IBM Commonstore Installation and Configuration
IBM Commonstore Installation and Configuration
IBM Commonstore Installation and Configuration
Wei-Dong Zhu
Torsten Friedrich
R Hogg
Juergen Maletz
Philip McBride
Dean New
ibm.com/redbooks
SG24-6795-00
Note: Before using this information and the product it supports, read the information in
Notices on page ix.
Contents
Notices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ix
Trademarks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . x
Preface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xi
The team that wrote this redbook. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xii
Become a published author . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xiv
Comments welcome. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xiv
Part 1. Design and planning. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
Chapter 1. Solution overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
1.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
1.2 IBM DB2 CommonStore for Lotus Domino . . . . . . . . . . . . . . . . . . . . . . . . . 4
1.3 IBM DB2 CommonStore for Exchange Server . . . . . . . . . . . . . . . . . . . . . . 7
1.4 IBM DB2 Records Manager . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
1.5 DB2 Content Manager Records Enabler (CMRE) . . . . . . . . . . . . . . . . . . . 15
1.6 Integrated solution overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
Chapter 2. Design and planning for e-mail archiving . . . . . . . . . . . . . . . . 19
2.1 CommonStore e-mail archiving design options. . . . . . . . . . . . . . . . . . . . . 20
2.1.1 E-mail message layout . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
2.1.2 Archiving types . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
2.1.3 Document storage model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
2.1.4 Deletion types . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36
2.1.5 Retrieving archived content. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39
2.1.6 Viewing archived content . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40
2.1.7 Archiving options and policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42
2.2 CommonStore e-mail archiving solution planning . . . . . . . . . . . . . . . . . . . 42
Chapter 3. Design and planning for e-mail records enabling . . . . . . . . . . 45
3.1 Records Manager design options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46
3.1.1 File plan. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
3.1.2 Life cycle . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
3.1.3 Declaration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52
3.1.4 Classification . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53
3.1.5 Disposition. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55
3.1.6 Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55
3.1.7 Physical records management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56
3.1.8 Legal hold . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56
iii
iv
Contents
vi
Contents
vii
viii
Notices
This information was developed for products and services offered in the U.S.A.
IBM may not offer the products, services, or features discussed in this document in other countries. Consult
your local IBM representative for information on the products and services currently available in your area.
Any reference to an IBM product, program, or service is not intended to state or imply that only that IBM
product, program, or service may be used. Any functionally equivalent product, program, or service that
does not infringe any IBM intellectual property right may be used instead. However, it is the user's
responsibility to evaluate and verify the operation of any non-IBM product, program, or service.
IBM may have patents or pending patent applications covering subject matter described in this document.
The furnishing of this document does not give you any license to these patents. You can send license
inquiries, in writing, to:
IBM Director of Licensing, IBM Corporation, North Castle Drive Armonk, NY 10504-1785 U.S.A.
The following paragraph does not apply to the United Kingdom or any other country where such provisions
are inconsistent with local law: INTERNATIONAL BUSINESS MACHINES CORPORATION PROVIDES
THIS PUBLICATION "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS OR IMPLIED,
INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF NON-INFRINGEMENT,
MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Some states do not allow disclaimer
of express or implied warranties in certain transactions, therefore, this statement may not apply to you.
This information could include technical inaccuracies or typographical errors. Changes are periodically made
to the information herein; these changes will be incorporated in new editions of the publication. IBM may
make improvements and/or changes in the product(s) and/or the program(s) described in this publication at
any time without notice.
Any references in this information to non-IBM Web sites are provided for convenience only and do not in any
manner serve as an endorsement of those Web sites. The materials at those Web sites are not part of the
materials for this IBM product and use of those Web sites is at your own risk.
IBM may use or distribute any of the information you supply in any way it believes appropriate without
incurring any obligation to you.
Information concerning non-IBM products was obtained from the suppliers of those products, their published
announcements or other publicly available sources. IBM has not tested those products and cannot confirm
the accuracy of performance, compatibility or any other claims related to non-IBM products. Questions on
the capabilities of non-IBM products should be addressed to the suppliers of those products.
This information contains examples of data and reports used in daily business operations. To illustrate them
as completely as possible, the examples include the names of individuals, companies, brands, and products.
All of these names are fictitious and any similarity to the names and addresses used by an actual business
enterprise is entirely coincidental.
COPYRIGHT LICENSE:
This information contains sample application programs in source language, which illustrates programming
techniques on various operating platforms. You may copy, modify, and distribute these sample programs in
any form without payment to IBM, for the purposes of developing, using, marketing or distributing application
programs conforming to the application programming interface for the operating platform for which the
sample programs are written. These examples have not been thoroughly tested under all conditions. IBM,
therefore, cannot guarantee or imply reliability, serviceability, or function of these programs. You may copy,
modify, and distribute these sample programs in any form without payment to IBM for the purposes of
developing, using, marketing, or distributing application programs conforming to IBM's application
programming interfaces.
ix
Trademarks
The following terms are trademarks of the International Business Machines Corporation in the United States,
other countries, or both:
AIX
DB2
DB2 Universal Database
Domino
IBM
ibm.com
Lotus
Lotus Notes
Notes
Redbooks
Redbooks (logo)
Tivoli
WebSphere
z/OS
Preface
Currently, under the U.S. Security and Exchange Commission rules, all banks
and brokerage firms are required to keep their e-mail for three years. By July
2006, under the Sarbanes-Oxley Act, all public companies are required to
comply with this rule.
Whether the companies are public or private, more companies need to manage
their e-mail to support regulatory compliance, litigation, and corporate policy and
to improve performance and productivity. The e-mail archiving and records
management solution presented in this book will help companies to accomplish
these goals.
This IBM Redbook provides a general solution guide for the integrated e-mail
archiving and records management solution. The integrated solution uses the
following IBM products:
IBM DB2 CommonStore for Lotus Domino V8.3 or
IBM DB2 CommonStore for Exchange Server V8.3
IBM DB2 Records Manager V4.1.2
IBM DB2 Content Manager V8.3
IBM DB2 Content Manager Records Enabler V8.3 (previously known as
Records Manager Enabler or RME)
Part 1 of the book covers design and planning of the solution. In Chapter 1, we
provide an overview of the integrated solution, the products involved, and their
roles in the solution. In Chapter 2, we cover the basic concepts behind e-mail
archiving, CommonStore features and functions, and its architecture. We
address key areas to consider when planning and designing the solution from
e-mail archiving perspective. In Chapter 3, we cover the basic concepts behind
records management, Records Manager, and Records Enablers features and
functions. We also address key areas to consider when planning and designing
the solution from an e-mail records management perspective. In Chapter 4, we
focus on security of individual products and the implication on the overall
integrated solution. In Chapter 5, putting everything together, we cover the
design and planning of the entire integrated solution. System architecture and
implementation sequence are addressed.
Part 2 of the book focuses on all major steps involved in installing and integrating
all of the products for the end-to-end integrated solution. Chapter 6 covers the
scenario using CommonStore for Lotus Domino in the Windows environment.
Chapter 7 covers the scenario using CommonStore for Exchange Server in a
xi
xii
projects before joining the CommonStore development team. He is the team lead
of the CommonStore for Exchange Server development team.
Philip McBride is a senior consultant with IBM in Australia. Originally from the
UK, he has seven years of experience with IBM and holds a degree in
Information Technology. He specializes in delivering solutions around document,
records management, and workflow systems. Working with customers in either
technical or business lead roles, he delivers proof-of-concept and
implementations for customers in Australia and Asia.
Dean New is a Technical Services Associate in the IT department at Honda in
Canada. He has eight years of experience in the IT field. He holds a three-year
Computer Programmer/Analyst degree. His areas of expertise include Lotus
Domino Administration and WebSphere Administration. He has experience with
IBM AIX, IBM DB2 Content Manager, IBM DB2 CommonStore for Lotus Domino,
IBM DB2 Records Manager, and Records Manager Enabler.
Thanks to the following people for their contributions to this project:
John Dorak
Craig Kindell
Tracy Kong
Chris Lehman
Qing Lu
Jose Hose Martinez, Jr.
Ken Milsted
Lonnie Moore
Paul Schultes
Glen Walters
Emily White
IBM Software Group, Information Management, ECM CommonStore and
Records Enabler Development, ECM eRecords Solution Development, Boca
Raton, Florida, US
Bill Fuller
Neall Hards
IBM Software Group, Information Management, WW Software Support, Records
Manager. L2 Support for Records Manager Enabler and Common Store, Ottawa,
Canada
Preface
xiii
Comments welcome
Your comments are important to us!
We want our Redbooks to be as helpful as possible. Send us your comments
about this or other Redbooks in one of the following ways:
Use the online Contact us review redbook form found at:
ibm.com/redbooks
xiv
Part 1
Part
Design and
planning
This part introduces the planning and designing of the e-mail archiving and
records management solution. We examine all of the products that are involved
in the solution. For each product, we provide basic concepts and architecture and
discuss the design options. From an integrated solution perspective, we cover
areas that are specific to the integrated solution and address individual and
overall planning considerations. The following chapters are included in this part:
Chapter 1.
Solution overview
This chapter provides an overview of the integrated solution for e-mail archiving
and records management. We cover the key products involved (except IBM DB2
Content Manager) and their roles in the integrated solution.
Specifically, the topics we cover include:
Introduction
IBM DB2 IBM DB2 CommonStore for Lotus Domino
IBM DB2 IBM DB2 CommonStore for Exchange Server
IBM DB2 IBM DB2 Records Manager
IBM DB2 DB2 Content Manager Records Enabler (CMRE)
Integrated solution overview
1.1 Introduction
Years ago (and even today) customers dealt with their physical records without
thinking of them as recordsusually paper in files, boxes, and filing cabinets, or
storage areas, records centers, or warehouses. Paper is not going away. Five
years ago, if records management was part of a customer information
management strategy or included in any Request for Proposal (RFP), it was at
the bottom of the list. Today, records management is not only front and center for
every customer of any size; for the majority, it leads the need. Whether a
customer is mandated (for example, in the USA via SEC 17a-4, SarBox, HIPAA
regulations) or simply realizes that it is a good practice, applying formal
records-keeping to information somehow is a must. Businesses have no
choice.
Current trends
Current trends demonstrate that the tide of knowledge and awareness has been
raised, not only for line-of-business owners but, as is key, the IT technical
community. In addition, records-centric discussions are now on the rise internally
between these parties and the records and legal staff.
You cannot demonstrate compliance without applying some form of formal
records-keeping, regardless of the information or system and media. For many
customers, the most immediate and high-risk information area is e-mail. Either
through mandate, or due to the discovery-risk exposure of the volumes and
details of business decisions that e-mail now carries, the first real high-priority
focus to deploy records controls across companies e-mail has been forced.
Companies realize that e-mail backups and archiving (although a good first step)
do not make a records system. Disaster recovery needs remain to ensure that
daily backups occur to preserve operations, but the IT, records, and legal teams
need to determine and ensure that the companys basic retention schedules are
not invalidated if off-site backups are being kept for five years, for example. There
are key core benefits for ongoing business efficiency and information
management that e-mail archiving and de-duplication features can bring. These
must not be confused with or assumed to also resolve retention requirements.
Some companies start with defining and deploying an e-mail policy for all
employees. This serves both to refresh employee awareness of the importance
of e-mail and records to the company and to underscore the impact and risk of
their part in that responsibility. Good e-mail policies also encourage
preclassification of e-mail via foldering or drop-down category options when
sending e-mail. Value-add can be gained from requesting more detailed
keywords to be included in the subject line of e-mail, which can aid
auto-classification options. Customers can start with applying e-mail
records-keeping solutions to their C-level executives to address their highest risk,
then proceed to deploy to other groups and business processes using e-mail that
has been identified through their internal risk analysis.
Digital Rights Management (DRM) has also been raised in the media recently as
a way to manage records and retention. To expert records staff, this is anathema.
To have distributed content packaged in a way that in the future will expire and be
deleted or locked up and unreadable does not facilitate modern electronic
records management.
Future trends
The volume and level of business transacted via e-mail will continue to increase.
Customers of all sizes will continue to leverage Web-enabled transactions
facilitated by automated agents and interfaces that may slightly reduce the
continued exponential reach of e-mail. Best practiceaware customers are also
learning that deploying real document management systems first is key to the
capture, control, and distribution of data leading to information and decisions that
should never be in e-mail to begin with. For example, overuse of Exchange public
folders as a pseudo-document management system creates more problems than
it solves. Together with real document and process-centric workflow internally
and externally, more structured control of business and a reduced record risk is a
noble goal.
An integrated solution
E-mail systems from any vendor are designed to be, and are, great e-mail
services. They are not effective communication, information, and content control
solutions. They do not have built-in retention and disposition features, nor are
they designed to be manageable long-term storage repositories. A balance is
needed between maintaining the core services of an e-mail solution such as
private and shared e-mail folders, drag-and-drop filing, inbound and outbound
mail and attachments, and the need to apply a base retention and disposition on
all of the various classifications of e-mail.
The IBM records enabled solution provides comprehensive capabilities across a
range of options to empower customers to apply and deploy records-keeping
across a subset or all of their e-mail, and to leverage the core e-mail
mailbox-management features that aid IT in their daily challenge.
The integrated solution is key to avoid disabling the core services that e-mail
provides, and ensuring that basic retention is applied and candidate records are
expunged at end-of-life. To not achieve both is fundamentally a waste of time. No
solution would be chosen and deployed if it takes away core e-mail features.
Note: A good practice is to take away features for end users to continue
creating personal e-mail archives or PST collections.
The primary goal from a records perspective is to place the correct retention on
the e-mail and to be able to appropriately delete it as soon as is possible. If that
goal cannot be met, it is a waste of records-time and undermines the whole
effort.
The integrated solution that we address in this book comprises the following
products:
IBM DB2 CommonStore for Lotus Domino or IBM DB2 CommonStore for
Exchange Server
IBM DB2 Records Manager
DB2 Content Manager Records Enabler (CMRE)
We examine these products in the following sections.
The archived e-mail messages are stored in the archive. The archive is a logical
grouping of content stored in a repository such as IBM DB2 Content Manager,
IBM DB2 Content Manager OnDemand, or IBM Tivoli Storage Manager.
Note: Although CommonStore for Lotus Domino supports IBM DB2 Content
Manager OnDemand and Tivoli Storage Manager as e-mail archives, the
integrated e-mail archiving and records management solution supports only
IBM DB2 Content Manager as the e-mail archive. This is because Content
Manager Records Enabler does not support these archives. For more about
Content Manager Records Enabler, refer to 1.5, DB2 Content Manager
Records Enabler (CMRE) on page 15.
You can archive or delete e-mail based on policies that you set up. For example,
you can set up a policy to archive messages that are 90 days or older if the mail
database reaches certain space limits. Within this policy, you can also set it such
that after an e-mail is archived, its content will be deleted from the mail database,
and an e-mail stub with a link to the archived e-mail will be left in the mail
database. In addition, you can archive different parts of messages, depending on
your configuration, and store them differently according to your business needs.
E-mail archiving and deletion can be done manually or automatically.
Figure 1-1 shows the CommonStore for Lotus Domino system architecture.
Browser
Lotus
Domino
CSLD
Job DB
CommonStore
HTTP
disp.
CSLD
Task
Server
(archpro)
Mailbox
DB
CSLD
Crawler
Agent
Notes Client
CSLD
Config DB
Archive
CSLD crawler
CSLD task
CommonStore Server (archpro)
Agent
Web (HTTP) dispatcher
CSLD crawler
The CSLD crawler is the program that performs all automatic operations in
CSLD. It creates automatic archiving and deletion jobs, as well as retrieval jobs
that are centrally triggered by an administrator. The CSLD crawler directly
accesses the databases on the Lotus Domino servers and looks for documents
that match the criteria laid out in your policies.
CSLD task
The CSLD task is the program that directly interacts with your Lotus Notes and
Domino environment. It looks for jobs in the CSLD job database, which is the
place where all user requests are collected before they are processed further.
The CSLD task converts the documents included in jobs or requests to files,
passes the files to the CommonStore Server, and vice versa. You can run several
instances of the CSLD task at the same time.
Agents
The agents are the interfaces to the archive. Every agent is an independent
archive client process. For every archive supported by CommonStore, there is a
special agent. An agent calls the application programming interface (API) of the
archive. These archives are supported by CommonStore for Lotus Domino:
Content Manager Version 8 (CM8)
Content Manager OnDemand (CMOD)
Tivoli Storage Manager (TSM)
Agents always run on the same machine as the CommonStore Server (archpro)
and are automatically started by it.
The archived messages are stored in the archive. The archive is a logical
grouping of content stored in a repository such as IBM DB2 Content Manager,
IBM DB2 Content Manager OnDemand, or Tivoli Storage Manager.
Note: Although CommonStore for Exchange Server supports IBM DB2
Content Manager OnDemand and Tivoli Storage Manager as e-mail archives,
the integrated e-mail archiving and records management solution supports
only IBM DB2 Content Manager as the e-mail archive. This is because
Content Manager Records Enabler does not support these archives. For more
information about Content Manager Records Enabler, refer to 1.5, DB2
Content Manager Records Enabler (CMRE) on page 15.
You can archive e-mail based on policies you set up. For example, you can set
up a policy to archive messages that are 90 days or older if the mail database
reaches certain space limits. Additional options enable you to reduce the size of
your mailbox by deleting the attachments, the message body, or the entire
message after successful archival. For example, within the previously mentioned
policy, you can set it such that when an e-mail is archived, the e-mail content will
be deleted from the mail database, and an e-mail stub with a link to the archived
e-mail will be left in the mail database. In addition, you can archive different parts
of messages depending on your configuration and store them differently
according to your business needs.
E-mail archiving and deletion can be done manually or automatically.
Figure 1-2 on page 9 shows the CommonStore for Exchange Server system
architecture.
Browser
Microsoft
Exchange
Server
CommonStore
Search
Server
HTTP
disp.
Job
Folder
Mailbox
CSX
Task
Server
(archpro)
Agent
Outlook
Config
Folder
Active
Directory
Archive
CSX System
Manager
Configuration folder
The configuration folder contains all of the information that Microsoft Outlook
clients need to execute CommonStore functionality. This includes:
Job folder name
Server host names and ports
This data is written during system configuration using the CSX System Manager
(see description below).
Job folder
The job folder contains interactive client requests to archive or retrieve
messages. They are collected in the folder before they are picked up by a CSX
Task.
CSX Task
CommonStore Server (archpro)
Agent
Search server
Web (HTTP) dispatcher
CSX Task
The CSX Task is the program that directly interacts with your Microsoft Exchange
environment. It is responsible for performing interactive and automatic archiving
and retrieval, during which it transforms Exchange messages into files and vice
versa.
The CSX Task can be logically split into the following components:
Crawler
Poller
Worker
Committer
Figure 1-3 on page 11 shows the individual components of the CSX Task.
10
Microsoft
Exchange
Server
CSX Task
Job
Folder
Poller
Worker
Crawler
Server
(archpro)
Mailbox
Committer
Committer
Committer
Active
Directory
11
Agents
The agents are the interfaces to the archive. Every agent is an independent
archive client process. For every archive supported by CommonStore, there is a
special agent. An agent calls the application programming interface (API) of the
archive. The following archives are supported by CommonStore for Exchange
Server:
Content Manager Version 8 (CM8)
Content Manager OnDemand (CMOD)
Tivoli Storage Manager (TSM)
Agents always run on the same machine as the CommonStore Server (archpro)
and are automatically started by it.
Search server
The search server is a separate Web application server process for the search
function. It is automatically started by the CommonStore Server. It routes the
12
search requests via the CommonStore Server to the archives that support this
function (Tivoli Storage Manager does not support it). After receiving the results
from the CommonStore Server, it arranges them into a list and passes that list to
the requesting Web application that displays it in the browser window. The result
list enables the requesting user to view the messages and attachments that are
found in a browser. In addition, the user can restore the archived content to a
special folder in the users mailbox. Messages are restored to their original form,
and attachments are restored to container messages.
13
Features include:
Embedded engine technology; no new application to learn and maintain.
Web-based client for records administration.
Quick integration using multiple client technologies, such as Java, C++, and
.Net.
Scalable architecture.
Content maintained in host repository; no redundant data.
You can customize your business application to declare and classify records
manually, automatically, or somewhere in between.
Records Manager is composed of four major components:
14
15
Perm
Sync
Host
Interface
16
that have their permission policies changed since the previous synchronization
and the corresponding items in Content Manager.
Records Enabler
Extensions
Browser
Domino
/
Exchange
CommonStore
Records Enabler
HTTP
disp.
Task
Jobs
Server
/
Crawler
Perm
Sync
Host
Interface
Server
(archpro)
CM8
agent
Mailbox
e-mail Client
Config.
eClient
Resource Manager
Note, all clients (CM Client for Windows, eClient, CommonStore) make calls to
the Records Enabler Server. To simplify the diagram, the connections are not shown here.
17
18
Chapter 2.
19
The archiving type controls which parts of a message are archived in the archive
repository and which hyperlinks make sense to be included in the message stub,
and the document storage model controls how the archived content is stored in
the Content Manager archive. The deletion type determines which parts of the
original e-mail message are removed after it is archived successfully. Including
retrieval and viewing hyperlinks in the message stub and the options to configure
this are different for the two CommonStore products.
This section provides an overview of the main concepts that are important in
designing and planning the integrated e-mail archiving and records management
solution. For more detailed information, refer to the following publications:
IBM DB2 CommonStore for Lotus Domino: Administrators and Programmers
Guide Version 8.3, SH12-6742
IBM DB2 CommonStore for Exchange Server: Administration and Users
Guide Version 8.3, SH12-6741
20
Message Sample
Properties
Subject
Subject line
Body text
Attachment table
This is a Microsoft Word
document.
Demo.doc
21
Message Sample
Properties
Message Sample
Properties
Subject
Subject line
Subject
Subject line
Body text
Body text
Attachment table
Attachment table
Note: Using archiving type Entire does not allow you to declare individual
attachments as records.
22
Message Sample
Properties
Properties
Subject
Subject line
Subject
Subject line
Body text
Body text
Attachment table
Attachment table
23
Message Sample
Properties
Subject
Subject line
Body text
Attachment table
This is a Microsoft Word
document.
Demo.doc
24
These storage models can be used in combination with any archiving type, which
allows nine different combinations.
Document 1
File 1
Attributes
Part 1A
File 2
Part 1B
As this storage model makes use of the generic document model of Content
Manager, the individual message components (entire message, attachments or
message remainder) can be accessed from Content Manager clients unless the
CSN format for CSLD is used to store messages.
When using the text-search user exit, there are some limitations with the
archiving types Attachment and Component. See the CommonStore document
Text Search Configuration for IBM DB2 Content Manager V8 for more
information.
Note: Using storage model GENERIC_MULTIPART does not allow you to
declare individual attachments as records.
25
Message Sample
Document 1
Attributes
SUBJECT
Properties
Subject
Subject line
Body text
Subject line
Part 1A
Message Sample
(incl. attachments)
Attachment table
This is a Microsoft Word
document.
Demo.doc
26
Message Sample
Document 1
Attributes
SUBJECT
Properties
Subject
Subject line
Body text
Subject line
Part 1A
Message Sample
(w/o attachments)
Part 1B
Attachment table
Attachment
Demo.doc
Demo.doc
Attachment
Simple.txt
Simple.txt
Message Sample
Document 1
Attributes
SUBJECT
Properties
Subject
Subject line
Body text
Subject line
Part 1A
Attachment
Demo.doc
Part 1B
Attachment table
Attachment
Simple.txt
Figure 2-8 Storage model GENERIC_MULTIPART with archiving type Attachment (CSX)
27
Message Sample
Properties
Subject
Subject line
Body text
Attachment table
Document 1
Attributes
SUBJECT
Subject line
Demo.doc
Part 1A
Attachment
Demo.doc
Simple.txt
Document 2
Attributes
SUBJECT
Subject line
Part 2A
Attachment
Simple.txt
hi i
GENERIC MULT
28
Document 1
File 1
Attributes
Part 1A
File 2
Document 2
Attributes
Part 2A
As this storage model makes use of the generic document model of Content
Manager, the individual message components (entire message, attachments, or
message remainder) can be accessed from Content Manager clients unless the
CSN format for CSLD is used to store messages.
When using the text-search user exit, there are some limitations with the
archiving types Attachment and Component. See the CommonStore document
Text Search Configuration for IBM DB2 Content Manager V8 for more
information.
29
Message Sample
Document 1
Attributes
SUBJECT
Properties
Subject
Subject line
Body text
Subject line
Part 1A
Message Sample
(incl. attachments)
Attachment table
This is a Microsoft Word
document.
Demo.doc
30
Document 1
Message Sample
Attributes
SUBJECT
Properties
Subject
Subject line
Body text
Subject line
Part 1A
Message Sample
(w/o attachments)
Attachment table
Document 2
Attributes
SUBJECT
Subject line
Demo.doc
Part 2A
Attachment
Demo.doc
Simple.txt
Document 3
Attributes
SUBJECT
Subject line
Part 3A
Attachment
Simple.txt
t GENERIC MULTIDOC
31
Message Sample
Properties
Subject
Subject line
Body text
Attachment table
This is a Microsoft Word
document.
Document 1
Attributes
SUBJECT
Subject line
Demo.doc
Part 1A
Attachment
Demo.doc
Simple.txt
Document 2
Attributes
SUBJECT
Subject line
Part 2A
Attachment
Simple.txt
32
Resource item 1
File 1
Table of contents
Meta data
File 2
Subject
From
To
Cc
Bcc
Data
File 1
File 2
Note: Using storage model BUNDLED does not allow you to declare
individual attachments as records.
This storage model does not make use of the generic document model of
Content Manager. As the format is a CommonStore native format, archived data
cannot be accessed from Content Manager clients.
When using the text-search user exit, there are no limitations. See the
CommonStore document Text Search Configuration for IBM DB2 Content
Manager V8 for more information.
33
Message Sample
Resource item 1
Table of contents
Properties
Meta data
Subject
Subject line
Body text
Subject
From
To
Cc
Bcc
Data
Attachment table
Message Sample
(incl. attachments)
34
Message Sample
Resource item 1
Table of contents
Properties
Meta data
Subject
Subject line
Body text
Subject
From
To
Cc
Bcc
Data
Message Sample
(w/o attachments)
Attachment table
This is a Microsoft Word
document.
Attachment
Demo.doc
Demo.doc
Attachment
Simple.txt
Simple.txt
Message Sample
Resource item 1
Table of contents
Properties
Data
Subject
Subject line
Body text
Attachment
Demo.doc
Attachment
Simple.txt
Attachment table
This is a Microsoft Word
document.
Demo.doc
Figure 2-17 Storage model BUNDLED with archiving type Attachment (CSX)
35
Message Sample
Resource item 1
Table of contents
Properties
Data
Subject
Subject line
Body text
Attachment
Demo.doc
Resource item 2
Attachment table
This is a Microsoft Word
document.
Demo.doc
Table of contents
Data
Attachment
Simple.txt
Figure 2-18 Storage model BUNDLED with archiving type Attachment (CSLD)
Nothing
Attachments
Body
Message
36
You can select this deletion type if the archiving type is Entire, Component, or
Attachment.
Message Sample
Properties
Subject
Subject line
Body text
Attachment table
This is a Microsoft Word
document.
Demo.doc
Message Sample
Properties
Subject
Subject line
Body text
Attachment table
Demo.doc
Simple.txt
37
Message Sample
Properties
Subject
Subject line
Body text
Placeholder(s)
Attachment table
Demo.doc
Simple.txt
38
Message Sample
Properties
Subject
Subject line
Body text
Placeholder(s)
Attachment table
Demo.doc
Simple.txt
39
40
41
Archiving policies contain archiving rules for e-mail message archiving. You can
assign different archiving policies to different users mail boxes. A default
archiving policy applies to users mail boxes that have not assigned a specific
archiving policy yet.
