Installing and Deploying IBM Connections
Installing and Deploying IBM Connections
Installing and Deploying IBM Connections
Note: This PDF document is the original text from the Installing and Deploying IBM Connections
hosted in the online wiki. Always refer to the online wiki version for the latest updates.
Contents
Preface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .i
Meet the authors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ii
Special thanks to the following people for contributing to this effort. . . . . . . . . . iv
Become an author . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . v
Comments welcome. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . v
Stay connected to IBM Redbooks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . vi
Chapter 1. IBM Connections overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
1.1 The software components and their roles . . . . . . . . . . . . . . . . . . . . . . . . . . 3
1.2 What is new in IBM Connections 4 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
1.2.1 Overall. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
1.2.2 Installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
1.2.3 Administration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
1.2.4 Customization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
1.2.5 Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
1.2.6 Mobile access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
1.3 Architecture Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
1.3.1 Functional features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
1.3.2 Operational architecture . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
Chapter 2. General deployment considerations and requirements . . . . . 13
2.1 Architecture considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
2.2 Hardware requirements. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
2.3 Software requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
2.4 Performance considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
2.5 Deployment options. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
2.5.1 Small deployment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
2.5.2 Medium deployment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
2.5.3 Large deployment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
Chapter 3. Planning the environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
3.1 LDAP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
3.2 DNS and host names . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
3.3 Shared content storage location . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
3.4 LTPA and single sign on . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
3.5 SSL certificates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
3.6 Multiple language content . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
3.7 Deployment checklist . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
Contents
Contents
Preface
ii
Preface
iii
iv
Become an author
Join us for a two- to six-week residency program! Share your knowledge with
peers in the industry and learn from others. Help create content about specific
products or solutions, while getting hands-on experience with leading-edge
technologies. You will have the opportunity to team with IBM technical
professionals, Business Partners, and Clients. Your efforts will help increase
product acceptance and customer satisfaction. As a bonus, you will develop a
network of contacts in IBM development labs, and increase your productivity and
marketability.
Find out more about the residency program, browse the residency index, and
apply online at: http://www.ibm.com/redbooks/residencies.html
Comments welcome
Your comments are important to us!
We want the content in this wiki and all our wikis to be as helpful as possible.
Provide us your comments in one of the following ways:
Use the commenting feature with in the wiki. Login and add comments,
located at the bottom of each page.
Provide feedback in the Web form located at:
http://www-12.lotus.com/ldd/doc/cct/nextgen.nsf/feedback?OpenForm
Preface
vi
Chapter 1.
In addition to the elements of an Activity, IBM Connections also provides a way to create
an Activity Template either from scratch or an existing Activity. This feature facilitates the
reuse or creation of structure within an Activity.
Blogs
Functioning as a journal, Blogs provides a tool with which users can create and deliver
rich-content from a personal perspective that other users can consume, reference, and
even participate in the growth of ideas an author writes about. IBM Connections offers
essentially three types of Blogs, a Personal Blog, Community Blog, and Ideation Blog. The
functionality of Personal and Community Blogs is virtually the same, except for who can
read and provide feedback on the Blog Entries.
An Ideation Blog is a special type of Blog that can only exist within a Community. Its
purpose is to generate ideas on a specific topic and also collect feedback from IBM
Connections users. Users can create ideas for the given topic in a fashion similar to a
thread-based forum. Other users can then vote on or comment on those ideas. When the
ideas have enough support from the Community of users determined either on votes or
feedback, that idea can then be graduated; an option to create an Activity from the
Graduated Idea is also available to continue developing the idea. In addition, Owners of
the Ideation Blog can manage several different aspects to ensure that the final goal of the
best idea can be realized. Whether limiting the number of votes users can cast, to freezing
the creation of ideas, to ultimately preventing the creation of new ideas while allowing
voting and commenting on existing to continue, many aspects of an Ideation Blog can be
controlled.
Bookmarks
This application provides a way for users to store references to content in or outside the
IBM Connections platform, organizing the references with social technologies such as
Tags, Comments, and Popularity.
