KofaxTotalAgilityAdministratorsGuide EN
KofaxTotalAgilityAdministratorsGuide EN
Administrator's Guide
Version: 7.7.0
Date: 2019-09-19
© 2019 Kofax. All rights reserved.
Kofax is a trademark of Kofax, Inc., registered in the U.S. and/or other countries. All other trademarks
are the property of their respective owners. No part of this publication may be reproduced, stored, or
transmitted in any form without the prior written permission of Kofax.
Table of Contents
Preface...........................................................................................................................................................7
Related documentation.......................................................................................................................7
Training............................................................................................................................................... 8
Getting help with Kofax products....................................................................................................... 8
Chapter 1: About Transformation Server processes.............................................................................. 9
High-priority incoming activities..........................................................................................................9
Password-encrypted pdf files............................................................................................................. 9
Multiple instances of Transformation Servers.................................................................................... 9
Transformation Server pools................................................................................................. 10
Partially completed activities............................................................................................................ 11
Stopping the Transformation Server service....................................................................................12
Chapter 2: Kofax Reporting for the Capture Client...............................................................................14
Activities recorded............................................................................................................................ 14
Keystrokes........................................................................................................................................ 15
Chapter 3: Kofax Message Connector....................................................................................................16
Deployment scenarios...................................................................................................................... 16
Standalone scenario.............................................................................................................. 17
Load-Balancing scenario....................................................................................................... 17
Failover scenario....................................................................................................................18
High performance scenario................................................................................................... 18
Advanced configuration of Message Connector features................................................................ 18
Set Windows permissions for Message Connector......................................................................... 19
Folder permissions.................................................................................................................19
Features and integration examples..................................................................................................20
Connect to Biscom server..................................................................................................... 20
Connect to Right Fax server................................................................................................. 21
Connect to Kofax Communication server..............................................................................22
Import PST files..................................................................................................................... 23
PDF normalization................................................................................................................. 23
Configure document normalization........................................................................................24
Configure Kofax Converter.................................................................................................... 27
Import MSG and EML files from folder................................................................................. 31
Import XFA files..................................................................................................................... 32
Archive documents................................................................................................................ 33
3
Kofax TotalAgility Administrator's Guide
4
Kofax TotalAgility Administrator's Guide
Paged search.........................................................................................................................61
Referral chasing.....................................................................................................................62
Types of referral chasing.......................................................................................................62
Syntax of filter........................................................................................................................62
Active Directory attributes......................................................................................................63
Implement Active Directory synchronization.................................................................................... 63
Synchronize active items.......................................................................................................63
Synchronize deleted items.................................................................................................... 64
Synchronize root level........................................................................................................... 64
Synchronize middle level.......................................................................................................64
Perform group search............................................................................................................64
Synchronize cross domains...................................................................................................64
Synchronize category within category...................................................................................65
Synchronize groups within groups........................................................................................ 65
Implement chase referral.......................................................................................................65
Appendix B: Lock activity performance................................................................................................. 66
Appendix C: CoreWorkerActivityOrder setting......................................................................................67
Lock activities................................................................................................................................... 67
Appendix D: Cross Origin Resource Sharing setting........................................................................... 69
Appendix E: Logging................................................................................................................................ 70
TotalAgility Web and Application Server.......................................................................................... 70
TotalAgility Transformation Server....................................................................................................72
Data Layer........................................................................................................................................ 75
Capture Client...................................................................................................................................76
TotalAgility Reporting Server............................................................................................................ 77
Client-side reporting...............................................................................................................78
Web Capture logging........................................................................................................................79
Network logging................................................................................................................................ 79
License Server logging.....................................................................................................................79
Appendix F: Performance counter usage.............................................................................................. 80
Installation......................................................................................................................................... 80
Data collection.................................................................................................................................. 80
Interpretation..................................................................................................................................... 80
Locked automatic activities....................................................................................................81
Worker tasks taken................................................................................................................81
Active threads / Thread pools............................................................................................... 82
Items / Thread pool queue....................................................................................................82
Uninstall............................................................................................................................................ 82
5
Kofax TotalAgility Administrator's Guide
Logging............................................................................................................................................. 82
6
Preface
Use the information in this guide if you are the administrator who will configure and maintain the
TotalAgility installation.
Related documentation
The full documentation set for Kofax TotalAgility is available at the following location
https://docshield.kofax.com/Portal/Products/KTA/7.7.0-o3xtk9orwd/KTA.htm
In addition to this guide, the documentation set includes the following items:
• Kofax TotalAgility Prerequisites Guide: Provides system requirements for installing TotalAgility,
instructions for running the prerequisite utility, and a software checklist for various installation types.
• Kofax TotalAgility Installation Guide: Describes how to install and configure TotalAgility.
• Kofax TotalAgility Integration Server Installation Guide: Describes how to install Kofax Integration
Server and integrate it with other products.
• Kofax TotalAgility On-Premise Multi-Tenancy Installation Guide: Describes how to install and configure
On- Premise Multi-Tenant system.
• Kofax TotalAgility Configuration Utility Guide: Explains how to use the Configuration Utility to update
settings across various configuration files for different types of installation and deployment.
• Kofax TotalAgility Architecture Guide: Provides an overview of the TotalAgility architecture, covering
various deployments for on-premise, on-premise multi-tenancy and Azure environments.
• Kofax TotalAgility Best Practices Guide: Describes the best practices you must follow when using
TotalAgility to improve performance, cost, maintenance, availability and security.
• Kofax TotalAgility Features Guide: Provides an overview of the TotalAgility features.
• Kofax TotalAgility Migration Guide: Provides information on TotalAgility upgrades from different versions
and post upgrade configuration.
• Kofax TotalAgility Help: Provides details about using TotalAgility to design business jobs and cases,
assign resources, create forms, integrate with external applications, and more. Access the help from
the TotalAgility application by clicking the Help button.
• Kofax TotalAgility Workspace Help: Describes how to use the Workspace to manage activities, jobs,
and resources. Access the help from the TotalAgility Workspace by clicking the Help button.
• Kofax TotalAgility On-Premise Multi-Tenant System Help: Describes how to create and manage tenants
using the TotalAgility On-Premise Multi-Tenant system.
• Kofax TotalAgility Web Capture Control Help : Provides details on using a Web Capture control in
creating multi-page documents, creating a new document in a new folder, deleting pages that have
been incorrectly scanned, and more; also, describes the buttons available in a Web Capture control
toolbar.
7
Kofax TotalAgility Administrator's Guide
• Kofax Analytics for TotalAgility Product Features Guide: Provides an overview of the dashboards that
help you track data through the workflow, analyze the effectiveness of the processes and resources,
and address business problems.
• Kofax TotalAgility Tables: Describes the Kofax TotalAgility tables and fields used by Kofax Analytics for
TotalAgility.
• Migration From Kofax Products Guide: Provides information about migrating TotalAgility files and Kofax
Transformation Modules projects to TotalAgility.
Training
Kofax offers both classroom and computer-based training that will help you make the most of your Kofax
TotalAgility solution. Visit the Kofax website at www.kofax.com for complete details about the available
training options and schedules.
To access the Kofax Knowledge Base, go to the Kofax website and select Support on the home page.
Note The Kofax Knowledge Base is optimized for use with Google Chrome, Mozilla Firefox or Microsoft
Edge.
8
Chapter 1
TotalAgility uses the Transformation Server to process automatic activities (including Composite,
Extraction, Classification, PDF Generation, and Image Processing). Multiple Transformation Servers
can work within a single Kofax TotalAgility installation. It is server software that does processing of
concrete tasks it supports (for example, Classification). It is designed as a separate component to remove
CPU intensive processing from application and web servers on separate machines thus allowing these
components to be more responsive.
Transformation Server connects with Kofax TotalAgility using direct database access with the SQL Server
ADO.NET driver.
Transformation Server uses all available slots to process the pushed calls, you can add the reserved slots
to increase responsiveness on push calls. Reserved slots only guarantees that processing can be started
immediately. However, if all slots are busy (include reserved ones) the call still will wait.
9
Kofax TotalAgility Administrator's Guide
For example, in a medical claims processing solution, claims arrive in the following ways:
• Mail room: Large numbers of claims arrive through the mail room and are manually fed into high-speed
scanners with 200 to 500 pages in each group. The system is continuously loaded.
• Internet Portal: Individual claims and small groups of claims arrive through the internet portal.
• Mobile Devices: Individual claims arrive through mobile devices.
