Study Guide - 017 - sg247763
Study Guide - 017 - sg247763
Vasfi Gucer
Anantaram Kandukuri
Caio Elias Saad
Dario Sierra
Jonathan Baffa
Julio Madeira
Maamar Ferkoun
Marcel Laurenz
[Link]/redbooks
Draft Document for Review June 16, 2009 12:58 pm [Link]
April 2009
SG24-7763-00
[Link] Draft Document for Review June 16, 2009 12:58 pm
Note: Before using this information and the product it supports, read the information in
“Notices” on page xi.
This edition applies to Foundations of Tivoli Process Automation Engine Version 7.1.
Contents
Figures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . vii
Notices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xi
Trademarks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xii
Preface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xiii
The team that wrote this book . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xiv
Become a published author . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xvi
Comments welcome. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xvi
Contents v
[Link] Draft Document for Review June 22, 2009 3:02 pm
Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 185
Figures
viii Certification Study Guide Series: Foundations of Tivoli Process Automation Engine
Draft Document for Review June 22, 2009 3:02 pm [Link]
Figures ix
[Link] Draft Document for Review June 22, 2009 3:02 pm
Notices
This information was developed for products and services offered in the U.S.A.
IBM may not offer the products, services, or features discussed in this document in other countries. Consult
your local IBM representative for information on the products and services currently available in your area.
Any reference to an IBM product, program, or service is not intended to state or imply that only that IBM
product, program, or service may be used. Any functionally equivalent product, program, or service that
does not infringe any IBM intellectual property right may be used instead. However, it is the user's
responsibility to evaluate and verify the operation of any non-IBM product, program, or service.
IBM may have patents or pending patent applications covering subject matter described in this document.
The furnishing of this document does not give you any license to these patents. You can send license
inquiries, in writing, to:
IBM Director of Licensing, IBM Corporation, North Castle Drive, Armonk, NY 10504-1785 U.S.A.
The following paragraph does not apply to the United Kingdom or any other country where such
provisions are inconsistent with local law: INTERNATIONAL BUSINESS MACHINES CORPORATION
PROVIDES THIS PUBLICATION "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS OR
IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF NON-INFRINGEMENT,
MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Some states do not allow disclaimer
of express or implied warranties in certain transactions, therefore, this statement may not apply to you.
This information could include technical inaccuracies or typographical errors. Changes are periodically made
to the information herein; these changes will be incorporated in new editions of the publication. IBM may
make improvements and/or changes in the product(s) and/or the program(s) described in this publication at
any time without notice.
Any references in this information to non-IBM Web sites are provided for convenience only and do not in any
manner serve as an endorsement of those Web sites. The materials at those Web sites are not part of the
materials for this IBM product and use of those Web sites is at your own risk.
IBM may use or distribute any of the information you supply in any way it believes appropriate without
incurring any obligation to you.
Information concerning non-IBM products was obtained from the suppliers of those products, their published
announcements or other publicly available sources. IBM has not tested those products and cannot confirm
the accuracy of performance, compatibility or any other claims related to non-IBM products. Questions on
the capabilities of non-IBM products should be addressed to the suppliers of those products.
This information contains examples of data and reports used in daily business operations. To illustrate them
as completely as possible, the examples include the names of individuals, companies, brands, and products.
All of these names are fictitious and any similarity to the names and addresses used by an actual business
enterprise is entirely coincidental.
COPYRIGHT LICENSE:
This information contains sample application programs in source language, which illustrate programming
techniques on various operating platforms. You may copy, modify, and distribute these sample programs in
any form without payment to IBM, for the purposes of developing, using, marketing or distributing application
programs conforming to the application programming interface for the operating platform for which the
sample programs are written. These examples have not been thoroughly tested under all conditions. IBM,
therefore, cannot guarantee or imply reliability, serviceability, or function of these programs.
Trademarks
IBM, the IBM logo, and [Link] are trademarks or registered trademarks of International Business
Machines Corporation in the United States, other countries, or both. These and other IBM trademarked
terms are marked on their first occurrence in this information with the appropriate symbol (® or ™),
indicating US registered or common law trademarks owned by IBM at the time this information was
published. Such trademarks may also be registered or common law trademarks in other countries. A current
list of IBM trademarks is available on the Web at [Link]
The following terms are trademarks of the International Business Machines Corporation in the United States,
other countries, or both:
ITIL is a registered trademark, and a registered community trademark of the Office of Government
Commerce, and is registered in the U.S. Patent and Trademark Office.
Snapshot, and the NetApp logo are trademarks or registered trademarks of NetApp, Inc. in the U.S. and
other countries.
Oracle, JD Edwards, PeopleSoft, Siebel, and TopLink are registered trademarks of Oracle Corporation
and/or its affiliates.
SAP, and SAP logos are trademarks or registered trademarks of SAP AG in Germany and in several other
countries.
J2EE, Java, and all Java-based trademarks are trademarks of Sun Microsystems, Inc. in the United States,
other countries, or both.
Active Directory, Expression, Microsoft, Windows, and the Windows logo are trademarks of Microsoft
Corporation in the United States, other countries, or both.
UNIX is a registered trademark of The Open Group in the United States and other countries.
Other company, product, or service names may be trademarks or service marks of others.
xii Certification Study Guide Series: Foundations of Tivoli Process Automation Engine
Draft Document for Review June 18, 2009 10:45 am [Link]
Preface
This book provides a combination of theory and practical experience needed for
a general understanding of the subject matter. It also provides sample questions
that will help in the evaluation of personal progress and provide familiarity with
the types of questions that you will encounter in the exam.
For your convenience, we structure the chapters based on the sections of the
Test 000-017: Foundations of Tivoli Process Automation Engine, such as
Prerequisites and Installation, Platform Configuration and so on, so studying
each chapter will help you prepare for one section of the exam.
xiv Certification Study Guide Series: Foundations of Tivoli Process Automation Engine
Draft Document for Review June 18, 2009 10:45 am [Link]
Wade Wallace
International Technical Support Organization, Austin Center
Preface xv
[Link] Draft Document for Review June 18, 2009 10:45 am
Tamikia Barrow
International Technical Support Organization, Raleigh Center
Your efforts will help increase product acceptance and customer satisfaction. As
a bonus, you will develop a network of contacts in IBM development labs, and
increase your productivity and marketability.
Find out more about the residency program, browse the residency index, and
apply online at:
[Link]/redbooks/[Link]
Comments welcome
Your comments are important to us!
xvi Certification Study Guide Series: Foundations of Tivoli Process Automation Engine
Draft Document for Review June 22, 2009 3:07 pm [Link]
The IBM Professional Certification Program offers a business solution for skilled
technical professionals seeking to demonstrate their expertise to the world.
Specific benefits can vary by country (or region) and role. In general, after you
become certified, you should receive the following benefits:
Industry recognition
Certification may accelerate your career potential by validating your
professional competency and increasing your ability to provide solid, capable
technical support.
Program credentials
As a certified professional, you receive through e-mail your certificate of
completion and the certification mark associated with your role for use in
advertisements and business literature. You can also request a hardcopy
certificate, which includes a wallet-size certificate.
IBM Professional Certification acknowledges the individual as a technical
professional. The certification mark is for the exclusive use of the certified
individual.
Ongoing technical vitality
IBM certified professionals are included in mailings from the IBM Professional
Certification Program.
Whether you are a Tivoli client, partner, or technical professional wanting to put
your career on the fast track, you can start on the road to becoming a Tivoli
Certified Professional today.
Certification checklist
This section provides a certification checklist. Follow these steps to pursue
certification:
1. Select the certification that you want to pursue.
2. Determine which test or tests are required by reading the certification role
description.
3. Prepare for the test, using the following resources provided:
– Test objectives
– Recommended educational resources
– Sample assessment test
– Other reference materials
– List of opportunities for gaining experience
Note: When providing your name and address to the testing vendor, be
sure to specify your name exactly as you want it to appear on your
certificate.
5. Take the test. Be sure to keep the Examination Score Report provided upon
test completion as your record of taking the test.
Note: After taking a test, your test results and demographic data (including
name, address, e-mail, and phone number) are sent from the testing
vendor to IBM for processing (allow two to three days for transmittal and
processing). After all the tests required for a certification are passed and
received by IBM, your certificate is issued.
6. Repeat steps 3 on page 5 through 5 until all required tests are successfully
completed for the desired certification role. If you must meet additional
requirements (such as an “other vendor” certification or exam), follow the
instructions on the certification description page to submit these requirements
to IBM.
7. After you complete your certification requirements, you are sent an e-mail
asking you to accept the terms of the IBM Certification Agreement before
receiving the certificate.
8. Upon acceptance of the terms of the IBM Certification Agreement, an e-mail
is sent containing the following electronic deliverables:
– A Certification certificate in PDF format, which can be printed in either
color or black and white
– A set of graphic files of the IBM Professional Certification mark associated
with the certification achieved
– Guidelines for the use of the IBM Professional Certification mark
9. To avoid unnecessary delay in receiving your certificate, ensure that your
current e-mail is on file by maintaining an up-to-date profile. If you do not have
an e-mail address on file, your certificate is sent through postal mail.
After you receive a certificate by e-mail, you can also contact IBM at
[Link] to request that a hardcopy certificate be sent by
postal mail.
Note: IBM reserves the right to change or delete any portion of the program,
including the terms and conditions of the IBM Certification Agreement, at any
time without notice. Some certification roles offered through the IBM
Professional Certification Program require recertification.
1.2.1 How to receive your 15% discount when taking the test
You can receive a 15% discount on the Foundations of Tivoli process
automation engine certification exam, if taken at any Thomson Prometric
testing center. Just remember to use the code 15T017.
Note: Course offerings are continuously being added and updated. If you do
not see the courses listed in your location, contact one of the previously listed
delivery management teams.
1.3.1 Courses
Refer to the following link for a list of courses related to Tivoli process automation
engine:
[Link]
Any product that has the Tivoli process automation engine as its foundation can
be installed with any other product that has the Tivoli process automation engine.
The installer will detect that the Tivoli process automation engine is already
installed and just enable the additional applications and features of the product
being installed.
Every product ships with a specific version of the Tivoli process automation
engine. The versions must match up if you are installing more than one product.
Tivoli Change and Configuration Management Database 7.1
Once you have installed one of these products, you can install others on top of it.
There is a different install option for each product's launchpad that you must
choose, if you want to install the product on top of another. With this option, the
Tivoli process automation engine will not be reinstalled. The new products
applications will be enabled, as well as the existing applications.
Now we put the Tivoli process automation engine and the Tivoli process
automation engine-based products in the perspective of ISM architecture.
Figure 2-1 shows the Tivoli process automation engine integrated portfolio.
2.2 Prerequisites
Tivoli process automation engine requires multiple software servers that can be
installed on separate, dedicated server machines (for best performance) or the
same physical server (not recommended for production environments). The
different components of the ISM solution environment, called middleware, are as
follows:
Database: The database serves as the repository for all CI information.
Application server: Tivoli process automation engine is built using Java 2
Enterprise Edition (J2EE) technology, which requires a commercial
application server, such as IBM WebSphere Application Server.
HTTP server: A separate, dedicated HTTP server can be configured to work
with the J2EE application server.
Directory server: A directory server can be configured to work with the ISM
product to maintain lists of users and groups for security purposes.
Administrative system: The administrative system is not part of the
middleware but is used to deploy the ISM product. After the initial deployment,
the administrative system is used to make updates or changes to the
deployment. This machine has to be a Windows® system.
2.3.1 Simple
A simple deployment consists of installing all middleware on one system. You will
not have the option of using existing middleware within your organization. All
middleware used in conjunction with Tivoli process automation engine must be
installed on the system using the Tivoli middleware installer using default values.
The ISM product will be installed using default values provided by the Tivoli
middleware and Tivoli process automation engine installation programs. If you
intend to override default values used by the simple deployment path, you will
have to use the custom deployment path instead.
2.3.2 Custom
A custom deployment typically involves deploying the ISM product across several
systems, some of which probably already host middleware products that you
wish to use with your product deployment. Deploying through the custom
installation path also allows you to modify default installation values. This
deployment option does not require you to spread the ISM product deployment
across several systems. You can enter the name of the local host as the
destination for all the product components that are to be installed using the Tivoli
middleware installer and the Tivoli process automation engine.
The Tivoli process automation engine program can automate the configuration of
middleware for use with an ISM product. For example, if you are preparing to
deploy the Tivoli process automation engine and you already have your database
software deployed, and you will reuse this environment, the Tivoli process
automation engine installer will build the schema required.
If you choose not to have the Tivoli process automation engine automatically
configure middleware, configure that piece of middleware manually prior to the
execution of Tivoli process automation engine.
For more information about reusing middleware, Tivoli Asset Management for IT
Release 7.1, Installation Guide | IBM WebSphere Application Server at:
[Link]
/[Link]/[Link]
The workspace can be defined on a shared resource that is made available to all
the systems that will run the Tivoli middleware installer. Locating the workspace
on a shared resource avoids the need to copy files such as the topology file
manually from one machine to another. The workspace contains the following
items:
Deployment plan
The deployment plan is a collection of installation steps, configuration
parameters for those steps, and target machine information. It is generated
through the Tivoli middleware installer and it resides in the workspace directory.
When deployment steps are changed, the existing deployment plan is deleted
and replaced with the new deployment plan. The deployment plan configuration
files contain information about the deployment plan itself. Whenever a
deployment plan is modified, which includes re-configuring existing deployment
choices, the deployment plan configuration files will be deleted and regenerated
when the deployment plan is redeployed.
Topology file
The topology file is a properties file that describes the configuration parameters
of the Tivoli Asset Management for IT middleware deployment. This file is
created and then updated after every deployment or undeployment. If you have
not defined a workspace that is centrally located and accessible to all the
systems that will be receiving Tivoli Asset Management for IT middleware, this
file will have to be copied to the workspace of each machine where Tivoli Asset
Management for IT middleware is being deployed. The contents of this file can be
used by the Tivoli Asset Management for IT installation program to populate its
panels with meaningful default values. This file is saved in
<workspace>/[Link].
Logs
Log files that contain information about the deployment can be found in the
workspace directory. In addition, log files native to the IBM Tivoli Asset
Management for IT middleware itself are also contained in this directory.
with DB2® Enterprise Server Edition v9.5.1 and Tivoli Directory Server V6.2
Computer 2: Windows 2003 Server EE. Hostname [Link]
Note: If you do not use a shared location for the middleware workspace, a
separate [Link] will be saved for each middleware installation
that you perform on each computer. You will need to manually consolidate the
data into a single [Link] file and copy the middleware workspace
to a local directory on each computer in the topology as you perform
installation.
4. Install DB2 and Tivoli Directory Server (Figure 2-5 on page 19).
Once you finish the installation note that the workspace directory in Computer 2
has the data of the middleware installation of Computer 1, including the
[Link] file. See Figure 2-6.
6. Select now the local directory to create the workspace. The installation will
update the workspace including the [Link] file. See Figure 2-7.
[Link] Configure J2EE application security check box and click Next.
Note: This modify the J2EE application so that authentication will be handled
by an external source such as IBM Tivoli Directory Server or Microsoft Active
Directory®.
[Link] whether your environment is using the IBM default schema and
whether the installer should create the required users and click Next.
[Link] JMS Data Source name, Choose Do not persist JMS messages and
click Next.
For information about other installation options Tivoli Asset Management for IT
Release 7.1, Installation Guide | IBM WebSphere Application Server at:
[Link]
/[Link]/[Link]
In this kind of domains you can optionally Specify a group value and a key value
to select an error message to display when domain validation fails.
– In the Error Message Group field, specify the group value of the error
message.
– In the Error Message Key field, specify the key value of the error message.
When you use the Database Configuration application, you interact at the
business object level. Internally, the application determines the actions to take on
the tables to support the needs of business objects.
A database table stores several objects, and each object has different business
rules. For example, the TICKET table defines Incident, Problem, and Ticket
business objects.
Optionally you can also configure the Autnumbering feature in the attributes area.
To setup the configuration, you have to select the Can Number? field, the
Autonumber field and the you have to set the Default value to
&AUTONUMBER& as shown in Figure 3-2.
Create an organization
Before you can create the first organization you must complete the following
tasks:
Create at least one currency code. To do this, use the Currency Codes
application.
Create at least one item set and one company set. To do this, use the Sets
application.
1. In the Base Currency 1 field, enter the currency code for your base currency
or click Select Value.
2. In the Item Set field, enter the item set you want to associate with this
organization or click Select Value. You cannot change the item set after you
save the record.
3. In the Company Set field, enter the company set you want to associate with
this organization or click Select Value. You cannot change the company set
after you save the record.
4. In the Default Item Status field, click Select Value and select the status you
want new item master, service item, and tool records to have. (question 2.4.a)
When you are creating a new organization, the Clearing Account and Active?
fields are read-only until you save the record. The organization is inactive by
default, the Active? check box is cleared and the organization cannot currently be
used in the system. To activate the organization, you must edit the organization,
check the Active? field and enter a GL account in the Clearing Account field.
You can also add the Autonumbering feature from the Select Action menu. The
Autonumbering is configured in the Autonumbering application, see Figure 3.2
on page 33
Note: You can also configure the Drilldown option in the Organization
application.
Edit an organization
After you create an organization, you may want to edit addresses or other
information but you cannot edit the item or company set after you save an
organization record. You cannot edit base currency 1 after you add a site to the
organization and save the record
You cannot delete sites at all; therefore, you can only delete organizations that
have never had sites associated with them.
Sites belonging to the same organization must use the same currency and share
the same options for work orders, assets, labor, and certain other types of data.
You use the Sites tab to add sites within an organization and to specify
associated information. Sites are defined at the organization level. You can add
as many sites to the same organization as needed.
After you add a new site, you cannot delete it, but you can make it inactive. If a
site is inactive, users cannot access site-level records for that site.
You use the Sites tab in the Organizations application to set up the sites to use
with the system. You have to consider some tips to set up sites:
Add a site
:To add a site you only need the site name (site ID). The site name must be
unique for all sites across the system, not just within the organization. See
Figure 3-4.
By default, the active status for a new site follows the status for the
organization—selected if the organization is active, cleared if the organization is
not active. If the check box is selected and you do not want the site to be used in
the system at this time, clear the check box.
Note: To set a site to active, the organization most be active. If a site and its
organization are both inactive, and you activate the organization, the site is not
automatically activated. However, if you make an organization inactive, then its
sites are automatically inactive.
To open the Application, GoTo → Asset → Location and fill in the appropriate
information. Detailed information on locations is presented in the “Asset Chapter”
in Certification Study Guide Series: IBM Maximo Asset Management for IT,
SG247762.
Calendar records incorporate start and end dates, shift definitions, and
nonworking time. Holidays are examples of non-working time. Any number of
person, asset, or other records can reference a single calendar.
For more details on Calendars application, please refer to the following link:
[Link]
/[Link]/[Link]
can be classified and retrieved later. These objects include assets, locations,
items, tickets, work orders, solutions, configuration items, purchasing documents,
and job plans. A classification is a word, a number, or an alphanumeric. A
classification can stand alone, or you can group it with other classifications for
further descriptions. Classifications let you store information about many objects,
such as locations, assets, items, and work orders.
For example, you can assign attributes to a classification creating the attribute
and specifying the data type, as shown in Figure 3-6.
The system does not provide standard classifications. However, you can apply
industry standards when you create classifications.
You must group information so that you can perform statistical analysis later. For
example, to determine how many customers complained about problem A versus
problem B, classify problem A differently than problem B.
directory structure: from the top down in parent-child relationships. First, you
create a parent (a classification), and then you add its children (each child is
also a classification), which belong to the parent. Each child then can become
a parent and have its own children. This pattern can continue indefinitely. The
structure from the top-level parent to the child that you are working with is the
classification path.
Associates Classifications - You can define associations between actual
configuration item classifications and authorized configuration item
classifications. Defining, or mapping, these associations lets you create an
authorized configuration item from a configuration item record, and lets you
include the limited number of attributes that you need for configuration
management and change control.
Separate Classification Hierachies - You add objects such as assets,
locations, or items in the Use With area of the Classifications tab. You indicate
the objects that you can use with the classification path. Consequently, you
can create one classification path that you can use with multiple objects, such
as assets, locations, and items. For example, you can use one hierarchy to
classify an asset, but a different hierarchy to classify the repair of that asset.
Attributes - You can use attributes to search for objects that can be classified,
such as assets, locations, items, tickets, work orders, solutions, configuration
items, purchasing documents, and job plans (for example, you can search for
a blue car). Each classification node contains a list of attributes
characteristics of a classification object).
Sections - You can break attributes into sections. Sections are groupings of
attributes allowing the same attribute to be used multiple times.
Other Systems - You can integrate classification with other applications in the
system. You can create classifications for activities, assets, changes,
incidents, items, locations, problems, releases, service requests, solutions,
work orders, configuration items, purchasing documents, and job plans (see
the Domains application for more details 3.1, “Working with domains” on
page 31).
The E-mail Listeners application can process free form e-mail of formatted
e-mails and allows you to send and store attachments. Formatted e-mails can be
composed using XML tags or text typed in the form of attribute-value pairs to
perform specific actions, such as changing the status of a business object or
querying the business object based on criteria.
Note: A built-in workflow process that supports various types of ticket objects
is shipped
Storing attachments
The E-mail Listeners application processes attachments to an e-mail
message and stores the attachments as attached documents on the
application server.
Other features
– The E-mail listener cron task
The E-mail listener cron task is used to encapsulates a staging process
which processes inbound E-mail through a staging table.
– Workflow Process
You use Workflow Process to parse e-mail information from the staging
table and process it according to the subject and content of each
message.
– Security
The E-mail Listeners application enables users to create, update, query,
and change the status of tickets, so it is critical to ensure that only
authorized users can run these functions using e-mails. For the sender of
an E-mail, the application checks security authorizations against the
system’s security configuration. This check establishes the ability of the
sender to run each specific function. More information on Tivoli process
automation engine security configuration can be found in Chapter 5,
“Security Configuration” on page 77.
– Communication templates
The E-mail Listeners application uses numerous communication
templates to generate notifications to end users and administrators.
You can customize the E-mail Listeners application to fit into your needs. For
detailed information about the E-mail Listeners application, you can refer to the
Maximo Online Help.
The Figure 3-8 shows an example of the cron task to be used to synchronize
LDAP data between Tivoli and the IBM Tivoli Directory Server.
For more information on creating custom cron tasks, see your SDK
A detailed list about the CRON Task can be found in the MAXIMO Administration
Guide, page 140 under:
[Link]
m.doc_7.1/pdf/mam71_sys_admin_guide.pdf
When communications are sent, any attachments to the template are included in
the communication, either in a folder or an individual attachment. For your
convenience this can be send to Roles, Person or even Person Groups.
Tip: To store and track e-mail, you can enable the Com Log Entry? to add the
e-mails to the communication log of your requests.
The Figure 3-9 shows an example of a communication templates which you can
use to reply to a work order by sending back the work order number.
[Link]
m.doc_7.1/pdf/mam71_sys_admin_guide.pdf
You can use escalations with any application. However, you are most likely to use
them with the Service Desk applications, IT Asset Management applications, and
workflow processes. For example
Service Desk Management - Service level agreements (SLA’s) are contracts
defined between a service provider and the recipient of the services. You can
use escalations to determine how incidents, problems, and service requests
are handled, and work to ensure that you remain compliant with any SLAs by
solving problems in a timely manner.
IT Asset Management - You can use escalations to monitor IT contracts,
procurement, and inventory. By defining an escalation to alert managers 30
days in advance of a lease contract expiring, the managers can effectively
manage leases and avoid penalties or costly lease extensions.
Workflow processes - You can use escalations to escalate assignments
before they time out in a recipient's Inbox. When you assign specific steps in a
workflow process to employees, those assignments display in their Inbox. If
the assignments are not completed promptly, they time-out in the recipients'
Inboxes. When this happens, you can use escalations to assign the tasks to
other people. This helps tasks get completed on time and helps to prevent
work backlogs.
Note: You can create escalations at the site, organization, or system level.
Tip: Select the object for which you are trying to use the Conditional SQL
Expression® Builder.
Organization and or site - Escalations are at the System level. You can create
escalations for use with a specific organization or site.
Schedule - A schedule that defines how often the system checks for records
that meet the criteria for the escalation. The polling interval can be seconds,
minutes, hours, days, weeks, or months. You also can specify that the interval
be calendar or date based.
Escalation Point - Date- and time-based, or other condition criteria for when
the actions or notifications specified on the escalation record are triggered.
An escalation record can have one or more escalation points (see “Working
with escalation points” on page 49.
Actions - Any actions that must be taken when a record reaches the
conditions of an escalation point. You define actions separately for each
escalation point. You can associate multiple actions for each escalation point.
You use the Actions application to define actions (see “Actions and
notifications” on page 49.
Notifications - Any notifications that the system must generate when a record
reaches the conditions of an escalation
In addition the system provides numerous pre defined escalation which can be
tailored to your needs. In addition, you can use the escalation in conjunction with
Workflow application action (APPACTION). For example, you can use the
Workflow Assignment (WFASSIGNMENT object) to be used to reject
(WFREJECT), accept (WFACCEPT) or escalate (WFESCALATE) a workflow
process. For more information about the Escalation configuration, refer to the
Maximo Online Help.
Note: The system triggers an escalation only when the escalation engine
finds records that meet the criteria defined by the escalation points.
Action
An action is an event you want the system to trigger when it finds records that
meet the condition(s) defined by the escalation point, such as changing a status
or an owner. When you add an action, you can select a preexisting action and
assign it a sequence number (if multiples). The system defaults the description
and the action type, which is based upon the record and action you chose, e.g in
Figure 3-11 on page 49. You can also go to the Actions application to create a
new action and return it for use with your current escalation.
The system ships with a number of predefined action types, such as Set Owner,
Status Change, or Create Ticket. You can create new action types, if needed.
Action groups are predefined sets of actions that are grouped together in a
specific sequence. The system associated an escalation point with one or more
actions through the action group. For detailed information, refer to MAXIMO
Online Help.
Notification
A notification is an E-mail that you want the system to send when it finds records
that meet the condition(s) defined by the escalation point. Figure 3-12shows an
example how you can configure the notification.
Tip: You can use the Roles record Broadcast? field to send out a notification
to all people in a person group.
Validate escalation
When the system validates an escalation, it is only validating the SQL statement
within the Condition field and the escalation points defined for the escalation.
Validating the escalation points ensures that when the criteria that defines the
escalation point is met, the escalation mechanism triggers the associated actions
and/or notifications. The system does not validate the actions or notifications
themselves.
The validation will be started from the Select Action menu, choose Validate.
Escalation schedule
An Escalation needs to be scheduled to give the right notification at the right
time. From the Set Schedule dialog box, you can choose a date and/or time
interval and preview the first twenty occurrences of the schedule. The schedule
filed in the escalation record will schedule by which the escalation will poll for
conditions. For example, depending on the available fields, a schedule can be as
simple as "every 5 minutes" or as complex as "the fourth Monday of the month at
9:30 PM, every month."
Canvas - The Workflow Canvas tab provides the tools and work space to
create, view, and modify Workflow processes. The Workflow canvas is a
graphical view of a Workflow process. It lets you see the process elements
and how they are connected as shown in Figure 3-13.
You use the canvas to add nodes and connection lines as you construct a
process and configure the properties of each process element.
The Canvas Tab consists of the following sections:
– Record header
– Workflow tool palette
– Workflow canvas
To understand the Workflow Designer Toolbar and the Palette, please refer to:
[Link]
/621_mx_wkfl_imp.pdf
Process - While the Canvas tab provides a graphical view of the elements in
a process, the Process tab lists the process elements in a pair of table
windows. The Process Nodes table window displays all nodes in the process.
Each row includes the node Title, Description, and Type. The row that you
select in the Process Nodes table window determines the data that the
system displays in the Actions table [Link] Actions table window
displays any actions associated with the connection lines exiting the selected
node. Each row includes the name of the action record, the instructions to the
assignee, the node to which the connection line leads, and whether the
connection is positive or [Link] can click the Edit Properties button for
any node or action to access the Properties dialog box for the node or
connection line.
– Process Node Types - A node is a graphical element that represents a
point in your business process. Workflow Designer includes different types
of nodes that can represent different points in your business process, for
example:
You can drag and drop nodes from the palette onto the canvas. You can add any
number of nodes to a process. However, if a process exceeds 50 to 100 nodes,
you might want to consider whether you can break the process down into
subprocesses to simplify managing and maintaining it.
• Start Nodes
A Start node indicates the point when a record enters or starts a Workflow
process. The tool palette does not include a Start Node Tool because
when you create a new process, Tivoli process automation engine places
a single Start node on the canvas. Each process can have only one Start
node, and you cannot delete Start nodes.
• Task Nodes
A Task node indicates when a user has two choices, for example, to
approve or reject a record. You use Task nodes when your business
process requires a user to evaluate the record and you want to create a
task assignment that routes the record to one or more individuals.
When Tivoli process automation engine encounters a Task node while
routing a record through the process, it stops the process and
generates one or more task assignments, based on the node
properties. Individuals can receive task assignments via the Workflow
Inbox portlet on their Start Center, or via e-mail. The assignee views
and completes the assignment in the Complete Workflow Assignment
dialog box. You place a new Task node on the canvas by using the Task
Node Tool in the palette. A process can have one or more Task nodes,
but you do not have to include Task nodes in a process.
For example, a client has a workflow requirement on new asset
records. Part of this requirement is that the Contracts representatives
from the Lease and Warranty groups review and validate contracts the
asset may or may not be under. The asset record cannot move to the
next part of the workflow process until all assignments are completed.
You can configure this request when you use a Task node and assign
to the Leasing and Warranty roles. Configure the task to indicate that
the Perform Acceptance Action is for when all assignments are
accepted. Configure the Positive connection line coming from this Task
node to indicate an instruction that indicates that Leasing and Warranty
Contracts have been reviewed and this asset is under a contract.
Configure the Negative connection line coming from this Task node to
indicate an instruction that Leasing and Warranty Contracts have been
reviewed and this asset is not under a contract.
• Condition Node
A Condition node indicates an evaluation of the record, based on data
in the record. You use a Condition node to have Tivoli process
automation engine to make a true/false evaluation of the record, then
direct the record based on that evaluation. When Tivoli process
automation engine encounters a Condition node, it evaluates the
record based on the SQL statement defined in the node properties,
then routes the record to either the positive or negative connection line
exiting the node. You place a new Condition node on the canvas by
using the Condition Node Tool in the palette. A process can have one
or more Condition nodes, but you do not have to include Condition
nodes in a process.
• Manual Input Nodes
A Manual Input node indicates a need for user input because there are
multiple directions that a record can take in a process. You use a
Manual Input node to have a person decide what should happen next.
When Tivoli process automation engine encounters a Manual Input
node, it displays a dialog box to the user. The Manual Input dialog box
contains a menu of options for routing the record. When the assignee
selects an option, Tivoli process automation engine triggers any
actions or notifications associated with the option. You place a new
Manual Input node on the canvas by using the Manual Input Node Tool
in the palette. A process can have one or more Manual Input nodes,
but you do not have to include Manual Input nodes in a process.
• Subprocess Nodes
A Subprocess node indicates that a separate Workflow process is
contained within a Workflow process. You use a Subprocess node to
break a complicated business process down into smaller self-contained
units. For example, you might use a different process for different
subcategories of records, such as records from different Sites, or
different classes of work orders. When Tivoli process automation
engine encounters a Subprocess node while routing a record through a
process, it routes the record into the subprocess. When the record
encounters a Stop node within the subprocess, Tivoli process
automation engine returns it to the main process at the same point
where it left the process. You place a new Subprocess node on the
canvas by using the Subprocess Node Tool. A process can have one or
more Subprocess nodes, but you do not have to include Subprocesses
nodes in a process. A Workflow can have one or more Subprocess
nodes based on the complexity of your business process and how you
choose to design the process.
• Wait Nodes
A Wait node indicates that a record.s progress through a process
should pause until a required condition is met. You use a Wait node to
create a reaction to a database event, for example, a status change, or
a record being updated. You might use a Wait node when Tivoli
process automation engine is integrated with another system, for
example, an external financial system, and must exchange data with
that system. When Tivoli process automation engine encounters a Wait
node it pauses at the node indefinitely, until any event specified in the
node properties occurs. At that point, the record resumes its progress
through the process, and Tivoli process automation engine triggers any
actions or notifications specified on the properties of the connection
line exiting the node. You place a new Wait node on the canvas by
using the Wait Node tool in the palette. A process can have one or
more Wait nodes, but you do not have to include Wait nodes in a
process. A Wait node cannot precede a node that requires user
interaction (Interaction node or Manual Input node).
For example for using the Wait node is: Part of a client's workflow
requirement is that an asset record in a workflow process does not
move to the next part of the workflow until the field Is running? on the
asset record had been updated. You can accomplish this by using a
Wait node. Configure the Wait node event to: [Link].
After the wait node, have a Condition node compare the old and new
values of the field of interest or test for a difference in the data value
conditionally: ISRUNNING = 0.
• Interaction Nodes
An Interaction node provides one option for a user interaction with a
record. You use Interaction Nodes with Manual Input nodes to guide a
user through a structured interaction with a Tivoli process automation
engine record. When Tivoli process automation engine encounters an
Interaction node while routing a record through a process, the result
depends on how the node is configured. In addition, Tivoli process
automation engine can display a message dialog box containing
instructions to the user. You place a new Interaction node on the
canvas by using the Interaction Node Tool in the palette. A process can
have one or more Interaction nodes, but you do not have to include
Interaction nodes in a process. A Manual Input node usually precedes
an Interaction node. If an Interaction node leads to an application not
To get a detailed overview about the different properties and connection lines for
each node in the Workflow Designer, refer to the MAXIMO Online Help or to
[Link]
/621_mx_wkfl_imp.pdf
user-defined actions. You use the Workflow Designer tools to place, connect, and
configure the nodes and lines.
For example, your business requires the blocking of status changes when a work
order record is in workflow, unlocking at a certain point to perform a status
change to APPR, and then relocking when the status change occurs. To
configure this define this example in the Workflow Designer, need the implement
the following steps:
1. In the Actions application, create an Action Group for the work order object
with the following members in the following order: OKSTATUS, Work Order
Approval action, NOSTATUS.
2. On the workflow connector line where the status block is to begin use a
NOSTATUS action.
3. To unlock the status change block, prior to the next status change, on a
connector line use the Action Group.
4. Each node except the Start node must have at least one line entering it.
5. Each node except a Stop node must have at least one line exiting it.
You have to configure more examples to get familiarized with the Workflow
Designer.
[Link]
/621_mx_wkfl_imp.pdf
You use the Processes table window to view, modify, and stop active process
instances. When a record leaves the control of Workflow, the system removes
the entry from the Processes table window. You can use Workflow Administration
application to perform the following tasks:
View Workflow assignments.
Reassign Workflow assignments.
Delete Workflow assignments.
Stop active processes, removing the record from the control of the processes.
You can add new conditions by adding New Row and fill in the appropriate
information. The Conditional Expression Manager application contains one table
window only, which displays the list of conditions. You use the table window to
add, view, modify, or delete conditions.
When the expression evaluates to true, conditions let you configure access to
fields, tabs, and other user interface controls within applications. For example,
you can set the following types of conditional access:
Give read-only access to information displayed in a field.
Give read-write access to information displayed in a field.
Give a user group read-only access to a specific field or action in an
application.
Give all members of a user group read-write access to a specific application.
Do not display a field or tab in an application to certain users.
You can also set access to application options, controls, or data elements.
Examples include:
Grant access to application options in the Select Action menu for a security
group.
Configure any property in a control for a group, such as making a control
hidden, masked, read-only, or required.
Configure other properties, such as color, label, and application link, to differ
according to group and different conditions.
Show or hide a data attribute globally or for a security group.
The system uses a syntax like Structured Query Language (SQL). However, the
syntax of this system uses additional variables. For easier evaluation of your
expression, you can use the Conditional Expression Manager Builder.
The first wonum is the wonum attribute on the workorder object. At run time, the
system replaces the second wonum with the value of the “wonum” attribute for
the current business object.
Detailed information about the Syntax are given in the Maximo Online Help.
Figure 3-15 shows the options of the Conditional Expression Manager and the
validation results.
Formulare which are not correct, will be validated and an error message will be
shown.
Use the Condition Expression Manager and test the following expression by
using the WORKORDER object, as shown in Example 3-2.
The result brings up the following error message as shown in Figure 3-16.
To open the different applications inside the platform configuration module, you
go to Go To → System Configuration → Platform Configuration, as shown in
Figure 3-17 on page 62.
Platform Configuration
– Actions
• Manage the administrative functions of creating actions and action
groups within escalations.
– Roles
• Manage roles within Tivoli Maximo Asset Management.
– Communication Templates
• Create and manage generic communication templates that users can
leverage to standardize
• Frequently used e-mail communications (also known as notifications).
– Database Configuration
• Create or modify the objects and attributes used by Tivoli Maximo
Asset Management applications.
– Application Designer
• Create new applications (clones and custom applications) or tailor the
pages of existing applications.
– Escalations
• Automatically monitor critical processes across your enterprise. The
primary goal of Escalation Management is to ensure that critical tasks
are completed on time, such as those defined in service-level
agreements (SLAs).
– Cron Task Setup
• Cron tasks are behind-the-scene jobs set to run automatically and on a
fixed schedule.
– Domains
• Maintain lists of defined values that appear in drop-down lists
(sometimes referred to as value lists).
– Logging
• Manage log settings and configure log files.
– System Properties
• Manage system properties and their values used by various product
components.
– Web Services
• Create, modify, and delete Web services. You also can generate
schema and Web Service Description Language (WSDL) files for any
Web service that you deploy. External applications can use Web
services to query or to send transactions to the Integration Framework.
– Workflow Administrator
• View and modify assignments within the workflow, escalation, and
service-level agreement processes.
– Workflow Designer
• Use this graphical application to create a series of decision paths for
records to flow through, called workflow process.
– E-mail Listener
• Receive and process incoming e-mail messages. This application can
monitor multiple e-mail accounts to retrieve messages, and it supports
embedded and normal message attachments.
– Launch in Context
• Create and manage launch entries that open, in the same or a different
browser session, an application that is external to the system.
– Object Structures
• Create, view, modify, and manage the processing logic of an object
structure. An object structure is the common data layer that the
Integration Framework uses for all outbound and inbound application
data processing. An object structure consists of one or more
sub-records that develops their XML content from a particular object.
In addition to the platform configuration, you will find the migration part under the
System Configuration. To open the Migration application, select Go To →
System Configuration → Migration, as shown in Figure 3-18
– Migration
• Manager Define, create, distribute, and deploy packages. Packages
are used to transfer and deploy the many configuration changes
possible with the Tivoli Maximo Asset Management configuration tool
set from one environment to another (that is, from a development
environment, to test environment, to production environment).
– Migration Groups
• Create groups of configuration objects and link related (dependent)
groups to the objects that you create. You group configuration objects
to ensure that all related configuration data is collected from source
environments and distributed to target environments.
In this chapter, we will cover the functionality of the following applications from
the Financial Configuration:
Currency Codes
Exchange Rates
Chart of Accounts
Cost Management
The Currency Codes application is accessed through the List Tab plus the Select
Action menu. To create a new currency, just click on New Row button, as shown
in Figure 4-2 on page 69, button the fill in the following fields:
Once you have created all the required currency codes, these codes will be
avaiable to be used in all applications.
The currency codes are considered at the Organization Level. This means that
you can use the same currency code through different organizations, so you
don’t need to create a set of currency codes for each organization you need. This
is important because the Currency Codes application is a very simple
application, but it is the base for all other financial applications.
Note: To use the Currency Code and any other Financial Configuration
applications, you must have Organizations already configured.
To use the Exchange Rates application, go to the Go To menu, and then select
Financial → Exchange Rates.
The application will show all valid Organizations, as shown in Figure 4-3 on
page 70, and all already existing exchange rates. If the exchange rates for your
site is empty, you can create an exchange rates simply by clicking on the New
Row button.
Once you click on New Row, a Detail section will be created in order to allow you
to create the required exchange rate. The fields that you will be using are:
Convert from Currency: Type here the currency that must be converted, i.e.
EUR for Euros.
Convert to Currency: Type here in what currency you want to the currency to
be converted to, for example USD, if you want to convert Euros to US Dóllars.
Exchange Rate: Here you can specify the conversion rate between the two
currencies.
Active Date: Specify the date when this exchange rate was activated.
Expiration Date: Specify the last date that this exchange rate can be used by
the system).
Memo: This field is free for use with administrator’s notes regarding this
operation.
Note: The application Chart of Account is very important since it is used for all
other applications, so you need to plan very well how to implement a good set
of GL Accounting components to avoid major changes in the future.
You first need to specify the format of General Ledger account codes using the
GL Account, then go to Configuration action in the Database Configuration
application to configure the GL Account. The GL Account format includes the
number and length of components and delimiters.
You will define tax codes, rates, and dates using Purchasing Options → Tax
Options in the Organizations application.
General Ledger account codes typically include components (segments) sepa-
rated by delimiters:
Example: 6210-300-000
3. This option will allow you to create the main configuration of GL Account.
Since in this example we are using the format: 6210-300-000 they are related
to a structure like WORKTYPE-OBJECTTYPE-OBJECT, but we can change
this structure as shown in Figure 4-5.
4. Once you have specified the fields, Length, Type and the Screen Delimiter for
each of the components (Worktype, Objecttype and Object), you can move to
You must define at least one financial period. The system adds a financial period
stamp to all transactions when you generate them. The transactions must occur
during an open, valid financial period. The requirements of the accounting
system you use determine the format of the period.
Period: Is the name of that financial period that you are creating. Must be
something useful to you.
From: Is the date when your financial period is beginning.
To: Is the end date for the financial period.
Accounting Close Date: Is the planned date to close the financial period.
Actual Close Date: Is the real date when the financial date was real closed.
Closed by: Is the username of the person who actually close the financial
period, as shown in Figure 4-7.
The application is displayed in its List Tab. The main fields are as shown in
Figure 4-8.
The most important fields are Project, Budget, Value and Parent Project. In
those fields are specified the enough information in order to track the project’s
budget more effectively and keep tracking of cost of each required task.
To create a relationship between task and the budget’s cost, you need to create a
separate cost line per each task by clicking on New Row, as shown in Figure 4-9.
The application itself is quite small, but very important, when you have to specify
the line items and its costs by project. This information can be used internally for
integration among other applications.
The Security Groups application defines all groups and their privileges.
The Security Groups application is the building block for the security
infrastructure. You configure security groups, either independent or
non-independent, to provide narrow access or broad access to applications,
Sites, labor, and other settings, such as general ledger components and approval
limits and tolerances.
The security group to which a user belongs controls the user’s level of access
and privileges within the system. The system generates a user’s security profile
from all the groups in which a user is a member, using business rules to
determine how the various security groups combine to build a virtual security
profile. The security profile is like a fingerprint. It uniquely defines a user’s access
rights and privileges.
When you first implement the system, the Security Groups application has four
groups:
DEFLTREG - allows a user to change his or her password if it expires. It
contains no other rights. When you insert a new Users record, the system
places the user in this default group, though you can specify a different group
to be the default using the Security Controls dialog box.
You must create additional groups, with different sets of rights, to be able to
assign users different sets of privileges.
If you want new user security profiles to start with more rights, you can modify the
DEFLTREG group to include them.
Note: Using LDAP (Lightweight Directory Access Protocol) with the system
entails special consideration. Consult the System Administrator's Guide
([Link]
ic=/[Link]/[Link]) for information on integrating the
system with LDAP.
Note that prior to moving to production the building blocks of your migration will
be:
Organization
Users
Assets
2. You are then able to view the existing security groups, as shown in Figure 5-2
on page 81.
3. In the Security Groups window, click on the New Group icon. The system
displays the Group tab. See Figure 5-3.
By default, the system merges rights when groups that include different sites
are combined.
8. If you do not want rights combined, select the Independent of Other
Groups? check box, as shown in Figure 5-5.
You use the Sites tab in the Security Groups application to assign site access
privileges to a group.
2. On the List tab, select the group for which you want to assign site access.
3. Click the Sites tab.
4. If you want the group to have access to all sites, select the Authorize Group
for All Sites? check box.
Note: If you select this check box, you cannot add individual rows in the Sites
table window.
Notes:
You can only add sites that you have access to. You can only add inactive
sites to a group if your user record is authorized for inactive sites.
There is no limit to the number of security groups you can create.
Note: You can filter the list of applications in the Applications table window,
which will cause any of the changes you make using the Grant or Revoke
Listed Applications buttons to affect only the applications which appear in the
table window.
The Options table window displays the options, including menu items and the
read, insert, save and delete options for the application you have selected.
4. If you want to set options for a different application, select that application in
the Applications table window.
5. In the Options table window select the check boxes for the options you want to
grant access to, or clear the check boxes to remove privileges. If you want to
select all check boxes, click Grant Listed Options for This Application.
Note: The Grant Listed Options button is not a toggle, so be sure you want
to select all check boxes before using it. To revoke all application options in the
options table window at once, you can simply revoke Read access from the
application.
Note: In some applications, users can view storerooms even though they are
not authorized for transactions.
3. If you want the group to have access to all storerooms, select the Authorize
Group for All Storerooms? check box.
Note: If you select this check box, you cannot enter individual storerooms in
the Storeroom Authorization table window.
Note: You can only add storerooms that your user ID allows you to access.
Note: The Base Currency field, which is read-only, shows the Base Currency
1 for each organization. You must use this currency in setting limits.
Values in these fields default to 0 when you create a new record. A value of 0
means that the group has a limit of 0 in that field, while an empty (null) field
means the group has unlimited approval permissions in that field.
– In the Invoice Tolerance section, set as needed the upper and lower
tolerances by amount and/or percent.
– In the Tax Tolerance section, set as needed the upper and lower
tolerances by amount and/or percent.
– In the Service Tolerance section, set as needed the upper and lower
tolerances by amount and/or percent.
5. Click Save Group.
You can specify which records that members of a group can access. You do not
use this feature to restrict access to applications and menus, or to prevent a user
from entering data; you control those privileges from the Applications tab.
For example, you might want to restrict a maintenance group so that they only
have access to their own personal information or to the labor in their same craft
no matter what application they are using to access the information.
– Object Restrictions - to enter a restriction that applies to an object, such as
a database table or view.
– Attribute Restrictions - to set a restriction on one database field.
– Collection Restrictions - to set restrictions on collections of assets,
locations, and configuration items.
You can set restrictions on which records a group can access. You use an
SQL-style expression or a class file to define and apply these restrictions.
1. On the List tab of the Security Groups application, select the group for which
you want to set restrictions.
2. On the Data Restrictions tab, select a tab to set restrictions on either objects
or the attributes.
In the table window below the tabs, click New Row to open the row details. See
Figure 5-12.
3. In the Object field, specify the table or view on which to set the restriction. In
the Attribute Restrictions tab, you can also specify the attribute that you want
to restrict.
4. In the Application field, select the application to apply the restriction to.
Leave it blank for the restriction to apply to all applications that use the object
or attribute.
5. In the Type field, select the type of restriction.
6. Select the Reevaluate? check box if you want the system to reevaluate the
restriction condition when the user moves to another field by pressing the Tab
key. If you do not select this check box, the restriction conditions are
evaluated after you save the changes to a field.
7. In the Condition field, click Detail Menu and choose either Select Value to
pick from a list of existing expressions, or Go To Conditional Expression
Manager to manage your existing expressions or create a new conditional
expression. For more information on building conditional expressions, see
Conditional Expression Manager online help.
8. Click New Row to add more restrictions on the group, or click Save Group to
apply your changes
On the List tab, select the group to which you want to add a user.
1. Click the Users tab.
2. In the Users table window, click New Row. The Row Details open.
3. In the User field, enter the user ID or click Select Users to select an option
and retrieve a user ID. See Figure 5-13 on page 92.
The system enters the associated user information in the other fields.
5. Click New Row again to add another user, or click Close Details.
6. Click Save Group.
Tips:
To add a user to a group, you must be authorized to reassign users to that
group. You do this using the Authorize Group Reassignment action in the
Select Action menu. If you have created a new group, the system
automatically authorizes you to reassign users to the group.
If implementation uses an application server to authenticate with a
directory, you may associate users with groups in the directory or the
system, depending on your system settings.
When you create a group, the system automatically authorizes you to add
users to the group. Users can be added from the Users tab of the Security
Groups application, or from the Users application.
If implementation uses an application server to authenticate with a
directory, groups may be created in the directory and synchronized into the
system.
You now have a new group with no defined privileges or restrictions. You use the
other tabs and the Select Action menu to define the security for the group.
– Create database users (if you are using an external directory, this
functionality is not available)
The Users application and the Security Groups application work together. You
use the Security Groups application to define security groups, then assign users
to one or more groups to create security profiles which control authorizations. A
user record requires a person record.
In addition to granting rights to individual users, you can add, delete, and replace
group privileges for multiple users at one time. You can also manage user status
for multiple users. The Users application also allows you to grant a user database
access.
User: to add, view, modify, or delete user records, including specifying several
default settings.
Groups: to specify and view the security groups to which a user belongs.
Note: If you do chose to use self-registration for user records, a new user
can register without having any existence. A record with a status NEWREG
has a workflow, SELFREG, that notifies the user that the request is being
reviewed.
Note: For more information on Start Centers refer to Chapter 7, “Start Center
configuration” on page 139.
You assign or change the start center for a group from the group's record in the
Security Groups application.
These two types of security groups provide flexibility when you build the security
infrastructure for your organization. Simple organizations might use one or two
security groups; however, larger organizations with many users and a complex
infrastructure might want to build some security groups that reflect varying levels
of application and storeroom access and approval limits.
In addition, a user can use the My Profile action to set their own default insert
site
Note: A default insert site is not required. However, as a best practice, assign
a default.
The User Name field, which defaults to the new user ID you typed when you
created a user, is the login name the user uses when logging into the system.
The user ID must be unique for all user records in the system. However, you can
change the user name, which is case sensitive, to an employee number or e-mail
address.
The Security Profile tab shows the user’s security profile after the system has
combined all of the user’s security groups. Sorted by site, the security profile is
an expandable tree structure presentation of the user’s virtual profile.
You use the Users applications to add users and to manage their security
privileges. You can perform these tasks in the Users application:
Manage user status
Manage user sessions
View user security profile
Specify various user defaults, such as default insert site, default storeroom,
default language, and default General Ledger accounts for purchasing (The
default purchasing account is the General Ledger account that will be used for
Desktop Requisitions, but not for all purchasing.)
Grant users the right to access inactive sites
Specify which users can access a screen reader to assist in interacting with
the system
Set system-wide security controls and new user default groups
Change passwords (if you are using an external directory, this functionality is
not available)
Create database users (if you are using an external directory, this functionality
is not available)
The Users application and the Security Groups application work together. You
use the Security Groups application to define security groups, then assign users
to one or more groups to create security profiles which control authorizations.
In addition to granting rights to individual users, you can add, delete, and replace
group privileges for multiple users at one time. You can also manage user status
for multiple users.
Note: As a best practice, create person records before you create user
records. You create person records in the People application. When you
create a user record, the application checks for a corresponding person record
by trying to match a user ID with a person ID. For example, if you create a user
record for JSmith, the system checks for a corresponding person ID, JSmith, in
the person table. If a corresponding person record is not found, the application
notifies you
Note: You could have a User ID that you want to associate with a different
person ID. For example, an employee marries and changes their last name,
and last name is used as their person ID. You use the Change Person action
to change the association between the user ID and the person ID.
You cannot associate a person ID that is already a user with a second user ID
4. In the Type field, click Select Value and select the license type.
Note: The system has user types 1 through 10. In the USERTYPE domain,
update the descriptions to reflect the types of users in the license. The
appropriate type must be associated with each user ID to ensure license
compliance. These values can be modified in the DOMAINS option under
System Configuration → Platform Configuration (Figure on page 100).
5. The User Name field defaults to the ID name in the User field, but you can
type a different value. The user types a user name to access the system.
6. Click Set Password. The Set Password dialog box opens.
a. Select one of these options:
• To generate a random password, click Generate Password.
• To specify a particular password, type the password in the Password
field and re-type it in the Confirm Password field.
b. To send an e-mail message to the user containing their password, select
the E-Mail Password to User? check box. To be able to send an e-mail to
a user, e-mail must be enabled and the user must have an e-mail address
in their person record.
Note: The E-Mail Password to User? option is selected and read-only when
the Always E-mail Generated Passwords to Users (Never Display on Screen)
option in the Security Controls dialog box is selected.
The E-Mail Password to User? option is editable when the Allow Generated
Passwords to Be Displayed on Screen option in the Security Controls dialog
box is selected.
100 Certification Study Guide Series: Foundations of Tivoli Process Automation Engine
Draft Document for Review June 17, 2009 9:59 am [Link]
c. If you do not want to force the user to change their password when they
initially sign in, clear the Password Should Expire After First Login?
check box. This check box is selected by default.
d. Click OK to close the Set Password dialog box.
7. If appropriate, enter additional personal data about the user in the Personal
section. The system uses this information to create a user record.
8. If appropriate, specify default settings for the user in the User Settings
section.
Note: As a best practice, assign a default insert site. Without a default insert
site, many applications will not function. For example, you will not be able to
insert purchase orders or labor records in an application that is defined on site
level
Note: A new user has no security authorizations until you assign them to
security groups.
Note: You can only add security groups that you have been authorized to
manage. You use the Authorize Group Reassignment action to grant
someone the ability to assign users to security groups. Depending on your
security structure, an administrator authorizes you or you can authorize
yourself.
In the Users application, display the record that you want to assign to groups.
See Figure 5-17 on page 102.
102 Certification Study Guide Series: Foundations of Tivoli Process Automation Engine
Draft Document for Review June 17, 2009 9:59 am [Link]
The first level of the tree contains two different types of nodes or branches, as
shown in Figure 5-19 on page 104.
System level applications - The System level node contains System-level
applications. You can expand each application to view the actions that the
user has been authorized to use.
Sites - These nodes contain authorizations that correspond to the tabs in the
Security Groups application: Applications, Approval Limits, GL Components,
Labor, Restrictions, Storerooms, and Tolerances. You can expand each
authorization to view the details of the user’s security authorization.
When you add or modify the groups to which a user belongs, you must save the
record before you can see the modifications on the Security Profile tab.
104 Certification Study Guide Series: Foundations of Tivoli Process Automation Engine
Draft Document for Review June 17, 2009 9:59 am [Link]
3. In the Update Groups section in the Set Security Profile dialog box, select one
of these options in the Group field:
a. Add - Adds the groups to the profiles of the selected user. If the groups to
be added exist in the selected user's profile, the record is not updated.
a. Remove - Removes the groups from the profiles of the selected user. If a
selected user's profile does not include the groups to be removed, the
record is not updated.
a. Replace - Replaces all groups in the profiles of selected user with the
groups you specify here. All of the user’s groups are removed and
replaced with the specified groups.
4. In the Groups table window, click New Row.
5. In the Group field, type a group or specify a value. See Figure 5-21 on
page 106.
The Independent of Other Groups? check box is read-only. You set this value in
the Security Groups application.
6. If necessary, click New Row again to specify additional groups.
7. In the Update User Defaults section, select the Edit? check box above a field
to make the field editable. Type new defaults as needed.
8. Click OK
106 Certification Study Guide Series: Foundations of Tivoli Process Automation Engine
Draft Document for Review June 17, 2009 9:59 am [Link]
4. From the Select Action menu, select Set Security Profile. In the Set Security
Profile dialog box, the Records Being Updated field displays the number of
selected users.
5. In the Update Groups section, in the Group field, select one of the following
options:
a. Add - Adds the groups to the profiles of the selected users. If the groups to
be added exist in the selected user’s profile, the record is not updated.
b. Remove - Removes the groups from the profiles of the selected users. If a
selected user's profile does not include the groups to be removed, the
record is not updated.
c. Replace - Replaces all groups in the profiles of selected users with the
groups you specify here. All of the user’s groups are removed and
replaced with the specified groups.
6. In the Groups table window, click New Row.
7. In the Group field, type a group or click Detail Menu to specify a value.
8. The Independent of Other Groups? check box is read-only. You set this value
in the Security Groups application.
9. If necessary, click New Row again to specify additional groups.
[Link] the Update User Defaults section, select the Edit? check box above a field
to make the field editable. Type new defaults as needed.
[Link] OK to display the number of records that have been updated.
You can access the Security Controls action from either the Security Groups or
the Users applications.
108 Certification Study Guide Series: Foundations of Tivoli Process Automation Engine
Draft Document for Review June 17, 2009 9:59 am [Link]
Note: If you implement electronic signatures, you must enable Login Tracking.
3. Click OK.
You can also configure the system to populate person, user, and group
information from the external directory. The system currently supports
synchronization of information from Microsoft Active Directory.
A user types a login ID and password in the Welcome page. The security
functions validate whether the user ID and password exist in the database. The
user is granted access to applications, actions, and data based on the security
groups with which their user ID is associated.
In addition, when the security services load at system startup, they perform the
following actions:
Verify if Login ID is blocked or inactive
Authenticate Login ID and updates password history (if configured)
Establish user’s default insert Site, Organization, and Person ID
Establish the user’s language, locale, time zone, and Start Center ID
Route any Workflow assignments to the user’s inbox (if Workflow processes
are enabled)
The following procedure is the most common way to authenticate application
access:
1. At the Web client login screen, users type a login ID (in the User Name field)
and password.
2. Security services validate users’ credentials against the Maximo database.
This validation uses Java encryption to check the user in the Maximo
schema/database.
3. The system checks users’ security profiles. Based on the authorizations that
they contain, the system grants users access to the applications.
110 Certification Study Guide Series: Foundations of Tivoli Process Automation Engine
Draft Document for Review June 17, 2009 9:59 am [Link]
In the system, you can use data restrictions to limit the data to hide entire records
or to make them read-only. You can also create data restrictions at the attribute
level and make them hidden, read-only, when required. Because these data
restrictions exist at the data level, they apply to any user interface element or
application that uses an object or attribute.
The following information can help you determine the best place to create the
restrictions:
Data restrictions always win over application configurations in the Application
Designer application. For example, if an attribute has a data restriction that
makes it read-only, the Application Designer application can never make that
attribute editable. The hierarchy is:
– Database configuration
– Data restriction
– Application Designer application
Configurations that you create with data restrictions apply everywhere an
attribute is used, while Application Designer configurations does not. For
example, you want to restrict access to a field that appears in the header
section of multiple tabs. If you put a data restriction on the attribute, all of the
fields inherit the restriction. If you configure the same restriction in the
Application Designer application, apply the same configuration to each field
on each tab.
Configurations using Application Designer are always for one application.
Configurations that use data restrictions can apply either to all applications
that use the object/attribute or to one specific application.
Note: A data restriction created on an object does not apply to views of that
object. Create a separate restriction for the view.
When the expression evaluates to true, conditions let you configure access to
fields, tabs, and other user interface controls within applications. For example,
you can set the following types of conditional access:
Give read-only access to information displayed in a field
Give read-write access to information displayed in a field
Give a user group read-only access to a specific field in an application
Give all members of a user group read-write access to a specific application
Do not display a field or tab in an application to certain users
You can also set access to application options, controls, or data elements.
Examples include:
Grant access to application options in the Select Action menu for a security
group
Configure any property in a control for a group, such as making a control
hidden, masked, read-only, or required
Configure other properties, such as color, label, and application link, to differ
according to group and different conditions
Show or hide a data attribute globally or for a security group
112 Certification Study Guide Series: Foundations of Tivoli Process Automation Engine
Draft Document for Review June 17, 2009 9:59 am [Link]
Conditional Expression Manager function. We will only allow the assets of type
IT to be listed in the Asset application.
To create a condition:
1. In the Conditional Expression Manager application, All Conditions table
window, click New Row. The Row Details opens. For our example we have
used the following:
• Condition = ITASSET
• Description = Asset type is IT
• Type = Expression
• Expression = :assettyp = ‘IT’
2. Type a value in the Condition field. By default, the condition is assigned a
number. You can, however, modify this field. See Figure 5-24 on page 114.
3. Type text in the Description field.
4. In the Type field, specify a value or click Select Value to choose a type.
5. In the Expression field, click SQL Expression Builder to build a condition.
The SQL Expression Builder dialog box opens.
Note: The value that you specified in the Type field determines whether you
can edit the field or if it is read-only. If you selected Class in the Type field, the
Expression field is read-only. If you specified Expression in the Type field,
then you can edit the Expression field
6. Enter a file name in the Class field. The file must be in a folder under the root
of the product installation.
Note: The value that you specified in the Type field determines whether you
can edit the Class field or if it is read-only. If you selected Expression in the
Type field, the Class field is read-only. If you specified Class in the Type field,
then you can edit the Class field.
Note: The Reference Count field is not editable. The value in this field
automatically increments when the condition is specified in another
application.
8. Go to Security Groups
9. On the object Restrictions sub-tab, select New Row to create a new data
restriction
• Object = ASSET
• Application = Null
• Type = Qualified
• Reevaluate = checked (this is the default)
114 Certification Study Guide Series: Foundations of Tivoli Process Automation Engine
Draft Document for Review June 17, 2009 9:59 am [Link]
[Link] out then log in again as the user whom the security group this restriction
applies to. Only “IT Assets” will be displayed, as shown in Figure 5-26.
5. Go to Security Groups.
6. Find the security group you are intending to use then go to the Applications
tab.
7. Select Asset application.
8. Find the Safety tab option and Grant it. See Figure 5-28 on page 117.
116 Certification Study Guide Series: Foundations of Tivoli Process Automation Engine
Draft Document for Review June 17, 2009 9:59 am [Link]
9. Logout and Login as the user belonging to the security group to whom the
condition applies. You will notice that the safety tab do not display, as shown
in Figure 5-29 on page 118.
118 Certification Study Guide Series: Foundations of Tivoli Process Automation Engine
Draft Document for Review June 18, 2009 10:20 am [Link]
The Integration Framework, as shown in Figure 6-1 on page 121, comes with
advanced integration functionality, including:
A real-time engine for real-time inbound Web services queries.
Synchronous and asynchronous Java Message Service (JMS) based
message exchange.
Ability to build, transform, and customize message content
Means to configure, predefine, and create new integration definitions based
on Maximo’s out-of-the box pre-configured integration contents:
– Object structures
– Publish channels
– Enterprise services
– External system (EXTSYS1)
– Adapter (MAXIMO)
– Endpoints
Defining and managing multiple integration triggers, message format (XML
Flat File, Integration Table) and systems.
120 Certification Study Guide Series: Foundations of Tivoli Process Automation Engine
Draft Document for Review June 18, 2009 10:20 am [Link]
We will briefly go through the options of the Integration module. To view these
modules click on Go To → Integration (See Figure 6-2).
122 Certification Study Guide Series: Foundations of Tivoli Process Automation Engine
Draft Document for Review June 18, 2009 10:20 am [Link]
– Query
Import and export application data
Each Integration Object consists of:
Persistent
Non-Persistent
User defined field
The product includes various pre-defined object structures out of the box to
facilitate the development of integration contents. In creating object structures,
instead of having to create new components, duplicate and use the existing.
The publish channel can use the following processing layers to map the XML to
the external system XML:
Processing class
User exit class
XSL map file
The publish channel can apply any specified processing rules to objects before it
saves the objects. Processing rules are used to access and retrieve pertinent
data from objects which are not included in the object structure.
You can override the behavior of predefined data processing that the enterprise
service supports through the integration controls. This integration control
behavior are implemented through enterprise service processing rules and Java
processing classes.
124 Certification Study Guide Series: Foundations of Tivoli Process Automation Engine
Draft Document for Review June 18, 2009 10:20 am [Link]
The content of an enterprise service data structure is based on the content of the
associated object structure. When you trigger enterprise service processing, the
system moves the integration framework message data into the inbound queue.
If necessary, you can use the object structure processing rules to define
conditions under which the integration framework can skip or stop a message.
When you use processing rules, you also can change data in the enterprise
service, before the creation of the objects. You can achieve this task without
having to use Java class files.
You also can alter the logic of predefined inbound processing, inbound channel
mapping, and event filtering through the use of Java class files. These alterations
are specific to the enterprise service record and overwrite any predefined
processing logic you define at the object structure level.
126 Certification Study Guide Series: Foundations of Tivoli Process Automation Engine
Draft Document for Review June 18, 2009 10:20 am [Link]
3. The integration framework writes the message to the inbound queue. If the
message contains multiple instances of a document, for example, if a single
message contains 10 person records, the application writes 10 messages to
the queue. If one of the referred records has a processing error, a single
message processing exception is identified and none of the other messages
that can be successfully processed are committed to the database.
4. The integration framework updates the message header with the external
system and enterprise service names. You have the option to preview the
data that you want to import to check the format and the data validity of a
source file. It is a synchronous validation mechanism that presents all the
source file processing errors without committing data to the database.
The preview data process verifies that the data structure of the selected file
complies with the integration XML or flat file definitions.
For example, you might want to extend the Purchase Order application by
making the following configuration changes:
Add a new table and several columns to the database (using the Database
Configuration application)
Add a new domain that contains several lookup values (using the Domains
application)
Add a new tab in the Purchase Order application screen presentation (using
the Application Designer application)
Develop a workflow process to automate an approval of data managed
through the new table (using the Workflow Designer application)
All of the preceding configuration changes are product configurations that are
typically created in a development environment and promoted to production.
6.3.1 Overview
Migration Manager is a set of applications that enables a structured set of steps
to promote your configurations from one product environment to another.
You can use the Migration Manager to perform the following tasks:
Organize and consolidate all the configurations and customizations for a new
product environment.
Promote your configurations from a development environment to a test
environment for validation.
Promote your validated configurations from a test environment to a production
environment.
A package contains data either from the product database or from files that are
deployed on the application server. Data from the product database is organized
in migration objects and migration groups. Files are organized as compiled
128 Certification Study Guide Series: Foundations of Tivoli Process Automation Engine
Draft Document for Review June 18, 2009 10:20 am [Link]
sources.
Note: The batch size of a package which is the number of records at a time
that are retrieved at one time from each object in a migration group. The
default value is 100.
Package contents
A package contains the following:
Package manifest - contains important information about a package, such as
the source environment versions, the migration objects whose data is
included in the package, the types of content in the package, the record count
for each migration object, and README information entered in the source
environment by an administrator to help during deployment to a target
environment.
Package metadata - defines metadata information that pertains to the
package definition of the package to be deployed in a target environment
Structural configuration content - data that must be used to create or update
database tables, columns, views, keys, indexes and sequences
Non-structural configuration content - configuration content that resides in the
form of records of various configuration tables
Compiled sources - files that include source code customizations, libraries,
configuration files, and report executable files
History data - life cycle information regarding the package
Migration objects
A migration object is a group of one or more related business objects that
represents one or more database tables (for example, workflow process, action,
role) You define migration objects in a development instance and then move
them into test and production environments. The product includes a
comprehensive set of migration objects. Migration objects are implemented using
the Object Structures application. You can also create your own migration objects
using this application.
Migration groups
A migration group is a collection of related migration objects. It allows one to
organize and group configuration content that will need to be migrated. A
migration group can be either internal or user-defined. Internal migration groups
are included with the product and are linked to other logically related migration
groups called dependencies. You cannot modify internal migration groups.
User-defined migration groups are migration groups that you create.
Compiled sources define content from outside the database that packages
contain when they are migrated. Compiled sources are files that must be part of
the Enterprise Archive (EAR) file of the product. They can include many types of
files, such as class files, archive files, image files, and properties files. They can
also be aggregations of files from the server file system that must be migrated
with configuration data from the database.
If you need to migrate multiple compiled source files, aggregate them into a
single compressed file to simplify the migration process.
130 Certification Study Guide Series: Foundations of Tivoli Process Automation Engine
Draft Document for Review June 18, 2009 10:20 am [Link]
A package definition can be associated with any target. However, you can set
inbound restrictions in a target environment to prevent the distribution and
deployment of packages to that environment from restricted sources.
Each migration group can be linked to other related migration groups. This
relationship between migration groups is called a dependency.
132 Certification Study Guide Series: Foundations of Tivoli Process Automation Engine
Draft Document for Review June 18, 2009 10:20 am [Link]
You specify the type when you create a package definition. Every package that is
created from a package definition is of the same type as the package
[Link] types of packages can be defined in the Migration Manager
application. See Figure 6-8 on page 134.
Snapshot™
Change
134 Certification Study Guide Series: Foundations of Tivoli Process Automation Engine
Draft Document for Review June 18, 2009 10:20 am [Link]
Note: Migration Manager gives you the flexibility to have all or a subset of your
configurations defined, created, distributed and deployed at a time.
Note: You can migrate configuration content between any two product
environments.
Note: To preserve the integrity of structural changes, you can only deploy one
package at a time to preserve the integrity of the structural change.
136 Certification Study Guide Series: Foundations of Tivoli Process Automation Engine
Draft Document for Review June 18, 2009 10:20 am [Link]
configuration of the product or at any time when you want to change your
configuration of the product.
138 Certification Study Guide Series: Foundations of Tivoli Process Automation Engine
Draft Document for Review June 17, 2009 10:04 am [Link]
Upon first login a user is not presented with a Start Center as one needs to either
be created or associated with their particular security group as shown in
Figure 7-1.
Within the security groups application select the group you would like to apply the
permissions to from the list tab and then select the applications tab to apply
permissions for layout and configuration as well as the necessary start center
portlets.
The following are the security group applications or as referred to within the Start
Center, portlets, associated with Start Center configuration:
Layout and Configuration - Administrator users can modify and configure the
layout of the portlets display on the Start Center.
Inbox / Assignments Setup - Administrators can define and edit which
columns are displayed in the Workflow assignments inbox on the Start
Center.
KPI Graph Setup - Administrators can define and edit a KPI graph-style
portlet to display on the Start Center.
140 Certification Study Guide Series: Foundations of Tivoli Process Automation Engine
Draft Document for Review June 17, 2009 10:04 am [Link]
KPI List Setup - Administrators can define and edit a KPI list-style portlet to
display on the Start Center.
Result Set Setup - Administrators can define and edit the query used and
columns displayed on the Start Center.
Favorite Applications Setup - Administrators can define and edit the list of
applications displayed in a Favorite Application Portlet.
Quick Insert - Administrators can define and edit the list of applications
displayed in a Quick Insert Portlet.
Quick Insert Setup - Administrators can define and edit the list of applications
in a Quick Insert portlet.
Bulletin Board - View messages from the Maximo system.
discarded. Also, the template on which the Start Center was originally based
on is reapplied.
1. After selecting Create New Template you will be able to select the layout
whether it is Narrow-Wide or Wide-Narrow as well as which portlets you
would like to display and their order.
2. The user may select either the left or right column and modify the display
name as seen in Figure 7-3.
142 Certification Study Guide Series: Foundations of Tivoli Process Automation Engine
Draft Document for Review June 17, 2009 10:04 am [Link]
Within each type of portlet there are several configurable options. For example
the result set portlet has the ability to select a user defined or public query and
then display it’s results with colored conditions on a bar or pie graph.
The following tabs are available within the Result Set setup:
Available Queries - lists all of the queries from which you can select one to
display.
Column Display - is where you select which columns to display and their
order.
Display Options - is where you can set a color to indicate a status level.
Chart Options - is where you set the parameters for a graph, if you choose to
display one.
For example, if the user would like to display all NEW work orders in the color red
they would configure the color parameters with an expression of equal to, an
expression value of NEW, and a color of red as seen in Figure 7-6.
When the results are returned in the Start Center, those work orders with a
status of NEW will be shown in the color red.
1. You will be presented with the list of Start Centers you may modify as shown
in Figure 7-8.
2. Select the Start Center you wish to modify and make your changes.
3. Following your modifcations, choose Save Changes to save your
modifications.
144 Certification Study Guide Series: Foundations of Tivoli Process Automation Engine
Draft Document for Review June 17, 2009 10:04 am [Link]
You may then populate the Start Center template field and this will now be the
default Start Center for that particular group as seen in Figure 7.2 on page 146.
If a user is part of multiple security groups, they will see a tabbed view of these
Start Centers, as shown in Figure 7-10.
The user is able to navigate between their Start Centers and may also select to
hide of set a particular Start Center as their user default by selecting Display
Settings, as seen in Figure 7-11 and Figure 7-12 on page 146.
Within the KPI Manager select the New KPI icon on the toolbar as seen in
Figure 7-13.
To create a KPI the user must define a select statement for the query and set the
following parameters:
146 Certification Study Guide Series: Foundations of Tivoli Process Automation Engine
Draft Document for Review June 17, 2009 10:04 am [Link]
Out of the box a crontask named KPICronTask is available to use for keeping KPI
data current.
To enable this cron task, select the task from the list tab, then within the instance
define the schedule (default is 1 day), the administrative user to run the cron task
under, and set it to active as shown in Figure 7-15.
The KPI data will now be updated on the schedule you have established.
148 Certification Study Guide Series: Foundations of Tivoli Process Automation Engine
Draft Document for Review June 22, 2009 3:01 pm
Note: All of the settings should be set up for each organization in the system.
Work type
The first step to configure the work orders are the work types. Without
configuring them, you will be not able to create a work order, since it is a required
field in the work order application.
150 Certification Study Guide Series: Foundations of Tivoli Process Automation Engine
Draft Document for Review June 22, 2009 3:01 pm
Note: Remember that the work order work types are NOT configured in the
Domains application, as usual for the value lists. Work types are set up in the
Organizations application.
Edit rules
Edit rules are tied to the work order status. Depending on the status, you are able
to edit or not some predefined fields as seen in the Figure 8-3
152 Certification Study Guide Series: Foundations of Tivoli Process Automation Engine
Draft Document for Review June 22, 2009 3:01 pm
Site options
Figure 8-5 shows settings tied to the sites included in the current organization.
The only options you can set here are the task numbering start and increment by.
Autonumber setup
Autokey feature is not only related to work management applications, although it
is an interesting and important point to be discussed since most of the clients use
it to customize the auto-numbering patterns for each type of work order.
To create or modify an autokey, open the Autonumber setup in the Select Action
menu of the Organizations application as shown in Figure 8-6 on page 154.
There are four types of autokeys. Each one refers to a specific object level:
System, Item, Set, Organization and Site.
Figure 8-7 on page 155 shows the dialog referring to the site level dialog as an
example, where it is possible to create and modify the autokey attributes for each
site of the current organization record.
Seed is the starting number of the sequence.
Prefix is the char or the word that you can set before the number, so that the
records can be identified easily.
154 Certification Study Guide Series: Foundations of Tivoli Process Automation Engine
Draft Document for Review June 22, 2009 3:01 pm
The Start Center is composed by portlets and each portlet has an application
that controls the content and configuration of the portlet. This section is focused
on the work management public queries.
In most of the applications you have a list tab that can be used to create queries
to be used in the Start Center. Here follows an example on how to create a query
to retrieve your tasks:
1. Select, Go To → Work Orders → Activities and Tasks
2. In the list tab, filter out the tasks you want to show in the Start Center.
3. Save the query, as shown in the Figure 8-8 on page 156.
4. Set up the query as explained in Chapter 5, “Security Configuration” on
page 77.
A job plan is a work template that contains detailed information about the work to
be done on an asset, item, or location. It has all the necessary info about the
work such as a task list, the labor/crafts involved and all the materials and the
tools used to perform the work.
It is useful when you need to enter the same information in the work orders many
times. Using job plans, it is not necessary to create a new work plan everytime
that a new work order is created. Applying the job plan to a work order, all the
tasks and its resource estimates are copied into the work plan for the work order.
There is some important information that you should know about the job plans:
Working with job plans allows for standardization of work orders, but it is
important to note that it doesn’t restrict the work orders to be equal to the
template.
After applying a job plan to the work order, it is still possible to modify the work
plan so that the procedures, labor, materials, services and tools are more
specific to the work order without affecting the original template.
Furthermore, job plans are at the system level, but you can optionally set an
organization and even a site for it. The same occurs for tasks, labor, materials,
services and tools.
For example, you can create a job plan at organization level, and add specific
tasks at the site level. This feature allows you to set up standardized job plans
across all sites and make that the work plan inherit specific tasks for each site.
Note: Not only tasks can be defined for a specific site. It is also possible to
define and set up the other related objects like labor, materials, services and
tools.
156 Certification Study Guide Series: Foundations of Tivoli Process Automation Engine
Draft Document for Review June 22, 2009 3:01 pm
Work orders are the core of the maintenance management. A work order is a
request for work to be performed and this module has the applications that
describes the work to be done, who will do the work, and when the work will start
and finish.
158 Certification Study Guide Series: Foundations of Tivoli Process Automation Engine
Draft Document for Review June 22, 2009 3:01 pm
Note: Entering Failure Class data is a way you can analyze failure trends for
the company’s assets, locations or configuration items.
Labor Reporting
The Labor Reporting application is used to report and keep track of the labor
hours such as type and the total number of hours of work that were performed by
external or internal employees.
Quick Reporting
The Quick Reporting application is a simplified version of the Work Order
Tracking application that was designed to simplify reporting the actuals and other
data after the work has been completed.
It is used to review and manage activities and tasks created by the other
applications. It is important to know that an activity or a task does not exist by
itself, so you are not able to create records from this application.
Activities are created from the Service Desk module in the Incidents and
Problems applications while Tasks are created in the Work Order tracking.
Assignment Manager
The Assignment Manager application is used to manage work schedules, labor
requirements and dispatching of the work.
You can view work order assignments, labor craft and skill levels. Dispatch labor
according to work priority and schedule work according to labor availability. It is
also possible to filter labor to match work and vice versa.
Service Requests
The Service Requests application is used to create, view and resolve service
requests form customers. Records created from this application are a type of
ticket.
Service requests in Maximo are created to resolve issues, obtain information and
obtain or change services. Either a service desk agent or a customer can create
a service request.
160 Certification Study Guide Series: Foundations of Tivoli Process Automation Engine
Draft Document for Review June 22, 2009 3:01 pm
162 Certification Study Guide Series: Foundations of Tivoli Process Automation Engine
Draft Document for Review June 18, 2009 11:16 am [Link]
As an Administrator you are allowed to specify the following for the end users:
Making the reports available and how to open, run and print these reports
Determining the outlook of the report titles and headings
Setting the report security
You can set the security for an application in the Report Administration.
Application security settings let you set group security for all reports in a selected
application. The Maxadmin group has access to all “out of the box” reports. You
must setup group or report access to each individual application or other new or
customized reports.
164 Certification Study Guide Series: Foundations of Tivoli Process Automation Engine
Draft Document for Review June 18, 2009 11:16 am [Link]
2. Select an application name from the Application table window. Click New
Row.
3. In the Application Level Security table window you can add, change or
delete security settings for a group. Security settings are defined by report
type. For example, you can set report security so that Group A can see all
reports in the classification application.
4. Click Save.
Prior to the deployment of the application, the Administrator will carry out several
customizations, described in the following sections.
3. At the bottom of the page you will see a button called Generate Request
Pages, click Generate Request Pages. A message box will be generated, as
shown in Figure 9-2 on page 166.
Note: Generating the request pages is a step you will only need to execute
when you have a new installation or have uploaded a new report. It is
advisable that this step is done when other users have logged out of the
system.
166 Certification Study Guide Series: Foundations of Tivoli Process Automation Engine
Draft Document for Review June 18, 2009 11:16 am [Link]
Report Type: BIRT, Crystal, Custom. By determining the report type and
settings you register that report in the Maxim database.
Limit Records: The action limits the number of records against which an end
user can run a report. It prevents end users from executing large queries,
which can cause negative performance impacts. Use the Report
Administration application toolbar to open a report directly in the browser.
When Browser View is checked then enter a value other than None in the
browser View Location field. This field determines the application tabs that
have an active Browser View icon.
Use Where Clause?: Enables Current / Selected plus User defined
parameters.
No Request Page: Disables Request Page for Database Updates
Browser View and Browser View Location: The Browser View feature lets
you create a shortcut. With the shortcut, the end user can click an icon once
in the application toolbar to open a report directly in the browser. When
Browser View is checked then enter a value other than None in the Browser
View Location field. This field determines the application tabs that can have
an active Browser View icon.
168 Certification Study Guide Series: Foundations of Tivoli Process Automation Engine
Draft Document for Review June 18, 2009 11:16 am [Link]
– The generated report opens with the correct data and format.
To preview a report:
a. In the Report Administration, select the report that you want to run
b. Click Preview. The Request Page dialog box opens. The parameters that
appears depend on the report that you select.
c. Enter values in any required fields. Required fields have an orange
asterisk (*) next to them.
d. Click Submit to run the report. The report opens in a separate browser
session
Parameters: From the parameters tab you can define ad hoc user
parameters. Note that these parameters must also be specified in the actual
report design itself.
The set of instructions below enables you to open a report. After running the
report you will then be able to print and export data.
Or
– From the Select Action menu, select Run Reports. The Report tab opens.
The Report to Run table window lists he available reports for the
application. Click the report that you want to run (Figure 9-6 on page 171).
170 Certification Study Guide Series: Foundations of Tivoli Process Automation Engine
Draft Document for Review June 18, 2009 11:16 am [Link]
8. Select the report you want to see, for example, “Asset List”. See Figure 9-7.
9. Enter the required parameters in the Request Page dialog box, as shown in
Figure 9-8 on page 172.
[Link] Submit to run the report. The report opens in your browser.
[Link] the reporting toolbar, perform any of the following actions:
a. Click the Print Report as PDF icon to print the report
b. Click the Export Data icon to export the data in .CSV format
c. Click the Toggle table of contents icon to see the table of contents for
your report. The report you select determines the table of contents
172 Certification Study Guide Series: Foundations of Tivoli Process Automation Engine
Draft Document for Review June 18, 2009 11:16 am [Link]
– Once: The report runs on a specific date and time in the future. Enter a
date or click the select date icon. The date that you enter must be in (M or
MM) / (D or DD) / YY format. Specify a time in HH:MM format and specify
a.m. or p.m.
– Recurring: The report runs at regular intervals. Four fields let you
determine when the report runs.
• In the first field, enter a number from 1 through 365.
• In the second field, enter the interval (day, week, or month).
• In the third field, enter the day of the week or date of the month.
• In the fourth field, enter the time in HH:MM format, along with AM or
PM.
The following examples show the use of these fields:
• To run a report every day at 6:00 AM, select 1, and then Day. Leave the
third field blank and then 6:00 AM.
• To run a report every other Friday at 5:00 PM, select 2, then Weeks,
then Friday, and then 5:00 PM.
• To run a report every three months at 11:00 PM, on 15th of the month,
select 3, then Months, then Day 15, and then 11:00 PM.
3. Use the following fields to send the report with e-mail. The system sends the
report in .PDF format.
• To – Enter one or more e-mail addresses to receive the report. Click
Select Value to enter a system validated e-mail address.
• Subject – Enter a subject for the report. If you do not enter a subject,
the report name defaults to this field.
• Comments – Enter any comments you want to include in the e-mail
message.
4. Click Submit to run the report. The report is sent to the e-mail address at the
scheduled time.
174 Certification Study Guide Series: Foundations of Tivoli Process Automation Engine
Draft Document for Review June 18, 2009 3:51 pm [Link]
Questions
We provide the following questions to assist you in studying for the certification
test:
1. Which configuration data is required while installing WebSphere Application
server
a. Web Server Name, Port and Node name.
b. Web Server Name and Port.
c. Web Server Name, Port, Node Name and Cluster Name.
d. Web Server Name, Port and Cluster Name.
e. Web Server Port, Node Name and Cluster Name.
2. Which type of queues types are not supported by message engine in a Web
Sphere application server?
a. Sequential Inbound and Outbound, Continuous Inbound Queues.
b. Sequential Outbound.
c. Continuous Inbound.
d. Continuous Inbound error.
e. Continuous Outbound.
3. What is the recommended maximum heap size for Maximo optimum
performance?
a. 1.5 – 2.0 GB
b. 1.0 –1.5 GB
c. 2.0 – 2.5 GB
d. 0.5- 1.0 GB
4. Where do you define the conditions on source and destination of a crossover
domain fields?
a. Crossover domain.
b. Domain application.
c. Condition Expression Manager.
d. System Properties.
e. Application Designer.
5. Which of the following describes the staging table?
a. Database view table where record set records are moved after execution
of a query.
176 Certification Study Guide Series: Foundations of Tivoli Process Automation Engine
Draft Document for Review June 18, 2009 3:51 pm [Link]
b. The security group to which a user belongs controls the user’s level of
access and privileges within the system.
c. The security architecture is designed to use organization as the first level
of security.
d. The profile tab in the users application displays the user's security profile.
e. The security profile information displays the access that has been granted
to the selected user through the combination of their roles.
[Link] of the following is not a relevant for security groups?
a. Security groups are two types Independent and non-independent.
b. It is possible to combine access rights and grants of one security group to
another security group in one type of security group.
c. Using security controls action, you can specify EVERYONE group for all
user fields.
d. It is necessary to create a security groups first before creation of a new
user.
e. In short, security groups define authorizations and users inherit
authorization of security groups.
[Link] approval limits and tolerances are applied at organization level, but
users inherits them to all the sites to which they have access. If a user has
invoice approval limits of $1200 for site A and $900 for site B. What is the
overall invoice approval limits?
a. $900 for both sites.
b. $1200 for both sites.
c. S1050 for both Sites.
d. $1200 at Site A and $900 at Site B.
e. $1200 at Site A and $1050 at Site B.
[Link] of the following is not a pre-migration task?
a. Create Migration Objects.
b. Create Migration Groups.
c. Organize and upload compiled source.
d. Package Definition.
e. Package Deployment.
[Link] of the following is not the best practices using migration manager to
deploy a package?
a. Same base language in source and target environments.
178 Certification Study Guide Series: Foundations of Tivoli Process Automation Engine
Draft Document for Review June 18, 2009 3:51 pm [Link]
[Link] the organization level, which of the following can a user configure for work
order application?
a. Revert material reservations when work order status is changed to closed
/ completed.
b. Display Contract Status.
c. Failure prompt.
d. Downtime prompt.
e. Display Annual Maintenance Contracts.
[Link] of the following is a Work Management configuration at the
organization level?
a. Increment task numbering with start number under plan tab of work order
tracking.
b. Under Flow Control.
c. Suspend Flow Control.
d. Flow Action Assist.
e. Inherit Status Changes.
[Link] Administration application allows to which of the following?
i. Open a list of reports.
ii. Define reports to end users.
iii. Change names of reports and field titles.
iv. Set or view security.
a. i and iii
b. i, ii and iv
c. i, ii and iii
d. i, ii, iii and iv
e. None of the above
[Link] do you define number of lines per page?
a. Define number of records per page in the report code.
b. Once page size is defined, number of records per page is taken care of by
reporting tool.
c. Using select action option define records per page.
d. Enter no of records per page value in Max Record Limit field.
e. None of the above.
180 Certification Study Guide Series: Foundations of Tivoli Process Automation Engine
Draft Document for Review June 18, 2009 3:51 pm [Link]
Answers
The following list shows the correct answers to the sample questions in this
appendix:
1. c
2. e
3. b
4. c
5. c
6. b
7. b
8. a
9. e
10.c
11.d
12.b
13.e
14.d
15.c
16.e
17.a
18.e
19.a
20.a
21.d
22.d
23.a
182 Certification Study Guide Series: Foundations of Tivoli Process Automation Engine
Draft Document for Review June 16, 2009 12:13 pm [Link]
Related publications
The publications listed in this section are considered particularly suitable for a
more detailed discussion of the topics covered in this book.
IBM Redbooks
For information about ordering these publications, see “How to get Redbooks” on
page 184. Note that some of the documents referenced here may be available in
softcopy only.
Deployment Guide Series: Maximo Enterprise Asset Management,
SG247640
IT Asset Management Processes using Tivoli Asset Manager for IT,
SG247601
Maximo Asset Management Essentials V7.1 Implementer's Guide,
SG247645
Online resources
These Web sites are also relevant as further information sources:
IBM Professional Certification Program Web site
[Link]
Test 017 objectives
[Link]
Tivoli process automation engine courses:
[Link]
Tivoli Asset Management for IT Release 7.1, Installation Guide:
[Link]
ic=/[Link]/[Link]
184 Certification Study Guide Series: Foundations of Tivoli Process Automation Engine
Draft Document for Review June 22, 2009 3:02 pm [Link]
Index
checklist 5
Symbols IBM Professional Certification Program 2
/[Link] 16
process 7
Tivoli Professional Certification Program 4
A Chart of Account application 71
actions 49 classification structure 40
Actions application 48 Classifications application 39–40
Activities and Tasks application 159 Associates Classifications 41
add-on adapters 120 Attributes 41
Allow Generated Passwords to Be Displayed on Classification Structure / Hierachy 40
Screen 100 Other Systems 41
ALN domains 31 Sections 41
Always E-mail Generated Passwords to Users 100 Separate Classification Hierachies 41
Application Designer 115 Using Classifications 40
Application Designer applicatio 111 Clearing Account 36, 73
Application Designer application 135 Com Log Entry? 45
application server 80 Communication templates 43–44
Assignment Manager application 159 associate file attachments 45
autokey attributes 154 create e-mail notifications 44
Prefix 154 create generic communication template 44
Seed 154 working with 44
Autokey feature 153 communication templates 43
autokeys 154 Condition field 47
Autonumber setup 153 Conditional Expression Manager 58
Autonumbering application 36 Conditional Expression Manager application 58
auto-numbering patterns 153 how to access 58
Conditional Expression Manager. 89
Conditional security
B best place to create the restrictions 111
BIRT default Report Writer 169
Conditional Expression Manager 112
built-in workflow process 42
creating 112
Bulletin Board 141
Creating a Signature Option 115
Business Intelligence Reporting Tool (BIRT) 163
overview 111
business object 59
Conditional SQL Expression Builder 47
configure the database 33
C creating an object 33
calendars 38 modifying 33
create and modify calendars 38 Cost Management 74
holidays 39 Cost Management application
organization level 39 Budget 75
referencing a calendar 39 Parent Project 75
Calendars application 38 Project 75
Certification Value 75
benefits 3 courses 8
186 Certification Study Guide Series: Foundations of Tivoli Process Automation Engine
Draft Document for Review June 22, 2009 3:02 pm [Link]
Index 187
[Link] Draft Document for Review June 22, 2009 3:02 pm
188 Certification Study Guide Series: Foundations of Tivoli Process Automation Engine
Draft Document for Review June 22, 2009 3:02 pm [Link]
R EVERYONE 79
Redbooks Web site 184 MAXADMIN 79
Contact us xvi MAXREG 79
Reporting 163 Independent of Other Groups? check box 82
Direct Print and Direct Print Location 168 Revoke Listed Applications 84
Direct Print with Attachments and Direct Print set restrictions 89
with Attachment Location 168 Start Centers 95
Generate Request Page 168 tabs
Parameters 169 Applications 79
Preview 168 Data Restrictions 79
schedule a report 172 GL Components 79
table of contents 172 Group 79
Request pages 165 Labor 79
resources recommended for study 8 Limits and Tolerances 79
return on investment (ROI) 5 Sites 79
rules engine 121 Storerooms 79
Run Reports 172 Users 79
security profile 78
Self registration 109
S self-registration 80
Safety tab option 116
Service Desk module 159
sample questions 175
service providers 10
SAP suite 120
service requests 41
Security Controls action 108
Service Requests application 159
security group 78
Set Application Security 164
security group types
Setting or changing passwords and password hints
independent 95
109
non-independent 95
Setting up authentication 109
Security Groups application 78
LDAP authentication 109
adding a new ecurity group 80
native authentication 110
adding applications to a security groups 83
Signature Option 115
adding Limits and Tolerances to security groups
Sites 37
88
active a site 38
adding storerooms to security groups 85
add a site 37
adding users to a security group 91
working with 37
applying Data Restrictions to security groups 89
site-specific calendars 39
approval limits 88
Start Center
assigning GL Components to security groups
associating a template 145
87
creating a template 141
Authorize Group for All Storerooms? check box
modifying an existing template 144
86
Portlets
Authorize Group Reassignment 93
Bulletin Board 141
Base Currency field 89
Favorite Applications Setup 141
Conditional Expression Manager 89
Inbox / Assignments Setup 140
Grant Listed Applications 84
KPI Graph Setup 140
Grant Listed Options for This Application 85
KPI List Setup 141
groups
Layout and Configuration 140
78
modifying 143
DEFLTREG 78
Quick Insert 141
Index 189
[Link] Draft Document for Review June 22, 2009 3:02 pm
190 Certification Study Guide Series: Foundations of Tivoli Process Automation Engine
Draft Document for Review June 22, 2009 3:02 pm [Link]
Index 191
[Link] Draft Document for Review June 22, 2009 3:02 pm
192 Certification Study Guide Series: Foundations of Tivoli Process Automation Engine
To determine the spine width of a book, you divide the paper PPI into the number of pages in the book. An example is a 250 page book using Plainfield opaque 50#
smooth which has a PPI of 526. Divided 250 by 526 which equals a spine width of .4752". In this case, you would use the .5” spine. Now select the Spine width for
the book and hide the others: Special>Conditional Text>Show/Hide>SpineSize(-->Hide:)>Set . Move the changed Conditional text settings to all files in your
book by opening the book file with the [Link] still open and File>Import>Formats the Conditional Text Settings (ONLY!) to the book files.
Draft Document for Review June 16, 2009 1:01 pm [Link] 193
Certification Study Guide
Series: Foundations of Tivoli
Process Automation Engine
(1.5” spine)
1.5”<-> 1.998”
789 <->1051 pages
Certification Study Guide
Series: Foundations of Tivoli
(1.0” spine)
0.875”<->1.498”
460 <-> 788 pages
Certification Study Guide Series: Foundations of Tivoli
(0.5” spine)
0.475”<->0.875”
250 <-> 459 pages
Certification Study Guide Series: Foundations of Tivoli Process
(0.2”spine)
0.17”<->0.473”
90<->249 pages
(0.1”spine)
0.1”<->0.169”
53<->89 pages
To determine the spine width of a book, you divide the paper PPI into the number of pages in the book. An example is a 250 page book using Plainfield opaque 50#
smooth which has a PPI of 526. Divided 250 by 526 which equals a spine width of .4752". In this case, you would use the .5” spine. Now select the Spine width for
the book and hide the others: Special>Conditional Text>Show/Hide>SpineSize(-->Hide:)>Set . Move the changed Conditional text settings to all files in your
book by opening the book file with the [Link] still open and File>Import>Formats the Conditional Text Settings (ONLY!) to the book files.
Draft Document for Review June 16, 2009 1:01 pm [Link] 194
Certification Study
Guide Series:
Foundations of Tivoli
(2.5” spine)
2.5”<->nnn.n”
1315<-> nnnn pages
Certification Study
Guide Series:
Foundations of Tivoli
(2.0” spine)
2.0” <-> 2.498”
1052 <-> 1314 pages
Back cover ®
Draft Document for Review June 22, 2009 4:20 pm
Helps you achieve This IBM® Redbooks® publication is a study guide for Test
Foundations of Tivoli 000-017: Foundations of Tivoli Process Automation Engine and is INTERNATIONAL
Process Automation aimed at individuals who want to get an IBM Professional TECHNICAL
Engine certification
Certification on Tivoli Process Automation Engine. SUPPORT
The Foundations of Tivoli Process Automation Engine Professional ORGANIZATION
Certification, offered through the Professional Certification Program
Explains the from IBM, is designed to validate the skills required of technical
certification path professionals who work in the implementation of the Tivoli Process
and prerequisites Automation Engine. Note that this test is a prerequisite for several BUILDING TECHNICAL
other certifications, such as IBM Tivoli Maximo Asset Management INFORMATION BASED ON
Introduces sample for IT V7.1 Implementation PRACTICAL EXPERIENCE
test questions This book provides a combination of theory and practical experience
needed for a general understanding of the subject matter. It also
IBM Redbooks are developed by
provides sample questions that will help in the evaluation of
the IBM International Technical
personal progress and provide familiarity with the types of Support Organization. Experts
questions that you will encounter in the exam. from IBM, Customers and
This publication does not replace practical experience, nor is it Partners from around the world
designed to be a stand-alone guide for any subject. Instead, it is an create timely technical
effective tool that, when combined with educational activities and information based on realistic
scenarios. Specific
experience, can be an extremely useful preparation guide for the
recommendations are provided
exam. to help you implement IT
For your convenience, we structure the chapters based on the solutions more effectively in
sections of the Test 000-017, such as Prerequisites and Installation,
your environment.
Platform Configuration and so on, so studying each chapter will help
you prepare for one section of the exam.
For more information:
[Link]/redbooks
SG24-7763-00 ISBN