Communities
In ways similar to a company intranet web-site, this application provides a way which users
can organize teams to share information and interact with each other using Community
Activities, Files, Forums, Bookmarks, Feeds, and so on .
Files
Acting as a repository, this application provides users with a concentric location to store
multimedia in multiple formats. That data can then be shared within Communities, across
dynamic networks of users, or publically.
Forums
Topics of discussion can be held within Forums to brainstorm and cultivate information that
can then be transformed into content that comprises Activities, Blogs, or even Wikis.
Similar to an Internet Message-board, this application provides the ability to archive
messages rather than leave them volatile, for future reference, in a hierarchal or tree-like
structure.
Homepage
Similar to Communities, this application provides a launchpad-like website specific to a
given user that allows them to easily consume notifications of information and content
which they have followed or are a member of. Features like the Activity Stream provide
users with an easy way to provide feedback on notifications of events generated from
other applications within IBM Connections or establish a status that other users can be
aware of.
Metrics
Statistics that surface the usage of the IBM Connections platform and provide real-world
numbers that users, administrators, and management alike can leverage.
Profiles
A directory of the users both within and external to your IBM Connections platform, this
application delivers user-friendly tools that can be leveraged to easily locate and
communicate with co-workers, colleagues, &and customers.
Wikis
This application provides tools that a user, team, or even Community members, can
leverage to create and store information. Pages comprising a wiki can be organized in a
hierarchy, with changes of those pages tracked, comments to improve the content with,
and recommendations that other users can leverage to find the right information.
LDAP
LDAP is not included in the IBM Connections installation but is a requirement in an IBM
Connections deployment. IBM Connections uses an LDAP directory to authenticate user
requites. It also uses LDAP directories to populate and manage the Profiles.
The LDAP integration is performed within IBM WebSphere Application Server as a "federated
repository" and the WebSphere Application Server administration console provides all the
tools and features to set this up and test it.
If your organization has a large LDAP directory, you might want to restrict the people who can
authenticate and gain access to the IBM Connections environment. This is normally done by
creating a group in the LDAP environment (such as an Active Directory group, or an Access
Control group in Domino) and then setting up Federated Repositories to query against that
group when the user tries to log in. The Active Directory or Domino administrator can then
control access to Connections simply by adding and removing people from the group.
SMTP
An SMTP server is recommended in an IBM Connections environment. This can be any
standard SMTP server. It is used to send and receive notifications about new documents and
other events in IBM Connections.
There is an important post-configuration step in the install which requires the changing of the
sender email address so that it matches your organizations standards. It is also possible to
customize the format and content of the email notifications. For more detail, see IBM
developerWork article Customizing IBM Lotus Connections 3.0 email digests and
notification(http://www.ibm.com/developerworks/lotus/documentation/lc3notifications/)
1.2.1 Overall
You can now share a status update or file from anywhere in IBM Connections. Log in and
then click the Share link in the header.
The activity stream displays an aggregated view of the latest updates from people or
events that you are following and people in your network.
Introduction of an enhanced Metrics application employing the analytic capabilities of the
IBM Cognos Business Intelligence server, which is provided as part of the IBM
Connections installation. Administrators and designated users can work with interactive
displays of global metrics by clicking Server Metrics in the footer. Community owners can
view non-interactive reports for their communities by clicking Metrics in the navigation
pane.
The rich text editor has been upgraded to CKEditor 3.6.3 in this release.
Profiles has been updated to include the activity stream, which shows the profile owner's
latest updates from across IBM Connections.
When viewing your search results, you can filter the results from Profiles to exclude
inactive profiles by selecting Exclude Inactive People from the Show menu on the Profiles
Search Results page.
The social analytic widgets now recommends private as well as public content, based on
your existing relationships with public and private content in IBM Connections.
The Trending widget displays a list of the hot topics that are trending in your organization.
The widget displays when you filter your search results using the Status Updates option.
Status updates and microblogging content are now included in the analysis of the
relationships that are used to recommend content and people in the social analytics
widgets.
Activities
Activity members are now displayed in a Members view within the activity.
Standard activity owners can go to the Members view to make an activity public.
Titles and descriptions in activity entries are automatically saved to prevent data loss.
In an activity entry, you can link to files and folders in the Files application.
Activity owners can convert an entry into a To-do item.
Blogs
Improved UI.
Bookmarks
Improved UI.
When you install the Add Bookmark browser button, you also have the option to install a
Discuss This and Related Community browser buttons for posting web pages to an IBM
Connections forum or linking together related communities.
Communities
Community owners can share information about upcoming events with the rest of the
community.
For deployments that make use of owner moderation of communities, owners can disable
content approval and content flagging on individual communities.
Ability to suggest communities for colleagues to join.
You can now share status with members of your community.
The Recent Updates view provides a centralized place to see what is new in a community.
LDAP groups can now be added as members of a community.
Files
You can now :
Upload multiple files at the same time.
Download all of the files in a view.
Add files to a folder during upload.
Select and perform actions on multiple files at one time.
Delete a file version.
Share folders with communities.
Give community members access to edit files you own.
Move files uploaded to a community to trash; from trash you and others can restore or
delete the files.
Stop sharing a file in one action, including removing the file from any shared folders
and communities.
Stop sharing files that were shared with you.
A files owners and editors can lock and unlock the file.
The Recommend file option has been changed to a Like file option.
For files that you are adding or have added to a folder, you can give access to those files to
anyone who has access to the folder.
The summary page and tabs have been redesigned to provide more information.
The Communities Files view displays files that are you can access through communities.
Files that are referenced in one or more status updates are noted as such.
Forums
When a user is notified by email that someone has added a topic to a forum, the user can
click a Reply to this topic link in the email. This creates a response email the user can add
content to and send. This create a new forum topic as a response to the topic they were
notified about in the email. Attachments in the email are added to the response topic.
You can add content from any web page or IBM Connections source to a forum topic by
clicking a button in your browser tool bar. Click Bookmark or Discuss This, and then follow
the steps for installing the Discuss This button. Then navigate to any web or IBM
Connections page, click Discuss This, and select a forum to post the content to.
6
Home Page
Improved UI.
The improved microblogging experience allows you to gather information in a meaningful
way and act on it in context. You can now attach files to your status updates, and use
hashtags to tag your updates and make them easier for other users to find. You can
re-post status updates to share information with the people who are following you, or click
Like to recommend an update. You can also preview images and download files to work on
them locally.
The Events widget helps you to keep track of upcoming community events that you are
attending and that you are following. The widget is available from the activity stream views.
Profiles
The Board tab has been replaced with the Recent Updates tab on the users profiles page.
The Recent Posts tab on the Profiles page has been removed. Recent posts appear under
the profile owners Recent Updates tab.
You can use the Recent Updates area on your profile page to post a status message.
The business card has been redesigned for improved layout and access.
On the Invite to My Network page, the Also Follow option is enabled by default.
You can now accept a network invitation from the inviter's profile page.
The Network Contact or Pending Invitation indicator label now displays next to the
persons name on their profile page.
You can now accept an invitation to join a persons network from that persons profile page.
Wikis
All views are now together in the same list instead of separate tabs.
See wikis you are following by clicking I am Following.
Pages can be removed from a wiki by moving them to the trash. From the trash, pages can
be deleted or restored to the wiki.
You can now download a version of a page from the page comparison view, as an HTML
file.
The wiki editor has two new features: the editor area expands downward as you add
content. As your editing space expands, a toolbar displays even if scrolling is required.
1.2.2 Installation
The installation wizard is now based on IBM Installation Manager 1.4.4.
You can install and configure IBM Cognos Business Intelligence, obtained separately, by
using the scripts, models, and specifications that are included with IBM Connections.
Console Mode is available. Use this character based interface to install, modify, or
uninstall the product when you do not have access to the graphical interface.
Silent installation has been extended so that you can install both IBM Connections and
IBM Installation Manager in silent mode.
The initial configuration of administrators for Home page and Blogs is now handled
automatically during installation. However, to configure widgets, you still need to assign a
Home page administrator.
1.2.3 Administration
Preview mode for running Profiles synchronization commands.
New Metrics interface.
New commands and properties files for different features.
Improved and enhanced Search APIs.
1.2.4 Customization
Changes in Customization paths.
Support for customized Sprited images.
Ability to over-ride a JavaScript file used by IBM Connections.
Ability to extend the deployment using JSTL tags.
Ability to customize notifications.
1.2.5 Security
OAuth Support. Also, users can report a malicious application to an administrator who can
remove it from the list of applications enabled for OAuth.
Users can allow applications access to their Connections data without sharing credentials,
and revoke that access at any time.
Bookmarks: Provides a facility to save, organize, and share bookmarks to valued online
resources and a means to discover bookmarks that have been shared by others.
Activities: Provide a means for individuals and groups to organize work, to plan and save
process steps for reuse, and to collaborate easily on everyday deliverables.
The following figure illustrates the logical architecture of IBM Connections features. It consists
of the following:
Clients used to access the features
HTTP transport and proxy caches
J2EE container that hosts and controls access to all IBM Connections features and data
Backend systems for use by those features for authentication, data storage, and
integration with external messaging systems
IBM Connections provides features to various types of clients over standard Web ports
through an API based on the REST protocol and the Atom standard. While several means of
accessing the features are provided natively, such as browser access and application plug-ins
for IBM Sametime or IBM Notes, the API is designed to allow customers to create, update,
query, and manage IBM Connections information from their own custom applications.
Because the IBM Connections REST API is similar in structure to HTTP (in fact, HTTP is a
REST-based protocol), and because it uses the same transport layer as standard Web
servers, calls to the features are compatible with standard Web servers and proxy servers.
The API allows information to be entered and managed using POST, PUT, and DELETE
methods with the service data encapsulated in an HTML form or an XML Atom document.
Information can be retrieved using the GET method and rendered either as an HTML or an
XML Atom document, depending upon the needs of the requesting client.
Chapter 1. IBM Connections overview
In addition to the functional features that are accessed by clients, IBM Connections provides
four additional common utility modules:
JMX administration: Used to configure and manage the IBM Connections environment.
Most administration functions are managed using the WebSphere wsadmin command, but
others are exposed through a Web interface.
Navigation header: Allows all installed features to be aware of one another and to provide
consistent Web navigation to users. Extensible to include links to other external services.
Business card: Displays consistent business card information when a person's basic
Profile information is requested from within each of the features. Requires the Profiles
feature.
User directory: Interfaces to the directory used by IBM Connections for authentication,
authorization, and query features.
IBM Connections also relies on several key backend services:
LDAP: Provides authentication and authorization services to IBM Connections and serves
as the primary data source for person information used by the Profiles feature.
Relational database: Stores databases and tables needed by the IBM Connections
features. Each functional feature has its own data store.
Data integration (IBM Tivoli Directory Integrator): Extracts person information from
enterprise data sources, such as the LDAP directory, and pushes that information to the
Profiles feature's database tables. Can also be configured to push updates made to
Profiles entries back to the original data source. Used only with the Profiles feature.
File system: Stores service indexes, as well as service-specific data, such as file
attachments uploaded to blogs or activities.
Outbound SMTP: IBMConnections leverages an organization's existing messaging
infrastructure to transmit notification messages. This can be any mail system that can
accept and forward an SMTP message packet.
10
11
12
Chapter 2.
General deployment
considerations and requirements
In this section, we describe the considers and requirements for a successful IBM Connections
deployment. We cover the following topics:
2.1, Architecture considerations on page 13
2.2, Hardware requirements on page 15
2.3, Software requirements on page 16
2.4, Performance considerations on page 18
2.5, Deployment options on page 21
13
While this is the easiest of the deployment scenarios to build, the basic architecture permits
scaling horizontally or vertically into the larger style deployments should it be necessary.
Using IBM WebSphere Application Server Network Deployment allows future scaling to be
performed and hence can act as a good starting point for your own deployment.
A network deployment can consist of a single server that hosts all IBM Connections
applications or two or more sets of clustered servers that share the workload. You must
configure an additional system with WebSphere Application Server Network Deployment
Manager. IBM Cognos Business Intelligence is an optional component in the deployment. If
used, Cognos must be federated to the same Deployment Manager as the IBM Connections
servers. However, Cognos servers cannot be configured within an IBM Connections cluster. A
network deployment provides the administrator with a central management facility and it
ensures that users have constant access to data. It balances the workload between servers,
improves server performance, and facilitates the maintenance of performance when the
number of users increases. The added reliability also requires a larger number of systems
and experienced administrative personnel who can manage them.
It is important to distinguish between the physical needs of the IBM Connections server and
the ability of WebSphere to allow you to scale the IBM Connections applications themselves
horizontally or vertically. To be clear by "physical needs", we mean:
The presence of a database management system such as DB2 or Oracle;
The presence of an HTTP server, in our case IBM HTTP Server
The ability of the system to connect to one or more LDAP servers to authenticate users
and create profiles.
The number and location of WebSphere Application Servers.
With these physical needs addressed, the individual IBM Connections applications can be
scaled across multiple WebSphere Application Servers (WAS). A single WAS can also run
more than one application (and frequently does - in a standard "Small Deployment" one
where the WebSphere Application Server server runs all the applications). By "application"
we mean Activities, Blogs, Communities, Wikis, Profiles, and so on. Each of these in
14
WebSphere Application Server terms are applications in their own right and by chance or
design, they happen to share the same databases and look and feel.
For example, suppose you have an existing Enterprise Content Management solution which
manages your organization's files. The need for the Files application in IBM Connections
would be restricted to the mandatory requirements of the wikis, activities, and so forth. The
need to provide a highly-scalable Files solution has already been solved through the ECM
system. Thus, you might choose to run the Files application on a single WebSphere
Application Server node. Similarly, however, it might be that the Profiles application is one of
the main aspects of your deployment and as such needs, to be highly-responsive. You would
choose in that situation to cluster the Profiles application across two or more WAS nodes.
In our deployment, we have chosen to use a modified small deployment where the
applications are split between two WAS servers. We are not clustering applications (that is,
running the same application in a synchronized manner across multiple nodes), but simply
dividing the total number of applications we are deploying across more than one node.
15
16
Operating System
Version
Hardware
AIX
POWER System
Advanced Platform 5
System Z
Desktop Edition 5
x86-32
Server 5
X86-64
X86-32
System Z
x86-64
X86-32
11.0
X86-32
11
System Z
11
X86-64
Operating System
Version
Hardware
Windows 7
Professional
Datacenter Edition
X86-64
Datacenter Edition R2
X86-64
Enterprise Edition
X86-64
Enterprise Edition R2
X86-64
Standard Edition
X86-64
Standard Edition R2
X86-64
Windows Vista
Enterprise
X86-32
Windows XP
Professional
X86-32
Name
Version
Android
Blackberry
IOS
Product
Version
7.0
Product
Version
IBM Sametime
8.0.2
8.5.1
8.5
8.5
3.0
Product
Version
9.7
Release 2
17
Product
Version
Release 2
Product
Version
Lotus Notes
Microsoft Outlook
Product
Version
7.1
Product
Version
Lotus Domino
6.2
Novell eDirectory
8.8
Product
Version
Product
Version
Microsoft Office
Product
Version
10.1.1
Product
Version
6.1
CA SiteMinder
6.0
18
19
20
Application Name
Blogs
1024
Bookmarks
1024
Communities
1280
Files
768
Forums
1024
Homepage
768
Metrics
1024
Application Name
Mobile
102
Moderation
512
News
1280
Profiles
1280
Search
1280
Wikis
1024
21
The following figure shows one of the simplest deployments of IBM Connections, where each
component is running on its own machine. This option does not provide any workload or
disaster recovery, but it does provide simplicity to small organizations looking to run IBM
Connections.
available hardware and system resources to suit specific needs. The following figure
illustrates a medium IBM Connections deployment architecture.