The system must acknowledge receipt of claims that arrive from portal and mobile devices. Submissions
through these devices are random and peaks are difficult to predict.
The large number of claims that arrive through the mail room can take longer to process than the
individual claims and smaller groups that arrive through the internet and mobile devices. If the
Transformation Server processes claims based on arrival time, an individual claim might be scheduled
behind a large group of claims from the mail room. The processing time for the individual claim might be
excessive.
Adding Transformation Server pools can prevent this problem. When designing TotalAgility workflow,
create separate processes for urgent jobs from the internet portal and mobile devices, and long-running
jobs from the mail room. Specify a Transformation Server pool for each Transformation Server supported
activity, such as PDF Generation and Composite.
Example:
10
Kofax TotalAgility Administrator's Guide
• Pool A: Processes urgent jobs from the internet portal or mobile devices.
• Pool B: Processes long-running jobs from the mail room.
• Default Pool: Processes activities regardless of the assigned pool.
• Transformation Server instances 1 and 2 are assigned to process activities from Pool A.
• Transformation Server instances 3 to 5 are assigned to process activities from Pool B.
• Transformation Server instances 6 and 7 are not assigned to a pool, so they execute all activities
regardless of the assigned pool.
Note For an activity using the Partial Completion property, the folder structure validation logic is not
executed by Transformation Server. For more information on the Partial Completion property, see the
TotalAgility help.
11
Kofax TotalAgility Administrator's Guide
However, when the service receives the command to stop, the service is only allowed a limited time to
end. The following steps occur when using the normal method of stopping the Transformation Server
Service:
1. The service stops accepting or taking new work from the TotalAgility Core Worker.
2. The service continues to process unfinished activities for a limited time, which is usually less than
two minutes.
3. Any activities that do not complete with this limited time are interrupted and suspended.
4. The service stops.
If you need more than a couple of minutes for activities to finish processing, you can send the following
custom command to the service to stop it gracefully:
When the service receives this custom command, the service may continue to run until it is idle. The
following steps occur when you use the custom command to stop the Transformation Server Service:
1. The service stops accepting or taking on new work from the TotalAgility Core Worker.
2. The service continues to process unfinished activities for an indefinite time.
3. When all activities are complete, the service stops.
Note As hung background processes are not detected, the service may never end in this case.
However, 24-hour timeouts are likely to end any hung processes.
If using the custom control command, we recommend to stop the service if it is still running after two
hours. It is likely that a child background service is hung so using the normal stop command will end the
process.
The command line syntax for all aspects relating to the Transformation Server service are as follows.
Syntax Description
sc start KofaxTransformationServerService The regular start command for the service.
sc stop Kofax TransformationServerService The regular stop command for the service.
sc control KofaxTransformationServerSerive The custom stop command that allows all current work to
186 complete before the service stops.
12
Kofax TotalAgility Administrator's Guide
Syntax Description
sc pause KofaxTransformationServerService The command to pause the service.
sc continue The command to start the service again after is has been
KofaxTransformationserverService paused so that the normal activity can resume.
13
Chapter 2
Kofax Reporting provides information about Kofax TotalAgility usage, including scanning, review,
validation, verification, import, and export. This feature enables you to track the efficiency of the system
and users.
The server records Capture Client activities and sends the information to the reporting library whenever an
activity occurs that requires reporting.
Activities recorded
All document and page editing activities are recorded, including those performed by custom .NET
activities. Recorded activities include:
• Document actions:
• Create
• Delete
• Override/restore document problem
• Reject/unreject document
• Page actions:
• Annotate/Remove annotation
• Delete
• Rotate
Validation and Document Review modules maintain document separation statistics for the following
activities:
• Correct splits
• Wrong splits
14
Kofax TotalAgility Administrator's Guide
• Missing splits
These statistics are reported to the server when the activity is completed.
Keystrokes
Keystrokes are counted for documents and fields. A Complete activity causes the following to happen:
• Documents with positive key counts are included in the event data passed to the server.
• The keystroke counter is reset to zero.
The following rules determine how the system records keystrokes and whether the rules apply to
documents or fields:
15
Chapter 3
Kofax Message Connector is a Windows service responsible for importing messages and files in many
electronic formats. It retrieves documents from various sources and saves them in its internal storage
making them available for retrieval through a web service interface. Kofax TotalAgility connects to the
Message Connector web service interface and retrieves the documents for import.
This chapter provides important information about configuring and operating Kofax Message Connector,
including:
• Instructions for configuring Kofax Message Connector.
• Instructions for integrating with third party environment, such as fax servers or email servers.
• Instructions for operating and monitoring Kofax Message Connector.
Note
• Kofax Message Connector is also used with slightly different functionality in other Kofax products.
• For using the Message Connector utility in Docker, start the utility remotely from the Message
Connector Monitor.
• You cannot use MS Office, Open Office, Total HTML Converter, Total EML Converter for converting
office documents in a Docker environment.
Deployment scenarios
The two main components, Kofax Message Connector and Core Worker service can be installed on the
same computer or on different computers. One Core Worker service can connect to multiple Message
Connectors. However, a single Message Connector must not be polled by multiple Core Worker services.
This section describes some of the most typical scenarios.
16
Kofax TotalAgility Administrator's Guide
Note To restrict the HTTP access of Message Connector for security reasons, we recommend that you
set the Local IP Address field in the HTTP settings using one of the following.
• Specify the local IP address (127.0.0.1) to limit the access to a local machine in case of a standalone
deployment.
• Specify the local IP address of any network adapter to limit the access to a specific network.
In TotalAgility, when configuring the import connection settings for emails, make sure that you specify
the same IP address in the Message Connector URL field on the Import Connections page.
Standalone scenario
In this scenario, Message Connector and Core Worker service are installed on the same computer. This
configuration does not offer any load balancing or failover mechanisms. You can easily run this on virtual
environment for tests and demonstrations.
Load-Balancing scenario
In this scenario, a single instance of Core Worker service connects to two (or more) Message Connector
instances. Each instance runs on a separate computer. This configuration is recommended if you need
to process many messages quickly. As document conversion can be time consuming having multiple
Message Connectors, you distribute the conversion load to several computers.
You can also install multiple instances of Message Connector on a single computer. This does not speed
up document processing but helps you to prioritize documents. For example, a customer needs two
electronic imports, SMTP email and fax. Customer expects large volume of email traffic and fewer high-
priority faxes. By assigning fax import to a dedicated instance of Message Connector, customer can
ensure that faxes are not stuck in the queue behind emails.
17
Kofax TotalAgility Administrator's Guide
Failover scenario
In this scenario, two or more computers with Kofax Message Connector are grouped in a Windows
failover cluster. Documents are routed to the active node. When that fails, the next node continues without
longer service interruption.
For optimal performance, install both Message Connector and Core Worker service on the same
computer. Modify the value of the Prefetched Messages parameter in the Message Connector
configuration to get additional performance. In our high-performance environment, the value 40 has
yielded the best results.
For specific use cases some advanced configuration parameters are available in a separate Message
Connector configuration User Interface.
To open the Message Connector Configuration utility, from the Windows Start menu, select All Programs
> Kofax > Message Connector > Message Connector Configuration. The Message Connector
Configuration screen appears.
18
Kofax TotalAgility Administrator's Guide
Note
• The user who performs the installation must be a member of the local Administrator's group.
• An interactive user (logged-on user), or a user defined in the Message Connector's Document
Conversion configuration only can perform the Microsoft Office document conversion.
Folder permissions
The following table lists the necessary folder permissions to run Message Connector.
Folder Permission
ProgramData\Kofax\KIC-ED\MC Full Control
Installation folder Read
19
Kofax TotalAgility Administrator's Guide
20
Kofax TotalAgility Administrator's Guide
21
Kofax TotalAgility Administrator's Guide
Note For an external fax server, when you send an email with an attachment using KCS as a fax server
type, TotalAgility only imports attachment of the email and cannot create a document for the email body.
See TotalAgility help.
1. On the Kofax Communication Server, start the TCfW Communication Server Client.
2. Create (or reserve) a user/extension for use with Kofax Message Connector.
3. Optionally, if you want to import faxes received by multiple KCS users, set up fax forwarding for each
of the user and forward the faxes to the created user.
4. Close the client.
22
Kofax TotalAgility Administrator's Guide
Note
• You cannot import the MSG files where attachments have been removed by any Microsoft
Outlook archive tool.
