and Loading
Settings" on page 455.
To open the Configuration dialog box:
1. From the File menu, select Configuration. The Configuration dialog box appears.
2. Set the desired options according to the instructions in the following topics:
• "View Tab" on page 407
• "Display Tab" on page 410
• "Fonts Tab" on page 412
• "Scan Tab" on page 415
• "COLD Tab" on page 417
• "Print Tab" on page 419
• "E-Mail Tab" on page 423
• "Export Tab" on page 428
• "File Types Tab" on page 431
• "Data Tab" on page 433
• "Paths Tab" on page 440
• "Full Text Tab" on page 443
• "OCR Tab" on page 445
• "Fax-in Tab" on page 449
View Tab
The View tab of the AX and SX Configuration dialog box allows you to configure
several aspects of viewing documents and batches. Some of the options on the AX
Configuration dialog box View tab are not available on the SX Configuration dialog
box View tab, because they configure features that are not necessary in SX.
Figure 247. Configuration Dialog Box: View Tab
Option Description
Use zoom If this option is chosen as the default, AX or SX displays images using
setting the default zoom percent. The Use Zoom Setting drop-down list
allows you to set the default ratio.
3. If you have enabled the Use zoom setting radio button, select the desired ratio. You
can click the User zoom setting drop-down list and select the desired ratio
(standard options range from 25% to 400%) or type the preferred percentage in the
text box.
4. Click OK to save the settings.
Scale-to-Gray
When the Scale-to-gray option is enabled, AX or SX displays bi-tonal (black and white)
images as grayscale, which is frequently a more legible format. Various shades are used
to convert black and white images for the highest readability. This option applies to
bi-tonal images only.
Display Tab
The Display tab of the Configuration dialog box contains options for various AX and
SX display features. Some of the options on the AX Configuration dialog box Display
tab are not available on the SX Configuration dialog box Display tab, because they
configure features that are not available in SX.
Figure 248. Configuration Dialog Box: Display Tab
Screen DPI
The Screen DPI settings refer to the dots per inch of the system monitor. AX or SX takes
this information from the video interface card installed with the system. You can
overwrite the defaults by entering new Horizontal or Vertical settings. If you want to
change the Horizontal or Vertical settings back to the defaults from the video interface
card, click Reset.
Query Results
The Query Results options allow you to configure the maximum number of documents
that will be included in a result and how the result set will be sorted. (These options
are not available in SX.)
Ascending Order
This option sets the sort order of the query result set in ascending chronological order,
based on the document ID number. If this option is chosen as the default, AX displays
index records sequentially, from low to high, in the query view.
Descending Order
This option sets the sort order of the query result set to descending chronological order,
based on the document ID number. If this option is chosen as the default, AX displays
index records sequentially, from high to low, in the query view.
Fonts Tab
Using the Fonts tab of the Configuration dialog box, you can choose the fonts for
displaying and printing text documents.
Figure 249. Configuration Dialog Box: Fonts Tab
Screen Fonts
The font used for text display depends on whether the page has a text overlay, an image
overlay, or no overlay at all. It also depends on whether the user is allowed to zoom in
on the page.
Note: Zoom is configured using the Allow zoom setting on the COLD tab. For more
information on configuring Allow zoom, see "Allow Zoom" on page 418.
Using the Screen Fonts setting, you can configure the fonts used for text display.
Text with a text overlay Page (variable size) Page (fixed size)
Text with an image overlay Image Form Overlay Image Form Overlay
Printer Fonts
The font used for printing text documents depends on whether the page has a text
overlay, an image overlay, or no overlay at all. It also depends on whether the user is
allowed to zoom in on the page.
Note: Zoom is configured using the Allow zoom setting on the COLD tab. For more
information on configuring Allow zoom, see "Allow Zoom" on page 418.
Using the Printer Fonts setting, you can configure the fonts used for printing text.
You can configure the print fonts to be the same as the display fonts. For more
information on configuring screen fonts, see "Screen Fonts" on page 412.
However, you may need to configure the print fonts differently from the display fonts
if the fonts installed on the workstation are different from those installed on the printer.
To set the print fonts:
1. Select the font to configure from the Printer Fonts list. You have the following
choices:
• Page (fixed size)
When Zoom is
Page Type When Zoom is Enabled Disabled
Text with a text overlay Page (variable size) Page (fixed size)
Text with an image overlay Image Form Overlay Image Form Overlay
Scan Tab
The Scan tab of the AX or SX Configuration dialog box allows you to customize your
batch scanning process.
Figure 250. Configuration Dialog Box: Scan Tab
2. Use the Threshold slider to adjust the setting for what the scanner recognizes as a
blank page. Keep in mind the following points:
• If you want to allow a noisier image to be recognized as a blank page (and
therefore removed), adjust the slider towards Noisier.
• If you want to allow a cleaner image to be recognized as a blank page (and
therefore removed), adjust the slider towards Cleaner.
3. Click OK to save the settings.
Important: As you begin to use this feature, examine the pages that are scanned and
take note of which pages are automatically removed from the document or batch as
you scan them. If you find that pages are being removed that should not be removed,
adjust the slider towards Cleaner. You must make sure that the Threshold slider setting
is appropriate for the pages that you are scanning.
Synchronized Scan
With some types of scanning, the images are scanned faster than AX or SX can display
them. The Synchronized scan option slows down your scanner so that AX or SX can
display each scanned image. You have the following choices:
• If you want to review each page as it is scanned, enable the Synchronized scan
option.
• If you want to allow your scanner to scan images at its highest speed, disable the
Synchronized scan option.
COLD Tab
The COLD tab of the Configuration dialog box allows you to configure the display of
the following file types:
• ColdXtender documents
• ERMXtender documents
• Text, as defined on the File Types tab of the Configuration dialog box (For
instructions, see "File Types Tab" on page 431.)
The COLD tab is not available on the SX Configuration dialog box.
Cache Forms
When this option is selected, forms will be cached locally in memory to facilitate
quicker retrieval. This setting holds for the current session only. Once you exit AX, the
form is no longer held in cache. Click to place a check mark in the Cache Forms check
box to enable the option.
Allow Zoom
When this option has a check mark in it, the Zoom feature becomes active for
CX/ERMX and ASCII documents. Consequently, you can zoom in and out on
CX/ERMX or ASCII documents if a variable font is selected.
Screen
This option determines how CX/ERMX documents are displayed. Select Off to display
documents without a form overlay. Select Text to display documents with a text form
overlay, or select Image to display documents with an image form overlay.
Printer
This option determines how CX/ERMX documents are printed. Select Off to print
documents without a form overlay. Select Text to print documents with a text form
overlay, or select Image to print documents with an image form overlay.
Show
Use this option to turn the color view on or off. A check mark indicates that color view
is on. No check mark indicates that color view is off.
Lines
This option determines the width of the bands. The default setting is three lines.
To set the line width:
• In the Lines box, type or select the number of lines desired by using the up or
down arrow.
Color
This option sets the color to be used in color view.
To set the line color:
• In the Color drop-down list, click the color of your choice. (If the color that you
want to use is not listed, select Custom. The standard Windows Color dialog box
appears, allowing you to create a color for the color bar.)
Print Tab
The Print tab of the AX Configuration dialog box allows you to configure how AX
documents or pages are printed. The Print tab of the SX Configuration dialog box
allows you to configure how SX pages are printed. Some of the options on the AX
Configuration dialog box Print tab are not available on the SX Configuration dialog
box Print tab, because they configure features that are not available in SX.
Figure 254. Configuration Dialog Box: Print Tab
• Text, as defined on the File Types tab of the Configuration dialog box (For
instructions, see "File Types Tab" on page 431.)
Dithering
Dithering is a technique used in computer graphics to create the illusion of varying
shades of gray on a monochrome display or printer. Dithering relies on treating areas
of an image as groups of dots that are colored in different patterns. Dithering takes
advantage of the eye's tendency to blur spots of different colors by averaging their
effects and merging them into a single perceived shade or color. Depending on the ratio
of black dots to white dots within a given area, the overall effect is of a particular shade
of gray. Dithering is used to add realism to computer graphics and to soften jagged
edges in curves and diagonal lines at low resolutions.
If you are printing a color image to a monochrome (black and white) printer, you can
improve the quality of the printout by enabling the Dithering option. When this option
is enabled and you send a color image to a monochrome printer, AX or SX dithers the
image. For example, if you print a color, 400 K, 200 DPI image to a monochrome printer,
the result is a black and white, 3600 K, 600 DPI image of the same size. Each pixel in the
color image becomes nine pixels in the black and white image.
Note: When the Dithering option is enabled and you send an image to a color printer,
AX does not dither the image.
Acceleration
The Acceleration options expedite the printing of AX documents or SX batches. AX
and SX support XipPrint accelerator cards, Talaris printers, and Quick PCL printing.
Note: Pages with annotations, CX/ERMX pages with a form overlay, and pages with
print endorsements (from ApplicationXtender) are not printed in accelerated mode.
Whenever a page of one of these types is printed, AX or SX ignores the acceleration
setting while that page prints.
XipPrint
If you have a XipPrint II card, you can use the XipPrint printer acceleration feature. The
XipPrint II is a card that can be installed in the SIMM socket of a printer. It takes over
file decompression, allowing AX or SX to process print jobs more quickly.
Talaris
If you have a Talaris 1794FT or 3290FT printer, you can use the Talaris printer
acceleration feature. The Talaris 1794FT and 3290FT printers take over file
decompression, allowing AX or SX to process print jobs more quickly.
Quick PCL
If you have a PCL5 compatible printer, such as HP III, HP IV or Compaq, you can use
the Quick PCL printer acceleration feature. This feature significantly improves
printing performance for black and white images to any PCL5 compatible printers.
Quick Print bypasses the Windows GDI layer so that AX or SX talks directly to the
Windows printer driver. This substantially reduces cycle time.
Note: Quick Print is valid for bi-tonal images only. Grayscale and color images are
processed at the standard rate.
2. From the Position drop-down list, select an option. Available options include
Lower right, Lower left, Upper right, and Upper left.
3. In the Text text box, type the message you want printed. To print the number of the
current page in the endorsement, include %P in the endorsement text string.
Endorsement text strings can be up to 10 lines, and each line can have up to 80
characters, including spaces.
4. Enable or disable the Overlap on image option. (This option is not available when
using XipPrint or Talaris acceleration.)
• If this option is enabled, the endorsement overlaps any images. This option
allows the image to be printed on a larger area of the page.
• If this option is disabled, the images and the endorsement take up separate
areas of the printed page. Also, if this option is disabled, the Print original
size option becomes unavailable.
Consider disabling this option if the endorsement overlaps with an important part
of the image, or if the endorsement is difficult to read with the image printed
behind it.
The endorsement will be printed on every page in the location selected from the
Position drop-down list. The page number will be printed wherever the %P is located
within the text string.
E-Mail Tab
The E-Mail tab of the AX Configuration dialog box provides options for e-mailing AX
documents. ApplicationXtender interfaces with Microsoft Outlook® or cc:Mail™ so
that you can attach AX documents or pages to electronic mail messages. (The E-Mail
tab is not available on the SX Configuration dialog box.)
The attachment is displayed as an icon in the body of the e-mail message, and the
recipient double-clicks on the icon to view documents or pages. AX has both a Mail
Document Reference feature and a Mail Document Page feature. Use this page to
configure the Mail Document Pages feature in the Document menu and the Mail
feature in the Page menu.
Figure 256. Configuration Dialog Box: E-Mail Tab
Through e-mail configuration, any user can receive and view an e-mail message with
an AX attachment, even if AX is not installed on the user’s workstation. This is
accomplished by converting the AX document into a format that can be opened by an
application that exists on the user’s workstation. If the recipient has only the Paint
program, for example, AX can convert the attachment to a bitmap format. The recipient
can then view the attachment via Paint, because it reads bitmap files.
For instructions on sending documents by e-mail, refer to the "Managing Documents"
chapter of the ApplicationXtender User’s Guide.
E-Mail Formats
On the E-Mail tab of the Configuration dialog box, all available formats for each image
type (that is, Black & white images, 4/8-bit color images, and True color images), are
listed. The following is an explanation of the E-Mail tab options that are available for
your use.
small file. Conversely, if the image quality is important, you can use a lesser
compression level to increase the quality until there is no visible change to the output
image.
The JPEG quality factor (1-100) slider allows you to choose the compression setting for
true color images. AX uses the JPEG quality factor scale, which ranges from 1 to 100,
where 1 indicates the smallest file size with the lowest quality and 100 indicates the
largest file size with the best quality.
Figure 257. Configuration Dialog Box: E-Mail Tab: JPEG Quality Factor
three files: a TIFF, a PDF, and another TIFF. The first TIFF would contain the GIF and
TIFF, the PDF would contain the two PDFs, and the second TIFF would contain the
three JPEGs.
Note: AX can combine up to 1024 TIFF pages into a single attachment. For example, if
you send a document that contains 1025 consecutive TIFF pages, one attachment
contains the first 1024 consecutive TIFF pages and another attachment contains the
remaining TIFF page.
The following table details which file types can be combined and how they are
combined:
All supported image files, 1 TIFF file for each sequence of image pages in the
including: document
• TIFF
Note: The number of pages that can be combined into
• GIF
1 TIFF file is limited to 1024. If there are more than
• Bitmap
1024 pages in the document, the combined files are
• PCX
broken up so that each file has no more than 1024
• DCX
pages in it.
