USD Implementation E
USD Implementation E
Implementation Guide
r11.2
This documentation (the Documentation) and related computer software program (the Software) (hereinafter collectively referred to as the Product) is for the end users informational purposes only and is subject to change or withdrawal by CA at any time. This Product may not be copied, transferred, reproduced, disclosed, modified or duplicated, in whole or in part, without the prior written consent of CA. This Product is confidential and proprietary information of CA and protected by the copyright laws of the United States and international treaties. Notwithstanding the foregoing, licensed users may print a reasonable number of copies of the Documentation for their own internal use, and may make one copy of the Software as reasonably required for back-up and disaster recovery purposes, provided that all CA copyright notices and legends are affixed to each reproduced copy. Only authorized employees, consultants, or agents of the user who are bound by the provisions of the license for the Software are permitted to have access to such copies. The right to print copies of the Documentation and to make a copy of the Software is limited to the period during which the license for the Product remains in full force and effect. Should the license terminate for any reason, it shall be the users responsibility to certify in writing to CA that all copies and partial copies of the Product have been returned to CA or destroyed. EXCEPT AS OTHERWISE STATED IN THE APPLICABLE LICENSE AGREEMENT, TO THE EXTENT PERMITTED BY APPLICABLE LAW, CA PROVIDES THIS PRODUCT AS IS WITHOUT WARRANTY OF ANY KIND, INCLUDING WITHOUT LIMITATION, ANY IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NONINFRINGEMENT. IN NO EVENT WILL CA BE LIABLE TO THE END USER OR ANY THIRD PARTY FOR ANY LOSS OR DAMAGE, DIRECT OR INDIRECT, FROM THE USE OF THIS PRODUCT, INCLUDING WITHOUT LIMITATION, LOST PROFITS, BUSINESS INTERRUPTION, GOODWILL, OR LOST DATA, EVEN IF CA IS EXPRESSLY ADVISED OF SUCH LOSS OR DAMAGE. The use of this Product and any product referenced in the Documentation is governed by the end users applicable license agreement. The manufacturer of this Product is CA. This Product is provided with Restricted Rights. Use, duplication or disclosure by the United States Government is subject to the restrictions set forth in FAR Sections 12.212, 52.227-14, and 52.227-19(c)(1) - (2) and DFARS Section 252.227-7013(c)(1)(ii), as applicable, or their successors. All trademarks, trade names, service marks, and logos referenced herein belong to their respective companies. Copyright 2006 CA. All rights reserved.
CA Product References
This document references the following CA products: Advantage Allfusion BrightStor CleverPath Portal eTrust Embedded Identity and Access Management (eTrust eIAM) Unicenter Asset Management Unicenter Asset Portfolio Management (APM) Unicenter Management Portal Unicenter Network and Systems Management (NSM) Unicenter Remote Control Unicenter Service Desk Unicenter Knowledge Tools (KT) Unicenter Software Delivery Unicenter TNG for Windows
Contents
Chapter 1: Introduction 11
What You Need to Know....................................................................................................... 12 Unicenter Service Desk Features ........................................................................................... 13
15
Phase 1: Review System Requirements .................................................................................. 15 Phase 2: Install Server ........................................................................................................ 16 Remote Components Installation (Windows) ...................................................................... 17 New Installation ............................................................................................................ 19 Installation Upgrade....................................................................................................... 20 Modify Current Installation .............................................................................................. 20 Install Log .................................................................................................................... 20 Removing Unicenter Service Desk .................................................................................... 21 Phase 3: Before You Run Configuration .................................................................................. 21 Set Up the Oracle Option (Windows)................................................................................. 21 Using eIAM for Authentication ......................................................................................... 23 eIAM Installation Considerations (Windows) ...................................................................... 24 Phase 4: Configure Service Desk ........................................................................................... 26 Phase 5: Configuring the Reporting and Screen Painter............................................................. 28 Phase 6: Integration and Configuration of the Web Interface ..................................................... 28 Phase 7: Start the Client Interfaces ....................................................................................... 29 Phase 8: Configure Security.................................................................................................. 29 Phase 9: Configure Email Options .......................................................................................... 30 Modify Email Notification for Multi-Byte Characters (Windows) ............................................. 30
31
Phase 1: Review System Requirements .................................................................................. 31 Phase 2: Install the Server ................................................................................................... 32 Remote Components Installation (Linux)........................................................................... 33 New Installation ............................................................................................................ 35 Installation Upgrade....................................................................................................... 36 Integration with the Apache Web Server on Redhat Linux .................................................... 37 Install Log .................................................................................................................... 37 Removing Unicenter Service Desk .................................................................................... 38 Phase 3: Before You Run Configuration .................................................................................. 38 Set Up the Oracle Option (UNIX)...................................................................................... 38
Contents v
Using eIAM for Authentication ......................................................................................... 41 eIAM Installation Considerations (Linux) ........................................................................... 42 Phase 4: Configure Service Desk ........................................................................................... 43 Phase 5: Integration and Configuration of the Web Interface ..................................................... 45 Phase 6: Start the Client Interfaces (UNIX)............................................................................. 45 Phase 7: Configure Security.................................................................................................. 46 Phase 8: Configure Email Options .......................................................................................... 46 Linux Post Installation Options .............................................................................................. 46 Check the shmmax Settings ............................................................................................ 46 Put NX_ROOT/bin in PATH Environment Variable ................................................................ 47 Start and Stop Ingres..................................................................................................... 47 Modify the Spell Check Lexicon ........................................................................................ 47 Modify Email Notification for Multi-Byte Characters (Linux) .................................................. 48
49
Web Interface..................................................................................................................... 49 Unicenter NSM Integration Converter ..................................................................................... 49 User Authentication ............................................................................................................. 50 Phase 1: Set Up the Secondary Server.............................................................................. 50 Phase 2: Test Login from a Client..................................................................................... 51 Phase 3: Establish Remote Authentication ......................................................................... 52 Phase 4: Test Remote Authentication ............................................................................... 53 Set Up an Object Manager.................................................................................................... 54
57
Windows Web Server Installation .......................................................................................... 57 Phase 1: Verify Prerequisites ........................................................................................... 57 Phase 2: Install the Web Interface ................................................................................... 58 Phase 3: Enable Web Engine on Secondary Server ............................................................. 59 Phase 4: Configure the Web Interface............................................................................... 60 Phase 5: Start Services .................................................................................................. 60 Phase 6: Access the Web Interface................................................................................... 60 Phase 7: Integrate with Portal ......................................................................................... 60 UNIX Web Server Installation................................................................................................ 61 Phase 1: Verify Prerequisites ........................................................................................... 61 Phase 2: Install the Web Interface (UNIX Web Server) ........................................................ 61 Phase 3: Enable Web Engine on Secondary Server ............................................................. 63 Phase 4: Configure the Web Interface............................................................................... 64 Phase 5: Start Daemons ................................................................................................. 64 Phase 6: Access the Web Interface................................................................................... 64 Phase 7: Integrate with Portal ......................................................................................... 64
vi Implementation Guide
65
Workflow Components ......................................................................................................... 65 Workflow Design Environment............................................................................................... 66 Workflow Server ................................................................................................................. 66 How to Launch Workflow Components.................................................................................... 67 IDE Login Parameters..................................................................................................... 68 CA Workflow Access ............................................................................................................ 68 eIAM and CA Workflow ................................................................................................... 69 Resource Classes........................................................................................................... 69 Add Users to CA Workflow Groups.................................................................................... 70
71
Phase 1: Before You Integrate .............................................................................................. 71 Phase 2: Integrate Unicenter Service Desk and Unicenter NSM .................................................. 72 Phase 3: Post Integration Process.......................................................................................... 74 Step 1: Create Owned Assets .......................................................................................... 74 Step 2: Monitor Event Console Messages .......................................................................... 76 Step 3: Filter Unwanted Events........................................................................................ 77 Step 4: Troubleshoot Error Messages................................................................................ 99 Service Desk Event Converter ..............................................................................................106 Remove Event Converter from the Daemon manager .........................................................106 Remove Event Converter from Windows Service................................................................107 Leverage NSM to Unicenter Service Desk Integration...............................................................107 Example: NSM Message Records/Actions with Limited Content ............................................108 Sample cawto Commands that Generate/Update Requests .................................................112 Sample Files to Use with the Integration ..........................................................................112
119
Service Desk Change Impact Analyzer ..................................................................................119 How the Change Impact Analyzer Works ...............................................................................120 Install the Change Impact Analyzer Integration ......................................................................121 Configure the Daemon ..................................................................................................122 Change Impact Analyzer Integration Considerations ................................................................124 Test the Change Impact Analyzer Integration ...................................................................126 Change Impact Analyzer Integration Setup ............................................................................126 Change Impact Analyzer Classes.....................................................................................127 Define WorldView Repositories........................................................................................129 Map Change Impact Analyzer Classes to Asset Classes .......................................................131
Contents vii
Create Change Impact Analyzer Relationships ........................................................................132 Getting Started Examples ..............................................................................................133 Import Change Impact Analyzer Relationship to Service Desk .............................................134 Planning......................................................................................................................135 Create Assets...............................................................................................................136 Export Assets to WorldView............................................................................................137 Organize Relationships ..................................................................................................140 Examine Change Impact Analyzer Relationship in Service Desk ...........................................141 Automate Change Impact Analyzer Status Updates with Action Macros ......................................143 Use the Macros in Service Types .....................................................................................144 Create a New Event ......................................................................................................150 Use the Macros with Workflow Tasks ...............................................................................152 Logical Repositories in Unicenter NSM r11.1 ...........................................................................167 Configure Unicenter NSM 3.x..........................................................................................168 Configure Unicenter NSM r11.1.......................................................................................169 Serialize Changes to Assets .................................................................................................171 Implementation Notes ........................................................................................................172 Status Changes ............................................................................................................172 Creating Assets from WorldView Managed Objects.............................................................174 Synchronizing WorldView Status to Service Desk Change Impact Analyzer Status ..................177 Recursion Depth ...........................................................................................................178 NSM Timeout Value.......................................................................................................179 Maintaining Change Impact Analyzer Relationships in Service Desk......................................180 Maintaining Change Impact Analyzer Relationships ............................................................181
183
Phase 1: Review System Requirements .................................................................................183 Phase 2: Install the Client ...................................................................................................183 Install on a Local Drive ..................................................................................................184 Install from a Network Drive ..........................................................................................185 Install Silently ..............................................................................................................187 Phase 3: Configure the Client...............................................................................................188 Phase 4: Configure Reports and Screen Painter ......................................................................188 Section 1: Configure Screen Painter or Crystal Reports with Ingres ......................................189 Section 2: Configure Microsoft Access Reports with Ingres..................................................194 Section 3: Configure Screen Painter or Crystal Reports with Microsoft SQL Server ..................200 Section 4: Configure Microsoft Access Reports with Microsoft SQL Server..............................203 Section 5: Configure Screen Painter or Crystal Reports with Oracle Server ............................208 Section 6: Configure Microsoft Access Reports with Oracle Server........................................212 Section 7: Installing Localized Service Desk Tools on Client Systems....................................219 Phase 5: Start the Client Interface........................................................................................220
221
Phase 1: Review System Requirements .................................................................................221 Phase 2: Install the Client ...................................................................................................221 Phase 3: Configure the Client...............................................................................................222 Phase 4: Start the Java Client Interfaces ...............................................................................222
223
Before Migration ................................................................................................................224 Clean-Up the Database..................................................................................................225 Migrating from a Case Sensitive Database ........................................................................227 Run Service Desk Migration .................................................................................................229 Migration Interview.......................................................................................................230 Migration Process .........................................................................................................231 Knowledge Tools Migration ..................................................................................................233 Knowledge Tools Migration from a Remote Machine ...........................................................235 Stand Alone Knowledge Tools Migration ...........................................................................237 Knowledge Tools Migration Concerns ...............................................................................238 Change Impact Analyzer Migration .......................................................................................239 Post Migration Steps...........................................................................................................240 Removing Duplicate Key Values after Migration .................................................................245 Adjusting Access Type and Data Partition Settings after Migration........................................246 Unicenter Service Desk Migration Concerns............................................................................248 Copy Customized htmpl files from Service Desk 6.0 ................................................................250 Update Service Desk r11.2 htmpl Code ............................................................................252 Incompatible htmpl Files................................................................................................253 Install/Remove Migration Views............................................................................................254 Messages During Migration ..................................................................................................254 Errors in Data Extraction Phase ......................................................................................255 Errors in Data Reset Phase.............................................................................................255 Errors in Data Loading...................................................................................................256
259
Verify Service Desk Web Interface Accessibility ......................................................................259 Install and Start the Portal ..................................................................................................259 Include Portlets ............................................................................................................260 Configure Service Desk to Use SSL with Portal .......................................................................261 Setup SSL using a self-signed certificate ..........................................................................262 Connect to Service Desk when Portal Uses SSL.......................................................................264
Contents ix
Appendix C: Using Unicenter Software Delivery to Install and Configure Windows Clients 269
Using the Service Desk Java Client Package ...........................................................................269 Phase 1: Review System Requirements (Windows Client) ...................................................269 Phase 2: Register the Service Desk Java Client Package .....................................................270 Phase 3: (Optionally) Remove Unnecessary Source Components .........................................273 Phase 4: Install the Java Client.......................................................................................274 Phase 5: Configure Reports and Screen Painter .................................................................276 Phase 6: Start the Client Interface ..................................................................................276
277
Load Service Desk Side Data ...............................................................................................277 CA Products Currently Using CAISDI .....................................................................................277 CA Products Planning to Use CAISDI .....................................................................................278
281
Contents of the Samples Directory........................................................................................281 asset ..........................................................................................................................281 call_mgt......................................................................................................................282 data ...........................................................................................................................283 FAXserve (Windows only) ..............................................................................................283 i18n ...........................................................................................................................284 macro_lock..................................................................................................................285 ntf_meth .....................................................................................................................286 pdmconf......................................................................................................................287 sdk.............................................................................................................................287 sql..............................................................................................................................287 views..........................................................................................................................288
289
293 325
x Implementation Guide
Chapter 1: Introduction
Welcome to Unicenter Service Desk, an advanced service support tool that helps organizations like yours address the challenges of managing todays complex service and support requirements. It provides a comprehensive and scalable service management solution that can function as a stand-alone product for your small business or departmental service desk, or integrated into a much larger enterprise business solution. Its technology is designed to reap maximum benefits for your investment and ensure that your service and support solution can grow as your requirements do. Unicenter Service Desk is designed to support both employees dependent on the IT infrastructure and customers seeking support regarding purchased products and/or services. It features numerous out-of-the-box integrations with other CA infrastructure management products and is easily configured to support the ITIL model, leverage CA's collection of years of service support Best Practices, or implement your own processes. This guide provides instructions for installing and configuring the base components of Unicenter Service Desk which support the Unicenter Service Desk application as well as the Unicenter Service Desk Knowledge Tools addon. It contains detailed directions for migrating your existing Unicenter Service Desk 6.0 or Unicenter Knowledge Tools 6.0 system and data. Additionally, it outlines necessary considerations and steps for integrating the Unicenter Service Desk system with companion CA products. This guide is intended primarily for system implementers, integrators, and administrators. Some sections of this guide will be helpful to system users as well.
Introduction 11
12 Implementation Guide
Introduction 13
Note: In the table, Western European language means French (France), Spanish (Spain), German (Germany), Italian (Italy) and Brazilian Portuguese on which Service Desk is certified, in addition to the above mentioned Asian languages.
16 Implementation Guide
4.
Select the Database Type you want to use, enter the other required details accordingly, and then click Next.
18 Implementation Guide
New Installation
To install Unicenter Service Desk for the first time, follow these steps: 1. Log on as administrator to the machine where you will install Unicenter Service Desk, and insert the installation media in the CD/DVD-ROM drive. The installation process should begin automatically. If it does not, double-click the CD/DVD-ROM drive letter in My Computer, then doubleclick setup.exe. 2. Click on the Install Products link and then click on the Install Unicenter Service Desk link. The Unicenter Service Desk Setup welcome screen appears. 3. Click Next. The License Agreement appears 4. Read and accept the license agreement. After you click on the I Agree button, the installation wizard prompts you to specify the Unicenter Service Desk Installation Directory, the shared components directory and whether you wish to perform a typical or a custom installation. To accept the defaults, click Next. Otherwise, enter the information as requested, and then click Next. Note: We recommend that you perform a Typical installation initially to get a feel for the product and make sure that Unicenter Service Desk works in the environment that you currently have. You can modify your installation later by selecting the Custom Installation. 5. If you select Typical the default features are installed: Server, Secondary Server, Client, Ingres Interface, Web Interface and Web Screen Painter. You need to supply the required information when prompted by the installation wizard: a. b. c. Select the Database Size. Enter the username and the password for Privileged User and the Restricted Help Desk User. Review the current settings and click Next to initiate the installation process. Go back if you need to change a previously defined setting. At this point the installation wizard installs all the required files and configures Unicenter Service Desk.
The installation process adds a Unicenter Service Desk menu to the Windows Start, Programs menu. It contains shortcuts to access product documentation and to invoke the components that you selected to install. 6. Once you make sure that Unicenter Service Desk works on the machine, you can modify your installation (see page 20) to add or remove Unicenter Service Desk features (see page 13).
Installation Upgrade
If you are upgrading from Unicenter Service Desk 6.0, follow the procedure for New Installations. The installation process automatically detects which components are already installed. Note: The customizations made to your current installation are automatically backed up during an upgrade installation. Once the upgrade installations is finished the wizard prompts you to run the migration tool (see page 223).
Install Log
The features that you selected to install are noted in a Unicenter Service Desk installation log file. The location of this file is NX_ROOT\log\install.log.
20 Implementation Guide
22 Implementation Guide
24 Implementation Guide
To install eIAM from the DVD: On the installation DVD, locate the directory /winsrvr.nt/EIAM and run eIAMServer.exe. Follow the prompts to complete the installation. The eIAM web interface is accessed through the following URL: https://servername:5250/spin/eiam/eiam.csp Where servername is the name of the machine where eIAM is installed. The eIAM web UI may also be launched from the Start menu on the server that is hosting eIAM.
26 Implementation Guide
5.
Check the Load Default Data option and the appropriate Ingres or SQL settings, and change the other default values as necessary. Note: Load Default Data must be checked for the initial configuration. When re-configuring the primary server to use a different database, the Load Default Data check box will not be automatically checked. If you want to load this data into the new database, you will need to check this box. Use the online Help system accessed from the Help button to obtain configuration information for the database selected. After you have finished entering the database information, click Next. The Web Interface page appears.
6.
Enter appropriate details in the Web Interface options and click Next. Note: The Config Type drop down list allows you to select the web server type. The choices are: Tomcat Server only Tomcat and IIS HTTP Server (default) Tomcat Server (default) and IIS HTTP Server The eIAM page appears.
7.
Set the eTrust Identity and Access Management password. Change the other default values as necessary, and click Next. Check the Use eIAM for authentication check box if you wish use eIAM as your authentication method. Note: eIAM always uses EiamAdmin as the eIAM Administrator Name and eiamadmin1 as the default password. The Config. page appears
8.
Check or uncheck the Start Service When Completed option as appropriate and click Finish. The initial configuration settings have been applied.
If the Install Ingres Server option was checked in step 4, the Unicenter Service Desk Configuration installs Ingres and performs a number of other Database related tasks that will take a while to complete. During the configuration process, the wizard may pop up alerts when a particular task is unsuccessful. If an alert appears that indicates that a task has failed, look in the files in the $NX_ROOT/log directory to try to determine the cause of the failure. After the error condition has been resolved run the configuration again.
If there are no alerts displayed and you have selected the "Start Service Desk Services when Completed" checkbox during configuration, the Unicenter Service Desk services are started on your system. Otherwise, select Services from the Control Panel, and start the Unicenter Service Desk Daemon Server service. Note: The configuration process does not set Unicenter Service Desk to start automatically after an Operating System restart. If you wish to have Service Desk to start automatically, please set the Startup Type on the Service Desk Service to automatic.
28 Implementation Guide
Note: The email protocols that are supported are SMTP for outbound email
and POP3 and IMAP4 inbound email. For more information about modifying the spell check lexicon, see Linux Post Installation Options.
For example: shift_jis for Japanese Windows, gb2312 for Simplified Chinese and so on.
NX_MAIL_SMTP_HEADER_CHARSET = windows-1252 (regardless of the language ) NX_MAIL_SMTP_BODY_CHARSET=iso-8859-1(regardless of the language)
30 Implementation Guide
Note: In the table, Western European language means French (France), Spanish (Spain), German (Germany), Italian (Italy) and Brazilian Portuguese on which Service Desk is certified, in addition to the above mentioned Asian languages.
32 Implementation Guide
5.
Enter the credentials of the Privileged user created previously, and click Next. The Summary page appears.
6.
Review the options (correcting any details, if required), and click Next to continue with the installation of the chosen components. Note: When using Ingres as the DB Type, you will need to specify the remote Ingres II_INSTALLATION identifier in the Database Configuration options when you run Service Desk Server configuration. The eIAM options window appears.
7.
Choose whether you wish to install eIAM on the machine hosting Service Desk. If you install eIAM, enter the eIAM Administrator Password and select the installation folder for eIAM. Click Next. eIAM requires the following libraries to install properly: libssl and libcrypto (part of OpenSSL) liblber.so.2 libldap_r.so.2 The installation wizard checks for these files and notifies you if they are not detected.
Note: The installation log file can be located in the /tmp or the /var/tmp
directory.
34 Implementation Guide
New Installation
To install Unicenter Service Desk for the first time, follow these steps: 1. Create a user known as the Service Desk privileged user. The installation default USERID for the Service Desk Privileged user is srvcdesk. Note: After the installation has completed, the Service Desk privileged user will be able to access the Unicenter Service Desk files, as well as the MDB during the configuration process. 2. 3. Log on as the root user through an xTerm session and invoke the ./install.sh script located on the root of the installation media. The Unicenter Service Desk welcome screen appears. Click Next. 4. Read and accept the license agreement. After you click on the I Agree button, the installation wizard prompts you to specify the Installation Directory and whether you wish to perform a typical or a custom installation. To accept the defaults, click Next. Otherwise, enter the information as requested, and then click Next. Note: We recommend that you perform a Typical installation initially to get a feel for the product and make sure that Unicenter Service Desk works in your current environment. You can modify your installation later by selecting the Custom Installation. 5. If you select Typical, the default features are installed: Server, Secondary Server, Client, Ingres Interface, Web Interface and Web Screen Painter. You need to supply the required information when prompted by the installation wizard: a. b. c. d. e. Enter the username and the password for Privileged User. Enter the Socket Port for Service Desk. Check OK to put links in /usr/bin if you wish to do so. Enter the location for the CA Shared Components directory. Select the target MDB Database size.
Review the current settings and hit Install to initiate the installation process. Hit back if you need to change a previously defined setting. At this point the installation wizard will install all the required files and configures Unicenter Service Desk.
Installation Upgrade
If you are upgrading from Unicenter Service Desk 6.0, follow the procedure for New Installations. When prompted for the location of the Unicenter Service Desk files, specify the location of the Unicenter Service Desk 6.0 directory. The 6.0 installation default location is /opt/CA/UnicenterServicePlusServiceDesk. If the directory you specify exists, the installation script will automatically perform an upgrade for you. The installation process automatically detects which components are already installed as part of this process. Note: The customizations made to your current installation are automatically backed up during an upgrade installation. Once the upgrade installation is finished the wizard prompts you to run the migration tool (see page 223).
36 Implementation Guide
Install Log
The features that you selected to install are noted in a Unicenter Service Desk installation log file. The location of this file is /opt/CA/Installer/log/caunicenter-servicedesk.log.
Note: The ORACLE_HOME, ORACLE_BASE, PATH, LD_LIBRARY_PATH (Solaris only), SHLIB_PATH (HP-UX only), and LIBPATH (AIX only) environment variables must be set as described in your Oracle documentation. This operation can be automated utilizing a cron job. For technical assistance with this product, contact Technical Support at http://ca.com for a complete list of locations and phone numbers. Technical support is available 24 hours a day, 7 days a week.
38 Implementation Guide
2.
40 Implementation Guide
42 Implementation Guide
Note: Load Default Data must be checked for the initial configuration.
When re-configuring the primary server to use a different database, the Load Default Data check box will not be automatically checked. If you want to load this data into the new database, you will need to check this box. The Web Interface option appears.
6.
Enter appropriate details in the Web Interface options, using the online help as necessary, and click Next.
Note: The Config Type drop down list allows you to select the web server
type. The choices are: Tomcat Server Only Tomcat Server and Apache Server (Default Tomcat Server (Default) and Apache Server The eIAM option appears. 7. Set the eTrust Identity and Access Management password, change the other default values as necessary to install eIAM, and click Next. Check the use eIAM for Authentication check box if you wish to use eIAM as your authentication method. eIAM requires the following libraries to install properly: libssl and libcrypto (part of OpenSSL) liblber.so.2 libldap_r.so.2 The installation wizard checks for these files and prompts if they are not detected or unusable.