• You can import multiple PST files simultaneously. However, when you run multiple KFXConverter
instances in parallel, some information about the second and later instances might be missing
from the log file. To ensure that your logs are complete, you can specify different log files for
each instance using the command line switch: -logfile <logfilename>
PDF normalization
When you select to normalize your message content to PDF, Kofax Message Connector normalizes all
non-PDF parts of the message to an ISO-standardized version of PDF, the PDF/A. However, Message
Connector can also normalize PDF parts to PDF/A.
Note
• If Microsoft Office is selected as normalization tool in MS Office and selected Open Office
documents, normalization of excel documents result in PDF documents rather than PDF/A
documents.
• Any embedded macros in Microsoft Office documents are ignored during document normalization.
23
Kofax TotalAgility Administrator's Guide
Note This step is required if you are using Kofax Converter for the normalization. If you are using a
different converter, such as Microsoft Office, this setting does not modify the converted PDF type.
24
Kofax TotalAgility Administrator's Guide
zip) until all compressed files are extracted. Zip file containing multiple files with same name is also
extracted. The following restrictions apply:
• Password-protected compressed files are not extracted.
• Archives split to multiple volumes are not supported.
• EML documents from compressed files are not subject to further extraction/document
normalization.
• If the extraction ends without error, the compressed file is discarded. When archiving to folder is
enabled, the extracted files are archived, not the compressed ones.
4. Select the tool for converting Microsoft Office documents.
5. Select the tool for converting HTML documents.
6. If you selected OpenOffice.org in step 3, make sure that you have installed the necessary
extension. See section Third-Party software.
7. If you selected Microsoft Office in either step 3 or step 4, and you are using the operating system
Windows Server 2008 R2, Windows Vista, or later, you need to select the Windows user account to
be used for Microsoft Office DCOM automation. For initial tests and troubleshooting, you may use the
interactive user. For production use, you must specify an administrator user.
8. Click Advanced. In the Security Options tab, verify that document conversion is not disabled.
9. Click Save. Click Exit and restart service.
Note Customers are responsible for providing appropriate licenses for third-party software.
Note This component must be installed on the same computer as Message Connector.
1. Install a supported version of OpenOffice.org. Refer to Third-Party software for supported versions.
2. Shut down all OpenOffice.org processes (including Quickstarter).
3. From the installation media, browse to the TotalAgility\KIC\Export\MC
\OpenOfficeExtension folder and start setup.exe.
4. Click Browse. Windows explorer displays the content of the installation folder.
5. Go to the folder MC\OpenOfficeExtension and start Install.bat.
25
Kofax TotalAgility Administrator's Guide
You can manage installed OpenOffice.org extensions by selecting Tools > Extension Manager from any
OpenOffice.org application menu. The extension list should include "Kofax Conversion for OpenOffice
1.0.". A properly installed extension has the symbol indicating that this extension is installed for all
users.
Note Customers are responsible for providing appropriate licenses for third-party software.
Third-Party software
The following information applies to third-party software:
• Customers are responsible for providing appropriate licenses for third-party software.
• Install third-party software to their default installation path.
• Install the following third party application versions as required:
• For normalizing Microsoft Office files, you can use the internal conversion tool (KFXConverter) or
install one of the following:
• OpenOffice.org (certified version 3.2)
• Microsoft Office 2010
• Microsoft Office 2013
• Microsoft Office 2016
• Microsoft Office 365
• For normalizing HTML files, you can use the internal conversion tool (KFXConverter) or install one of
the following:
• Microsoft Office 2010
• Microsoft Office 2013
• Microsoft Office 2016
• Microsoft Office 365
• Total HTML ConverterX
• For normalizing Open Office files (ODT, ODS and ODP formats), you can use the internal conversion
tool, KFXConverter. For normalizing other Open Office document formats, use OpenOffice.org.
26
Kofax TotalAgility Administrator's Guide
Note
• Do not install OpenOffice.org and Microsoft Office 2013 on a same computer as document
normalization using Microsoft Office 2013 may fail.
• Use Internet Explorer to access Message Connector user interface and document conversion
configuration utilities.
• Third-party software such as Microsoft Office requires appropriate license. These licenses are not
included in the Message Connector license.
Message Connector installs the KFXConverter_Default.ini file to the same folder. If the KFXConverter.ini
does not exist when Message Connector starts, a copy of KFXConverter_Default.ini is created. An
existing KFXConverter.ini is not modified by the setup.
Note Fix the line breaks if you copy and paste the code from this guide.
27
Kofax TotalAgility Administrator's Guide
FitTableWidthToPage True Resize the table width in an output PDF file when
converting EML files (including body with message
header).
If set to true, KFXConverter sets the table width
based on the page size in output PDF files.
ResizeLargeImages 2 Resize the images that are larger in size.
The following options are available:
0 - Image is not resized.
1 - The image size is compared with the section size
of the document. If the image size is larger than the
section size, image is resized to fit the section.
2 - Free space is calculated based on whether an
image is inline or floating. The image resize ratio to fit
the page size is calculated as per the longer side of
the image, and then the image is resized.
PDF2PDF ALCWebServiceTimeout 1200 sec Adobe Experience Manager web service timeout in
seconds.
TEXT2PDF FontType Arial Specifies the font type for the generated PDF. The
Unicode MS font must be installed on the computer on which
KFXConverter is used.
EXCEL2PDF FitAllColumnsToOnePage True If set to True, all the columns are set to one page.
PaperOrientation -1 Defines the paper orientation.
Default is -1, for Landscape 0, for Portrait 1
PaperSize Default Disables the papersize setting.
28
Kofax TotalAgility Administrator's Guide
29
Kofax TotalAgility Administrator's Guide
30
Kofax TotalAgility Administrator's Guide
Examples:
• If AllowedErrors = 4, visual differences in the
output file do not cause a document conversion
error.
• If AllowedErrors = 132, that is, combination of
error code 4 and error code128, conversion is
done even if there are visual differences in the
output file, or non-convertible XMP metadata is
removed.
31
Kofax TotalAgility Administrator's Guide
selection and conversion options, such as converting to TIFF, adding a message header, importing only
body or attachments, apply to the MSG or EML file.
Note If you are not importing MSG and EML files from a folder directly, but are using a controlling XML
file which links these email documents, only the email body is converted and imported. The attachments
are discarded, unless you select to include original content.
Note If support for Adobe LiveCycle is available, you can also use Adobe LiveCycle for conversion of
XFA Forms.
Following are the prerequisites for using Adobe Experience Manager Server:
• You must install and configure the Adobe Experience Manager Server to make it accessible to
TotalAgility. The Output service must be running, and its web service must be enabled and working
properly.
• Adobe Experience Manager software must be installed on a different computer than TotalAgility.
However, to decrease the probability of timeouts and retries, we recommend that you install the
software in the same network LAN segment.
• The minimum supported version of Adobe Experience Manager Server is 6.3.
• You must acquire the Adobe Experience Manager product through an appropriate Adobe Sales
Channel. Kofax does not ship, install, support or troubleshoot the Adobe Experience Manager Server.
The customer using this feature is responsible for any licensing requirements and maintenance contract
and/or agreements required by Adobe, and any of third party vendor that may be involved.
Note
• Any limitations imposed by Adobe are applicable. For example, only XFA PDFs with no rights,
signature, or certification can be converted to PDF or PDF/A. Refer Adobe Experience Manager
documentation for more information.
• When an exception occurs while using Adobe Experience Manager, TotalAgility reports the exception
in its log file, and the error is treated as a standard document conversion error.
Note
• Enabling this setting may have impact on the performance as each PDF document is sent to
document converter to determine whether it is XFA form or standard PDF.
• For more information on the import source settings, see the TotalAgility help.
32
Kofax TotalAgility Administrator's Guide
Archive documents
TotalAgility can archive processed documents. To archive documents, specify a path to a folder under
Document Archiving when configuring import sources in the Integration module of the TotalAgility
Designer. When you import a document, based on the import result, TotalAgility creates and stores the
document in one of the following folders:
For each message, TotalAgility creates a subfolder under any of the above folders. For example, for
a rejected message, a sub folder is created under the REJECT folder. Name format of the subfolder
is YYYYMMDDhhmmss_<Message ID>. Where, Message ID is the unique ID assigned by Message
Connector to a message on arrival.
Each individual subfolder stores the document in the following file formats:
• File: Contains the message body and all attachments in original file format as separate files.
• EML: Contains message body and the attachments as a single EML file.
• XML: Archives the message metadata as a single XML file.
See Request a certificate for Message Connector using Microsoft Active Directory Certificate Services for
example.
33
Kofax TotalAgility Administrator's Guide
4. In the Integration module of TotalAgility Designer, enable the Flatten XFA forms to PDF/A
Documents Using Adobe Experience Manager setting when configuring the import source
settings.
5. Click Test connection to verify the connection.
34
Kofax TotalAgility Administrator's Guide
• OpenSSL
• To export a decrypted private key.
• To create a PKCS#12 file.
1. Use Microsoft Certification Services to request a certificate.
a. Use a web browser to connect to the CA Server (https://CAName/certsrv).
b. Select Request a certificate.
c. Select Advanced certificate request.
d. Select Create and submit a request to this CA.
e. Fill out the necessary information in the form, and select the correct Certificate Template.
f. Select Mark keys as exportable. Enter the Message Connector server name in the Name box.
g. Click Submit. Wait until the certificate is issued.
h. Click Install this certificate. Wait until the certificate is installed.
2. Use Internet Explorer to export the certificate.
a. Go to Tools > Internet Options > Content > Certificates.
b. On the Personal tab, select the certificate and click Export.
c. Select to export the private key. Select PKCS #12 as the format.
d. Type a password to protect the key.
e. Specify the location and file name, and click Finish.
3. Use OpenSSL to extract the private key and the certificate to .pem format. For example:
openssl.exe pkcs12 -in "c:\certif.pfx" -out
"c:\certif.pem" -nodes
Provide the password used in Step4.
4. Open the pem file in a text editor. The certificate and private key for configuring Message Connector
are available in this file. See Configure SSL connection.
Note Filters are only applicable for requests from SMTP connections; requests from other connection
types such as, HTTP are not filtered.
Message Connector Configuration provides an option to define list of filters in the Source IP Filter field of
Email Inbound via SMTP tab. Using these filters, SMTP connections to Message Connector are either
allowed or denied. By default, no filter is defined and connections are allowed from all IP addresses.
Each line in the Source IP Filter field defines a filter and starts with an Allow or Deny keyword, followed
by the CIDR (Classless Inter-Domain Routing) notation of an IP range. These filters are compared with
the source IP address of a request. If a source IP address falls in a category of a filter starting with Allow,
the SMTP connection for that IP address is accepted.
35
Kofax TotalAgility Administrator's Guide
For example, Allow 10.20.30.0/24 allows request from IP addresses from 10.20.30.0 to 10.20.30.255.
The first matching filter defines whether the request should be allowed or denied. If filters are defined, but
no filter matches the incoming source IP address request, the request is denied.
36
Kofax TotalAgility Administrator's Guide
Note Each conversion tool produces the desired output in a different way. As a result, switching to
another conversion tool may change the look of your converted documents.
37
Kofax TotalAgility Administrator's Guide
• Delegate access: Use this option when one user need to act on behalf of another user and access one
or few other users' accounts. For example, one user can access the shared mailboxes of three other
users.
• Exchange impersonation: Use this option when a single user needs to access multiple users'
accounts.
The following table lists the differences between Exchange impersonation and delegate access.
Exchange impersonation Delegate access
Administered by Administrator User
Used by Exchange Web Services Any mailbox client
Configuration Per impersonator Per shared mailbox
Rights Broad Granular
Registry settings to enable TLS v1.1 and TLS v1.2 support for EWS
For EWS to send TLS v1.1 and TLS v1.2 confirming requests and messages to Microsoft Exchange
server, modify or add specific registry keys for both client (Message Connector) and Exchange Server.
38
Kofax TotalAgility Administrator's Guide
Prerequisites:
• Install the required .NET Framework 3.5.1 updates to enable TLS v1.1 and TLS v1.2.
• For both client and server, upgrade .NET Framework for the applicable Operating System in use.
Note If a specific .NET Framework update is already installed or if an update is not required (in case a
higher version of .NET Framework is already installed which support TLS v1.1 and TLS v1.2), following
error is displayed: The update is not applicable to your computer.
To enable TLS v1.2 on a computer where Message Connector is installed, add or modify the following
registry sub keys.
Operating Registry Path Sub key Type Description
System
Type
64-bit HKEY_LOCAL_MACHINE\SOFTWARE SystemDefaultTlsVersions dword Set this sub key
\Microsoft\.NETFramework\v2.0.50727 value to 1
64-bit HKEY_LOCAL_MACHINE\SOFTWARE SystemDefaultTlsVersions dword Set this sub key
\Wow6432Node\Microsoft\.NETFramework value to 1
\v2.0.50727
32-bit HKEY_LOCAL_MACHINE\SOFTWARE SystemDefaultTlsVersions dword Set this sub key
\Microsoft\.NETFramework\v2.0.50727 value to 1
32-bit/64- HKEY_LOCAL_MACHINE\SYSTEM DisabledByDefault dword Set this sub key
bit \CurrentControlSet\Control\SecurityProviders value to 0.
\Schannel\Protocols\TLS 1.2\Client
39
Kofax TotalAgility Administrator's Guide
To enable TLS v1.2 on a computer where Microsoft Exchange Server is running, add or modify the
following registry sub keys.
Operating Registry Path Sub key Type Description
System
Type
32-bit/64- HKEY_LOCAL_MACHINE\SYSTEM DisabledByDefault dword Set this sub key value
bit \CurrentControlSet\Control\SecurityProviders to 0.
\Schannel\Protocols\TLS 1.2\Client
32-bit/64- HKEY_LOCAL_MACHINE\SYSTEM Enabled dword Set this sub key value
bit \CurrentControlSet\Control\SecurityProviders to 1.
\Schannel\Protocols\TLS 1.2\Client
32-bit/64- HKEY_LOCAL_MACHINE\SYSTEM DisabledByDefault dword Set this sub key value
bit \CurrentControlSet\Control\SecurityProviders to 0.
\Schannel\Protocols\TLS 1.2\Server
32-bit/64- HKEY_LOCAL_MACHINE\SYSTEM Enabled dword Set this sub key value
bit \CurrentControlSet\Control\SecurityProviders to 1.
\Schannel\Protocols\TLS 1.2\Server
40
Kofax TotalAgility Administrator's Guide
Note
• Enable both server and client (Message Connector) sub keys at Exchange Server and then restart
the computer.
• To support this feature on Exchange Server 2013, install the latest updates available for Exchange
Server 2013. Additionally, install the CU16 update. We recommend to install latest updates for all
exchange servers in use.
C:\ProgramData\Kofax\KIC-ED
In Message Connector, for PDF/A normalization using Standard option in PDF to PDF/A conversion
engine, conversion results are logged in StandardPDFAEngine.log.
41
Kofax TotalAgility Administrator's Guide
The storage is managed automatically. Files and messages that are correctly imported to Kofax
TotalAgility are marked for deletion and they are removed when the storage is full. Files and messages
that are not correctly imported to Kofax TotalAgility may fill the storage. See Manage failed messages
manually.
42
Kofax TotalAgility Administrator's Guide
if the Keep Failed setting is selected in configuration. When the archive to folder function is activated,
documents remain in this folder until the archiving has been concluded.
Note Documents remain in this folder until they are handled manually by an operator (reactivated or
deleted). If not monitored, this can cause full storage and stop processing of documents.
• Under Inbound Status, click Processed to list documents delivered to Kofax TotalAgility. If Keep Failed
is cleared, this folder also contains documents that permanently failed to import to Kofax TotalAgility.
Processed documents are deleted automatically from the storage when space for active messages is
needed.
• Under Inbound Status, click Processed > Failed to list documents that permanently failed to import
to Kofax TotalAgility (ensure that the Keep Failed setting is clear). These documents are deleted
automatically from the storage when space for active documents is needed.
• Under Outbound Status, click Active to list test fax messages which are queued for sending or are
currently being sent.
• Under Outbound Status, click Processed to list test fax messages which are queued for sending or
are currently being sent.
• Under Outbound Status, click Processed > Failed to list test fax messages that could not be sent.
Reactivate messages
In particular, it is important to monitor the Inbound > Active > Failures folder, as messages in this
folder can potentially fill in the entire storage. These messages can be reactivated and Kofax Message
Connector will retry to import them to Kofax TotalAgility.
1. On the Windows Start menu, click Kofax > Message Connector > Message Connector Monitor.
43
Kofax TotalAgility Administrator's Guide
Rerun messages
The "Inbound Status > Processed > Failures" folder contains messages that are already marked for
deletion. When the storage gets full, these messages are lost. However, as long as they are available, you
can rerun them and create a copy of the message-as if it had just arrived-in the "Inbound Status > Active"
folder.
1. On the Windows Start menu, click Kofax > Message Connector > Message Connector Monitor.
2. On the Menu, under Inbound Status, click Processed > Failures.
3. Click View / Save to view the contents of a message.
You cannot delete these messages; they are already deleted. However, you can try to rerun the
message. A copy of this message is created in the "Inbound Status > Active" folder.
44
Chapter 4
Normally, the document conversion takes the default document conversion settings in TotalAgility.
However, in scenarios such as, the KFXConverter is not an acceptable alternative to MS Office for
converting MS Office documents, you may need to modify these settings.
The Kofax Document Converter utility provides an interface to modify the default configuration settings for
document conversion. See Document Converter help.
This utility is installed when you install Transformation Server. Make sure that you configure these settings
on each Transformation Server instance separately.
Note
• You cannot modify the default parameters in Document Converter utility in an Azure environment. You
can only use KFXConverter for document conversion.
• The document conversion advanced configuration using Document Converter utility has to be
performed on each Transformation Server separately.
• You cannot modify the default parameters in Document Converter utility as the Document Converter
Configuration utility is not accessible in a Docker environment.
Make sure that you provide appropriate licenses for the following third party applications that may be
required for Document Converter:
• Adobe Experience Manager Server
• Total HTML ConverterX
• OpenOffice.org
• Microsoft Office
When you select to normalize your message content to PDF, Kofax Document Converter actually
normalize all non-PDF parts of the message to an ISO-standardized version of PDF, the PDF/A. However,
Document Converter can also normalize PDF parts to PDF/A.
45
Kofax TotalAgility Administrator's Guide
Note
• If "Microsoft Office" is selected as normalization tool in "MS Office and selected Open Office
documents", normalization of Excel documents result in PDF documents rather than PDF/A
documents.
• Do not open MS Office applications or process MS Office documents on a computer where the
document conversion with MS Office is running.
1. To run the utility, on the Windows Start menu, click Kofax>Document Converter>Document
Converter Configuration.
2. Expand the Document Conversion tab.
3. Select the tool for converting Microsoft Office documents.
• If using OpenOffice.org, make sure that you have installed the necessary extension. See Third-
Party software.
• If using Microsoft Office, and if the operating system is Windows Server 2008 R2, Windows Vista,
or later, select the Windows user account to use for Microsoft Office DCOM automation. For initial
tests and troubleshooting, use the interactive user. For production use, specify an administrator
user.
Important When you use MS Office as a conversion tool, you can only convert one document
on one computer at a time. This may prevent the Transformation Servers to utilize the full
potential of the computers on which the Transformation Servers run. Therefore, we recommend
that you create separate Transformation Server Pools for document conversion using MS Office.
All other conversion activities can be processed on different Transformation Servers. For more
information, see Transformation Server Pools.
46
Kofax TotalAgility Administrator's Guide
4. Configure the type of PDF produced when normalizing existing PDF documents.
a. Find the string IF %ConvertToType%== "PDFAn" (.
b. Edit the line immediately below set ConvertToType="PDFA1BN". The following values are
supported:
• PDF (disables PDF normalization)
• PDFA1AN
• PDFA1BN (default)
• PDFA2BN
5. Save and close the file.
In case of using OpenOffice.org, you must install the OpenOffice.org extension on the same computer as
Document Converter.
You can manage installed OpenOffice.org extensions by selecting Tools > Extension Manager from any
OpenOffice.org application menu. The extension list should include "Kofax Conversion for OpenOffice
1.0.". An installed extension displays the symbol indicating that this extension is installed for all users.
47
Kofax TotalAgility Administrator's Guide
Install Total HTML ConverterX on the same computer as Document Converter. Use the default installation
path.
Note For initial testing, you can use the trial version of Total HTML ConverterX.
Document Converter installs the KFXConverter_Default.ini file to the same folder. If the KFXConverter.ini
does not exist when Document Converter starts, a copy of KFXConverter_Default.ini is created. On
upgrade, an existing KFXConverter.ini is not modified by the setup.
Note
• You cannot modify the default parameters in KFXConverter.ini file in an Azure environment.
• Fix the line breaks if you copy and paste the code from this guide.
48
Kofax TotalAgility Administrator's Guide
PDF2PDF ALCWebServiceTimeout 1200 sec Adobe Experience Manager web service timeout in
seconds.
TEXT2PDF FontType Arial Specifies the font type for the generated PDF. The
Unicode MS font must be installed on the computer on which
KFXConverter is used.
EXCEL2PDF FitAllColumnsToOnePage True If set to True, all the columns are set to one page.
PaperOrientation -1 Defines the paper orientation.
Default is -1, for Landscape 0, for Portrait 1
PaperSize Default Disables the papersize setting.
49
Kofax TotalAgility Administrator's Guide
50
Kofax TotalAgility Administrator's Guide
51
Kofax TotalAgility Administrator's Guide
Examples:
• If AllowedErrors = 4, visual differences in the
output file do not cause a document conversion
error.
• If AllowedErrors = 132, that is, combination of
error code 4 and error code128, conversion is
done even if there are visual differences in the
output file, or non-convertible XMP metadata is
removed.
52
Kofax TotalAgility Administrator's Guide
Note If support for Adobe LiveCycle is available, you can also use Adobe LiveCycle for conversion of
XFA Forms.
Note
• Any limitations imposed by Adobe are applicable. For example, only XFA PDFs with no rights,
signature, or certification can be converted to PDF or PDF/A. See Adobe Experience Manager
documentation for more information.
• When an exception occurs while using Adobe Experience Manager, TotalAgility reports the exception
in its log file, and the error is treated as a standard document conversion error.
Note
• Enabling this setting may have impact on the performance as each PDF document is sent to Kofax
converter to determine whether it is XFA form or standard PDF.
• For more information on the document conversion profiles, see the TotalAgility help.
53
Kofax TotalAgility Administrator's Guide
2. If the value of MaxPrintSize parameter is set to a non zero value, re-sampling is skipped for files
with size more than MaxPrintSize. This parameter is available in the image2tif.bat script file. The
default location of the file is:
C:\Program Files (x86)\Kofax\KIC-ED\MC\Scripts. By default, MaxPrintSize is set to
0.
3. If the x and y resolutions are different, the image is re-sampled to the requested resolution (non-
quadratic pixel case).
4. If the resolution value is wrong, it is set to a requested value without re-sampling the image. This
changes the printing size of the image. To avoid quality loss, such images are not re-sampled. A
resolution is wrong if one of the following conditions is true:
• The resolution is below the MindxResolution value which is set to 96 dpi. If the
MindxResolution is not set, ImageMagick returns 72 dpi.
• The resolution exceeds 200 dpi and the width is less than 1500 pixel (19.5cm@200dpi).
• The resolution exceeds 200 dpi and the height is less than 2000 pixel (25.4cm@200dpi).
5. If the resolution is higher than the requested resolution, the image is down-sampled to the requested
resolution.
6. If none of the above listed rules applies, the image conversion depends on the configuration in
the script file image2tif.bat. Open the file with a text editor and change the value in the line Set
ResetResolution=0. The following values are available:
• 0: Resample image and change resolution. This is the default option. Image file size is increased
without improving the image quality. Re-sampling is a time-consuming operation that results in
lower performance.
• 1: Change the resolution without re-sampling. This reduces the print size of the image.
• 2: Image is not changed. Set this value for best performance.
54
Kofax TotalAgility Administrator's Guide
55
Kofax TotalAgility Administrator's Guide
8
XML documents Yes
XML Paper Yes
9
Specification (xps)
Note Each conversion tool produces the desired output in a different way. As a result, switching to
another conversion tool may change the look of your converted documents.
56
Chapter 5
The following table lists the default full control access permissions for different areas of TotalAgility.
Process Designers
Business Rule Designers
Resource Designers
Settings Administrators
Work Type Designers
Lock Status Search Designers
Job Clear Down Administrators
Capture Designers
Persona Designers
Designer Designers
Devices Device Users
Capture Design Designers
57
Chapter 6
To log on to TotalAgility in a recovery mode, you should have full control or read write permissions.
Alternatively, you can log on to TotalAgility in a recovery mode by using the recovery mode session ID.
Note The configuration utility is available on the installation media and must be manually copied to
your Kofax TotalAgility server.
58
Appendix A
A domain name must be unique. For example, you cannot have two kofax.com domains, but you could
have a kofax.com parent domain with irvine.kofax.com and bedford.kofax.com child domains.
Each domain has its own security policies and trust relationships with other domains.
Domains can span more than one physical location, which means a domain could consist of multiple sites
and those sites could have multiple subnets.
A domain directory database consists of objects defining accounts for users, groups, and computers as
well as shared resources, such as printers and folders.
An Active Directory service provides both logical and physical structures for network components.
Network setup
A typical network setup consists of the following structures:
• Physical: These include:
• Subnets: A network group with a specific IP address range and network mask.
• Sites: One or more subnets used to configure directory access and replication.
59
Kofax TotalAgility Administrator's Guide
Child domain
Parent domains can be divided into sub-domains which are also called child domains. For example,
the host name for a computer in Irvine office could be abc.irvine.kofax.com where abc is the computer
name, Irvine is the child domain and kofax.com is the parent domain. These domains in turn can have
subdomains.
The directory is structured like a tree of domains that collect Naming Contexts containing Active Directory
data; each domain can include one or more DCs (replica DCs). From a system engineer's point of view,
a tree is a collection of domains in one-way /two-way transitive or non-transitive trust, consequently the
attention is focused on authentication and extension of the domain's physical boundaries.
However this topology also has a specific meaning with respect to LDAP: identification of a directory
object is related to its position inside the tree and this dictates how to create a correct LDAP string for
accessing and managing directory objects. If we can have multiple domain trees in an organization's
directory, there must be some overall grouping. This grouping is called forest.
While two domain trees in the same forest do not share a DNS namespace, they must share the same
schema and global catalogue. When you join domain trees, a trust relationship establishes between the
root domains of each tree in a similar way when you join individual domains into domain trees.
60
Kofax TotalAgility Administrator's Guide
You can retrieve AD’s information through some access points (services), called providers. These
providers use different interaction protocols or correspond to different LDAP protocol:
• LDAP: Compatible with Lightweight Directory Access Protocol
• GC: Compatible with LDAP, connection request is specified with a Global Catalog server
• WinNT: Compatible with Windows NT/2000/XP/.NET systems
• NDS: Compatible with Novell NetWare Directory Service
• NWCOMPAT: Compatible with Novell NetWare 3.x implementations
Kofax TotalAgility uses the LDAP protocol that represents the protocol for .NET/2000 domains. LDAP
allows creating, deleting and moving of an object, listing of a container’s content, and so on.
The LDAP protocol lets you retrieve information related to objects contained in an AD using a specific
syntax. This syntax allows searching for directory objects and selecting them on the basis of their
attributes.
LDAP query
A well-formed LDAP query is an application message made up of a set of parameters that lead to the
following search criteria:
• Search base (or base object): It defines the basic location, that is, the forest node or leaf, where the
search must start; the location is defined by using an LDAP distinguished name. Search base is used to
indicate the directory section where the search should take place.
• Scope: It specifies how deep the search should go. There are three kinds of scopes:
• Base: Restricts the search to the search base; if, for instance, the search base is a container object,
its attributes will be listed, but not its contents.
• One level: Takes the search just beyond the base object, excluding the base object itself.
• Subtree: Extends the search over the whole subdirectory (including the base object). A Filter is used
to single out the required elements in the specified tree section.
• Selection (or attribute description list): It determines which attributes of the selected objects are
important.
Paged search
Paging specifies how many rows at a time the server returns to the client. A page can be defined by
the number of rows or a time limit. The ADSI COM object retrieves each page of results based on the
following settings:
• ADS_SEARCHPREF_PAGESIZE: Specifies the number of rows to return in a page.
• ADS_SEARCHPREF_PAGED_TIME_LIMIT: Specifies the maximum time (in seconds) that the server
should spend collecting a page of results before returning the page to the client. If the limit is reached,
the server stops searching and returns the rows retrieved for the page up to that point.
A search operation may return a big chunk of objects. This could downgrade the performance of the client
and server as well as the network load. The Paged search can be used to prevent this. In a paged search,
the client may select to accept results in smaller chunks. The size of a chunk is known as the search page
size.
61
Kofax TotalAgility Administrator's Guide
Referral chasing
A referral is the mechanism that a directory server uses to direct a client to another server when it does
not contain sufficient information about the object(s) requested by a query.
In a one-level or subtree, referrals are returned for known, immediately subordinate domain, schema or
configuration containers only (that is, child domains that are direct descendants).
In a directory, not all information is available on a single server; it is distributed over several different
servers across the network. If the servers share the information that other servers provide, they can
provide referrals to a client when a requested query cannot be resolved on the originating server. For
example, when a client asks Server A to query a user object (U), then A can suggest that the client
continue the search on Server B if U does not reside on A, but is known to be on B. The client has the
choice to use the referral or not.
Search referrals free the client from possessing previous knowledge of the capability of each server. But
the client must specify the type of referrals a server should make.
Syntax of filter
([<operator>](<filter>)[(<filter>)...])
Where,
<filter> = (<attribute><operator><value>)
62
Kofax TotalAgility Administrator's Guide
63
Kofax TotalAgility Administrator's Guide
6. To enumerate child and additional domain resources the "DC" string is modified based on resource's
path where same server name is used for search.
7. To enumerate cross forest resources, account and domain information is retrieved from SID and
LDAP query is rebuilt to point to new server.
Note The resources from Test parent will not be imported as target OU is Test OU.
• The resources from User container will not be imported as they are not part of any OU; the only
exception is when group search is specified.
64
Kofax TotalAgility Administrator's Guide
• Child Domain Sync: Regardless of Chase referral flag resources will always be imported.
• Sub domain Sync: Chase referral should be true to import resources.
• External Forest Sync: Chase referral should be true to import resources
Note Only parent OUs will be synchronized not the resources inside those OUs.
• Group Members from different OUs that are not direct\indirect children of target OU will be imported
only if chase referral is true.
• If members are imported then their parent OUs till root level will be imported same as point 1.
65
Appendix B
If you decide to lock activities based on job expected finish time, you can improve the performance of
TotalAgility by creating a new index on the LIVE_ACTIVITY table.
This file gets installed with the other TotalAgility SQL scripts during the TotalAgility installation but the
index SQL is not executed during installation. You must run it manually if you want to apply the index.
You can lock activities based on job expected finish time by changing the value of the appSetting
"CoreWorkerActivityOrder" in the Core Worker service or Transformation Server config files.
ActivityPriority = 0
ActivityDueDate = 1
ActivityPriorityDueDate = 2
ActivityDueDatePriority = 3
JobPriority = 4
JobDueDate = 5
JobPriorityDueDate = 6
JobDueDatePriority = 7
66
Appendix C
CoreWorkerActivityOrder setting
By default, the CoreWorker service retrieves processed automatic activities in the order of activity due
date and priority. However, you can change the order of the activities by running the configuration utility.
Note The configuration utility is available on the installation media and must be manually copied to your
Kofax TotalAgility server.
Lock activities
By default, the CoreWorker service locks activities for processing in the order of activity due date and
priority.
However, you can change the default order by updating the CoreWorkerActivityOrder app key in the
CoreWorker’s config file.
If an order of job priority and then job’s expected finish time is selected, add the following index in the
TotalAgility main database.
CREATE NONCLUSTERED INDEX [IDX_JOB_PRIORITY] ON [DBO].[JOB]
(
[PRIORITY] ASC,
[EXPECTED_FINISH_TIME] ASC
67
Kofax TotalAgility Administrator's Guide
)
INCLUDE ( [JOB_ID])
Note The same .config file settings applies to the Transformation Server service also.
68
Appendix D
Cross Origin Resource Sharing (CORS) in Kofax TotalAgility allows other domains to access the Kofax
TotalAgility SDK APIs.
The CorsAllowedOrigins setting determines the origin or domains that can access the web server.
You can enable CORS by running the configuration utility post installation.
Note The configuration utility is available on the installation media and must be manually copied to your
Kofax TotalAgility server.
69
Appendix E
Logging
Logging is used to record critical errors, such as database failures. All errors are written into the Windows
Event log. This includes errors which occur in the services, and errors that occur when an SDK web
service call is invoked.
TotalAgility uses the Unity logging framework which enables enhanced logging, through various
configuration settings. The settings for logging are present but commented out in the configuration files.
You can enable these settings to write logging to the configured files. The Unity logging framework allows
configuration of logging output from a list of supported destinations.
You can enable Unity logging for the following server and services:
• Web Server
• Core Worker, Export Service, Streaming Service
• Transformation Server
• Reporting Server
You can configure logging to use different outputs, such as event log and log file. (Default: event log)
70
Kofax TotalAgility Administrator's Guide
<formatters>
<add
type="Microsoft.Practices.EnterpriseLibrary.Logging.Formatters.TextFormatter,
Microsoft.Practices.EnterpriseLibrary.Logging,
Version=5.0.505.0, Culture=neutral,
PublicKeyToken=31bf3856ad364e35" template="Timestamp:
{timestamp}{newline}
Message:
{message}{newline}
Category:
{category}{newline}
Priority:
{priority}{newline}
EventId:
{eventid}{newline}
Severity:
{severity}{newline}
Title:{title}{newline}
Machine:
{localMachine}{newline}
App Domain:
{localAppDomain}{newline}
ProcessId:
{localProcessId}{newline}
Process Name:
{localProcessName}{newline}
Thread Name:
{threadName}{newline}
Win32
ThreadId:{win32ThreadId}{newline}
Extended Properties:
{dictionary({key} - {value}{newline})}"
name="Text Formatter" />
</formatters>
<categorySources>
<add switchValue="All" name="General">
<listeners>
<add name="Event Log Listener" />
</listeners>
</add>
</categorySources>
<specialSources>
<allEvents switchValue="All" name="All Events" />
<notProcessed switchValue="All" name="Unprocessed Category" />
<errors switchValue="All" name="Logging Errors & Warnings">
<listeners>
<add name="Event Log Listener" />
</listeners>
</errors>
</specialSources>
</loggingConfiguration>
<exceptionHandling>
<exceptionPolicies>
<add name="Agility Exception Policy">
<exceptionTypes>
<add name="All Exceptions" type="System.Exception, mscorlib,
Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089"
postHandlingAction="NotifyRethrow">
<exceptionHandlers>
<add name="Logging Exception Handler"
type="Microsoft.Practices.EnterpriseLibrary.ExceptionHandling.Logging.LoggingExceptionHandler,
Microsoft.Practices.EnterpriseLibrary.ExceptionHandling.Logging,
Version=5.0.505.0, Culture=neutral, PublicKeyToken=31bf3856ad364e35"
logCategory="General" eventId="100" severity="Error" title="Total Agility"
formatterType="Microsoft.Practices.EnterpriseLibrary.ExceptionHandling.TextExceptionFormatter,
Microsoft.Practices.EnterpriseLibrary.ExceptionHandling,
Version=5.0.505.0, Culture=neutral, PublicKeyToken=31bf3856ad364e35"
priority="0" />
</exceptionHandlers>
</add>
</exceptionTypes>
</add>
</exceptionPolicies>
</exceptionHandling>
71
Kofax TotalAgility Administrator's Guide
This section describes the configuration to trace out calls to TotalAgility. To output tracing, you must
update the relevant CONFIG file. If tracing web server calls, edit Web.config.
• To output tracing Logger.Log() or Logger.LogMessage() calls in TotalAgility to a text file, update the
relevant CONFIG file with the following:
....
<trace autoflush="true">
<listeners>
<add name="Log" type="System.Diagnostics.TextWriterTraceListener" initializeData="c:\temp
\Trace.txt">
</add>
</listeners>
</trace>
....
For more information, see Logging.
• To output tracing about all calls being made through Unity dependency injection to a text file, update the
CONFIG file with the following changes in addition to the above changes:
....
<unity xmlns="http://schemas.microsoft.com/practices/2010/unity">
<container>
<extension type="Agility.Server.Common.Logging.LogMethodRegistration,
Agility.Server.Common, Version=1.0.0.0, Culture=neutral, PublicKeyToken=d86c87abe4a71948" />
By default, the Transformation Server configuration file is located in the temporary folder. To save the log
file in another location, such as C:\logs\TS_Log, do the following:
1. Stop the Kofax Transformation Server service.
2. Open "Kofax.CEBPM.CPUServer.ServiceHost.exe.config" in text editor.
3. Search for "CPUServerLogTxt" and modify the section after initializeData to the path you wish to
save the log file. Example:
<add name="CPUServerLogTxt"
type="Kofax.CEBPM.CPUServer.Common.Diagnostics.DateTimeTaggedTraceListener,
Kofax.CEBPM.CPUServer.Common" initializeData="C:\logs\TS_Log\KofaxCPUServerLog.log" >
<filter type="System.Diagnostics.EventTypeFilter" initializeData="All"/> </add>
4. Restart the Kofax Transformation Server service and verify that the updated log file is written to the
new directory.
You can configure logging to use different outputs, such as event log and log file. In the application
configuration file, you can also specify the logging options.
Example: Log errors into the application event log
This example defines a simple logging configuration where all errors log into the application event log so
they can be viewed using the Event Viewer utility.
It includes:
72
Kofax TotalAgility Administrator's Guide
TraceLevelSwitch: This trace switch with a value "Verbose" traces verbose, information, warning and
error messages. This switch is used for all Transformation Server modules. See the switchName
attribute of the <source> tag.
initializeData="Error": This attribute specifies the tracing level in the trace listener.
<system.diagnostics>
<trace autoflush="true" />
<switches>
<!--
Off - None
Error - Only error messages.
Warning - Warning messages and error message.
Information - Informational messages, warning messages and error messages.
Verbose - Verbose messages, informational messages, warning messages and error
messages.
All - All messages.
-->
<add name="TraceLevelSwitch" value="Verbose"/>
</switches>
<sources>
<source name="Kofax.CEBPM.CPUServer.ServiceHost" switchName="TraceLevelSwitch" >
<listeners>
<clear />
<add name="EventLogListener" />
</listeners>
</source>
<source name="Kofax.CEBPM.CPUServer.Core" switchName="TraceLevelSwitch" >
<listeners>
<clear />
<add name="EventLogListener" />
</listeners>
</source>
<source name="Kofax.CEBPM.CPUServer.Common" switchName="TraceLevelSwitch" >
<listeners>
<clear />
<add name="EventLogListener" />
</listeners>
</source>
<source name="Kofax.CEBPM.DataLayer" switchName="TraceLevelSwitch" >
<listeners>
<clear/>
<add name="xml" type="System.Diagnostics.XmlWriterTraceListener"
initializeData="Kofax.CEBPM.DataLayer.log"/>
</listeners>
</source>
</sources>
<sharedListeners>
<add name="EventLogListener" type="System.Diagnostics.EventLogTraceListener"
initializeData="Application" >
<filter type="System.Diagnostics.EventTypeFilter" initializeData="Error"/>
</add>
</sharedListeners>
</system.diagnostics>
Example: Logs in different formats
This example defines the logging configuration to log all messages to the text files and errors to the event
log.
73
Kofax TotalAgility Administrator's Guide
To have logs in different formats you must specify the Trace Listener in the <sharedListeners> section and
reference it under all necessary sources in the <source> tag.
<system.diagnostics>
<trace autoflush="true" />
<switches>
<!--
Off - None
Error - Only error messages.
Warning - Warning messages and error message.
Information - Informational messages, warning messages and error messages.
Verbose - Verbose messages, informational messages, warning messages and error
messages.
All - All messages.
-->
<add name="TraceLevelSwitch" value="Verbose"/>
</switches>
<sources>
<source name="Kofax.CEBPM.CPUServer.ServiceHost" switchName="TraceLevelSwitch" >
<listeners>
<clear />
<add name="CPUServerLogTxt" />
<add name="EventLogListener" />
</listeners>
</source>
<source name="Kofax.CEBPM.CPUServer.Core" switchName="TraceLevelSwitch" >
<listeners>
<clear />
<add name="CPUServerLogTxt" />
<add name="EventLogListener" />
</listeners>
</source>
<source name="Kofax.CEBPM.CPUServer.Common" switchName="TraceLevelSwitch" >
<listeners>
<clear />
<add name="CPUServerLogTxt" />
<add name="EventLogListener" />
</listeners>
</source>
<source name="Kofax.CEBPM.DataLayer" switchName="TraceLevelSwitch" >
<listeners>
<clear/>
<add name="xml" type="System.Diagnostics.XmlWriterTraceListener"
initializeData="Kofax.CEBPM.DataLayer.log"/>
</listeners>
</source>
</sources>
<sharedListeners>
<add name="CPUServerLogTxt"
type="System.Diagnostics.TextWriterTraceListener " initializeData="KofaxCPUServerLog.log" >
<filter type="System.Diagnostics.EventTypeFilter" initializeData="All"/>
</add>
<add name="EventLogListener"
type="System.Diagnostics.EventLogTraceListener" initializeData="Application" >
<filter type="System.Diagnostics.EventTypeFilter" initializeData="Error"/>
</add>
</sharedListeners>
</system.diagnostics>
Transformation Server has its own internal trace listener, DateTimeTaggedTraceListener which
allows to have a text log with timestamps in different formats.
74
Kofax TotalAgility Administrator's Guide
Optionally, you can specify different trace switches and assign them to different trace sources. For
example, you can log all messages from Kofax.CEBPM.CPUServer.Core and log only errors from
Kofax.CEBPM.CPUServer.Common.
For more information on tracing and tracing options, refer to Microsoft documentation available at the
Microsoft website.
Example: Text log with timestamps in different formats
where:
<file name> is the log file name;
<format> is the desired date time format;
Data Layer
This section provides information on configuring error logging for the Data Layer.
The Data Layer uses the standard .NET logging. The logging configuration is
stored in TotalAgility Web.config, Agility.Server.Core.WorkerService.exe.config and
Kofax.CEBPM.CPUServer.ServiceHost.exe.config.
You can configure logging to use different outputs, such as event log and log file.
75
Kofax TotalAgility Administrator's Guide
<trace autoflush="true"/>
<sources>
<!-- Main Data Layer trace source - contains majority of important log statements
-->
<source name="Kofax.CEBPM.DataLayer" switchValue="Warning">
<listeners>
<clear/>
<add name="DataLayerAll"/>
</listeners>
</source>
<!-- Supplementary NHibernate logging, use with care - it contains a LOT of
information -->
<source name="Kofax.CEBPM.DataLayer.NHibernate" switchValue="Warning">
<listeners>
<clear/>
<add name="DataLayerAll"/>
</listeners>
</source>
</sources>
<sharedListeners>
<add name="DataLayerAll" initializeData="Kofax.CEBPM.DataLayer.log"
type="System.Diagnostics.XmlWriterTraceListener"/>
</sharedListeners>
</system.diagnostics>
</configuration>
Capture Client
This section provides information on configuring error logging for Capture Client.
Capture Client uses the standard .NET logging. The logging configuration is stored in TotalAgility
Web.config.
You can configure logging to use different outputs, such as event log and log file.
Example: Logging configuration
<system.diagnostics>
<trace autoflush="true">
<listeners>
<add name="CaptureClientServer"
traceOutputOptions="DateTime,ThreadId"
type="System.Diagnostics.TextWriterTraceListener"
initializeData="c:\CaptureClientServerLog.txt">
<filter type="System.Diagnostics.EventTypeFilter"
initializeData="Warning" />
</add>
</listeners>
</trace>
</system.diagnostics>
Where,
• traceOutputOptions: Defines the additional data to each log statement (DateTime, ThreadId).
• type: Defines the type of logging, such as text file.
• initializeData: Defines the path to the log file.
• (Filter) initializeData: Defines the trace level (Off, Critical, Error, Warning, Information, Verbose or All).
76
Kofax TotalAgility Administrator's Guide
The logging mechanism is similar to Transformation Server or Data Layer that uses the Microsoft .NET
diagnostics. The source name for the Reporting messages is "Reporting".
77
Kofax TotalAgility Administrator's Guide
You can change the logging detalization by changing the "TraceLevelSwitch" value to any of the following
values: Off, Critical, Error, Warning, Information, Verbose, All
You can change the location of the log file by modifying the value of the "initializeData" attribute of the
"ReportingLogTxt" shared listener. The default path for the log files is "ReportingLogTxt".
Client-side reporting
You can enable logging in the Reporting client-side library that is used in the TotalAgility components to
report data into Reporting Server.
To enable the Reporting client-side logging for these components, you must extend the existing
System.Diagnostics section of TotalAgility Web.config, Agility.Server.Core.WorkerService.exe.config
and Kofax.CEBPM.CPUServer.ServiceHost.exe.config with the following switches, sources and shared
listeners.
Example: System.Diagnostics changes for the client-side reporting
<system.diagnostics>
<trace autoflush="true"/>
<switches>
<add name="TraceLevelSwitch" value="Verbose"/>
</switches>
<sources>
<source name="Reporting" switchName="TraceLevelSwitch">
<listeners>
<clear/>
<add name="ReportingLogTxt"/>
</listeners>
</source>
</sources>
<sharedListeners>
<add name="ReportingLogTxt" type="System.Diagnostics.TextWriterTraceListener,
system, version=1.0.3300.0, Culture=neutral, PublicKeyToken=b77a5c561934e089"
initializeData=”Kofax.Reporting.Integration.log" />
</sharedListeners>
</system.diagnostics>
We recommend that you use different log names in different Application configuration files if they are
modified on the same machine.
This will prevent mixing information logged by different instances of client-side library in one file.
78
Kofax TotalAgility Administrator's Guide
Atalasoft.TraceEnabled = true
You can enable the Web Capture Service logging using the following configuration files:
• Kofax.WebCapture.Host.exe.log.config
• Kofax.WebCapture.ScanWorker.exe.log.config
Available log levels are trace, debug, info, warning, error and fatal.
Network logging
The third party utilities, Fiddler and Wireshark, and developer tools built into the various browsers offer
useful features to trace out HTTP requests.
79
Appendix F
The Performance Counters are used to record application states and activities. Many are already included
as part of the Windows operating system, and additional counters may be created programmatically.
Counters are written and placed in an application where specific measurements need to be made, such as
rate of throughput, count of items and others.
Once the counters are installed on a target system, an application can write values to them. These values
can then be read in real-time using the Windows Performance Monitor, a Microsoft Management Console
(MMC) snap-in.
TotalAgility has a number of Performance Counters; the placement of these within the application are
used to measure Key Performance Indicators (KPIs) of a number of critical services which are detailed
below.
Before using the TotalAgility Performance Counters, see the following guides for more information on
TotalAgility internals:
• Kofax TotalAgility Features Guide (See System Options > Settings > Thread Pools.)
• Kofax TotalAgility Architecture Guide
Installation
The Performance Counters are automatically installed on the target machine when the following services
are installed:
• CoreWorker Service
• Export Service
Data collection
The Performance Counter data is collected using the Microsoft Performance Monitor. When the monitor is
launched, the installed counters can be selected and added to the current monitoring session.
Interpretation
Many factors, such as hardware specifications, network topology, virtualization, nature and quantity of
work being processed, and the deployment configuration of TotalAgility influence TotalAgility performance.
80
Kofax TotalAgility Administrator's Guide
Performance counters therefore should be viewed as indicative and used in conjunction with other
approaches, such as logging and monitoring, to determine system health.
The most likely scenario of using the Performance Counters is the TotalAgility deployment that is
operating a heavy load. In this case, counters indicate several things:
• Some counters, such as locked automatic activities, should always be at their maximum value (as set
by configuration). Dips in performance can indicate contention, overloading, network issues, and more.
• Some worker tasks, such as the Archive Jobs Worker, are executed according to a configurable
schedule. The associated counter should reflect this scheduled activity; any other result indicates that
the system is not performing as expected.
• Thread pools and thread pool queue counters can indicate if long-running tasks are blocking execution
and require scaling.
A consistently high reading here may indicate that the thread pool value needs to be increased, although
this requires experimentation to find the best value for any given scenario. Counters are available for the
CoreWorker service.
81
Kofax TotalAgility Administrator's Guide
Uninstall
The Performance Counters are automatically uninstalled on the target machine when the following
services are stopped:
• CoreWorker Service
• Export Service
Logging
In general, Performance Monitor samples the performance counters every one second. While this
provides sufficient information for most purposes, some scenarios may require a deeper level of detail
which can be viewed in the log file. You can log each performance counter in TotalAgility log file by
enabling the logging function as follows:
Enable logging in the Core Worker Service and Export Worker Service configuration files as follows:
1. Open Agility.Server.Core.WorkerService.exe.config and Agility.Server.Core.ExportService.exe.config
located in the CoreWorkerService folder available at your installation location, for example, C:
\Program Files\Kofax\TotalAgility\CoreWorkerService
2. Under the <appSettings> section, change the following value to true:
<add key="PerformanceLoggingEnabled" value="false"/>
3. Uncomment the <system.diagnostics> section in the service configuration files:
<system.diagnostics>
<trace autoflush="true" indentsize="4">
<listeners>
<add name="KTALog" type="System.Diagnostics.TextWriterTraceListener"
initializeData="c:\temp\KTALog.txt">
</add>
</listeners>
82
Kofax TotalAgility Administrator's Guide
</trace>
</system.diagnostics>
Note Disable logging once finished, as continuous use will cause an unnecessary bloat in the log file.
83