Cover image for Getting Started with IBM FileNet P8 Content Manager.
Getting Started with IBM FileNet P8 Content Manager.
Title:
Getting Started with IBM FileNet P8 Content Manager.
Author:
Carpenter, William J.
ISBN:
9781849680714
Personal Author:
Edition:
1st ed.
Physical Description:
1 online resource (490 pages)
Contents:
Getting Started with IBM FileNet P8 Content Manager -- Table of Contents -- Getting Started with IBM FileNet P8 Content Manager -- Credits -- About the Author -- Acknowledgement -- About the Reviewers -- www.PacktPub.com -- Support files, eBooks, discount offers, and more -- Why Subscribe? -- Free Access for Packt account holders -- Instant Updates on New Packt Books -- Preface -- What this book covers -- What you need for this book -- Who this book is for -- Conventions -- Reader feedback -- Customer support -- Errata -- Piracy -- Questions -- 1. What is ECM? -- ECM in three sentences -- Use cases -- Central Document Repository -- Compliance and governance -- Document-centric workflow -- Things to look for in an ECM platform -- Safe repository -- Strong security features -- Platform support -- Scalability -- Extensibility and add-ons -- Vendor and partner ecosystem -- Enterprise interoperability -- Strong APIs -- Notifications and triggers -- Traditional document management features -- Versioning and history -- Workflow integration -- Search and navigation -- Auditing and reporting -- Metadata -- ECM and standards -- AIIM: DMA and ODMA -- DMA -- ODMA -- WebDAV -- JCR -- CMIS -- What ECM is not -- ECM is not CMS -- ECM is not a database -- ECM is not source code management -- A bit of FileNet history -- Summary -- 2. Installing Environmental Components -- Some important IBM documents -- Plan and prepare your environment -- Fix Pack Compatibility Matrix -- Environmental components -- Hardware and software requirements -- Tailored planning and installation guides -- Our target environment -- Configuring the environmental components -- User and group accounts -- Red Hat Enterprise Linux -- Network addresses -- System clocks -- File storage area -- Firewalls -- Installing DB2 -- Create a new database -- Drop default user tablespace.

Create a buffer pool definition -- Create tablespaces -- Add a user to the database -- Set DB2 parameters -- Repeat for OSTORE1 -- WebSphere Application Server -- Profiles and ports -- WAS process attributes -- WAS performance tweaks -- WAS and DB2 -- Installing Tivoli Directory Server -- Using the directory -- Populating the directory -- TDS web console setup -- Server-side sorting -- The suffix -- Users -- Groups -- CE-specific entries -- Manual TDS queries -- Scripts and desktop shortcuts -- Summary -- 3. Installing the Content Engine -- An aside about some names -- P8 platform architecture -- Content Engine (CE) -- Other components -- Application Engine (AE) -- Content Search Engine (CSE) -- Process Engine (PE) -- Rendition Engine (RE) -- Installing the CE -- Getting the software -- Running the CE server installer -- Configuration Manager -- WAS console tweaks -- Installing FEM -- Bringing up the P8 Domain -- Create an Object Store -- Summary -- 4. Administrative Tools and Tasks -- Domain and GCD -- Topology levels -- Using topology levels -- Exploring Domain-level items -- AddOns -- Fixed Content Devices -- Server Cache configuration -- Content configuration -- Trace logging -- Content cache -- Exploring Object Store-level Items -- Content Access Recording Level -- Auditing -- Checkout type -- Text Index Date Partitioning -- Cache configuration -- Metadata -- Property templates -- Choice lists -- Classes -- Subclassing example -- Object Browse and Query -- Summary -- 5. Installing Other Components -- Content Search Engine (CSE) -- The CSE user -- Running the CSE installer -- Command line configuration steps -- Configuring CSE via the K2 Dashboard -- Configuring CE for CSE via FEM -- Configuring the P8 Domain -- Configuring an Object Store -- Process Engine server (PE server) -- Users and groups -- Database configuration.