For automatic archiving, the archive rules contain criteria that an e-mail message
or its associated database must meet before CommonStore archives the e-mail.
The criteria can be based on the size of the mail database, the size of a
particular e-mail, how long the e-mail has been created, and e-mail message
properties. Archive rules also include the archiving type of the e-mail, the
deletion type, and the logical archive ID. You can combine multiple rules together
and prioritize the rules to create an archive policy.
For manual archiving, the archiving rules define the archiving type, storage
model, and deletion type.
42
Deletion types
Retrieval method
Archiving options and policy
To plan for the solution, you must understand the business requirements and the
purpose of the e-mail archiving solution.
These measures can limit the ability of key users to quickly access critical
documents that may be days, weeks, months, or even several years old.
Using CommonStore to archive e-mail provides a better way to achieve these
goals.
Note: In addition to user e-mail files, IBM CommonStore offers an ability to
effectively control the size of potentially any Lotus Domino database or
Exchange message store.
There are many ways to implement an e-mail archive solution. As part of the
planning and designing exercises, we provide a list of implementation options to
get you started:
Allow users to manually select which e-mail to archive. Users have the option
to select which parts of the e-mail will be archived (the entire e-mail, the
attachments only, or the body of the e-mail and the attachments).
Establish an automated e-mail archive policy based on one or more aspects
of a users e-mail information, or the associated mail database.
Decide whether to keep or delete any of the e-mail after it is archived.
When adding records management function into the e-mail archive solution,
consider the following questions and issues (refer to Chapter 3, Design and
43
44
Chapter 3.
45
46
File plan
Life cycle (including retention schedule)
Declaration
Classification
Disposition
Security
Physical records management
Legal hold
This section provides an overview of the main concepts that are important in
designing and planning the integrated e-mail records management solution. For
more detailed information, refer to the following publications:
IBM DB2 Records Manager: Concepts Guide, SC18-9182
IBM DB2 Records Manager: Administrators Guide, SC18-9180
IBM DB2 Records Manager: Technical Reference Guide, SC18-9181
47
For many companies, the Records Managers file plan maps to the companies
existing physical or electronic file organization scheme.
A file plan can support both the electronic and physical record-keeping of a
company.
Figure 3-1 shows the file plan design of the scenario we use in this book. A file
plan always starts with a Root component. Starting from the Root, we organize
records based on Department, Region, and Division respectively. Within the
Division, we organize records into two categories: eDocument or email. The
declared e-mail falls into the email category (also called records component).
48
System component definitions come with Records Manager. They are used to
instantiate system components that are needed for a Records Managers file
plan. All file plans come with a default system component definition, Root. It is at
the start of your file plan, where you define the rest of your file plan components.
See Figure 3-1 on page 48.
Custom component definitions are those you define according to your business
rules. In Figure 3-1 on page 48, custom component definitions are Department,
Region, Division, eDocument, and email.
Container and record component definitions
There are two types of custom component definitions:
Container component
Record component
A container component is one of the containers for records or other containers.
For example, Department, Region, and Division from Figure 3-1 on page 48 are
container component definitions.
A record component is the component type used for instances of a record. It
differs from the container component in that it has content, such as the e-mail
message and its attachments. For example, eDocument and email from
Figure 3-1 on page 48 are record component definitions.
49
50
To simplify the basic Records Manager concept we present here, we discuss only
the hierarchical view in this book.
A hierarchical view represents a tree-like structure in a parent and child
relationship. All file plans must have a hierarchical view. The file plan example
that we introduced in this section (Figure 3-1 on page 48) uses the hierarchical
view. The view can also represent a containment relationship. For example, a
Department can contain multiple Divisions. A Division can contain multiple
Regions.
Retention schedule, also known as retention rules, specifies how long a record
stays (is retained) in a phase and when the record transitions to the next phase.
A retention schedule is based on one of the following:
Time
Event
Event time
If the retention schedule is based on time, then, after a specified time, a record
will be moved out of the current phase and into the next phase. The time can be
calculated from the time the record is added to the phase or from a life cycle date
entered by a user or a program. Depending on the configuration and the setup,
the time can also be calculated from the records creation date.
If the retention schedule is based on event, then after the particular event has
happened, a record will be moved out of the current phase and into the next
phase.
If the retention schedule is based on event time, then, when a specified time has
taken place after a particular event has happened, a record will be moved out of
the current phase and into the next phase. Note, the time does not start
calculating until the moment the particular event has taken place.
An example of a retention rule is to keep a record for three years from the time
the record enters a particular phase. This rule can be applied to e-mail records to
ensure that all e-mail will be retained in the system for at least three years.
51
The total length of each phase in a life cycle comprises the life cycle duration.
The life cycle duration can be as short as a day or as long as hundreds of years.
In Records Manager, you can design and configure different life cycles for
different classes of records, with multiple life cycle phases and phase transition
parameters, including manual or automatic inter-phase transfer. The ownership
and security of records can also change upon phase transition. This information
should be derived from your organizations retention schedule.
We highly recommend that the records administrator has a complete
understanding of the internal and external records rules that apply to various
documents or e-mail.
3.1.3 Declaration
Declaration is designating a document, such as an e-mail, to be a corporate
record. In our scenario, the declaration process is performed using the users
e-mail client, such as Lotus Notes client, Microsoft Outlook, or a CommonStore
agent. You can declare e-mail including attachments or only the attachments as
records.
Records can be declared by one of the following processes:
Manual process
Automated process
With manual process, the user decides when to declare a document as a record.
The user sets a property or selects a menu option to declare the document as a
record. In our e-mail archiving and records management solution, this is a
user-triggered declaration of an e-mail, regardless whether the e-mail has been
archived.
Note: In the e-mail archiving and the records management solution we
address in this book, an e-mail or its component must be archived before the
system can declare it as a record.
At the time of record declaration, the Records Enabler for Content Manager
(CRME) checks whether the e-mail or its component has been archived. If it
has not been archived, the system will automatically archive it to the content
repository, waits for a document ID to be returned from Content Manager, and
then declares the e-mail component as a record. If it is already archived, the
system will declare it as a record immediately.
With automated process, a certain property triggers the automatic declaration of
the record. In the e-mail archiving and records management solution, this can be
52
3.1.4 Classification
Declaration and classification work together: You first declare a document as a
record, and then you immediately classify the record.
Classification is assigning where in the file plan to classify a record, which then
defines, usually via inheritance, the retention and disposition rules on the
declared records. This is done by assigning the records to a particular file plan
component (or bucket). Similar to declaration, classification can be completely
manual or process-driven and can be automated, depending on your business
requirement. By classifying an e-mail correctly, the correct retention rule is
applied. One aspect of classification is capturing of metadata relevant to the
document. This data may be captured automatically or it may be manually
annotated by a user.
ISO 15489 (paragraph 7.2) gives the general characteristics of a record as: a
record should correctly reflect what was communicated or decided or what action
was taken. It should be able to support the needs of the business to which it
relates and be used for accountability purposes. The consequent definition of
metadata given in ISO 15489 states: data describing context, content and
structure of records and their management through time.
53
Host application
e.g. Content Manager
------- --------- --------- ---
Document
metadata
Records Manager
Document
Metadata is sent to
Records Manager.
Content stays within
the host application's
repository.
Figure 3-3 What happens when an e-mail is declared and classified as a record
Automatic classification
Automatic classification eliminates the need for users to manually assign
retention rules (or more accurately select a record component from the file plan
hierarchy the user is permitted to use). Records Manager offers metadata-based
automatic classification, whereby the records administrator can define
classification rules based on metadata of the record. If you plan on using
automatic classification for your e-mail archiving solution, you should understand
the lack (or potential lack) of suitable metadata. In the case of e-mail, it usually
contains the From, To, and Subject fields. To have successful automatic
classification, these fields or other metadata of the e-mail must contain sufficient
information for the system to auto-classify.
54
3.1.5 Disposition
Disposition is the last stage in the record life cycle where records are disposed.
Disposing a file plan component also disposes its descendants.
There are four ways to dispose a file plan component:
Accession
Destroy
Export
Review
Accession results in deletion of the records metadata from the Records Manager
database. In addition, it involves permanently transferring the record and its
metadata to another authority that assumes responsibility and ownership of the
record. This is done by the business application (in this case, Content Manager)
making a copy of the record and its metadata to a specified directory and then
deleting the record from its repository. The copied record content is kept
elsewhere by the new record owner.
Destroy results in deletion of the records metadata from the Records Manager
database. If the record is in electronic format, Record Manager will inform the
business application (for example, Content Manager) to delete the record. It is
the responsibility of Content Manager to ensure this task carries through. If the
record is a physical document, the Records administrator is responsible in
overseeing the shredding or burning of the physical document.
If the disposition of a record is export, Records Manager translates the record
into XML. When the record is exported, you must return to the task and proceed
with the transition (clear the task to abort the destruction of the record).
If the disposition is set to review, then a records administrator must examine its
metadata, its history, before deciding the records final disposal schedule. If the
final disposal schedule cannot be determined, the administrator can retain the
record for further review and specify details about the review decision.
3.1.6 Security
Security is important to ensure that the records that are required to be kept are
not deleted and the records that must be disposed are disposed properly by the
right personnel. When a document has been declared as a record, only those
users who have been assigned records permissions will have any access to the
documents. Depending on the business needs, you can set up the system such
that the original authors or receivers of the e-mail can no longer access their
e-mail messages after they have been declared as records.
55
Records Manager enables you to control user access to the Records Manager
functions and features, and user access to individual objects in a file plan.
Access to Records Manager functions and features is called function access
rights. Access to individual objects in a file plan is called permissions.
For example, the permissions that can be applied to an object in a selected file
plan component include: add, delete, update, and dispose.
Refer to Chapter 4, Security and user IDs on page 67 for more information
about the security of different components that make up this integrated e-mail
archiving and records management solution.
56
understand how to classify a document as a record. For these users, the greater
the automation involved in records declaration, the better. This applies
particularly to senior staff for whom a very real requirement exists that e-mail
sent or received by these staff members must all be captured as records
(depending on which legislation applies).
At the other end of the records management spectrum lay the professionals
whose job it is to establish, own, and maintain an effective records management
system whether they are paper-based or electronic-based. This staff fully
understands what constitutes a record as well as the importance of why records
need to be effectively managed. Classification of documents as records is a
straightforward process.
A major challenge in the adoption of effective records management is how to
manage the declaration and classification of records for all users, not just records
professionals. The Records Managerbased solution enables declaration and
classification techniques from auto-declare and auto-classify to a very manual
declare and classification process. This records management continuum can be
effectively applied to an e-mail archiving system such as CommonStore.
Whatever level of automation is applied, the goal is the accurate, repeatable,
consistent application of retention rules to captured records. Figure 3-4 shows
this records management continuum.
Manual Declaration
& Classification
Drop into
Records-enabled
Folders
Less Planning /
More User Interaction
Quick Lists /
Profiles
Auto-Declare &
Classify
More Planning /
Less User Interaction
The more manual the process of record declaration and classification, the less
planning is required, yet more user interaction is involved and more record
knowledge is required by the user. The more automated the process of record
declaration and classification, the more planning is required beforehand for the
entire system, yet less user interaction is involved.
57
58
Profiles
In Records Manager, a profile is a data entry form. Profiles are what users see
when they add or edit an item in Records Manager. A profile contains one or
more of the fields (attributes) that comprise the file plan component definition.
You can create numerous profiles for almost any type of file plan component.
This includes file plan components such as files, folders, and documents; it also
includes system components such as users and groups. After you create a
profile, you can assign it to specific users and groups or assign it to the Public
group. Profiles let you filter or restrict user access to certain fields as well as limit
the actions a user can perform on the fields that are included in the profile. When
you create a profile, you can select the fields you want to include in the profile.
This lets you control what a user can do in these fields. You can make fields
read-only or mandatory.
59
Quick list
A quick list is a subset of file plan components presented to users to help them to
quickly classify a document during the declaration of a record. It lets authorized
users navigate to a subset of components without having to navigate through the
entire file plan.
Foldering
The foldering feature enables you to preconfigure (or records enable) a folder in
the user mail database to connect to a particular file plan component. When a
user drops a particular e-mail into one of these folders, the e-mail is archived and
declared as a record and is automatically classified.
The limitation of foldering in this way is that only a small set of file plan
components can be exposed. If a large number of file plan components are
exposed in this way, the list of folders may become unmanageable.
3.2.4 Comparison
There are advantages and disadvantages to using auto-declare and
classification, manual-declare and classification, or somewhere in between.
Knowing the trade-off and what is suitable for your organization helps you make
design decisions.
Table 3-1 on page 61 summarizes the advantages and disadvantages of the two
key methods of declaration and classification.
60
61
62
How that information is disposed of when you no longer have to retain the
information: destroy or accession to official archives? See 10.3, Records
disposition on page 405 for more information about destroy and accession.
The life cycle for each records series. For example:
Title
Item number
Description
Retention period
Method of destruction
63
64
Part of your planning consideration must include what happened at the end of
records life cycle: when and how the records should be destroyed.
This concludes the basic introduction to records managements basic concept,
design, and planning considerations.
65
66
Chapter 4.
This chapter does not discuss all of the security features of every component
involved in the solution, but it introduces the basic concepts. For more detailed
descriptions of each product security, read the product-specific administration
guide.
67
4.1.1 Overview
Content Manager security consists of the following configurations and concepts:
68
69
view, and edit objects. For a specific item or item types ACL in the figure, User 1
is assigned no privilege (NoPrivs). The ACL therefore limits the user to have no
rights on the particular item or item type.
For User 2, the person is also assigned the maximum privilege set of
ClientUserEdit. In addition, within the ACL of the specific item or item type, User
2 also has ClientUserEdit privilege. In this case, User 2 can perform create, view,
and edit on the particular item or item type.
Part
Item
Item
type
ACL
User/Group
Privilege Set
User 1
NoPrivs
User 2
ClientUserEdit
Users/Groups
Privilege Sets
User 1
ClientUserReadOnly
User 2
ClientUserEdit
NoPrivs
Important: Every item type has an ACL assigned to it. During the creation of
an item type, you can choose whether the ACL works on the item type level or
on the item level.
For a record enabled environment, with Content Manager V8.3, Fix Pack 1,
ACLs should set on the item level.
70
4.1.2 Recommendations
To properly set up the security of Content Manager, you must understand the
concepts behind Content Manager security. In addition, we provide some
recommendations for the setup of the privilege sets, groups, and ACLs.
Note, these setup recommendations also reflect how the sample scenario we
used in this book is set up.
71
Domino
Mail DBs
Configuration/
Job DB
CS Task
User ID
CSLD Task
Common
Store
ArchPro
Content
Itemtype
ArchPro
User ID
Manager
We examine these components and the users involved in the following sections.
72
73
From the Content Manager side, as shown in Figure 4-2 on page 72, we deal
with the access rights of ArchPro and the security on the Content Managers item
types.
74
these two attributes is used, it is important to understand that the attributes are
not part of the Content Manager security model and therefore are not included
during the authorization process to determine whether a Content Manager user
has access or not to a specific item. The attributes are only interpreted by
CommonStore to ensure that requests from Lotus Domino are served correctly.
The following paragraph explains the CommonStore security model based on a
small example, shown in Figure 4-3.
Mail DBs
DOMCS
DOMA-C
CSLD Task
Domino
Common
Store
ArchPro
Content
CMD-F
Itemtype
CMCS
Manager
Assume that on the Domino side, there are three e-mail users (DomA, DomB,
DomC) with one e-mail database per user and one Domino user ID used by
CommonStore (DomCS). The Domino user ID (DomCS) has access to all three
e-mail databases.
An item type (for example, DominoMail) is created to store archived e-mail from
the three e-mail users. This item type has some standard attributes such as
Sender, PostedDate, Subject, and the attribute CSLDOrigDB. The ACL assigned
to the item type grants appropriate access to the Content Manager user ID used
by CommonStore (CMCS). This enables the Content Manager user to archive
everyones e-mail.
75
If an e-mail is archived from the user DAs mail database, it is stored as an item of
the item type (DominoMail), and the attribute CSLDOrigDB for this item is filled
with the Replica ID from the user DAs mail database. If e-mail messages from the
users DB and DC are archived, they are stored with the same item type, and the
attribute CSLDOrigDB is filled accordingly. In this example, three items are stored
in the same item type, and there is one archived e-mail from each mail database.
If a mail user performs a search from its database against the archive (using the
CommonStore function that is added to the Notes database), CommonStore
searches the database using its Content Manager user ID (CMCS), which has full
access to all items of the item type. The ArchPro interprets the CSLDOrigDB
attribute based on the Replica ID of the database that issued the search. Only
documents that originate from the mail users database are included in the hit list.
From the Content Manager side, only CMCS can view the e-mail in Content
Manager.
Now, for this example, we add three Content Manager users (CMD, CME, CMF)
and assign them to the item types ACL. In this scenario, these Content Manager
users can see all e-mail of the item type using a Content Manager client. The
Content Manager security model does not interpreted the attribute CSLDOrigDB
and therefore does not limit access to the e-mail (documents). To avoid this
access, the ACL for the item type should only be granted to the Content Manager
user ID used by CommonStore (CMCS).
Important: Again, in an e-mail archiving only solution (without the records
management functionality), it is advisable to only give the Content Manager
user ID used by CommonStore access to the item type. No other Content
Manager users should have access to the item type unless these users have a
business need to access documents of the item type.
When configuring a records-enabled solution, the security configuration
should be set up differently. Refer to 4.6, Integrated solution security
overview on page 93 for more details.
4.2.5 Recommendations
To properly set up the security of the integrated system, you must understand the
concepts behind CommonStore security, and the interrelationship with Domino
and Content Manager as described in the previous section. In addition, we
provide some recommendation for the security setup of Domino, Content
Manager, and CommonStore.
Note, the setup recommendations also reflect how our sample scenario used in
this book is set up.
76
77
AD
Schema
CsxImportSchema.vbs
Figure 4-4 Extending Active Directory Schema for defining CSX config data layout
In our scenario we used the user ID CSX Admin, which we added to the
Windows group Schema Administrators.
Active
Directory
CsxImportEmptyDirectory.vbs
In our scenario, we used the user ID CSX Admin, which we added to the
Windows group Domain Administrators.
78
Microsoft
Exchange
Server
Forms
Library
Config
Folder
InstallFormsAndFolders.vbs
In our scenario we used the user ID CSX Admin, which we gave the Folder
visible, Create items, and Read items permissions to the forms library.
79
Microsoft
Exchange
Server
Config
Folder
Active
Directory
CSX System
Manager
The CSX System Manager uses the Active Directory to store CSX configuration
data and to provide it to the CSX Task. The workstation running the CSX System
Manager must be in the same Windows forest as the Exchange organization.
The user starting the CSX System Manager requires write access to the
CommonStore node in Active Directory.
As the CSX System Manager also writes client relevant information to the
CommonStore folders, the user starting it needs special permissions on the
public folders CommonStore\Configuration and CommonStore\Job Folders.
In our scenario we used the user ID CSX Admin to run the CSX System
Manager. As this user ID was also used to create the CommonStore
infrastructure, no additional permission is required.
80
Microsoft
Exchange
Server
Job
Folder
CSX
Task
Mailbox
The CSX Task reads the CSX configuration data from the Active Directory. The
workstation running the CSX Task must be in the same Windows forest as the
Exchange organization. The user starting the CSX Task requires read access to
the CommonStore node in Active Directory.
Note: The CSX Task does not read configuration data from the configuration
folder in Exchange.
The CSX Task communicates with the Exchange system using the Microsoft
messaging API (MAPI). It must have an Exchange user ID and a mailbox to log
on to the system. This user ID must have write access to the job folder to read
and update interactive archiving and retrieval requests.
The CSX Task must be able to search through all mailboxes and public folders
that have e-mail to be archived. Hence it must be able to log on to the Exchange
system and have access to all mailboxes and public folders without even knowing
the credentials of individual users. To gain this authority, the CSX Task user ID
must have the Exchange Administrator role on either the entire Exchange
Organization or on all Administrative Groups that contain Exchange Servers to
be archived. This role is assigned using the Delegate control context menu in the
Exchange 2000/2003 System Manager.
81
In our scenario we used the user ID CSX Admin to run the CSX Task. As this
user ID was also used to create the CommonStore infrastructure, no additional
permission was required on the job folders. We gave the user ID CSX Admin the
role Exchange Administrator on the entire Exchange Organization.
Server
(archpro)
CM8
agent
ArchPro User ID
Resource Manager
82
From the Content Manager side, as shown in Figure 4-9 on page 82, we need to
deal with the access rights of ArchPro and the security on the Content Managers
item type.
At least one item type has to be defined for CommonStore to be able to archive
e-mail into the Content Manager. The ACL for this item type should include the
Content Manager user ID used by ArchPro. E-mail messages from all Exchange
users are stored in this item type, so access to this item type should be limited.
CommonStore relies on its own security model based on Content Manager
attributes. (See 4.3.6, CommonStore security model on page 85.) If a user
searches e-mail from an Outlook client, the CommonStore security ensures that
only data that belongs to that user is visible.
If a user has the right access to the item type, searches using a Content
Manager client returns all e-mail messages even if they do not belong to the
particular user. This is because the Content Manager security model relies only
on the ACL of the item or item type and the users maximum privilege set to
determine security; it is not aware of the CommonStore security restrictions.
Important: In an e-mail archiving only solution (without the records
management functionality), it is advisable to only give the Content Manager
user ID used by CommonStore access to the item type. No other Content
Manager users should have access to the item type unless these users have a
business need to access documents of the item type.
When configuring a solution that must be records enabled, the security
configuration should be set up differently. Refer to 4.6, Integrated solution
security overview on page 93 for more details.
83
Browser
Microsoft
Exchange
Server
Exchange User ID
Search
Server
HTTP
disp.
Job
Folder
Mailbox
Outlook
Config
Folder
Outlook clients read the CSX configuration data from the CommonStore
configuration folder. They need read access to this folder to identify the name of
the job folder as well as the host name and port number of the CSX Search
Server. The job folder name and write access to it is required to trigger interactive
archiving and retrieval requests. The CSX Search Server parameters are
required to start a search session in the browser.
Note: Access to configuration folder and job folder is not required to view
archived items from a Web browser. The URL included in the e-mail stub is
sufficient to contact the CommonStore Server and display the archived e-mail
or attachment. Moreover, no additional authentication is done. This allows
access to forwarded archived e-mail messages and eliminates the need to
restore them before forwarding.
84
85
CommonStore
Search
Server
Ex1
HTTP
disp.
Mailbox1
Ex2
Mailbox2
Ex3
Mailbox3
CSX
Task
Server
(archpro)
CM8
agent
ExCS
CMCS
b
b
b
CM4
CM5
Library Server
Item
Type
CM6
Resource Manager
Assume that on the Exchange side, there are three e-mail users (Ex1, Ex2, and
Ex3) with one mailbox per user and one user ID used by CommonStore (ExCS).
The Exchange user ID (ExCS) has access to all three mailboxes.
An item type is created for CommonStore to store documents from the three
mailboxes. This item type has some standard attributes such as Sender, Sent
Date, Subject, and the attribute CSORIGINATOR. The ACL assigned to the item
type grants appropriate access to the Content Manager user ID used by
CommonStore (CMCS). It enables this Content Manager user to archive
everyones e-mail messages.
If an e-mail is archived from user Ex1s mailbox, it is stored as an item of the item
type, and the attribute CSORIGINATOR for this item is filled with DN from user
Ex1s mailbox. If e-mail from the users Ex2 and Ex3 is archived, it is stored with
86
the same item type, and the attribute CSORIGINATOR is filled accordingly. In this
example, three items are stored in the item type: one archived e-mail from each
mailbox.
If a mail user performs a search from its database against the archive (using the
CommonStore function that is added to the Outlook client), CommonStore
searches the database using its Content Manager user ID (CMCS), which has full
access to the item type. The CSX Search Server modifies the query by adding
the mailbox DN of the user that issued the search. Only documents that originate
from this mailbox are included in the hit list. Privileged users can be defined to be
able to search for e-mail originated from all mailboxes.
From the Content Manager side, only CMCS can view the e-mail in Content
Manager.
Now, for this example, we add three Content Manager users (CM4, CM5, CM6)
and assign them to the item types ACL. In this scenario, CM4, CM5, and CM6
can see all e-mail messages of the item type using a Content Manager client.
The Content Manager security model does not interpret the attribute
CSLDOrigDB and therefore does not limit access to the e-mail (documents). To
avoid this access, the ACL for the item type should be granted only to the
Content Manager user ID used by CommonStore (CMCS).
Attention: Again, in an e-mail archiving only solution (without the records
management functionality), it is advisable to only give the Content Manager
user ID used by CommonStore access to the item type. No other Content
Manager users should have access to the item type unless these users have a
business need to access documents of the item type.
When configuring a records-enabled solution, the security configuration
should be set up differently. Refer to 4.6, Integrated solution security
overview on page 93 for more details.
This security model applies to searching for archived e-mail and attachments, so
authorization for Web viewing is not checked by CommonStore. For example, if
an e-mail is archived from the mailbox of user Ex1, a URL is included in the
message stub to allow user Ex1 to view the archived message from the Web by
clicking on the URL. If user Ex1 forwards the message stub to user Ex2, user Ex2
can also use the URL in the forwarded e-mail to view the archived message from
the Web.
87
4.3.7 Recommendations
To properly set up the security of the integrated system, you must understand the
concepts behind CommonStore security, and the interrelationship with Active
Directory, Exchange, and Content Manager as described in the previous section.
In addition, we provide some recommendations for the security setup of
Exchange, Content Manager, and CommonStore. The setup recommendations
also reflect how our sample scenario used in this book is set up.
88
4.4.1 Overview
Records Manager security is based on:
File plan and its components
Function access rights and permission
User and user group
89
Permission is the access rule that defines what a user can do to a file plan
component and file plan component definition. There are predefined permissions
such as Add. A user with the Add permission can add a file plan component.
Permissions can be set in three ways:
Systemwide: Permissions for file plan component types. Using our case study
example, you can set systemwide permission to component types
Department, Region, and Division.
Component level: Permissions for individual component instances. Using our
case study example, you can set component-level permission on component
instances such as Finance, Europe, and AccountsRec.
Field level: Permissions for individual file plan component definition fields.
Figure 4-12 shows the permission list that can be applied to selected file plan
components for a specific set of users.
90
4.4.2 Recommendations
To properly set up the security of the Records Manager system, you must
understand the concepts behind Records Manager security as discussed earlier.
In addition, we provide some recommendations for the Records Manager
security setup.
These setup recommendations also reflect how our sample scenario used in this
book is set up.
4.5.1 Overview
The Records Enabler does not have its own security model. It uses the Content
Manager and Records Managers security. One of the main functions of the
Records Enabler is to transform Records Manager security into Content
Manager ACLs. Content Manager Records Enabler has to have a Content
Manager user ID with the appropriate rights to create new ACLs and item types.
Figure 4-13 on page 92 shows the user IDs (CMREID and administrator) used by
Records Manager to communicate with the connected systems.
91
Content
Itemtype
CMREID
Manager
Records
Enabler
File Plan
Records
Administrator
Manager
Figure 4-13 Recommended user IDs that work with Records Enabler
4.5.2 Recommendations
We recommend that you create the two user IDs as specified in Figure 4-13. For
each ID, we describe what it is used for and provide some recommendations.
The setup of these IDs also reflects how our sample scenario used in this book is
set up.