Note: eIAM always uses EiamAdmin as the eIAM Administrator Name and
eiamadmin1 as the default password. The Config option appears. 8. Check or uncheck the Start Daemons. When Completed, put Service Desk links in /usr/bin and Start Event Converter Daemons options as appropriate and click Finish.
If the Install Ingres Server option was checked in step 4, the Unicenter Service Desk Configuration installs Ingres and performs a number of other Database related tasks that will take a while to complete. During the configuration process the wizard may pop up alerts when a particular configuration task is unsuccessful. If an alert appears that indicates that a task has failed look in the files in the $NX_ROOT/log directory to try to determine the cause of the failure. Once the error condition has been resolved, run the configuration again using the following command:
NX_ROOT/local/pdm_configure script
44 Implementation Guide
If there are no alerts displayed and you have selected Start the Service Desk Daemons when completed during configuration, the Unicenter Service Desk daemons are started on your system.
Note: In order to start the Service Desk daemons, log on as the privileged
user, set $NX_ROOT and the Ingres database environment variables, and run pdm_init. Execute pdm_status to display the status of the daemons. If you have configured secondary servers, you must have all the proctors running before starting the daemons. As the privileged user with $NX_ROOT set, execute pdm_proctor_init on each secondary server to start the proctors.
Note: The email protocols that are supported are SMTP for outbound email
and POP3 and IMAP4 inbound email. For more information about modifying the spell check lexicon, see Linux Post Installation Options.
46 Implementation Guide
For example: euc-jp for Japanese Linux, gb2312 for Simplified Chinese, and so on.
NX_MAIL_SMTP_HEADER_CHARSET = iso-8859-1 (regardless of the language) NX_MAIL_SMTP_BODY_CHARSET=iso-8859-1 (regardless of the language)
48 Implementation Guide
Web Interface
Depending on your web server environment, you may need to perform some integration and configuration steps before you can use the web interface (see page 57). If the machine on which you are installing is equipped as a web server, the web interface is installed automatically as part of a server installation.
User Authentication
User Authentication
When you install and configure a Unicenter Service Desk primary server, authentication for users attempting to access information is based on the operating system login IDs set up for the users on that server. This means that if your primary Unicenter Service Desk server is on a UNIX machine, the system administrator must set up and maintain UNIX user accounts for the Unicenter Service Desk clients. Similarly, if your primary server is on a Windows machine, the system administrator must set up and maintain Windows user accounts for the Unicenter Service Desk clients. This is the default behavior when you install and configure a Unicenter Service Desk primary server; however, you can customize your system so that user authentication occurs on a different machine, which may be running a different operating system than your primary server. For example, you can configure Unicenter Service Desk so that the primary server runs on a UNIX machine and user authentication runs on a Windows machine. This scenario is convenient because the system administrator can use the Windows user administration features, which make setting and maintaining user accounts less time consuming and cumbersome. The information in this section shows how to set up remote authentication for this scenario; however, you can easily apply the procedure to other scenarios (for example, Windows primary server and UNIX user authentication).
3.
50 Implementation Guide
User Authentication
User Authentication
3.
Answer the prompts according to your requirements, and when the main menu displays, enter U to Select the Moving Login (U)ser Validation option. Enter E to edit host, and, when prompted for a new host name, enter the name of the Windows machine on which the Unicenter Service Desk secondary server is installed (see page 50). When the menu reappears, ensure that the name displayed for the User Validation Host is correct, and press Enter to return to the main menu. Enter X to save and exit. This process creates a file named pdm_startup.rmt that stores your new configuration values.
4.
5. 6.
7.
Create a backup of the pdm_startup.tpl file that resides in $NX_ROOT/pdmconf of the primary server installation, then replace it with the newly created pdm_startup.rmt file. Run pdm_halt to shut down the Unicenter Service Desk primary server, and ensure that it shuts down without error. Run the configuration utility (pdm_configure) on the primary server without selecting the Load Default Data option. For information about how to run the configuration utility, see the installation chapter for your operating environment. Your new configuration settings are in effect the next time you start the Unicenter Service Desk primary server. Important! Do not reinitialize your database when you reconfigure. Monitor the standard log file, stdlog.0, to ensure that no errors occur during the pdm_configure process.
8. 9.
52 Implementation Guide
User Authentication
10. Run pdm_init to start the Unicenter Service Desk primary server, and ensure that it starts without error. Monitor the standard log file, stdlog.0, to ensure that no errors occur during the pdm_init process. 11. Run pdm_status on the Unicenter Service Desk primary server to ensure that User Validation is running on the secondary server machine. There may be a noticeable delay between running pdm_status and the status changing to Running.
6.
3. 4.
Answer the prompts according to your requirements, and when you get to the main menu, enter O to select the Edit (O)bject Servers option. Enter A to add, and when prompted for a host name, enter the name of the machine on which the Unicenter Service Desk secondary server is installed. Press Enter when prompted to select the default Group and Display values. When the Object Managers menu appears, it shows the object manager you added. Ensure that the information is correct, and note the value in the Comm. Name column (for example, domsrvr:11).
5. 6.
7.
Press Enter to return to the main menu, and enter X to save and exit. This process creates a file named pdm_startup.rmt that stores your new configuration values.
8.
Create a backup of the pdm_startup.tpl that resides in $NX_ROOT/pdmconf of the primary server installation, then replace it with the newly created pdm_startup.rmt file. Run pdm_halt to shut down the Unicenter Service Desk primary server, and ensure that it shuts down without error.
9.
10. Run the configuration utility (pdm_configure) on the primary server without making any changes. For information about how to run the configuration utility, see the respective installation chapter for your operating environment. Your new configuration settings are into effect the next time you start the Unicenter Service Desk primary server. Important! Do not reinitialize your database when you reconfigure. Monitor the standard log file, stdlog.0, to ensure that no errors occur during the pdm_configure process.
54 Implementation Guide
11. Run pdm_init to start the Unicenter Service Desk primary server, and ensure that it starts without error. Monitor the standard log file, stdlog.0, to ensure that no errors occur during the pdm_init process. 12. Run pdm_status to ensure that the secondary server Object Manager and Method Engine are running. When you run the pdm_status command, it may take a few moments before the status changes to Running. Note: When you add an object manager (whether on the primary server or a secondary server), use a text editor such as WordPad (Windows) or vi (UNIX) to edit $NX_ROOT/NX.env and increase the value of the NX_MAX_DBAGENT variable by 4. For example, if the current value of NX_MAX_DBAGENT is 6 and you add one object manager, you would set the NX_MAX_DBAGENT value to 10.
58 Implementation Guide
2.
3. 4.
Answer the prompts according to your requirements, and when you get to the main menu, enter W to select the Edit Web Engines option. Enter A to add, then enter the IP address or DNS name of the secondary server when prompted for a host name. This value is case-sensitive, so be precise if you enter a DNS name. If you are unsure, check the NX_LOCAL_HOST entry in the NX.env file on the secondary server.
5.
When prompted for an object manager and a configuration file, you can typically accept the default values. However, if you need to change them you can do so. Press Enter to return to the main menu, then enter X to save and exit. This process creates a file named pdm_startup.rmt that stores your new configuration values.
6.
7.
Create a backup of the pdm_startup.tpl that resides in the $NX_ROOT/pdmconf (UNIX) or installation-directory\pdmconf (Windows) directory of the Unicenter Service Desk primary server installation, then replace it with the newly created pdm_startup.rmt file. Run the configuration utility on the Unicenter Service Desk primary server without making any changes. Configure the Unicenter Service Desk secondary server. For information about how to run the configuration utility, see the installation chapter for your operating environment in this guide. Your new configuration settings are in effect the next time you start the Unicenter Service Desk server.
8.
60 Implementation Guide
62 Implementation Guide
2.
3. 4.
Answer the prompts according to your requirements, and when you get to the main menu, enter W to select the Edit Web Engines option. Select A to add, then enter the IP address or DNS name of the secondary server when prompted for a host name. This value is case-sensitive, so be precise if you enter a DNS name. If you are unsure, check the NX_LOCAL_HOST entry in the NX.env file on the secondary server.
5.
When prompted for an object manager and a configuration file, you can typically accept the default values. However, if you need to change them you can do so. Press Enter to return to the main menu, and then enter X to save and exit. This process creates a file named pdm_startup.rmt that stores your new configuration values.
6.
7.
Create a backup of the pdm_startup.tpl that resides in the $NX_ROOT/pdmconf (UNIX) or installation-directory\pdmconf (Windows) directory of the Unicenter Service Desk primary server installation, then replace it with the newly created pdm_startup.rmt file. Run the configuration utility on the Unicenter Service Desk primary server without selecting the Load Default Data option. Configure the Unicenter Service Desk secondary server. For information about how to run the configuration utility, see the installation chapter for your operating environment in this guide. Your new configuration settings are in effect the next time you start the Unicenter Service Desk server.
8.
64 Implementation Guide
Workflow Components
Workflow uses the following components that are delivered with the Workflow Embedding Kit: Workflow Design Environment (see page 66) Workflow server Worklist (accessible via a web browser) Workflow uses third-party software components. For further information on this, see the Readme.
CA Workflow Integration 65
Workflow Server
The Workflow server exposes runtime execution and management services for workflow processes. The Workflow server consists of these components: Actor Adapters allow for expansion of workflow activity functionality The Process Engine executes process definition instances The Process Manager provides management for process definitions as well as process instances All workflow clients, the Process Designer, the Worklist, and both the Java and Web Services API use services provided by the Workflow server.
66 Implementation Guide
CA Workflow Integration 67
CA Workflow Access
As an option, you can invoke the IDE by providing either a user name and password (-u and -p) or by providing a token (-t). The t token refers to an exported SafeSession (also referred to as an artifact) which is a String. This allows for parent products to simply re-use any existing SafeSessions they may have, rather than prompting for a user name and password again. The url is a required parameter that must be supplied regardless of whether you use the u and p userid/password method or the t token method. For example, [-u, -p, -url] or [-t, -url] To use this facility to bypass the IDE logon screen, edit either the ide.bat file (for Microsoft Windows) or ide.sh (for Linux) to add these parameters to the list of parameters passed to the java command. Note: This facility cannot be used with the ide.exe.
CA Workflow Access
Unicenter Service Desk provides improved workflow management using a common Workflow engine. The new workflow system provides a graphical workflow definition environment, sophisticated branching mechanisms, and the ability to interact with individuals who do not have direct access to the Unicenter Service Desk application for gaining approvals. The previous workflow system is still in place to enable backward compatibility. This chapter describes the CA workflow authentication and how to add users to the CA workflow groups.
68 Implementation Guide
CA Workflow Access
Resource Classes
CA Workflow also uses eIAM to restrict access to specific CA Workflow functions. The access is controlled by two Resource Classes: IDE The IDE resource has a single action named login for login access to the IDE. A user must have permission for this action to login to the CA Workflow IDE application. Process The Process resource has the single action named start for the ability to start a process instance. A user must have permission for this action to start processes from within the Worklist web application. All users have access to the CA Workflow Worklist application to view and perform workitem tasks. This permission is only for starting new instances from the Worklist. Note: These resource classes are defined with the Unicenter Service Desk application instance in eIAM; when logging into the eIAM Web user interface, you need to specify the Unicenter Service Desk application instance in order to see the resources, polices and groups discussed here.
CA Workflow Integration 69
CA Workflow Access
70 Implementation Guide
Add asset records to Unicenter Service Desk from Unicenter NSM Note: If you do not already have Unicenter NSM installed, you must do so before you can integrate it with Unicenter Service Desk. This chapter explains how you can control Unicenter NSM integration so that you get only the information you want. You should also review the Readme located on your Unicenter Service Desk Common Services CD for the latest information about installing Unicenter NSM.
3.
Answer the prompts according to your requirements, and when you get to the main menu, enter N to select the Edit UNI Converters (UNIX_ONLY) option. Select A to add, then enter the name or IP address of the Unicenter NSM server machine (configured as the Unicenter Service Desk secondary server) when prompted for a host name. The script prompts you for an IP address. Enter the IP address of the Unicenter Service Desk primary server machine. Press Enter to return to the main menu, and then select X to save and exit. This process creates a file named pdm_startup.rmt that stores your new configuration values.
4.
5. 6.
72 Implementation Guide
7.
Create a backup of the pdm_startup.tpl that resides in the $NX_ROOT/pdmconf directory of the Unicenter Service Desk primary server installation, then replace it with the newly created pdm_startup.rmt file. Run pdm_configure on the Unicenter Service Desk primary server without making any changes. This puts your new configuration settings into effect the next time you start the Unicenter Service Desk server. Important! Do not reinitialize your database when you reconfigure.
8.
9.
As the privileged user, run pdm_proctor_init on the Unicenter NSM server to start the Unicenter Service Desk proctor.
10. As the privileged user, restart the Service Desk services to start the Unicenter Service Desk daemons. Enter pdm_status to display the status of the daemons. Note: Keep the following in mind as you make selections during the integration process: Before the process of receiving an NSM event and creating a Request in Service Desk can work, you must install and configure all components, and ensure that they are active. An event would only become lost if the event converter service has been stopped. The event converter service queues NSM events when the Unicenter Service Desk system is down (meaning it has been paused instead of stopped from the Microsoft Windows Services Panel). When Unicenter Service Desk is restarted, it processes the queued events. The NSM event converter service queues events up to a maximum specified by the NX_TNGCNV_QUEUE_SIZE environment variable. When the Unicenter NSM repository is rebuilt after integration with Unicenter Service Desk, Unicenter Service Desk menu entries are lost. To restore them, you must re-run the integration on the Unicenter NSM Windows machine. To do this, run integAHD.exe located in installation-directory\bin. If the NSM event converter starts during Unicenter NSM events generation, events that occur before the event converter is fully initialized are lost.
74 Implementation Guide
76 Implementation Guide
Blanks in the event may actually be unprintable characters. You should code the filter to include one or more characters with a period and asterisk (.*), instead of the blank space ( ). You should also include .* at the end of the event for any unprintable characters that may be at the end of the event text. To ensure the filter works when you are coding more than one parameter on it, such as combining the node_ID, user_ID, and event_ID, you should code only one to begin with and make sure it works. Then add the next parameter, make sure it works in conjunction with the other parameter, and so on, until finished. For ease in debugging, order your filter rules from the most specific at the beginning of the file, to the most general at the end of the file. Event writer rules follow the same set of debugging practices as filter rules. If you are using the CR_CREATE action and you have included a template, ensure that the template exists.
78 Implementation Guide
80 Implementation Guide
where: Fields in the rule are separated by three colons (:::). You can use an asterisk (*) as a wildcard character, which means the value of the parameter is ignored when determining whether an incoming event matches the filter rule pattern. Note: The first four parameters in the filter rule describe a pattern to compare against incoming events. This pattern is used to determine if the filter specified in the last parameter of the rule should process an incoming event.
82 Implementation Guide
If the event_ ID parameter is simple text (not a regular expression), it must exactly match the generic events event ID. Partial matching does not count. If the event_ID is a regular expression, the length of the regular expression match is used to determine how well the event filter rules event_ID matches the generic events event ID. If an incoming event matches several rules when source types and event IDs are compared, node IDs are compared. filter Specifies which filter to use to process the incoming event and the parameters that the filter uses. The format is:
(filter_id, filter_parameter1, filter_parameter2, )
Valid values for filter_id are: Value=0 Report all events Value=2 Ignore events that occur infrequently Value=3 Ignore outages shorter than the length specified in filter_parameter1 Value=4 Ignore bursts shorter than the length specified in filter_parameter1 Value=5 Pass all events to destination without modification The number of filter parameters varies for each filter_id, as the following table shows:
filter_I D 0
filter_parameter1 0=no, 1=yes Indicates whether events should always be reported as separate problems.
filter_parameter2 None
filter_parameter3 None
Number of occurrences Interval Specifies the number of times an event must occur during an interval to be important. Specifies the elapsed time, in seconds, during which an event must occur to be important.
0=no, 1=yes Indicates whether events should always be reported as separate problems.
filter_I D 3
filter_parameter1 Interval Specifies the elapsed time, in seconds, during which an event must occur to be important.
filter_parameter2 0=no, 1=yes Indicates whether events should always be reported as separate problems. 0=no, 1=yes Indicates whether events should always be reported as separate problems. None
filter_parameter3 None
Interval Specifies the elapsed time, in seconds, during which an event must occur to be important.
None
None
None
Note: The first four parameters in the filter rule describe a pattern to compare against incoming events. This pattern is used to determine if the filter specified in the last parameter of the rule should process an incoming event.
84 Implementation Guide
where: Fields in the rule are separated by three colons (:::). You can use an asterisk (*) as a wildcard character, which means the value of the parameter is ignored when determining matches for the event writer rule.
86 Implementation Guide
minorSrc Automatically displays the minor type of source directing events to the event writer. For events from Unicenter NSM, this parameter contains the event type. Use an asterisk (*) to accept all events. action Specifies the action that occurs when the event writer receives this type of event using one of the following values: CR_CREATE Write a new request for each event. CR_UPDATE Update an existing request or requests (if they exist), or create a new request if no requests are found. By default, records are located by matching on the log_agent and affected_resource attributes. The user can override the defaults by specifying a list of any request attributes. CR_UPDATE_ONLY Like CR_UPDATE, except a new request is never created when no matching requests are found. COMMAND Execute the command specified in the command parameter. Note: If Unicenter Service Desk cannot access a request or change order, it attempts the update again after a fixed interval. template Specifies the name of a request template to use to create a request. This parameter is not required and is ignored if the action is not CR_CREATE. Note: The request template must be created before the rule is defined. command Specifies the command to execute if the action parameter value is COMMAND. Substitution arguments, as the following table shows, can be incorporated into the command. The arguments are replaced by their realtime values when the command is executed: &node The device name or node identifier &user The user name or ID &date The event date
&time The event time &event-id The source event string that triggered the event &data The associated event data &sev A measure of importance for the event &major-src The source application ID &minor-src The agent name or further delineation of the event &handle The daemon-supplied string resulting from rules &src-handle The daemon identifier that assigned the handle &status-handle The status of the handle (valid values are create, update, or terminate) logging Specifies whether logging occurs, using one of the following values: NONE No logging, other than normal error logging, occurs. NONE is the default value. PDM Logging occurs in the Unicenter Service Desk log (stdlog.0) in its internal generic event format. For more information, see Unicenter Service Desk Log (stdlog.0) Syntax in this chapter. SYS Logging occurs in the UNIX syslog, which can be forwarded to the Unicenter Console. The event is assigned a message ID (CAPD ....13) to allow event processing from the Unicenter Console. BOTH Logging occurs in the Unicenter Service Desk log (stdlog.0) and the UNIX syslog.
88 Implementation Guide
event_token A 30-character user-defined tag that identifies a specific request associated with an event_id (tng event message) or all messages like an event_id (for example, a wildcarded event_id). event_token is a request attribute and is stored in every request generated by the Unicenter NSM interface. If no event_token is specified in the writer rule, the string tng_generated is used. This lets the user update all requests that match the event_token attribute. For example, two different messages for the same asset can update unique requests. Each CR_UPDATE writer rule specifies the unique message parts and a unique event_token. The event_token is used to find and update the matching request. By default, an activity log containing the message is added to the matching request. In another example, the user can update the status attribute (for example, set status=CL (closed)) in an existing request by specifying the same event_token in the CR_UPDATE writer rule that was used when the request was created using a CR_CREATE writer rule. For example, the first writer rule below causes the writer process (tngwriter) to create a call request with an event_token equal to SystemCritical whenever it receives a NSM event identified by the string Event1. The second writer rule causes the writer process to update the status value to CL for all call requests with an event_token equal to SystemCritical whenever it receives a NSM event identified by the string Event2.
Event1:::.*:::*:::tng:::*:::CR_CREATE:::::::::NONE:::SystemCritical::: Event2:::.*:::*:::tng:::*:::CR_UPDATE:::::::::NONE:::SystemCritical:::%SEARCH =EVENT_TOKEN;%STATUS=CL
user_parms Contains the following types of information: Request attribute values Request attribute values are specified using the following syntax: %ATTRIBUTE=value, where ATTRIBUTE is an attribute name identified in text_api.cfg that maps to a Unicenter Service Desk Majic call request attribute. This file is located in NX_ROOT/site (UNIX) or installation-directory\site (Windows). For more information about text_api.cfg and how Unicenter Service Desk uses the Text API to create requests from Unicenter NSM, See the chapter Creating Objects using Text API in the Administrator Guide. Note: If you use multiple keyword/value pairs, separate each one with a semicolon (;).
For example, the writer rule below causes the writer process (tngwriter) to create a call request with assignee equal to mccda04 and customer equal to nsm whenever it receives a NSM event identified by the string Event4.
Event4:::.*:::*:::tng:::*:::CR_CREATE:::::::::NONE::::::%ASSIGNEE=mccda04;CUS TOMER=nsm
A list of request attributes to match when updating existing request records The syntax for the list of attributes to match is specified as follows: %SEARCH=attribute1[, attribute2], where SEARCH is a fixed keyword and attribute1, attribute2, and so on are ATTRIBUTE names specified in the text_api.cfg. See the chapter Creating Objects using Text API in the Administrator Guide for more information about text_api.cfg and how Unicenter Service Desk uses the Text API to create requests from Unicenter NSM. The default search list of attributes is "asset_name" (DEVICE or UUID) and LOG_AGENT. The SEARCH keyword adds attributes (to match on) to the default search list. The SEARCH_EXPLICIT keyword completely overrides the default search list. Only the list of attributes following the SEARCH_EXPLICIT keyword are used to search for a call request. For example, the writer rule below causes the writer process (tngwriter) to update the status value to CL for all call requests with assignee equal to mccda04 whenever it receives a NSM event identified by the string Event2.
Event2:::.*:::*:::tng:::*:::CR_UPDATE:::::::::NONE:::SystemCritical:::%SEARCH =ASSIGNEE;%STATUS=CL;%ASSIGNEE=mccda04
Note: An attribute in the list of attribute values is used to search on if the attribute is in the SEARCH or SEARCH_EXPLICIT list. If it is not in the search list it is used to set or update the attribute's value in the call request. It cannot be used for both in the same writer rule. Special parameter names that are replaced with their corresponding value from the Unicenter NSM event structure You can use the following special parameter names anywhere in the user_parms string: &message Message text associated with this Unicenter NSM message. &parm AHD.DLL Parm field on Unicenter NSM Message Action Screen.
90 Implementation Guide
&uuid Unicenter NSM universally unique identifier. &device Device (for example, host name) that generated the Unicenter NSM message. &majorsrc The major type of source directing events to the event writer. For events from Unicenter NSM on Windows, the value is tng. For events from Unicenter NSM on UNIX, the value is uni. &minorsrc The minor type of source directing events to the event writer. &node Device (for example, host name) that generated the Unicenter NSM message. &addr The IP address of the host that generated the Unicenter NSM message. &username The user name on the host that generated the Unicenter NSM message. &date An integer representing how long since 1970 the Unicenter NSM message was generated. &time The Date and Time of the Unicenter NSM message (for example, Tue Jul 4 10:23:37 2000). &severity The severity of the Unicenter NSM message. &tag Tag data associated with the Unicenter NSM message. For example, the writer rule below causes the writer process (tngwriter) to create a call request with customer equal to the username value (&username) of the event message whenever the writer receives a NSM event identified by the string Event2.
Event2:::.*:::*:::tng:::*:::CR_CREATE:::::::::NONE::::::%CUSTOMER=&username
Using event_token and user_parms, you can set initial values or update values of all attributes of the request and specify which fields to match when locating records to update. The only restriction is that the description attribute is never updated in an existing call request record. If a record update and the description field are specified, an activity log containing the text of the description is added to the existing record. NSM Message Action Record: ahd.dll AHD_Call <parms...> You can also specifiy data (<parms...>) to the AHD_Call on the NSM message action record that can be used to replace the &Parm parameter specified in your user_parms parameter in your writer rule. In order for the data specified on the AHD_Call to be processed in this way the data (<parms...>) must be preceeded with a '%' character and the &Parm 'special parameter' must be included somewhere in the user_parms field of the writer rule. The following is an NSM message action and a writer rule that work together to cause the writer process to create requests with assignee set to mccda04 whenever it receives a NSM event identified by the string Event3. Ahd.dll AHD_Call %ASSIGNEE=mccda04
Event3:::.*:::*:::tng:::*:::CR_CREATE:::::::::NONE::::::&Parm
Service Desk customers migrating from AHD4.5 and earlier may already be using the <parms...> field. For example, you may be using this data to match on Writer rules. You can continue this practice without change. If you want to use both 'old' and 'new' parameters then you must concatenate a '%' character to your 'old' <parms..> data and then follow with 'new' data. For example: ahd.dll AHD_Call old data ahd.dll AHD_Call %new user_parms ahd.dll AHD_Call old data%new user_parms Data before the first '%' charactier is concatenated to the TNG event message which is placed into the Call Request description field. This is how Service Desk has worked in the past. Data after the first '%' character is used to replace the &Parm parameter wherever it is specified in your user_parms parameter in your writer rule.
92 Implementation Guide
where: Fields in the rule are separated by three colons (:::). genDate Specifies the month and day (from the system clock) on which the log incident was generated. genTime Specifies the time (from the system clock) at which the log incident was generated. genNode Specifies the node name that generated the log incident. The value is typically the first eight characters of the generating nodes DNS name. This value is always the same, because stdlog.0 only contains entries from processes running on the same node. genProc Specifies the name of the process (for example, ehwriter) that generated the log incident. The process name is operating environment-dependent, but should correspond to the name that appears in the Task Manager processes list (Windows) or in output from a ps command (UNIX). PID Specifies the numeric process identifier from the Task Manager processes list (Windows) or in output from a ps command (UNIX). The PID is critical when multiple processes are running with the same process name. For example, multiple database agents typically run concurrently with the same process name. level Specifies the programmers estimation of the significance of the message. Possible values include FATAL, EXIT, RESTART, SIGNIFICANT, SEVERE, ERROR, MINIMUM, WARNING, INFORMATION, MILESTONE, TRACE, and VERBOSE. codefile Specifies the name of the code source file from which the message was generated.
lineum Specifies the number of the line in the code source file at which the message was generated. msgID Specifies the ID assigned to a TNG event. msgDomain Specifies the name of the domain from which the message originated. msgNode Specifies the name of the node from which the message originated. msgGenDomain Specifies the domain from which the user identified by the msgGenUser value generated the TNG message. msgGenUser Specifies the user ID of the user that generated the TNG message. domainID Specifies the ID of the domain from which the TNG message was generated. msgDate Specifies the month and day (from the system clock) on which the TNG message was generated. msgTime Specifies the time (from the system clock) at which the TNG message was generated. eventID Specifies the source event string or sed-style regular expression that triggered the event. arg Specifies a variable entered in the text string of a message action. For example, if the text field on a message action is entered as ahd.dll AHD_Call help me, the argument in stdlog.0 appears as args=help me. tag Specifies tag data associated with the TNG message. IPaddr Specifies the IP address of the host that generated the TNG message. filter Specifies the process name for the filter rule file.
94 Implementation Guide
filterNum Specifies the number of the filter rule file. majorSrc Specifies the major source (or converter type). This is a string that identifies the source application ID. That is, whether events come from Unicenter TNG for Windows (in which case the value is tng), from Unicenter for UNIX (in which case the vale is uni), or from an internal daemon (in which case the value is -). msgScr Specifies the message source. Possible values are CNV (converter), FLT (filter), NOS (no source), and WRT (writer). msgType Specifies the message type. Possible values are CRT (create), DSC (discovery), TRM (terminate), and UPD (update). msgSrcNum Specifies the message source number. platform Specifies the operating environment from which the message originated. Possible values are AIX, AS400, DECOSF1, DGUX, DYNIX, HPUX, IRIX, MISERVER, MPRAS, MVS, NETWARE, SINIX, SOLARIS, SVR4MP, TANDEM, UNIXWARE, WNT (Windows), or any value defined by the UNIX agents.
Description
If the event writer is handling one or more Unicenter NSM event messages when it receives a request to load new writer rules, the load is delayed until the writer completes the current messages. For example, the writer may be processing an event because it is waiting for network resource (asset) information. In this case, the load message is delayed until this information has been retrieved and the request for a Unicenter Service Desk call request has been generated. A request to write the current event rules to a file, however, is performed with no delay.
96 Implementation Guide
maple:tngfilter maple:tngwriter -
where: name Specifies the host and the unique name of the event-handling daemon in the format hostname:daemon-name (for example, ws2:uconv). The daemon-name appears in slstat. cmd Specifies the name of the executable in the $NX_ROOT/bin directory (UNIX) or installation-directory\bin (Windows), such as tngcnv, uniconvert, filter_nxd, or ehwriter. dest-name Specifies the daemon that receives the generic events from this daemon (for example, ws2:filter1 and ws3:wrtr). Event writer daemons do not have destination daemons. All daemons should also have a record in the topology file. converter-type Specifies whether events come from Unicenter NSM for Windows (tng), Unicenter NSM for UNIX (uni), or from an internal daemon (-).
Example
To automatically create requests when a critical status appears on the Unicenter NSM WorldView map, the Unicenter Service Desk administrator (Ken) must create an event filter rule to identify the events to which he wants to respond. He must also create an event writer rule to specify the action to perform when events of this type are received. Ken decides that he will use one simple filter rule at first. Then, as he becomes more familiar with the system, he will use a more complex set of rules. He decides to capture each critical event from U.S. servers. His system uses the convention that names all servers located in the contiguous United States as usaxxx, so this is very simple. Ken first edits the tngfilter_rule.dat filter rule file in the $NX_ROOT/site/eh/IP directory on the Unicenter Service Desk server, where IP is the IP address of the Unicenter Service Desk server. He uses the UNIX vi editor, although he could use any text editor that does not add extraneous control characters (we recommend that Windows users use WordPad to edit files). In the tngfilter_rule.dat file, the pound sign (#) is the comment character. Any characters after the pound sign are ignored when the rules are read. Most of the lines in Kens tngfilter_rule.dat file are commented out, but he notices the following lines:
# Report All Events (separately) uni:::*:::*:::.*:::(0,1) tng:::*:::*:::.*:::(0,1)
These lines constitute an open filter; that is, a filter that will pass all events to the event writer. Ken changes these lines to:
# Report All Events (separately) # uni:::*:::*:::.*:::(0,1) tng:::*:::*:::Object_Status_Updated.*Critical.*:::(0,1)
Ken comments out the uni line because he is currently interested only in Windows Unicenter NSM events. He enters Object_Status_Updated.*Critical.* in the event_ID field in the tng line because he wants the filter to pass only Object_Status_Updated.*Critical.* events. Unicenter NSM generates Object_Status_Updated.*Critical.* events when the state of an object becomes critical. After saving the filter rule file, Ken edits the tngwriter_rule.dat writer rule file found in $NX_ROOT/site/eh/IP on the Unicenter Service Desk server, where IP is the IP address of the Unicenter Service Desk server.
98 Implementation Guide
As with the filter rules, most of the lines in the file are comments. The last two lines in the file show the default writer rule definitions. Ken wants to pay attention to events from Windows Unicenter NSM only, so he comments out the first of these two lines. Ken formats the second line following these steps: 1. 2. 3. 4. 5. 6. He has already set his filter to pass only critical events, so he leaves the event ID open with .*. He wants to accept events from U.S. servers only, so he enters usa.* in the device field. He wants to accept events from any user, so the user field remains asterisk (*). He wants to write a new request for each critical event, so he leaves CR_CREATE in the action field. He has already entered a suitable request template in the system, so he enters its name, CriticalTemplate, in the template field. He does not want any other logging done, so the logging field remains NONE.
Ken saves the writer rule file, and then recycles the Unicenter Service Desk server. He is ready to receive events and write requests automatically.
2. 3. 4. 5. 6. 7. 8.
Open the Unicenter NSM Object Browser. Locate and click Method to display a list of methods. If any AHD Methods are listed in the name column, select Delete from the Object menu to remove them. Click Popup_Menu to display a list of menus. If any AHDManagedObject exists under the name column, select Delete from the Object menu to remove it. With Popup_Menu still open, scroll down until ManagedObjects displays under the name column. Search for any ManagedObject that has a method name containing AHD. If any exist, select Delete from the Object menu to remove them.
9.
10. If any USPSD menu actions are listed in the name column, select Delete from the Object menu to remove them. 11. Click Jasmine_Menu_Object to display a list of Unicenter Explorer menus. 12. If any USPSD menu objects are listed in the name column, select Delete from the Object menu to remove them. Exit Object Browser. 13. At the command line, enter:
installation-directory\bin\integAHD.exe
Your integration into the 2D/3D maps and Unicenter Explorer should now be successful. Right-click a managed object from the 2D/3D map or Unicenter Explorer, and verify that all of the Service Desk menu options are displayed.
Couldn't connect to the server - Please check the network and that server daemons are running. (Socket error 10061)
Reason: This is a general connectivity error and occurs if you try to get into Unicenter Service Desk from the Java Client. Action: 1. 2. Ensure that the Unicenter Service Desk daemons or services are running. If so, check the client configuration for correct settings.
If a semicolon (;) is used to comment out FILTERING, remove the semicolon. 2. Moving backwards toward the top of the file, you should see the following text:
[ procset FILTERING ] tngfilter tngwriter ehc ; UNICNV_REPLACE ; tngcnv:NT_ONLY
If a semicolon (;) is used to comment out any of the above options, remove the semicolon. 3. If you made any changes to this file, save them, then recycle Unicenter Service Desk server.
If the event converter still does not show up as a running process, check the most recent tngcnv.n file (located in installation-directory\log). This file provides you with information about why the event converter is not running.
Destination unknown, Queuing events or No topology.cfg file entry for node; queuing event
Reason: This message indicates that the topology.cfg file on the Unicenter Service Desk server must be corrected. Action: Correct the topology.cfg file (see page 97) as necessary, then recycle Unicenter Service Desk and the Unicenter NSM converter. An example topology.cfg file for Unicenter Service Desk on a Windows machine named AHD1 and a Unicenter NSM machine named TNG1 follows:
TNG1:tngcnv AHD1:tngfilter AHD1:tngwriter tngcnv filter_nxd ehwriter AHD1:tngfilter AHD1:tngwriter tng -
Turn On Logging
If the slump logon was successful and you still do not see new events, turn on logging and check the files for an indication that an event has come through Unicenter NSM. You can create an event simply by changing the status on a managed object on the 2D/3D map. To turn on logging, modify the file NX.env file located in $NX_ROOT (UNIX) or installation-directory (Windows) to include the following line:
@NX_LOG_LEVEL_BSTRAP=VERBOSE
You can then monitor the tngcnv.n files (located in installation-directory\log) to determine if events are being passed to Unicenter Service Desk. You should see something similar to the following:
09/17 16:35:58:01 tngcnv 477 MILESTONE convrtr.c 399
Sending 1:::dogwood:::9994011e-2f7e-11d1-a435-00c04fd478c9:::09/17/1997 :::16:35:41:::Object_Status_Updated minor:::BV:141.202.211.0:Segment.1 IP:141.202.211.14 MAC: ::CNV:::CRT:::1::: CNT: LOC: DSC::::3:::tngcnv:1:::tng:::WindowsNT:
In this example, the message indicates that the status on a managed object has been updated to Minor. If you find that events are being passed to Unicenter Service Desk and they appear in the log, double check to make sure that you are using the default filter and writer rules. If not, restore the original default filter and writer files, recycle the server, and create a new event. If you find that events are not being passed to Unicenter Service Desk, make sure that two Unicenter NSM processes responsible for passing event information (canotify.exe and caoprdmn.exe) are executing. If they are not running, start them as described in the Unicenter NSM documentation. If they are running, contact Unicenter NSM Support.
so that it reads:
; tngcnv
However, this change would revert when you re-run Unicenter Service Desk Configuration. If you want the change to persist make the same change in pdm_startup.tpl file. To change the startup configuration on a remote (Secondary) server use the pdm_edit facility. For more information on running pdm_edit, see the chapter "Configuring the Web Interface" in the Administrator Guide.
To re-install the Event Converter as a Windows Service use the following command:
tngcnv -i
Sample of the Message Action List This sample shows the Message Action list that is associated with the CFNEW* Message Record. By double-clicking on this item, you can see the detailed information stored as part of the Message Action.
Note: The next example shows the detailed view where you can see the action field set to EXTERNAL and the text field with the standard integration text value of AHD.dll AHD_Call.
Sample of a second Message Record (configured to scan for events beginning with CFUPDATE) This sample reflects part of the detail that results from a second Message Record, configured to scan for events that began with CFUPDATE. This Message Record also has an identical Message Action created for it (as illustrated by the previous CFNEW* Message Record):
Sample 2: Alternative Cawto formats for Generating and Updating a New Request Use the following alternative cawto format for generating a New Request:
CAWTO -n <NSM-server-name> CFNEW2;%EVENT_TOKEN=KEYWORD2;%SUMMARY=Server Installation Approved;%STATUS=Work in Progress;%CATEGORY=Hardware;%DESCRIPTION=Install new server and level V drops to existing server location within the data center. patch panel in router cabinet Also, install wiring on
topology.cfg file
# <remote_node>:uniconv <IP_ADDR_tngcnv>:tngcnv uniconvert tngcnv <IP_ADDR_tngfilter>:tngfilter tng uni <IP_ADDR_tngfilter>:tngfilter -
<IP_ADDR_tngfilter>:tngfilter <IP_ADDR_tngwriter>:tngwriter
filter_nxd ehwriter
<IP_ADDR_tngwriter>:tngwriter
where: <IP_ADDR_tngcnv> The IP Address of the server that is running the Unicenter NSM Event Converter process. <IP_ADDR_tngfilter> The IP Address of the server that is running Unicenter Service Desk. <IP_ADDR_tngwriter> The IP Address of the server that is running Unicenter Service Desk.
tngfilter_rule.dat
This file is not shown because the default has not been modified.
tngwriter_rule.dat
The tngwriter_rule.dat displays as follows:
# evt id:::dev:::user:::majorSrc:::minorSrc:::action:::template:::cmd:::log:::event_tok en:::user_parms
where: # event id The string or sed-style regular expression. device The string, sed-style regular expression, or '*' or empty. user The string, '*', or empty. majorSrc The string "uni" from uniconverter, or "tng" from tng converter. minorSrc The string or '*'. action The action options. The following options are available: CR_CREATE Write a new request for each event CR_UPDATE Updates an existing request or requests (if any exists) or creates a new request if no requests are found. By default, requests are located by matching on the log_agent and affected_resource (asset) fields. The user can override the defaults by specifying a list of any call request attributes. CR_UPDATE_ONLY This is like CR_UPDATE except that a new request is never created when no matching requests are found. COMMAND Executes <cmd>, identified in the cmd description in this table. template Specifies the name of a request template to use to create a request. This parameter is not required and is ignored if the action is not CR_CREATE. Note: The request template must be created before the rule is defined.
cmd The command passed to the shellignored on all but COMMAND action. logging The logging options, as shown by the following: NONE No logging (other than error logging). SYS Log incidents to the Unix syslog (Unicenter message console). PDM Log incidents to application log ($NX_ROOT/log). BOTH Log incidents to application log and syslog. event_token (Optional). This is a 30-character user defined tag that is used to identify a specific request associated with an event_id (tng event message) or all messages like an event_id (for example, a wildcarded event_id). event_token is a request attribute that is stored in every request generated by the TNG interface. If no event_token is specified in the writer rule, the string "tng_generated" is used. This allows the user to update all requests that match the event_token attribute. For example, two different messages for the same asset can now update unique requests. Each CR_UPDATE writer rule specifies the unique message parts and a unique event_token. The event_token is used to find and update the matching request. By default, an activity log containing the message is added to the matching request. In another example, the user can update the status attribute (such as, set status=CL (closed)) in an existing request by specifying the same event_token in the CR_UPDATE writer rule that was used when the request was created using a CR_CREATE writer rule. user_parms (Optional) This contains the following three types of information: Request attribute values List of request attributes to match on when updating existing request records Special parameter names that are replaced with their corresponding value from the TNG event structure
The request values and the list of attributes are specified using a %<KEYWORD>=<value> syntax. If you use multiple keywords/value pairs, you must separate each by a semicolon (";"). Request attribute values are specified using the syntax %<ATTRIBUTE>=<value>, where ATTRIBUTE is an attribute name identified in the text_api.cfg (located in NX_ROOT/site directory), which maps to an AHD majic request attribute. The syntax for the list of attributes to match is specified as %SEARCH=<attribute1>[,<attribute2>.], where SEARCH is a fixed keyword and attribute1 (and so on), are ATTRIBUTE names specified in the text_api.cfg. The following special parameter names can be used anywhere in the user_parms string: &Message The message text associated with this Unicenter NSM message. &Parm The AHD.DLL Parm field on the Unicenter NSM Message Action dialog. &Uuid The TNG universally unique identifier. &Device The device (for example, hostname) that generated the Unicenter NSM message. &Majorsrc The major type of source directing events to the event writer. For events from Unicenter NSM on Windows, the value is tng. For events from Unicenter NSM on UNIX, the vaule is uni. &Minorsrc The minor type of source directing events to the event writer. &Node The device (for example, hostname) that generated the Unicenter NSM message. &Addr The IP address of the host that generated the Unicenter NSM message. &Username The user name on the host where the Unicenter NSM message was generated.
&Date The integer number representing the time since 1970 when the Unicenter NSM message was generated. &Time The date and time of the Unicenter NSM message. For example, Tue Jul 4 10:23:37 2000. &Severity The severity of the Unicenter NSM message. &Tag The tag data associated with the Unicenter NSM message. Note: The Defining Event Writer Rules topic (see page 85) describes how to use the event_token and user_parms. As an example, using the examples outlined in Sample 2: Alternative Cawto formats for Generating and Updating a New Request the default Event Writer Rules file should be changed from:
*:::.*:::*:::uni:::*:::CR_CREATE:::::::::NONE
To the following:
CFNEW.*:::.*:::*:::tng:::*:::CR_UPDATE:::::::::NONE::::::&Parm;%SEARCH_EXPLICIT=S TRING1 CFNEW2.*:::.*:::*:::tng:::*:::CR_UPDATE:::::::::NONE::::::&Parm;%SEARCH=Event_Tok en CFUPDATE.*:::.*:::*:::tng:::*:::CR_UPDATE_ONLY:::::::::NONE::::::&Parm;%SEARCH_EX PLICIT=STRING1 CFUPDATE2.*:::.*:::*:::tng:::*:::CR_UPDATE:::::::::NONE::::::&Parm;%SEARCH=EVENT_ TOKEN;%STATUS=CL
Note: The %SEARCH_EXPLICIT parameter is used to ensure that when an update is performed, the search looks for a matching Request by comparing the contents of the STRING1 field before proceeding with the update. For more information about text_api.cfg and how Unicenter Service Desk uses the Text API to create requests from Unicenter NSM, see the chapter Creating Objects Using Text API in the Administrator Guide.
The Change Impact Analyzer uses several new Managed Object Classes and associated icons. To verify that these new classes exist, use the Unicenter Class Browser. To use the Unicenter Class Browser go to Start, All Programs, CA, Unicenter, NSM, WorldView, Class Browser. Then, expand the TNGROOT folder, followed by the ManagedObject folder, and finally the UBM folder. You should then see the following:
If you do not see the UBM folder or any of the classes underneath it, then you must use the WorldView Import/Export utility (trix.exe) to load $NX_ROOT\data\svc_ana\ubm0.tng into each WorldView repository that is participating in the configuration. Be sure to recycle the WorldView Manager services as well as the Service Desk pdm_uspnsm_nxd daemon after making changes to the WorldView Managed Object Class.
Change Impact Analyzer requires r11 versions of Unicenter Service Desk or version 6.0 of Unicenter Service Desk with the Change Impact Analyzer patch. Change Impact Analyzer will not work with Unicenter Service Desk versions before 6.0. Change Impact Analyzer works with NSM 3.x WorldView and NSM r11.1 WorldView. Change Impact Analyzer provides for integration with more than one WorldView repository. While it is technically possible to integrate with different versions of WorldView, the results may be inconsistent. The inconsistency is due to the differences in the class names among the various versions of NSM WorldView. Change Impact Analyzer relies on both managed object name and managed object class to uniquely identify WorldView objects. If objects with the same names exist in multiple WorldView repositories, but with different managed object classes, confusion will occur.
WorldView is inherently case-sensitive. Verify the case for the following: Arguments used in running the various Change Impact Analyzer integration utilities Hostnames in WorldView Change Impact Analyzer Repository records
If you are using NSM 3.x WorldView Administrative clients that are connecting to the WorldView Repository that is integrated with Change Impact Analyzer, the icons for the seven new Managed Object classes will need to be manually copied from $NX_ROOT\data\svc_ana\icons and $NX_ROOT\data\svc_ana\images to the appropriate WorldView directories on the WorldView administrative client machines. Normally, these icons are installed during CIA Integration and will be installed on the machine on which the integration is run. With NSM/CCS r11.1, this will not be a problem because the icons are now being delivered as part NSM/CCS r11.1. Be sure to restart the WorldView services after performing Change Impact Analyzer integration.
To verify the presence of the nodes, login to the Web Interface and select Change Impact Analyzer from Administration Tab, Service Desk, Application Data, Assets. There should be more than one node listed.
If multiple WorldView repositories are being used, and you have created custom Unicenter NSM Managed Object Classes, the pdm_nsmbmcls utility should be run for each of the repositories that you plan on using. Run pdm_nsmbmcls h to display information on the available command line options.
After the Change Impact Analyzer Classes are populated, several additional options will be available in the Unicenter Service Desk Web Client Administration tab for maintaining the Change Impact Analyzer integration.
5.
6. 7.
Click Change Repository Login to save the login User-Id and Password for the Repository. Click Test Repository Login to ensure that the credentials are correct.
The Change Impact Analyzer daemon, pdm_uspnsm_nxd, attempts to connect to the Repository. A successful test updates the daemons in-memory cache of repositories and will begin using the new credentials when it needs to communicate with the repository. If you skip this step, the repository is not available until Unicenter Service Desk server is recycled. Note: The User-Id provided must have dbowner rights to the WorldView database for Change Impact Analyzer functionality to work properly. Often WorldView requires that the hostname be uppercase.
Run pdm_nsmclass to Map Automatically The pdm_nsmclass utility, run from command prompt, uses a file to map each Asset Class to a Change Impact Analyzer Class. Before running pdm_nsmclass review the sample $NX_ROOT\site\nsmclsmap.dat file, and be aware for the following: Each line in the sample file maps an Asset Class to a Change Impact Analyzer Class. If pdm_nsmclass finds an Asset Class that has no corresponding entry in the nsmclsmap.dat file, it will map the Asset Class to the Component Change Impact Analyzer Class by default. If required, the default Change Impact Analyzer Class can be changed with a command line option. pdm_nsmclass will only update Asset Classes that have no Change Impact Analyzer Class selected. A command line option lets you reset the Change Impact Analyzer Class of all Asset Classes. Run pdm_nsmclass h to display information on the available command line options. If you are running Unicenter Service Desk with a case-sensitive DBMS, such as Oracle, pay extra attention to the case of your entries in nsmclsmap.dat file. The mapping is case-sensitive.
This will uncompress the file myco_demo.tng 3. Load the myco_demo.tng file using the Unicenter NSM WorldView Import/Export Repository utility (trix.exe). For more information on the WorldView Import/Export utility, see WorldView documentation. For the following example, you are the Unicenter Service Desk administrator at the fictitious Myco Company, which recently implemented Change Impact Analyzer. Today, you must add the password reset process to Change Impact Analyzer. The following sections outline the steps necessary to accomplish this task.
2.
Select Read Change Impact Analyzer. The pdm_nsmimp utility is launched to import the Change Impact Analyzer Relationships to Unicenter Service Desk.
Note: The name of the WorldView Managed Object chosen for import will be used as the name of the Change Impact Analyzer Relationship in Unicenter Service Desk.
Planning
Your analysis has determined that the password reset process has two dependant elements, the Password Reset Procedure Document and the Password Reset Administrator Role. The Password Reset Process itself was dependant on the Help Desk Practice, because this is the department that handles the password reset procedures. Help Desk Practice Password Reset Process Password Reset Procedure Document Password Reset Administrator Role
Create Assets
Using the Asset windows in the Unicenter Service Desk interface, create the appropriate assets to represent the elements of the business.
Refine the search criteria to find each of the four assets that were just created. Multiple searches will need to be done to find all the four assets. 3. Select the Assets from the Available Assets list and add them to the Assets to Export list and click OK. The Export Configuration Items to NSM window appears. 4. 5. Select the Target Repository. This is the repository to which the assets will be exported. Select the Target Object folder. This controls the WorldView container in which the assets will be placed. If not specified, the objects will be created in the ManagedObjectRoot folder. Important! Normally any child assets, of the assets that were selected for export, that are found will be exported. The hierarchical relationships will be recreated in WorldView. The Exclude Child Assets options will export only the selected assets and exclude any child assets from the export.
6.
Click the Export Assets button to start the export process. When the export completes, you are notified.
Once exported, the assets are placed in the ManagedObjectRoot folder in WorldView.
When assets are exported to Unicenter NSM WorldView, the repository is automatically assigned.