• JPEG
• TGA
Adobe Portable Document 1 PDF file for each sequence of PDF pages in the
Format (PDF) files document
Text files, including: 1 TXT file for each sequence of text pages in the
• TXT files document (if the TXT file type was configured on the
• ColdXtender reports Configuration File Types tab in ApplicationXtender
• ERMXtender reports when the document was created); otherwise 1 TXT
file for each TXT page in the document
Rich Text Format (RTF) files 1 RTF file for each RTF page in the document
HTML files 1 HTML file for each HTML page in the document
When the Use multi-page files option is disabled, pages of the same type are not
combined. If you send a document by e-mail when this option is disabled, each page
of the document is a separate attachment to the e-mail message.
E-Mail Vendor
This option configures the e-mail package that will be used by AX. You can choose
from either Microsoft (MAPI32) or CC: Mail (SMI32).
Export Tab
The Export tab provides options for exporting AX documents and pages. AX can
export documents and pages in the system to various file formats. (The Export tab is
not available on the SX Configuration dialog box.)
Figure 258. Configuration Dialog Box: Export Tab
Note: When the archived format of a page is exported, no annotations are included on
that page.
You can use this option to allow images to be exported in their original format. That is,
if an image is imported into AX and exported from AX, the format of the exported
image is exactly the same as the original image before import. A page can be exported
in its original format only when all of the following conditions are true (in addition to
the conditions above):
• The image storage format for the image type on the Data tab of the AX
Configuration dialog box was set to Default when the image was imported.
• The Separate multi-page TIFFs option on the Data tab of the AX Configuration
dialog box was disabled when the image was imported.
• The page to be exported is not text. (Text is always compressed before storage.)
If these conditions are true, the original format of the page is always exported.
Data Tab
Some of the options on the AX Configuration dialog box Data tab are not available on
the SX Configuration dialog box Data tab, because they configure features that are not
available in SX.
• The Data tab of the SX Configuration dialog box allows you to set default image
formats and other data-related settings.
• The Data tab of the AX Configuration dialog box allows you to set AX index
options, set default image formats, and other data-related settings.
Figure 261. Configuration Dialog Box: Data Tab
The Dual Data Entry flag and the Enable dual data entry option together form a
validation measure that ensures documents are indexed correctly. When this feature is
enabled, you must enter an index field’s data twice. AX accepts the information upon
verification of the second entry.
If the information entered the second time is exactly the same as the first time, the
document is indexed and added to the application. If the information is not entered
correctly, a Dual Data Entry Error dialog box appears.
Note: If an Auto Index table is used to enter a value into an index field, even if that field
is flagged for dual data entry, the user is not prompted to enter data a second time. For
more information on importing data into an Auto Index table, see "Import Wizards" on
page 290. For more information on using an Auto Index table to enter a value into an
index field, refer to the ApplicationXtender User’s Guide.
To activate dual data entry:
1. During application generation in the Application Generator, apply the Dual Data
Entry flag to each index field that requires the validation feature.
2. In ApplicationXtender, in the AX Configuration dialog box, click the Data tab.
3. Make sure that the Enable dual data entry option is enabled. (This option is
enabled by default.)
4. Click OK to save the settings.
If you are planning to run AX in a clustered environment, you must enable the
Database connect & drop option. For more information on clustering, refer to the
"Planning Your ApplicationXtender Installation" chapter of the ApplicationXtender
Installation Guide.
ODMA Support
Use this option to activate the Open Document Management API (ODMA) integration
between AX-supported ODMA client applications and ApplicationXtender. By
enabling this option, users of AX-supported ODMA client applications can easily store
and retrieve documents within AX without leaving an active client application.
(ODMA options are not available in SX.)
Option Configuration
Status Dialog Box Result
Enabled AX The next time you start AX, the Login dialog box
appears with the Remember password option.
Enabled SX The next time you start SX, the Login dialog box
appears with the Remember password option.
Disabled AX The next time you start AX, the Login dialog box
appears without the Remember password option.
Disabled SX The next time you start SX, the Login dialog box
appears without the Remember password option.
needed, but they are not required to do so in order to make changes to a document (as
long as the document is not checked out to someone else). (Options for document
check-out are not available in SX.)
When a user checks a document out, AX makes a separate working copy of the
document. Any changes made to the document while the user has it checked out are
made to the copy. If the user decides to check the document back in, the working copy
is saved as either a new document revision or a replacement document revision of the
original document. If the user decides to cancel changes, the working copy is discarded
by AX.
When AX is in check in/check out mode, use of revision control with AX documents is
mandatory. A user must check out a document in order to modify it. If the user does
not check the document out, it is opened in read-only mode and it cannot be modified.
When AX is in normal mode, users can open and modify documents without checking
them out. When a user closes a document, the modifications are automatically saved
to the AX document repository. Users can check out documents while AX is in normal
mode, in order to prevent other users from making modifications while they are
working on a document. This is useful if making the document modifications will
extend past the current user session.
If a user checks out a document and another user accesses that document while in
normal mode, the second user automatically receives the AX repository copy of the
checked out document in read-only mode and is not able to make changes to the
document until it is checked back in.
A similar option in AppGen enables check in/check out mode on an application basis,
rather than a workstation basis. If you need configure your AX system to comply with
the Health Insurance Portability and Accountability Act of 1996 (HIPAA), it is
recommended that you enable check in/check out mode on an application basis. For
more information on configuring AX to comply with HIPAA, see "Recommendations
for Compliance with HIPAA" on page 51.
The WorkflowXtender tab has a related option called Check out document when
opening and check in when closing. This option allows you to automatically check out
a document when you open it, and check it back in when you close it. If this option is
enabled, documents that are checked in or out are automatically given a timestamp as
a check-in or check-out comment. For more information, refer to the WorkflowXtender
User’s Guide.
Auto Logout
You can configure the AX workstation to automatically log out of AX after a specified
period of idle time. An idle workstation is one on which the pointer and cursor have
not been moved over any AX interface at all, no dialog boxes or messages have
appeared, and the current user is not logged onto any active data source as SYSOP. (The
Auto Logout option is not available in SX.)
To configure Auto Logout:
• In the Auto Logout text box, specify the number of minutes that you want to
allow an AX workstation to remain idle. (The maximum number of minutes that
you can enter is 480.) When that time is up, the user is automatically logged out of
AX.
To disable Auto Logout:
• In the Auto Logout text box, type 0 (zero).
The default value for the Max Future Years Setting is 10. If you use the default value of
10, in the year 1999, AX would interpret any two-digit year between 00 and 09 as
2000-2009 respectively. AX would interpret any date between 10 and 99 as 1910-1999.
Note: You can compress true color images using Joint Photographic Experts Group
(JPEG) image compression. If you select JPEG, JPEG compression is enabled. You can
set the JPEG Quality Factor (1-100) slider to control the level of compression and the
quality of the compressed images. For more information on compressing images using
this slider, see "JPEG Quality Factor (1-100)" on page 439.
3. Use the slide ruler on the scale to adjust (reduce or increase) the level of
compression and the quality factor that AX or SX applies to True Color images
when they are stored.
4. Click OK to save the settings.
Paths Tab
The Paths tab of the AX or SX Configuration dialog box allows you to configure local
and personal write paths for the AX workstation. These are separate from the write
paths established in AppGen for the application. You may also enter volume label
search drive(s) for the AX workstation. This setting tells AX or SX to look at the
specified drives for the images. The Business Intelligence Gateway path is configured
on this tab as well. However, it is not available on the SX Configuration tab because it
configures a feature that is not necessary in SX.
Path settings are saved in the Windows registry for each AX or SX workstation.
Whether you configure path settings on the Paths tab in the SX Configuration dialog
box, or in the AX Configuration dialog box, the settings are saved to the same place in
the registry and apply only to the workstation where the configuration takes place.
Important: Do not enable a local write path on the AX workstation where the Index
Server is installed. If a local write path has been configured and enabled when you
attempt to start the Index Server, an error message appears and the Index Server
automatically shuts down.
Note: The Local Write Path option should be enabled when scanning locally. The
option remains enabled until you clear the check box in the Paths tab of the
Configuration dialog box.
Note: You cannot use volume labels for the local write path.
You can use the Move Online component of AX to move locally scanned documents to
the document write path. For instructions on using Move Online, refer to the "Move
Online" appendix of the ApplicationXtender User’s Guide or the ScanXtender User’s Guide.
Processing Queue
Use this option to choose the queue that will be used to process full-text indexing jobs.
Full-text queues are created in the AX Index Server Configuration dialog box or in
Queue Manager and can be selected at any AX workstation. Select the queue you want
to use from the Processing Queue drop-down list.
Note: When considering which queues to assign to each workstation, keep in mind
that you cannot use more than one Index Server for the same AX application.
Allow Full-Text
Using this option, you can make all full-text commands unavailable to an AX
workstation. This option may be useful when, for example, you are configuring a
workstation for a user who does not need to use full text and you have a limited
number of full-text licenses. If this option is enabled for an AX workstation when a user
logs in to that workstation, a full-text license is used.
To make all Full-Text commands unavailable on an AX workstation:
1. Disable the Allow full-text option.
2. Restart AX. The full-text commands are now unavailable on this workstation.
OCR Tab
The OCR tab contains options for using optical character recognition (OCR) with AX.
(The OCR tab is not available on the SX Configuration dialog box, because it configures
features that are not available in SX.)
Figure 265. Configuration Dialog Box: OCR Tab
OCR Engine
Using this option, you can choose the OCR engine to be used by AX. The "FineReader
OCR Engine" option is always available as an OCR engine. (FineReader 6.0 OCR
Engine is always installed with AX.) The "FineReader" option is available only if you
have purchased, installed, and configured FineReader 4.0 Professional.
Figure 266. Configuration Dialog Box: OCR Tab: OCR Engines
When you select FineReader as the OCR Engine, other options become available. For
more information, see "Text View" on page 448, "Export" on page 448, and "Indexing"
on page 449.
Allow OCR
Using this option, you can make all OCR commands unavailable to an AX workstation.
This option may be useful when, for example, you are configuring a workstation for a
user who does not need to use OCR.
To make all OCR commands unavailable on an AX workstation:
1. Click the Allow OCR check box to disable the option.
2. Restart AX. The OCR commands are now unavailable on this workstation.
Option Description
Plain text The plain text format is an ASCII text format, readable on
(TXT) MS-DOS/Windows operating systems. Plain text format retains
formatting options that are available in MS-DOS text format, such as
bold and italics.
Rich text Rich text format is a format that can be read on all platforms. This
format (RTF) format should be used if the document text will be exported for use
on non-MS-DOS/Windows systems. Rich text format retains most
formatting.
Note: If Rich text format is selected, documents processed using OCR cannot be
indexed using OCR proofing. Only plain text documents can be indexed using OCR
Proofing.
Template Settings
If you have installed FineReader 4.0 and have selected FineReader as the OCR engine,
you can configure the FineReader template that AX uses when you process an image
with OCR.
3. Click Add. The Add OCR Forms Template dialog box appears.
Figure 268. Add OCR Forms Template Dialog Box
4. In the Template File text box, enter a path and file name for a FineReader template
file (.FRM).
5. In the Template Description text box, type a description for the form template. This
description is for identification purposes.
6. Click OK. The form template is added to the list of form templates.
Language Selection
The Language Selection drop-down list allows you to select from a variety of
languages. Selection of a language that matches the images to be processed improves
the results of OCR processing. For example, if you select Spanish, the results of OCR
processing will be better for images of Spanish text than for images of English text. The
language selection in the OCR tab of the Configuration dialog box sets the default for
the workstation. The languages that are available for selection depend on the OCR
engine you chose.
Text View
If you have installed FineReader 4.0 and have selected FineReader as the OCR engine,
you can use the Enable proofing and Use form templates options. The Enable proofing
option configures AX to enable OCR proofing when a text view is created. The Use
form templates option configures AX to use the selected FineReader template when a
text view is created.
If the Use form templates option is enabled for exporting OCR results, the text view
contains only the text specified by the FineReader template. Otherwise, the text view
contains all of the text on the image.
Export
If you have installed FineReader 4.0 and have selected FineReader as the OCR engine,
you can use the Enable proofing and Use form templates options. The Enable proofing
option configures AX to enable OCR proofing during export. The Use form templates
option configures AX to use the selected FineReader template during export.
If the Use form templates option is enabled for exporting OCR results, the exported file
contains only the text specified by the FineReader template. Otherwise, the exported
file contains all of the text on the image. For more information on OCR exporting, see
"OCR Job" on page 449.
Indexing
If you have installed FineReader 4.0 and have selected FineReader as the OCR engine,
you can use the Enable proofing option. The Enable proofing option configures AX to
enable OCR proofing during indexing.
OCR Job
The following topics describe the two ways that you can configure OCR jobs.
Processing Queue
Use this option to choose the queue that will be used to process OCR jobs. OCR queues
can be created in the AX Index Server Configuration dialog box or in Queue Manager
and can be selected at any AX workstation. Select the queue you want to use from the
Processing Queue drop-down list. (For more information on creating an OCR queue,
see "Creating a New Queue" on page 385.)
Fax-in Tab
The Fax-in tab of the AX Configuration dialog box allows you to choose a Fax-in server.
(The Fax-in tab is not available on the SX Configuration dialog box, because it
configures features that are not necessary in SX.)
Figure 270. Configuration Dialog Box: Fax-in Tab
Thumbnail Tab
The Thumbnail tab allows you to configure the Thumbnail view. (The Thumbnail tab
is not available on the SX Configuration dialog box.)
Figure 271. Configuration Dialog Box: Thumbnail Tab
Option Description
Thumbnail Width Allows you to specify the width of the thumbnails, in pixels.
(pixels) You can choose from 48, 64, 80, 96, and 128.
Thumbnail Height Allows you to specify the height of the thumbnails, in pixels.
(pixels) You can choose from 48, 64, 80, 96, and 128.
Color Depth Allows you to specify the color depth of the thumbnails. You
can choose from any of the color depths available for your
monitor, including 16-Color, 256-Color, and True Color, up
to 24-Bit Color. The color depth 16-Color is enough for most
thumbnails.
Render RTF File Allows you to display thumbnails of Rich Text Format (RTF)
files as miniature images, rather than as icons.
Display thumbnail of Allows you to display the Thumbnail view instead of the
the document when Document Display view when you double-click a record in
double-click on a the Result Set.
query result.
Always display the Allows you to keep the Thumbnail view displayed,
thumbnail of the regardless of other activity on the AX desktop. The
active document. Thumbnail view changes to reflect the currently displayed
document.
2. Specify the certificate file to import. (You can click Browse to locate the file.)
3. Specify the password for the private key.
4. Specify whether you want the certificate file to be available only for the current
user or for any user on the machine.
5. Specify whether you want to enable strong private key protection.
6. Specify whether you want the certificate to be exportable.
7. Click OK.
8. On the Document Signing tab, click OK.
2. Specify the certificate file to export. (You can click Browse to locate the file.)
3. Specify the password for the private key.
4. Click OK.
WorkflowXtender Tab
WorkflowXtender (WfX) is an AX add-on module. The WorkflowXtender tab contains
various options that enable you to use WfX in conjunction with AX. (The
WorkflowXtender tab is not available on the SX Configuration dialog box.)
For details on configuring the WorkflowXtender tab and on using WorkflowXtender,
refer to the WorkflowXtender User’s Guide.
Saving Settings
Once the AX workstation has been configured, you can save the customized settings to
a configuration file. The saved settings file can be loaded on other AX workstations to
copy the saved configuration settings to those workstations.
Note: If a profile is created in one version of AX, this profile cannot be applied to later
versions of AX. You must save a new settings file for specific to each AX release.
When you save settings for a workstation, AX saves information about all of the
options in the AX Configuration dialog box. When you load the settings on another
workstation, the settings you saved are loaded for that workstation. If an option is
enabled on the workstation where the settings are saved, the option is enabled on the
other workstation once you load the settings.
In addition to AX Configuration dialog box options, Save Settings saves information
about the views and toolbars on the AX desktop. If, for example, Allow Docking is
enabled for the Query view on the workstation where you save settings, Allow
Docking is enabled on the AX desktop of the second workstation once you load
settings.
Additional information saved when you save settings includes default settings for
annotations, the data source configurations on the AX workstation, and the last
directories used for several AX functions. For details on setting AX annotation
defaults, refer to the ApplicationXtender User’s Guide. For more information on setting
up AX data sources, refer to the ApplicationXtender Installation Guide.
For a detailed list of the settings that are saved, see "Saved Workstation Settings" on
page 458.
To save a workstation settings file:
1. Make the appropriate changes to the AX Configuration settings, annotation
defaults, data source configuration, and desktop arrangement.
2. Select Save Settings from the File menu. The Save AX Settings dialog box appears.
3. If you want to specify the type of file you are saving, from the Save as type
drop-down list, select the type of files that you want to save. Your available choices
are AX Settings Files (*.AXS) or All Files (*.*).
4. Select the location to save the file. You can select the location from the Save in
drop-down list and double-click a folder or file in the box below to open it, or enter
a path and file name.
5. You also have the following options:
• To save the AX workstation configuration settings, leave the AX Settings
check box enabled. Enabling this option saves all AX configuration settings,
toolbar configuration, views, and status bar settings.
• To save data source settings, leave the XSCM.Config check box enabled. For
more information, see "Important Information about XSCM.CONFIG" on
page 456.
• To save settings from an AX integration with Microsoft Outlook, such as
targets and field mappings, enable the Outlook check box. (For information
on integrating AX with Microsoft Outlook, refer to the ApplicationXtender
Integration Guide for Microsoft Outlook.)
6. Click Save. The file is saved in the specified location.
The recommended method for providing each user with access to a data source group
is to have each user use the Data Source Selector to locate a data source, as described
in the ApplicationXtender User’s Guide.
However, the XSCM.Config file check box on the Load AX Settings dialog box and the
Save AX Settings dialog box provides another method for distributing data source
connectivity. When you save workstation settings with the XSCM.Config file check box
selected, the contents of the XSCM.CONFIG file are included in the AX settings file.
The contents of the XSCM.CONFIG file are located at the end of the AX settings file
starting with line [XSCM.CFG]. The AX settings file can be distributed to other AX
workstations. When your users load an AX settings file that has an [XSCM.CFG]
section in it, with the XSCM.Config file check box selected, a new XSCM.CONFIG file
is created. Each user is then prompted to log in to the default data source, as specified
in the new XSCM.CONFIG file.
Important: If you choose to use this method for distributing data source connectivity,
you must take both of the following precautions:
• Ensure that XSAdmin, the Component Setup Wizard, WebXtender Server, and
Render Server have not been installed on any of the computers on which you
intend to save or load the AX workstation settings.
• Ensure that no changes are made in XSAdmin or in the Component Setup Wizard
on any computer in your AX system between saving and loading AX workstation
settings.
If problems occur after deployment on an AX workstation, use the Data Source Selector
to locate a data source, as described in the ApplicationXtender User’s Guide. If problems
occur after deployment on a workstation with WX components, run the Component
Setup Wizard to register components again as described in the WebXtender
Administrator’s Guide.
AX Desktop • The tab of the Configuration dialog box that was most
Configuration recently viewed
• The data source set as the active data source (shown in
bold in the Application view)
• The application set as the active application (shown in
bold in the Application view)
• Allow Docking option for the Application view
• Allow Docking option for the Query view
• Allow Docking option for the Thumbnail view
• Allow Docking option for the WorkflowXtender Workbox
• Hide On Use option for the Application view
• Hide On Use option for the Query view
• Hide On Use option for the WorkflowXtender Workbox
• Float as MDI Window option for the Application view
• Float as MDI Window option for the Query view
• Float as MDI Window option for the Thumbnail view
• Float as MDI Window option for the WorkflowXtender
Workbox
• New Document Index view location
• Modify Document Index view location
• Batch Index view location
• Batch Index view column settings
• Display of Enhance Image dialog box
Query Result Set • The settings for result set column display in the result set
column Configuration for each application
File Types Tab • File types that have been added and their associated file
Configuration extensions
Loading Settings
When you choose Load Settings from the File menu, ApplicationXtender displays the
Load AX Settings dialog box. This dialog box allows you to load previously saved
configuration settings on an AX workstation. The settings consist of the AX settings
that are found in the AX Configuration dialog box, toolbar configuration, AX views,
and status bar settings, user data source settings, and system data source settings.
Note: When you attempt to open AX, if a message appears indicating that AX cannot
find the data source or licensing information it needs to connect to the AX database,
you can load settings to provide AX with connection information.
To load a workstation settings file:
1. From the File menu, select Load Settings. The Load AX Settings dialog box
appears.
Figure 276. Load AX Settings Dialog Box
2. Select the file name. You can select the appropriate folder from the Look In
drop-down list and double-click a folder or file in the box below to open it, or enter
a path and file name and click Open.
3. Specify which settings are loaded from the file. You have the following choices:
• To load the AX workstation configuration settings, leave the AX Settings
check box enabled. Enabling this option loads all AX Configuration settings,
toolbar configuration, AX views, and status bar settings.
• To load the data source settings, leave the XSCM.Config check box enabled.
For more information, see "Important Information about XSCM.CONFIG" on
page 456.
• To load settings from an AX integration with Microsoft Outlook, such as
targets and field mappings, enable the Outlook check box. (For information
on integrating AX with Microsoft Outlook, refer to the ApplicationXtender
Integration Guide for Microsoft Outlook.)
Note: If AX is having trouble connecting to the AX database on your computer, you
can copy the data source settings for a workstation that can successfully connect to
the database and load the data source settings on your computer. If you choose not
to load AX Settings when you load settings, you can load the data source
configuration without affecting the rest of your AX configuration.
4. Click Open. The Login dialog box appears.
Note: Your login procedure may vary depending on the security provider in use
for the current data source. For information, see "Variations on Login Procedures"
on page 61.
You must re-login to AX to load the saved profile.
5. From the Logon Type drop-down list, select the type of license that you want the
logon to use. The following table describes each logon type:
CX/ERMX Logs into AX using a CX and ERMX license only, so that you can
view CX/ERMX data.
6. In the User Name text box, type a user name that is valid for the default data
source.
7. In the Password text box, type your password.
8. Click Login. AX resets your AX workstation to the new workstation profile
settings.
Note: If AX is unable to connect to the database, check the database to make sure that
it is running and accessible.
If application data and security data have been exported to an XML file, you can import
this data into Application Generator (AppGen). For instructions, see "Importing XML
Data" on page 464.
You can also export this data from AppGen to an XML file. For instructions, see
"Exporting XML Data" on page 484.
AnnotationGroupDescriptions
</AnnoGroups>
<MassStorage>
</MassStorage>
</DsDescriptor>
The required format for each of the placeholders shown here (DataTypeDescriptions,
AppDescriptions, SecurityProvider, UserDescriptions, GroupDescriptions, and
AnnotationGroupDescriptions) is described in one of the following sections:
• "Format for Data Type Descriptions" on page 465
• "Format for Application Descriptions" on page 468
• "Format for Security Provider Specification" on page 476
• "Format for User Descriptions" on page 477
• "Format for Group Descriptions" on page 477
• "Format for Annotation Group Descriptions" on page 480
Note: For a better understanding of the XML file format, you can export existing
information from AppGen and then refer to the exported XML file as an example. For
instructions, see "Exporting XML Data" on page 484.
The syntax rules for names in the XML file are the same as if you were entering the
information through the AppGen interface. For information, see "Designing an
Application" on page 84, "Creating an Application" on page 134, and "Managing
Security" on page 219.
Placeholder Description
TypeID A unique ID number for the custom data type. (Do not use
numbers from one to eleven. These are reserved for standard
data types.)
Placeholder Description
DBType A value that specifies the database type for the custom data
type. You have the following choices:
• If the index values will be numeric characters without a
decimal point (whole numbers), type 3.
• If the index values will have alphabetical characters, symbols,
or formatted numbers (ANSI or ASCII characters), type 129.
• If the index values will be numeric characters with a decimal
point (numbers that may have a fractional component), type
131.
MinSize The minimum size for the data type, in number of characters.
MaxSize The maximum size for the data type, in number of characters.
DefaultAttrib A value that specifies the attributes that you want to be enabled
by default for the custom data type. For details, see Table 117 on
page 466.
DataFormat Descriptions for each custom data format in the custom data
Descriptions type. The required format for each data format description is
described in "Format for Data Format Descriptions" on
page 467.
To calculate the value for AvailAttrib or DefaultAttrib, add the decimal values for the
attributes that you want to specify, as listed in the following table:
Read-Only flag 1 1
Required flag 2 2
Search flag 4 4
For more information on creating custom data types and custom data formats, see
"Using Custom Data Types and Formats" on page 104.
Placeholder Description
LocaleID A value that specifies the locale for currency symbols. You have
the following choices:
• To use Default System Locale, type 0.
• To use English (United States), type 1033.
• To use French (France), type 1036.
• To use Japanese, type 1041.
• To use Portuguese (Brazil), type 1046.
• To use Spanish (Mexico), type 2058.
Placeholder Description
Scale The number of digits after the decimal point for the custom data
format.
DBWidth The width of the index value as it will be stored in the database.
FormatWidth The width of the index value as it will appear in AX, including
all formatting characters.
TextMask The validation mask for the custom data format, if necessary.
DataConvExpr The format that will be stored in the database, defined with
regular expression syntax. If this format is the same as ValExpr, it
may be omitted.
Formatting1 • If you are creating a simple string expression, type the format
that you would like AX to use to display your expression.
• If you are creating a Boolean Choice format, type the first
string.
• If you are using a numeric or integer format that can contain
negative values, type the positive format.
Formatting2 • If you are creating a Boolean Choice format, type the second
string.
• If you are using a numeric or integer format that can contain
negative values, type the negative format.
For more information on creating custom data types and custom data formats, see
"Using Custom Data Types and Formats" on page 104.
</Paths>
<Fields>
FieldDescriptions
</Fields>
KeyRefFields
</Application>
Each of the placeholders shown here is described in the following table:
Placeholder Description
Placeholder Description
FtPath The full-text database write path for the application. If you
specify Verity full-text engine settings, omit this path.
Placeholder Description
FieldType A keyword that indicates the field’s data type. For a list of
standard data type keywords, see "Data Types in XML" on
page 472. (If you want to use a custom data type, specify the data
type name as it appears in the <CMDataTypes> section of the XML
file. For instructions, see "Format for Data Type Descriptions" on
page 465.)
TypeNum An ID number that indicates the field’s data type. For a list of
valid data type ID numbers, see "Data Types in XML" on page 472.
(If you want to use a custom data type, specify the data type ID
number as it appears in the <CMDataTypes> section of the XML
file. For instructions, see "Format for Data Type Descriptions" on
page 465.)
FieldFlags A list of the valid flags for the field’s data type, indicating which
flags should be enabled for the field (Flag="true") and which
flags should be disabled for the field (Flag="false"). Separate
each flag with a space. For a list of the valid flags, see "Field Flags
in XML" on page 473.
Placeholder Description
FieldFormat The field format. For most data types, the format must be
specified with the following syntax, where X is a string of
characters that represents the text that is allowed in the field.
format="X"
For the User-defined List data type, instead of using this syntax,
you specify a list of values. Do not specify a format for the Time or
Time Stamp data types. For more information, see "Field Formats
in XML" on page 474. (If you want to use a custom data format,
specify the data format name as it appears in the <CMDataTypes>
section of the XML file. For instructions, see "Format for Data
Format Descriptions" on page 467.)
Currency CurrencyField 9
Date DateField 3
Decimal/Numeric DecimalField 2
Integer IntegerField 1
SSN SSNField 6
Telephone PhoneField 7
Text TextField 0
Time TimeField 4
Read-Only readOnly
Required required
Search search
Some field flags are not represented by keywords in XML. The following table briefly
describes how each is represented in XML:
Data Reference This flag is represented as part of the optional KeyRefField syntax
in the XML file. For details, see "Format for Key Reference Fields"
on page 476.
Key Reference This flag is represented as part of the optional KeyRefField syntax
in the XML file. For details, see "Format for Key Reference Fields"
on page 476.
Integer nnnn
n,nnn
(nnnn)
(n,nnn)
SSN nnn-nn-nnnn
nnnnnnnnn
Telephone nnn-nnnn
nnn-nnn-nnnn
(nnn)nnn-nnnn
(nnn) nnn-nnnn
Text A field format is not required for the Text data type. However, a
validation mask can be specified. For information, see "Validation
Mask" on page 147.
Time Do not specify a format for the Time data type. Only one format
(hh:mm:ss) is valid.
Time Stamp Do not specify a format for the Time Stamp data type. Only one
format (yyyy-mm-dd hh:mm:ss) is valid.
Placeholder Description
KeyRefField The name of the field that you want to use as a Key Reference
field.
DataRefFields List of fields that you want to use as Data Reference fields.
Each field must be specified in the following format, where
DataRefField is the name of the field:
<DataRefField name="DataRefField" />
CM <Security provider="NATIVE">
Note: If you specify the use of a directory service security provider in the XML file, you
must create and configure the directory service security provider in XSAdmin. For
instructions, refer to the XtenderSolutions Administrator’s Guide.
Placeholder Description
UserFullName An optional full name that will help identify the user.
ProfileDescriptions A list of the security profiles for the user. For details, see
"Format for User or Group Profile Descriptions" on
page 478.
Placeholder Description
GroupFullName An optional full name that will help identify the group.
ProfileDescriptions A list of the security profiles for the group. For details,
see "Format for User or Group Profile Descriptions" on
page 478.
MemberList A list of the users who are members of the group. Each
user must be listed in the following syntax, where
UserName is the user’s name:
<User name="UserName" />
For the Keyword placeholder, insert either default or a keyword for a privilege, as shown
in the following table. The default keyword represents all privileges that have not been
otherwise specified for the profile.
Privilege Keyword
Display Display
Print Print
Configure WS ConfigWS
Privilege Keyword
AX Administrator Admin
OCR OCR
Placeholder Description
MemberList A list of the users and groups who are members of the
annotation group.
Each user or group in the MemberList must be listed in the following syntax:
<AnnoGroupPerm name="UserName" type="MemberType" OptionList />
Each of the placeholders shown here is described in the following table:
Placeholder Description
OptionList A list of the annotation group options that you want to enable
for the specified member of the annotation group, in the
following syntax:
Option="1"
The following table describes each annotation group option that may be enabled for
each member of the annotation group:
Option Description
ViewAnno The user or group can view all annotations in the current
annotation group.
Option Description
CreateAnno The user or group can create annotations. The annotation group
option ViewAnno must also be enabled.
EditAnno The user or group can edit one’s own annotations in the current
annotation group. The annotation group option ViewAnno must
also be enabled.
HideRedact The user or group can hide all redactions in the current
annotation group.
CreateRedact The user or group can create redactions. The annotation group
options ViewAnno, CreateAnno, and HideRedact must also be
enabled.
EditRedact The user or group can edit one’s own redactions in the current
annotation group. The annotation group options ViewAnno,
EditAnno, and HideRedact must also be enabled.
GlobalEdit The user or group can edit all annotations in the current
annotation group. The annotation group options ViewAnno and
EditAnno must also be enabled. (If HideRedact and
EditRedact are also enabled, the user or group can edit all
redactions in the current annotation group.)
After importing data from an XML file, further configuration may be necessary:
• If you have imported users into a data source that is using the CM security
provider, you must give each imported user a password. For instructions, see
"Changing an Existing User's Password" on page 256.
• Consider creating a global profile for each user that you have imported. For
instructions, see "Changing an Existing User's Profile" on page 259.
A A
B with Display B with full B with full privileges B with full privileges
privilege only privileges
C C C
RON RON
Configuring TELEform
To configure TELEform for the purpose of exporting documents to AX, you must
specify the directory in which you want TELEform to find images for processing.
• If you want to process individual files, see "Specifying the Search Directory" on
page 487.
• If you want to process batches, "Configuring Automated Batch Creation" on
page 487.
These sections briefly describe the settings that you need to configure in order to
successfully release documents into AX. For more detailed instructions on configuring
TELEform, refer to the Verity TELEform documentation.
4. Under Batch creation options, in the Directory text box, enter the directory in
which you want TELEform to find images for processing. This directory can be the
same as the Search directory specified in the Evaluate Directory Setup dialog box,
or it can be different.
5. Under Batch Job Option, in the Default batch job name drop-down list, select
(Default).
6. Click OK.
Configuring a Form
To configure each form for the purpose of exporting documents to AX, you must
perform the following form configurations:
• "Bypassing Verification" on page 488
• "Configuring Automatic Export for a Form" on page 489
These sections briefly describe the settings that you need to configure in order to
successfully release documents into AX. For more detailed instructions on configuring
TELEform, refer to the Verity TELEform documentation.
Bypassing Verification
Before exporting documents to AX, you must configure each form so that image
processing continues without interruption. The following procedure describes how to
modify form properties for this purpose. Repeat the following procedure for each form
that you want to configure for AX integration.
3. Click New. Another Auto Export Setup dialog box, for the open form, appears.
Figure 282. Auto Export Setup Dialog Box - Main Tab
4. On the Main tab, from the Format drop-down list, select AX. (If AX is not available,
click Cancel and install the TELEform Script for AX as described in "Preparing for
TELEform Integration" on page 486.)
5. Click the Fields tab.
4. Select the AX data source to which you want TELEform to send documents. Click
Next. The Login Information page appears.
5. Under AX Login, enter the user name and password that you want TELEform to
use. This user account must have the Add Page privilege in the AX system.
6. If you also want to enter WorkflowXtender login information, you can do so.
7. Click Next. The AX Application page appears.
Figure 287. Release Script Wizard - AX Application Page
8. From the Select AX application list, select the application to which you want
TELEform to send documents. Click Next. The Field Link page appears.
9. Under Selected Fields, select one of the form’s index fields. Under All Fields, select
the corresponding AX index field. Click Link. Repeat for each of the form’s index
fields.
Note: If the names of the form’s index fields match the names of the AX index
fields, they are linked automatically.
10. You are now ready to complete form configuration. To continue, see "Completing
Form Configuration" on page 494.
Important: Documentum recommends that you enable only one settings item for
each form.
5. Click OK.
6. Save the form. After you have completed all configuration steps for all forms, you
are ready to place the image files that you want TELEform to process in the
specified search directory and run TELEform reader to launch the export process.
7. Proceed to "Exporting TELEform Documents to AX" on page 495 to continue.
This glossary contains terms and definitions found in this manual. Most of the terms
are specific to ApplicationXtender products.
accessible security Accessible security grants access to the users in the group
for only documents with index field values matching the
secured value list. (See also Document Level Security.)
audit trail The Audit Trails feature allows you to track user activity
within the AX system. System-wide activities such as the
creation, modification, and deletion of applications, users,
and groups can be tracked. You can also track user activity
in applications by tracking items such as the creation and
deletion of documents, the addition of pages, and the
modification of index information for documents. By
default, AX logs audit trail events to a table in the AX
database. You can configure audit trails to log to this table,
to a log file, or to both locations.
auto index import Auto Index Import allows use of the <F7> key to import
index values from a text file, so users adding documents
can automatically populate indexes using the imported
data. Auto Index is ideal for the import of index records
that are applicable to only one document. In an Auto
Index Import table, once a record (or a group of index
values) has been used to index a document, the record is
deleted.
check in/check out When AX is in check in/check out mode, use of revision
mode control with AX documents is mandatory. Users must
check out a document in order to modify it. If they do not
check the document out, it is opened in read-only mode
and it cannot be modified.
data source group A data source group in XSAdmin associates a list of data
sources with everything that has been configured in
XSAdmin, such as WebXtender settings and connections
to License Server computers. This feature provides
convenience in that the work of configuration does not
have to be repeated every time you create a data source.
grab bar An AX docked view has a grab bar. A grab bar is similar to
a title bar except that it does not contain a title.
index image import Index Image Import allows you to import index data and
document files in a single step. A text file is required
which contains a line of text for each document to be
imported, with a value for each index field and a reference
to the location of the file to be imported. No manual
document indexing is required.
Index Server The Index Server is an optional module that adds full-text
indexing and OCR functionality to ApplicationXtender
systems.
key reference import Key Reference Import allows use of the <Tab> key to
import index values from a text file. Key Reference is most
effectively used in situations where each imported record
may describe several documents. Key Reference Import
maintains the index records in the Key Reference table
even after records have been used to index documents.
Any change made to a record in the Key Reference table is
reflected in the indexes of all documents described by that
record.
command line switches, required 337 files to execute migrations, creating 207
command line syntax 336 reset status 215
definition of the term 290 batches
example application 129 per application, maximum 119
file format 293 BIN files
optional switches 337 from multi-page TIFF or DCX 440
overview 292 per application, maximum 119
required switches 337 storage location 140
auto index import wizard when you delete an application 216
available options 310 when you purge an application 216
configure welcome page 306 bitonal images 424
continue 309 black and white images
preview 308 e-mail format 424
run 306 export format 428
start 306 storage format 438
status 311 Boolean choice data type 94
auto logout 437 buttons, toolbar
automated batch creation, configuring 487 adding 395
automatic export for a form, configuring 489 change size 395
automatic features customizing 395
full text 444 removing 395
hiding a view on use 401 bypassing verification 489
indexing using auto index 45
indexing using key reference 45 C
migration 197
OCR, using during full-text indexing 444
cache forms 418
saving desktop layout on exit 409
cancelling check out 214
Verity KeyView Viewer 409
Cardiff, import file polling 333
automatically logging in 62
CFR 51
AX 47
CFR compliance 51
administrator 53
change toolbar button size 395
configuring 392, 405
changing
description 47
data type for an index field 157
desktop, customizing 392, 397
document level security 278
functions security 42
group description 243
interface 48
group membership 244
login account, for Index Server 362
group profile 245
SDK 51
security type 273
AX application, selecting 493
characters
AX data source, selecting 492
prohibited in application description 120
AX index fields
prohibited in application names 120
enabling 491
prohibited in index field names 85
linking 494
prohibited in specification names 300
selecting 492
simulate box drawing 414
AX views
validation mask 147
customize 397
check in, definition of the term 50
display as dialog box 399
check out
display as subwindow 400
cancelling 214
docking 398
definition of the term 50
hiding on use 401
list of checked-out documents, refresh 214
prompt for when open 138, 435
B status of a document, managing 214
checking for updates 56
backup 55 choosing
band width, color bar 419 archive retrieval method 170
batch clock icon 161
files to execute migrations 206 CM Gateway for Verity, installing 348
K groups 222
limitations
K2 Server, assigning collection to 349 application 119
key reference security 233
file setup 300, 303 line width, color bar 419
missing values 315 linking index fields 494
key reference fields load
and index/image import 295 archive settings 176–177
key reference flag 100 workstation settings 462
Key Reference Import AX cannot log in 462
file format 295 locale
key reference import specifying for entire AX database 96
command line 334 specifying for existing custom data format 118
optional switches 335 specifying for new custom data format 111
required switches 335 locating
definition of the term 290 data sources 59
optional switches 335 locked AE_SEQ table 211
overview 294 log file
required switches 335 auto index import log 312
key reference import wizard auto index import rejection log 311
available options 317 configure path 369
configuring the welcome page 313 index image import log 329
preview 315 index image import rejection log 329
run 312 Index Server 369
start 313 key reference import log 320
status dialog box 319 key reference import rejection log 319
key reference table 45 migration wizard 197
keyboard keys tab 369
Page Down 410 view 377
Page Up 410 Log on as a service, add right to Index Server account
Shift 61 on Windows 2000 357
KeyView Viewer logging in automatically 62
definition of the term 36 login
view foreign files 409 AppGen 60
keyword, search by 437 AX, cannot 462
keywords into data sources 384
add a DLS keyword 274 login information, providing 493
document level security 223 logout
auto 437
L
M
layout, restore previous 409
leading zeroes 103 mail 423
legend, privileges 221 Main toolbar, enabling display 394
length text box 146 main window
license group 222 AppGen 64
changing for user 257 maintenance
for a database 66 application 54, 151
for a workstation 66, 68 backups 55
maintenance 54 data storage server 57
License Server 48 database 56
configuring license groups 54, 66, 222 hardware 56
configuring location 66 Index Server 371
network information 66 security 54
workstation, information 67 software 56
licenses management
data sources 36