CMREID
The CMREID user ID is a Content Manager system administrator ID. The
CMREID user ID is created in Content Manger during Records Enabler
installation. Records Enabler saves this user ID in the host configuration of
Records Manager, and uses it to configure Content Manager. For example,
Records Enabler uses this user ID to create the needed item types, privilege
sets, and ACLs when a Content Manager system is records enabled. This is also
the ID that is stored in the WebSphere Data Source and later used to add (and
remove) triggers to eRecord enabled item types. This user should not be
imported into Records Manager. It is meant to be used under the covers by the
Record Enabler code.
RMEADMIN
The RMEADMIN user ID should be used by the Records Enabler administrator to
log on to the Records Enabler Administration client. Records Enabler does not
92
4.6.1 Overview
In the integrated solution, Content Manager is a records-enabled system. This
means that content stored in Content Manager can be declared as records. After
the content (e-mail) is declared as records, the data is under the control of
Records Manager.
In the solution, the Lotus Domino and Exchange Server themselves are
technically not records enabled. Every e-mail that has to be declared as a record
must be archived (moved or copied) from Domino or Exchange Server into a
records-enabled content repository system first (in this case, the Content
Manager system). The Records Manager system communicates with the
Content Manager system and not Domino or Exchange Server.
The e-mail users must have unique credentials in Content Manager and Records
Manager to properly manage access to the e-mail messages that have been
declared as records. This is achieved by associating a unique Content Manager
user ID with each e-mail user. This unique Content Manager user ID has the
proper access to the item type that is used to store archived e-mail in Content
Manager. The Content Manager user ID also has to be imported into Records
Manager so that the Records administrator can assign appropriate access rights
to it.
93
94
Domino
Domino/
Exchange
DOM11 User
DOM22 DOM
User
User3 3
DOM
Usern
Common
User Mapper
Store
CM1
CM2
CM3
Content
CMn
Manager
Records
Enabler
Records
CM1
CM2
CM3
Manager
CMn
In this example, User1 is mapped to the Content Manager user CM1. CM1 is
imported into Records Manager and has the appropriate rights to declare
records in the file plan.
95
CommonStore can then simply use the CSLDOrigDB attribute to filter the list of
archived items to a specific user. In a Records environment, however, users may
or may not have access to their archived e-mail based on the rules established in
the Records Management system. Archived e-mail classified to certain areas of
the file plan may be restricted to only certain users, or access to e-mail in a
specific life cycle stage may be restricted. Because of the complexity of the
access rules for records, filtering of user access must be done outside of
CommonStore.
This is accomplished by setting the specific access to each item in the archive to
specific users based on where in the file plan the e-mail is classified. Access is
also appropriately updated in the archive as necessary when access rights
change in Records Manager for each user or file plan Component. The access
for each user is controlled by the ACL assigned to the archived e-mail.
Based on the previous discussion, every Domino user or Exchange Server user
must have a Content Manager user ID mapped to it. The Content Manager user
ID has to be imported into Records Manager and has to have the appropriate
function access right and permissions to declare and retrieve records. This
Content Manager user ID is used to assign user access to the file plan in
Records Manager and is used in the Content Manager ACL on the archived
e-mail to grant or deny access.
After an archived e-mail becomes a record, based on the rules configured in
Records Manager, a user could lose access to it immediately or at some later
phase in the life of the record. The ACL assigned to the e-mail item in the archive
item type governs this access. Prior to becoming a record, the ACL must grant
access to the archived e-mail to the user who archived it because there are no
restrictions on its access yet. When CommonStore archives an e-mail, it simply
imports the item into the archive item type. This results in the ACL assigned to
the item type being assigned to the item imported. In the recommended
non-Records configuration, this would mean that the CommonStore
administrator would be the only CommonStore user with access to the item.
However, this will not achieve the desired results in a records environment.
When an item becomes a record, user access to the item must map to the
access defined in Records Manager for the file plan component to which the
record is classified. New users added to the Content Manager ACL at this point
would not be granted access to the item by Content Manager unless they also
had access to the item type containing the item. This means that a new ACL
assigned to the item now based on the access defined in Records Manager
would not grant the necessary access unless these users were also listed with
access in the archive item types ACL. Therefore, all mapped Content Manager
user IDs would have to have read access in the item types ACL to enable further
restriction of access to each declared item.
96
97
Domino
CSLD Task
CSLD Task
Common
Store
ArchPro
Content
ArchPro
Manager
98
System
Sample name
Domino
CSLD Task
Content Manager
ArchPro
Exchange
Domino
Server
CSLD
Task
CSX
Admin
CSLD
Task
CSX Task
Common
Store
ArchPro
Content
ArchPro
CSX
Manager
System
Sample name
Exchange Server
CSX Admin
Content Manager
CSX
99
System
Sample name
OS / DB2
icmadmin
OS / DB2
rmadmin
Content
Manager
CMREID
Records
Enabler
Records
Administrator
Manager
100
System
Sample name
Content Manager
CMREID
Records Manager
Administrator
System
Sample name
WebSphere
wasadmin
101
102
Chapter 5.
The information covered in this chapter also includes the design and planning
considerations presented from earlier chapters when dealing with only the e-mail
archiving or the records management portion of the solution.
103
104
Archiving considerations
From the e-mail archiving side, we examine the following questions:
105
With this assessment, you can set specific e-mail archiving goals. Examples of
specific goals include:
Reduce the average mail database size to a certain number.
E-mail older than a particular number of days should be archived and
removed from the system.
E-mail larger than a particular size should be archived, or its attachment
should be archived.
If the purpose of implementing an e-mail archiving solution is to implement a
records management solution, then you do not need to consider the specifics
such as mail database size and server size.
Who are the target users or what are the target e-mail databases?
If the goal to implement an e-mail archiving solution is to reduce database size,
improve system performance, and manage e-mail databases, you should
investigate and decide who are the target users or what are the target e-mail
databases:
How extensive will the archiving system be?
Will archiving apply to everyones mail database or selective ones? What are
the hardware and software implications?
If e-mail archiving applies to only selected users, what is the criteria?
You may have already answered this question from the previous discussion.
For example, the criteria can be: for any e-mail database size that is greater
than a certain number, its messages will be archived (based on a finer set of
criteria). Certain users, due to the nature of their work, may have large
volumes of incoming or outgoing e-mail, or large e-mail files; especially with
large attachments, you may target these users for archiving activities.
Will senior staff be included in e-mail archive policies?
Some organizations choose to ignore C-level (in this example, CEO) staff mail
databases for security reasons. However, this must be considered carefully in
a record-enabled archiving environment as some legislation requires that all
e-mail must be managed.
106
107
Example #3: If an e-mail is larger than 10 GB, its attachments will be archived
and removed from the e-mail message automatically, and hyperlinks will be
inserted that enable the user to view the archived attachment.
108
If you allow users or the system to delete the entire message after it is archived,
you must provide a search function within the e-mail database.
If one of the reasons to archive is to control mailbox size, and whenever a
document exceeds a certain size it will be archived, then you should design the
system so that content will be removed after archiving. In most cases,
attachments are the cause of large document sizes.
If e-mail archiving is based on a set criteria for a group of e-mail messages, and
users have a requirement to be able to retrieve all of this type of e-mail at once,
then a solution that enables users to select multiple archived e-mail message
stubs and then click the retrieve button to retrieve all e-mail content may be a
good option.
Another consideration is whether you want users to retrieve any archived e-mail.
There may be circumstances when you do not want them to do so. You should
plan this ahead of time.
109
110
The file plan design, life cycle design, and targeted e-mail (based on person, or
e-mail type) need to comply to the legal rules or business requirement. Make
sure the rules and design are documented, and reviewed and approved by the
legal and records professionals.
111
system? You should consider both the archiving requirements and the
records management requirement to see how to design the system that
satisfies both areas.
It is possible that after the e-mail becomes a record, the rules will require that
the original user can no longer access the e-mail. We provide more
discussion about this in upcoming sections, but you should consider the
implication here nevertheless.
What metadata will be collected at the time an e-mail is classified?
There are metadata associated with e-mail. Records Manager needs to store
a records metadata in its database. This metadata is comprised of the
Records Managers system data and some of the e-mails original metadata.
For automatic declaration and classification, which metadata information will
be stored automatically to Records Manager? Will there be any metadata
translation before they are stored in Records Manager? This has implications
for how records can be found later.
112
How much of the file plan will be exposed to each user if the foldering option
is not set?
Will the Records Manager quick list be used? Will Records Manager profiles
be used?
When manually declaring and classifying e-mail, what will be left in the e-mail
databases?
Again, what options will you allow or not allow users to have? Will you force
users to use message stubbing for the entire e-mail, or just for its attachment?
What metadata will be collected at the time users declare and classify their
e-mail?
This has implications for how e-mail records can be located later.
What recommendations or guidelines, in general, do you provide to users
who will perform manual e-mail records declaration and classification?
113
Additional considerations
We provide additional considerations for your planning and designing process.
They are:
114
For example, you establish an archive policy that archives the entire e-mail
message and completely removes the message from the mail database after it is
archived. If in Records Manager you have not set up any auto-declare and
classification policies, then all e-mail archived under the archive policy above will
not be declared as records (unless this task is performed manually by the user
before this archive policy removes the message). After these messages are
archived and removed from the mail system, the records administrator must
manually declare and classify these records. Is this what you want? How can you
avoid that?
Review all of your archiving policies and make sure they work with the policies
you set up in Records Manager.
Other considerations
We add some other questions and areas to consider during the design and
planning process. They may repeat some of the questions asked earlier in this
chapter or other chapters, but we want to make sure that you are aware of them
and recapture them here.
115
5.2.2 Security
When implementing Records Manager into an e-mail archiving system such as
CommonStore, the security of archived documents changes as soon as the
e-mail is declared as records. The access users have to their e-mail after
declaration depends on the permissions set by the records administrator.
When an e-mail is archived in a non-Records Manager environment, the user
generally maintains access to that e-mail. In the Records Manager environment,
access to the declared e-mail record is modified at declaration time. The
modified access may (but not always) have the effect of denying the original
owner of the e-mail any access to the e-mail after it is declared as a record. It is
therefore important to review how security affects user access to e-mail before
and after it is declared as records.
116
117
118
For more information about discovery, see Chapter 11, Discovery on page 409.
IT/IS department
Legal department
Records management department
Help desk and support department
IT/IS department
The Information Technology/Information System (IT/IS) department is in charge
of installing and managing the system. It is responsible for consolidating a
number of servers and for refining processes across storage, backup, and e-mail
systems.
Legal department
The Legal department is responsible for guidance on legal requirements with
document retention and discovery mitigation.
Unless carefully planned and implemented, the system may not return the results
as anticipated. You need to understand the key legal requirements that lead to
the implementation of this system and prioritize them. For example, if the highest
priority is to mitigate any document discovery litigation, ensure that you have the
systems in place to allow fast searching of all of your data.
Usually, any litigation specifies the class of data needed and may even specify
keywords. Even if your organization has an effective backup strategy for all of
your data, this does not provide an efficient solution if data has to be fully
restored first before searching can commence. Furthermore, you may not
possess the software tools to rapidly search across disparate data systems.
Working closely with the legal department is important to ensure the
understanding of the legal requirement and anticipate future system needs.
119
120
Figure 5-1 illustrates the basic system architecture for the end-to-end e-mail
archiving and records management solution.
Records Manager Server
Admin
Client
Records Enabler
Extensions
Browser
Domino
/
Exchange
CommonStore
Records Enabler
HTTP
disp.
Task
Jobs
Server
/
Crawler
Perm
Sync
Host
Interface
Server
(archpro)
CM8
agent
Mailbox
e-mail Client
Config.
eClient
Resource Manager
Note, all clients (CM Client for Windows, eClient, CommonStore) make calls to
the Records Enabler Server. To simplify the diagram, the connections are not shown here.
For your system configuration, decide how many servers you need, what to
install on each server, where to install them if your organization has multiple
sites, and how they will communicate with each other.
Review the existing e-mail infrastructure (Domino server or Microsoft Exchange
Server). How many of these servers do you currently have, where are they
allocated, and how are they being used?
In addition, you can start sizing your system with the following assessment:
121
The number of records that will be declared and classified on a daily basis.
The total number of records to be managed.
Frequency of records auditing and reporting tasks.
If you performed the mail system audit as discussed in Performing audits on
your mail system on page 117, you already have some of the answers, The
assessment helps you decide how many servers you need, how fast the servers
should be, and how much memory you may need.
Depending on the business and legal requirement, if you need to mitigate any
document discovery litigation, make sure your configuration and resource
allocation provide a fast search of all your data.
You should also consider the purpose and usage of all of the components
involved in the solution. Will you be using Content Manager for purposes other
than e-mail archiving? Will you be using Records Manager for purposes other
than e-mail records control? What about your CommonStore Server? In a Lotus
Domino environment, will you be using it to manage Notes databases other than
mail databases? This should help you to determine whether you want to install
them on their own servers or group components together on one machine.
122
Small-size system
Because the Records Manager engine usually reaches its hardware limit first, if
the resource is available, we recommend moving the Records Manager engine to
another server. See Figure 5-3.
Content Manager Records Enabler consists of three server programs. They can
also be moved to the second server where the Records Manager engine resides.
Server 2
Server 1
CSLD or CSX
Content Manager
Records Manager Database
Medium-size system
For a medium-size system, we recommend installing Content Manager on its
own server and the Records Manager engine on its own server. You can further
isolate CommonStore for Lotus Domino or CommonStore for Exchange Server
on its own server. See Figure 5-4 on page 124.
CommonStore for Exchange Server also supports (and encourages) separating
the archpro and the CSX Task, each to their own server hardware.
CommonStore for Lotus Domino does not support this additional separation.
If you use Content Manager for purposes other than e-mail archiving and records
management, you may want to install it on a server of its own regardless of the
size of your current mail archiving system.
123
Depending on how large your e-mail volumes are and how much archive work
the system has to perform, you can separate the CommonStore Server (CSX or
CSLD) on its own box. In addition, depending on how many mail servers you
have and how they are located, you may have multiple CommonStore Servers,
one working with one or a group of mail servers.
Server 1
CSLD or CSX
Server 3
Content Manager Records Enabler
Records Manager Database
Server 2
Content Manager
Server 4
Records Manager Engine
Large-size system
For a large system implementation, you may need to separate Content
Managers Library Server and Resource Manager onto two different servers. For
example, if your organization is worldwide with mail servers located in
geographically different locations, you may want to have a Resource Manager
that is close to the mail servers for faster e-mail archiving and retrieving time.
If additional hardware resources are available, you may also opt to install Content
Manager Records Enabler onto a separate server. See Figure 5-5 on page 125.
124
Server 1
Server 2
Content Manager
Library Server
CSLD or CSX
Server 4
Server 5
Records Manager
Database
Records Manager
Engine
Server
Server
Server232
Content Manager
Content Manager
Content Manager
Resource
Manager
Server 6
Content Manager
Records Enabler
In summary, there are many ways to configure your system for an integrated
solution. You can set up everything in one server, or separate components on
multiple servers, starting with the Records Manager engine. When needed, you
can have multiple CommonStore Servers, separate out Content Manager
Resource Manager, have multiple Content Manager Resource Managers, and
separate the Content Manager Records Enabler to its own server.
System configuration directly affects system performance. You must balance
your budget, your system needs, and your business requirement in finally
deciding which system configuration to use.
125
126
Advantages
Reasons why you may want to implement the records management system prior
to implementing the e-mail archiving capability include:
The need to do records management and the imposition on businesses to
legally comply is ever increasing. Not being compliant is no longer an option.
The sooner you implement the records management capability to the e-mail
system, the better. There is no legislative penalty for not archiving e-mail.
Nothing is more admissible or can help an internal discovery requirement
than to be able to demonstrate that an effective, internal records policy is in
place.
Legal discovery is not restricted in scope to only information within the
records management program. Therefore, having an effective and auditable
disposition process can reduce risk and exposure to possible legal actions.
Disadvantages
Some of the reasons why you may not want to implement the system using this
path are as follows:
The need to be records compliant is a relatively new imposition on businesses
that are still grappling with the fundamentals.
Organizations have tended, for a records-defensive position, to use a
disposal-is-suspended-indefinitely driver for information handling and
information preservation. While this has served as a legally defensive position
historically, it is an unknown and is a risk for future discovery.
127
If there are many archived e-mail messages stored in the repository, they may
have to be declared as records as well. This declaration and classification load
may be prohibitive, particularly if there are no stubs left in the users e-mail
databases. The options for declaring and classifying records are:
Have each user manually declare each of the documents that have previously
been archived (assuming that there are stubs left in the e-mail file).
Have the records administrator staff search for each archived document and
declare and classify the document. The records administrator client can be
used for this purpose but suitable search techniques will have to be
employed.
Write an application to automatically declare them as records based on the
metadata of the existing e-mail. This is probably the best way to go, as it will
require minimum effort from users or records administrators and can ensure
that all of the e-mail is declared as records.
Advantages
Some of the reasons why you may want to go with this sequence are as follows:
This path can be deployed quickly and deployed in stages if required.
From a transformational management perspective, archiving is more easily
understood by users.
This adds immediate time, storage, and cost savings to the organization.
Some of the server software and infrastructure required for both archiving and
records management can be implemented and tested in advance of a records
management system (assuming common use of the backend repository by
both systems).
Disadvantages
Some of the reasons why you may not want to go with this path are:
It is only 50% of the solution where appropriate records control is required.
Already archived e-mail and documents may have to be revisited for
records-declaration and classification purposes.
You may later alter core mandatory corporate metadata needs.
You may add to ongoing change-management procedures.
128
Advantages
Some of the reasons why you may want to implement the complete integrated
system at the same time are as follows:
Jointly piloting and deploying an integrated e-mail archiving and records
solution can reduce the impact, change, and pain for processes and users.
Prudently reuses much of the same information, which may save effort and
cost overall.
An organization gets immediate benefit from archived e-mail that is also
records-compliant.
Sets an integrated functional infrastructure that is less likely to need change
and is extensible across the rest of the organization.
Utilizes a single repository for both archived e-mail and records.
Disadvantages
Disadvantages include:
This path can add to overall project risk as the combined effort can appear to
have a longer startup duration.
Planning for an integrated solution can take longer and involves input from
multiple disciplines.
Which implementation sequence you use to implement the solution depends on
the intermediate needs of an organization. We recommend reviewing the
business requirements and regulatory obligations, understanding all aspects of
the e-mail archiving and records management solution planning and design, and
then deciding which way to approach the implementation.
129
130
Part 2
Part
Installation and
configuration
This part introduces the sequence of major steps involved in installing and
configuring the integrated e-mail archiving and records management solution.
We focus on the overall end-to-end solution installation and configuration, and
break the coverage into three chapters:
Chapter 6, Installation and configuration in a Lotus Domino and Windows
environment on page 133
Chapter 7, Installation and configuration in a Microsoft Exchange
environment on page 205
Chapter 8, Installation and configuration in a Lotus Domino and AIX
environment on page 289
131
132
Chapter 6.
Overview
Introduction to the sample environment
Prerequisites and prerequisite software installation
Content Manager installation and configuration
CommonStore (CSLD) installation and configuration
Records Manager installation and configuration
CRME installation and configuration
Configuring the CommonStore Server and Notes
133
6.1 Overview
In this section, we provide an overview for the e-mail archiving and records
management integrated solution installation and configuration.
We cover:
Software used for the integrated solution
Installation and configuration steps and recommendation
134
Product
Purpose
E-mail system
135
136
Tip: For the machine that will run Permission Synchronization Server of the
Records Enabler for Content Manager product, make sure that WebSphere
Application Server with Embedded Messaging is installed on it. This is
especially important if you start your installation from an existing system such
as a working Content Manager system.
If the Embedded Messaging feature was not installed, you must deinstall
Content Manager, uninstall WebSphere Application Server, then reinstall
WebSphere Application Server, including the Embedded Messaging feature
(installed by default in V5.1.1 and later), and then Content Manager again. Do
not take shortcuts or you may experience strange results.
If the existing Content Manager is currently being used and cannot be
deinstalled, we recommend installing the Permission Synchronization Server
on another machine.
Brighton
Charger
London
Domino
Watson
Notes
137
Figure 6-2 shows the sample environment after all components are installed
including the necessary prerequisites on each server.
On Charger, we install prerequisite software including a Notes client (Notes in
Figure 6-2), a WebSphere Application Server (WAS), DB2 server with Net
Search Extender (DB2 + NSE). In addition, we install CommonStore for Lotus
Domino (CSLD), Content Manager (CM), and IBM Records Manager database
(IRM DB).
On London, we install prerequisite software including the Content Manager V8
connector (CM connector) from Information Integrator for Content, WebSphere
Application Server with Embedded Messaging (WAS*), and a DB2 client. In
addition, we install Content Manager Records Enabler (CMRE) and IBM Records
Manager Engine (IRM Engine).
Brighton
Charger
London
CSLD
Domino
Watson
Notes
CM
CRME
IRM DB
IRM Engine
Notes
II for Content
(CM connector)
WAS
WAS*
DB2 + NSE
DB2 Client
6.3 Prerequisites
Four core components are involved in the e-mail archiving and records
management solution: Content Manager for Multiplatforms, CommonStore for
Lotus Domino, IBM Records Manager, and Records Enabler for Content
Manager.
Each core component has different prerequisites. We list what they are and their
version requirements. In addition, we explain why you should install the
prerequisite. Understanding this should help you when you build your system that
fulfills your business needs.
138
Product
Version
WebSphere
Application Server
5.1.1.2
DB2
8.2
8.1
Product
Version
8.3.0
8.2
Notes client
6.5
139
Product
Version
WebSphere
Application Server
5.1.1.2
8.2
Table 6-5 describes the prerequisite for the Records Manager database for IBM
Records Manager V4.1.2.
Table 6-5 Prerequisites for IBM Records Manager database V4.1.2
Product
Version
Reason why we
DB2
8.2
140
Product
Version
WebSphere Application
Server with Embedded
Messaging
5.1.1.2
Product
Version
8.3.0
8.2
Product
Version
WebSphere Application
Server
5.1.1.2
141
Table 6-8 summarizes the prerequisites for each software product from 6.3,
Prerequisites on page 138. Note the following:
DB2 client (runtime or administration) is needed for Records Manager (IRM)
engine, and DB2 server is required for Records Manager database if they are
installed on separate machines; otherwise, they need only DB2 server.
WebSphere Application Server (WAS in Table 6-8) with Embedded
Messaging (WAS*) is required for Permission Synchronization server from
CMRE.
DB2 Net Search Extender (NSE) is required if you need full text search
capabilities.
Table 6-8 Prerequisites for each software product
CM
CSLD
WAS
DB2
+NSE
DB2 client
IRM
CMRE
WAS
Notes client
142
In our sample environment, both the Content Manager database and Records
Manager database are located on one server, Charger. We install the DB2 server
on this machine.
Description
DB2 Version
8.1.7
Installation type
Typical
Drive
C:\
Installation directory
C:\IBM\DB2\SQLLIB
DB2 Administration
server user ID
db2admin
DB2 administration
group
DB2ADMNS
DB2 instance
DB2
Verifying installation
To verify the DB2 server installation, create the sample database from the First
Step menu. Make sure that the sample database is created successfully and that
you can view the data.
143
Configuration data
db2admin
DB2ADMNS
charger.redbook.bocaraton.ibm.com
144
In addition to installing DB2 client to the machine where the Records Manager
engine will run (if it is installed on a separate machine other than the Records
Manager database), the DB2 client should also be installed on the machine
where you will run CommonStore.
Although the DB2 Runtime Client is the minimum requirement for both instances,
we recommend installing the DB2 Administration client because it provides a
simple graphical user interface to catalog a database and other powerful DB2
tools to administer a remote database.
The installation process is straightforward, and we do not cover it here.
In the sample environment, we install the Records Manager database on
Charger and the Records Manager engine on London, so we must install DB2
client on London.
145
WebSphere
Application Server
version
5.1.0
Installation type
Full
C:\IBM\WS\WAS
C:\IBM\IHS\
C:\IBM\WS\WSMQ
Node name
Host name
WebSphere
Administrator user ID
146
for Charger:
charger
for London: london
Description
for Charger:
charger.redbook.
bocaraton.ibm.com
for London:
london.redbook.
bocaraton.ibm.com
wsadmin
Verifying installation
To verify successful WebSphere Application Server installation, at the
WebSphere Application Server - First Steps window, click Verify Installation.
The message Installation Verification is complete should show up.
Configuration data
WebSphere cell
WebSphere node
147
Description
DB2 Universal
Database
icmnlsdb
icmadmin
Authentication type
Server
icmcont
icmconct
icmconct password
Local
148
Note: It is not our intention to include all detailed steps of the installation in this
section. We recommend using the existing product manual in conjunction with
the materials we present here for a successful installation and configuration.
In our sample environment, we install Content Manager on Charger.
Attention: During a typical installation, full text search is not configured. If you
need the full text search feature, choose a custom installation.
Important: The installation directory that we used in the sample environment,
C:\IBM, is not the default installation directory. We used it to keep the PATH
system variable short and avoid potential problems with long PATH value.
Follow the product manual for detail installation steps.
To help your installation process, Table 6-14 shows the input values we used
during our installation for our sample environment. Input fields are grouped by
the input window. Replace our sample input values according to your
environment setup.
Table 6-14 Content Manager installation input values
Input window /
field
Sample input
value
Description
C:\IBM\CM
typical
149
Input window /
field
Sample input
value
Description
charger.redbo
ok.bocaraton.i
bm.com
icmnlsdb
Library Server
administration ID
icmadmin
rmdb
Resource Manager
database
administrator
rmadmin
Resource Manager
volume mounting
point
C:\
150
Charger
For our sample environment, we use the following command to implement the
Windows service:
wasservice -add ResourceManager -serverName icmrm
Brighton
Charger
Domino
CM
London
Watson
Notes
Notes
II for Content
(CM connector)
WAS
WAS*
DB2 + NSE
DB2 Client
* Including Embedded Messaging option
At the end of the installation, an installation validation utility will run. You should
see the following message, which indicates a successful installation:
Product validation completed with no detected configuration errors.
In addition to this message, perform the following steps to ensure that you
installed Content Manager successfully:
1. Launch the system administration client that is automatically installed on the
Content Manager server. In our scenario, we launch the system
administration client from Charger.
151
2. Log on to the Content Manager system using the administrative user ID. In
our scenario, we use icmadmin.
3. Open the Resource Manager configuration.
4. If the Resource Manager configuration is available, the communication with
the Resource Manager is set up properly.
Perform the following steps as the final test of a successful installation:
1. Install a Content Manager Windows client on the Content Manager server.
This is the fastest way to configure the client. In our scenario, we install the
client on Charger.
2. Launch the Content Manager Windows client.
3. Import a text into the NOINDEX class of type text.
4. Retrieve the document immediately afterward. Make sure that you can
retrieve it, open it, and view it on the screen.
152
Configuration data
Description
Content Manager
administrator user ID
icmadmin
Connection user ID
icmconct
Content Manager
server host name
charger.redbook.boca
raton.ibm.com
Library Server
database
icmnlsdb
Note: It is not our intention to include all steps of the installation in this section.
We recommend using the existing product manual in conjunction with the
materials we present here for a successful installation and configuration.
In the sample environment, we install CommonStore in Charger.
153
Description
Installation directory
C:\IBM\CSLD
154
Attribute
Required
Attribute type
Character
type
Character
length
CSLDOrigDB
YES
Var. char.