DB2 database and tablespaces -- DB2 user permissions -- DB2 client software -- PE server installation and configuration -- PE server installation -- CE client installation -- PE server configuration -- Shared memory -- Test the connections -- CE configuration for PE -- PE client software -- Application Engine (AE) -- Workplace XT (XT) -- Configure LDAP -- Trust relationships and LTPA -- Run the installer -- CE and PE client software -- CE client -- PE client -- XT pre-deployment configuration -- Deploying XT -- Classloader configuration -- Map special subjects -- ORB uniqueness -- Running XT the first time -- IBM System Dashboard for ECM (SD) -- Rendition Engine (RE) -- Summary -- 6. End User Tools and Tasks -- What is Workplace XT? -- Browsing folders and documents -- Adding folders -- Adding documents -- Viewing documents -- Entry templates -- Workflow interactions -- One-time isolated region setup -- Approval workflows -- Tasks in XT -- Versioning -- Properties and security -- Searches -- Simple Search -- Keyword Search -- Advanced Search -- Stored Searches and Search Templates -- Summary -- 7. Major CM Features -- Documents -- Content -- Multiple content elements -- Content transfer and content reference -- Content element numbering -- Versioning -- Checkout and checkin -- Freeze -- Major and minor versions -- Document lifecycles -- Autoclassification -- Compound documents -- DITA publishing -- Rendition Engine -- Search -- Merge mode -- Selectable and searchable properties -- Property searches and full-text searches -- JDBC provider -- Search Templates and Stored Searches -- Folders and containment -- Referential containment -- Filing -- Containment names -- The decision to file documents -- Custom properties and classes -- Properties of Class Definitions -- Properties of Property Definitions -- Custom objects -- Annotations -- Links.

Subscriptions, events, and auditing -- What is an event? -- Subscriptions -- Audit logging -- Content Access Recording Level -- Event handlers -- Workflow launch -- AddOns -- AddOn components -- Creating and installing AddOns -- Authoring an AddOn -- Summary -- 8. Security Features and Planning -- Authentication or authorization? -- Authentication in CM -- Java Authentication and Authorization Service (JAAS) -- Where authentication actually happens -- Application Server trust relationships -- Thick EJB clients -- CEWS clients -- Java clients with CEWS -- .NET clients and direct CEWS users -- Custom authentication and tunneling -- Delegated authentication -- Single Sign-on -- Anonymous and guest access -- Impersonation and run-as -- Enterprise directories -- Authorization in CM -- Discretionary and Mandatory Access Control -- Access Control Lists -- User and group access -- Rights -- Levels -- Unused bits -- Implicit rights -- Object Owner -- Object Store administrator -- Special query right -- Extra access requirements -- Modification Access Required -- Target Access Required -- Default instance security -- #CREATOR-OWNER -- Security policy and document lifecycle policy -- Security Policy and Security Templates -- Document lifecycle policy -- Dynamic security inheritance -- Inheritable depth -- Parent and child security objects -- System-defined inheritance -- Roles and adapters -- Project team example -- Project team adapters -- Folders as adapters -- Marking sets -- A marking set example -- The final veto -- A hypothetical scenario -- The players -- The business requirements -- The strategy -- The implementation -- The test -- Summary -- 9. Planning Your Deployment -- Distributed deployments in functional tiers -- Web browsers -- Web servers -- CE, PE, and friends -- Databases and filesystems -- Custom applications -- Parallel environments.

Pre-production -- Development and testing -- How many domains? -- How many Object Stores? -- Network security -- TLS/SSL -- Firewalls -- Supported platforms -- Integrating content with workflow -- Content storage -- Database Storage Area -- File Storage Area -- Fixed content devices -- Content Federation Services (CFS) -- Clustering, High Availability, and Disaster Recovery -- Clustering -- High Availability -- Disaster Recovery -- Distributed deployments -- CE topology -- PE considerations -- CSE considerations -- CE distributed deployment features -- Content cache -- Request Forwarding -- Typical distributed deployments -- Remote application tier -- Remote application and CE tier -- Summary -- 10. Included and Add-On Components -- Standard CM components -- Server components -- Applications and connectors -- Environmental components -- Initiatives and scenarios -- Compliance management -- IBM Enterprise Records (IER) -- Declaration -- Classification -- Protection -- Disposition -- Audits and reporting -- IBM eDiscovery -- IBM eDiscovery Analyzer (eDA) -- IBM eDiscovery Manager (eDM) -- IBM Content Collector -- ICC for File Systems -- ICC for Microsoft SharePoint -- ICC for Email -- Task connectors -- IBM Classification Module -- Smart Archive Strategy -- Ingestion -- Infrastructure -- Management -- IBM FileNet Business Process Manager -- IBM FileNet Business Process Framework -- IBM Enterprise Content Management Widgets -- Other components -- IBM FileNet System Monitor -- IBM FileNet Image Services -- IBM FileNet Capture and Datacap -- Content Management Interoperability Services -- Darwin Information Typing Architecture -- IBM Content Analytics -- Summary -- 11. A Taste of Application Development -- The Content Engine APIs -- Don't bypass the APIs -- Reading -- Updating -- API transports -- CEWS transport -- EJB transport -- User transactions.

JAAS context.
Abstract:
Install, customize, and administer the powerful IBM FileNet Enterprise Content Management platform using this book and eBook.
Local Note:
Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2017. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.
Electronic Access:
Click to View
Holds: Copies: