F2800GCourse Guide
F2800GCourse Guide
IBM FileNet P8
Platform Essentials (V5.5.x)
Course Code: F2800G ERC 1.0
Revision Date: April 2019
IBM FileNet P8 Platform Essentials (V5.5.x)
April 2019
NOTICES
This information was developed for products and services offered in the USA.
IBM may not offer the products, services, or features discussed in this document in other countries. Consult your local IBM representative for
information on the products and services currently available in your area. Any reference to an IBM product, program, or service is not intended to
state or imply that only that IBM product, program, or service may be used. Any functionally equivalent product, program, or service that does not
infringe any IBM intellectual property right may be used instead. However, it is the user's responsibility to evaluate and verify the operation of any
non-IBM product, program, or service. IBM may have patents or pending patent applications covering subject matter described in this document.
The furnishing of this document does not grant you any license to these patents. You can send license inquiries, in writing, to:
IBM Director of Licensing
IBM Corporation
North Castle Drive, MD-NC119
Armonk, NY 10504-1785
United States of America
The following paragraph does not apply to the United Kingdom or any other country where such provisions are inconsistent with local law:
INTERNATIONAL BUSINESS MACHINES CORPORATION PROVIDES THIS PUBLICATION "AS IS" WITHOUT WARRANTY OF ANY KIND,
EITHER EXPRESS OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF NON-INFRINGEMENT,
MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Some states do not allow disclaimer of express or implied warranties in
certain transactions, therefore, this statement may not apply to you.
This information could include technical inaccuracies or typographical errors. Changes are periodically made to the information herein; these
changes will be incorporated in new editions of the publication. IBM may make improvements and/or changes in the product(s) and/or the
program(s) described in this publication at any time without notice.
Any references in this information to non-IBM websites are provided for convenience only and do not in any manner serve as an endorsement of
those websites. The materials at those websites are not part of the materials for this IBM product and use of those websites is at your own risk.
IBM may use or distribute any of the information you supply in any way it believes appropriate without incurring any obligation to you. Information
concerning non-IBM products was obtained from the suppliers of those products, their published announcements or other publicly available
sources. IBM has not tested those products and cannot confirm the accuracy of performance, compatibility or any other claims related to non-IBM
products. Questions on the capabilities of non-IBM products should be addressed to the suppliers of those products.
This information contains examples of data and reports used in daily business operations. To illustrate them as completely as possible, the
examples include the names of individuals, companies, brands, and products. All of these names are fictitious and any similarity to the names and
addresses used by an actual business enterprise is entirely coincidental.
TRADEMARKS
IBM, the IBM logo, and ibm.com are trademarks or registered trademarks of International Business Machines Corp., registered in many jurisdictions
worldwide. Other product and service names might be trademarks of IBM or other companies. A current list of IBM trademarks is available on the
web at “Copyright and trademark information” at www.ibm.com/legal/copytrade.shtml.
Adobe, and the Adobe logo, are either registered trademarks or trademarks of Adobe Systems Incorporated in the United States, and/or other
countries.
Java and all Java-based trademarks and logos are trademarks or registered trademarks of Oracle and/or its affiliates.
Linux is a registered trademark of Linus Torvalds in the United States, other countries, or both.
Microsoft, Windows, and the Windows logo are trademarks of Microsoft Corporation in the United States, other countries, or both.
UNIX is a registered trademark of The Open Group in the United States and other countries.
Notepad++ is a registered trademark.
© Copyright International Business Machines Corporation 2019.
This document may not be reproduced in whole or in part without the prior written permission of IBM.
US Government Users Restricted Rights - Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp.
ACCESSIBILITY
Accessibility features assist users who have a disability, such as restricted mobility or limited vision, to use information technology content
successfully. Many IBM products include accessibility features for navigating the user interface, and for authoring reports so that they're accessible
for yourself or others. Please consult the product documentation for an overview of accessible product features. Online product documentation can
be accessed at the IBM Knowledge Center (http://www.ibm.com/support/knowledgecenter/).
Course information
Course overview
This course introduces you to the key concepts of IBM FileNet P8 Platform such as
architecture, P8 domain structures, organizing the content across the enterprise, and
security. Includes information to manage logging, auditing, and storage areas.
Intended audience
This course is for administrators and users who are responsible for administrating and
configuring IBM FileNet P8 Platform.
Course prerequisites
Participants should have:
• Familiarity with enterprise content management concepts.
Course outline
• Introduction to IBM FileNet P8 Platform
• Architecture and domain structures
• Configure logging
• Configure auditing
• Introduction to IBM FileNet P8 Platform security
• Manage storage areas
• Introduction to IBM FileNet P8 content services containers
• Organize content across the enterprise
Review Questions
Question 1: How would you define an IBM FileNet P8 Platform solution? (Select
one)
A. An object store that contains folders and files
B. A set of workflows
C. A solution that addresses a business need
D. A set of stored searches
Answer 1: C
IBM FileNet P8 Platform provides tools for building a solution or application that
addresses a business need.
Answer 2: D
IBM FileNet P8 Platform is used by many industries.
Answer 3: A, B, C, and D
An Enterprise Content Management system provides user access & metadata
management, logging, auditing, and document viewing.
Question 4: Which IBM FileNet P8 Platform component provides the default client
interface for business users to work with content? (Select one)
A. IBM Content Navigator
B. Content Search Services
C. Content Platform Engine
D. System Dashboard
Answer 4: A
IBM Content Navigator is the primary web interface for business users to work with
content and it can connect to the IBM FileNet Content Manager repositories.
Answer 5: A, B, C, and D
IBM FileNet P8 Platform integrates with IBM Datacap, IBM Enterprise Records, IBM
Business Automation Workflow, and IBM FileNet Content Federation Services.
• The presentation layer and business logic layer, on the top, focus on the clients
that connect to Content Platform Engine.
IBM Content Navigator (ICN) is the primary web client to manage the content.
You can customize and extend ICN and also create custom applications.
Administration Console for Content Platform Engine is the web client to configure
and administer Content Platform Engine.
The business logic layer includes Content and Process Java, Web Services,
REST, and .NET APIs.
• The services layer in the middle includes the core components that make up IBM
FileNet P8 Platform.
The Content Platform Engine is the core engine providing both content and
process services.
This layer also includes IBM Content Search Services.
• The data layer, which is the lowest layer, includes LDAP directory services,
databases, and content storage.
Content Platform Engine architecture
Content Platform Engine is an IBM FileNet P8 Platform component that manages
enterprise-wide objects and documents by offering powerful and administration tools.
Using these tools, an administrator can create and manage the classes, properties,
storage, and metadata that form the foundation of an enterprise content management
system.
The Content Platform Engine architecture includes the following aspects:
• Object-oriented, extensible metadata model
This model enables Content Platform Engine to provide complex and flexible data
representation.
The model includes a rich event framework that provides the means to trigger
actions in response to activities performed against Content Platform Engine
objects.
• Content Engine Application programming interfaces (APIs)
The APIs provide an extensible platform for development.
A Java-based API provides a rich set of Java classes that maps to object store
objects, such as Document, Folder, or Property Description.
A Web Service API enables users to author applications in a platform and
language-independent manner that expose the object model in a few generic
methods suitable for deployment in a web environment.
A Microsoft .NET framework-based API, functionally equivalent to the Java-based
API, provides for development of applications that use the .NET framework.
Generally, start the components and related servers in the following order. Reverse the
order to shut down.
• Directory services
• Database servers
• Content Platform Engine servers
Content Platform Engine runs as an application within a Java EE application
server.
• IBM Content Search Services servers
• IBM Content Navigator
IBM Content Navigator runs as application within a Java EE application server
• Other FileNet P8 components
This page contains information about the FileNet P8 system including the product
name and version, and log files location.
• In the Mozilla Firefox browser, open a new tab, click the Bookmarks menu and
then select System Health > PE Ping
You can also enter the following URL for the ping page:
http://vclassbase:9080/peengine/IOR/ping
• Type p8admin for the User name field, FileNet1 for the Password field, and then
click OK.
• Verify that the Process Engine Server Information (Ping Page) is displayed to
indicate that Content Platform Engine process services are functioning properly.
This page contains information about the FileNet P8 system including the product
name and version, and log files location.
• In the Mozilla Firefox browser, open a new tab, click the Bookmarks menu and
then select System Health > FileNet P8 System Health
You can also enter the following URL: http://vclassbase:9080/P8CE/Health
• Verify that the IBM FileNet Content Manager - CE System Health page is
displayed.
This page includes information about P8 Domain, Site, and other resources. Each
item has a link to see more details. The green circle shows these resources are
available.
• Close the browser, reopen, click the Bookmarks menu and then select System
Health > ICN Ping
You can also enter the following URL for the ping page:
http://vclassbase:9081/navigator/ping.jsp
• Type p8admin for the User name field, FileNet1 for the Password field, and then
click OK.
• Verify that the IBM Content Navigator Ping Page is displayed to indicate that IBM
Content Navigator application is functioning properly.
This page contains information about Content Navigator including the product
name and version.
The new protected ping page (ping.jsp) can only be accessed by administrators
and requires login.
• In the Mozilla Firefox browser, open a new tab, click the Sample Desktop
bookmark.
You can also enter the following URL: http://vclassbase:9081/navigator/
• If prompted to login, type p8admin for the User name field, FileNet1 for the
Password field, and then click Log In.
• Verify that the Content Navigator Desktop (called Sample Desktop) opens with
the Browse view (indicated on the upper left).
• In this view, you browse to folders, view documents, and manage the content.
If you get the Browse page, it indicates that the following components are running
and communicating within your student system:
A database system.
Your student system uses the IBM DB2 database software. Every time a user logs
in to the desktop, the desktop configuration is loaded from the DB2 database. This
desktop is configured to browse the LoanProcess object store by default, which
demonstrates that the database used by the Content Platform Engine is functional.
An LDAP directory service to handle user authentication. Your system uses Active
Directory.
• Logout of the ICN desktop and close the browser.
Examine the IBM FileNet P8 Platform applications.
In this task, you will open the WebSphere Integrated Solutions Console and observe
the IBM FileNet P8 Platform applications.
• In the Mozilla Firefox browser, click the WAS bookmark or enter the following
URL: https://vclassbase:9043/ibm/console/logon.jsp
• Type the following values and then click Log in:
• User ID: wasadmin
• Password: FileNet1
The console opens.
• On the left pane, expand the Applications > Application Types node and then
click WebSphere enterprise applications.
• On the right pane, verify that the Application Status column shows a green arrow
to indicate that the following two applications are running.
• FileNetEngine (Content Platform Engine)
• navigator (IBM Content Navigator)
These two key applications are required for IBM FileNet P8 Platform. You will not
be using the DefaultApplication and starting it is not required.
• Click FileNetEngine to open it.
If it does not open immediately, right-click FileNetEngine and select Open Link in
New Tab.
• Under the Modules section, click Manage Modules.
A list of modules are shown that make up the FileNetEngine application.
The acce application is the Administration Console for Content Platform Engine.
• If you opened the FileNetEngine application in a separate tab, close the tab.
Explore the interdependencies between IBM Content
Navigator and Content Platform Engine.
In this task, you will stop the FileNetEngine application (Content Platform Engine) and
open an IBM Content Navigator (ICN) desktop. ICN is the primary web client for
business users to work with content and workflow tasks. ICN connects to the IBM
FileNet Content Manager repositories.
• On the left pane, click the Applications > Application Types > WebSphere
enterprise applications node.
• On the right pane, select the box next to FileNetEngine and click Stop.
• Wait until a red X is shown to the right of FileNetEngine on the Application
Status column.
• Log out of the WebSphere Integrated Solutions Console and close the browser.
• In the Mozilla Firefox browser, click the Sample Desktop bookmark or enter the
following URL: http://vclassbase:9081/navigator.
• Type p8admin for the User name field, FileNet1 for the Password field, and then
click Log In.
The Sample desktop of IBM Content Navigator (ICN) opens.
You get an error with the message that the repository is not available. ICN attempts
to load the desktop. It cannot load the desktop because FileNetEngine is not
running and ICN cannot connect to the repository.
• Close the browser and reopen to log in to the WebSphere Integrated Solutions
Console (WAS) again with the same user ID and password as above
(wasadmin/FileNet1).
• On the left pane, expand the Applications > Application Types node and then
click WebSphere enterprise applications.
• On the right pane, select the box next to FileNetEngine and click Start.
• Wait until a green check mark is shown to the right of FileNetEngine on the
Application Status column.
• Log out of the WebSphere Integrated Solutions Console and close the browser.
• In the Mozilla Firefox browser, click the Sample Desktop bookmark or enter the
following URL: http://vclassbase:9081/navigator.
• Type p8admin for the User name field, FileNet1 for the Password field, and then
click Log In.
• This time, the desktop opens without any errors and the LoanProcess Repository
is listed in the Browse mode.
• Click the head and shoulder icon on the banner, select Log Out to log out of IBM
Content Navigator and then close the browser.
Name, ID, and Domain type of the EDU_P8 domain are shown. The domain for the
student system is named EDU_P8.
• Select the Properties subtab, click the Property Name cell to sort the list
alphabetically and then review the properties that are listed.
The Default Site property has Initial Site as the value.
• Scroll down to the Subsystem Configurations property, and then click the blue
down arrow to the right of that property.
Observe that a list of different subsystem configurations displays. When you select
a subsystem, it opens as a separate tab and the configuration can be updated.
• If you opened any subsystem tabs, you can close them.
In this domain (EDU_P8), the p8admin user has full control on the domain and all
its children. The default #AUTHENTICATED-USERS group has custom
permission access for the domain and its immediate children.
• Click the Directory Configuration subtab.
Notice that EDU_AD is defined for the P8 domain. A FileNet P8 Domain can be
configured to use multiple directory configurations.
• Click the EDU_AD link in the Name column.
The EDU_AD tab opens.
• In the EDU_AD tab, examine the properties that are displayed, such as Directory
Server Type and then close the tab.
The directory configuration is generally configured with the FileNet Configuration
Manager. ACCE can be used to update the settings or just to view them.
• Click the Server Cache Subsystem tab and then review the properties.
You optimize the efficiency of the server cache for improving the system
performance.
• Optionally, click each of the subsequent tabs to review the properties.
Click the forward arrow to access more tabs.
• Click the down arrow at the top right and select SMTP Subsystem tab.
Click the SMTP Subsystem tab, if the content is not displayed. In this tab, you can
configure an SMTP mail server to set up email notifications. Mail services are not
enabled on this domain for the student system.
• Click the Workflow Subsystem tab.
In this tab, you enable Workflow and Case Analyzer and adjust tuning parameters.
Explore the Global Configuration folder structure.
In this task, you explore the properties and objects that are located in the Global
Configuration folder.
• On the left pane of the EDU_P8 tab, expand Global Configuration >
Administration > Sites > Initial Site (Default).
This is the site that is created when you create a P8 domain. This site is set as the
default site for the domain.
You can create a new site and set it as the default site. You can have multiple sites
in a single FileNet P8 domain.
• Observe that there are several nodes listed under the Initial Site (Default) node.
The default site contains the associated resources such as virtual servers, index
areas, and object stores.
Any resources that are added to the domain are associated with the default site,
unless otherwise specified.
• Select the Initial Site (Default) node and then on the right pane, explore the
subtabs that are available for the Initial Site (Default) tab.
• On the left pane of the EDU_P8 tab, expand Global Configuration >
Administration > Database Connections and select FNOSDS.
The FNOSDS tab opens.
• On the right pane, click the Properties subtab of the FNOSDS tab and then
examine the data source properties and the database type.
• Click the Object Stores tab.
The object stores that use this database connection are listed.
• Click the Sales object store.
A new tab opens for the Sales object store. You will explore the object store in the
next task.
• Close the Sales tab by clicking the X on the tab, and then close the FNOSDS tab
by clicking Close.
• From the EDU_P8 tab, on the left pane, collapse the Administration folder,
expand the Global Configuration > Data Design and click the Add-ons folder.
On the right pane, object store add-ons are listed. When you create a new object
store, you choose from this list of Add-ons. Each Add-on provides predefined
metadata that extends the basic operation of IBM FileNet P8 Platform. For
example, Thumbnail Extensions are required if your object store needs to support
thumbnails.
• Close the Add-ons tab.
• On the left pane, notice the Data Design > Marking Sets folder.
Marking Sets are primarily used for records management. No Marking Sets are
defined in this domain.
Explore the Object Stores folder structure.
In this task, you explore the objects and properties that are located in the Object stores
folder.
• On the left pane of the EDU_P8 tab, collapse the Global Configuration folder and
expand the Object Stores folder.
A list of object stores that exist in the EDU_P8 domain are shown.
• Click the Sales object store.
The Sales tab opens.
• On the left pane, expand the Administrative > Workflow system and observe
that there are nodes for Connection Points and Isolated Regions.
To learn more about how to configure a workflow system, refer to the F231G: IBM
Case Foundation 5.2.1 - Configure the workflow system course.
• On the left pane, collapse Administrative, expand the Browse folder and then
verify that there are two main nodes: Root Folder and Unfiled Documents.
• Expand Root Folder to view all the top-level folders that exist in this object store
and then click Orders folder to open it.
• From the Orders tab > Contents subtab on the right, notice a list of documents
that are filed in this folder.
• Open a document by clicking the link in the Containment Name column.
The document opens in a separate tab with the document name. You can access
the properties and settings of the document.
• On the left pane, collapse the Root Folder and then click the Unfiled Documents
node.
If any documents are added to this object store but not filed in a folder, they will be
listed under this node.
• Close all open tabs on the right pane.
• On the left pane, collapse the Browse folder and expand the Data Design node.
Under this node, are objects that are used to define metadata such as property
templates, classes, and choice lists.
• Expand Classes > Document to view all the document subclasses.
• Expand the Order subclass and notice that there are sub-classes that are called
ProductOrder and ServiceOrder.
• Click Order to open the Order tab on the right pane.
• From the Order tab, click the Property Definitions subtab to access the property
definitions that are defined for the Order class.
You will explore these property definitions in the following steps.
• Collapse Classes, expand the Property Templates folder and then scroll down to
customer_name.
You can type the name in the filter field to find it quickly.
This is one of the property definitions that you saw for the Order class in the prior
step.
• Click customer_name to open it and explore the subtabs under the
customer_name tab.
• Close all open tabs on the right.
Find specific objects in a FileNet P8 Domain (Optional).
In this task, you will use Administration Console for Content Platform Engine (ACCE) to
find specific objects in the FileNet P8 Domain. For more details, refer to the previous
tasks.
• In ACCE, open the Sales object store, if it is not already opened.
• How many property definitions are defined for the PriceQuote document class?
• What are the names of the two workflows in the Workflows folder?
• Verify your answers:
The names of the two workflows are: Sample Workflow, and Test Subscription
Workflow.
• Click the Head and Shoulder icon on the banner and select Log out to log out of
the Administration Console for Content Platform Engine.
• Close the browser.
All the repositories that are configured for this desktop are shown in the list.
• Select the Sales repository.
This the repository that you explored in the Administration Console for Content
Platform Engine (ACCE) tool in a previous activity.
On the left pane, under the Sales repository, a list of top-level folders, to which the
user has access is shown.
• Click Workflows and then observe that there are two documents filed in this folder.
This the folder that you explored in the ACCE tool in a previous activity.
The documents in the selected folder are shown on the right pane. If there are any
subfolders, they will also displayed.
• On the left pane, click the Orders folder, select a document (for example, PO
3411.tif) by clicking the document title.
Single-click the document to view the properties on the lower right pane. A double-
click opens the document in the Viewer (for the document mime types that are
configured for this desktop).
Content Navigator provides a thumbnail view of the document on the upper right
pane.
• Review the information that is shown in the Properties section on the right pane.
The document class is ProductOrder.
It includes many custom properties that are specific to product order documents,
such as customer_id, customer_name, po_number, and product_ids.
Configure logging
The Content Platform Engine, which is the main component of IBM FileNet P8
Platform, provides logging capabilities for tracking functional issues and
troubleshooting. In this section, you will learn how to monitor the system logs and
configure trace logging for troubleshooting.
Content Platform Engine System Logs
Content Platform Engine produces several log files during normal operation. Following
are the primary troubleshooting tools for the administrator:
• p8_server_error.log
• pesvr_system.log
• p8_server_trace.log
You must become familiar with normal log entries and monitor these log files to do the
following tasks:
• Observe changes in behavior that might indicate a problem.
• Ensure that log files are managed.
Keep the files to a reasonable size, roll over to new files and deleting old ones
(when you no longer need them).
If the organization uses workflows, the following tools are available to monitor the
workflow system:
• vwtool
• vwmsg
• pelog
• peverify
The IBM Case Foundation administration courses will help you use these tools
effectively.
WebSphere
• Location: install_root/profiles/profile_name/logs/server_name
• Examples of log locations:
WebSphere (Windows): C:\Program
Files\IBM\WebSphere\AppServer\profiles\ AppSrv01\logs\server1
WebSphere (Linux):
/opt/ibm/WebSphere/AppServer/profiles/AppSrv01/logs/server1
• Log files:
• SystemOut.log
• SystemErr.log
• startServer.log
• stopServer.log
WebLogic
• Location:
oracle_home/admin/domain_name/aserver/servers/AdminServer/logs
• Examples of log location:
C:\bea\user_projects\domains\base_domain\servers\AdminServer\logs
• Log files:
• AdminServer.log
• access.log
• Base_domain.log
Note that the MustGather technote
(https://www.ibm.com/support/docview.wss?uid=swg21308231) provides suggestions
for what data and logs to collect when reporting an issue with support. If your
organization has a dedicated web application server administrator, you will need to
collaborate to capture the requested web application server logs.
Trace logs
Trace logs are used to troubleshoot specific issues. Trace logging is typically
implemented to collect and record information about application failures in test or
production environments. If you open a support call, the representative might request
that you enable trace logging and reproduce the issue. In that situation, the
representative recommends which subsystem flags to enable and what level of detail to
collect.
You can configure trace logging at the domain level or the site level. The site-level
configuration takes precedence over any domain level settings. Site level configuration
is used in organizations that have servers and users in more than one geographical
location. For details about Domain and Site, see the Architecture and domain structures
section in this course.
Use Administration Console for Content Platform Engine to configure trace logging,
including configuring the level of detail for server trace logging and setting the location
of the trace log file. The configuration is done on the Trace Subsystem tab of the
domain properties. The default file name is p8_server_trace.log.
Disable trace logging when you no longer need it. Trace logs can grow quickly and
impact system performance and disk space.
Guidelines for monitoring log files
• Establish a baseline and know what to expect.
Part of detecting problems is being aware of what normal activity looks like. If you
establish a baseline of activity and you are familiar with the normal error messages
that your system generates, you can better detect anomalies, such as new or more
frequent error messages.
• Monitor logs regularly.
Watch for new error messages and any change in error log size.
Example: If the size of a log file is normally 64 KB, and on one day it shows 100 KB
Log level sizes can be a clue that something is wrong. For instance, a single error
might produce a new log entry every 5 minutes. This new log entry causes the log
file to grow much more quickly, which you first detect by observing the change in
the log file size.
Tools such as ECM System Monitor can be used to generate alerts when unusual
activity occurs.
• Increase monitoring after any system changes.
Example: Patches applied
• Keep records of normal logs for comparison purposes.
If you keep a week of logs each month, you have comparison information to use in
case of a change. If you keep more than that, you might be using more space than
you need. If there no major changes to the log behavior after a year or so, you
might decide to keep a week of logs for the whole year.
• On the left navigation pane, expand Troubleshooting and then click Logs and
trace.
• On the right pane, click the server1 link in the Server column.
• Click Diagnostic Trace under General Properties section.
On the Configuration tab of the Diagnostic trace service page, notice that you can
control the Maximum File Size, Maximum Number of Historical Files to keep before
overwriting, File Name, and location of the trace log.
• On the Configuration tab, select None to disable the trace output and then click
OK at the end of the page.
• In the Messages section, click Save to save the configuration.
• Log out of the WebSphere Integrated Solutions Console and close the browser.
The change does not take effect until WebSphere Application Server is restarted.
You restart WebSphere Application Server in the next task.
Archive old log files.
In this task, you stop the server and archive the WebSphere Application Server and
Content Platform Engine logs.
• Open the WebSphere Admin folder on the desktop, right-click the _4 Stop
server1.bat file, and then select Run as administrator from the list.
• Click Yes when you are prompted with the User Account Control dialog box to
allow the program to run.
Wait for the operation to complete (the command window closes).
• Minimize the WebSphere Admin folder window.
• Maximize the Windows Explorer window where you viewed the Content Platform
Engine log files earlier: C:\Program
Files\IBM\WebSphere\AppServer\profiles\AppSrv01\FileNet\server1.
• Create a folder that is called Archived_CPE_Logs (this name is not critical) in this
directory to store the archived Content Platform Engine logs and move all the four
*.log files to the new folder.
• Select the Do this for all current items option and then click Continue when you
are prompted with the File Access Denied dialog box to move the files.
• Minimize the Windows Explorer window.
Maximize the Windows Explorer window where you viewed the WebSphere
Application Server log files earlier: C:\Program
Files\IBM\WebSphere\AppServer\profiles\AppSrv01\logs\server1 folder.
• Create a folder that is called Archived_WAS_Logs (this name is not critical) in this
directory to store the archived WebSphere Application Server logs and move the
SystemOut.log, startServer.log, and SystemErr.log files to the new folder.
• Select the Do this for all current items option and then click Continue when you
are prompted with the File Access Denied dialog box to move the files.
• Minimize the Windows Explorer window.
• Open the WebSphere Admin folder on the desktop, right-click the _1 Start
server1.bat file, and then select Run as administrator from the list.
• Click Yes when you are prompted with the User Account Control dialog box to
allow the program to run.
Wait for the operation to complete (the command window disappears).
• Minimize the WebSphere Admin folder window.
Examine the new log files
If no log files exist, the Content Platform Engine and the WebSphere Application Server
create new logs at startup.
• Maximize the Windows Explorer window where you viewed the Content Platform
Engine log files earlier: C:\Program
Files\IBM\WebSphere\AppServer\profiles\AppSrv01\FileNet\server1.
• Notice the four log files that are created with the current date and time.
• Right-click the p8_server_error.log file, select Edit with Notepad++, and
examine the log entries that are created during startup.
Cancel any prompts to update to the Notepad++ version.
• Maximize the Windows Explorer window where you viewed the WebSphere
Application Server log files earlier: C:\Program
Files\IBM\WebSphere\AppServer\profiles\AppSrv01\logs\server1 folder.
• Notice that the log files (that were archived) are created with the current date and
time.
• Open SystemOut.log with Notepad++ and examine the log entries that are
created during startup.
• Scroll down the log file to the text P8 Content Platform Engine Startup: 5.5.2.0
as shown in the following screen capture.
You can also search for the text: P8 Content Platform Engine Startup
• On the right pane, from the EDU_P8 tab, select the Trace Subsystem subtab.
Use the forward arrow on the right to scroll to find the tab. You can also use the
down arrow to select the subtab from the list.
If the contents of the tab is displayed, click the tab and the content will be
refreshed.
• On the Trace Subsystem subtab, select the Enable trace logging option.
• For the Log file location field, select the Use default option.
The trace log is saved in the same folder as the Content Platform Engine log files.
• Scroll down to the Subsystems section and select the Detail level trace options
for the following subsystems:
• Error Trace Flags
• Search Trace Flags
Moderate and Summary levels are automatically selected.
Log files at the Detail level grow quickly. Enable only the subsystems that you
need. Remember to disable trace logging when you no longer need it.
• Click Save to save the EDU_P8 domain configuration and then click Refresh.
• On the left navigation pane, expand the Global Configuration > Administration >
Sites folder and select Initial Site (Default).
• From the Initial Site tab on the right, select the Trace Subsystem subtab and
verify that EDU_P8 (server hierarchy object) as the Configuration source.
• If it is not already selected, select the option, click Save, and then click Refresh.
Ensure that Enable trace logging is selected.
• Log out of the administration console and close the browser.
• Maximize the Windows Explorer window where you viewed the Content Platform
Engine log files earlier: C:\Program
Files\IBM\WebSphere\AppServer\profiles\AppSrv01\FileNet\server1.
• Open the p8_server_trace.log file in Notepad++ and then verify that the file
contains a couple of DEBUG level entries at the end of the file.
The Debug value is on the Sev column of the log file.
• Close the trace log file and minimize the Notepad++ window.
Configure trace logging at the site level.
In the previous task, you enabled trace logging at the domain level. In this task, you
configure the trace logging at the site level and it will override the domain settings.
• In the Mozilla Firefox browser, click the ACCE bookmark or type the following
URL: http://vclassbase:9080/acce
• Type p8admin for the User name field, FileNet1 for the Password field, and then
click Log In.
• In the ACCE, on the left navigation pane, expand the Global Configuration >
Administration > Sites folder and click Initial Site (Default).
• From the Initial Site tab on the right, select the Trace Subsystem subtab and then
select Initial Site (this object) for the Configuration source field.
• When you are prompted with a dialog box Selecting this option means…, click
OK and then verify that Enable trace logging is selected.
The parent (domain) configuration values that apply to child objects will not apply to
this node (site). Since the settings are configured on the site, it will override the
settings on the domain, and so domain configurations values will not apply.
• For the Log file location field, select the Other location option and then type
C:\temp.
The trace log will be saved to this new folder.
• Maximize the Notepad++ window with the p8_server_trace.log file opened and if
prompted, click Yes to reload the file.
• In Windows Explorer, navigate to the C:\temp folder and open the
p8_server_trace.log file again.
• Search for the word Olivia and review the log entry.
Some log entries show Olivia’s login event.
• Close the trace log file and then exit Notepad++.
• Log out of the IBM Content Navigator desktop and close the browser.
Disable trace logging.
Trace logging affects system performance and uses disk space. It is a good practice
not to leave trace logging enabled for long periods of time.
• In the Mozilla Firefox browser, click the ACCE bookmark or type the following
URL: http://vclassbase:9080/acce
• Type p8admin for the User name field, FileNet1 for the Password field, and then
click Log In.
• On the EDU_P8 tab, open the Trace Subsystem subtab.
• Clear the Enable trace logging option, click Save, and then click Refresh.
Even if you configured trace logging at the Site level and those settings override
any global (domain) settings, you still have to disable trace at the domain level.
• On the left navigation pane, expand the Global Configuration > Administration >
Sites folder and click Initial Site (Default).
• From the Initial Site tab on the right, select the Trace Subsystem subtab and then
clear the Enable trace logging option.
• Click Save, and then click Refresh.
• Log out of the administration console and close the browser.
Optionally, you can repeat the earlier Create trace log entries task with a different
user (Oscar, FileNet1) and check the trace log file. You will not find any entries for
Oscar since you disabled the trace logging.
• Close all the open Windows Explorer windows.
Configure auditing
The Content Platform Engine, which is the main component of IBM FileNet P8
Platform, provides auditing capabilities for tracking additions, changes, and deletes to
the object store content. In this section, you will learn how to configure auditing.
What is auditing?
Auditing is the automatic logging of actions that are performed on a FileNet P8 object or
a class.
• You can audit custom or system events that occur for objects so that you can track
critical activities.
• Most events on FileNet P8 classes can be audited including the events for security,
content management, and business transactions.
• The automatic logging of an event creates an audit entry in the audit log (in the
database Event table).
• Audit entries can be programmatically created by custom applications.
For example, you can configure an audit definition for a document class to automatically
log audit entries whenever documents of that class are checked in. Checking in a
document is the initiating action that causes the CheckinEvent event to fire, which in
turn causes an audit entry to be logged.
The following representation shows the sequence of cause and effect:
Initiating action (Checking in) => Event fired on source object (CheckinEvent) => audit
entry created in the audit log
Reasons for auditing
You configure auditing to gain information about objects:
• How often was this document accessed?
• When did this property value change?
• Which user made the change?
• Who deleted that document?
With auditing, you can record every time a document is opened, any changes to this
document, and every time something was filed in a folder. You can also monitor if a user
tries to open a document while lacking read access (denial of access).
• On the Sales tab > General subtab, scroll down and select Yes from the list for the
Enable auditing field (third row from the bottom of the page).
Verify that your audit definitions are listed on the Audit Definitions subtab of the
Order tab with the values that you selected.
• On the left pane of the EDU_P8 tab, expand the Object Stores folder and then
click the Sales object store.
• On the left pane of the Sales tab, expand Browse > Root Folder and then click
Orders.
• Click the link to open the document that you changed in the previous task
(Example: Order Basic A).
• In the Order Basic A tab, open the Audit History tab.
Use the down arrow on the right and select the tab name from the list.
• Click Refresh and then verify that there is at least one audit log entry.
• To examine the information that is provided in the audit entry, click the Update link.
• In the Update tab, under the General subtab, examine the values in the fields.
• On the left pane, from the Sales object store, click the Orders folder.
• On the right pane, right-click a document (Example: PO 3411.tif) and then select
Check Out > Check Out and Download.
• In the dialog box, select Save File and then click OK.
The file is saved in the Downloads folder.
• Right-click the same document and select Cancel Check Out.
• Right-click the same document, select Delete and then confirm the Delete.
• Log out of the IBM Content Navigator desktop and then close the browser.
Query the audit log.
In this task, you use the administration console Search page to find audit log entries.
• In the Mozilla Firefox browser, click the ACCE bookmark or type the following
URL: http://vclassbase:9080/acce
• Type p8admin for the User name field, FileNet1 for the Password field, and then
click Log In.
• On the left pane of the EDU_P8 tab, expand the Object Stores folder and then
click the Sales object store.
• On the left pane for the Sales object store tab, click the Search icon.
• From the Saved Searches tab on the right, click New Object Store Search to
create a new search.
• In the New Object Store Search tab > Simple View subtab, select the values for
the following fields:
• Class: Object Change Event
• Column A: Date Created
• Condition: Less than
• Value: Tomorrow’s date and any time
The Completed New Object Store Search contains the class and date that you
entered.
You can also search for the Event parent class (instead of Object Change Event)
which will return more results.
• Scroll down and in the Search Result Display section, select Audit Sequence for
the Order By field.
• In the Save Query window, type Object Change Event Query for the Document
Title field, and click OK.
Note that what name you provide is not critical.
• Click Close the new search tab and click Yes in the message window to save the
changes.
• In the Saved Searches tab, click Refresh.
Your saved search is listed and can be used for future use.
• Log out of the administration console and close the browser window.
With the value you provided, the audit disposition policy will delete the audit logs
that are older than 10 minutes.
• On the Summary page, verify the values that you entered, click Finish, and then
on the Success page, click Close.
• In the Audit Disposition Policies tab, click Refresh.
Verify that your new audit disposition policy is listed.
• Close the Audit Disposition Policies and Sales tabs and leave the administration
console open for the next task.
Configure the audit subsystem.
The audit subsystem controls the pruning of the audit entries from the audit log. In this
task, you enable the audit subsystem so that the auto disposition policy that you defined
in the previous task can run.
• In ACCE, select the Audit Subsystem subtab from the EDU_P8 tab on the right
pane.
Use the down arrow on the right to select the tab.
• Click Refresh if the content on the tab is not displayed.
• On the Audit Subsystem subtab, select the Enable audit pruning option.
Since you deleted the audit entries by using an audit disposition policy, the search
returns zero results.
• Close the Object Change Event Query, Saved Searches, and Sales tabs.
• In Windows Explorer, navigate to the folder that contains the Content Platform
Engine server logs: C:\Program
Files\IBM\WebSphere\AppServer\profiles\AppSrv01\FileNet\server1
• Open the p8_server_error.log file in Notepad++, scroll to the end of the file, and
then verify that a full audit disposition sweep was completed.
Note: A single line on the log file is shown in two screen captures.
• Close the file, minimize the Notepad++ and the Windows Explorer windows.
Configure an audit disposition schedule.
In this task, you create a schedule for the audit subsystem so that the audit disposition
policy runs every 5 minutes, one day a week.
• In the ACCE, select the Audit Subsystem subtab from the EDU_P8 tab on the
right pane.
• On the Audit Subsystem subtab, scroll down to the Schedule area and click
New.
• Use the following values for the fields to configure on the New Time Period dialog
box:
• Day of week: Today’s day of the week
• Start time: Current system time plus 5 minutes
• Duration: 0 hours 15 minutes
For the Start time field, select closest time slot that is listed, then edit the value.
• Click OK on the dialog box and then click Save on the EDU_P8 tab.
• Log out of the administration console and close the browsers.
Lengthy lines on the log file are shown in two screen captures.
The Audit Disposition subsystem is delaying until the time that you scheduled as
the start time. If the start time is reached, there will not be any delay queues,
instead there will be an entry with a full audit disposition sweep that is completed.
• Check the p8_server_error.log again after 5 minutes and then keep checking the
log until after the 15-minute duration time expires.
Notice that after the duration time expires, there are no more entries that are
logged for a full audit disposition sweep. The next audit disposition sweep will run
one week from today, starting with the scheduled start time.
One of the entries should show a number of records that are deleted,
corresponding to the number of documents that you updated.
If the entries are not shown at the expected time, close the file and reopen.
• Close the p8_server_error.log file and then minimize the Notepad++ window.
Disable auditing on the Sales object store.
Since the audit logs can grow quickly and use up storage space, you will disable
auditing for the object store that you enabled earlier.
• In the Mozilla Firefox browser, click the ACCE bookmark or type the following
URL: http://vclassbase:9080/acce
• Type p8admin for the User name field, FileNet1 for the Password field, and then
click Log In.
• On the left pane of the EDU_P8 tab, expand the Object Stores folder and then
click the Sales object store.
• On the Sales tab > General subtab, scroll down and select No from the list for the
Enable auditing field (third row from the bottom of the page).
• Click Save and then click Refresh.
• Log out of the administration console and then close the browser window.
• Security Inheritance
In this scenario, permissions are passed from a parent object to a child object. For
example, a folder could be a parent of a subfolder or a document. Because of the
security inheritance, an administrator can apply security permissions to many
objects in one operation by setting the permissions at the parent level.
• Security Template
Template permissions are assigned to the objects by a security policy. Security
policies along with document versioning states allow an administrator to configure
the system to automatically modify ACLs on documents when their versioning state
changes.
For example, the administrator can configure a system to automatically grant
access to a document to a wide audience when it is released.
Order in which security source permissions are granted
Each ACE has one access type either allow or deny. When evaluating the access
granted by a particular ACL, the current system applies ACEs in the following order:
ACE source and type are listed on each bullet.
• Direct/Default - Deny
• Direct/Default - Allow
• Template - Deny
• Template - Allow
• Inherit - Deny
• Inherit - Allow
Higher on the list takes precedence over the lower. Deny takes precedence over allow
within each category. For example, if you explicitly deny an access right to a group and
explicitly allow it to a member of that group, the access right will be denied to the
member.
#AUTHENTICATED-USERS group
This special group represents all users in the LDAP domain who are defined for IBM
FileNet P8 Platform and who have been authenticated by the application server. You
use this group if you want to grant access to a document to all users of IBM FileNet P8
Platform.
Object ownership
Most objects have an owner who is typically the user who created the object.
IBM FileNet P8 Platform automatically applies an internal special user account called
the #Creator-Owner and grants full control access on that object. System administrators
can take ownership when necessary to change the object's security.
Add a new security user or group to an existing object store?
There are situations where you want to add a new security user, group, or admin to an
existing object store. The best practice is to setup user groups (instead of individual
users) to define security on the object store when it is created. In this way, if you want to
add a new admin, you just need to add the administrator user to the LDAP group, there
is no change required on the FileNet Platform.
If individual users are used in the initial setup, and now if you want to add a new admin,
you need to use the ACCE Security Script wizard. If you add the new user to an
existing object store or domain directly (without the wizard), the user will have
permissions only on those objects that are created after the addition of that user. In
order for any new users to have default permissions to all existing objects requires the
use the ACCE Security Script wizard. The wizard updates the security of an existing
object store with users and groups as if those users and groups had been added when
the object store was originally created.
Independent and dependent security
Most objects have Access Control Lists (ACLs) that can be independently set. These
objects are called independently securable.
Dependently securable objects depend on their parent object for their access rights.
They are secured through the parent object.
Examples of dependently securable objects:
• Content elements, which have the same security as the associated document
object
• A property that is assigned to a securable object, which has the same security as
that object
• The individual choices in a choice list, which have the same security as the object
that the choice list is assigned to
• A lifecycle state in a lifecycle policy
Security is more than securing documents and folders. The security of the system
design determines which objects are securable by which users. For example,
administrators might be responsible for securing the domain root and the object stores.
Application builders might be responsible for securing classes, instances like stored
searches and entry templates, and property templates. Authors might be responsible
for securing folders and documents.
IBM Content Navigator Desktop security
A desktop is configured to authenticate users against a specific repository in your
environment. Users who want to access this desktop must be defined as having access
to that repository. Also, you can limit access to the desktop to a specific set of users
and groups in your repository.
A user can log in to Administration Console for Content Platform Engine but be unable
to log in to the IBM Content Navigator Desktop if that user is not authorized to access
that specific object store.
• Type p8admin for the User name field, FileNet1 for the Password field, and then
click Log In.
The ICN admin desktop opens.
On the Desktops tab, the available desktops for this ICN instance are listed. From
this admin client, you can configure all the ICN features for your desktops.
• Click Repositories from the left navigation pane.
• From the Repositories tab on the right pane, notice the list of repositories.
The Server Type column shows that all these repositories are of IBM FileNet
Content Manager type. You can also configure other type of repositories. You must
configure a FileNet P8 object store in this tab by using the Server URL to be able to
access the content for that object store.
• Close the Repositories tab.
• On the Desktops tab, select Sample and click Edit.
This is the Sample Desktop that you were using for the earlier activities.
• On the Sample tab > General subtab, verify that LoanProcess repository is listed
under the Authentication section.
When users log in to Sample desktop, ICN authenticates the users against the
LoanProcess object store. If the user does not have access to this object store, the
access to the ICN desktop is denied.
• On the Sample tab, select the Repositories subtab and observe the list of
repositories.
Recall that these repositories were displayed on the Sample desktop in the
previous tasks and authorized users were able to access content.
You can learn more on configuring repositories and desktops in the IBM Content
Navigator courses.
• Log out of IBM Content Navigator and then close the browser.
Observe object store access.
Object stores are usually secured by using group memberships. Users who have
access to object stores can log in and use the object stores. Each user, depending on
their role, has access to some but not necessarily all the object stores in an IBM
Content Navigator (ICN) desktop. In this task, you will sign in as Mary and verify that
Mary is able to access the LoanProcess object store but not the other object stores that
are available in the ICN desktop.
• In the Mozilla Firefox browser, click the Sample Desktop bookmark or enter the
following URL: http://vclassbase:9081/navigator.
• Type Mary for the User name field, FileNet1 for the Password field, and then click
Log In.
• Verify that Mary is able to access the folders and documents in the LoanProcess
object store.
• Double-click the folders in the right pane to open them.
You can also click the folders from the left navigation pane.
• To open another repository, click the down arrow next to LoanProcess on the
upper right.
All the repositories that are available for this desktop are shown in the list:
LoanProcess, Sales, LoanProcessQA, and SalesQA
• Attempt to open each of the object stores in the list by clicking it and verify that
Mary is denied access to the other repositories.
• Log out of IBM Content Navigator and then close the browser.
• From the J Jones' Loan tab, select the General subtab, scroll down, and observe
the Inherit Security from folder field.
If a value is assigned to this field, it indicates the folder object (security parent) from
which this document inherits security.
You can learn about security inheritance and other security concepts in another
course.
• Close the J Jones' Loan tab and the Loans tab.
• From the LoanProcess tab, on the left pane, collapse the Browse node, expand
the Data Design > Classes node and click the Document class.
• From the Document tab on the right pane, select the Default Instance Security
subtab.
In the Default Instance Security subtab, the ACL list that is under the Access
Permissions section, will become the default security for the documents that
belong to this Document class.
• Log out of the administration client and close the browser.
• On the Add Document page, type AccessLoan for the Document Title field.
• For the What do you want to save? field, click Browse.
• On the File Upload page, navigate to the C:\Training\F2800G\SampleDocs
folder, select any file (Example: MarketingPlan5.pdf), and then click Open.
• In the Add Document page, leave the default for all the other fields and observe
the security that is assigned to this document.
The Owner group has the following members: P8Admin, P8Admins, and Mary
The Readers group has the following members: Loan managers, Loan officers,
Loan processors, and Loan underwriters
• Click Add and then, on the Browse page, verify that the new document is listed.
• Click the head and shoulder icon in the banner, click Log Out to log out of IBM
Content Navigator and then close the browser.
For all the following tasks, when you log out as one user and before signing in as
another user, close the browser to avoid any caching issue.
Verify access to the document by a different user.
Since Matt is a member of the Loan managers group which is authorized to view the
document created in the previous task, Matt should be able to access the document
that Mary created. In this task, you will verify the access by logging in as Matt.
• In the Mozilla Firefox browser, click the Sample Desktop bookmark or enter the
following URL: http://vclassbase:9081/navigator.
• Type Matt for the User name field, FileNet1 for the Password field, and then click
Log In.
• From the LoanProcess repository, double-click the SecurityTest folder to open it
and then verify that you can access the AccessLoan document.
• Right-click the document and then verify that user Matt has access to open,
preview, or download the document (these actions are enabled) but he cannot
delete this document (action is grayed out) since he is not the owner of this
document.
Matt also cannot check out the document because the Loan managers have only
Reader access. In a later task, you will change Matt to be the owner of the
document.
• Log out of IBM Content Navigator.
• Click OK, verify that Loan officers are now in the Authors group, and then click
Save.
• Log out of Sample Desktop, close the browser, and then log in as Olivia
(Password: FileNet1).
• Open the SecurityTest folder, right-click the AccessLoan document, and then
verify that Olivia now has access to check out the document (this action is enabled)
because the Loan officers have been given Author access.
• Log out of IBM Content Navigator Sample Desktop and close the browser.
Change ownership.
The user Mary is the owner of the document that you created in the earlier task and this
user has full access to the document. Mary will no longer be working on this document
and she wants to change the ownership to Matt who is also a member of the Loan
managers group. You have already checked that Matt does not have checkout or
delete access to this document. In this task, you will make Matt the owner of the
document, and then recheck his access.
• Log in to IBM Content Navigator Sample Desktop as Mary (Password:
FileNet1).
• Open the SecurityTest folder and then open the Properties page for the
AccessLoan document.
• On the document's Properties page, click the Security tab and then for the Share
with field, click Select next to the Specific users and groups.
• On the Add Permissions page, for the Search for field, verify that Users is
selected, type Matt, and then click the Search icon.
• Select Matt from the Available pane and move it to the Selected pane by using
the forward arrow.
• At the end of the page, make sure Owner is selected for the Permissions field
and then click Add.
• Back on the Properties page, verify that Matt is added to the list of Owners, and
then click the X on Mary to remove the user from the Owners list, and then click
Save.
• On the Browse page, right-click the AccessLoan document, and then verify that
Mary no longer has Owner access.
Delete, checkout and a few other actions are now disabled. Since she is part of the
Loan managers group, she continues to have Reader access through that
membership and can open or download the document.
• Log out of IBM Content Navigator and close the browser.
• On the Add Users and Groups page, search for Matt (by Short name).
• Select Matt from the Available Users and Groups pane and then move Matt to
the Selected Users and Groups pane by clicking the forward arrow.
• Scroll down, click OK, and then verify that Matt (matt@edu.ibm.com) is now the
owner on the AccessLoan tab.
• Click Save, click Refresh, and then click Close to close the AccessLoan tab.
• Close the SecurityTest tab.
• From the LoanProcess tab, click Refresh.
This completes the change of ownership at all levels.
• Log out of Administration Console for Content Platform Engine, and then close
the browser.
• Scroll down to the Permissions section, select Major versioning from the
Permission group list.
Verify that the following individual permissions are automatically selected: View all
properties, View content, Change state, Major versioning, Read permissions,
Unlink document, Modify all properties, Link a document / Annotate, Create
instance, and Minor versioning.
• Click OK and back on the Access Test tab, click Save.
Edit security settings.
For this scenario, the Major versioning Permission group grant access to more
actions than what you want to grant to the Case workers group. You can control the
security at a more granular level by setting custom permissions. In this task, you will
modify the permissions to a custom level.
You are already logged on to Administration Console for Content Platform Engine as
p8admin. You are viewing the Access Test document security tab.
• On the Access Test tab > Security subtab, select the Case workers row under
Access Permissions section and then click Edit.
• In the Edit Permissions page, under the Permission group section, clear the
Unlink document permission.
• Confirm that the value for the Permission group field changes to Custom.
• Indirectly: You indirectly change the resource status when you set a storage area
to be online or offline. For example, enabling the storage area to be online causes
the resource status to be Open, and disabling the storage area causes the
resource status to be Closed.
• Directly: You can directly change the resource status for a storage area.
What is storage policy?
A storage policy provides mapping to specific physical storage areas and is used to
specify where content is stored for a class or object with content (for example, a
document). Each storage policy can have one or more storage areas as its assigned
content storage target.
• Verify that the value for the Total files field is 0 (zero) and then close the tab.
• On the left pane, collapse the Administrative node and then expand Browse.
• Right-click Root Folder and then select New Folder to create a folder.
• From the New Folder tab on the right pane, type Test for the Folder name field
and then click Next.
• Leave the defaults, click Next one more time, and then on the Summary page,
click Finish.
• Click Close on the Success page and then click Refresh on the LoanProcessQA
tab.
• On the left pane, expand Browse > Root Folder, right-click the Test folder, and
click New Document to add a document.
• From the New Document tab on the right pane, type TestDoc for the Document
title field, select the With content option, and then click Next.
• On the Document Content Source page, under the Content Elements section
click Add.
• On the Add Content Element dialog box, click Browse.
• On the File Upload window, select a document (Example: SampleDoc1.docx)
from the C:\Training\F2800G\SampleDocs folder and then click Open.
• On the Add Content Element dialog box, click Add Content.
• Click Next four more times (On the Document Content Source, Object
Properties, Document Content and Version, Specify Settings for Retaining
Objects pages).
• On the Advanced Features page, verify that Default Database Storage Policy is
selected and then click Next.
This default policy is associated with the default storage area. After you add this
document, there will be a change in the total number of files for the default storage
area.
You will work with Storage policy in the following activity.
• On the Summary page, click Finish and then click Close on the Success page.
View the default storage area statistics again:
• On the left pane, navigate to Administrative > Storage > Storage Areas and click
Default Database Storage Area.
• From the Default Database Storage Area tab on the right, open the Statistics
subtab and click Refresh.
• Verify that the Total files field now has a value: 1 (one).
• Expand the filenet folder and observe that there are several folders: BulkMoveFS,
file_stores, file_stores2, and PurchaseOrderFS.
These folders are the root directories for file storage on the student system.
You can use any string value for the base and root directory names. You can
select any location in your local or distributed file system for the base directory.
Content Platform Engine should have full access permission to these folders.
• Open the file_stores\content folder and verify that there are 23 folders that are
named FN0 to FN22.
These directories store the committed content element files. The Storage Area
wizard creates these content folders.
• Expand the FN0 (or any one of the 23 folders) folder and verify that each of them
contains a set 23 folders that are named FN0 to FN22.
• Expand the file_stores\inbound folder and verify that there are several folders.
The inbound folder is the working area for uploading new content.
Create a subdirectory for the file storage area.
In this task, you will create a subfolder to use it as a root directory for the new file
storage area.
• In Windows Explorer, navigate to the C:\filenet folder and then create a folder
with a name: Loan_filestore
• Right-click the Loan_filestore folder and select Properties.
• In the Properties window, click the Security tab and then verify that the permission
for the non-admin users (Example: EDU\Users) is read-only to the folder.
Only the system admin user must be able delete and write files in the file store
directories.
• Click Cancel and then close the Windows Explorer.
• For all other fields, leave the defaults and click Next.
Click the information icon next to each field name to get more details about that
field.
• For Select a Storage Policy for this Storage Area, leave the defaults (not
selected) and click Next.
You will create a storage policy in the next activity.
• Click OK to close the message about mapping the storage area to a storage policy.
• On the Summary page, review the details and click Finish.
• On the Success page, click Close to close the tab.
• On the Storage Areas tab, click Refresh and then verify that the Loan Storage
Area is listed.
• Notice that Loan Storage Area has the Type that you assigned (File Storage
Area) and the Total Files column has zero (0) as the value.
• Log out of the administration console and close the browser.
Verify the storage area directory structure.
• In Windows Explorer, navigate to the C:\filenet\ Loan_filestore folder.
• Open the Loan_filestore folder and observe the structure.
Verify that content and inbound directories are created. The wizard also creates a
folder that is called system and an xml file with the name: fn_stakefile.xml
• Expand the content folder and verify that there are 23 folders that are named FN0
to FN22.
• Open the FN0 (or any one of the 23 folders) folder and verify that each of them
contains a set of 23 folders that are named FN0 to FN22.
• Open the C:\filenet\ Loan_filestore\inbound folder and verify that there are
several folders.
• Close Windows Explorer.
Set default storage for the content of Document class.
In this task, you configure the new file storage area as the default storage container for
the Document class.
• In the Mozilla Firefox browser, click the ACCE bookmark or type the following
URL: http://vclassbase:9080/acce
• Type p8admin for the User name field, FileNet1 for the Password field, and then
click Log In.
• On the left pane of the EDU_P8 tab, expand the Object Stores folder and then
click the LoanProcessQA object store.
• From the LoanProcessQA object store tab, expand Data Design > Classes on
the left pane and click Document.
• From the Document tab > General subtab, scroll down and select Loan Storage
Area from the list for the Default storage area field.
• Select <None> from the list for the Default storage policy field.
• Click Save on the toolbar and then when prompted, click Cancel on the Propagate
Metadata Changes dialog box.
Depending on the configuration on this page, it affects the subclasses of the
Document.
• Close the Document tab.
• Click Refresh on the LoanProcessQA object store tab.
Edit your storage area.
This task demonstrates how you can edit an existing storage area. You will edit the
Loan Storage Area that you created earlier to modify the properties and update the
Statistics tab.
• From the LoanProcessQA tab, on the left pane, expand Administrative >
Storage > Storage Areas and then click Loan Storage Area.
• From the Loan Storage Area tab on the right pane, click the Configuration subtab
and then edit the following fields.
• Content Caching: Not Allowed
• Delete method: Purge
• From the Loan Storage Area tab, open the Statistics subtab.
• In the Storage Area Maximums section, change Maximum Size to 10 MB.
Click the circle beside the field and change the value.
• In the Storage Policies subtab, observe that the Storage Area is not mapped to
any Storage Policies.
• Click Save to save your changes to the storage area properties and then click
Close.
• From the LoanProcessQA tab, click Refresh.
Add a document to verify the configuration.
In this task, you will verify that adding a document (of Document class) to the system
adds the content to the new file storage area. You will also verify the default storage
area statistics before and after adding a document.
• From the LoanProcessQA tab, expand Administrative > Storage > Storage
Areas and click Loan Storage Area tab.
• On the Loan Storage Area tab, click Refresh, open the Statistics subtab, and
verify that there are zero files.
• Expand Browse > Root Folder, right-click the Test folder, and then select New
Document.
• Type the name for the document: Storage Area Test
• Confirm that Document is selected for the Class field and the With Content option
is selected.
• Click Next and then on the Document Content Source page, click Add.
• On the Add Content Element dialog box, click Browse.
• On the File Upload window, select a document (Example: SampleTextDoc2.txt)
from the C:\Training\F2800G\SampleDocs folder and then click Open.
• On the Add Content Element dialog box, click Add Content.
• Click Next four more times (On the Document Content Source, Object
Properties, Document Content and Version, Specify Settings for Retaining
Objects pages).
• On the Advanced Features page, confirm that Loan Storage Area is selected
and then click Next.
• On the Summary page, click Finish and then click Close on the Success page.
• On the left pane, click the Test folder under the Browse > Root Folder folder.
• From the Test tab on the right pane, click Refresh, verify that your new document
(Storage Area Test) is listed, and then click Close.
• On the Loan Storage Area tab, click Refresh, select the Statistics subtab, and
then confirm that the Loan Storage area now contains one file.
The value for the Total files field shows 1 (one).
• Log out of the administration console and close the browser.
• In the Storage Areas tab, click Refresh and then verify that the FS2 Storage Area
is listed and it has 0 for the Total Files.
• Close the Storage Areas tab.
Configure a new storage policy.
In this task, you create a New Storage Policy and configure it.
• From the LoanProcessQA tab, expand Administrative > Storage and click
Storage Policies on the left pane.
• From the Storage Policies tab on the right, click New.
• On the New Storage Policy tab, type Farm Storage Policy for the Display name
field and then click Next.
• On the Select the Content Storage Method page, choose the Select the storage
Areas from a list option and then click Next.
• For the Storage areas field, select FS1 and FS2 from the list and then click Next.
• On the Summary page, review the information, click Finish, and then click Close.
• On the Storage Policies tab, click Refresh and then verify that your Storage Policy
is listed.
You can add more storage areas to an existing policy from the General tab of that
policy.
Assign the storage policy to the Document class.
In this task, you will remove the previously assigned storage areas and configure the
storage policy for the Document class.
• From the LoanProcessQA object store tab, expand Data Design > Classes on
the left pane and then click Document class.
• From the Document tab on the right pane, under the General subtab, scroll down
to the Default storage policy field and then select Farm Storage Policy from the
list.
• Select <None> for the Default storage area field.
Ensure that <None> is selected for the Default storage area. The Farm Storage
policy specifies the FS1 and FS2 storage areas to save the content for the
Document class.
If both the Default storage area and the Default storage policy are set, the Default
storage area setting takes precedence and the storage policy that you defined is
ignored.
• In the Document tab, click Save.
• When prompted, click Cancel on the Propagate Metadata Changes dialog box.
• In the Document tab, click Refresh and then click Close to close the Document
tab.
• Log out of the administration console and close the browser.
Verify that storage area farming is working.
To verify that the storage area farm functions, you will add some documents to the
LoanProcessQA object store and then view the statistics of the FS1 and FS2 storage
areas.
• In the Mozilla Firefox browser, click the Sample Desktop bookmark or enter the
following URL: http://vclassbase:9081/navigator.
• Type p8admin for the User name field, FileNet1 for the Password field, and then
click Log In.
• From the upper right, click the down arrow next to LoanProcess and select
LoanProcessQA from the list.
• On the left pane, click the Test folder under the LoanProcessQA object store.
• In Windows Explorer, navigate to C:\Training\F2800G\SampleDocs, select and
drag all the files, and drop them to the IBM Content Navigator Test folder.
Note: Add all of the files, but not the subfolders.
In Content Navigator desktop, the Add Documents page opens.
• In Content Navigator desktop, click Add to add all the files and wait for the upload
to complete.
• Verify that the documents are listed in the Test folder and then log out of Content
Navigator desktop and close the browser.
• In the Mozilla Firefox browser, click the ACCE bookmark or type the following
URL: http://vclassbase:9080/acce
• Type p8admin for the User name field, FileNet1 for the Password field, and then
click Log In.
• On the left pane, expand the Object Stores folder and then click the
LoanProcessQA object store.
• From the LoanProcessQA tab, on the left pane, expand Administrative >
Storage, and then click the Storage Areas node.
• In the Storage Areas tab, confirm that FS1 and FS2 have some documents.
Your storage policy used the load-balancing capabilities of the Content Platform
Engine to distribute content within the storage area farm. The documents were
added to both the file storage areas in the storage area farm.
The screen capture that is shown here is a sample. Depending on the number of
documents that you added and how they were load-balanced, you might get
different numbers for FS1 and FS2.
• Log out of the administration console and close the browser.
• On the File System Storage Devices tab, click Refresh and then verify that
AFSD1 is listed.
• Create another File System Storage Device by repeating the above steps and by
using the following values.
• Display name: AFSD2
• Root directory path: C:\filenet\ADVS2
• On the File System Storage Devices tab, click Refresh, verify that AFSD2 is
listed, and then close the tab.
• From the LoanProcessQA tab, click Refresh.
Create an Advanced Storage Area.
In this task, you will create an advanced storage area by using the two advanced
storage devices that you created.
• From the LoanProcessQA tab, on the left pane, navigate to Administrative >
Storage > Advanced Storage and click Advanced Storage Areas.
• From the Advanced Storage Areas tab, on the right pane, click New.
• On the New Advanced Storage Area tab, type ADV_SA for the Display name
field, verify that Initial Site is selected for the Site field, and then click Next.
• On the Configure the Advanced Storage Area page, select AES Counter Mode
with128-bit key for the Encryption method field and then select the Compress
content option.
• Click Next and then on the Associate a Storage Device with this Advanced
Storage Area page, type 2 for the Required synchronous devices field.
• For the Available storage replication devices field, select the two devices that
you created: AFSD1, AFSD2 and then click Next.
The number of required synchronous devices must be greater than zero and equal
to or less than the number of available storage replication devices.
• On the Advanced Storage Area Parameters page, select Validate on creation,
verify that Auto repair on content validation is already selected, and then click
Next.
• On the Select Storage Policies page, select Farm Storage Policy and then click
Next.
• In the Summary page, review the details and click Finish.
• In the Success page, click Close to close the tab.
• In the Advanced Storage Areas tab, click Refresh and verify that the ADV_SA is
listed.
Configure the storage devices.
In this task, you will change one of the storage devices to be the primary synchronous
device. The storage device settings are configured with the defaults. You can change
these settings on the Devices tab of the advanced storage area.
• In the Advanced Storage Areas tab, click the advanced storage area that you
created (ADV_SA).
• In the ADV_SA tab, open the Devices subtab.
• For the AFSD1 row, select Primary synchronous from the list and verify that the
AFSD2 row has the value: Secondary synchronous.
Benefits of containers
Deploying IBM FileNet P8 Platform components on a container platform provides the
following benefits:
• Rapid deployment of components
• Improved patching and upgrading for components
• Dynamic scalability when running on the Kubernetes container platform
• Improved resiliency for your products
Available containers for IBM FileNet P8 Platform
The following components are available as a container:
• Content Platform Engine
• Content Search Services
• IBM Content Navigator
• Content Management Interoperability Services (CMIS)
You can configure your Content Platform Engine and IBM Content Navigator container
deployments to enable the sharing of content with users that are external to your
organization. Configuration for this feature includes deploying an additional container to
enable external sharing. Note that this feature is also available in a non-containerized
environment.
In addition to these containers, the IBM Business Automation Configuration Container
is also offered for deployments on IBM Cloud Private. When deployed, this container
provides a configuration tool that offers a more streamlined configuration experience
than other container deployment methods.
Containers on IBM Cloud Private
IBM Cloud Private is an application platform for developing and managing on-premises,
containerized applications. It is an integrated environment for managing containers that
includes the container orchestrator Kubernetes, a private image registry, a
management console, and monitoring frameworks.
Considerations when choosing containers
Deploying FileNet P8 containers instead of an on-premises installation can be
preferable in a number of possible scenarios. But there are also reasons to maintain a
standard on-premises installation model.
If you have any of the following requirements, you might want to choose or maintain a
standard on-premises installation:
• The platform and software choices that are currently not supported by the
container platform
• Custom applications that use the Content Platform Engine EJB transport
Containers supports Content Platform Engine clients by using Content Engine Web
Services (CEWS) instead of EJB
• Applications that are integrated with IBM Content Navigator, such as IBM
Enterprise Records, that are not yet available for container deployment.
(At the time of writing this course, IBM Enterprise Records is not available for
container deployment).
• A single IBM Content Navigator instance to connect to Content Manager on
Demand (CMOD) and IBM Content Manager in addition to IBM FileNet P8
Platform
Currently, only the IBM FileNet Content Manager repositories are supported in the
container environment.
• Use of Content Platform Engine Virtual Member Manager directory configuration
• Use of the IBM Content Navigator Task Manager features, for example,
Teamspace deletion or Box share
• Use of the Hitachi Fixed Content Device and IBM Spectrum Protect fixed content
device for Content Platform Engine storage
Administering components in a container environment
In most cases, administering your container environment for content services is the
same as administering your on-premises environment. However, some variations exist
for container environments.
Examples:
• Product logs are in a different location
• Startup and shutdown tasks are different
• Configuration files are in a different location
Review Questions
Question 1: True or False: You can deploy FileNet P8 content services containers
on an IBM Cloud Private environment
Answer 1: True
Answer 2: A, B, C, and D
Deploying the IBM FileNet P8 Platform components on a container platform
provides rapid deployment, improved patching and upgrading, dynamic scalability,
and improved resiliency
Answer 3: False
FileNet P8 content services containers support Content Platform Engine clients by
using Content Engine Web Services (CEWS) transport
Question 4: In which of the following scenarios can you use container deployment
for the IBM FileNet P8 Platform components? (Select one)
A. You have custom applications that use the Content Platform Engine EJB
transport
B. You need to use IBM Enterprise Records application that is integrated with IBM
Content Navigator
C. You use a single IBM Content Navigator instance to connect to IBM Content
Manager on Demand and IBM FileNet P8 Platform
D. You use a single IBM Content Navigator instance to connect to IBM FileNet P8
Platform
Answer 4: D
FileNet P8 content services containers support CEWS transport
At the time of writing this course, IBM Enterprise Records and IBM Content
Manager on Demand are not supported for containers.
• Data isolation
• IBM FileNet P8 Platform provides flexibility for the physical location of content
• Content can be stored on different file systems in the same physical location,
as well as on different file systems in geographically diverse locations
• Security
• Access to the IBM FileNet P8 Platform system depends on LDAP
authentication
• Access to the content in the system depends on LDAP authorization
• Access to the system does not mean that you have access to any particular
piece of content or the right to perform a certain task
• Data that is stored can also be protected through a native data encryption
capability
• System availability
• IBM FileNet P8 Platform can support 24 x 7 availability
• The system is configured for both high availability and disaster recovery
• It is recommended to have known formal maintenance windows and to build
processes that ensure all maintenance work can be performed in those
windows
Isolating content in an IBM FileNet P8 Platform system
Complete data isolation between clients can be achieved at the following levels:
• Highest level: P8 domain level
• Medium level: Object store level
• Lowest level: Within an object store
All environments, irrespective of the level of isolation, can be sized to meet the needs of
an organization. There are advantages and disadvantages to all approaches. Higher
level of separation reduces the need for some customizations whereas Lower level of
separation reduces maintenance overhead. Different models will suit different
organizational needs.
For example, you can use separate Content Navigator servers or separate
desktops within a single Content Navigator instance.
• can configure different administrators for each object store, but there is a single
group that administers the Global Catalog Database (GCD) which stores the
definition of the P8 domain
The disadvantage with this approach is that depending on how the environment is
configured, some updates might affect all users. Customization is required to limit the
display of users.
Isolating content within an object store (Lowest level)
In a multitenant scenario:
• One or more customers share an object store
• Within an object store, you handle objects security through LDAP group
membership
• You can set different access rights on documents, folders, and the structural
elements that are used to define the documents and folders
• Each customer can either share the document storage or keep it isolated
• this level allows sharing of resources
• Each customer can have separate access at the Content Navigator level by
creating their own unique desktop or Content Navigator instance
• Software updates will take the least amount of effort that is compared to the other
configurations discussed in this section.
The disadvantage with this approach is that software updates will affect all customers.
Customization is required to limit the display of users.
Review Questions
Question 1: True or False: For IBM FileNet P8 Platform, the content can be stored
on different file systems in the same physical location, as well as on different file
systems in geographically diverse locations.
Answer 1: True
Answer 2: A, B, C, and D
In a FileNet P8 domain, LDAP servers, Database servers, Application servers,
Storage areas can be isolated.
Question 3: True or False: If you have access to the IBM FileNet P8 Platform
system, you can access any content and perform actions on any objects in the
object store.
Answer 3: False
Access to the system does not mean that you have access to any particular piece of
content or the right to perform a certain task. Access to the IBM FileNet P8 Platform
system depends on LDAP authentication and access to the content in the system
depends on LDAP authorization.
Answer 4: A & B
Data isolation between clients can be achieved at P8 domain or object store levels.