Other
1 ... 254
CSLDOrigUser
YES
Var. char
Extended
alphanumeric
1 ... 254
CSLDDocUNID
YES
Character
Alphanumeric
32
CSLDDoc
SeqNum
YES
Character
Extended
alphanumeric
25
CSCDISIS
YES
Character
Alphanumeric
32
CSCRISIS
YES
Character
Alphanumeric
32
BCC
YES
Var. char.
Other
0 ... max.
possible
SUBJECT
NO
Var. char.
Other
0 ... 254
SENDER
NO
Var. char.
Other
0 ... 100
TO
NO
Var. char.
Other
0 ... max.
possible
CC
NO
Var. char.
Other
0 .... max.
possible
POSTEDDATE
NO
Time stamp
N/A
N/A
155
4. Click the Attributes tab, select these attributes, and assign them to the item
type:
CSCDISIS
SUBJECT
SENDER
TO
CC
POSTEDDATE
5. For single instance store, create a child component, CSLDMailChild, and add
the following attributes to this child component:
CSCRISIS
CSLDOrigDB
CSLDOrigUser
BCC
CSLDDocUNID
CSLDocSeqNum
Table 6-18 shows the input values we used to create the DominoMail item
type in the sample environment.
Table 6-18 Item type, DominoMail, created in the sample environment
Configuration
tab / field
Description
Name
DominoMail
Text search
unchecked
Definition
156
Item type
access control
list
PublicReadACL
Check ACL at
on Item level
Configuration
tab / field
Description
Attributes
CSCDISIS
SUBJECT
SENDER
TO
CC
POSTEDDATE
Child
component
CSLDMailChild
Attributes for
child component
CSCRISIS
CSLDOrigDB
CSLDOrigUser
BCC
CSLDocUNID
CSLDDocSeqNum
Attributes
Document Management
Document part
ICMBASE
157
3. Enter CSLD as the user name and appropriate values. Click Save.
Table 6-19 shows the input values we used to create the Content Manager
user ID in the sample environment.
Table 6-19 Content Manager user ID, CSLD, created in the sample environment
Configuration tab /
field
Sample input
value
Description
CSLD
Define Users
Name
Password
Password
expiration
Never expires
Maximum privilege
set
AllPrivs
PublicReadACL
Set Defaults
Default item access
control list
Tip: To make sure that the Content Manager user ID used by CommonStore
can access the Content Manager system, install a Content Manager Windows
client on the CommonStore Server. Use this client to log on to the Content
Manager using the ID (CSLD) created to be used by CommonStore. Try to
import a document (for example, a text file) to the newly created item type.
158
159
3. Use the search function of your editor to locate the following section:
ARCHIVE
STORAGETYPE
LIBSERVER
ITEM_TYPE
CMUSER
ARCHIVETYPE
CSLDMail
CM
sampleLibServer
sampleItemType
sampleUser
GENERIC_MULTIPART
160
Parameter
Sample input
value
Description
ARCHIVE
STORAGETYPE
CM
ITEM_TYPE
DominoMail
LIBSERVER
icmnlsdb
Parameter
Sample input
value
Description
CMUSER
CSLD
ARCHIVETYPE
GENERIC_M
ULTIDOC
SISCHILDNAME
CSLDMail
Child
After changing the values, the logical archive section of the archint.ini file
should look like this:
ARCHIVE
STORAGETYPE
LIBSERVER
ITEM_TYPE
CMUSER
ARCHIVETYPE
EMail
CM
icmnlsdb
DominoMail
CSLD
GENERIC_MULTIDOC
Submitting a license
To submit a license, perform the following steps:
1. Open a Windows command prompt.
161
4. The location of the license file is requested. Provide the full path including the
file name:
C:\IBM\CSLD\licensekey\csld8.lic
Important: If you skip this step, a Try and Buy licence will be installed and
it will expire after 90 days. After the 90-day period, the CommonStore
Server will not start.
162
Starting ArchPro
To start ArchPro, perform the following steps:
1. Open a Windows command prompt (if not already open).
2. Change to the instance01 subdirectory of the CSLD installation path.
Instance Directory: C:\IBM\CSLD\server\instance01
3. Start the CommonStore Server by entering the following command:
archpro
163
The message prefix (the first three characters of the message) identifies the
component generating the message. The following mappings apply:
CSS
CSA
CM8 agent
164
Configuration
field
Sample input
value
Description
User ID
CSLD Task
password
Configuration data
Description
Original location
Charger
C:\IBM\CSLD\data
Destination
Brighton
C:\IBM\Domino\data
165
Configuration field
Sample input
value
Description
Server
Mail/ITSO
Title
CSLDConfig
Filename
CSLDConfig.nsf
Server
Mail/ITSO
Template
CSLD
Configuration
Database 8.3
4. Add the Domino user ID used by CommonStore (CSLD Task) to the ACL.
To create a new job database:
1. Start Notes Client.
2. Select File Database New.
3. Enter appropriate values for the database using the information listed in
Table 6-24 on page 167 as a reference.
166
Configuration field
Sample input
value
Description
Server
Mail/ITSO
Title
CSLDJobs
Filename
CSLDJobs.nsf
Server
Mail/ITSO
Template
CSLD Job
Database 8.3
4. Add the Domino user ID used by CommonStore (CSLD Task) to the ACL and
assign the role CSLDUsers to it.
5. Open the newly created Configuration database and create a profile for the
archiving task and a profile for the retrieve task, using values in Table 6-25
and Table 6-26 on page 168 as references.
Table 6-25 Database profile for archive task
Configuration field
Sample input
value
Description
Archiver
All
Database name
CSLDJobs.nsf
Server
Mail/ITSO
Basics
Name
Working DBs
Working DBs
Job DB
167
Configuration field
Sample input
value
Description
Yes
Security
Restrict retrieval to
point of origin
Environment
Task TCP/IP port
9000
CommonStore
TCP/IP port
47111
CommonStore host
name
charger.redbook.b
ocaraton.
ibm.com
CommonStore Web
port
8095
Folder Archive ID
Configuration field
Sample input
value
Description
Retriever
All
Basics
Name
Working DBs
Working DBs
168
Configuration field
Sample input
value
Description
Database name
CSLDJobs.nsf
server
Mail/ITSO
Yes
Job DB
Security
Restrict retrieval to
point of origin
Environment
Task TCP/IP port
9001
CommonStore
TCP/IP port
47111
CommonStore host
name
charger.redbook.b
ocaraton. ibm.com
CommonStore Web
port
8095
Folder Archive ID
169
6. Set document mapping and content type mapping using Table 6-27 and
Table 6-28 on page 171 as reference.
Table 6-27 Document mapping
Configuration
window / field
Sample input
value
Description
Define mapping
for
Document form
Memo
Optional form
aliases
Reply, Forward
CommonStore
Archive ID
Notes fields to
display in hit lists
Subject, From,
PostedDate
Memo
Subject
From
PostedDate
Form
Configuration
Attribute
Notes document
field names
170
Configuration
window / field
Sample input
value
Description
Archive attribute
names
CSLDSubject
CSLDFrom
CSLDPostedDate
Configuration field
Sample input
value
Description
File extension
csn
Content type
csn/Application
171
Configuration data
Sample input
value
Description
Location of copied
notes.ini and
names.nsf
C:\IBM\CSLD\
Directory value in
copied notes.ini
C:\IBM\CSLD\
Tip: The notes.ini and the names.nsf file in the Notes installation directory
should be copied to a different directory, where it is only accessed by the
CommonStore Task and not changed by any other Notes application.
Important: After both files are copied, make sure the directory entry in the
copied notes.ini file is changed to the directory that contains the copied
names.nsf.
Also, copy the Domino ID file used by the task to the same directory and make
sure the keyfilename entry points to the right directory.
Configuration data
Sample input
value
Description
Location of nnote.dll
C:\IBM\notes\
172
The password will be stored encrypted in a file. Every time the password of the
used Domino user ID is changed, this process must be repeated. If the password
is changed without repeating this process, a CommonStore Task will fail to
connect to the Domino server because it is using an invalid password.
After the password is saved, notes.ini has to be updated to inform the Notes API
to make use of this stored password. Add the following line to the notes.ini file:
EXTMGR_ADDINS=CSLDExtPwd.dll
Important: Do not add this line to a notes.ini file that is used by a Notes client,
or else the Notes client will use the DLL and will not start up properly.
Table 6-31 summarizes the setup for saving the Domino user ID password.
Table 6-31 Domino user ID password saving setup
Configuration data
location of used
notes.ini file
C:\IBM\CSLD\
EXTMGR_ADDINS=CSLDExtPwd.dll
store password
Description
In this syntax:
173
Attention: Before installing the ArchPro and the Task as Windows services
make sure previously started components (for example, in Windows command
prompts) are closed down.
To implement a Window service:
1. Create a directory C:\IBM\CSLD\WindowsService.
2. Open a text editor and create three .ini files, one per component. Each file
contains the following parameters:
SERVICE_ TRACEFILE: The path (including the file name) of the trace file,
that this service creates. The directory must exist already.
PROCESS1: The startup command of the component.
Example 6-2, Example 6-3 on page 175, and Example 6-4 on page 175 show
the .ini files setup for the sample environment. Use them as references to set
up files in your environment.
3. Save the files in directory C:\IBM\CSLD\WindowsService.
Example 6-2 Sample ArchProService.ini file
#-----------------------------------------------------------------------------#
# full file name of SERVICE_TRACEFILE
#-----------------------------------------------------------------------------#
SERVICE_TRACEFILE 'C:\ibm\csld\WindowsService\ArchProService.trace'
#-----------------------------------------------------------------------------#
# start sequences for archpro and csld tasks
-----------------------------------------------------------------------------#
PROCESS1 '"c:\ibm\csld\bin\archpro.exe" -i
"c:\ibm\csld\server\instance01\archint.ini"'
174
In this syntax:
<name> appears in the Windows services list as part of the service name. A
CommonStore Service always starts with CommonStore_ and ends with the
specified value. In the examples, the services will appear as:
CommonStore_ArchPro
CommonStore_ArchiveTask
CommonStore_RetrieveTask
<config file> is the path (including the file name) of the configuration file to
be used.
5. Execute the following command to install ArchPro service:
archservice install -n ArchPro -c
C:\IBM\CSLD\WindowsService\ArchProService.ini
175
176
Brighton
Charger
London
CSLD
Domino
CM
Watson
Notes
II for Content
(CM connector)
Notes
WAS
WAS*
DB2 + NSE
DB2 Client
* Including Embedded Messaging option
Note: The various forms, views, and libraries from the CSLD sample template
are not meant for production use but to be used as a guide to incorporating
CSLD and Records functions into your corporate Notes template.
Configuration data
CSLD Task
CSLD
DominoMail
177
records enabling the entire e-mail archiving solution. In this section, we describe
the main steps involved in installing and configuring Records Manager.
These steps are as follows:
1.
2.
3.
4.
5.
Note: It is not our intention to include all detailed steps of the installation in this
section. We recommend using the existing product manual in conjunction with
the materials we present here for a successful installation and configuration.
In our sample environment, we install Records Manager engine on London and
Records Manager database on Charger.
Configuration
window / field
Sample input
value
Description
Installation Destination
Directory Name
C:\IBM\IRM
Installation Type
Setup type
typical
178
selected
Configuration
window / field
Sample input
value
Description
SOAP
Connector Port
8880
Cell
london
Node
london
Server
server1
Security Enabled
unchecked
179
Configuration
window / field
Sample input
value
Description
irmwas
Connection
Factories
Authentication
password
Mail Session Configuration
Mail Transport Host
180
Brighton
SMTP User
password
Configuration
window / field
Sample input
value
Description
IRMClient
London.redboo
k.bocaraton.ibm
.com
8880
IRMWebServic
es
London.redboo
k. bocaraton.
ibm.com
9080
London.redboo
k. bocaraton.
ibm.com
181
Configuration
window / field
Sample input
value
Description
2809
C:\IBM\WS\WA
S
WebSphere Location
WebSphere
Location
Configuration
window / field
Description
Installation Directory
Directory Name
C:\IBM\IRM\Database
Database Type
Database Type
DB2
JDBC driver
class path
C:\IBM\DB2\SQLLIB\java
182
DB2
Configuration
window / field
Description
Database Name
irmdb
Default Disk
Folder for
Database
container
C:\IBM\IRM\Database
User name
irmadmin
Territory
default
Collating System
System
User password
183
Configuration
window / field
Description
DB Language
English
System
administrator user
name
db2admin
System
administrator user
password
Sample
184
Table 6-35 Records Manager database upgrade input for sample environment
Configuration window /
field
Description
C:\IBM\IRM\Database
Installation Directory
Directory Name
Selected
Database Type
Database Type
DB2
C:\IBM\DB2\SQLLIB\j
ava
DB2
Database Name
irmdb
C:\IBM\IRM\Database
User name
irmadmin
db2admin
User password
System administrator
user name
185
Configuration window /
field
System administrator
user password
Description
Specifies the password of the
database user with system
administrator privileges for the
DB2 database instance.
Database Back Up
Selected database was
backed up
Selected
186
Configuration field
Connector Type
SOAP
Port Number
8880
Cell
london
Description
Configuration field
Description
Node
london
Server
server1
After the engine configuration tool is started, a data source (the Records
Manager database created in Step 2: Install Records Manager database V4.1.1
on page 182) must be created.
To create the data source, select Action New.
Table 6-37 shows the input values we used when creating the new data source.
Replace these values with the appropriate ones for your environment.
After creating the new data source, select File Save Changes.
Table 6-37 Data source input for the sample environment
Configuration field
Description
C:\IBM\DB2\SQLLIB\java
irmdb
Database Name
irmdb
User name
irmadmin
User password
Important: After configuring the data source, if the utility is closed without
saving, the provided information will be lost and the data source will not be
available during the Records Manager Administration client startup.
Before the Records Manager Administration client can be used, the WebSphere
Application Server must be restarted.
187
Use the Windows Services utility to restart the service IBM WebSphere
Application Server V5 - server1, or go to the WebSphere bin directory
(C:\IBM\WS\WAS\bin) and use the following commands to restart the server:
stopserver server1
startserver server1
Brighton
Charger
London
CSLD
Domino
Watson
Notes
CM
IRM DB
IRM Engine
Notes
II for Content
(CM connector)
WAS
WAS*
DB2 + NSE
DB2 Client
* Including Embedded Messaging option
188
4. Go back and check the amq* and runq* processes in the Task Manager. They
should be there now.
Records Manager
Administrator user ID
Administrator
password: cronos
WebSphere Application
Server server name
server1
Description
189
2. Install Records Enabler (CMRE server, Host Interface server, and Permission
Synchronization server).
3. Install Records Manager Extension.
4. Implement Windows Services.
Important: The JDBCPATH must include the db2java.zip file name; otherwise,
the installation will fail.
Create a local user on the machine that runs the Content Manager Library
Server. This user has to be in the DB2 administrator group.
For the sample environment, we create:
User name: CMREID
User group: DB2ADMNS
190
Configuration
window / field
Sample
input value
Description
Selected
DB2 Content
Manager Records
Manager Host
Interface
Selected
DB2 Content
Manager Records
Enabler
Permissions
Synchronization
Selected
WebSphere
Application Server
cell name
london
WebSphere
Application Server
node name
london
Host name
London.red
book.bocara
ton.ibm.com
191
Configuration
window / field
Sample
input value
Description
WebSphere
Application
Security Enabled
unchecked
Charger.red
book.bocara
ton.ibm.com
:2809
Records Manager
Administration
client URL
http://charge
r.redbook.bo
caraton.ibm.
com:9080/I
RMClient
Records Manager
database
irmdb
Records Manager
Administrator
Administrato
r
Password
cronos
icmnlsdb
Content Manager
authentication
icmadmin
cmreid
Password
Content Manager
Records Enabler
Connection ID
192
Configuration
window / field
Sample
input value
password
Description
Password of the user ID on the Windows
operating system level.
confirm password
eClient rendering
Content URL
http://....
eClient document
list URL
http://...
Database System
used for Content
Manager
DB2
cmresvr
Records Manager
Host Interface
Server
rmecmhost
Add Host
Configuration
record to DB2
Records Manager
checked
Content Manager
Records Enabler
Permissions
Synchronization
cmrepsproc
Permissions
Synchronization
Scheduler
checked
193
Configuration
window / field
Sample
input value
Permissions
Synchronization
engine
checked
Description
Configuration
window / field
Sample input
value
Description
194
WebSphere
Application Server
cell name
london
WebSphere
Application Server
node name
london
Host name
london.redboo
k.bocaraton.ib
m.com
WebSphere
Application Security
Enabled
unchecked
Records Manager
Application server
name
server1
195
Brighton
Charger
London
CSLD
Domino
Watson
Notes
CM
RME
IRM DB
IRM Engine
Notes
II for Content
(CM connector)
WAS
WAS*
DB2 + NSE
DB2 Client
* Including Embedded Messaging option
196
2. Go to Security Users Host Filer and select the host system that is
enabled during the CMRE installation.
In the sample environment, the host system with the name icmnlsdb is
enabled. (See Add Host Configuration record to DB2 Records Manager of
Step 2: Install Content Manager Records Enabler (CMRE) on page 190.)
3. Click Import, select icmadmin, and click Import again. In the next window,
select all permissions by checking Function Access. Check the Is Active
check box. Click Save to finish the import.
4. The Content Manager user ID icmadmin is now imported to the Records
Manager system and has all necessary rights to act as Administrator with the
Records Manager system.
197
Configuration data
DominoMail
198
For detailed information about CSLD and Records Enabler integration, refer to
Chapter 21, Using Content Manager Records Enabler in the CSLD environment
in IBM DB2 CommonStore for Lotus Domino: Administration and Users Guide,
Version 8.3, SH12-6742.
Set DB_DIR to the directory to store the mapping database. (Note the double
backslashes, as a single backslash would indicate an escape sequence, such
as \n.) This directory will contain a collection of files that are serialized hash
tables containing string keys of the format CM-server:mail-user and
CSRepUserDef values. Make sure this folder exists and is empty. The files will
be generated automatically, along with a file that indicates the current
HASH_MODULO value so that it can be changed.
Set HASH_MODULO to the maximum number of files to be found in the
DB_DIR directory. This is to prevent the entire database from ever needing to
be in memory at one time so that a huge number of users can be supported.
Bigger values mean smaller memory usage (but more files).
199
Parameter
DB_DIR
C:\IBM\CSLD\server\instance01\database
HASH_MODULO
1000
PROXY_PORT
8067
3. Add usermapper.jar and Notes.jar into the classpath as well as the directory
of CSExit.properties.
Table 6-42 Classpath for usermapper.jar, Notes.jar, and CSExit.properties
File/directory
usermapper.jar
C:\IBM\CSLD\server\instance01\ usermapper.jar
Notes.jar
C:\IBM\Notes\Notes.jar
CSExit.properties directory
C:\IBM\CSLD\server\instance01
4. Update archint.ini.
To activate usermapper, add the values for these parameters in archini.ini:
ACCESS_CTL
CM_SECURITY_EXIT
CM_EXIT_LOCATION
The input value for ACCESS_CTL YES specifies whether you want Retrieve
operations to be subject to the users Content Manager permissions.
The input value for CM_SECURITY_EXIT specifies the name of the security
exit class as com.ibm.rme.csexit.CSExit.
The input value for CM_EXIT_LOCATION specifies the file location of the
usermapper.jar file.
In our sample environment, we set these values as shown in Table 6-43.
Table 6-43 archint.ini file update
200
Parameter
ACCESS_CTRL
YES
CM_SECURITY_EXIT
com.ibm.rme.csexit.CSExit
CM_EXIT_LOCATION
'C:\IBM\CSLD\server\instance01\usermapper.jar'
Parameter
RMEServerURL_Default
http://LONDON.
redbook.bocaraton.ib
m.com:9082/RMEServ
er/RMEClientServlet
CMHostName_Default
charger.rebdook.
bocaraton.ibm.com
CMItemTypeName_
Default
icmnlsdb
UserProxyServerName_
Default
charger.rebdook.
bocaraton.ibm.com
UserProxyServerPort_
Default
8067
Description
Defined in CSExit.properties
CSLDArchiveStatusField_
Default
RefreshInterval_Default
RefreshTotal_Default
RMEFolderClassifyTotal
CSarchAction_Default
WebServerPort
80
201
Parameter
CScreatePlaceholderAs
URL_Default
Description
This value is configured as
true if you want the system to
create hot links for
attachments in e-mail after
archiving; otherwise, this
value is configured as false.
Attention: Changes to those variables will not affect a database that has
already had a template applied, because a configuration document is already
created and this document will not be refreshed if the values are updated.
Note: The various forms, views, and libraries from the CSLD sample template
are not meant for production use, but rather as a guide to incorporating CSLD
and Records functions into your corporate Notes template.
3. Set up Domino security:
a. Log on to the Notes administration client using an Administrator user ID.
b. Create a new user group (RMEUserGroup):
i. Go to the People&Group tab.
ii. Click Groups Add group.
c. Add Notes users that need to declare records to this group.
d. Grant security to the group:
i. Go to the Configuration tab.
ii. Expand Server Current Server Document.
iii. Click Security and grant with the following security permission:
Run
Run
Run
Run
Run
202
6.9.1 Verification
To verify that the CommonStore Server and Notes client are configured properly:
1. In Notes client, create an e-mail message and send it off.
2. Manually declare the e-mail message as a record.
3. Make sure that the e-mail is archived in Content Manager using the Content
Manager Windows client.
4. After the e-mail is archived, the Records Manager classification window
should come up. Specify the bucket in the file plan; for example, Account
Receivable in our sample environment. Enter a unique ID into the e-mail
name field, and click Finish.
5. Make sure that in Notes client reflects that the e-mail is a record.
6. Using Content Manager Windows client, verify that the e-mail Record
attribute is set to yes.
7. Using the Records Manager Administration client, check that the record is
there.
8. Use Notes client to view the e-mail message.
203
204
Chapter 7.
Installation and
configuration in a Microsoft
Exchange environment
This chapter describes the installation and configuration of an e-mail archiving
and records management solution using CommonStore for Exchange Server,
Records Manager, Content Manager, and Content Manager Records Enabler.
Using a sample environment, we describe the major steps involved in installing
and configuring the various components in a Windows environment. For more
detailed information, see the appropriate product documentation.
We cover the following topics in the chapter:
Overview
Introduction to the sample environment
Prerequisites and perquisite software installation
Content Manager installation and configuration
CommonStore (CSX) installation and configuration
Records Manager installation and configuration
CMRE installation and configuration
Records enable CommonStore Server and Outlook
205
7.1 Overview
In this section, we provide an overview for the e-mail archiving and records
management integrated solution installation and configuration.
We cover:
Software used for the integrated solution
Installation and configuration steps and recommendation
206
Product
Purpose
E-mail system.
207
208
Tip: For the machine that will run Permission Synchronization Server of the
Records Enabler for Content Manager product, make sure that WebSphere
Application Server with Embedded Messaging is installed on it. This is
especially important if you start your installation from an existing system (for
example, a working Content Manager system).
If the Embedded Messaging feature was not installed, you must deinstall
Content Manager, uninstall WebSphere Application Server, then reinstall
WebSphere Application Server, including the Embedded Messaging feature
(installed by default in V5.1.1 and later), and then Content Manager again. Do
not take shortcuts or you may experience strange results.
If the existing Content Manager is being used and cannot be deinstalled, we
recommend installing the Permission Synchronization Server on another
machine.
209
Brighton
Charger
London
Exchange
Watson
Outlook
Active Directory
Figure 7-2 shows the sample environment after all components are installed,
including the necessary prerequisites on each server.
On Charger, we install prerequisite software including an Outlook client
(Outlook), WebSphere Application Server, and DB2 server with Net Search
Extender (DB2 + NSE). In addition, we install CommonStore for Exchange
Server (CSX), Content Manager (CM), and IBM Records Manager database
(IRM DB).
On London, we install prerequisite software including the Content Manager V8
connector (CM connector) from Information Integrator for Content, WebSphere
Application Server with Embedded Messaging (WAS*), and a DB2 client. In
addition, we install Content Manager Records Enabler (CMRE) and IBM Records
Manager Engine (IRM Engine).
Brighton
Charger
London
CSX
Exchange
Watson
Outlook
Active Directory
CM
RME
IRM DB
IRM Engine
Outlook
II for Content
(CM connector)
WAS
WAS*
DB2 + NSE
DB2 Client
* Including Embedded Messaging option
210
7.3 Prerequisites
Four core components are involved in the e-mail archiving and records
management solution: Content Manager for Multiplatforms, CommonStore for
Exchange Server, IBM Records Manager, and Records Enabler for Content
Manager.
Each core component has different prerequisites. We list what they are and their
version requirements. In addition, we explain why you should install the
prerequisite. Understanding this should help you when you build a system that
fulfills your business needs.
Product
Version
WebSphere Application
Server
5.1.1.2
DB2
8.2
8.1
211
Product
Version
8.3.0
8.2
Outlook client
2000,
XP(2002),
and 2003
212
Product
Version
WebSphere Application
Server
5.1.1.2
8.2
Table 7-5 describes the prerequisites for the Records Manager database for IBM
Records Manager V4.1.2.
Table 7-5 Prerequisites for IBM Records Manager (Database) V4.1.2
Product
Version
DB2
8.2
Product
Version
WebSphere Application
Server with Embedded
Messaging
5.1.1.2
Information Integrator
(II) for Content - CM V8
connector
8.3.0
8.2
Table 7-7 describes the prerequisites for the Records Manager extension.
Table 7-7 Prerequisites for Records Manager Extension V8.3.0
Product
Version
WebSphere
Application
Server
5.1.1.2
213
Table 7-8 summarizes the prerequisites for each software product from 7.3,
Prerequisites on page 211. Note the following information:
DB2 client (runtime or administration) is needed for Records Manager (IRM)
engine, and DB2 server is required for Records Manager database if they are
installed on separate machines; otherwise, they need only DB2 server.
WebSphere Application Server with Embedded Messaging (WAS* in
Table 7-8) is required for Permission Synchronization server from CMRE.
DB2 Net Search Extender is required if you need full text search capabilities.
Table 7-8 Prerequisites requirement per software product
CM
CSX
WAS
DB2
+NSE
DB2 client
IRM
CMRE
WAS
Outlook client
For the sample environment that we described in 7.2, Introduction to the sample
environment on page 209, we install the following prerequisites on two servers:
London:
DB2 Administration Client V8.2
Information Integrator for Content - Content Manager V8 connector
WebSphere Application Server (including Embedded Messaging) V5.1.1.2
Charger:
DB2 server V8.2
214
Note: We do not include all detailed steps of the installation in this section. We
recommend using the existing product manuals in conjunction with the
materials we present here for successful installations and configurations.
In our sample environment, both the Content Manager database and Records
Manager database are located on Charger. We choose to install the DB2 server
on this machine.
Description
DB2 Version
8.1.7
Installation type
Typical
Drive
C:\
Installation directory
C:\IBM\DB2\SQLLIB
215
Description
DB2 Administration
server user ID
db2admin
DB2 administration
group
DB2ADMNS
DB2 instance
DB2
Verifying installation
To verify the DB2 server installation, create the sample database from the First
Step menu. Make sure that the sample database is created successfully and that
you can view the data.
216
Table 7-10 Key information to remember after the DB2 server installation
Configuration data
db2admin
DB2ADMNS
charger.redbook.bocaraton.ibm.com
217
218
WebSphere Application
Server version
5.1.0
Installation type
Full
C:\IBM\WS\WAS
Description
C:\IBM\IHS\
C:\IBM\WS\WSMQ
Node name
Host name
Description
for Charger:
charger.redbook.
bocaraton.ibm.com
for London:
london.redbook.
bocaraton.ibm.com
WebSphere Administrator
user ID
wsadmin
Verifying installation
To verify successful WebSphere Application Server installation, at the
WebSphere Application Server First Steps window, click Verify Installation.
The message Installation Verification is complete should show up.
219
Configuration data
WebSphere cell
WebSphere node
220
Sample input
value
Description
DB2 Universal
Database
icmnlsdb
icmadmin
Authentication type
Server
Connection user ID
icmconct
Checked
Note: We do not include all of the detailed steps of the installation in this
section. We recommend using the existing product manual in conjunction with
the materials we present here for a successful installation and configuration.
In our sample environment, we install Content Manager on Charger.
221
Attention: During a typical installation, full text search is not configured. If you
need the full text search feature, choose a custom installation.
Important: The installation directory that we used in the sample environment,
C:\IBM, is not the default installation directory. We used it to keep the PATH
system variable short and avoid potential problems with long PATH value.
Follow the product manual for detailed installation steps.
To help your installation process, Table 7-14 shows the input values we used
during our installation. Input fields are grouped by the input window. Replace our
sample input values as needed for your environment setup.
Table 7-14 Content Manager installation input values
Description
C:\IBM\CM
typical
charger.redbook.bo
caraton.ibm.com
222
icmnlsdb
Description
Library Server
administration ID
icmadmin
rmdb
Resource Manager
database
administrator
rmadmin
Resource Manager
volume mounting
point
C:\
Charger
223
For our sample environment, we use the following command to implement the
Windows service:
wasservice -add ResourceManager -serverName icmrm
Brighton
Charger
Exchange
CM
London
Watson
Outlook
Active Directory
Outlook
II for Content
(CM connector)
WAS
WAS*
DB2 + NSE
DB2 Client
* Including Embedded Messaging option
At the end of the installation, an installation validation utility runs. You should see
the following message, which indicates a successful installation:
Product validation completed with no detected configuration errors.
In addition to this message, perform the following steps to ensure that you
installed Content Manager successfully:
1. Launch the system administration client that is automatically installed on the
Content Manager server. In our scenario, we launch system administration
client from Charger.
2. Log on to the Content Manager system using the administrative user ID. In
our scenario, we use icmadmin.
224
Configuration data
Description
Content Manager
administrator user ID
icmadmin
Connection user ID
icmconct
charger.redbook.bocarat
on.ibm.com
icmnlsdb
225
226
Description
Installation directory
C:\IBM\CSX
227
228
Attribute
Required
Attribute type
Character type
Character
length
CSORIGINATOR
YES
Var. char.
Other
1 ... 256
CSUNIQUEID
YES
Character
Alphanumeric
32
CSCDISIS
YES
Character
Alphanumeric
32
CSCRISIS
YES
Character
Alphanumeric
32
BCC
YES
Var. char.
Other
0 ... max.
possible
SUBJECT
NO
Var. char.
Other
0 ... 254
SENDER
NO
Var. char.
Other
0 ... 100
TO
NO
Var. char.
Other
0 ... max.
possible
CC
NO
Var. char.
Other
0 .... max.
possible
DATE_TIME_C
NO
Time stamp
N/A
N/A
DATE_TIME_M
NO
Time stamp
N/A
N/A
Note: The CSORIGINATOR field holds the name of the mailbox or public
folder where the message was archived from. For example, the
CSORIGINATOR for a mailbox might be:
/O=REDBOOK/OU=FIRST ADMINISTRATIVE GROUP/CN=RECIPIENTS/CN=EMILYW
Important: The CSORIGINATOR for a public folder might be longer than 256
characters. If you plan to archive content in existing public folders, you might
need to create a Content Manager attribute longer than 256 characters for
CSORIGINATOR. An example CSORIGINATOR for a public folder could be:
PUBLICFOLDER:\FOUR-HUNDRED\NINETY-ONE\NINETY-TWO\NINETY-THREE\NINETY-FOUR
\NINETY-FIVE\NINETY-SIX\NINETY-SEVEN\NINETY-EIGHT\NINETY-NINE\ONE-HUNDRED
Table 7-18 on page 230 shows the input values we used to create the
CSXMail item type in the sample environment.
229
Configuration
tab / field
Description
Name
CSXMail
Text search
unchecked
Definition
PublicReadACL
Check ACL at
on Item level
Attributes
CSCDISIS
SUBJECT
SENDER
TO
CC
DATE_TIME_C
DATE_TIME_M
Child
component
CSXMailChild
Attributes
230
Configuration
tab / field
Description
Attributes for
child
component
CSCRISIS
CSORIGINATOR
CSUNIQUEID
BCC
Document Management
Document part
ICMBASE
Configuration field
Sample input
value
Description
CSX
Define Users
Name
Password
231
Password expiration
Never expires
AllPrivs
PublicReadACL
Set Defaults
Default item access
control list
Tip: To make sure that the Content Manager user ID used by CommonStore
can access the Content Manager system, install a Content Manager Windows
client on the CommonStore Server. Use this client to log on to the Content
Manager using the ID (CSX) created to be used by CommonStore. Try to
import a document (for example, a text file) to the newly created item type.
232
CSXSAMPLEARCHIVE
CM
sampleLibServer
sampleItemType
sampleUser
GENERIC_MULTIPART
233
Table 7-20
234
Parameter
Sample input
value
Description
ARCHIVE
CSXMAIL
STORAGETYPE
CM
LIBSERVER
icmnlsdb
ITEM_TYPE
CSXMail
CMUSER
CSX
ARCHIVETYPE
GENERIC_M
ULTIDOC
Parameter
Sample input
value
Description
SISCHILDNAME
CSXMailChild
After changing the values, the logical archive section of the archint.ini file
should look like this:
ARCHIVE
STORAGETYPE
LIBSERVER
ITEM_TYPE
CMUSER
ARCHIVETYPE
SISCHILDNAME
CSXMAIL
CM
icmnlsdb
CSXMail
CSX
GENERIC_MULTIDOC
CSXMailChild
Submitting license
To submit license, perform the following steps:
1. Open a Windows command prompt.
2. Change to the instance01 subdirectory of the CSX installation path:
Instance Directory: C:\IBM\CSX\server\instance01
3. Enroll a CommonStore license by entering the following command:
archpro -f license
4. The location of the license file is requested. Provide the full path including the
file name:
C:\IBM\CSX\licensekey\csx8.lic
Important: If you skip this step, a Try and Buy licence will be installed and
it will expire after 90 days. After the 90-day period, the CommonStore
Server will not start.
235
Starting ArchPro
To start ArchPro, perform the following steps:
1. Open a Windows command prompt (if not already open).
2. Change to the instance01 subdirectory of the CSX installation path.
Instance Directory: C:\IBM\CSX\server\instance01
3. Start the CommonStore Server by entering the archpro command.
Example 7-1 on page 237 shows the messages displayed during archpro
startup.
236
The message prefix (the first three characters of the message) identifies the
component generating the message. The following mappings apply:
CSS
CSA
ADM
237
The search server is ready for processing when this message is displayed:
Server server1 open for e-Business;
Configuration field
Sample input
value
Description
First Screen
238
First Name
CSX
Last Name
Admin
csxadmin
Second Screen
Password
Password never
expires
Third Screen
Create an Exchange
mailbox
checked
Alias
csxadmin
Server
Redbook/ First
Administrative
Group
/BRIGHTON
239
240
241
Note: If you see the error message ActiveX object could not be created
is displayed, make sure that the Collaborative Data Objects (CDO) are
installed. This component is shipped with Outlook, but not installed by
default.You can call the Outlook setup program from the Add/Remove
Programs window to add this feature.
After successful completion, the following folders are available:
...\CommonStore\Configuration
This folder contains configuration information. It is updated by the CSX
System Administration program and read by all CSX clients.
...\CommonStore\Job Folders
Individual subfolders of this folder contain CSX client requests for
interactive archiving and retrieval. All CSX clients must have write access
to these folders.
...\CommonStoreTransferFolder
This folder is used only for PST file archiving.
3. Grant user access to the public folders.
To grant access to the public folders created during the installation of the form
templates, use the Exchange System Manager. As each CommonStore
installation is different, this section can give only some recommendations.
The overall aim is to prevent ordinary users from damaging the existing
configuration. See the following list:
Only the administrator should be the owner of the public folders. Other
users should have limited rights.
User IDs that are authorized to create and modify Task Administration
Data objects in the CSX System Manager must also have owner rights for
the public folder CommonStore\Configuration. Other users should have
only read access to this folder. We recommend that you create special
user IDs just for administration tasks.
As the administrator, grant other users only reviewer rights to the public
folder CommonStore so that these users cannot create or delete folders
and items.
Grant read access to the public folder Configuration, which is a subfolder
of the CommonStore folder. The CSX Client Components must be able to
read the content of the mapping items therein, which is why the users
need read access. Not extending this right any further prevents users from
changing or deleting items in this folder.
242
For the same reason, grant users only read access to the public folder
named Job Folders.
Users must be able to write to the subfolders of Job Folders because this
is part of the job creation process. The subfolders are created at a later
point in time, when you configure CSX Task instances in the CSX System
Manager. The subfolders are actually the job folders for the interactive job
documents of each individual CSX Task instance. It is possible that users
need the right to delete items in these subfolders. However, you should not
allow them to delete items in job folders belonging to other task instances.
Restrict the write access of users to the job folder that belongs to the CSX
Task instance assigned to their mail boxes.
Make sure that the user who starts a particular CSX Task instance has
owner rights for all subfolders in the Job Folders folder of this instance.
Users need access to the transfer folder. Change the permissions for the
new public folder CommonStoreTransferFolder by following these steps:
i. Open Outlook with the user ID that you used to create the
CommonStore folders. In the folder list, select Public Folders All
Public Folders CommonStoreTransferFolder.
ii. Right-click that folder and select Properties.
iii. In the CommonStoreTransferFolder Properties notebook, select the
Permissions tab.
iv. Select the name Default. The following settings must be applied:
Create items - not set
Read items - not set
Create subfolders - set
Folder owner - not set
Folder visible - set
v. Select Own in the Edit items section, select Own in the Delete items
section, select the name Anonymous, and select None from the Roles
drop-down list in the Permissions section.
vi. Click OK to close the CommonStoreTransferFolder properties
notebook.
243
Note: If you use a default setting for the content type, make sure that this type
follows the MIME type syntax (for example, application/UNKNOWN). Using
this approach, some browsers may still be able to display the content correctly.
Use the values in Table 7-22 on page 245 as guidance to set the properties for
the CommonStore Task.
244
Configuration
field
Sample input
value
Description
<None>
General
Archiving policy
Mailbox threshold
Content type
600
Never
Restubbing Schedule
Cycle
245
2. For every content type mapping, a file extension and a Content Manager
content type (MIME type in Content Manager system administration client)
has to be provided.
Create the content type mappings as specified in Table 7-23.
Table 7-23 Content type mapping
File extension
Content type
Description
msg
application/outlook
doc
application/msword
Attention: Make sure the provided content type is spelled exactly the same as
the MIME type configuration within Content Manager.
To check the correct MIME type:
1. Log on to the Content Manager system administration client.
2. Go to Data Modeling MIME Types.
3. Double-click the MIME Type to be checked.
The value MIME Type has to be the same as the one used for the content type
value in the CommonStore configuration.
There is no MIME type for the MSG format within the Content Manager system.
The appropriate MIME type has to be created.
To create the correct MIME Type in the Content Manager system:
1. Log on to the Content Manager system administration client.
2. Go to Data Modeling.
3. Right-click MIME Types and select New from the context menu.
4. The value for the MIME type can be chosen. It has to follow the syntax of
value/value, for example: application/outlook.
246
On the Privileged User page, special users can be granted the right to search for
messages that were archived by other users.
Table 7-24 lists the values we used to configure the search server. Substitute the
sample input values with values that are specific to your environment.
Table 7-24 Search server configuration
Configuration
field
Sample input
value
Description
Configuration
name
SearchCM
Host name
charger
Port number
7900
CSX Admin
General
Privileged User
Users
Configuring task
Table 7-25 on page 248 shows the values we used to configure the task. Replace
our values with the ones suitable for your environment.
Important: The value entered in the Fixed port field must be identical to the
ARCHPRO_PORT value in the CommonStore Server configuration file
(archint.ini).
While socket communication is used to handle all requests, the file transfer
from the CSX Task to the CommonStore Server and vice versa is done using a
shared directory. The Transfer path field must address the same directory as
the TRANSFERPATH value in the CommonStore Server configuration file
(archint.ini).
247
Configuration
field
Sample input
value
Description
Task name
task_brighton
Administrator
notification
CSX Admin
Worker count
Committer count
External port
7000
C:\IBM\CSX\T
ask\csx_task_
brighton.trc
C:\IBM\CSX\T
ask\csx_task_
brighton.err
Log directory
C:\IBM\CSX\T
ask\log
Search
configuration
SearchCM
Records Enabler
configuration
<None>
General
Parameters
248
Configuration
field
Sample input
value
Description
Trace
Selected
CommonStore Server
Host name
charger
Fixed port
8013
Transfer path
C:\IBM\CSX\
Server\instanc
e01\transfer
task_brighton
Exchange server
(or servers)
serviced by this
task
BRIGHTON.
redbook.
bocaraton.ibm
.com
Exchange Server
Configuring archive
The archive refers to the logical archive defined in the archint.ini. (See Step 3:
Configuring ArchPro environment on page 232.) This definition is used during
the archiving policy definition.
For every archive, an attribute mapping has to be defined. An archive mapping
specifies which Outlook/Exchange property is mapped to which Content
Manager attribute. None of these mappings are mandatory but can be chosen.
However, we recommend creating at least some standard mappings in order to
be able to provide an attribute-based search (such as list all e-mail with
CommonStore in the subject) for the e-mail user.
249
Table 7-26 shows the values we used to configure the archive. Replace sample
input values to suit your environment and business needs.
Table 7-26 Archive configuration
Configuration field
Sample input
value
Description
Archive id
CSXMAIL
Archive type
Content
Manager 8
General
Property Mapping
Mapping list
250
Configuration field
Sample input
value
Description
Policy Name
Interactive
Archiving
Restubbing on
checked
Restubbing time
24
Always
General
Archiving Schedule
Cycle
Automatic Rules
In the sample environment, no automatic archiving is configured.
Interactive Rules
Message Class
IPM.Note
Archiving Type
Entire
Deletion Type
Body
Archive
CSXMAIL
251
Configuration field
Sample input
value
Description
checked
The CSX Task reads the configuration data from the Active Directory, where it
is stored by the CSX System Manager. It then creates an Outlook profile and
logs on to the Exchange Server. The crawler thread is responsible for
automatic archiving and declaring according to the automatic rules in the
mailbox policies. The crawler thread is also responsible for restubbing. The
polling thread handles interactive requests.
Example 7-2 shows sample output from the CSX Task initialization to the console.
Example 7-2 CSX Task initialization sample output
C:\IBM\CSX\bin>csx task_brighton
CJS0000I: CSX J/Starter 8.3.0.0
[11:50:24]
252
****************************************************************
* IBM*
*
* DB2 CommonStore for Exchange Server - Task
*
* Version 8.3.0.0 build: 20050309
*
*
* Licensed Materials - Property of IBM
*
* 5724-B85
*
* (c) Copyright IBM Corporation 1997, 2005.
*
* All Rights Reserved.
*
*
*
* * Trademark of International Business Machines
*
****************************************************************
[11:50:24] task_brighton: No property file found for task: 'task_brighton'
[11:50:24] CSX0010I: CSX COMMITTER #2: has been initialized and started
[11:50:24] CSX0010I: CSX COMMITTER #1: has been initialized and started
[11:50:24] CSX0010I: CSX COMMITTER #0: has been initialized and started
[11:50:26] CSX0010I: CSX WORKER
#0: has been initialized and started
[11:50:26] CSX0010I: CSX WORKER
#1: has been initialized and started
[11:50:26] CSX0010I: CSX WORKER
#2: has been initialized and started
[11:50:26] CSX0010I: CSX POLLER
: has been initialized and started
[11:50:26] CSX0001I: task_brighton: successfully started, ready to process jobs
[11:50:26] CSX0010I: CSX CRAWLER #brighton.emms.bocaraton.ibm.com: has been
initialized and started
Attention: Before installing the ArchPro and the Task as Windows services
make sure that previously started components (for example, in Windows
command prompts) are closed down.
Even though it is possible to have the ArchPro and the Task running as one
service, we recommend installing both as separate services. In the sample
environment, the INI files are stored in the newly created directory
C:\IBM\CSX\WindowsService. Using a text editor, create two INI files,
ArchProService.ini and TaskService.ini.
253
SERVICE_TRACEFILE C:\ibm\csx\WindowsService\ArchProService.trace
PROCESS1 C:\ibm\csx\bin\archpro.exe -i C:\ibm\csx\server\instance01\archint.ini
Example 7-4 TaskService.ini for the sample environment
SERVICE_TRACEFILE C:\ibm\csx\WindowsService\TaskService.trace
PROCESS1 C:\ibm\csx\bin\csx.exe task_brighton -u CSX Admin
4. Open a Command prompt window.
The command syntax used to install the Window services is:
archservice install -n <name> -c <config file>
In this syntax:
<name> appears in the Windows services list as part of the service name.
A CommonStore Service always starts with CommonStore_ and ends with
the specified value. For example, The ArchPro Window service will appear
as CommonStore_ArchPro.
<config file> is the path (including the file name) of the configuration file
to be used.
5. Execute the following command to install ArchPro service:
archservice install -n ArchPro -c
C:\IBM\CSX\WindowsService\ArchProService.ini
254
Charger
London
CSX
Exchange
CM
Watson
Outlook
Outlook
Active Directory
II for Content
(CM connector)
WAS
WAS*
DB2 + NSE
DB2 Client
* Including Embedded Messaging option
To verify the CSX Task setup, we can archive and retrieve a message and verify
that it is stored in the archive correctly. This includes the following steps:
1.
2.
3.
4.
5.
6.
7.
255
Starting Outlook
Log on to the client workstation with user testuser and perform the following
steps:
1. Create an Outlook profile for testuser. If you are using Outlook 2003, make
sure that the check box Use Cached Exchange Mode is not checked.
2. Start Outlook.
The CSX tool bar contains the following buttons for CSX operations:
/ Use default settings / Use custom settings
Archive
Retrieve
Search
256
3. Create another test message with the subject CSX test message 2 and also
send it to testuser.
4. Select the two test messages in the Inbox and click
(Archive).
257
6. Click Archive.
A new job document is created and stored in the public folder. The CSX Task
polling thread reads the archive request from the job folder. The CSX Task
worker thread reads the message from the mailbox, decomposes it according
to the archiving type (COMPONENT), and passes two documents (the
message remainder and the attachment) to the CommonStore Server.
When the documents are archived in the Content Manager repository, the
CSX Task committer thread stubs the message. It removes the body text and
the attachment according to the deletion type (BODY) and inserts hyperlinks
to both the message remainder and the attachment (Figure 7-7).
Note: Outlook is used to display the message remainder. Although you can
see the icon for the attachment, the attachment binary data does not exist.
Trying to open the attachment causes an error message.
258
(Retrieve).
The CSX Task polling thread reads the retrieve request from the job folder. The
CSX Task worker thread forwards the request to the CommonStore Server.
When the documents are retrieved from the Content Manager repository, the
CSX Task committer replaces the stub with the original message remainder and
adds the attachment.
259
Use the Content Manager Windows client to verify that only one entry exists for
the test message. A search for documents with SUBJECT LIKE CSX% results in a hit
list as shown in Figure 7-9 on page 260.
Because the message CSX test setup is archived twice, two child entries exist
for this message. This is indicated by the pull-down icon near the end of the line.
To view the attributes and their values, select Attributes on the pop-up menu.
This displays Figure 7-10.
260
(Search).
Search in
SUBJECT
Search operator
LIKE
Search term
CSX%
261
262
Configuration data
CSX Admin
CSX
CSXMail
Note: We do not include all of the detailed steps of the installation in this
section. We recommend using the existing product manual in conjunction with
the materials we present here for a successful installation and configuration.
In the sample environment, we install Records Manager engine on London and
Records Manager database on Charger.
Configuration
window / field
Sample input
value
Description
Installation Destination
Directory Name
C:\IBM\IRM
Installation Type
Setup type
typical
263
Configuration
window / field
Sample input
value
Description
selected
264
Connector Type
SOAP
Connector Port
8880
Cell
london
Node
london
Server
server1
Configuration
window / field
Sample input
value
Description
Security Enabled
unchecked
irmwas
Connection
Factories
Authentication
password
Mail Session Configuration
Mail Transport Host
SMTP User Name
Brighton
265
Configuration
window / field
Sample input
value
SMTP User
password
Description
Required only if SSL is configured on the
SMTP Server.
Required for the engine to send e-mail.
Specifies the password of an e-mail user
who has access to send e-mail through the
specified transport host. Leave this field
blank if the transport host does not require
authentication.
IRMClient
Engine Server
Name
London.redbook.
bocaraton.ibm.c
om
8880
266
Web Service
Configuration Root
IRMWebService
s
London.redbook. bocaraton.ibm.com
9080
Configuration
window / field
Sample input
value
Description
London.redbook.
bocaraton.ibm.c
om
2809
C:\IBM\WS\WAS
WebSphere Location
WebSphere
Location
Configuration
window / field
Description
C:\IBM\IRM\Database
Installation Directory
Directory Name
Database Type
Database Type
DB2
C:\IBM\DB2\SQLLIB\java
267
Configuration
window / field
Description
DB2
Database Name
irmdb
Default Disk
C:\IBM\IRM\Database
User name
irmadmin
default
User password
Territory
268
Configuration
window / field
Description
Collating System
System
DB Language
English
System
administrator user
name
db2admin
System
administrator user
password
Sample
Tip: Make sure to use the same installation directory (C:\IBM\IRM\); otherwise, a second directory will be created and the old one will not be deleted.
269
Configuration
window / field
Description
C:\IBM\IRM\Database
Installation Directory
Directory Name
selected
Database Type
Database Type
DB2
C:\IBM\DB2\SQLLIB\j
ava
DB2
Database Name
irmdb
C:\IBM\IRM\Database
User name
irmadmin
User password
270
Configuration
window / field
Description
System
administrator user
name
db2admin
System
administrator user
password
Database Back Up
Selected database
was backed up
selected
Configuration field
Connector Type
SOAP
Port Number
8880
Description
271
Configuration field
Description
Cell
london
Node
london
Server
server1
After the Engine configuration tool is started, a data source (the Records
Manager database created in Step 2: Install Records Manager database V4.1.1
on page 267) must be created.
To create the data source, select Action New.
In Table 7-33, we provide the input values we used when creating the new data
source. Replace these values with the appropriate ones for your environment.
After creating the new data source, select File Save Changes.
Table 7-33 Data source input for the sample environment
Configuration field
Description
C:\IBM\DB2\SQLLIB\ja
va
irmdb
Database Name
irmdb
User name
irmadmin
User password
Important: After configuring the data source, if the utility is closed without
saving, the provided information will be lost and the data source will not be
available during the Records Manager Administration client startup.
272
Before the Records Manager administration client can be used, the Application
Server must be restarted.
Use the Windows Services utility to restart the Service IBM WebSphere
Application Server V5 - server1, or go to the WebSphere bin directory
(C:\IBM\WS\WAS\bin) and use the following commands to restart the server:
stopserver server1
startserver server1
Brighton
Charger
London
CSX
Exchange
Watson
Outlook
Active Directory
CM
IRM DB
IRM Engine
Outlook
II for Content
(CM connector)
WAS
WAS*
DB2 + NSE
DB2 Client
* Including Embedded Messaging option
273
3. Click Reset.
4. Go back and check the Task Manager. The amq* and runq* processes should
be there now.
Records Manager
administrator user ID
Administrator
password: cronos
WebSphere Application
Server server name
server1
Description
274
2. Install Records Enabler (CMRE server, Host Interface server, and Permission
Synchronization server).
3. Install Records Manager Extension.
4. Implement Windows Services.
Important: The JDBCPATH must include the db2java.zip file name; otherwise,
the installation will fail.
Create a local user on the machine that runs the Content Manager Library
Server. This user has to be in the DB2 administrator group.
For the sample environment, we create:
User name
User group
CMREID
DB2ADMNS
275
Configuration
window / field
Sample input
value
Description
276
selected
selected
selected
WebSphere
Application Server cell
name
london
WebSphere
Application Server
node name
london
Host name
London.redboo
k.bocaraton.ib
m.com
Configuration
window / field
Sample input
value
Description
WebSphere
Application Security
Enabled
unchecked
Charger.redboo
k.bocaraton.ib
m.com:2809
Records Manager
Administration Client
URL
http://charger.re
dbook.bocarato
n.ibm.com:908
0/IRMClient
Records Manager
database
irmdb
Records Manager
Administrator
Administrator
Password
cronos
icmnlsdb
Content Manager
authentication
icmadmin
cmreid
Password
Content Manager
Records Enabler
Connection ID
277
Configuration
window / field
Sample input
value
password
Description
Password of the user ID on the Windows
operating system level.
confirm password
eClient rendering
Content URL
http://....
http://...
Database System
used for Content
Manager
DB2
278
CMRE server
cmresvr
Records Manager
Host Interface Server
rmecmhost
Add Host
Configuration record
to DB2 Records
Manager
checked
Content Manager
Records Enabler
Permissions
Synchronization
cmrepsproc
Permissions
Synchronization
Scheduler
checked
Configuration
window / field
Sample input
value
Permissions
Synchronization
engine
checked
Description
Configuration window /
field
Sample input
value
Description
london
WebSphere Application
Server node name
london
Host name
London.redbook.b
ocaraton.ibm.com
279
WebSphere Application
Security Enabled
unchecked
Records Manager
Application server name
server1
280
Brighton
Charger
London
CSX
Exchange
Watson
Outlook
Active Directory
CM
CRME
IRM DB
IRM Engine
Outlook
II for Content
(CM connector)
WAS
WAS*
DB2 + NSE
DB2 Client
* Including Embedded Messaging option
281
User ID
Password
Administrator
cronos
2. Go to Security Users Host Filer and select the host system that is
enabled during the CMRE installation.
In the sample environment, the host system with the name icmnlsdb is
enabled. (See Add Host Configuration record to DB2 Records Manager on
page 278.)
3. Click Import, select icmadmin, and click Import again. In the next window,
select all permissions by checking Function Access. Check the Is Active
check box. Click Save to finish the import.
4. The Content Manager user ID icmadmin is now imported to the Records
Manager system and has all necessary rights to act as Administrator with the
Records Manager system.
Important: Do not use the Records Manager administrator user ID and its
password (Administrator/cronos) to log on to the CMRE Administration client
because this ID is not defined within Content Manager.
Also, do not use the Content Manager user ID, CMREID, that is created during
the CMRE installation, because this ID is not (and cannot be) imported into
Records Manager.
282
Configuration data
CSXMail
283
For detailed information about CSX and Records Enabler integration, refer to
IBM DB2 CommonStore for Exchange Server: Administration and Users Guide,
Version 8.3, SH12-6741.
File/Directory
usermapper.jar
C:\IBM\CSX\server\instance01\ usermapper.jar
CSExit.properties directory
C:\IBM\CSX\server\instance01
284
Set DB_DIR to the directory to store the mapping database. (Note the double
backslashes; a single backslash indicates an escape sequence, such as \n.)
This directory will contain a collection of files that are serialized hash tables
containing string keys of the format CM-server:mail-user and CSRepUserDef
values. Make sure this folder exists and is empty. The files will be generated
automatically, along with a file that indicates the current HASH_MODULO
value so that it can be changed.
Set HASH_MODULO to the maximum number of files to be found in the
DB_DIR directory. This is to prevent the entire database from ever needing to
be in memory at one time so that a huge number of users can be supported.
Bigger values mean smaller memory usage (but more files).
Set PROXY_PORT to the port on which the usermapper proxy is listening.
In the sample environment, we set these parameters as listed in Table 7-38
on page 285.
Table 7-38 CSExit.properties parameter update
Parameter
DB_DIR
C:\IBM\CSX\server\instance01\database
HASH_MODULO
1000
PROXY_PORT
8067
285
5. Update archint.ini.
To activate the usermapper, add the values for the following parameters in the
archini.ini file:
ACCESS_CTL
CM_SECURITY_EXIT
CM_EXIT_LOCATION
The input value for ACCESS_CTL YES specifies whether you want Retrieve
operations to be subject to the users Content Manager permissions. The
YES setting causes the user mapper to be activated when archpro is started.
You must activate the user mapper to do declare records.
The input value for CM_SECURITY_EXIT specifies the name of the security
exit class as com.ibm.rme.csexit.CSExit.
The input value for CM_EXIT_LOCATION specifies the file location of the
usermapper.jar file.
In our sample environment, we set these values as shown in Table 7-39.
Table 7-39 Archint.ini updates
Parameter
ACCESS_CTRL
YES
CM_SECURITY_EXIT
com.ibm.rme.csexit.CSExit
CM_EXIT_LOCATION
C:\IBM\CSX\server\instance01\usermapper.jar
Configuration field
Configuration name
286
Description
The name of this Records Enabler
configuration object.
Configuration field
Description
Host name
london.redbook.bocar
aton.ibm.com
Port number
9081
Application name
RMEServer/RMEClie
ntServlet
8067
csxkeys
7.9.1 Verification
To verify that the CommonStore Server and Outlook client are configured
properly, you can perform the following steps:
1. In the Outlook client, create an e-mail message and send it off.
2. Manually declare the e-mail message as a record.
287
Note: The first time you use an Outlook client to declare a record, you may
be prompted for your Content Manager credentials (user ID and password)
between step 3 and step 4. After you supply the credentials, the CSX Task
authenticates you with the CMRE server. If the credentials can be
authenticated, they are then stored in the user mapping table on the
archpro server. After this, whenever the user manually declares or views
records, these credentials are passed to IRM in order to authenticate the
mailbox user prior to launching the IRM classification window. IRM
authenticates credentials via Content Manager.
3. Make sure that the e-mail is archived in Content Manager using the Content
Manager Windows client.
4. After the e-mail is archived, the Records Manager classification window
should appear. Specify the bucket in the file plan (for example, Account
Receivable in our sample environment). Enter a unique ID into the e-mail
name field, and press Finish.
5. Make sure that in the Outlook client, it reflects that the e-mail is a record.
Note: The visual indicator that shows whether a message is a record does
not automatically appear in the views of your Outlook client. Outlook allows
you to display these additional columns through the Tools Options on
the menu bar. The complete instructions are found in the CSX publication.
6. Using Content Manager Windows client, verify that the e-mails isRecord
attribute is set to yes.
7. Using Records Manager administration client, check that the record is there.
8. Using the Outlook client, view the e-mail record.
288
Chapter 8.
Installation and
configuration in a Lotus
Domino and AIX
environment
This chapter describes the installation and configuration of an e-mail archiving
and records management solution using CommonStore for Lotus Domino
(CSLD), Records Manager, Content Manager, and Content Manager Records
Enabler. Using a sample environment, we describe the major steps involved in
installing and configuring the various components in an AIX environment. For
more detailed information, see the appropriate product documentation.
We cover the following topics in this chapter:
Overview
Prerequisites and prerequisite software installation
Content Manager installation and configuration
CommonStore installation and configuration
Records Manager installation and configuration
CMRE installation and configuration
Configuring the CommonStore Server and Notes
289
8.1 Overview
In this section, we provide an overview for the e-mail archiving and records
management integrated solution installation and configuration.
We cover:
Software used for the integrated solution
Installation and configuration steps and recommendation
290
Product
Purpose
E-mail system.
291
292
Tip: For the machine that will run Permission Synchronization Server of the
Records Enabler for Content Manager product, make sure that WebSphere
Application Server with Embedded Messaging is installed on it. This is
especially important if you start your installation from an existing system, such
as a working Content Manager system.
If the Embedded Messaging feature was not installed, you must deinstall
Content Manager, uninstall WebSphere Application Server, then reinstall
WebSphere Application Server, including the Embedded Messaging feature
(installed by default in V5.1.1 and later), and then Content Manager again. Do
not take shortcuts or you may experience strange results.
If the Content Manager is in use and cannot be deinstalled, we recommend
installing the Permission Synchronization Server on another machine.
Jamaica
Bonnie
Lotus Domino
293
Figure 8-2 shows the sample environment after all components are installed,
including the necessary prerequisites on each server.
On Jamaica, we install prerequisite software including a Notes client (Lotus
Domino), a WebSphere Application Server (WAS in Figure 8-2), and DB2 server
with Net Search Extender (DB2 + NSE). In addition, we install CommonStore for
Lotus Domino (CSLD), Content Manager (CM), and IBM Records Manager
database (IRM DB).
On Bonnie, we install prerequisite software including the Content Manager V8
connector (CM connector) from Information Integrator for Content, WebSphere
Application Server with Embedded Messaging (WAS*), and a DB2 client (DB2).
In addition, we install Content Manager Records Enabler (CMRE), and IBM
Records Manager Engine (IRM Engine).
Jamaica
Bonnie
CSLD
Lotus Domino
CM
RME
IRM DB
IRM Engine
Lotus Domino
II for Content
(CM connector)
WAS
WAS*
DB2 + NSE
DB2
* Including Embedded Messaging option
8.3 Prerequisites
Four core components are involved in the e-mail archiving and records
management solution: Content Manager for Multiplatforms, CommonStore for
Lotus Domino, IBM Records Manager, and Content Manager Records Enabler.
Each core component has different prerequisites. We list what they are and their
version requirements, and explain why you need to install the prerequisite.
Understanding this should help you when you build a system that fulfills your
business needs.
294
Product
Version
WebSphere
Application Server
5.1.1.2
DB2
8.2
8.1
Product
Version
8.3.0
8.2
Domino
6.5
depends
295
Product
Version
WebSphere Application
Server
5.1.1.2
8.2
Table 8-5 lists the prerequisite for the Records Manager database for IBM
Records Manager V4.1.2.
Table 8-5 Prerequisite for IBM Records Manager (Database) V4.1.2
Product
Version
DB2
8.2
296
Product
Version
WebSphere Application
Server with Embedded
Messaging
5.1.1.2
Product
Version
8.3.0
8.2
Table 8-7 lists the prerequisite for the Records Manager extension.
Table 8-7 Prerequisite for Records Manager Extension V8.3.0
Product
Version
WebSphere Application
Server
5.1.1.2
Table 8-8 on page 298 summarizes the prerequisites for each software product
from 8.3, Prerequisites on page 294. Note that:
DB2 client (runtime or administration) is needed for Records Manager (IRM)
engine, and DB2 server is required for Records Manager database if they are
installed on separate machines; otherwise, they need only DB2 server.
WebSphere Application Server with Embedded Messaging (WAS* in
Table 8-8 on page 298) is required for Permission Synchronization server
from CMRE.
297
DB2 Net Search Extender is required if you need full text search capabilities.
Table 8-8 Prerequisites per software product
CM
CSLD
WAS
DB2
+NSE
DB2 client
IRM
CMRE
WAS
Notes client
Note: We do not include all detailed steps of the installation in this section.
We recommend using the existing product manuals in conjunction with the
materials we present here for successful installations and configurations.
298
In our sample environment, both the Content Manager database and Records
Manager database are located on Jamaica. We choose to install the DB2 server
on this machine.
Description
DB2 Version
8.1.7
Installation type
Typical
File system
/usr
Installation directory
/usr/opt/db2_08_01
DB2 Administration
server user ID
db2inst1
DB2 administration
group
db2grp1
DB2 instance
db2inst1
Verifying installation
To verify the DB2 server installation, create the sample database from the First
Step menu. Make sure the sample database is created successfully and that you
can view the data.
299
Use the database administrative user ID (db2admin) to run DB2 Net Search
Extender as a service.
In our sample environment, we choose not to configure for full text search.
Configuration data
db2inst1
db2grp1
jamaica.almaden.ibm.com
300
simple graphical user interface to catalog a database and other powerful DB2
tools to administer a remote database.
The installation process is straightforward and we do not cover it here.
In the sample environment, we install the Records Manager database on
Jamaica and the Records Manager engine on Bonnie. We therefore need to
install DB2 client on Bonnie.
301
WebSphere Application
Server version
5.1.0
Installation type
Full
/usr/WebSphere/AppServer
/usr/IBMHttpServer
/mqm
Node name
Host name
Description
for Jamaica:
jamaica.almaden.ibm.com
for Bonnie:
bonnie.almaden.ibm.com
WebSphere Administrator
user ID
wsadmin
Verifying installation
To verify successful WebSphere Application Server installation, at the
WebSphere Application Server - First Steps window, click Verify Installation.
The confirmation message Installation Verification is complete should
appear.
302
WebSphere Application
Server Version
5.1.1.3
server1
JAVA_HOME
Description
Configuration data
WebSphere cell
WebSphere node
303
304
Description
DB2 Universal
Database
icmnlsdb
icmadmin
Authentication type
Server
Description
icmcont
icmconct
icmconct password
Local
Configuration field
Description
AIX group
notes
305
Configuration field
Description
AIX user
notes
/home/notes
Configuration field
Description
Server type
Enterprise Server
Partitioned server
no
OS user ID
notes
OS group ID
notes
/home/notes
File system
/opt
Installation directory
/opt/lotus
306
Jamaica
Bonnie
Lotus Domino
Lotus Domino
II for Content
(CM connector)
WAS
WAS*
DB2 + NSE
DB2
* Including Embedded Messaging option
Note: It is not our intention to include all the detailed steps of the installation in
this section. We recommend using the existing product manual in conjunction
with the materials we present here for a successful installation and
configuration.
In the sample environment, we install Content Manager on Jamaica.
307
Table 8-17 AIX user IDs for Library Server and Resource Manager
User name
Primary group
Group set
Description
rmadmin
ibmcmgrp
staff, db2grp1
icmconct
ibmcmgrp
staff, db2grp1
icmadmin
ibmcmgrp
staff, db2grp1
Note: All new AIX user accounts require the password to be changed the
first time they are used after being created. To do this, Telnet to localhost
and log on as the new user. After you enter the password, it will prompt you
to change the password. Enter the same password as before and again to
confirm it. If this is not done, any applications such as DB2 that require this
ID for authentication will fail the authentication.
Attention: During a typical installation, full text search is not configured. If you
need the full text search feature, choose a custom installation.
Follow the product manual for detailed installation steps.
308
To help your installation process, we provide the input values we used during our
installation in Table 8-18. Input fields are grouped by the input window. Substitute
the sample input values according to your environment setup.
Table 8-18 Content Manager installation input values
Sample input
value
Description
CM Version
8.3
Installation directory
/opt/IBM/db2cmv8
Installation type
typical
Working directory
(This option is not there
if you choose typical
installation type.)
/home/ibmcmadm
Host name
jamaica.almaden.ib
m.com
Database type
DB2
Library Server
database name
icmnlsdb
icmadmin
Library server
administration ID
icmadmin
Content Manager
Connection ID
icmconct
Library Server ID
309
310
Sample input
value
Description
Library Server
transaction ID duration
180
Enable UNICOD
Checked
Checked
Enable LDAP
Not checked
Resource Manager
database name
rmdb
Resource database
administrator
rmadmin
Resource Manager
volume mounting point
/rmdb
Resource manager
staging directory
/staging
Application Server
node name
Jamaica
Resource Manager
Web application name
icmrm
Resource Manager
Web application
context root
/icmrm
Token duration
172800
7500
HTTP Port
80
Sample input
value
HTTPS Port
443
Selected
Description
Jamaica
Bonnie
Lotus Domino
CM
Lotus Domino
II for Content
(CM connector)
WAS
WAS*
DB2 + NSE
DB2
* Including Embedded Messaging option
At the end of the installation, an installation validation utility will run. You should
see the following message that indicates a successful installation:
Product validation completed with no detected configuration errors.
Perform the following steps to ensure that you installed Content Manager
successfully:
1. Launch the system administration client that is automatically installed on the
Content Manager server. In our scenario, we launch the system
administration client from Jamaica.
2. Log on to the Content Manager system using the administrative user ID. In
our scenario, we use icmadmin.
311
312
Configuration data
Description
Content Manager
administrator user ID
icmadmin
Resource Manager
Administrator ID
rmadmin
jamaica.almaden.ibm.com
icmnlsdb
313
Required
input field
Sample input
value
Description
Installation
directory
/usr/lpp/csld
Important: If you are installing CommonStore on AIX 5.2 or higher, the Visual
Age for C++ runtime libraries that come with CommonStore 8.3 for AIX are
missing the libraries for AIX 5.2. In order to make this work, you have to install
the correct version of the VACC runtime libraries for your OS level.
A temporary workaround is to install the VACPP that comes with
CommonStore and create an aix52 link that points to the aix51 library path:
#cd /usr/vacpp/lib
#ln -s aix51 aix52
314
Name
Attribute type
Character type
Max length
CSLDDocUNID
Character
Alphanumeric
32
CSLDOrigUser
Variable character
Extended alphanumeric
254
CSLDOrigDB
Character
Extended alphanumeric
17
CSLDSubject
Variable character
Extended alphanumeric
254
CSLDFrom
Variable character
Extended alphanumeric
100
CSLDPostedDate
Time stamp
N/A
N/A
Configuration field
Description
Name
CSLDMail
ACL
ICMPublic
Text search
unchecked
Document part
ICMBASE
315
Configuration
field
Sample input
value
Description
User name
CSAGENT
Password
316
Password
expiration
Never expires
Maximum
privilege set
AllPrivs
Default item
access control
list
PublicReadACL
Configuration field
Description
User ID
CSLD Task
Password
Attention: You will need the ID file, names.nsf, and notes.ini for this Notes
user later in this chapter.
317
Configuration field
Description
Group Name
cmstore
Configuration
field
Sample input
value
Description
User Name
ARCHPRO
Primary Group
cmstore
Group Set
cmstore, staff,
ibmcmgrp
Note: All new AIX user accounts require the password to be changed
the first time they are used after being created. To do this, Telnet to
localhost and log on as the new user. After you enter the password, you
are required to change the password. Enter the same password as
before and again to confirm it. If this is not done, if applications require
this ID for authentication, the authentication will fail.
2. Set the DB2 environment.
The ARCHPRO user ID has to run the DB2 profile to enable it to
communicate with the Content Manager database.
3. Set the CommonStore environment.
The ARCHPRO user ID has to set environment settings to enable it to access
the CommonStore files.
318
Example 8-1 shows the .profile we use for the sample environment, with
the newly added line in bold text.
Example 8-1 .profile
PATH=/usr/bin:/etc:/usr/sbin:/usr/ucb:$HOME/bin:/usr/bin/X11:/sbin:.
export PATH
319
if [ -s "$MAIL" ]
then echo "$MAILMSG"
fi
. /home/db2inst1/sqllib/db2profile
Example 8-2 shows the .profile we use for the sample environment, with
the newly added line in bold text.
Example 8-2 .profile
PATH=/usr/bin:/etc:/usr/sbin:/usr/ucb:$HOME/bin:/usr/bin/X11:/sbin:.
export PATH
if [ -s "$MAIL" ]
then echo "$MAILMSG"
fi
. /home/d1cmius1/sqllib/db2profile
. $HOME/csenv.sh
Example 8-3 shows the .profile we use for the sample environment, with
the newly added line in bold text.
320
. /home/d1cmius1/sqllib/db2profile
. $HOME/csenv.sh
. $HOME/notesenv.sh
e. From the data directory of the Notes user created in step 3b above, FTP
the three files to this Notes data directory for ARCHPRO.
Example 8-4 shows the action and the results.
Example 8-4 FTP files to notes data directory for ARCHPRO
c:\Lotus\Notes\Data> ftp jamaica.almaden.ibm.com
Connected to jamaica.almaden.ibm.com.
220 jamaica.almaden.ibm.com FTP server (Version 4.1 Tue Jul 6 21:20:07 CDT
2004) ready.
User (jamaica.almaden.ibm.com:(none)): ARCHPRO
331 Password required for ARCHPRO.
Password:
230-Last login: Fri Jun 17 15:31:08 CDT 2005 on ftp from ::ffff:9.22.98.74
230 User ARCHPRO logged in.
ftp> cd notesdata
250 CWD command successful.
ftp> ascii
200 Type set to A; form set to N.
ftp> put notes.ini
200 PORT command successful.
150 Opening data connection for notes.ini.
226 Transfer complete.
ftp: 5087 bytes sent.
ftp> bin
ftp> put names.nsf
200 PORT command successful.
150 Opening data connection for names.nsf.
226 Transfer complete.
ftp: 4194304 bytes sent.
ftp> put ctask.id
200 PORT command successful.
321
Example 8-6 shows the updated .profile, with the newly added line in bold.
Example 8-6 .profile
PATH=/usr/bin:/etc:/usr/sbin:/usr/ucb:$HOME/bin:/usr/bin/X11:/sbin:.
export PATH
if [ -s "$MAIL" ]
then echo "$MAILMSG"
fi
. /home/d1cmius1/sqllib/db2profile
322
. $HOME/csenv.sh
. $HOME/notesenv.sh
. /opt/IBM/db2cmv8/bin/cmbenv81.sh
umask ug=rwx,o=r
6. Create archint.ini:
a. As the ARCHPRO user, create the CommonStore instance directory:
$mkdir inst000
b. Copy the sample archint.ini from the install directory to the instance
directory.
$cd inst000
$cp /usr/lpp/csld/bin/archint_sample_cm8.ini ./archint.ini
Parameter
Description
INSTANCEPATH
/home/ARCHPRO/inst000
TEMPPATH
/tmp/csldxfer
ARCHIVE
STORAGETYPE
CM
ITEM_TYPE
CSLDMail
323
Parameter
Description
LIBSERVER
icmnlsdb
CMUSER
CSAGENT
ARCHIVETYPE
GENERIC_MULTIDOC
d. As the root user, create the TEMPPATH directory and set ownership and
permissions:
#cd /tmp
#mkdir csldxfer
#chown ARCHPRO:cmstore
#chmod 774 csldxfer
The ArchPro prompts for the path of the license file. This path must include
the filename.
2. Save the password for CM user ID.
In order to start ArchPro without user interaction, you must store the
password of the CM user ID. Use archpro -f serverpasswd to be prompted
for the password to be stored. The password will be stored encrypted in a file.
Every time the password of the used CM user ID is changed, this process
must be repeated. If the password is changed without repeating this process,
ArchPro will fail to connect to the Content Manager because it is using an
invalid password.
3. Start ArchPro.
To start the ArchPro, use archpro. If any error occurs, the ArchPro will shut
down immediately.
324
Configuration
field
Sample input
value
Description
User Name
CSLDTASK
Primary Group
cmstore
Group Set
cmstore, staff,
ibmcmgrp
325
2. Set the CommonStore environment (use the CSLDTask user to copy the
environment script):
$cd $HOME
$cp /usr/lpp/csld/bin/csenv.sh to ./
$chmod 744 csenv.sh
vi .profile
Example 8-7 shows the updated .profile; add a new line as shown in bold text.
Example 8-7 .profile
PATH=/usr/bin:/etc:/usr/sbin:/usr/ucb:$HOME/bin:/usr/bin/X11:/sbin:.
export PATH
if [ -s "$MAIL" ]
326
In normal
. $HOME/csenv.sh
3. Set the Notes environment (use CSLDTASK user to copy the script):
a. As user CSLDTASK, copy the environment script and change permission
of the script file:
$cp /usr/lpp/csld/bin/notesenv.sh to ./
$chmod 744 notesenv.sh
. $HOME/csenv.sh
. $HOME/notesenv.sh
umask ug=rwx,o=r
d. Copy the three Notes user files from the notesdata directory of the
ARCHPRO user to the notesdata directory of the CSLDTASK user:
$cd
$cp
$cp
$cp
$HOME/notesdata
/home/ARCHPRO/notesdata/notes.ini ./
/home/ARCHPRO/notesdata/names.nsf ./
/home/ARCHPRO/notesdata/ctask.id ./
327
NotesProgram=/opt/lotus/notes/latest/ibmpow
TCPIP=TCP, 0, 15, 0
Ports=TCPIP
KeyFilename=ctask.id
NAMES=names.nsf
Timezone=5
DST=1
MailType=0
$$HasLANPort=1
DSTLAW=4,1,1,10,-1,1
PhoneLog=2
Log=log.nsf, 1, 0, 7, 40000
SHARED_MAIL=0
Location=CSLD,9AA,CN=CSLD TASK/O=ITSO
MailServer=CN=Bonnie/O=ITSO
MailFile=mail\ctask.nsf
4. Create archint.ini:
a. As the CSLDTASK user, create the CommonStore instance directory:
$cd $HOME
mkdir inst001
b. Copy the archint.ini file from the instance directory of the ARCHPRO user
to the instance directory of the CSLDTASK user:
$cd inst001
$cp /home/ARCHPRO/inst000/archint.ini ./
Parameter
INSTANCEPATH
/home/CSLDTASK/inst001
Description
A Domino administrator has to copy these files onto the Domino server and
sign them to avoid unnecessary security prompts for the e-mail user.
To make the templates available, copy them directly to the Domino server
data directory.
328
Specify the Job database and Domino server in the CreateCSNJobs script
library. Example 8-10 shows the modified lines in bold text.
Example 8-10 CreateCSNJobs.script
Public
Dim
Dim
Dim
Public
Dim
Dim
Dim
329
Sign the templates: Open the Domino Administrator client, select the Files
tab, select the templates to be signed, right-click the template, and click sign.
Attention: The ID used to sign the templates must be listed in the Domino
domain Execution Control List and be granted the appropriate access.
6. Create and configure the configuration database and job database.
A configuration database stores all necessary information for a CommonStore
Task, such as the task profile. The database must be created using the
template that ships with the CommonStore Server. If an older version of a
template is used, errors will occur.
To create the configuration database, open a Notes client using an ID with
proper rights to create a database on a server. Go to: File Database
New. Select Domino server, define a name, and select the template.
a. Set up a job database as shown in Table 8-30.
Table 8-30 Job database setup
Configuration field
Description
Server
Bonnie/ITSO
Title
CSLDJobs
Filename
CSLDJobs.nsf
Server
Bonnie/ITSO
Template
b. Add the Domino user ID used by CommonStore (CSLD Task) to the ACL
and assign the role CSLDUsers to it.
c. Set up the configuration database as shown in Table 8-31.
Table 8-31 Configuration database setup
330
Configuration field
Description
Server
Bonnie/ITSO
Title
CSLDConfig
Configuration field
Description
Filename
CSLDConfig.nsf
Server
Bonnie/ITSO
Template
CSLD Configuration
Database 8.3
d. Add the Domino user ID used by CommonStore (CSLD Task) to the ACL.
e. Set up the database profile for the archive task. See Table 8-32 for input
values.
Table 8-32 Database profile for archive task
Configuration
field
Sample input
value
Description
Name
Archive
Working DBs
All
Job database
name
CSLDJobs.nsf
Job database
server
Bonnie/ITSO
Restrict retrieval
to point of origin
No
9000
CommonStore
TCP/IP port
47111
CommonStore
host name
jamaica.almad
en.ibm.com
331
Configuration
field
Sample input
value
Description
CommonStore
Web port
8095
Folder Archive ID
f. Set up the database profile for the retrieve task. Table 8-33 shows input
values.
Table 8-33 Database profile for retrieve task
332
Configuration field
Sample input
value
Description
Name
Retrieve
Working DBs
All
CSLDJobs.nsf
Bonnie/ITSO
Restrict retrieval to
point of origin
No
9001
CommonStore
TCP/IP port
47111
CommonStore host
name
jamaica.almade
n.ibm.com
Configuration field
Sample input
value
Description
CommonStore Web
port
8095
Folder Archive ID
Configuration field
Sample input
value
Description
Document form
Memo
Optional form
aliases
Reply, Forward
CommonStore
Archive ID
Notes fields to
display in hit lists
Subject, From,
PostedDate
Memo
333
Configuration field
Sample input
value
Description
Notes document
field names
Subject
From
PostedDate
Archive attribute
names
CSLDSubject
CSLDFrom
CSLDPostedDat
e
h. Set up content type mapping. See Table 8-35 for input values.
Table 8-35 Content type mapping
Configuration field
Sample input
value
Description
File extension
csn
Content type
csn/Application
334
k. As the CSLDTASK user, add a line to the notes.ini file to make the
extension available to the Notes API:
$cd $HOME/notesdata
$vi notes.ini
335
Parameter
Sample input
value
Description
servername
Bonnie/ITSO
configdatabase
name
CSLDConfig.nsf
profilename
Archive /
Retrieve
notesinifile
$HOME/notesda
ta/notes.ini
336
l. Example 8-13 shows a script that can start the Archive task either in the
current session (default), in the background, or in debug mode (captures
the console logging of stdout and stderr to files). Log on as user
CSLDTASK and run this:
$cd $HOME
$./start_ArchiveTask.sh
or
$./start_ArchiveTask.sh -background
or
$./start_ArchiveTask.sh -debug
Example 8-13 [contents of /home/CSLDTASK/start_ArchiveTask.sh]
#!/usr/bin/ksh
cd $HOME/inst001
case $1 in
-background)
nohup csld -s Bonnie/ITSO -n CSLDConf.nsf -i
$HOME/notesdata/notes.ini -p Archive 1> /dev/null 2> /dev/null &;;
-debug)
nohup csld -s Bonnie/ITSO -n CSLDConf.nsf -i
$HOME/notesdata/notes.ini -p Archive 1> $HOME/Archive.stdout 2>
$HOME/Archive.stderr &;;
*)
csld -s Bonnie/ITSO -n CSLDConf.nsf -i
$HOME/notesdata/notes.ini -p Archive;;
esac
cd $HOME
m. Example 8-14 on page 338 shows a script that can start the Retrieve task
either in the current session (default), in the background, or in debug mode
337
(captures the console logging of stdout and stderr to files). Log on as user
CSLDTASK and run this:
$cd $HOME
$./start_RetrieveTask.sh
or
$./start_RetrieveTask.sh -background
or
$./start_RetrieveTask.sh -debug
Example 8-14 [contents of /home/CSLDTASK/start_RetrieveTask.sh]
#!/usr/bin/ksh
cd $HOME/inst001
case $1 in
-background)
nohup csld -s Bonnie/ITSO -n CSLDConf.nsf -i
$HOME/notesdata/notes.ini -p Retrieve 1> /dev/null 2> /dev/null &;;
-debug)
nohup csld -s Bonnie/ITSO -n CSLDConf.nsf -i
$HOME/notesdata/notes.ini -p Retrieve 1> $HOME/Retrieve.stdout 2>
$HOME/Retrieve.stderr &;;
*)
csld -s Bonnie/ITSO -n CSLDConf.nsf -i
$HOME/notesdata/notes.ini -p Retrieve;;
esac
cd $HOME
CSLDJobs.nsf
Bonnie/ITSO
After the template is applied, make sure that the CSLD task has access to that
database. You can test this by using user ID CSLD Task to open the mail
database.
Open the mail database using the regular mail database user ID. Select an
e-mail for archiving. Select CommonStore Archive Selected Documents
and click OK.
338
The archive is successful when the document moves to the Archived documents
category within the inbox. To confirm that the retrieve is working, open the
archived document and click Fetch.
If both operations are successful, the installation and basic configuration of
CommonStore are completed. Figure 8-5 shows the components that are
installed after this section is completed.
Jamaica
Bonnie
CSLD
Lotus Domino
CM
Lotus Domino
II for Content
(CM connector)
WAS
WAS*
DB2 + NSE
DB2
* Including Embedded Messaging option
Note: The various forms, views, and libraries from the CSLD sample template
are not meant for production use but to be used as a guide to incorporating
CSLD and Records functions into your corporate Notes template.
Configuration data
CSLD Task
CSAGENT
CSLDMail
339
Note: We do not include details of all of the installation steps in this section.
We recommend using the existing product manual in conjunction with the
materials we present here for a successful installation and configuration.
In the sample environment, we install Records Manager engine on Bonnie and
Records Manager database on Jamaica.
Configuration field
Description
User Name
irmwas
Primary Group
staff
Group Set
staff
Table 8-39 on page 341 lists the input values we used during our installation on
Bonnie in the sample environment. Replace our sample input values as needed
for your environment setup.
340
Table 8-39 Records Manager engine installation input for sample environment
Description
Installation Destination
Directory Name
/opt/IBM/DB2Records
Manager
Installation Type
Setup type
Custom
selected
SOAP
Connector Port
8880
Cell
bonnie
Node
bonnie
Server
server1
341
Description
Security Enabled
unchecked
irmwas
Connection
Factories
Authentication
password
Mail Session Configuration
Mail Transport Host
342
bonnie.redbook.bocar
aton.ibm.com
Description
SMTP User
password
IRMClient
Engine Server
Name
bonnie.redbook.bocar
aton.ibm.com
2809
IRMWebServices
343
Description
bonnie.redbook.
bocaraton.ibm.com
9080
bonnie.redbook.
bocaraton.ibm.com
2809
/usr/WebSphere/App
Server
WebSphere Location
WebSphere
Location
Configuration field
Sample input
value
Description
User Name
irmadmin
Primary Group
ibmcmgrp
Group Set
staff, db2grp1
In Table 8-41 on page 345, we provide the input values we used during our
installation on Jamaica in the sample environment. Replace our sample input
values according to your environment setup.
344
Table 8-41 Records Manager database installation input for sample environment
Description
/opt/IBM/DB2RecordsMa
nager/Database
Installation Directory
Directory Name
Database Type
Database Type
DB2
/usr/opt/db2_08_01/java
db2inst1
Database Name
irmdb
Default Disk
irmdb
345
Description
User name
irmadmin
Territory
default
Collating System
System
DB Language
English
System
Administration User
Name
db2inst1
User password
System
Administration User
Password
346
Sample
Tip: Make sure to use the same installation directory; otherwise, a second
directory will be created and the old one will not be deleted.
Configuration window /
field
Description
/opt/IBM/DB2Record
sManager/Database
Installation Directory
Directory Name
Selected
Database Type
Database Type
DB2
/usr/opt/db2_08_01/j
ava
db2inst1
Database Name
irmdb
/irmdb
User name
irmadmin
User password
347
Configuration window /
field
Description
System Administration
User Name
db2admin
System Administration
User Password
Database Back Up
Selected database was
backed up
Selected
348
Configuration field
Connector Type
SOAP
Port Number
8880
Description
Configuration field
Description
Cell
bonnie
Node
bonnie
Server
server1
After the engine configuration tool is started, a data source (the Records
Manager database created in Step 2: Install Records Manager database V4.1.1
on page 344) must be created.
To create the data source, select Action New.
In Table 8-44, we provide the input values we used when creating the new data
source. Replace these values with the appropriate ones for your environment.
After creating the new data source, select File Save Changes.
Table 8-44 Data source input for the sample environment
Configuration field
Description
irmdb
Database Name
irmdb
User name
irmadmin
User password
Important: After configuring the data source, if the utility is closed without
saving, the provided information will be lost and the data source will not be
available during the Records Manager Administration client startup.
Before the Records Manager Administration client can be used, the Application
Server must be restarted.
349
Jamaica
Bonnie
CSLD
Lotus Domino
CM
IRM DB
IRM Engine
Lotus Domino
II for Content
(CM connector)
WAS
WAS*
DB2 + NSE
DB2
* Including Embedded Messaging option
If either are not started, start them and verify that they are set to automatically
start by clicking on them and verifying that Initial State is Started.
350
Records Manager
administrator user ID
Administrator
password: cronos
WebSphere Application
Server server name
server1
Description
351
Important: The JDBCPATH must include the db2java.zip file name; otherwise,
the installation will fail.
Create a local user on the machine that runs the Content Manager Library
Server. This user must be in the DB2 administrator group. For the sample
environment, create user cmreid using Table 8-45 as a reference.
Table 8-45 Create user
Configuration
field
Sample input
value
Description
User Name
cmreid
Primary Group
system
Group Set
db2grp1
352
Configuration field /
window
Description
Selected
Selected
Selected
WebSphere
Application Server cell
name
bonnie
WebSphere
Application Server
node name
bonnie
353
Configuration field /
window
Description
Host name
bonnie.redbook.boc
araton.ibm.com
WebSphere
Application Security
Enabled
unchecked
bonnie.redbook.boc
araton.ibm.com:280
9
Records Manager
Administration Client
URL
http://bonnie.redboo
k.bocaraton.ibm.co
m:9080/IRMClient
Records Manager
database
irmdb
Records Manager
Administrator
Administrator
Password
cronos
icmnlsdb
Content Manager
authentication
icmadmin
Password
354
Configuration field /
window
Description
Content Manager
Records Enabler
Connection ID
cmreid
eClient rendering
Content URL
http://....
http://...
Database System
used for Content
Manager
DB2
password
confirm password
cmresvr
Records Manager
Host Interface server
rmecmhost
Add Host
Configuration record
to DB2 Records
Manager
checked
Content Manager
Records Enabler
Permissions
Synchronization
cmrepsproc
355
Configuration field /
window
Permissions
Synchronization
Scheduler
checked
Permissions
Synchronization
engine
checked
Description
Configuration window /
field
Sample
input value
Description
356
WebSphere Application
Server cell name
bonnie
WebSphere Application
Server node name
bonnie
Host name
bonnie.redb
ook.bocarato
n.ibm.com
Configuration window /
field
Sample
input value
Description
WebSphere Application
Security Enabled
unchecked
Records Manager
Application server name
server1
Jamaica
Bonnie
CSLD
Lotus Domino
CM
RME
IRM DB
IRM Engine
Lotus Domino
II for Content
(CM connector)
WAS
WAS*
DB2 + NSE
DB2
* Including Embedded Messaging option
357
User ID
Password
Administrator
cronos
2. Go to Security Users Host Filer and select the host system that is
enabled during the CMRE installation.
In the sample environment, the host system with the name icmnlsdb is
enabled. (See Add Host Configuration record to DB2 Records Manager of
Step 2: Install Records Enabler (CMRE) on page 353.)
3. Click Import, select icmadmin, and click Import again. In the next window,
select all permissions by checking Function Access. Check the Is Active
check box. Click Save to finish the import.
4. The Content Manager user ID icmadmin is now imported to the Records
Manager system and has all necessary rights to act as Administrator with the
Records Manager system.
Important: Do not use the Records Manager administrator user ID (Administrator) and its password (cronos) to log on to the CMRE Administration client
because this ID is not defined within Content Manager.
Also, do not use the Content Manager user ID, cmreid, that is created during
the CMRE installation, because this ID is not (and cannot be) imported into
Records Manager.
358
Configuration data
Value
CSLDMail
359
For detailed information about CSLD and Records Enabler integration, refer to
Chapter 21, Using Content Manager Records Enabler in the CSLD environment
in IBM DB2 CommonStore for Lotus Domino: Administration and Users Guide,
Version 8.3, SH12-6742.
Source directory
Target directory
/usr/lpp/csld/bin
home/ARCHPRO/inst000
360
PATH
LIBPATH
NLSPATH
CSNBASE
CSNINSTANCEPATH
CSNTAFDATAPATH
CLASSPATH
361
Copy the NCSO.jar file from the data directory of the Domino server you
installed for the APIs to the Archpro users inst000 directory.
4. Update archint.ini (see Table 8-49).
To activate the usermapper, add the values for the following parameters in the
archini.ini file:
ACCESS_CTL
CM_SECURITY_EXIT
CM_EXIT_LOCATION
The input value for ACCESS_CTL YES specifies whether you want Retrieve
operations to be subject to the users Content Manager permissions.
The input value for CM_SECURITY_EXIT specifies the name of the security
exit class as com.ibm.rme.csexit.CSExit.
The input value for CM_EXIT_LOCATION specifies the file location of the
usermapper.jar file.
362
Parameter
Value
ACCESS_CTRL
YES
CM_SECURITY_EXIT
com.ibm.rme.csexit.CSExit
CM_EXIT_LOCATION
'/usr/lpp/csld/bin/usermapper.jar'
Parameter
RMEServerURL_Default
http://bonnie.
redbook.bocaraton.ib
m.com:9082/RMESer
ver/RMEClientServlet
CMHostName_Default
icmnlsdb
CMItemTypeName_
Default
CSLDMail
UserProxyServerName_
Default
jamaica.rebdook.
bocaraton.ibm.com
UserProxyServerPort_
Default
12345
CSLDArchiveStatusField
_Default
CSNDStatus
Description
Defined in CSExit.properties
363
Parameter
RefreshInterval_Default
RefreshTotal_Default
30
RMEFolderClassifyTotal
WebServerPort
Description
364
ii. Install the RMEAuth filter by specifying the name of the filter in the
Domino server record, in the DSAPI filter file name field in the Internet
Protocols HTTP table. You can specify just the name of the filter file
(librmeauth_r.a) if it is located in the Domino program or data
directories; otherwise you must specify the fully qualified path name.
iii. Restart the Domino server.
8.9.1 Verification
To verify that the CommonStore Server and Notes client are configured properly,
you can follow these steps:
1. In Notes client, create an e-mail message and send it to yourself.
2. Manually declare the e-mail message as a record.
3. Make sure that the e-mail is archived in Content Manager using the Content
Manager Windows client.
4. After the e-mail is archived, the Records Manager classification window
should come up via a Web browser. Specify the bucket in the file plan, for
365
366
Part 3
Part
Advanced topics
This part introduces some advanced topics to address when working with the
integrated e-mail archiving and records management solution.
We cover the topics in the following chapters:
Chapter 9, Deployment considerations on page 369
Chapter 10, Records Manager configuration and administration on
page 391
In this chapter, we address records hold and disposition.
Chapter 11, Discovery on page 409
367
368
Chapter 9.
Deployment considerations
This chapter examines the deployment of an integrated e-mail archiving and
records management solution using CommonStore, Records Manager, and
Content Manager from a planning perspective.
We review:
369
370
New software versions can be implemented in the test system and thoroughly
checked for interdependencies before being rolled into production.
IBM will issue version-specific fix packs from time to time and, as with all
our software products, release notes will identify the reason for the fix and
what steps should be taken to apply the fix.
With the IBM Content Management portfolio of products, IBM has made
identification of product interdependencies clear in the product release
notes. If one of the products in this portfolio has a new version, use of the
test system will enable you to confirm correct operation of this new version
in your own environment.
Additional software may be added to the current implementation that must
have interoperability testing carried out before production implementation.
An example here is if you extend the current e-mail archive and records
management system to include Document Management. This major
modification to the system must be thoroughly tested in your environment
before you deploy it in the production environment.
In the following sections, we include some of the issues to consider in the
construction of a test system for the integrated e-mail archiving and records
management system.
Hardware
In most cases, this presents challenges to an organization. In almost every case,
it will not be possible, cost-effective, or practical to set up your test system using
the same scale of hardware (server hardware) as your production system. But
unless performance testing (which should have been completed as part of an
earlier implementation component) is something your organization does on an
ongoing basis (which is unlikely), then equivalently specified hardware may not
be important in your test system.
Multi-site environment
If you have operations in multiple sites, it may be a useful requirement for your
test system to establish multiple servers across several geographically dispersed
sites. In a Content Manager environment, multiple Resource Managers can
assist in spreading the content load and placing it closer to regional user groups.
371
If this is the case, a test system that encompasses multiple servers and sites will
test a number of components:
Correct setup and behavior of the storage of objects onto correct Resource
Manager.
Correct access through organization WAN firewalls.
Correct replication of objects to remote Resource Managers.
On a slightly different aspect, this multi-site test environment will also facilitate
the testing of remote access and management of resources located off-site.
A similar concept could be used to test remote access to the system from client
PCs.
Multi-machine environment
It is too tempting (from a resources perspective) to think that the test system is a
system assembled from old pieces of hardware lying around the server room.
After all, the cost of building a dedicated, multi-machine environment just to do
testing may seem hard to justify. But many issues can be tested when your test
environment is built using the same number of machines as your production
environment.
One of the key benefits of this multi-machine environment is that communication
between the machines can be fully tested using real-world protocols and IP
addressing rather than relying on, perhaps, localhost as the machine IP
addresses if all servers are co-located on a single machine.
Software
This aspect of the test system is extremely important, both for ensuring that the
same applications (and versions) are installed on your test system as exist on the
production system, and that the configurations between and within each software
package mimic the production environment.
Much of the configuration used in the integrated e-mail archive and records
management system can be exported.
372
373
System performance
Did the system performance under pilot loads meet or exceed expectations?
The purpose of a pilot is to test the system performance under a limited load.
Performance can be perceived to be good or poor depending on your role. For an
end user, the performance of the system has a major impact on the success of
the project. If users experience poor system performance, then, regardless of the
importance of the system, the project may fail. A pilot is a good opportunity to
review performance with real users, but what are you measuring? With an
integrated system such as e-mail archiving and records management, many
aspects could affect the overall, perceived performance of the system; for
example:
If manual archiving is being used, how fast can a user archive an e-mail?
When can the user get control of the machine?
What interaction from the user is required?
The more interaction, the slower the system is perceived to be.
374
Is the functionality offered by the system too much of an overhead for the user
or the tasks they need to accomplish?
If an e-mail has not been archived and the user needs to declare it as a
record, how long before the user gets the response from Records Manager
asking the user to declare and classify?
The declare and classify options do not appear until the system has received
the e-mail or documents PID back from Content Manager; of course, this
depends on this actions success and performance of the underlying Content
Manager repository.
If a user declares a record, what metadata is the user required to complete?
Requiring too much information to be entered may increase the users
frustration and affect the users perception of overall system performance
(even though the system may be idle, waiting for users input).
Does the user need to drill down through a long or complex file plan
hierarchy before reaching the record container to place the record into?
(The use of IBM Records Manager functionality such as custom Views
would assist here.)
Are there any LAN or WAN performance issues?
Use of remote Content Manager Resource Managers to speed up local
access to archived documents (bear in mind here that successfully
implementing local or remote Resource Managers requires CommonStore
to use multiple administrative IDs unique to each location so that the home
location of an object can be identified and the relevant Resource Manager
is used to store the content.
Is the WAN bandwidth shaped in any way that is likely to reduce
performance of the new system? Often, organizations employ bandwidth
shaping across their WAN to allow effective use of the bandwidth for
existing systems. (An example is a transactional system: An order
management system is given a higher priority across the WAN to ensure
that a terminal user gets an adequate response). When a new system is
introduced, these packet-shaping mechanisms (often based on open
ports) must be reviewed to reflect the use of the new system.
Are system firewalls having any affect on remote traffic accessing the new
system?
A records administrator, on the other hand, would probably be willing to accept
certain overheads on the system (such as accurate completion of any metadata
requirements) before users became frustrated with overall performance.
Because there are many components involved in the overall performance
system, a good plan is to perform subsystem performance tests prior to rolling
375
the system out even to pilot users. Examples of IBM product resources to assist
organizations with subsystem performance testing are:
DB2:
DB2 II: Performance Monitoring, Tuning and Capacity Planning Guide,
SG24-7073
DB2 UDB/WebSphere Performance Tuning Guide, SG24-6417
WebSphere Application Server:
Maximum Performance with WebSphere Application Server V5.1 on
iSeries, SG24-63833
Content Manager:
IBM DB2 Content Manager V8 Implementation on DB2 Universal
Database: A Primer
Performance Tuning for Content Manager, SG24-6949
376
377
Multiple tests can be performed here and, as with all testing, some degree
of training should have taken place prior to commencement of testing.
System usability
Were users able to perform their archiving and records management tasks
effectively?
One of the main goals for any software system pilot is to ensure that users can
use the system to perform their archive and records management tasks
effectively.
Clearly, the system will have been configured (from both technical and business
perspectives) before it is used, and this configuration will have had input from key
business users. These users may have had an initial influence on the look and
feel or usability of the system prior to its rollout to pilot users. This form of user
input is important to ensure that basic usability (at least, the usability that can be
configured) meets the requirements of the business.
Related to usability is the aspect of pilot user training. Even before the bulk of
users are trained, pilot users must receive some training before they commence
the pilot. The project manager should ensure that adequate training or education
is carried out prior to pilot users gaining access to the system. This will
streamline the pilot and enable users (both end users and administrative users)
to concentrate more on testing the system without having to struggle with how
they perform a particular action.
A final, related aspect of usability is support: How will pilot users obtain
necessary support during the pilot? This aspect of the pilot is covered in a later
section.
Post-pilot response
Although not specifically a pilot goal, an organization must plan for the end of the
pilot. In other words, when the predefined pilot period has finished, what happens
next? Whenever a limited deployment is planned, always have a very definite
plan for how the pilot is to proceed after it is completed. Three scenarios must be
considered here:
The pilot succeeded and a larger implementation will commence.
The pilot did not achieve its goals and will be extended.
The pilot did not meet its goals and a larger implementation of the system
under pilot will not take place.
378
379
The system will reduce the cost of any document discovery litigation
that may be brought against the organization.
With all of these areas, the key is to find a measurable metric, one that can
be quantitatively used as a benchmark. Often these metrics are time
saved in person-days or dollar savings.
Scenario 2: The pilot did not achieve its goals and will be extended
In this instance, the pilot may have to be extended to all relevant pilot users to
fully test all functionality and usability of the system. This may be because
additional functionality was added to the initial build or configuration or that some
customizations have been performed that need longer to test.
Either way, extending a pilot still has to be managed effectively. As mentioned
earlier, there may be a requirement to continue with any parallel running that may
be in progress; arrangements here may affect both pilot and non-pilot users.
Pilot user expectations should be re-aligned to the new pilot period and ensure
that the business as a whole (project and business sponsors included) is kept
informed of progress.
380
records will have their access secured. This must be considered when exporting
the data.
An option that can be adopted during a pilot phase is to run in parallel with a
manual records management system. This will minimize the disruption if a pilot
phase is not extended into production, but it will increase the amount of work
placed on pilot users. This method will succeed only where organizations are
already running a paper-based recordskeeping system.
381
382
383
384
385
Security
Unless only the right staff have access to configuration documents, elements
of your configuration can become compromised; in addition to unauthorized
modification to the document set, inexperienced or unauthorized users may
be able to gain access to systems by referring to documents that normally
should not be available to particular groups of staff.
Review mechanisms:
If effective, these will ensure that any suggested changes are correctly
reviewed, ideally by both business and skilled technical staff.
Business reviews should consider the impact the proposed changes will
have on the day-to-day operations of the affected part of the business. If a
proposed change (such as a version upgrade to a core product) is likely to
mean that a system is down for a prolonged length of time, this may
reduce the impact of any advantages the proposed change will bring.
A technical review performed by an appropriately skilled subject matter
expert will allow consideration to be given to the broader impact of the
proposed change. For example, a modification to the attributes of an item
type may require that appropriate modifications are also made to full text
index components.
Note the following points:
If you are not going to install administration clients on servers, designate one
machine as the master client machine and install them on that.
Standardize the configuration.
Establish a configuration document (spreadsheet) early on with absolutely all
parameters used in the install.
Duplicate Test and Production configuration.
Establish a configuration management process early and enforce it.
Establish a document control process (standards, versioning) and enforce it.
Get the customer trained as early as possible.
Assume that it will take longer than originally anticipated.
It will be more complex.
Know the import and export limitations of Records Manager.
Allow for records declaration in the sizing of Content Manager.
Applications will behave badly; prepare for this during the pilot.
Knowledge of DB2 will assist greatly in understanding IBM Content Manager.
386
387
devices. If performance is poor only for brief periods, begin by looking for
common applications or utilities running at these times, such as DB2 backup.
Does the problem appear to be system-wide or isolated to DB2 and its
applications?
System-wide performance problems suggest an issue outside of DB2. It is
possible that something at the operating system level should be addressed. If
the poor performance is confined to DB2applications, we will focus on what
DB2 is doing. If isolated to one application, is there a particular query that
appears to be problematic?
Within CommonStore, Single Instance Store (SIS) is the mechanism used
to ensure that for multiple documents e-mailed to a group of users who
each decide to archive their copy, only one copy is physically archived. For
this function to work efficiently, CommonStore checks a set of attributes
(via their indexes) in the DB2 database to see whether the document
already exists. This check has to be performed quickly and in real time.
Non-indexed attributes or index problems can cause a delay.
If one application is problematic, then you can further examine whether
users are reporting one or more queries that are experiencing a slowdown
(such as the Single Instance Storerelated issue). You might be able to
isolate the issue to one application and a potential group of queries.
Is there any commonality to the poor performance or does it appear to be
random?
You should determine whether any common database tables, table space,
indexes, and so forth are involved. If so, this suggests that these objects are a
point of contention. Other areas to potentially focus on include referential
integrity constraints, foreign key cascades, and locking issues.
9.4.2 Upgrades
Upgrades to software systems should not be considered lightly. They should only
be considered where security, major functionality, or incompatibility with other
systems issues are a concern. When planning for an upgrade to any of the
software packages, consider the following points:
Can I justify this upgrade? Before performing any upgrades, they must be
justified on a number of issues:
Does the business case warrant the expense of the upgrade? Upgrades
are not a no-cost option even though the software may be part of a
maintenance arrangement with your vendor. The cost of planning, testing,
any business disruption, or performing the upgrades to the production
system will all be considered as cost factors and must be outweighed by
the benefits.
388
389
390
10
Chapter 10.
Records Manager
configuration and
administration
This chapter describes two key areas of records operations: holds and
disposition. We introduce the key aspects of holds and the impact and results of
applying holds and performing dispositions.
We cover the following topics:
Records Manager configuration sequence
Holds
Records disposition
391
Create a view.
Create components.
Establish relationships between components.
Add any required custom attributes.
Add instances of the file plan.
Import host users.
Assign permissions.
Set up life cycle information.
392
Container component
Record component
Department
Region
Division
email
Document
Container component
Container component
Container component
Record component
Record component
393
To set up within the Records Administrator Client, perform the following steps:
1. Select File Plan Design Views.
2. Locate required View and select View/Relationship Properties.
3. For each component in the hierarchy, select Add Relationship.
Tip: It is good practice to start the name of each relationship with an integer to
enable a sequential sorting of the list of relationships.
394
After you add an attribute definition to a file plan component definition, for every
new file plan component of that type that is added to the file plan, users can add
data into an attribute corresponding to the attribute definition.
Custom attributes can be added to both container components and record
components. Custom attributes are added to an existing list of system attributes
common against all file plan components. It is possible to restrict what attributes
a user sees when classifying a record by using Profiles.
Custom attributes can be used to model your organizations metadata
requirements for records management. An example of how they can be used is
where you may be generating documents as a consultant for a particular client.
You would like to specify the customer name against each document you classify
(assumes manual classification) as a record so that at the close of the
engagement, all documents can be processed together through the life cycle
management functions within Records Manager.
To set up:
1. In the Records administrator client, select File Plan Design Components.
2. Locate the component that you wish to add attributes to and click the
View/Edit Properties action.
3. Within the selected component, click Add.
No custom attributes were added for our scenario.
Note: To create an instance of a file plan component, select the level above
this component definition.
For example, using our sample file plan scenario of ITSO Department
Region Division, if you want to create different departments, you must
select ITSO and then click the Add action. If you want to create different
regions under a particular department (such as the Finance department),
select ITSO Finance department and then click the Add action.
To set up:
1. In the Records Administrator Client, select File Plan Administration.
395
2. Next to the primary view name (in our scenario this was called ITSO), click
the Add action.
Our sample environment file plan component instances:
View
Departments
Regions
Divisions
ITSO
Finance, Sales
Europe, Asia, America
Accounts Receivables, Accounts Payable
Important: For Records Manager to see the host Content Manager users,
Records Enabler for Content Manager must be set up correctly, and any users
requiring access to declare records must be imported into Records Manager.
You can add local users but not host users in Records Manager.
Note: More than one mailbox user can be mapped to a single Content
Manager user ID.
396
When assigning permissions, you must select to which systems users you are
granting permissions. For additional clarity, we provide appropriate images to
accompany the instructions.
To set up (permissions at system level):
1. In the Records Administrator Client, select Security System
Permissions.
2. Select one or more components to apply control then click Permissions
(Figure 10-2).
Attention: Users must be able to traverse the file plan hierarchy to a point
where a record component can be declared. Ensure that each level in the file
plan hierarchy has been selected from the system permissions as shown in
Figure 10-2 on page 397.
397
3. From the Host Filter list, select the relevant system as a source of users (in
our case ICMNLSDB) and ensure that one or more permissions are selected
from the list, then click Add Users or Add Groups (Figure 10-3).
4. Click OK.
Note: The previously selected components from the file plan hierarchy are
shown (see Figure 10-3). At this stage they appear in the Users/Groups list
but without any users identified. In a later step, these file plan components will
indicate which users or groups have been given what access.
398
Figure 10-4 Selected users from the host system showing permissions given
399
6. The users and groups that were selected, plus their permissions and the file
plan components where this combination of users and permissions have
access, is shown (Figure 10-5).
Figure 10-5 Completed permissions showing users and file plan components
400
Note: You must have the Life Cycle Management Design function access right
to create life cycle phases and codes.
Designing a life cycle is also a two-step process: set up at least one life cycle
phase (most organizations use two phases: active and dormant), then create a
life cycle code that uses a combination of previously created life cycle phases.
These are all life cycle components:
Life cycle phase
Life cycle code
Life cycle date
Life cycle code is set up in Life Cycle Administration Life Cycle Codes and
specified within each file plan component.
To set up life cycle component, use the following steps.
401
10.2 Holds
In records and legal circles, the terms tax, legal, litigation, and records holds are
common. We use the generic term of hold.
A hold is an action taken on records collections to ensure that they are not
dispositioned (deleted or archived) as part of their normal retention schedule life
and are kept possibly beyond their scheduled date of destruction. For example, if
a retention rule specifies that all e-mail records must be kept for three years
before deletion, then any such record on hold (having a hold applied to it) that
reaches that three-year period will not be (and cannot be) deleted. A hold may
also have other direct impacts such as the freezing of information sharing such
as educational records and transcripts triggered by a hold applied due to lack of
payment.
Note: In IBM DB2 Records Manager, the term and function suspension is used
to represent and action all types of holds. In other words, suspension = hold.
Applying holds
Usually a companys legal department receives or determines independently to
define and apply holds. The legal department does not usually apply holds onto
records themselves but rather passes or directs the holds internally to records
owners (business process owners) and, most commonly, to the records
department and records managers. It is then the responsibility of the records
staff to find and determine the records to apply the holds to, and ensure that such
records are preserved and not destroyed if they reach the end of their life.
402
Hold target
Records staff usually intimately know their retention schedule and file plans.
There are two main ways to apply holds. One way is to browse to a file plan
location or container; for example, for a particular matter or case or customer.
Another is to search across all records for related terms, keywords, or metadata
that make them candidates for the hold; for example, hold all financial trade
records.
Hold length
Holds do not last forever. Most records are not kept forever. At some point, days,
weeks, months or years later, the hold can be removed, when the legal or other
issue is closed or settled or an internal investigation is completed. Whatever the
reason, usually the legal department can determine and then instruct the records
department to remove the hold and continue the standard retention schedule on
those records.
Sometimes the same retention will remain and in the future the records will
expire as planned. If the hold had been applied and removed after the original
retention date, then those records could immediately become candidates for
destruction. Occasionally the legal, records, and business process may decide to
apply a new retention on the records that were previously on hold, in effect
extending the retention. The key is to follow documented record processes and
practices to achieve this. To be able to demonstrate to courts, consistency is key.
One of the most important aspects of a companys records hold process is, from
a legal perspective, to demonstrate a high level of documented consistency in
applying holds and, later, disposition.
403
404
Destroy
Destroy is the confidential deletion of the records content and metadata. The
records term for this is expunging (irrevocably deleting the record so that not
even document forensics can recover any aspect of it). Electronic records are
usually overwritten at the disk bit level (and independent validation can be
demonstrated such as provided by gaining US DoD 5015.2 STD certification).
For physical records these were usually burnt or shredded but nowadays due to
environmental concerns they may be destroyed in acid baths.
Accession
Accession is sometimes called archiving. The records are no longer tracked or
kept in your records system but their provenance (history) is maintained as they
are passed to some other records holding authority, maybe to the corporate
archives. Note that the electronic copies records should be destroyed from your
records system after the transfer.
Review
Review highlights the records at the end of their current defined life and enables
the records staff and organization to review and possibly change the retention or
period of re-reviewing the disposition of the records (for example, in a years
time).
405
and objects in boxes. Now with e-mail counted in the millions per day, a more
scalable records scheduling solution is critical.
406
Another way to view scheduling is in the risk of not doing it. In the past,
companies felt that it was best to simply keep everything. Storage keeps getting
cheaper (but the management and finding of items stored does not). In the past
few years, where records and compliance have risen in importance and have
now been mandated, organizations realize that they cannot just keep everything.
Records retention schedules help organizations identify the types of e-mail they
have and how long to keep it for. Records scheduling provides structured
consistent means to destroy the e-mail on a timely basis. If an organization only
performs its scheduling of e-mail records twice a year, they would be best to
analyze their risk: the risk of having maybe 50% of the e-mail records not deleted
when they could have been appropriately and thus a 50% possible increase in
discovery risk if, or rather when, a court-ordered discovery is imposed, as well as
a possible 50% increase in discovery costs.
Organizations are also well served to revisit their current records scheduling
processes where they may not choose to capture and store e-mail as records. A
common e-mail management practice is to simply delete all e-mail older than, for
example, 90 days. This can open up the organization to be viewed as having little
if any corporate e-mail records-keeping in place and could be viewed to be
willfully destroying current (or future) evidence. Is that e-mail related to a current
employee and should it really be deleted? Is that e-mail related to a customer or
supplier contract or order or business transaction or decision, for a customer
relationship still ongoing or contracted? E-mail generally is a great source of
company decisions. Make them corporate records for everyones sake.
Disposition results
With e-mail being such an important type of record to companies and courts (it is
now one of the first types of records ordered to be put on hold and discovered
against by courts), it is critical to have auditable, admissible histories of what
actions on the record systems occurred. With so many e-mail messages as
candidates for disposition daily, it is best to ensure that the record system can
audit the individual destructions, although that volume of audit log and metadata
can quickly be unmanageable at that level. More practical is to perform
scheduling more often and have the audit results be able to convey the
scheduling that occurred (for example, who triggered it, across what type of
records, what are the retention rules and date ranges).
Records Manager provides a multi-step process for scheduling, each step of
which is audited and can be reported on in summary or down to the individual
e-mail record destruction level. Scheduling logs are also kept separate and can
even be exported in XML for reuse and reprocessing in the future.
407
408
11
Chapter 11.
Discovery
This chapter describes the needs, drivers, and benefits of having the e-mail
archiving and records management solution able to perform discovery on e-mail
records. This is not meant to be a definitive definition or guide on the greater
aspects and practices of discovery, nor replace the need to have your legal
council involved.
We cover the following topics:
Yours to discover
Poor or inadequate discovery
Security
Sample discovery process
409
410
some discovery orders even when such an order has not been received.
Companies need to act and predict and ensure that their normal record and
non-record e-mail archiving and destruction processes, especially when
automated, are held or stopped to ensure future spoliation. Organizations have
lost cases or suffered large financial consequences not by what was found in
discovery but by being allegedly found to have destroyed or altered records.
11.3 Security
The e-mail record system must support secure discovery. All record access must
be logged, as do all actions to package, filter, review, re-search (search refining),
hold, and export e-mail records. The ability to control who has discovery search
and export options is also critical. You do not want every e-mail user in a
company to be able to search all e-mail, for example. Usually such discovery is
performed by paralegals or record staff and only via specific user accounts with
security permissions to do wide-ranging searches and discovery actions.
411
CommonStore
for Lotus
Domino
Documents upon
ingestion can be
interrogated and
applied a retention
outside of the default
retention.
eDiscovery
Records
Manager
Content Manager
The records
disposition process
can utilize the full
function Content
Manager workflow for
the deletion process.
E-mail outside of
the default retention
are declared as
records.
Figure 11-1 Discovery information flow for an e-mail records enabled solution
412
2. The eDiscovery client can be used to perform searches across all e-mail that
the solution stores.
You can enter a search criteria such as the sender, the recipients, or from
which time period, and click Search. See Figure 11-2.
Key in
Search
criteria
Note: Not every e-mail is a record and does not have to be. It may be that
only 5% of an organizations e-mail will be candidate records under more
long-term retention rules. By default, the solution can provide a more
generic retention of the non-record e-mail (for example, keep for 120 days).
The key e-mail record discovery option demonstrated here is the ability to
search across any of the core metadata that makes up e-mail, the e-mail body
itself, and any attachments.
413
Search (also known as queries) may be saved and re-used. The advanced
search option on the upper-left panel enables searching of e-mail using
parametric options (such as searching in the same paragraph and sentence).
3. Figure 11-3 shows the results of the previous discovery search. The small
example here shows just two e-mail messages returned.
One important point here is that the result also displays if the items are
already part of another hold, although security may not let the discover know
what those holds are.
414
4. Figure 11-4 shows that both pieces of e-mail (which may not be records yet)
have been selected for discovery action. The action menu shows the next
step discovery actions available (export, retrieve, hold). In this case, we will
apply a hold on the candidate e-mail, which will then be made records as a
side action of applying a hold.
415
5. In Figure 11-5, we show the ability to select a hold to apply from the master
list of available holds. Remember here that the key is to get the items on hold;
you do not need to review them all at this time.
416
417
418
8. As the volume of e-mail records for discovery processing can be large, these
batch actions of searches and hold and export discovery actions can execute
for some time. Figure 11-8 shows the processing status of such long-running
processes.
After the hold (and records declaration) has occurred, the export option (see
Figure 11-4 on page 415) can be selected to render the e-mail into a working
directory from where they can then be burnt to CD-R or DVD-R.
This solution also ensures that the exported record e-mail is rendered out in an
original representative form that preserves all original metadata and content
(again to avoid spoliation issues).
eDiscovery custom client is an IBM services offering that works with Content
Manager and Records Manager. For more information, contact your IBM
representative.
419
420
Part 4
Part
Appendixes
421
422
Appendix A.
423
424
425
426
Appendix B.
427
428
On AIX, the log file has a file name starting with the CommonStore instance user
ID followed by .dklog.log. It is located under the Content Manager working
directory:
For CommonStore for Lotus Domino on the AIX platform:
/home/ibmcmadm/log/connectors/CSLD.dklog.log
429
The errors reported in this log are standardized HTTP return codes as listed in
Table B-1.
Table B-1 HTTP return codes
Short description
Long description
OK
201
Created
400
Bad request
401
Unauthorized
404
Not found
408
Time out
430
431
The CommonStore for Lotus Domino archive and restore tasks are configured in
the Lotus Notes CSLD configuration database in the database profile
documents. The log files have a file name with the corresponding tasks profile
name with an extension of .log. The log files maximum file sizes and their
locations are specified in the tasks profile documents.
If using default parameters, the log files are located in the following directories:
For CommonStore for Lotus Domino on the Windows platform:
c:\Program Files\IBM\CSLD\server\instance01\Archive.log
At the startup, the CommonStore for Lotus Domino tasks have not read the
CSLD configuration database on the Notes server and therefore are unaware of
the desired location to write the log files. Until the Notes database is read, the log
files will be written to the path specified by the CSNINSTANCEPATH environment
variable.
432
433
In addition, we introduce some best practices when working with a trace file for
troubleshooting your system problems.
434
435
436
437
The trace files location is also specified in the tasks profile document.
For CommonStore for Lotus Domino on the Windows platform:
c:\Program Files\IBM\CLD\server\instance01\Archive.trace
At startup, the CommonStore for Lotus Domino tasks have not read the CSLD
configuration database on the Notes server and therefore are unaware of the
desired location to write the trace files. Until the Notes database is read, the trace
files will be written to the path specified by the CSNINSTANCEPATH environment
variable.
438
439
The trace files have a file name with the fully qualified Exchange Server name
with an extension of .trc.
The trace files are located in the CSX Task path.
For CommonStore for Exchange Server:
c:\Program Files\IBM\CSX\Task\crawler_<fully qualified Exchange Server
Name>.trc
440
Best practices
For troubleshooting problems using traces and maintaining a smooth system
operation, we recommend the following best practices:
Do not enable tracing unless requested by support or if an administrator is
troubleshooting an issue.
Tracing causes extra overhead and may produce noticeable performance
degradation on an already busy systems.
With a CSLD system, monitor the CSLD jobs database to detect archive and
retrieve errors early.
Monitor the aiYYYYMMDD.log files daily.
Use software such as IBM Tivoli Monitor to automate the process.
Implement a scheduled method to delete the old aiYYYYMMDD.log files, as
they are not automatically deleted.
On AIX, use crontab to schedule a shell script.
On Windows, use the AT command with a third-party log deletion application.
Sample AIX shell script to remove aiYYYYMMDD.log files:
#!/bin/sh
# Clean up CommonStore Daily Task log files older than 7 days
find /home/CSLD/inst001/ -name "ai*.log" -atime +7 -exec rm -f {} \;
441
442
443
444
445
446
The rmeserver.log file is located under the Content Manager working directory
path.
For Records Enabler on the Windows platform:
c:\Program Files\IBM\db2cmv8\log\rme\rmeserver.log
447
The default log file is located under the Content Manager working directory path.
For Records Enabler on the Windows platform:
c:\Program Files\IBM\db2cmv8\log\rme\rmeserver.log
448
The log file is located under the Content Manager working directory path.
For Records Enabler on the Windows platform:
c:\Program Files\IBM\db2cmv8\log\rme\rmehostlog4j.log
449
The log file can be found under the Content Manager log directory.
For Content Manager Records Enabler on the Windows platform:
c:\Program Files\IBM\db2cmv8\log\rme\rmepslog4j.log
450
451
452
Appendix C.
Additional material
This book refers to additional material that can be downloaded from the Internet
as described below.
Select the Additional materials and open the directory that corresponds with
the redbook form number, SG246795.
Description
User mapper sample code
453
200 MB
Windows
Pentium IV or higher
512 MB
454
Related publications
The publications listed in this section are considered particularly suitable for a
more detailed discussion of the topics covered in this redbook.
IBM Redbooks
For information on ordering these publications, see How to get IBM Redbooks
on page 456. Note that some of the documents referenced here may be available
in softcopy only.
Content Manager Implementation and Migration Cookbook, SG24-7051
DB2 II: Performance Monitoring, Tuning and Capacity Planning Guide,
SG24-7073
DB2 UDB/WebSphere Performance Tuning Guide, SG24-6417
Disaster Recovery with DB2 UDB for z/OS, SG24-6370
Maximum Performance with WebSphere Application Server V5.1 on iSeries,
SG24-6383
Performance Tuning for Content Manager, SG24-6949
Other publications
These publications are also relevant as further information sources:
IBM DB2 CommonStore for Lotus Domino: Administrators and Programmers
Guide Version 8.3, SH12-6742
IBM DB2 CommonStore for Exchange Server: Administration and Users
Guide Version 8.3, SH12-6741
IBM DB2 Records Manager: Concepts Guide, SC18-9182
IBM DB2 Records Manager: Installation Guide, SC18-9185
IBM DB2 Records Manager: Administrators Guide, SC18-9180
IBM DB2 Records Manager: Technical Reference Guide, SC18-9181
IBM DB2 Content Manager V8.3: Planning and Installing Your Content
Management System, GC27-1332
IBM DB2 Content Manager V8.3: System Administration Guide, SC27-1335
455
Online resources
These Web sites and URLs are also relevant as further information sources:
IBM DB2 Content Manager V8 Implementation on DB2 Universal Database:
A Primer
http://www.ibm.com/developerworks/db2/library/techarticle/0305chen/0305chen
.html
456
Index
A
Access Control List (ACL) 69, 96, 156, 158, 164,
200, 230, 232, 286, 315316, 330
access permissions 15, 396
ACCESS_CTL 200, 286, 362
accession 63
definition 55
disposition 55, 405
ACL
See Access Control List
Active Directory 10, 238240
Extension 226, 238, 240
Schema 241
Schema Extension installation 240
administration
CommonStore 10
administrator
CommonStore 10
agent
CommonStore 52, 139, 163
AIX group 305
AIX user 306307
home path 306
ID 299
AIX user account 308, 318
aiYYYYMMDD.log 431
AllPrivs privilege 158, 316
privilege set 232
API 7, 12, 1415, 139, 141, 212213, 295, 297,
306, 370
Lotus Domino 319, 326
Notes 295, 305, 335
application programming interface
See API
archint
installation directory 328
archint.ini 73, 153, 156157, 159161, 168170,
226, 230, 232233, 235, 313, 319, 323, 328,
332333
configure 159, 233
logical archive section 161
archint.trace 436
archint_startup.trace 436
457
declaration 52
B
back-end repository 199, 360
common use 128
bcc
e-mail 157
body
deletion type 38
BUNDLED
archiving type Attachment 35
archiving type Component 34
archiving type Entire 34
storage model 33
C
child component 156157, 393
classification 56, 58
automatic, planning 58
definition 53
foldering 60
planning 57
profile 59
quick list 60
classify 111
classpath 154, 200, 227, 284, 314, 361
ClientImport 68
CM V8 connector 138
cm8errors.log 429
cminstall.log 442
CMRE
See Content Manager Records Enabler
CMRE server
prerequisites 140
CMREID 92
cmtrace.trc 435
CommonStore 4, 6, 7273, 133134, 138, 163,
199, 205206, 210211, 237, 244, 289290, 294,
360, 377, 423
archive e-mail 107108, 112, 114
archive policy 4344, 115, 120
configuration data 10, 15
configuration database 6, 18, 73, 77, 317
configuration document 6
configuration file 156, 158, 231
deletion type 12, 20, 36, 38
e-mail archive 105
e-mail archive policy 106, 110
458
configuration 175
archint.ini 233
CommonStore server 247
CommonStore task 240
Content Manager Records Enabler 193, 278,
286287, 355
MIME type, Content Manager 246
Outlook 226, 238239
Records Manager 46
configuration data 144, 147, 152, 217, 220, 225,
300, 303, 305, 387
CommonStore 10, 15
configuration database 73, 77, 153, 164, 166, 317,
326
CommonStore 6, 18
Domino server 173
configuration document 202, 364, 385386
CommonStore 6
configuration file 254
Connection Factories Authentication 180, 265, 342
container 89
container component 49
Content Manager 1, 4, 7, 21, 6870, 104, 123,
133134, 138, 149, 205206, 210211, 221, 224,
230, 289290, 294, 307308, 369371, 376, 412,
419
administration client, Records Enabler 92
administrator, Records Enabler 9192
archive e-mail 74
archived content 316
attribute availability 383
basic entity 69
corresponding items 17
file system 380
full text search 139, 144
installation program 192
item type 6971
log files 441
MIME type configuration 246
OnDemand 4, 8
PID 375
predefined privilege sets 68
privileges 309
privilige groups 68
Records Enabler 1, 1516, 18, 9192, 115
Records Enabler, Host Interface Server 16
Records Enabler, Permission Synchronization
Server 16
Records Enabler, subsystem 16
Index
459
CS task 73, 77
csc_startup.trace 438
CSCDISIS 157, 230
CSExit.properties 199201, 284, 287, 360361,
363
CSHttpTask 435
CSLD 138
profile document 329
CSLD package 202, 365
CSLD task 6, 73, 9899, 153, 164, 166, 176,
313314, 317
CSLDOrigDB 74, 76
CSLDOrigDB attribute 96
CSN format 25, 29
csserror.log 430
CSX Active Directory trace files 440
CSX client 242
CSX Crawler trace files 439
CSX Outlook Extension trace files 440
CSX System Manager trace files 440
CSX task 911, 226227, 239, 243, 252, 284, 286
committer 259
committer thread stub 258
file transfer 247
individual components 10
initialization 252
instance 10
polling thread 258259
se tup 255
worker thread 253, 258259
CSX Task trace files 439
csx_TaskName.trc 439
CsxADData_TaskName.trc 440
CSXMail item type, creating 229
D
data source 186187, 348349
dataset 268, 345
dataset file 183
DB Language 346
DB language 184, 269
DB_DIR directory 199, 285, 361
DB2 215, 299
JDBC driver location 187, 272
DB2 administration client 214
installation 144, 217, 300
DB2 client 138, 210, 294
DB2 database
460
E
e-mail 1, 8, 14, 1921, 4345, 6769, 73, 93, 104,
124, 126, 230, 290, 293294, 365, 371372, 374,
396, 406410, 415, 417
archive 4, 8
bcc 157
IPM.Note 241
message layout 20
record 410411
e-mail archive 43, 104, 115
policy 106, 110
solution 43
user access 95
e-mail archiving
common driver 105
components 141, 148, 153, 214, 221, 226, 297,
307, 313
environment 137
mail servers 124
e-mail database 176
e-mail message 18, 20, 69, 89, 203, 287, 365
e-mail system 64, 290
enterprise information system 342
enterprise information system (EIS) 180, 265
entire
archiving type 22
GENERIC_MULTIDOC 30
GENERIC_MULTIPART 26
storage model BUNDLED 34
environment setup 143, 146, 148149, 154, 178,
215, 218, 220, 222, 227, 263, 299, 301, 303304,
309, 314, 340, 344, 353
environment variable 189190, 274275, 351352,
385
ervers 451
event
retention schedule 51
event time
retention schedule 51
Exchange Server 710, 12, 18, 93, 96, 104, 121,
123, 205, 209, 211212, 241
CommonStore 8, 10, 237, 253, 284
F
file plan 1516, 4748, 56, 58, 62, 89, 117, 189,
198, 269, 274, 283, 346, 351, 359, 365, 375, 377,
379, 382, 392393, 400, 417
component 89
components 393
design 62
physical or logical containers 89
sample 423424, 426
FOIA 407
foldering 60
classification 60
Freedom of Information Act (FOIA) 407
full text search 139, 144
function access right 89
G
GENERIC_MULTIDOC
archiving type Attachment
archving type Component
archving type Entire 30
storage model 29
GENERIC_MULTIPART
archiving type Attachment
archiving type Component
archiving type Entire 26
storage model 25
32
31
27
26
H
HASH_MODULO value 199, 285, 361
high availability and disaster recovery 389
hit list 170, 333
hold 391, 402408
applying 402
definition 402
length 403
reasons 402
Index
461
stages 404
target 403
Host Interface Server 16, 140141, 190, 193, 213,
275, 278, 296297, 351, 355
Host Interface server
prerequisites 140
host name 144, 146, 150, 217, 219, 222, 300, 302,
312
CommonStore 249
HTTP error codes 430
HTTP link 168169, 331, 333
HTTP listener 163, 237
HTTP request 163, 237
HTTP return codes 430
HTTP Server 281, 358
SSL 311
HTTP task
log files 429
HTTP task trace files 435
HTTP Worker 237
HTTP worker 163
httperror.log 429
httpstartup.trc 435
I
IBM DB2 Content Manager
See Content Manager
IBM DB2 Records Manager
See Records Manager
icmadmin 197, 282, 358
icmnlsdb 197, 282, 358
icmserver.log 443
import 197, 282, 358
inbox 176
Information Integrator for Content 115, 138139,
141142, 147, 190, 210, 212213, 275, 294295,
297, 352
Installation 143, 146, 149, 151, 176, 195
installation 137138, 141, 143, 146, 149, 210, 214,
293294, 297
Acivte directory Schema Extension 240
CommonStore 232233, 328
CommonStore for Exchange Server 262
Content Manager Records Enabler 147, 190,
197198, 220, 275, 282, 304, 353, 358359
DB2 administration client 144, 217, 300
DB2 server 143144, 215216, 299
directory, CommonStore 159, 165
462
J
J2EE application 139140, 211212, 295296
JDBC driver location 272
job database 6, 73, 77, 153, 164, 166167, 169,
313, 317, 326, 329, 331332
security 73
job database server 176
job database setup 167
job folder 9, 11, 242243
archive request 258
interactive job messages 11
journalling 58
L
Library Server 148, 150
log files 442
license
LUM production license, CommonStore 163
life cycle 1415, 51, 63, 392, 395, 400
litigation 119
log files
Archpro 430
CM8Agent 428429
CommonStore 428
Content Manager 441
Content Manager agent 428
crawler 433
CSHttpTask 429
CSX Task programs 433
HTTP task 429
Library Server 442
Lotus Domino 450
Records Enabler 446
Records Manager 443
task-related 431
WebSphere Application Server 450
log.nsf 451
log4j.properties 443444
logical archive 7, 12, 159161, 233235, 319, 323,
325326
Lotus Domino 20, 36, 72, 93, 104, 123, 133,
138139, 289, 293295, 360, 382, 423
APIs 319, 326
CommonStore 47, 43
database 43
installation 177, 339
log files 450
security 72
server 4, 6, 18, 134, 206, 290
system architecture 5
user IDs 98
LUM
CommonStore production license 163
M
mail database 4, 8, 18, 20, 60, 73, 75, 117, 326
archive e-mail 76
e-mail entry 20
quota 118
size 118
size reduction 105
mailbox 18, 36, 38, 239, 245, 252
manual process
declaration 52
message
deletion type 38
message layout 20
N
Net Search Extender (NSE) 134, 138, 142144,
206, 210, 215216, 290, 294, 298299
non-pilot user 380
Notes API 139, 171, 173
Notes APIs 295, 305, 335
Notes client 74, 137, 139, 166, 203, 294, 317, 330,
365
Domino user 317
notes.ini 153, 171173, 313, 317, 321322, 327,
335
notesdata directory 321, 327
nothing
deletion type 36
NSE
See Net Search Extender
O
Object Request Broker (ORB) 181182, 266,
343344
OnDemand 4, 8
ORB
See Object Request Broker
Outlook 243
configuration 226, 238239
P
permission 89
view, Records Manager 377
permission modification
Records Manager 370
Permission Synchronization Server 16, 137, 213,
296297
Permission Synchronization server
prerequisites 140
permissions
component level 396
system 397
Permissions Synchronization 191, 193, 276, 278,
353, 355
PermSync server
Index
463
Q
quick list 60
classification 60
R
record
e-mail 410411
record component 49, 54, 89, 393, 395, 397
record_manager.log 443
record_manager_err.log 444
record_manager_extensions.log 444
record_manager_host.log 445
Records Administration Client (RAC) 392
Records Administrator 15, 46, 375, 377, 392393,
395
classification 58
required functional access 115
Records Administrator client (RAC) 115, 127128,
377, 392, 395
records destruction 64, 402
Records Enabler 115, 205, 213, 248, 255, 286,
464
definition 51, 62
retrieve
archiving type 40
deletion type 39
review
definition 55, 405
disposition 55, 405
RME
See Content Manager Records Enabler
RME server
See CMRE server
See Records Enabler server
RMEADMIN 92
RMEADMIN ID 93
RMEAuth filter 202, 365
rmehostlog4j.log 448
rmepslog4j.log 449
rmeserver.log 447
S
security 74, 91, 180, 265, 342
job database 73
Lotus Domino 72
privilege group, Content Manager 68
privilege set 6869, 71
privilege set, Content Manager 68
privilege, Content Manager 68
Single Instance Store 388
single instance store 230
single instance store (SIS) 116
smitty 319
solution overview 1, 17
spoliation 411, 419
definition 410
SSL
HTTP Server 311
startup 158, 162163, 231, 236, 239, 316, 320321
startup command 172174, 253254, 335
startup00.trace 437
storage model 24
BUNDLED 3335
GENERIC_MULTIDOC 2932
GENERIC_MULTIPART 2527
suspension 56
definition 402
system configuration 121, 123125, 134, 206, 290,
382
system permissions 89, 397
Index
465
SystemErr.log
for Resource Manager 442
for WebSphere Application Server 450
SystemOut.log
for Records Enabler 449
for Records Enabler engine 446
for Records Enabler Host Interface 448
for Records Manager engine 443
for Resource Manager 442
for WebSphere Application Server 450
T
TaskProfileName.log 431
TaskProfileName.trace 437
task-related log files 431
task-related trace files 437
TCP/IP port 168169, 331332
test system 369371
uses 370
text search 144, 149, 211, 216, 295, 299, 308
text-search user exit 25, 29, 33
The National Archive (TNA) 64
time
retention schedule 51
Tivoli Storage Manager 4, 78, 150, 160, 234, 250,
323
trace files
ArchPro 435
best practices 441
CommonStore 434
Content Manager agent 435
crawler 439
CSLD Crawler 438
CSX Active Directory 440
CSX Crawler 439
CSX Outlook Extension 440
CSX System Manager 440
CSX Task 439
HTTP task 435
task-related 437
transport host 180, 265, 342343
TSM
See Tivoli Storage Manager
Content Manager 69
user group 15, 63, 69, 90, 373374, 381
Content Manager 69
user ID
AIX 306307
Content Manager 91
Content Manager Records Enabler 100
Lotus Domino 98
user mapping 95
user request 16
usermapper 199200, 284285, 360361
usermapper proxy 200, 361
V
view archived content
archiving type 41
deletion type 41
virtual directory name 181, 266, 343
W
Web Site 453
WebSphere Application Server 138, 140, 145146,
187, 210, 217219, 224, 264, 266, 294, 296,
301303, 310, 349
cell 186, 272, 349
Embedded Messaging feature 137
installation 147, 302
WebSphere Application Server 147
installation directory 182, 267, 344
installation process 146, 218, 301
installing as a Windows service 224
log files 450
node 187, 191, 194, 272, 276, 279, 349, 353,
356
software 145146, 218, 301
Windows service 149, 151, 174, 195, 221, 224,
226, 253254, 350
worker thread 253, 258259
U
un-declare record 18
user
account, AIX 308, 318
466
(1.0 spine)
0.875<->1.498
460 <-> 788 pages
Back cover
E-mail archiving
type, storage model,
and archiving
policies
E-mail record
declaration,
classification, and
disposition
End-to-end solution
installation and
integration
SG24-6795-00
ISBN 0738494127
INTERNATIONAL
TECHNICAL
SUPPORT
ORGANIZATION
BUILDING TECHNICAL
INFORMATION BASED ON
PRACTICAL EXPERIENCE
IBM Redbooks are developed by
the IBM International Technical
Support Organization. Experts
from IBM, Customers and
Partners from around the world
create timely technical
information based on realistic
scenarios. Specific
recommendations are provided
to help you implement IT
solutions more effectively in
your environment.