Note: Certain WorldView Managed Object classes require additional, nonstandard Instance Level Properties that can't be anticipated. When the Change Impact Analyzer daemon tries to create Managed Objects using these classes, the creation will fail. The Change Impact Analyzer Daemon attempts to set these Instance Level Properties from corresponding information contained in the Service Desk Asset: Name, Label, IP Address, MAC Address, Description, Contact and Location. Try to avoid using Managed Object Classes such as: IP_Interface, IP_Network, IP_Subnet, LANBus, and Segment which require additional Instance Level Properties.
Organize Relationships
Now that the assets are in WorldView, you can use the 2D map, in Design Mode, to define the relationships between your business elements by first moving the Help Desk Practice into the Myco Industries Inc folder. This is followed by moving the Password Reset Procedure Document, Password Reset Process, and Password Rest Administrator folders into the Help Desk Practice folder. Then, import this new logical relationship into Unicenter Service Desk by performing the following steps: 1. 2. Right mouse click on the Help Desk Practice folder. Select Read Change Impact Analyzer. The pdm_nsmimp utility is launched to import the Change Impact Analyzer Relationships to Unicenter Service Desk.
2.
Check whether the Source Repository is set to the Repository from which it was imported, when the Assets are imported from WorldView. Note: The status in WorldView is considered unreliable. The Change Impact Analyzer data is owned by Unicenter Service Desk. WorldView is used only to display Unicenter Service Desk information.
This example walked you through the following three simple steps of adding the Password Reset process to Change Impact Analyzer for the Myco Company: You defined the business elements by creating the supporting assets in Unicenter Service Desk and exporting them to WorldView. Using the WorldView 2D map, you organized the business elements by defining relationships between them with WorldViews drag-and-drop capabilities. You imported the relationships back to Unicenter Service Desk for use by Change Impact Analyzer.
These macros can be invoked from Service Types for Requests, Change Orders, and Issues. They can also be invoked from Service Types for Incidents and Problems when Unicenter Service Desk is installed in an ITIL format. For Workflow Tasks, the macros can be executed from Behaviors. Change Orders and Issues allow multiple assets to be attached. The macros will update the Change Impact Analyzer Status of all attached assets. The following examples walk you through the processes of using the macros in Service Types and Behaviors.
4. 5.
Right-click on the Service Type Tab of the Request and choose Refresh to update the Attached Service Type Events. Examine the Asset to check if Change Impact Analyzer Status is set to Critical.
6.
If you examine the assets log, there will be an entry showing that the status was changed.
7.
Examine the WorldView map with either 2D Map or Unicenter Explorer. The color of the corresponding Managed Object has changed to red and the status propagated upwards to the top of the objects.
8.
Manually change the Change Impact Analyzer Status of the asset back to Normal and click Save to save the changes.
9.
3.
Enter the Name, Object Type Description and Delay Time, Allow Time Resetting and On Done Event Flag and click Save. Note: Event needs to be saved before attaching condition macros. Once the Event is saved click on Edit to select the condition from the list.
4.
5.
6.
Click Search for the Set Asset Critical Requests macro. The Actions on True Update window appears. The list on the left shows the results of the Macro Search. The list on the right shows the Macros assigned to the Event.
Select the action Set Asset Critical Request from Possible Actions list and click the arrow button to add the actions to the macro list, and click OK. The Event Update window appears. 7. Click Save. This creates an Event. This Event can now be used in Service Types if desired. However, you can test the Event without creating a Service Type.
4.
Create a new Issue Category from Administration Tab, Service Desk, Issues, Categories to use the new Task Types. Click Create New to create the following category.
5.
Add the first Workflow Task to the Issue Category. Click the Edit button on the Issue Category form and then go to the Workflow tab. Note: Workflow Tasks and Macros are not available when the CA Workflow engine is used to service the category.
6.
Click the Add Workflow button. The Create New Workflow Task Template window appears.
7.
Create the following Workflow Template, and then click Accept. The Workflow Template is added to the Issue Category and the window closes returning you to the Issue Category window .
8.
Click the Add Workflow button to add the second Workflow Task Template as mentioned in steps 6 and 7.
9.
Click Save. The Create New Workflow Template window will close and you are returned to the Issue Category window.
10. Click Save. The Issue Category will look like the following:
2.
Click the Complete status hyperlink. The Behavior template Detail window appears. Note: This example fires the Change Impact Analyzer Set Assets Warning Issue Wf macro when the Workflow Task changes status to Complete.
3.
4.
Click Search. The list on the left shows you the Macros that are available to be added. The list on the Right shows you the Macros that are assigned to the Behavior.
5.
Select the Set Assets Warning Issue Workflow Macro and click the Arrow button to add it to the list on the right.
6.
Click OK to save the changes. The Behavior Template Detail window appears and the changes are complete.
7.
Close the window. The asset warning Workflow Template Detail window appears.
8.
9.
Click the 200 hyperlink for the asset normal task and select Complete from the Status column of the Issue Category Detail. Follow the steps one through eight to add the Behavior to the second task, only this time add the Set Asset Normal Issue Wf macro to the Behavior Template on the Action to True Update window. Try the new Issue Category by creating a new Issue with the new Category.
The Macros will change the Change Impact Analyzer Status of each of the attached Assets.
5.
Click Save to save the Issue. The Assets that were selected are listed on the Asset tab.
2.
Click the 100 hyperlink to update the first Workflow task. The Issue Workflow Detail window appears.
3.
4.
Change the Status to Complete. This will fire off the Change Impact Analyzer Macro.
5.
Click Save to save the Workflow Task. Then, examine the WorldView map. The icons have changed to yellow.
6.
View the log for one of the assets. There is an entry showing that the Status was changed by a macro.
7.
Go back to the Issue and change the Status of the second Workflow Task to Complete.
8.
9.
Now examine the WorldView map. The icons have changed back to normal.
10. Examine the asset log again. There is an entry showing the status was changed back to normal by a Workflow Task.
The Logical Repository contains information for WorldView to use when connecting to the MDB, located either locally or remotely. The credentials used to connect to the MDB are also stored in the Logical Repository. The values entered into the User-Id and Password fields on the Change Impact Analyzer Repository Detail form must match those stored in the associated Logical Repository. The following example shows you how to create a NSM Logical Repository.
After installing this option, the attachment of an asset to a Change Order will fail if the asset is already attached to another active Change Order. An error dialog will appear warning you that the asset is already attached to an active Change Order. When attaching multiple assets, only the assets already attached to other Change Orders will fail. Other assets are not affected.
Implementation Notes
Implementation Notes
Status Changes
The Change Impact Analyzer Status of an asset that has been imported from WorldView will automatically be reflected in the WorldView maps.
Implementation Notes
When the Change Impact Analyzer Status is changed manually or automatically using the Action Macros, the corresponding WorldView Managed Objects are updated. Normal WorldView propagation rules apply and the status is reflected in the top object of the hierarchy.
Implementation Notes
Implementation Notes
When the pdm_nsmimp utility is run to import a WorldView Managed Object that does not exist as an asset in Unicenter Service Desk, the utility will create the asset, as well as its corresponding Asset Class (if it too does not yet exist).
The Source Repository will be set to the repository from which the asset was imported. The Repository will also be assigned.
Implementation Notes
If the Managed Object was a container, everything inside the container will be imported. The Change Impact Analyzer Relationships are created automatically.
Note: When importing Managed Objects from WorldView, by default the pdm_nsmimp utility limits the number of inclusions (nesting level) that will be examined to 1,000. This can be changed with a command line option on the pdm_nsmimp utility.
Implementation Notes
Implementation Notes
The synchronization function can also be invoked from the Administration Interface. You would use the Synchronize Status button:
You will be notified when the synchronization is complete. This could take a few minutes if there are many Change Impact Analyzer Relationships to process.
Recursion Depth
To prevent a possible endless recursion loop when exporting assets to Unicenter NSM WorldView, the child level depth is tracked. This endless loop situation can occur when asset A is a child of asset B, and asset B is a child of asset A. Unicenter Service Desk allows this cyclical relationship, however WorldView does not. By default, the export is canceled if the depth exceeds 99 levels. To change this level, create the NX_UBM_RECURSION_LIMIT variable in the NX.env file on the Unicenter Service Desk server and set it to an integer value.
Implementation Notes
Implementation Notes
2.
4.
5.
6.
7.
Implementation Notes
Implementation Notes
The top-level element of a Change Impact Analyzer Relationship is denoted by an entry that has no Parent Asset.
It is not possible to manually delete a single element of a Change Impact Analyzer Relationship. Since the Relationships form a linked-list, permitting the deletion of elements could cause the structure to break, resulting in data corruption. When WorldView Managed Objects are imported, pdm_nsmimp will delete existing Change Impact Analyzer Relationships with the same name if they already exist.
4. 5.
After selecting the appropriate components for your installation in Step 3, click Next. When prompted to Select the Program Folder, select the location where you want to add the program links and click Next. The installation process begins.
6.
When prompted about whether to configure Unicenter Service Desk, select Yes to configure now or No to configure later. Important! Whether you configure Unicenter Service Desk now or later is up to you. Any time you run the setup program, you must configure Unicenter Service Desk before you can use it. For more information, see Phase 3: Configure the Client in this chapter.
The installation process adds a Unicenter Service Desk menu to the Windows Start, Programs menu. It contains commands to access product documentation and the components you chose to install.
Note: Before loading the software to the network drive, determine if you have sufficient disk space on the network drive after comparing the image on the installation media. You may want to use a comparison utility.
2.
Copy the Unicenter Service Desk Windows client installation media to the network subdirectory as follows (where x is your CD/DVD-ROM drive):
F:\SHARE\usdinst>copy x:\*.*
The software is now available for users to install from the network.
3.
Follow the procedure in Install on a Local Drive, starting with Step 2. Alternatively, follow the procedure in Install Silently to perform a silent install.
Install Silently
You can install the Unicenter Service Desk client silently without requiring any user input. The silent install is useful for implementing software delivery or otherwise installing Unicenter Service Desk as part of a batch process. To perform a silent install, you can use setup.exe with the r option set to create a silent installation response file, as follows:
setup_dir\winclnt.32\disk1\setup -r
Using the r option creates a file named setup.iss in your WINNT directory and records in it all the choices you make during the installation process. Note: A setup.iss file containing default settings resides at setup_dir\winclnt.32\disk1\. You can use the setup.iss file as input to install any client by issuing the following command:
setup_dir\setup /s /f1"iss_file" /f2"log_file"
where: setup_dir Specifies the directory where setup.exe resides. This may be a location on your CD/DVD-ROM drive or on a network drive, if you have copied the installation files to a shared drive on your network. iss_file Specifies the full path, including the name of the setup.iss file to use during installation. log_file Specifies the full path, including the name of a log file where the installation process can log information. You can run this command from a batch file, by using the Run command on the Windows Start menu, or from the Command Prompt. Important! After performing a silent install, you must configure Unicenter Service Desk before you can use it. For more information, see Phase 3: Configure the Client.
Step 1: Configure the Database Client Using the Ingres Network Utility
To use the Ingres Network Utility to configure the database client, follow these steps: 1. Select Programs, CA, Ingres (EI), Ingres Service Manager from the Windows Start menu. The Ingres Service Manager window appears. 2. If Ingres is not already running, click Start. The stoplight changes from red to green, indicating that Ingres is up and running. 3. 4. Click Exit to close this window. Select Programs, CA, Ingres, Ingres Network Utility from the Windows Start menu. The Ingres Network Utility window appears. 5. Select Add from the Node menu. The Add Virtual Node Definition dialog appears. 6. Enter data in the following fields. Contact your system administrator for specific information. Virtual Node Specifies the name you will use when you configure the ODBC data source in Step 5 under Step 2: Configure the ODBC Data Source. Enter Help_Desk in this field. User Name Specifies the user ID that you use to log into the Ingres database. Password Specifies the password associated with the user ID you entered in the User Name field. Confirm Password Confirms the password that you entered in the Password field. Node Specifies the name or IP address of the database server. You must be able to ping this server from your PC.
Important! By default, this field's value is the same as the virtual node name. You must change it to match the name or IP address of the database server machine. The database server must be up and running on this machine or the node test in Step 8 will fail.
Protocol Specifies a communications protocol that you select from the dropdown list. In most cases, you can use the default selection, wintcp. If you have a question about which protocol to use, contact your system administrator. Listen Address Specifies the listen address for the database server. If you installed the Embedded Ingres option, enter EI. If you are using an existing Ingres installation, you can typically enter the default Ingres listen address (II); however, the listen address may have been changed. To determine the listen address, enter the following command at the command prompt to display the correct value, or contact your system administrator:
ingprenv II_INSTALLATION
After entering these values, the Add Virtual Node Definition dialog resembles the following illustration:
7. 8.
Click OK to save the configuration settings, close the Add Virtual Node Definition dialog, and return to the Ingres Network Utility window. Select the Help_Desk virtual node, then select Test Node from the Node menu. A message indicates whether the node test was successful.
9.
If the node test fails, click OK to close the error message, then select Alter from the Node menu to modify the virtual node definition (contact your system administrator if you need help understanding the correct values to enter). Repeat Steps 6-8 until the test is successful.
10. When the node test is successful, select Exit from the File menu to close the Ingres Network Utility window.
Step 2: Configure the ODBC Data Source (Screen Painter or Crystal Reports)
To configure the ODBC data source, follow these steps: 1. Select Settings, Control Panel, Administrative Tools, Data Sources (ODBC) from the Windows Start menu. The ODBC Data Source Administrator appears: 2. Click one of the following tabs: The User DSN tab if only the user currently logged in will use the connection. The System DSN tab if all users of the PC will use the connection. 3. 4. Click Add to create a new data source. Select the Ingres driver, and click Finish. The Ingres ODBC Administrator window appears. 5. Enter data in the following fields. Contact your system administrator for specific information. Data Source Specifies the data source. Enter ServiceIT as the name for this data source. Description Describes the data source, for example, Unicenter Service Desk. Vnode Specifies the name of the virtual node that you created in Step 6 under Step 1: Configure the Database Client Using the Ingres Network Utility. Select Help_Desk from the drop-down list. Type Specifies the database type. Use the default value (INGRES). Database Specifies the name of the Unicenter Service Desk database. This is the same name you entered in the Database Name field on the Unicenter Service Desk Server Configuration window. You can typically enter the default database name (mdb). Prompt User ID and Password Prompts the user for a user ID and password instead of using the ones specified for the vnode. Clear this option if you always want to connect using the user ID and password defined for the vnode. Group Specifies the Table group. Enter Service_desk_admin_group as the name of this group.
After entering these values, the Ingres ODBC Administrator window resembles the following illustration:
6.
Click Apply, and click Test. Correct any errors before continuing.
7.
When the test is successful, click OK repeatedly to close the remaining open windows.
6.
Enter data in the following fields. Contact your system administrator for specific information. Data Source Defines the ServiceIT data source that you created in Section 1: Configure Screen Painter or Seagate Crystal Reports with Ingres from the drop-down list, if you have already configured Seagate Crystal Reports to run with Ingres. Otherwise, leave this field blank for now you will configure a data source and select it in Step 2: Configure the ODBC Data Source. Database Defines the name of the Unicenter Service Desk database. Enter the same name you entered in the Database Name field on the Unicenter Service Desk Server Configuration window. You can typically enter the default database name (mdb). Table Owner Defines the user ID of the owner of the tables in the Unicenter Service Desk database. Unless otherwise instructed by your system administrator, enter mdbadmin in this field. User ID Defines the user ID used to log into the Ingres database. Password Defines the password associated with the user ID you entered in the User ID field. Server Name Defines the name or IP address of the database server. You must be able to ping this server from your PC. Important! The database server must be up and running on this machine, otherwise, when you test the data source later in the procedure, it will fail. Listen Address Specifies the listen address for the database server. If you installed the Embedded Ingres option, enter EI. If you are using an existing Ingres installation, you can enter the default Ingres listen address (II); however, the listen address may have been changed. To determine the listen address, enter the following command at the command prompt to display the correct value, or contact your system administrator:
ingprenv II_INSTALLATION
7.
Do one of the following: If you have already configured Crystal Reports to run with Ingres, continue with Step 3: Test the Data Source and Link the Tables. If you have not configured Crystal Reports to run with Ingres, continue with Step 2: Configure the ODBC Data Source.
Database Specifies the name of the Unicenter Service Desk database. This is the same value you entered in the Database Name field on the Unicenter Service Desk Server Configuration window. You can typically enter the default database name (mdb). However, the database name may have been changed. Contact your system administrator for the correct name. Prompt User ID and Password Prompts the user for a user ID and password instead of using the ones specified for the vnode. Clear this option if you always want to connect using the user ID and password defined for the vnode. After entering these values, the Ingres ODBC Administrator window resembles the following illustration:
7.
Click Apply, and click Test. Correct any errors before continuing.
8. 9.
When the test is successful, click OK repeatedly until the Database Link Configuration window displays. Select Help_Desk from the Data Source drop-down list. All other fields should contain the values you previously entered.
10. Continue with Step 3: Test the Data Source and Link the Tables.
Section 3: Configure Screen Painter or Crystal Reports with Microsoft SQL Server
If you are using an MS SQL Server database, and have selected the Screen Painter or Crystal Reports options, you must configure an ODBC data source to access the Unicenter Service Desk/Knowledge Tools database.
5.
Enter data in the following fields. Contact your system administrator for specific information. Name Enter ServiceIT as the name for this data source. Description Enter a description for the data source, such as Unicenter Service Desk. Server Select the name or IP address of the database server from the dropdown list. You must be able to ping this server from your PC. Important! The database server must be up and running on this machine; otherwise, when you test the data source later in this procedure, it will fail.
6.
7.
Ensure that the following options are selected: With SQL Server Authentication Using a Login ID and Password Entered by the User Connect to SQL Server to Obtain Default Settings for the Additional Configuration Options
8.
Enter data in the following fields: Login ID Enter the user ID of the owner of the tables in the Unicenter Service Desk database. You can typically enter the default table owner ID (mdbadmin). However, the table owner may have been changed. Contact your system administrator for the correct name. Password Enter the password associated with the user ID you entered in the Login ID field. If you used the default value, the password is the same as the one entered in the Database Password field on the Unicenter Service Desk Server Configuration window. Contact your system administrator for the correct password.
9.
10. The name in the Change the Default Database To field must be the same name entered in the Database Name field on the Unicenter Service Desk Server Configuration window. This value is set to the default (mdb). However, the database name may have been changed. Contact your system administrator for the correct name. 11. Click Next, then click Finish to close the wizard.
12. Click Test Data Source to test the connectivity. 13. When the test is successful, click OK repeatedly to close the remaining open windows.
3.
5.
Do one of the following: If you have already configured Crystal Reports to run with MS SQL Server and selected your data source in the previous step, continue with Step 3: Test the Data Source and Link the Tables. If you have not configured Crystal Reports to run with MS SQL Server and selected that data source in the previous step, continue with Step 2: Configure the ODBC Data Source.
5.
Enter data in the following fields. Contact your system administrator for specific information. Name Enter ServiceIT as the name for this data source. Description Enter a description for the data source, such as Unicenter Service Desk. Server Select the name or IP address of the database server from the dropdown list. You must be able to ping this server from your PC. Important! The database server must be up and running on this machine; otherwise, when you test the data source later in this procedure, it will fail.
6.
7.
Ensure that the following options are selected: With SQL Server Authentication Using a Login ID and Password Entered by the User Connect to SQL Server to Obtain Default Settings for the Additional Configuration Options
8.
Enter data in the following fields: Login ID Enter the user ID of the owner of the tables in the Unicenter Service Desk database. You can typically enter the default table owner ID (dbo). However, the table owner may have been changed. Contact your system administrator for the correct name. Password Enter the password associated with the user ID you entered in the Login ID field. If you used the default value, the password is the same as the one entered in the Database Password field on the Unicenter Service Desk Server Configuration window. Contact your system administrator for the correct password.
9.
10. The name in the Change the Default Database To field must be the same name entered in the Database Name field on the Unicenter Service Desk Server Configuration window. This value is usually the default (mdb). However, the database name may have been changed. Contact your system administrator for the correct name. To change the database name, select the check box and enter the new name. 11. Click Next, then click Finish to close the wizard. From the Database Link Configuration window, continue with Step 3: Test the Data Source and Link the Tables.
Step 3: Test the Data Source and Link the Tables (SQL/Access)
To access the data in the remote database, you must first test the data source, then create a link to each of the tables and views you want to use. A link lets you access live data instead of replicated data. To test the data source and link the tables: 1. From the Database Link Configuration window, click Test Data Source to test the connectivity of the data source you chose. A message indicates whether the ODBC connection test was successful. 2. If the ODBC connection test fails, click OK to close the error message, then review the ODBC data source configuration settings for possible errors (contact your system administrator for the correct values to enter). Repeat Steps 1 and 2 until the ODBC connection test is successful, then click OK to return to the Database Link Configuration window. The Test Status should now read Tested Successfully. 4. If you have already installed the database views as described in the chapter Generating Reports in the Administrator Guide, you can link the views when you link the tables by selecting the Link Views check box. To link the tables (and views if you have chosen to do so), click Link Tables on the Database Link Configuration window. This links the tables needed for reporting. When prompted that the tables have been successfully linked, click OK. The Link Status should now read Tables Linked Successfully. Note: Links to tables persist until you delete or link the table to a different data source. You cannot link to the tables until the database network clients and ODBC drivers are correctly configured, as outlined in the previous steps. 7. Click Close to exit the Database Link Configuration window.
3.
5. 6.
4.
Select the Oracle driver that was installed as part of the Oracle Client tools installation. The following example shows a typical selection:
5.
Click Finish. The Oracle ODBC Driver Configuration wizard opens so you can configure an ODBC data source that can be used when connecting to an Oracle database. Note: The fields in this wizard are blank if you are creating a new data source, and contain default values if you are modifying an existing data source. The following example displays a typical set of values:
6.
Enter data in the following fields. Note: Contact your system administrator for specific information. Data Source Name Enter ServiceIT as the name for this data source. Description Enter a description for the data source, such as Unicenter Service Desk.
TNS Service Name Select the Oracle Net Service Name that can be used to connect to the database. The list is populated with the Net Service Names that you already have configured as part of the Oracle Client tools installation. User ID Enter the user ID of the owner of the tables in the Unicenter Service Desk database. You can typically enter the default table owner ID (mdbadmin). However, if the table owner has changed, contact your system administrator for the correct name. 7. Click Test Connection to test the connectivity. Note: Make sure that the database service is running on the remote machine. 8. When the test is successful, click OK repeatedly to close any open windows.
5.
Do one of the following: If you have already configured Crystal Reports to run with Oracle and selected your data source in the previous step, continue with Step 3: Test the Data Source and Link the Tables. If you have not configured Crystal Reports to run with Oracle and selected that data source in the previous step, continue with Step 2: Configure the ODBC Data Source.
4.
Select the Oracle driver that was installed as part of the Oracle Client tools installation, The following example shows a typical selection:
5.
Click Finish. The Oracle ODBC Driver Configuration wizard opens so you can configure an ODBC data source that can be used when connecting to an Oracle database. Note: The fields in this wizard are blank if you are creating a new data source, and contain default values if you are modifying an existing data source. The following example displays a typical set of values:
6.
Enter data in the following fields. Note: Contact your system administrator for specific information. Data Source Name Enter ServiceIT as the name for this data source. Description Enter a description for the data source, such as Unicenter Service Desk.
TNS Service Name Select the Oracle Net Service Name that can be used to connect to the database. The list is populated with the Net Service Names that you already have configured as part of the Oracle Client tools installation. User ID Enter the user ID of the owner of the tables in the Unicenter Service Desk database. You can typically enter the default table owner ID (mdbadmin). However, if the table owner has changed, contact your system administrator for the correct name. 7. Click Test Connection to test the connectivity. Note: Make sure that the database service is running on the remote machine. 8. When the test is successful, click OK repeatedly to close any open windows.
Step 3: Test the Data Source and Link the Tables (Oracle/Access)
To access the data in the remote database, you must first test the data source, and then create a link to each of the tables and views you want to use. A link lets you access live data instead of replicated data. To test the data source and link the tables: 1. From the Database Link Configuration window, click Test Data Source to test the connectivity of the data source you chose. A message indicates whether the ODBC connection test was successful. 2. If the ODBC connection test fails, click OK to close the error message, then review the ODBC data source configuration settings for possible errors (contact your system administrator for the correct values to enter). Repeat Steps 1 and 2 until the ODBC connection test is successful, and then click OK to return to the Database Link Configuration window. The Test Status should now read Tested Successfully. 4. If you have already installed the database views as described in the chapter Generating Reports in the Administrator Guide, you can link the views when you link the tables by selecting the Link Views check box. To link the tables (and views if you have chosen to do so), click Link Tables on the Database Link Configuration window. This links the tables needed for reporting. When prompted that the tables have been successfully linked, click OK. The Link Status should now read Tables Linked Successfully. Note: Links to tables persist until you delete or link the table to a different data source. You cannot link to the tables until the database network clients and ODBC drivers are correctly configured, as outlined in the previous steps. 7. Click Close to exit the Database Link Configuration window.
3.
5. 6.
Note: The client installation adds links to the /usr/bin directory for Unicenter
Service Desk scripts.
Before Migration
Before Migration
You can only migrate to this r11.2 version of Unicenter Service Desk from the r6.0 version of Unicenter Service Desk. If you need to upgrade from a Service Desk version earlier than 6.0, you first need to migrate to 6.0, and then migrate to version r11.2. If you need to upgrade from an earlier version of Service Desk to Service Desk 6.0, and plan to migrate to the r11.2 version of Service Desk on a Windows 2000 Server, the WSCRIPT.EXE needs to be upgraded to the latest version before running migration. This upgrade is necessary for creating the migration.log. To upgrade the WSCRIPT.EXE, download scripten.exe (the script installer) from the Microsoft website (http://www.microsoft.com/downloads/). Note: Migration to the r11.2 version of Unicenter Service Desk is currently supported for MS SQL Server, Oracle, and Ingres databases. Review the Unicenter Service Desk Migration Concerns section before running migration. Install r11.2 on a 6.0 System This would be a simple migration process. Version r11.2 of the Unicenter Service Desk installation will detect the 6.0 version of Unicenter Service Desk, and will launch an upgrade installation wizard. Note: When migrating from the 6.0 version to the r11.2 version with a remote SQL database, you must first run the Service Desk Remote Components Installer on the SQL database server to configure the database. Make note of the Database User Name and Password. When you run the Migration Wizard on the Service Desk server, enter the same Database User Name and Password as entered in the Remote Components Installer for the Target Database User and Password. Install r11.2 on a system that does not have 6.0 If the system on which you want to install version r11.2 of Unicenter Service Desk is different from the system where version 6.0 is installed, then you need to do the following: 1. 2. 3. 4. Install the 6.0 version of Unicenter Service Desk on the new system. Make sure that you implement all 6.0 NX_ROOT/site/mod data to the new 6.0 version of Unicenter Service Desk. Run configuration and point to either the production Unicenter Service Desk 6.0 Database, or a copy of one located elsewhere. Install Service Desk by following the procedures in this chapter.
Before Migration
Then use the pdm_load utility with the r option to remove them:
pdm_load r f audlog_old.dat
Service Type Events If you are using the Save History feature of your Service Type Events, completed event records are left in the database. Consider deleting them. Completed events will have status_flag=1. Canceled events will have status_flag=0. For example, to remove all events that are in complete status use the following commands:
pdm_extract -f atev_old.dat "select * from Attached_Events where status_flag=1" >
Then use the pdm_load utility with the r option to remove them:
pdm_load r f atev_old.dat
Before Migration
Knowledge You need not remove old Document FAQ Rating/Voting data or Audit data. Parameters in the Knowledge Tools Migration dialog allow you to specify the number of days' worth of data that should be retained. Surveys Survey response data is stored in the following tables: Survey Survey_Question Survey_Answer
You can use the pdm_extract / pdm_load command combination, as shown in the Audit_Log example above, to extract and remove records from these tables. There is a small chance that some orphan records could be left in the database if the processing of the received survey spanned midnight. This should have no impact. For example, to remove all the Survey records that are older than September 2, 2005, use the following commands in this order:
pdm_extract 02' -f "select * from Survey where last_mod_dt < DATE '2005-09" > survey_old.dat -f -f survey_old.dat "select * from Survey_Question where last_mod_dt < DATE
" > survey_question_old.dat -f -f survey_question_old.dat "select * from Survey_Answer where last_mod_dt < DATE
Before Migration
Before Migration
For Oracle:
Select i.Table_Name, i.Index_Name, c.Column_Name, c.Column_Position from user_indexes i, user_ind_columns c where i.Index_Name = c.Index_Name and i.Uniqueness = 'UNIQUE' AND c.Column_Name <> 'ID' order by i.Table_Name, i.Index_Name, c.Column_Position
Once you have identified indexes which have duplicates, use the syntax described in the following example to list any duplicates found for a specified index and column name(s). Example for the code column in the chgcat table:
SELECT * FROM chgcat WHERE (UPPER(code) IN (SELECT upper(code) FROM chgcat GROUP BY upper(code) HAVING (COUNT(UPPER(code)) > 1)))
Linux
NX_ROOT\bin\migrate_to_r11.sh
Migration Interview
Before migration, a number of queries are performed regarding the database connectivity information for both the source and target databases. The Ingres connectivity is accessed through created Ingres vnodes based on the information supplied during the interviewing. To complete the migration interview, follow these steps: 1. Click Next on the Unicenter Service Desk Migration Wizard Welcome window. The Source Connectivity window appears. 2. Enter the source database details and click next. The Target Connectivity window appears. Note: Use the OS logged in user name and password as the Target Database (Ingres) user name and password. 3. Enter the target database details and click next. The Tomcat Port window appears. 4. Enter the port number and click next. Note: Tomcat Port is used for attachment document repository servlet port information. Specify the same Tomcat Port number when asked during the configuration that you specified during the migration process. If they are different, then edit the port number for the Document Repository after configuration in order for it to be accessible for use. The Check Prerequisites window appears, which validates Database Connectivity and API registration based on the information provided in the previous steps. At this stage, a check is also done on the diskspace and the memory. The wizard prompts a Recommended Disk Space Window. 5. Click Browse to select a new location or click OK. The Knowledge Tool Migration inquire is launched. Note: The Knowledge Tools migration is brought up automatically by the migration wizard, if it is on the r11.2 system. Otherwise, the files output from the Knowledge Tools Migration (see page 233) should be moved to the r11.2 system. 6. Click on Finish. This completes the final configuration for the r11.2 settings and the actual migration process starts.
Migration Process
Initially, the migration wizard runs a validation to check the data sources to determine its smooth progression. Once the validation is completed, the migration is done in four phases and the status window is updated as the migration progresses. A migration.log file is created in $NX_ROOT/logs directory. Note: During migration you may see errors in the stdlog regarding recurring animator missed firings. These errors are due to the fact that the system is down during migration and are normal errors. The user interface allows the user to start, stop and restart the migration. However, when you stop the migration, there are some places when the process does not stop immediately, and runs until after a set of steps are completed. The migration allows restart ability by recording each successful step and phase within the migration.properties file. Once the migration is done, the wizard launches the Unicenter Service Desk Configuration window. For more information about server configuration, see Configure the Server for the appropriate platform. If you need to re-run the Unicenter Service Desk migration, you will not be interviewed unless you rename the following files before running the migration wizard: $NX_ROOT\site\migration.properties $NX_ROOT\Mig60ToR11\migration_phase1.properties $NX_ROOT\Mig60ToR11\migration_phase3.properties Note: If you need to re-run migration, you will need a clean install of the database.
The following example illustrates the fields that appear when Oracle is selected as the Data Source:
Note: Before clicking OK on the Knowledge Tools Migration Dialog, follow Steps 3-10 to continue the migration process on the R11.2 Server. 3. 4. Copy the KTMig60ToR11 directory from the Unicenter Service Desk r11.2 installation media to the Knowledge Tools 6.0 server. Register the CRMR11ENU.dll located in KTMig60ToR11 directory using the regsvr32 command. For example: If the folder in step 1 is located under the C:\ drive, type the following command:
regsvr32 C:\KTMig60ToR11\CRMR11.dll
5. 6.
Run the R11Migration.exe located in the KTMig60ToR11 directory. For Ingres or SQL Server, enter the field information for Server name or IP, Database name, Login ID, and Password of the database owner in the Data Source section. For Oracle, enter field information for the Service Name, Login ID, and Password of the database owner in the Data Source section. Enter the details in the following, as appropriate: "Migrate document FAQ rating/voting data for the last xxxxx days" refers to the bu_trans table. "Migrate audit data for the last xxxxx days" refers to the ci_asked_ques, ci_audit_trails and ci_audit_trail_data tables.
7.
8.
You may select the following: "Remove the KT 6.0 shortcuts" The KT 6.0 shortcuts will be deleted from Start->Programs->CA. "Redirect the KT 6.0 urls to the new installation at", and enter the url of the new Service Desk installation to which the KT 6.0 urls should be redirected after migration. This will redirect the KT 6.0 urls to R11.2, which means that R11.2 will be opened instead of KT 6.0. "Migrate the user's passwords to the default PIN field for users with", options as appropriate to migrate KT 6.0 user passwords to r11.2. Note: This option is available only for KT stand alone migration.
9.
10. Upon completion, copy the KTMigrationFiles folder to the destination indicated during the Knowledge Tools dialog. 11. Complete the Unicenter Service Desk/Knowledge Tools r11.2 migration. Once the Knowledge Tools and the Unicenter Service Desk migrations are complete, run the following Knowledge Tools command to reindex the Knowledge Documents:
NX_ROOT/bin/pdm_k_reindex.exe
Note: In some situations, the migration process may fail with a "Schema Validation" error. If the migration process fails, follow these steps: 1. 2. 3. From the command line, run "pdm_configure -m". Wait 3 minutes for it to complete (there will be no indication of completion). Manually invoke the migration utility from $NX_ROOT\bin\migrate_to_r11.vbs. Follow the instructions in the Migration Wizard to restart the migration process where it left off.
2.
3.
4.
5.
6. 7.
2.
3.
4.
Once migration is complete, you need to login as a contact that is using the out-of-box Administrator access type. You need to manually edit all Access type records that were created in the 6.0 version of Unicenter Service Desk. The Service Desk Analyst, Service Desk Administrator, Knowledge Manager and Knowledge System Administrator entries on the Web Interface tab need to be set as appropriate for using the Access type records. In order to improve Ingres Database Performance for Knowledge Tools, run the following command
bop_cmd -f reorg.frg "reorg()"
5.
This will reorganize the tables and recreate all indexes. This will take a while. Once the execution is complete, issue the following command:
ktoptdb
This will optimize the database on Knowledge Tool tables. It is recommended to run optimize DB after migration and also after importing large number of documents, especially on following tables: optimizedb -zk -umdbadmin mdb -rskeletons optimizedb -zk -umdbadmin mdb -rindex_doc_links optimizedb -zk -umdbadmin mdb -rebr_fulltext optimizedb -zk -umdbadmin mdb -rebr_fulltext_adm 6. If you are migrating from a release earlier than 6.0 of Unicenter Service Desk, note that the format of the val_fieldupdate_site() trigger has changed. Review the examples in $NX_ROOT\samples\call_mgt\chg_site.mod, cr_site.mod and iss_site.mod. This trigger can be used to automatically log changes to user-defined fields in the ticket's Activity Log. If you have an adaptation that uses this trigger, review your coding and adjust as necessary to ensure proper operation and prevent error messages in the logs. Once the Knowledge tools and the Unicenter Service Desk migration is completed run the following Knowledge Tools reindexing command:
NX_ROOT/bin/pdm_k_reindex.exe
7.
8.
6.0 forms in Unicenter Service Desk that include where clauses may not work properly after a migration. When using where clause in the htmpl file, it requires you to have the character, U, in front of the UUID type id, for example:
<PDM_LIST PREFIX=list WHERE="ANALYST_ID=U'$cst.id'" FACTORY="USP_PREFERENCES">
This modified PDM_LIST statement shows a list of the user preference records owned by the login user.
9.
Any code written in the 6.0 sitemods.js of Service Desk that is called from an htmpl page must be merged into the r11.2 sitemods.js of Service Desk before the code will work.
10. After migration, you will be not be able to access the Web Interface as any user associated with an Access Type not delivered in your Service Desk 6.0 server. To enable web access for these Access Types, log into the Web Interface as a user with Administrator access, select the Administration tab, and enable the appropriate check boxes on the Web Interface and Knowledge Tools tabs. 11. The HTML formatted Activity Notification Message Templates that can be used with email notifications are new in the r11.2 version of Unicenter Service Desk. These HTML Message Templates are installed during the r11.2 installation, but are not installed during migration from the 6.0 version of Unicenter Service Desk. If the recipient's email reader supports HTML, it will show the HTML message rather than the plain text message. If you have customized your Message Templates, your customizations will not be included in the new HTML templates. These HTML Message Templates are supplied in files, and can be loaded if you would like to use them. The files are located in the $NX_ROOT\samples\data directory:
Message Templates Sample HTML Message Templates for Change Orders Sample HTML Message Templates for Request Sample HTML Message Templates for Issues Sample HTML Message Templates for Requests, Problems and Incidents for ITIL installations
Before loading these templates, it is recommended that you backup the following tables containing your existing Message Templates: pdm_extract Act_Type > aty_backup.dat pdm_extract Spell_Macro > macro_backup.dat The new files can then be loaded. For example pdm_load f html_ntf_chg.dat. To display an e-mail notification containing multi-byte characters correctly on your e-mail client, you need to do the following changes in NX.env file and re-cycle the services: By default on localized OS (for example, Win2K3-Japanese) with English Service Desk installed, the NX.env file contains the following entries:
NX_CHARSET = <charset supported by the localized OS >
(for Windows-Japanese, it is "shift_jis") On Linux, NX.env by default contains the following entries:
NX_CHARSET = <corresponding character set of the localized Language entered on Character Encoding screen during configuration of Service Desk>
For example: euc-jp for Japanese Linux, gb2312 for Simplified Chinese, and so on.
NX_MAIL_SMTP_HEADER_CHARSET = iso-8859-1 (regardless of the language) NX_MAIL_SMTP_BODY_CHARSET=iso-8859-1 (regardless of the language)
12. After migrating to r11.2 of Service Desk, if you had a custom.ver version control file in 6.0 of Service Desk, you must remove the file and create a new custom.ver file for r11.2 of Service Desk. 13. If you use customized access types and data partitions in the previous Service Desk release, see: Adjusting Access Type and Data Partition Settings After Migration in this section.
If you prefer to view the full contents of the duplicate rows, the following alternative syntax can be used: Ingres:
select * from chgcat where upper(char(code)) in (select upper(char(code)) FROM chgcat GROUP BY upper(char(code)) HAVING (COUNT(UPPER(char(code))) > 1))
Next, you will need to verify the Majic code Constraint settings for both the SKELETONS table (used for Knowledge Documents) and the O_INDEXES table (used for Knowledge Categories). 1. 2. In the left tree, click the Data Partition Constraints book under Security> Data Partitions. Click on the Show Filter button and enter the Data Partitions used in previous steps. You can use the Table Name field in the Search area to limit your list. For example, enter SKELETONS or O_INDEXES in the Table Name field and click the Search button.
The typical out-of-the-box settings for Constraints are listed as follows: Constraint Settings for Customer (like) and Employee (like) Data Partitions should be: SKELETONS table: View constraint as: 'SKELETONS READ_PGROUP in @root.pgroups and ACTIVE_STATE = 0' Pre-update and Delete constraint: 'id = 0' (Note that id=0 means no access)
O_INDEXES table: View constraint as: READ_PGROUP in @root.pgroups Pre-update and delete constraint: WRITE_PGROUP in @root.pgroups Constraint Settings for Service Desk Analyst (like), Knowledge Managers (like) and Knowledge Engineers (like) should be: SKELETONS table: View constraint as: (ACTIVE_STATE >=0 )and (READ_PGROUP in @root.pgroups OR (ACTIVE_STATE > 0 AND ASSIGNEE_ID = @root.id) OR (ACTIVE_STATE = 0 AND OWNER_ID = @root.id)) Active Pre-update and delete constraint: (ACTIVE_STATE >= 0) AND (WRITE_PGROUP in @root.pgroups OR (ACTIVE_STATE > 0 AND ASSIGNEE_ID = @root.id) OR (ACTIVE_STATE = 0 AND OWNER_ID= @root.id)) Active
O_INDEXES table: View constraint as: READ_PGROUP in @root.pgroups Pre-update and delete constraint: WRITE_PGROUP in @root.pgroups
3.
4.
6.
Migration to the r11.2 version of Unicenter Service Desk will retain the customizations on the forms from the 6.0 version of Unicenter Service Desk. However, you will not see the new r11.2 functionality on the migrated customized forms. If you need the r11.2 functionality and would like to preserve your customizations, you will have to redo the customizations on a base r11.2 form, which has the new functions. If you want to upgrade to the r11.2 version of Unicenter Service Desk from a version earlier than 6.0, you will need to first upgrade to the 6.0 version, and then upgrade to the r11.2 version. In this case too, migration retains the customizations in the 6.0 version of Unicenter Service Desk, and you need to redo the customizations on a base 6.0 form, if you need the new functionalities and want to retain the customizations.
7.
The following lists the source/target directories and the files that will be copied: 1. From the 6.0 version of Unicenter Service Desks NX_ROOT/migrate/tor11/prer11/bopcfg/www/htmpl/web/analyst to the r11.2 version of Unicenter Service Desks NX_ROOT/bopcfg/www/htmpl/web/analyst/legacy: ci_search.htmpl detail_cr_prp_edit.htmpl detail_crkn.htmpl detail_iss_prp_edit.htmpl detail_mfr_ro.htmpl detail_vp.htmpl do_svy.htmpl list_mfr.htmpl list_vp.htmpl nr_prop_tab.htmpl svy_thanks.htmpl tour_content.htmpl tour_frames.htmpl view_svy.htmpl xx_alg_tab.htmpl xx_resln_tab.htmpl
2.
From the 6.0 version of Unicenter Service Desks NX_ROOT/migrate/tor11/prer11/bopcfg/www/htmpl/default to the r11.2 version of Unicenter Service Desks NX_ROOT/bopcfg/www/htmpl/default/legacy: help_frameset.htmpl cst_ci_search.htmpl loginerr.htmpl
3.
From the 6.0 version of Unicenter Service Desks NX_ROOT/migrate/tor11/prer11/bopcfg/www/macro to the r11.2 version of Unicenter Service Desks NX_ROOT/site/mods/www/macro: kt_search_str.mac
4.
From the 6.0 version of Unicenter Service Desks NX_ROOT/migrate/tor11/prer11/bopcfg/www/wwwroot/html to the r11.2 version of Unicenter Service Desks NX_ROOT/site/mods/www/wwwroot/html: cst_menubar.html Note: The customization in the html file needs to be merged to R11.1. Keep the customized html file under html directory can cause problem.
5.
From the 6.0 version of Unicenter Service Desks NX_ROOT/migrate/tor11/prer11/bopcfg/www/wwwroot/css to the r11.2 version of Unicenter Service Desks NX_ROOT/site/mods/www/wwwroot/css: tour.css
6.
From the 6.0 version of Unicenter Service Desks NX_ROOT/migrate/tor11/prer11/bopcfg/www/wwwroot/img to the r11.2 version of Unicenter Service Desks NX_ROOT/site/mods/www/wwwroot/img: bg_lines_dark.gif bg_lines_medium.gif bg_lines_light.gif ca_sheet.gif button_middle.gif button_middle_down.gif button_middle_active.gif button_left_down.gif button_left.gif button_right.gif button_right_active.gif
button_right_down.gif button_left_active.gif pb_blank.gif pb_vert.gif corner.gif button_middle_ns.gif pb_folder.gif books04.gif ca_logo_black.gif nsm_banner.gif sdo_banner.gif about_top.jpg amo_banner.gif kt_banner.gif tour_lines.gif tour_feature.gif tour_page.gif tour_bottombanner.jpg tour_topbanner.jpg
For SQL Server, the scripts are stored in NX_ROOT/samples/views/SQLServer. To install the views, issue the following command:
osql -E -n < SQLCreateMigViews.sql
For Oracle, the scripts are stored in NX_ROOT/samples/views/Oracle. To install the views, issue the following command:
sqlplus mdbadmin/<password> < OracleCreateMigViews.sql
LoadTable ### ca.gcf.util.SqlEx: Table 'table_name' does not exist or is not owned by you LoadTable ### Can not find column column_name in table table_name LoadTable ### Processing has stopped for this table because the target database does not contain the column noted in the above message These errors may occur if migration has difficulty processing user-defined tables or columns. Please contact technical support if you encounter these error messages. LoadTable ### ca.gcf.util.SqlEx: No value specified for mandatory column 'column_name' This error occurs when migration attempts to insert a row which does not have a value for a column that is mandatory in the r11.2 version of Unicenter Service Desk. Data in the previous informational message will assist in locating the row which is causing this error. AddIndex ### ca.gcf.util.SqlEx: INDEX: table could not be indexed because rows contain duplicate keys This error occurs when the rows loaded by migration contain duplicate values for the key, while a secondary index has a unique key constraint. There are two reasons for this error. If the 6.0 database in Unicenter Service Desk already contained duplicate keys If the 6.0 database in Unicenter Service Desk contained references to invalid keys which no longer exist. These invalid references are identified and logged in Phase 2. Phase 2 creates a Migration Generated Entry in the referenced table so that the reference is no longer invalid. To avoid excessive generation of these migration rows, in many cases, but not all, only one such row is created for a particular table, even though more than one value may have been invalid. This situation can lead to the duplicate key error message. For example, you may receive this error for the hier_x0 index if there were multiple invalid parent or child references pointing to a single Migration Generated Entry row. Refer to the informational message directly above this error for details about the index and its keys. Use this information and the Invalid SREL (foreign key) messages from Phase 2 to query the r11.2 database in Unicenter Service Desk to identify duplicate key values. It is important to correct these duplicates so that the index can be added. For Beta2, use sql to add the index, using the syntax provided in the log message, after the error is corrected.
AddIndex ### ca.gcf.util.SqlEx: Could not add a REFERENTIAL CONSTRAINT. Some rows in table 'table_name1' do not have matching keys in table 'table_name2'. This error occurs when tables fail to load completely when migration attempts to add the referential constraints. The r11.2 version of Unicenter Service Desk includes referential constraints which did not exist in the 6.0 version. In addition, there are some columns in the r11.2 version database whose values will default to "0" if no value is supplied. An example is the resource_class column in the ca_owned_resource table. If one or more of the 6.0 Network_Resource rows did not include a value for resource_class, and you do not have a General_Resource_Class row for id = 0, you will receive this error. Use the information provided in the preceding message to identify the index column(s) in error. It is necessary to correct these references so that the index can be added. For Beta2, use sql to add the index, using the syntax provided in the log message, after the error is corrected. AddIndex ### java.sql.SQLException: [Microsoft][SQLServer 2000 Driver for JDBC][SQLServer]There is already an index on table 'table_name' named 'index_name' This error, as identified in the log messages which precedes this message, indicates that migration is attempting to recover from a prior execution of migration, which failed in the middle of the step while adding the indexes. You may receive this duplicate error because some of the indexes had already been added. Ignore this error.
Include Portlets
To include Unicenter Service Desk portlets in the portal: 1. Log onto the Unicenter Service Desk and click Search from the Options Manager on the Administration tab. The Options List window appears. 2. Click on Portal_Safe_List. The Portal_Safe_list Detail window appears. 3. Enter the machinename:portnumber where the portal was installed in the Options Value Field. For more information on what this option does, see the online help. Click Install. Restart Unicenter Service Desk daemon. Login to the portal as an administrator. Create a user which is valid Unicenter Service Desk User. For more information on how to create a user, see the portal documentation. Note: The password used while creating this user in the portal could be different from the password used by this same user to log into Unicenter Service Desk as Unicenter Service Desk authenticates the users for this integration using a combination of the following, username, a valid portal session and the portal install value if it exits in the PORTAL_SAFE_LIST option. 8. Select Knowledge from the main Portal menu bar. The Knowledge page appears. 9. Select Library from the left pane Knowledge bar. The Library tree appears in the left pane. 10. Select (or create then select, if necessary) a folder in the Library tree, then choose Publish File from the right pane Knowledge bar. The Publish File form opens. 11. Type the following Unicenter Service Desk portlet URL in the Content text box on the General Information tab:
http://hostname:portnumber/CAisd/PortalServlet?USERNAME=$USER.username$&PORTA LSESSION=$SESSION$&PORTALINSTALL=portalhostname:portalportnumber
4. 5. 6. 7.
Note: Substitute hostname:portnumber in the URL with the name and port of the web server on which Unicenter Service Desk resides. Substitute portalhostname:portalportnumber in the URL with the name and port of the web server on which Portal resides. 12. Type Unicenter Service Desk in the Title text box.
13. Click Advanced. The Advanced properties page of the Publish File form displays. 14. Type portal/variable-url in the Content (mime) Type field and click Publish. The published contents appear in the selected Library folder. 15. Configure the Workplace to show this portlet. 16. Log out and login as the newly created user. You should be automatically logged onto Unicenter Service Desk in the portlet you just created without logging on again. Note: While running Service Desk in the portlet, the preference, Avoid Popups, is not available in the Preference page and a popup window is always used regardless of the setting of the preference. To connect to the portal server, open a web browser, and enter the following URL in the location or address field:
http://<servername>:<port#>/servlet/portal
where: <servername> Specifies the server name (or IP address) of the portal server. <port#> Specifies the port number that the portal server monitors. You specified the port number during portal server installation. The default port is 8080.
Answer the prompts appropriately and enter 'changeit' as the password for both password prompts (you'd have other configuration steps if you use a different password). This sets up the certificate. 2. Edit the server.xml file located in:
$NX_ROOT/bopcfg/www/CATALINA_BASE/conf
3.
4.
Add keystoreFile attribute to server.xml. (When you run the command in step 1, a .keystore file gets created in the user's home directory. Add the reference to the keystoreFile attribute and Save the file. Your server.xml should look as follows.
<Connector className="org.apache.coyote.tomcat4.CoyoteConnector" port="8443" minProcessors="5" maxProcessors="75" enableLookups="true" acceptCount="100" debug="0" scheme="https" secure="true" useURIValidationHack="false" disableUploadTimeout="true"> <Factory className="org.apache.coyote.tomcat4.CoyoteServerSocketFactory" clientAuth="false" protocol="TLS" keystoreFile="location/.keystore" /> </Connector>
5. 6.
Restart Unicenter Service Desk. Test to check whether SSL works point your browser to https://machinename:8443. This should display a Security Alert dialogue. Click Yes. Note: SSL uses port 8443
7.
Replace the Service Desk portlet to use HTTPS and port 8443.
https://hostname:8443/CAisd/PortalServlet? USERNAME=$USER.username$&PORTALSESSION=$SESSION$&PORTALINSTALL=portalhostname :portalportnumber
c.
Navigate to the JRE bin directory (PORTAL_Install_Dir\ jre\bin) on the portal server box to access the keytool utility that you will use for exporting the PORTAL Server certificate to a file. Access the keytool utility, using the following command: keytool -export -alias tomcat -file umpserver.cer -keystore "c:\Program Files\CA\SharedComponents\Unicenter Management Portal\UMPkeystore" Enter keystore password: changeit Certificate stored in file <umpserver.cer> Note: When prompted for the password, be sure to use the password obtained from step 2b. In the previous example, changeit is the password noted in step 2b. The keystore location is also obtained from step 2b.
d.
3.
Import the certificate obtained from the server to the box containing the Unicenter Service Desk installation by using the keytool utility, as follows: a. On the Unicenter Service Desk box, navigate to the JRE\bin directory directory, typically at the following location: C:\Program Files\CA\SharedComponents\JRE\bin. b. The certificate should be imported into the Certification authority used by the Service Desk Java Virtual Machine. The following is an example of an import. In this example, the location of the Certificate authority is C:\Program Files\CA\SharedComponents\JRE\1.4.2_06\lib\security\cacerts. When prompted for a pwd , you will enter changeit. When prompted for Trust this certificate, you will enter Yes. Keytool.exe -import -alias tomcat -trustcacerts -file umpserver.cer keystore "C:\Program Files\CA\SharedComponents\JRE\1.4.2_06\lib\security\cacerts"
Enter keystore password: changeit Owner: CN=ump001.ca.com, OU=unicenter, O=ca, L=islandia, ST=ny, C=us Issuer: CN=ump001.ca.com, OU=unicenter, O=ca, L=islandia, ST=ny, C=us Serial number: 43ecb469 Valid from: Fri Feb 10 10:42:33 EST 2006 until: Thu May 11 11:42:33 EDT 2006 Certificate fingerprints: MD5: A1:AF:AE:92:39:2E:53:D5:1C:6D:FE:44:68:61:DD:5C SHA1: 66:3A:BC:77:32:81:60:89:70:B9:EF:FB:74:3D:93:74:CD:8E:E2:D2 Trust this certificate? [no]: yes Certificate was added to keystore Note: When prompted for the password, use the password obtained from step 2b. In the previous example, changeit is the password noted in step 2b. 4. Edit the file portal-xml-api.xml under $NX_ROOT\bopcfg\www\CATALINA_BASE\webapps\CAisd\WEBINF\xml\portal-xml-api.xml by doing the following: a. Replace http in the line: <!DOCTYPE PORTAL SYSTEM "http://127.0.0.1:8080/servlet/media/xml/api/request.dtd"> With https: <!DOCTYPE PORTAL SYSTEM "https://127.0.0.1:8080/servlet/media/xml/api/request.dtd"> b. c. Save the file. If Portal_Safe_List has been installed, make sure you change the portnumber to 8443 and the machine name to include the domain name (for example, machinename.ca.com:8443). Note: It is important to include the domain name in the machinename as the portal certificate contains the domain name. For more information, see "Create a Security Certificate" in the Portal's Getting Started Guide. If Portal_Option_List is not installed, see Include Portlets in this guide, and follow steps 1 through 4.
5. 6.
Recycle the Unicenter Service Desk server. From Portal, connect to the Service Desk Portlet using the the following url:
http://hostname:portnumber/CAisd/PortalServlet?USERNAME=$USER.username$&PORTA LSESSION=$SESSION$&PORTALINSTALL=machinename:8443
Note: Substitute machinename in the url with the name of the web server on which Portal resides. The machine name in this url should include the domain name, for example, machinename.ca.com:8443. Substitute the hostname:portnumber in the url with the name and port of the web server on which Unicenter Service Desk resides.
Appendix C: Using Unicenter Software Delivery to Install and Configure Windows Clients
If your enterprise has purchased and installed Unicenter Software Delivery, you can deploy the Unicenter Service Desk client remotely. The Service Desk Java Client package allows for an unattended installation and configuration of the client. Note: The Unicenter Software Delivery option can deploy Windows-based Service Desk clients only. This feature is not available for client deployment on LINUX.
Using Unicenter Software Delivery to Install and Configure Windows Clients 269
2. 3.
Click as necessary in the tree view to navigate to the Software Library, All Software branch. Right-click All Software and select New, Software from the shortcut menus. The New Software dialog appears.
4.
Enter the name and version of the software item with alphanumeric characters. (The vendor and comment fields are optional). Name Unicenter Service Desk Client Win32 [en-US] r11.2 Version r11.2 Vendor CA, Inc. Comment Unicenter Service Desk Client Win32 [en-US] r11.2
5.
Click OK. Expand the tree view of the software package to enable display of the source image, procedures, and a registry of the installation records.
6.
Right-click Source and select New volume, From Files from the shortcut menu. The Create new volume dialog appears.
7.
Enter the name with alphanumeric characters. Name Administrative Client Win32
8. 9.
Click OK. Place the Unicenter Service Desk installation media into your CD/DVDROM drive and from the Windows Explorer, Select All (except the reginfo directory) and Copy.
10. Drag and drop these directories/files into the Source folder. 11. Right-click Procedures and select New, Procedure from the shortcut menus. The Register procedure dialog appears. 12. Enter the name for the procedures folder and comment with alphanumeric characters. Name Install Comment Installs the Service Desk Administrative Client (Windows) using \winclnt.32\Disk1\setup.exe /s. The /s option specifies an unattended installation using the default response file: setup.iss. 13. Select the Embedded File tab.
Using Unicenter Software Delivery to Install and Configure Windows Clients 271
14. Enter the details to invoke the procedure, such as: File setup.exe Subpath winclnt.32\disk1 Volume Administrative Client Win32 Type Executable file Parameters /s 15. Click OK. 16. Right-click on Unicenter Service Desk Java Client Win32 [en-US] r11.2 in the Software Library tree, and select Seal from the shortcut menu. The Unicenter Service Desk package is sealed, making it available for delivery through Unicenter Software Delivery. A registered package named "Unicenter Service Desk Java Client Win32 [en-US] r11.2" displays in the All Software branch under Software Library.
Using Unicenter Software Delivery to Install and Configure Windows Clients 273
3.
Click as necessary to navigate to the appropriate destination under the All Computers and Users branch, then right-click the selected destination computer or user and click Paste, Software/Procedures to Schedule Jobs with Default Settings from the shortcut menu.
4.
The job runs. To view the job status and targets, navigate to the Job Containers branch in the Tree View. For more information, see the Unicenter Software Delivery Administrator Guide.
Using Unicenter Software Delivery to Install and Configure Windows Clients 275
CA Product Currently Using CAISDI Advantage EDBC BrightStor CA-1 BrightStor CA-Allocate BrightStor CA-Disk BrightStor CA-Dynam/TLMS BrightStor CA-Vantage
Unicenter NetMaster Network Management for TCP/IP integNetMaster.dat Unicenter NetMaster Network Management for SNA Unicenter NetMaster Network Automation Unicenter NetMaster Network Performance Unicenter NetMaster Network Operations for TCP/IP Unicenter NetMaster File Transfer Management Unicenter NeuMICS integNetMaster.dat integNetMaster.dat integNetMaster.dat integNetMaster.dat integNetMaster.dat integNeuMICS.dat
CA Product Planning to Use CAISDI Allfusion CA-2e Unicenter AutoSys Job Management Unicenter CA-Bundl Unicenter CA-11 Restart and Tracking Unicenter CA-Connect CA-DASDCheck (?) Allfusion CA-Datamacs Allfusion Date Simulator Unicenter CA-Deliver Output Management Unicenter CA-Dispatch Output Management BrightStor CA-FAVER VSAM Data Protection
DAT file integ2e.dat integAutoSys.dat integBundl.dat integCA11.dat integConnect.dat integDASD.dat integDatamacs.dat integDate.dat integDeliver.dat integDispatch.dat integFaver.dat
Allfusion CA-FileAge Allfusion CA-FileMaster Plus CA-Filesave/RCS Allfusion Gen (?) Unicenter GSS (Common component) Allfusion CA-InterTest Unicenter CA-JCLCheck Utility Unicenter CA-Jobtrac Job Management Allfusion Joe Unicenter CA-LPD Report Convergence Allfusion CA-Optimizer Allfusion CA-Optimizer/II Allfusion Plex Unicenter CA-Scheduler Job Management Unicenter CA-Spool Print Management Allfusion CA-SymDump Allfusion CA-Verify Unicenter CA-View Output Archival and Viewing
integFileAge.dat integFileMaster.dat integFileSave.dat integGen.dat integGSS.dat integInterTest.dat integJCLCheck.dat integJobtrac.dat integJoe.dat integLPD.dat integOptimizer.dat integOptimizerII.dat integPlex.dat integScheduler.dat integSpool.dat integSymDump.dat integVerify.dat integView.dat
asset
myco_demo.caz This file contains a sample Business Process View that can be used to test Change Impact Analyzer.
call_mgt
Contains samples for customization in request management. gencr.frg This file can be used in conjunction with bop_cmd to create requests from a command line. All notifications and activity log entries will occur, however no Request Form will display on the server when created. Be sure to read the gencr_readme.txt file to learn the syntax, and how to modify it if necessary. The file should be placed in $NX_ROOT/site/mods/interp, if the directory does not exist, you should create it. iss_site.mod This file can be used to enable activity logging of site-adapted fields in issues. This file should be placed in $NX_ROOT/site/mods/majic after it has been changed for the site-adapted fields. cr_site.mod This file can be used to enable activity logging of site-adapted fields in requests. This file should be placed in $NX_ROOT/site/mods/majic after it has been changed for the site-adapted fields. chg_site.mod This file can be used to enable activity logging of site-adapted fields in change orders. This file should be placed in $NX_ROOT/site/mods/majic after it has been changed for the site-adapted fields. gencr_readme.txt This file contains instructions on how to use the gencr.frg file. chg_site.spl This file may be modified to change the mapping of attributes when creating a change order from a request. This file should be placed in $NX_ROOT/site/mods/majic after the appropriate changes have been made. audlog_site.mod This file can be used to enable audit logging of site-adapted fields. This file should be placed in $NX_ROOT/site/mods/majic after it has been changed for the site-adapted fields.
Notify_add.spl (UNIX only) This file can be used to add the requests log agent, assignee and group to the request notification list. This file should be placed in $NX_ROOT/site/mods/majic. Notify_replace.spl (UNIX only) This file can be used to add the requests log agent, assignee and group to the request notification list when they are changed. This file should be placed in $NX_ROOT/site/mods/majic.
data
Sample data for loading into the database. As noted, modifications may have to be made before using with your system. html_ntf_chg.dat This file contains sample html notifications for change orders. A pdm_userload can be run using this file to load the sample notifications. This would only need to be done on a system that has been migrated from 6.0. html_ntf_cr.dat This file contains sample html notifications for requests. A pdm_userload can be run using this file to load the sample notifications. This would only need to be done on a system that has been migrated from 6.0. html_ntf_iss.dat This file contains sample html notifications for issues. A pdm_userload can be run using this file to load the sample notifications. This would only need to be done on a system that has been migrated from 6.0. html_ntf_itil.dat This file contains sample html notifications for systems configured for using the ITIL methodology. A pdm_userload can be run using this file to load the sample notifications. This would only need to be done on a system that has been migrated from 6.0.
i18n
Contains resources and scripts necessary to build the products global resource and message catalogs. Note: Other Java components utilize Java resource bundles for their UI strings and messages. Reports, forms, and base-data also contain elements appearing on the user-interfaces and are defined in formats. For more information on this, see the Modification Guide. This catalog is a repository for user interface (UI) strings and messages utilized by most compiled components and the UI elements of the Service Desk interface (excluding form definitions). The i18n directory further contains a backup copy of the initial out-of-box catalog: pdm.dll (Windows) and pdm.cat (Linux/UNIX). The runtime copy used by the system can be found in %NX_ROOT%\bin\pdm.dll (Windows) and $NX_ROOT/fig/cfg/pdm.cat (Linux/UNIX). pdm.mc (Windows only) This file is an executable that is used to create a pdm.dll file. pdm.dll (Windows only) This file contains messages used by Unicenter Service Desk and Unicenter Knowledge Tools. pdm.def (Windows only) This file is used in creating the pdm.dll file. makei18ndll.bat (Windows only) This batch file is run to create the pdm.dll file. makei18ncat (UNIX only) This script file is run to create the pdm.cat file. pdm.cat (UNIX only) This file contains messages used by Unicenter Service Desk and Unicenter Knowledge Tools. pdm.txt (UNIX only) This file contains messages in text format used by Unicenter Service Desk and Unicenter Knowledge Tools.
5. 6.
macro_lock
This file contains a spel fragment that can be run using a bop_cmd to turn off locks that are being held by macros.
ntf_meth
These are sample notification methods. As noted, modifications may have to be made before using them with your system. Setup instructions are included in this section. These scripts are all written to run with a Bourne shell interpreter. Note: Under UNIX, these scripts will run as written. However, on Windows NT, either a third party Bourne shell interpreter must be installed on the server or the scripts need to be rewritten as complied c files, or .bat files. Another possibility is to install a Perl interpreter and translate the scripts to Perl. hp.pdm_pager0 (UNIX Only) hp.pdm_pager1(UNIX Only) hp.sendpage0(UNIX Only) hp.sendpage1(UNIX Only) pager.p(UNIX Only) sun.pdm_pagera(UNIX Only) sun.pdm_pagerb(UNIX Only) sun.sendpagea(UNIX Only) sun.sendpageb(UNIX Only) These files contain sample notification methods for pagers. These are only examples and will not necessarily work with different pagers. pager_notify.pl This file contains a sample perl script that could be modified and used as a notification method for pagers. Note that it is only a sample and may not necessarily work with different pagers.
pdmconf
web.xml.tpl pdm_startup.tpl pdm_edit_usage_notes.htm alias_install.bat web.cfg.tpl pdm_startup.i.tpl pdm_edit.pl README_files All of these files are used by pdm_edit.pl to create startup files for a primary server and secondary servers that are configured to run a variety of daemons.
sdk
This directory contains a sample file for making Unicenter Service Desk web service calls.
sql
ingres_lockdown_sd_only.sql This file contains a set of REVOKE statements which will remove the SELECT privilege on Unicenter Service Desk tables from PUBLIC access. You may want to run this script in order to manage who has access to these tables. ingres_lockdown_common.sql This file contains a set of REVOKE statements which will remove the SELECT privilege on CA Common tables from PUBLIC access. You may want to run this script in order to manage who has access to these tables.
views
ingres IngresCreateMigViews This file contains views for an Ingres database that could be used to allow most reports written for earlier releases to continue to work until the reports can be rewritten to support the current table structures. Loading these view should only be required to support customized reports written for previous release. IngresDropMigViews This file contains commands to drop the migration views from an Ingres database.
b. c. d.
For a UNIX installation: 1. Run the command tar -xvf SampleData.tar from $NX_ROOT/samples/data. If you wish to customize field data, follow the steps in the Customize Field Data section before moving on to the next step. 2. There are four shell files located at $NX_ROOT/bin, which can be run from a command window. These files include the following: a. ImportSampleData.sh - loads all the sample data files (ImportKnowledgeBroker.sh, ImportPCHowTo.sh, ImportRightAnswers.sh) ImportKnowledgeBroker.sh sample data provided by Knowledge Broker ImportPCHowTo.sh sample data provided by PCHowTo ImportRightAnswers.sh sample data provided by Right Answers
b. c. d.
Changing the Imported Document Status: By default, the status of an imported document is Published. If you need to change the status to Draft, perform the following procedure for every imported document you want changed to the Draft status: 1. Open Headings.txt located in $NX_ROOT/site/cfg. A template appears containing the property of Status, with the default value of Published. 2. 3. 4. Change Published to Draft. Open ImportKnowledgeBroker.bat and ImportSampleData.bat for Windows or ImportKnowledgeBroker.sh and ImportSampleData.sh for Unix. Replace all words "Published" with "Draft".
Note: These changes should be completed before running any .bat (Windows) or .sh (Unix) file.
2. If the Product is an alpha or beta version of the program, hereinafter referred to as the beta program or beta version and not generally available to date, CA does not guarantee that the generally available release will be identical to the beta program or that the generally available release will not require reinstallation. Licensee agrees that if it registers for support or if otherwise required by CA, Licensee shall provide CA with specific information concerning Licensees experiences with the operation of the Product. Licensee agrees and acknowledges that the beta version of the Product (a) is to be used only for testing purposes and not to perform any production activities unless CA shall have otherwise approved in writing and (b) has not been tested or debugged and is experimental and that the documentation may be in draft form and will, in many cases, be incomplete. Licensee agrees that CA makes no representations regarding the completeness, accuracy or Licensees use or operation of the beta version of the Product. BETA PRODUCTS ARE PROVIDED ON AN AS IS BASIS, WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED INCLUDING, WITHOUT LIMITATION, ANY WARRANTIES OR REPRESENTATIONS OF TITLE OR NON-INFRINGEMENT. If Licensee is also a Tester of the beta version of the Product (as Tester is defined by the Beta Testing Agreement that was agreed to by Licensee during the registration process before obtaining the beta version of the Product), Licensee agrees that the terms of this Agreement are in addition to, and do not supersede, the terms of the Beta Testing Agreement. 3. If the Product is being licensed on a trial or evaluation basis, Licensee agrees to use the Product solely for evaluation purposes, in accordance with the usage restrictions set forth in Section 1, for a thirty-day evaluation period unless a different period is otherwise noted (the Trial Period). At the end of the Trial Period, Licensees right to use the Product automatically expires and Licensee agrees to de-install the Product and return to CA all copies or partial copies of the Product or certify to CA in writing that all copies or partial copies of the Product have been deleted from Licensees computer libraries and/or storage devices and destroyed. If Licensee desires to continue its use of the Product beyond the Trial Period, Licensee may contact CA to acquire a license to the Product for the applicable fee. LICENSEES USE OF THE PRODUCT DURING THE TRIAL PERIOD IS ON AN AS IS BASIS WITHOUT ANY WARRANTY, AND CA DISCLAIMS ALL WARRANTIES INCLUDING, WITHOUT LIMITATION, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE, AS WELL AS ANY EXPRESS WARRANTIES PROVIDED ELSEWHERE IN THIS AGREEMENT.
4. If the Product includes a Software Development Kit (SDK), the terms and conditions of this paragraph apply solely for the use of the SDK. The SDK may include software, APIs and associated documentation. The SDK is provided solely for Licensee's internal use to develop software that enables the integration of third party software or hardware with the Product, or to develop software that functions with the Product, such as an agent. Licensees use of the SDK is restricted solely to enhance Licensees internal use of the Product. No distribution rights of any kind are granted to Licensee regarding the Product. In addition to the limitations on use set forth in Section 8, below, Licensee may not reproduce, disclose, market, or distribute the SDK or the documentation or any applications containing any executable versions of the SDK to third parties, on the internet, or use such executables in excess of the applicable Authorized Use Limitation. If there is a conflict between the terms of this section and the terms of any other section in this Agreement, the terms of this section will prevail solely with respect to the use of the SDK. TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW, AND NOTWITHSTANDING ANYTHING CONTAINED HEREIN TO THE CONTRARY, THE SDK IS PROVIDED AND LICENSED "AS IS" WITHOUT WARRANTY OF ANY KIND. 5. Payment of the fees specified on the Order Form or as agreed between Licensee and an authorized reseller of CA, shall entitle Licensee to use the Product for the term specified on the Order Form (the Term), which use may include the right to receive maintenance services therefore for the period set forth on the Order Form. After the Term, continued usage and/or maintenance of the Product as provided herein shall be subject to the payment by Licensee of the fees described on the Order Form. Notwithstanding the foregoing, if the Product was licensed under this Agreement without an Order Form, Licensee shall be entitled to use the Product for an indefinite period, but the license does not include the right to receive maintenance services. Notwithstanding the foregoing, with respect to any Product that relies on continuous content updates, such as signature files and security updates, Licensee shall be entitled to such content updates for a period of one (1) year from the effective date of the license. 6. If maintenance is provided by CA, it shall be renewed annually (except as otherwise provided in the Order Form) and Licensee agrees to pay the annual renewal maintenance fee, unless either party gives the other at least 20 days written notice of non-renewal. All fees are net of applicable taxes. Licensee agrees to pay any tariffs, duties or taxes imposed or levied by any government or governmental agency including, without limitation, federal, state and local, sales, use, value added and personal property taxes, (other than franchise and income taxes for which CA is responsible) upon a presentation of invoices by CA. Any claimed exemption from such tariffs, duties or taxes must be supported by proper documentary evidence delivered to CA. Any invoice which is unpaid by Licensee when due shall be subject to an interest charge equal to the lower of 1.5% per month or the highest applicable legal rate.
7. Licensee may use the Product as provided herein solely to process its own data and the data of its majority-owned subsidiaries and use is restricted to the location, computer equipment, and Authorized Use Limitation specified on the Order Form or CD sleeve, as applicable. If Licensee desires to use the Product beyond such restrictions, it shall notify CA, and Licensee will be invoiced for and shall pay the applicable fees for such expanded use.
8. The Product, including any source or object code that may be provided to Licensee hereunder, as well as documentation, appearance, structure and organization, is the proprietary property of CA and/or its licensors, if any, and may be protected by copyright, patent, trademark, trade secret and/or other laws. Title to the Product, or any copy, modification, translation, partial copy, compilation, derivative work or merged portion of any applicable SDK, shall at all times remain with CA and/or its licensors. Usage rights respecting the Product may not be exchanged for any other CA product. The Product is licensed as a single product. Its component parts may not be separated for use. Licensee and its employees will keep the Product and the terms of this license strictly confidential and use its best efforts to prevent and protect the Product from unauthorized disclosure or use. Licensee may not (i) disclose, de-compile, disassemble nor otherwise reverse engineer the Product except to the extent the foregoing restriction is expressly prohibited under applicable law; (ii) create any derivative works based on the Product; (iii) use the Product to provide facilities management or in connection with a service bureau or like activity whereby Licensee, without purchasing a license from CA for such purpose, operates or uses the Product for the benefit of a third party who has not purchased a copy of the Product; or (iv) permit the use of the Product by any third party without the prior written consent of CA. Licensee shall not release the results of any benchmark testing of the Product to any third party without the prior written consent of CA. Licensee will not transfer, assign, rent, lease, use, copy or modify the product, in whole or in part, or permit others to do any of the foregoing with regard to the Product without CAs prior written consent, except to the extent the foregoing restriction is expressly prohibited under applicable law. Licensee will not remove any proprietary markings of CA or its licensors. Licensee may copy the Product as reasonably required for back-up and disaster recovery purposes, provided that production use of the Product is restricted to the Authorized Use Limitation specified on the Order Form or CD sleeve, and provided that use of the Product for disaster recovery testing shall be limited to one week in any three month period. The Product may be used only within the boundaries of the country where the Product was purchased (except as otherwise provided on the Order Form) unless CA consents otherwise in writing. If this license terminates for any reason, Licensee shall certify to CA in writing that all copies and partial copies of the Product have been deleted from all computers and storage devices and are returned to CA or destroyed and are no longer in use. All fees payable hereunder shall be payable in advance. Licensee will install each new release of the Product delivered to Licensee. Licensee shall comply with all relevant import and export regulations, including those adopted by the Office of Export Administration of the US Department of Commerce. The Product and any accompanying documentation have been developed entirely at private expense. They are delivered and licensed as "commercial item" "computer software" as defined in FAR 2.101. If a Product is being acquired by or on behalf of the U.S. Government or by a U.S. Government prime contractor or subcontractor (at any tier), then the Government's rights to the Product and accompanying documentation will be only as set forth in this Agreement; and in accordance with FAR 52.227-14 Rights in Data-General, "Restricted Rights," any equivalent agency regulation or contract clause, or
such applicable successor provisions. CA is the manufacturer of the Product. This Agreement shall be governed by and interpreted in accordance with the laws of the State of New York, without regard to its choice of law provisions. 9. CA warrants that it can enter into this Agreement and that it will indemnify, hold Licensee harmless, and defend or, at its option, settle any claim that CA is not so authorized or that Licensees use of the Product as authorized hereby infringes any patent, copyright or other intellectual property right of any third party. CA also warrants that the Product will operate in accordance with its published specifications, provided that CAs only responsibility will be to use reasonable efforts, consistent with industry standards, to cure any defect. The foregoing warranty respecting the operation of the Product will be in effect only during any period for which Licensee shall have paid the applicable license fee and annual maintenance fee, or, with respect to Products licensed without an Order Form, during a period of ninety (90) days from Licensees acquisition of license for the Product. If, within a reasonable time after receiving Licensees written notice of breach of either of the above warranties, CA is unable to cause the Product to operate (a) without infringing a third partys intellectual property rights, or (b) in accordance with CAs written specifications, then either party may terminate this Agreement on written notice to the other party and CA or the authorized reseller will refund the relevant license fees paid for such non-compliant Product only when Licensee returns the Product to CA or its authorized reseller from whom it obtained the Product, with the purchase receipt within the warranty period noted above. The warranties set forth in this Section do not apply to beta versions of the Product, Product licensed on a trial or evaluation basis or to Software Development Kits. 10. EXCEPT AS SET FORTH ABOVE, TO THE FULL EXTENT PERMITTED BY APPLICABLE LAW: I. NO OTHER WARRANTIES, WHETHER EXPRESS OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE, ARE MADE BY CA; II. IN NO EVENT WILL CA BE LIABLE TO LICENSEE OR ANY OTHER PARTY FOR ANY CLAIM FOR LOSS, INCLUDING TIME, MONEY, GOODWILL, AND CONSEQUENTIAL DAMAGES, WHICH MAY ARISE FROM THE USE, OPERATION OR MODIFICATION OF THE PRODUCT, EVEN IF CA HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. IN THE EVENT THAT THE ABOVE LIABILITY LIMITATION IS FOUND TO BE INVALID UNDER APPLICABLE LAW, THEN CAS LIABILITY FOR SUCH CLAIM SHALL BE LIMITED TO THE AMOUNT OF THE LICENSE FEE ACTUALLY PAID FOR THE PRODUCT BY LICENSEE. NO THIRD PARTY, INCLUDING AGENTS, DISTRIBUTORS, OR AUTHORIZED CA RESELLERS IS AUTHORIZED TO MODIFY ANY OF THE ABOVE WARRANTIES OR MAKE ANY ADDITIONAL WARRANTIES ON BEHALF OF CA. CA DOES NOT WARRANT THAT THE PRODUCT WILL MEET LICENSEES REQUIREMENTS OR THAT USE OF THE PRODUCT WILL BE UNINTERRUPTED OR ERROR FREE.
11. Licensee may assign this Agreement only if Licensee complies with CAs then prevailing policies respecting assignment of licenses, which includes a requirement that the scope of use of the Product not be expanded beyond the business of Licensee and the business of Licensees majority-owned subsidiaries. CA may assign this Agreement to any third party that succeeds to CAs interests in the Product and assumes the obligations of CA hereunder; and CA may assign its right to payment hereunder or grant a security interest in this Agreement or such payment right to any third party. 12. If Licensee breaches any term of this Agreement or if Licensee becomes insolvent or if bankruptcy or receivership proceedings are initiated by or against Licensee, CA shall have the right to withhold its own performance hereunder and/or to terminate this Agreement immediately and, in addition to all other rights of CA, all amounts due or to become due hereunder will immediately be due and payable to CA. 13. If Licensee fails to pay the applicable maintenance fee, then Licensee may reinstate maintenance thereafter by paying to CA a fee equal to 150% of CAs then prevailing maintenance fee for each year for which the maintenance fee has not been paid. 14. If a court holds that any provision of this Agreement to be illegal, invalid or unenforceable, the remaining provisions shall remain in full force and effect. No waiver of any breach of this Agreement shall be a waiver of any other breach, and no waiver shall be effective unless made in writing and signed by an authorized representative of the waiving party. Any questions concerning this Agreement should be referred to Computer Associates International, Inc., One Computer Associates Plaza, Islandia, NY 11749, Attention: Worldwide Law Department. 15. In the event Licensee acquires a license for the Product outside of the United States, the following Sections will apply to the use of the Product: Notwithstanding the terms of the last sentence of Section 8, the laws of the country in which Licensee acquires a license for the Product shall govern this Agreement, except as otherwise provided below. In Albania, Armenia, Belarus, Bosnia/Herzegovina, Bulgaria, Croatia, Georgia, Hungary, Kazakhstan, Kirghizia, Former Yugoslav Republic of Macedonia (FYROM), Moldova, Romania, Russia, Slovak Republic, Slovenia, Ukraine and Federal Republic of Yugoslavia, the laws of Austria govern this Agreement. Argentina The CA subsidiary that is the licensor is Computer Associates de Argentina S.A. The last sentence of Section 8 is deleted and replaced with:
This Agreement shall be governed by and interpreted in accordance with the laws of Argentina. Any dispute hereunder shall be determined by the Tribunales de la Cuidad de Buenos Aires. The last sentence of Section 14 is deleted and replaced with: Any questions concerning this Agreement should be referred to Computer Associates de Argentina S.A, Avenida Alicia Moreau de Justo, 400, 2 piso, 1107, Buenos Aires - At.: Finance Department. Australia The CA subsidiary that is the licensor is Computer Associates Pty. Ltd. The following is added to each of the end of Sections 2, 3 and 10: Although CA specifies that there are no warranties, Licensee may have certain rights under the Trade Practices Act 1974 and other state and territory legislation which may not be excluded but may be limited. To the full extent permitted by law CA excludes all terms not expressly set out in the express terms of this Agreement, and limits any terms imposed by the Trade Practices Act 1974 and other state and territory legislation to the full extent permitted by the applicable legislation. The last sentence of Section 8 is deleted and replaced with: The laws of the State or Territory in which the transaction is performed govern this Agreement. The following is added to Section 10: Where CA is in breach of a condition or warranty implied by the Trade Practices Act 1974 or other state and territory legislation, CA's liability is limited, in the case of goods, to the repair or replacement of the goods, or payment for the repair or replacement of the goods, and in the case of services, the supplying of the services again or payment for the re-supply of the services, as CA may elect. Where that condition or warranty relates to a right to sell, quiet possession or clear title, in respect of goods or if the goods supplied by CA are of a kind ordinarily acquired for personal, domestic or household use or consumption, then none of the limitations in this Section apply. Austria The last sentence of Section 8 is deleted and replaced with: The laws of Austria govern this Agreement. The following is added to Section 8: In addition, CA is entitled to bring action against Licensee in a court located in Licensees place of incorporation, establishment or permanent residence.
The following is added to Section 10: Any liability for the slight negligence of CA is excluded. The following is added to the Agreement: In the event the Licensee qualifies as a consumer according to Austrian Consumer Protection Act (Konsumentenschutzgesetz -KSchG) Sections 2, 3, 9 and 10 of this Agreement are not applicable to the extent they reduce CAs liability and the consumers warranty. Belgium The CA subsidiary that is the licensor is Computer Associates S.A./N.V. The last sentence of Section 8 is deleted and replaced with: The courts of CAs registered office shall have exclusive jurisdiction regarding any dispute that may arise between the parties dealing with the formation, execution, interpretation, or termination of this Agreement, including but not limited to measures of conservation, emergency proceedings, warranty proceedings, petition or in case of more than one defendant. The last sentence of Section 14 are deleted and replaced with: Any question concerning this Agreement should be referred to Computer Associates S.A./N.V., Da Vincilaan 11, Box F2, Building Figueras, B-1935 Zaventem, Attention: Worldwide Law Department. Brazil The CA subsidiary that is the licensor is Computer Associates Programas de Programas de Computador Ltda. The last sentence of Section 8 is deleted and replaced with: This Agreement shall be governed by and interpreted in accordance with the laws of Brazil. Any dispute hereunder shall be determined by a court of the So Paulo City Hall. The last sentence of Section 14 is deleted and replaced with: Any questions concerning this Agreement should be referred to Computer Associates Programas de Programas de Computador Ltda, Avenida das Naes Unidas, 12901 - 6 andar - Torre Norte - So Paulo - SP, 04578-000, At.: Worldwide Law Department. Canada
The CA subsidiary that is the licensor is Computer Associates Canada Company. The last sentence of Section 8 is deleted and replaced with: The laws in the Province of Ontario shall govern this Agreement. Chile The CA subsidiary that is the licensor is Computer Associates de Chile S.A. The last sentence of Section 8 is deleted and replaced with: This Agreement shall be governed by and interpreted in accordance with the laws of Chile. Any dispute hereunder shall be determined by the Tribunales Ordinarios de la Cuidad de Santiago. The last sentence of Section 14 is deleted and replaced with: Any questions concerning this Agreement should be referred to Computer Associates de Chile S.A, Avenida Providencia 1760, piso 15 - Edificio Palladio, oficina 1501 - 6640709 Providencia - Santiago - At.: Finance Department. China The CA subsidiary that is the licensor is Computer Associates (China) Co., Ltd. The second sentence of Section 6 is deleted and replaced with: All fees are inclusive of VAT. The last sentence of Section 8 is deleted and replaced with: This Agreement shall be governed by and interpreted in accordance with the laws of the Peoples Republic of China, without regard to its choice of law provisions. Any dispute hereunder shall be determined by a competent court located in Beijing. Columbia The CA subsidiary that is the licensor is Computer Associates de Colombia S.A. The last sentence of Section 8 is deleted and replaced with: This Agreement shall be governed by and interpreted in accordance with the laws of Colombia. Any dispute hereunder shall be determined by the Tribunales Ordinarios de la Cuidad de Bogot. The last sentence of Section 14 is deleted and replaced with:
Any questions concerning this Agreement should be referred to Computer Associates de Colombia S.A, Avenida 82, numero 12-18, Oficina 305 - Santa F de Bogot, D.C., Colombia - At.: Finance Department. Czech Republic The first sentence of Section 1 is deleted and replaced with: CA grants the Licensee a non-exclusive license to use the Product, for use by a single user, or the quantity designated as the authorized use limitation ("Authorized Use Limitation") on any Order Form (defined below) referencing the terms of this Agreement or CD sleeve included within the Product box. The last sentence of Section 8 is deleted and replaced with: This Agreement shall be governed by and interpreted in accordance with the laws of the Czech Republic, without regard to its choice of law provisions. Any dispute hereunder shall be determined by a court of competent jurisdiction within the Czech Republic. Section 10 is deleted and replaced with: Except as set forth above, to the full extent permitted by applicable law, no other warranties, whether express or implied, including, without limitation, the implied warranties of merchantability and fitness for a particular purpose, are made by CA. Denmark The CA subsidiary that is the licensor is Computer Associates Scandinavia A/S. The third paragraph of the Preamble is deleted and replaced with: By installing, copying or using the product or by selecting the "I accept the terms of the License Agreement" radio button below, and the clicking on the Next button, you are: (i). Representing that you are not a minor and have full legal capacity and have the authority to bind yourself and your employer, as applicable, to the terms of this Agreement; (II). Consenting on behalf of yourself and/or as an authorized representative. The following is added to the last paragraph of the Preamble:
In the event that you select the I do NOT accept the terms of the License Agreement" radio button below, and then click on the Next button, the installation shall cease. You should delete all copies of the Product from your computer systems and return, by registered first class post, the Product, complete with box and any documentation, to CA or the authorized reseller from whom you purchased the Product with your proof of purchase within thirty (30) days of the date of purchase. You will promptly be issued a full refund of any license fees paid for the Product and, if applicable, maintenance fees paid. If requested at the time of return and provided that receipts of costs incurred are provided, CA or the authorized reseller shall also refund to you any postage costs you incurred in returning the Product. The second to last sentence of Section 2 is deleted and replaced with: Beta products are provided on an as is basis, without warranties or representations of any kind, either express or implied including, without limitation, any warranties, conditions or representations of merchantability or satisfactory quality and fitness for a particular purpose, as well as any express warranties provided elsewhere in this Agreement. The last sentence of Section 3 is deleted and replaced with: Licensees use of the product during the trial period is on an as is basis without any warranty, and CA disclaims all warranties including, without limitation, any implied warranties or conditions of merchantability or satisfactory quality and fitness for a particular purpose, as well as any express warranties provided elsewhere in this Agreement. The seventh sentence of Section 8 is deleted and replaced with: Licensee may not: I. Disclose, de-compile, disassemble nor otherwise reverse engineer the Product save to the extent expressly permitted by law; II. Create any derivative works based on the Product; III. Use the Product in connection with a service bureau or like activity whereby Licensee, without purchasing a license from CA for such purpose, operates or uses the Product for the benefit of a third party who has not purchased a copy of the Product; IV. Permit the use of the Product by any third party without the prior written consent of CA, save for contract staff of the Licensee who are acting on the Licensees business, not engaged in facilities management and who the Licensee agrees as a condition of this Agreement to ensure such contract staff shall comply with all the terms of this Agreement, including without limitation, confidentiality provisions.
Section 10. (A) is deleted and replaced with: No other warranties, whether express or implied, including, without limitation, any implied warranties or conditions of merchantability, satisfactory quality and fitness for a particular purpose, are made by CA; and The following is added at the end of Section 10: The foregoing exclusions and limitations upon liability shall not apply to any liability for damages arising from: a. Tangible property damage to the extent that such is due to the negligence of an employee or authorized agent of CA, in which event CAs maximum liability shall be limited to $1,000,000 for each event or series of events; b. Death or personal injury caused by the negligence of an employee or authorized agent of CA. France The CA subsidiary that is the licensor is Computer Associates S.A. The last sentence of Section 8 is deleted and replaced with: The Commercial Court of Paris shall have exclusive jurisdiction regarding any dispute that may arise between the parties dealing with the formation, execution, interpretation, or termination of this Agreement, including but not limited to measures of conservation, emergency proceedings, warranty proceedings, petition or in case of more than one defendant. The last sentence of Section 14 is deleted and replaced with: Any question concerning this Agreement should be referred to Computer Associates S.A., Immeuble Ex-Libris, 25, Quai du Prsident Paul Doumer, 92408 Courbevoie Cedex, Attention: Worldwide Law Department. Germany The CA subsidiary that is the licensor is C.A. Computer Associates GmbH. Section 6 of the Agreement is deleted. The twelfth sentence of Section 8 is deleted. The sixteenth sentence of Section 8 is deleted and replaced with:
Licensee shall comply with all relevant import and export regulations, including those adopted by the Office of Export Administration of the US Department of Commerce, any competent EU government and German export regulations. Licensee understands and acknowledges that US, EU and German restrictions vary regularly and, depending on Product, Licensee must refer to then current US, EU or German regulations. The following is added to Section 9: CA shall not be liable for any infringement based upon use of other than an unaltered release of the Product unless altered with CA's prior written consent. Section 10 is deleted and replaced with: In case of (i) willful misconduct, no limitation of liability applies;(ii) personal injury or damage to property, CAs liability to Licensee is limited to the maximum amount that CA will recover under its insurance policies; (iii) gross negligence that results in other damage than personal injury or damage to property, CAs liability to Licensee shall be limited to an amount equal to the license fee for the Product; (iv) negligence that results in damages other than personal injury or damage to property, CAs liability to Licensee shall be limited to an amount equal to fifty percent (50%) of the license fee for the Product. Notwithstanding the foregoing, the aggregated liability according to (iii) and (iv) above shall never exceed an amount equal to the purchase price of the Product. Except in case of willful misconduct or gross negligence, neither party shall be liable to the other for indirect, incidental, special or consequential damage, including but not limited to harm to services supplied by Licensee, or loss of business, loss of profit, or loss of data, arising out of or in connection with the implementation or the use of the Product. No actions, regardless of form, arising out of this Agreement may be brought by either party more than three (3) years after the cause of action has arisen, or, in the cause of non-payment, more than three (3) years from the date of the relevant invoice. Neither party shall be liable for delay in performing or failure to perform any of its obligations under this Agreement if the delay or failure results from events or circumstances outside its reasonable control. Such delay or failure shall not constitute a breach of this Agreement and time for performance shall be extended by time equivalent to the length of the delay caused by force majeure. Greece The CA subsidiary that is the licensor is Computer Associates Hellas Ltd. The last sentence of Section 8 is deleted and replaced with: Any dispute hereunder shall finally be determined by Athens Courts. Hong Kong
The CA subsidiary that is the licensor is Computer Associates International Ltd. The last sentence of Section 8 is deleted and replaced with: This Agreement shall be governed by and interpreted in accordance with the laws of Hong Kong. The courts of Hong Kong will have sole and exclusive jurisdiction with respect to any disputes arising out of this Agreement. The following is added at the end of Section 10: The aforementioned liability limitation and the aforementioned maximum liability amount will not affect or prejudice the statutory rights of the licensee under the sale of goods ordinance, the supply of services (implied terms) ordinance or the control of exemption sections ordinance, nor will they limit or exclude any liability for death or personal injury solely caused by CA's negligence. India The CA subsidiary that is the licensor is C.A. Computer Associates India Pvt. Ltd. The last sentence of Section 8 is deleted and replaced with: This Agreement and the terms hereof shall be governed and construed in accordance with the laws of India and the courts of Mumbai shall have sole and exclusive jurisdiction with respect to any disputes arising out of this Agreement. Indonesia The last sentence of Section 8 is deleted and replaced with: This Agreement and the terms hereof shall be governed and construed in accordance with the laws of Indonesia. The courts of Indonesia, located in Jakarta, will have the sole and exclusive jurisdiction with respect to any disputes arising out of this Agreement. Section 9 is amended by adding the following: Licensee represents that Licensee (i) has full corporate power and authority; and (ii) is legally capable to execute, deliver and perform this Agreement. CA and Licensee agree to waive any provisions, procedures and operation of any applicable law to the extent that a court order is required for termination of this Agreement. Israel The CA subsidiary that is the licensor is CA Computer Associates Israel Ltd. The last sentence of Section 8 is deleted and replaced with:
Any dispute hereunder shall finally be determined by Tel Aviv Courts. Italy The CA subsidiary that is the licensor is Computer Associates S.p.A. According to article 1341 and 1342 of the Italian Civil Code, the Licensee expressly accepts the terms and conditions included in Sections 6 (specifically the interest rate set forth in the last sentence), 8 and 9. The last sentence of Section 8 is deleted and replaced with: Any dispute hereunder shall finally be determined by Milan Courts. Japan The CA subsidiary that is the licensor is Computer Associates Japan, Ltd. The third sentence of Section 6 is deleted and replaced with: Licensee agrees to pay any tariffs, duties or taxes imposed or levied by any government or governmental agency other than the taxes for which CA is responsible upon a presentation of invoices by CA. The last sentence of Section 8 is deleted and replaced with: This Agreement shall be governed by and interpreted in accordance with the laws of the country of Japan, without regard to its choice of law provisions. Any dispute hereunder shall finally be determined by Tokyo District Court located in Tokyo Japan. The last sentence of Section 14 is deleted and replaced with: Any questions concerning this Agreement should be referred to Computer Associates Japan, Ltd., 2-1-1, Nishishinjyuku, Shinjyuku-ku, Tokyo, 163-0439, Japan, Attention: Worldwide Law Department. Korea The CA subsidiary that is the licensor is Computer Associates Korea Limited. The last sentence of Section 8 is deleted and replaced with: This Agreement shall be governed by and interpreted in accordance with the laws of Republic of Korea, without regard to its choice of law provisions. The last sentence of Section 14 is deleted and replaced with:
Any questions concerning this Agreement should be referred to Computer Associates Korea Limited, City Air Tower (18th Fl.), 159-9, Samsung-Dong, Kangnam-Ku, Seoul 135-973 Korea, Attention: Worldwide Law Department. Lybia, Egypt, Lebanon, Jordan, Iraq, Kingdom of Saudi Arabia, Kuwait, Qatar, United Arab Emirates, Oman, Yemen and Pakistan The CA subsidiary that is the licensor is Computer Associates Arabia FZ, LLC The last sentence of Section 8 is deleted and replaced with: This Agreement shall be interpreted according to, and governed by, the Laws of Dubai and the Federal Laws of the United Arab Emirates. Any disputes shall be finally settled by arbitration in accordance with the Rules of Commercial Conciliation and Arbitration of the Dubai Chamber of Commerce & Industry, which Rules are deemed to incorporate reference to this Clause. The place of arbitration shall be Dubai. The arbitration proceedings and award shall be conducted and written in the English language. Judgment upon the award rendered may be executed by any court having jurisdiction, or application may be made to such court for a judicial recognition of the award or any order of enforcement thereof, as the case may be. The award of the arbitration shall be the sole and exclusive remedy between the parties regarding any and all claims and counterclaims presented to the arbitrators. Malaysia The CA subsidiary that is the licensor is Computer Associates (M) Sdn. Bhd. The last sentence of Section 8 is deleted and replaced with: This Agreement shall be governed by and interpreted in accordance with the laws of Malaysia. The courts of Malaysia will have sole and exclusive jurisdiction with respect to any disputes arising out of this Agreement. The following is added to Section 10: Although CA specifies that there are no other warranties, Licensee may have certain rights under the Consumer Protection Act 1999 and the warranties are only limited to the extent permitted by the applicable legislation. Mexico The CA subsidiary that is the licensor is Computer Associates de Mxico S.A. de C.V. The last sentence of Section 8 is deleted and replaced with:
This Agreement shall be governed by and interpreted in accordance with the laws of Mxico. Any dispute hereunder shall be determined by the Tribunales de la Cuidad de Mxico. The last sentence of Section 14 is deleted and replaced with: Any questions concerning this Agreement should be referred to Computer Associates de Mxico S.A. de C.V, Avenida Jaime Balmes, 8 - Piso 4 - Oficina 403 - Col. Los Morales - Polanco , 11510 - Mexico - DF - At.: Finance Department. Netherlands The CA subsidiary that is the licensor is Computer Associates B.V. The third paragraph of the Preamble is deleted and replaced with: By installing, copying or using the product or by selecting the "I accept the terms of the License Agreement" radio button below, and then clicking on the Next button, you are I. Representing that you are not a minor and have full legal capacity and have the authority to bind yourself and your employer, as applicable, to the terms of this Agreement; II. Consenting on behalf of yourself and/or as an authorized representative. The following is added to the last paragraph of the Preamble: In the event that you select on I do NOT accept the terms of the License Agreement radio button below, and then click on the Next button , the installation shall cease. You should delete all copies of the Product from your computer systems and return, by registered first class post, the Product, complete with box and any documentation, to CA or the authorized reseller from whom you purchased the Product with your proof of purchase within thirty (30) days of the date of purchase. You will promptly be issued a full refund of any license fees paid for the Product and, if applicable, maintenance fees paid. If requested at the time of return and provided that receipts of costs incurred are provided, CA or the authorized reseller shall also refund to you any postage costs you incurred in returning the Product. The second to last sentence of Section 2 is deleted and replaced with: Beta products are provided on an as is basis, without warranties or representations of any kind, either express or implied including, without limitation, any warranties, conditions or representations of merchantability or satisfactory quality and fitness for a particular purpose, as well as any express warranties provided elsewhere in this Agreement.
The last sentence of Section 3 is deleted and replaced with: Licensees use of the product during the trial period is on an as is basis without any warranty, and CA disclaims all warranties including, without limitation, any implied warranties or conditions of merchantability or satisfactory quality and fitness for a particular purpose, as well as any express warranties provided elsewhere in this Agreement. The seventh sentence of Section 8 is deleted and replaced with: Licensee may not (I). Disclose, de-compile, disassemble nor otherwise reverse engineer the Product save to the extent expressly permitted by law; (II). Create any derivative works based on the Product; (III). Use the Product in connection with a service bureau or like activity whereby Licensee, without purchasing a license for such purpose from CA, operates or uses the Product for the benefit of a third party who has not purchased a copy of the Product;
(IV). Permit the use of the Product by any third party without the prior written consent of CA, save for contract staff of the Licensee who are acting on the Licensees business, not engaged in facilities management and who the Licensee agrees as a condition of this Agreement to ensure that such contract staff shall comply with all the terms of this Agreement, including without limitation, confidentiality provisions. Section 10.(A) is deleted and replaced with: No other warranties, whether express or implied, including, without limitation, any implied warranties or conditions of merchantability, satisfactory quality and fitness for a particular purpose, are made by CA. The following is added at the end of Section 10: The foregoing exclusions and limitations upon liability shall not apply to any liability for damages arising from: a. Tangible property damage to the extent that such is due to the negligence of an employee or authorized agent of CA, in which event CAs maximum liability shall be limited to $1,000,000 for each event or series of events; b. Death or personal injury caused by the negligence of an employee or authorized agent of CA, or c. Willful misconduct or gross negligence of CA.
New Zealand The CA subsidiary that is the licensor is Computer Associates (N.Z.) Ltd. Notwithstanding the final sentence of Section 6, the applicable interest charge on invoices unpaid by Licensee is 1.5% per month. The last sentence of Section 8 is deleted and replaced with: This Agreement shall be governed by and interpreted in accordance with the laws of New Zealand. The courts of New Zealand will have sole and exclusive jurisdiction with respect to any disputes arising out of this Agreement. The following is added to Section 10: Although CA specifies that there are no warranties, Licensee may have certain rights under the Consumer Guarantees Act 1993 or other legislation which cannot be excluded or limited. The Consumer Guarantees Act 1993 will not apply in respect of any goods or services which CA supplies, if Licensee acquires the goods and services for the purposes of a business as defined in that Act. Where the Product is not acquired for the purposes of a business as defined in the Consumer Guarantees Act 1993, the limitations in this Section are subject to the limitations in that Act. The following is added to Section 12: CAs rights under this Section shall also apply if any resolution is passed or proceedings are commenced for the liquidation or winding up of Licensee. Norway The CA subsidiary that is the licensor is Computer Associates Norway AS. The third paragraph of the Preamble is deleted and replaced with: By installing, copying or using the product or by selecting the I accept the terms of the License Agreement radio button below, and then clicking on the Next button, you are: (I). Representing that you are not a minor and have full legal capacity and have the authority to bind yourself and your employer, as applicable, to the terms of this Agreement; (II). Consenting on behalf of yourself and/or as an authorized representative. The following is added to the last paragraph of the Preamble:
In the event that you select the I do NOT accept the terms of the License Agreement" radio button below, and then click on the Next button, the installation shall cease. You should delete all copies of the Product from your computer systems and return, by registered first class post, the Product, complete with box and any documentation, to CA or the authorized reseller from whom you purchased the Product with your proof of purchase within thirty (30) days of the date of purchase. You will promptly be issued a full refund of any license fees paid for the Product and, if applicable, maintenance fees paid. If requested at the time of return and provided that receipts of costs incurred are provided, CA or the authorized reseller shall also refund to you any postage costs you incurred in returning the Product. The second to last sentence of Section 2 is deleted and replaced with: Beta products are provided on an as is basis, without warranties or representations of any kind, either express or implied including, without limitation, any warranties, conditions or representations of merchantability or satisfactory quality and fitness for a particular purpose, as well as any express warranties provided elsewhere in this Agreement. The last sentence of Section 3 is deleted and replaced with: Licensees use of the product during the trial period is on an as is basis without any warranty, and CA disclaims all warranties including, without limitation, any implied warranties or conditions of merchantability or satisfactory quality and fitness for a particular purpose, as well as any express warranties provided elsewhere in this Agreement. The seventh sentence of Section 8 is deleted and replaced with: Licensee may not: (I). Disclose, de-compile, disassemble nor otherwise reverse engineer the Product save to the extent expressly permitted by law; (II). Create any derivative works based on the Product; (III). Use the Product in connection with a service bureau or like activity whereby Licensee, without purchasing a license from CA for such purpose, operates or uses the Product for the benefit of a third party who has not purchased a copy of the Product;
(IV). Permit the use of the Product by any third party without the prior written consent of CA, save for contract staff of the Licensee who are acting on the Licensees business, not engaged in facilities management and who the Licensee agrees as a condition of this Agreement to ensure that such contract staff shall comply with all the terms of this Agreement, including without limitation, confidentiality provisions.
Section 10.(A) is deleted and replaced with: No other warranties, whether express or implied, including, without limitation, any implied warranties or conditions of merchantability, satisfactory quality and fitness for a particular purpose, are made by CA. The following is added at the end of Section 10: The foregoing exclusions and limitations upon liability shall not apply to any liability for damages arising from: a. Tangible property damage to the extent that such is due to the negligence of an employee or authorized agent of CA, in which event CAs maximum liability shall be limited to $1,000,000 for each event or series of events. b. Death or personal injury caused by the negligence of an employee or authorized agent of CA. c. Willful misconduct or gross negligence of CA. Peru The CA subsidiary that is the licensor is Computer Associates de Peru S.A. The last sentence of Section 8 is deleted and replaced with: This Agreement shall be governed by and interpreted in accordance with the laws of Peru. Any dispute hereunder shall be determined by the Tribunales Ordinarios de La Cuidad de Lima. The last sentence of Section 14 is deleted and replaced with: Any questions concerning this Agreement should be referred to Computer Associates de Peru S.A, Avenida Paseo de La Republica, 3211, Piso 11, San Isidro, Lima 27, Peru - At.: Finance Department. Philippines The CA subsidiary that is the licensor is Philippine Computer Associates International Inc. The first seven sentences of Section 8 are deleted and replaced with:
Title to the Product and all modifications thereto shall remain with CA. The Product is a trade secret and the proprietary property of CA or its licensors. Usage rights respecting the Product may not be exchanged for any other CA product. Licensee and its employees will keep the Product and the terms of this Agreement strictly confidential. To the maximum extent permitted by applicable law, Licensee will not disclose, de-compile, disassemble nor otherwise reverse engineer the Product. The last sentence of Section 8 is deleted and replaced with: This Agreement shall be governed by and interpreted in accordance with the laws of the Philippines. The courts of Makati City will have sole and exclusive jurisdiction with respect to any disputes arising out of this Agreement. Section 12 is deleted and replaced with: If Licensee breaches any term of this Agreement or if Licensee becomes insolvent or if bankruptcy or receivership proceedings are initiated by or against Licensee, CA shall have the right to withhold its own performance hereunder and/or to terminate this Agreement immediately upon notice and, in addition to all other rights of CA, all amounts due or to become due hereunder will immediately be due and payable to CA. Poland If payments are to be made in PLN, the last sentence of Section 6 is replaced as follows: Any invoice which is unpaid by Licensee when due shall be subject to an interest charge equal to the lower of 1.5% per month or the statutory delay interest rate then applicable in Poland. The last sentence of Section 8 is deleted and replaced with: The laws of Poland govern this Agreement. Section 12 is deleted and replaced with: If Licensee breaches any term of this Agreement or if Licensee becomes insolvent or if bankruptcy or receivership proceedings are initiated by or against Licensee, CA shall have the right to withhold its own performance hereunder and/or, to the extent permitted by the applicable law, to terminate this Agreement immediately and, in addition to all other rights of CA, all amounts due or to become due hereunder will immediately be due and payable to CA. Portugal The last sentence of Section 8 is deleted and replaced with:
Any dispute hereunder shall finally be determined by Lisbon Courts. Singapore The CA subsidiary that is the licensor is Computer Associates Pte. Ltd. The last sentence of Section 8 is deleted and replaced with: This Agreement shall be governed by and interpreted in accordance with the laws of Singapore. The courts of Singapore will have sole and exclusive jurisdiction with respect to any disputes arising out of this Agreement. The following is added to the end if Section 9: To the full extent permitted by applicable law, CA disclaims all implied conditions or warranties of satisfactory quality or fitness for purpose. The following is added at the end of Section 10: The limitation of liability set forth in this Section above will not apply to any breach of CAs obligations implied by Section 12 of the Sales of Goods Act (Cap 393). In addition, if you are a consumer, the limitation of liability will not apply to any breach of CAs obligations implied by Sections 13, 14 or 15 of the Sale of Goods Act (Cap 393). Sweden The CA subsidiary that is the licensor is Computer Associates Sweden AB. The third paragraph of the Preamble is deleted and replaced with: By installing, copying or using the product or by selecting the "I accept the terms of the License Agreement" radio button below, and then clicking on the Next button, you are: (I). Representing that you are not a minor and have full legal capacity and have the authority to bind yourself and your employer, as applicable, to the terms of this Agreement; (II). Consenting on behalf of yourself and/or as an authorized representative. The following is added to the last paragraph of the Preamble:
In the event that you select the I do NOT accept the terms of the License Agreement" radio button below, and then click on the Next button, the installation shall cease. You should delete all copies of the Product from your computer systems and return, by registered first class post, the Product, complete with box and any documentation, to CA or the authorized reseller from whom you purchased the Product with your proof of purchase within thirty (30) days of the date of purchase. You will promptly be issued a full refund of any license fees paid for the Product and, if applicable, maintenance fees paid. If requested at the time of return and provided that receipts of costs incurred are provided, CA or the authorized reseller shall also refund to you any postage costs you incurred in returning the Product. The second to last sentence of Section 2 is deleted and replaced with: Beta products are provided on an as is basis, without warranties or representations of any kind, either express or implied including, without limitation, any warranties, conditions or representations of merchantability or satisfactory quality and fitness for a particular purpose, as well as any express warranties provided elsewhere in this Agreement. The last sentence of Section 3 is deleted and replaced with: Licensees use of the product during the trial period is on an as is basis without any warranty, and CA disclaims all warranties including, without limitation, any implied warranties or conditions of merchantability or satisfactory quality and fitness for a particular purpose, as well as any express warranties provided elsewhere in this Agreement. The seventh sentence of Section 8 is deleted and replaced with: Licensee may not: (I). Disclose, de-compile, disassemble nor otherwise reverse engineer the Product save to the extent expressly permitted by law; (II). Create any derivative works based on the Product; (III). Use the Product in connection with a service bureau or like activity whereby Licensee, without purchasing a license from CA for that purpose, operates or uses the Product for the benefit of a third party who has not purchased a copy of the Product;
(IV). Permit the use of the Product by any third party without the prior written consent of CA, save for contract staff of the Licensee who are acting on the Licensees business, not engaged in facilities management and who the Licensee agrees as condition of this Agreement to ensure that such staff shall comply with all the terms of this Agreement, including without limitation, confidentiality provisions.
Section 10.(A) is deleted and replaced with: No other warranties, whether express or implied, including, without limitation, any implied warranties or conditions of merchantability, satisfactory quality and fitness for a particular purpose, are made by CA. The following is added at the end of Section 10: The foregoing exclusions and limitations upon liability shall not apply to any liability for damages arising from: a. Tangible property damage to the extent that such is due to the negligence of an employee or authorized agent of CA, in which event CAs maximum liability shall be limited to $1,000,000 for each event or series of events; b. Death or personal injury caused by the negligence of an employee or authorized agent of CA; c. Willful misconduct or gross negligence of CA. Switzerland The following is added at the end of Section 1: The place of performance of any duties of CA under this Agreement is Islandia, New York. The last sentence of Section 8 is deleted and replaced with: Any dispute hereunder shall be determined by a court of competent jurisdiction within the state of New York, U. S. A. Taiwan The CA subsidiary that is the licensor is Computer Associates Taiwan Ltd. The second sentence of Section 6 is deleted and replaced with: All fees are inclusive of VAT. The last sentence of Section 8 is deleted and replaced with: This Agreement shall be governed by and interpreted in accordance with the laws of the Republic of China, without regard to its choice of law provisions. Any dispute hereunder shall be determined by Taipei District Court. Thailand The CA subsidiary that is the licensor is Computer Associates Pte. Ltd.
The last sentence of Section 8 is deleted and replaced with: This Agreement shall be governed by and interpreted in accordance with the laws of Thailand. The courts of Thailand will have sole and exclusive jurisdiction with respect to any disputes arising out of this Agreement. Turkey The following is added at the end of Section 8: Licensee undertakes to keep all information of trade secret nature strictly private and confidential, and to use all necessary measures and its best efforts in order to assure and maintain the confidentiality thereof and to prevent and protect it, or any part thereof, from disclosure to any third person. Furthermore, Licensee hereby expressly undertakes: (I). Not to use a CA trade secret directly or indirectly in any respect or for whatever reason on its own behalf or on behalf of any third party or allow it to be used for any other purpose except as expressly permitted by CA; (II). Not to disclose, de-compile, disassemble nor otherwise reverse engineer the Product and to avoid such a disclosure in whatever form; (III). Not to copy or permit the others to copy without CAs prior written consent. Licensee acknowledges that in the event of a breach of any one of the obligations imposed upon it under this Section, CA might suffer significant damage, notwithstanding the return of all copies of the Product, arising out of the fact that it has breached the aforesaid obligations. Consequently, Licensee undertakes to indemnify CA in full against any such damage. Licensee acknowledges that CA has the right to prevent any threat to confidentiality or restrain ongoing infringement or breach of confidentiality by Licensee through legal proceedings and in case an order is obtained against Licensee for breach, Licensee shall reimburse CAs juridical costs and expenses including the attorney fees. The following is added at the end of Section 9:
In the event that CA is rendered unable, wholly or in part, to perform or implement any of its warranties herein set forth, by force majeure which includes governmental controls or orders of the government of Turkey, acts of God, wars, commotion or riot, epidemics, strikes, lockouts and any other events or forces beyond its reasonable control, it shall be relieved from such warranties and shall not be held liable for the non-fulfillment and/or suspended implementation thereof, as long as and to the extent that the effect of such events or forces remains unabated. The following is added at the end of the second sentence of Section 10: EXCEPT THAT MAY ARISE FROM CAS WILFUL FAULT OR NEGLIGENCE. United Kingdom The CA subsidiary that is the licensor is Computer Associates Plc. The third paragraph of the Preamble is deleted and replaced with: By installing, copying or using the product or by selecting the "I accept the terms of the License Agreement " radio button below, and then clicking on the Next button , you are: (I). Representing that you are not a minor and have full legal capacity and have the authority to bind yourself and your employer, as applicable, to the terms of this Agreement; (II). Consenting on behalf of yourself and/or as an authorized representative. The following is added to the last paragraph of the Preamble: In the event that you select the do NOT accept the terms of the License Agreement, and then click on the Next button, the installation shall cease. You should delete all copies of the Product from your computer systems and return, by registered first class post, the Product, complete with box and any documentation, to CA or the authorized reseller from whom you purchased the Product with your proof of purchase within thirty (30) days of the date of purchase. You will promptly be issued a full refund of any license fees paid for the Product and, if applicable, maintenance fees paid. If requested at the time of return and provided that receipts of costs incurred are provided, CA or the authorized reseller shall also refund to you any postage costs you incurred in returning the Product. The second to last sentence of Section 2 is deleted and replaced with:
Beta products are provided on an as is basis, without warranties or representations of any kind, either express or implied including, without limitation, any warranties, conditions or representations of merchantability or satisfactory quality and fitness for a particular purpose, as well as any express warranties provided elsewhere in this Agreement. The last sentence of Section 3 is deleted and replaced with: Licensees use of the product during the trial period is on an as is basis without any warranty, and CA disclaims all warranties including, without limitation, any implied warranties or conditions of merchantability or satisfactory quality and fitness for a particular purpose, as well as any express warranties provided elsewhere in this Agreement. The seventh sentence of Section 8 is deleted and replaced with: Licensee may not: (I). Disclose, de-compile, disassemble nor otherwise reverse engineer the Product save to the extent expressly permitted by law; (II). Create any derivative works based on the Product; (III). Use the Product in connection with a service bureau or like activity whereby Licensee, without purchasing a license from CA for that purpose, operates or uses the Product for the benefit of a third party who has not purchased a copy of the Product;
(IV). Permit the use of the Product by any third party without the prior written consent of CA, save for contract staff of the Licensee who are acting on the Licensees business, not engaged in facilities management and who the Licensee agrees as a condition of this Agreement to ensure that such contract staff shall comply with all the terms of this Agreement, including without limitation, confidentiality provisions. The last sentence of Section 8 is deleted and replaced with: All disputes relating to this Agreement will be governed by the laws of England and Wales and will be submitted to the exclusive jurisdiction of the English courts. Section 10.(A) is deleted and replaced with: No other warranties, whether express or implied, including, without limitation, any implied warranties or conditions of merchantability, satisfactory quality and fitness for a particular purpose, are made by CA. The following is added at the end of Section 10:
The foregoing exclusions and limitations upon liability shall not apply to any liability for damages arising from: a. Tangible property damage to the extent that such is due to the negligence of an employee or authorized agent of CA, in which event CAs maximum liability shall be limited to $1,000,000 for each event or series of events; b. Death or personal injury caused by the negligence of an employee or authorized agent of CA; c. Willful misconduct or gross negligence of CA. Venezuela The CA subsidiary that is the licensor is Computer Associates de Venezuela, CA. The last sentence of Section 8 is deleted and replaced with: This Agreement shall be governed by and interpreted in accordance with the laws of Venezuela. Any dispute hereunder shall be determined by the Tribunales Ordinarios de la Cuidad de Caracas. The last sentence of Section 14 is deleted and replaced with: Any questions concerning this Agreement should be referred to Computer Associates de Venezuela, CA, Avenida Principal de La Castellana - Centro Letonia, Torre ING Bank, Piso 10, Oficina 105 - 1060 - Caracas - Venezuela At.: Finance Department. 16. If the Product contains third party software, and the licensor requires the incorporation of specific license terms and conditions for such software into this Agreement, those specific terms and conditions, which are hereby incorporated by this reference, are located below this Agreement. Licensee acknowledges that this license has been read and understood and by selecting the ["I accept the terms of the License Agreement "] radio button, licensee accepts its terms and conditions. Licensee also agrees that this license (including any order form referencing this Agreement and any terms relating to third party software which are set forth below this Agreement) constitutes the complete Agreement between the parties regarding this subject matter and that it supersedes any information licensee has received relating to the subject matter of this Agreement, except that this Agreement (excluding the third party terms below) will be superseded by any written Agreement, executed by both licensee and CA, granting licensee a license to use the product. This Agreement may only be amended by a written Agreement signed by authorized representatives of both parties.
Select the ["I accept the terms of the License Agreement"] radio button, and then click on the Next button to accept the terms and conditions of this Agreement as set forth above and proceed with the installation process. Select the ["I do NOT accept the terms of the License Agreement"] radio button and then click on the Next button to halt the installation process.
Index
A
administrative client, starting 29 Advantage Ingres Microsoft Access Reports option 194 Seagate Crystal Reports option 189 AHD.DLL 76 AIX secondary server Unicenter NSM integration 71 web interface 61 AIX server new installations 35 Oracle option setup 38 system requirements, reviewing 31 upgrade installations 36 web interface accessing 64 configuring 64 installing 61
E
email options, Windows, configuring 30 event writers, Unicenter NSM logging 93 rules defining 85 loading 95 setting up 84 syntax 85 tngwriter_rule.dat 85
H
HP-UX secondary server Unicenter NSM integration 71 web interface 61 HP-UX server new installations 35 Oracle option setup 38 secondary server setup 49, 50, 51, 52, 53, 54 upgrade installations 36 web interface accessing 64 configuring 64 installing 61
C
cawto command 76 client client interface, starting 220, 222, 276 configuring 188, 222 installing 183, 221 local installation (Windows) 184 network installation (Windows) 185 reports, configuring 188, 276 Screen Painter, configuring 188, 276 silent installation (Windows) 187 system requirements, reviewing 183, 221, 269 configuration script 21, 72, 222 CR_CREATE action 77
I
IPlanet web server, configuring 64
L
Linux client client interface, starting 222 configuring 222 installing 221 system requirements, reviewing 221 Linux secondary server Unicenter NSM integration 71 web interface 61 Linux server installing 32 new installations 35
D
Daemon Proctor, starting 29 daemons starting 26
Index 325
Oracle option setup 38 upgrade installations 36 web interface accessing 64 configuring 64 installing 61
S
Screen Painter option Advantage Ingres 189 Windows client, configuring 188, 276 Seagate Crystal Reports option Advantage Ingres 189 secondary server Unicenter NSM integration 71 web interface 57, 61 server configuring 26 server, AIX new installations 35 Oracle option setup 38 system requirements, reviewing 31 upgrade installations 36 web interface accessing 64 configuring 64 installing 61 server, HP-UX new installations 35 Oracle option setup 38 upgrade installations 36 web interface accessing 64 configuring 64 installing 61 server, Linux installing 32 new installations 35 Oracle option setup 38 simple migration 229 upgrade installations 36 web interface accessing 64 configuring 64 installing 61 server, Sun Solaris new installations 35 Oracle option setup 38
M
Microsoft Access Reports option Advantage Ingres 194 migrate_to_60.cmd 229 msg_action record 76
N
NX.env, object manager setup 54 NX_MAX_DBAGENT variable, object manager setup 54
O
Options Manager email options 30 Oracle option configuring 21 installing 21 setup 21, 38
P
pdm_client.exe 222 pdm_configure.exe 21, 72, 222 pdm_database.sql 22 pdm_edit.pl 58, 62, 72 pdm_init.exe 72 pdm_load.exe 21 pdm_proctor_init 62, 72 pdm_restore.exe 21 pdm_startup.rmt 54, 58, 62, 72 pdm_startup.tpl 58, 62, 72 pdm_status.exe 52, 54, 72, 97 pdm_structure.sql 22 pdm_tablespace.sql 22 pdm_user file 22
R
Reports option, Windows client, configuring 188, 276
upgrade installations 36 web interface accessing 64 configuring 64 installing 61 server, UNIX IPlanet web server, configuring 64 new installations 35 Oracle option setup 38 upgrade installations 36 web interface accessing 64 configuring 64 installing 61 server, Windows administrative client, starting 29 configuring 26 email options, configuring 30 installing 16 modifying 20 new installations 19 Oracle configuring 21 installing 21 option setup 21 system requirements, reviewing 15 upgrade installations 20 web interface accessing 60 CleverPath Portal, integrating with 60 configuring 28, 60 installing 58 integrating 28 prerequisites 57 services, starting 64 Service Desk Administrative Client package administrative client installing 274 registering 270 source components, removing 273 setup.iss 187
stdlog file 21, 93 Sun Solaris secondary server Unicenter NSM integration 71 web interface 61 Sun Solaris server new installations 35 Oracle option setup 38 upgrade installations 36 web interface accessing 64 configuring 64 installing 61
T
tngfilter_rule.dat 81 tngimpt command, Unicenter NSM 74 tngwriter_rule.dat 85 topology.cfg 97
U
Unicenter NSM 2D/3D map, troubleshooting 99 2D/3D map, using 74 AHD.DLL 76 cawto command 76 database, populating 74 events console messages, monitoring 76 filtering 77, 78 integration, troubleshooting 99 writer rules 85 writers 84 filter rules 77 defining 81 setting up 80 syntax 81 filtered events, maintaining 97 filtering, error messages 103 generic event data 79 installation 71 logging 93, 105 msg_action record 76 server configuration, reviewing 102 slump connection, checking 104
Index 327
tngfilter_rule.dat 81 tngimpt command 74 topology.cfg 97 Unicenter Service Desk integration 72 post-integration 74 pre-integration 71 uniconv daemon 76, 78 Unicenter Software Delivery administrative client installing 274 Service Desk Administrative Client package registering 270 source components, removing 273 uniconv daemon 76, 78 UNIX client client interface, starting 222 configuring 222 installing 221 system requirements, reviewing 221 UNIX secondary server Unicenter NSM integration 71 web interface 61 UNIX server IPlanet web server, configuring 64 new installations 35 Oracle option setup 38 upgrade installations 36 web interface accessing 64 configuring 64 installing 61
web interface, Linux accessing 64 configuring 64 installing 61 web interface, Sun Solaris accessing 64 configuring 64 installing 61 web interface, UNIX accessing 64 configuring 64 installing 61 web interface, Windows accessing 60 CleverPath Portal, integrating with 60 configuring 60 installing 58 prerequisites 57 services, starting 64 web.cfg 60, 64 Windows client administrative client installing 274 client interface, starting 220, 276 configuring 188 installing 183 local installation 184 network installation 185 reports, configuring 188, 276 Screen Painter, configuring 188, 276 Service Desk Administrative Client package registering 270 source components, removing 273 silent installation 187 system requirements, reviewing 183, 269 Windows secondary server Unicenter NSM integration 71 web interface 57 Windows server administrative client, starting 29 configuring 26 email options, configuring 30 installing 16 modifying 20
W
web interface Windows 28 web interface, AIX accessing 64 configuring 64 installing 61 web interface, HP-UX accessing 64 configuring 64 installing 61
new installations 19 Oracle configuring 21 installing 21 option setup 21 system requirements, reviewing 15 upgrade installations 20 web interface accessing 60 CleverPath Portal, integrating with 60 configuring 28, 60 installing 58 integrating 28 prerequisites 57 services, starting 64 writer rules, Unicenter NSM 95
Index 329