The following figure shows a typical medium deployment of IBM Connections. A two-node
cluster is used for IBM Connections, with two HTTP servers in front handling all requests
coming from the edge server. This approach also shows you how you can use IBM Tivoli
Directory Integrator (TDI) to merge data coming from multiple sources into the Lightweight
Directory Access Protocol (LDAP) server and IBM DB2 database.
23
With a basic understanding of all the deployment options, you reach a decision point
regarding all the additional servers and components that IBM Connections uses. The figure
below shows a complex environment with multiple nodes, HTTP and proxy servers, and
database clusters for each feature of IBM Connections (blogs, home pages, and more). Large
organizations with strict service level agreements should consider deployments that include
high availability and disaster recovery as well as sufficient resources to support the workload.
24
25
balancing and high availability capabilities. Vertical clustering is not supported on IBM
Connections 4.
WebSphere Edge caching proxy
WebSphere Edge Caching Proxy Server is a proxy Server which can be used to cache
content from backend so that the servers are relieved from high load. This in turn helps
faster response from the server and improves user experience. You can configure
WebSphere Edge Server for high availability by using additional WebSphere Edge Server
as a backup server. When the primary WebSphere Edge Server fails, the user requests
are sent to the backup server.
Relational database management systems
IBM Connections applications supports IBM DB2, Oracle, and SQL server for storing
application related data. Each database systems provides high availability features and
can be used for IBM Connections data.
IBM DB2
DB2 supports a number of software and hardware offerings from IBM and other
vendors that you can use with DB2 to strengthen high availability in your environment.
IBM offers the following high availability configurations. The options for implementing
high availability and disaster recovery solutions with DB2 include:
Clustering with IBM PowerHA SystemMirror for AIX (formerly known as High
Availability Cluster Multi-Processing for AIX or IBM HACMP) or Microsoft Cluster
Server for Windows.
SQL Server
SQL Server provides the following options for creating high availability solutions:
26
Log Shipping: Like AlwaysOn Availability Groups and database mirroring, log
shipping operates at the database level. You can use log shipping to maintain one
or more warm standby databases (referred to as secondary databases) for a single
production database that is referred to as the primary database
Oracle
Oracle database built-in high availability capabilities are as follows:
Data Guard
Online Reorganization
Edition-based Redefinition
27
28
Chapter 3.
3.1 LDAP
LDAP (lightweight directory access protocol) is a protocol used by most Enterprise directories
for talking to each other in a common language. In an IBM Connections environment, the
WebSphere servers must be able to talk to a corporate directory to both authenticate users
who are accessing the system and to import and manage user profiles.
In the IBM Connections pre-installation step, it is a requirement that the WebSphere
Application Server server be configured to access one or more LDAP servers. It is very
common to tell the WebSphere server of a host name that directs requests through a load
balancer to multiple LDAP servers. Many LDAP servers are pre-configured in the WebSphere
server including Microsoft Active Directory, IBM Domino, and IBM Tivoli Directory Servers,
however, any LDAP compatible directory is supported.
LDAP performance and stability is critical for IBM Connections to work at all.
29
30
you can shared the credential with the IBM Connections using SSO for Domino
(http://www-10.lotus.com/ldd/lcwiki.nsf/dx/Enabling_single_signon_for_Domino_ic40).
If you already have a Tivoli Access Manager environment, you can use WebSphere
cookie-based lightweight third-party authentication (LTPA) as an SSO solution to authenticate
your IBM Connections environment. You can read the uses of the SSO at IBM Connections
Wiki
(http://www-10.lotus.com/ldd/lcwiki.nsf/xpDocViewer.xsp?lookupName=IBM+Connections
+4.0+documentation#action=openDocument&res_title=Configuring_single_signon_ic40&co
ntent=pdcontent).
On our lab environment, we use SSO domain name. For the installation details, 6.10, Post
installation environment configuration on page 127.
31
The process to import the certificate on IBM Connections is detailed on 6.10, Post
installation environment configuration on page 127.
32
33
34
Chapter 4.
Planning Profiles
Planning for Profiles usually takes most time and is the most challenging of all the features of
IBM Connections because it utilizes data imported from the organization LDAP. This data can
contain information such as user names, email, unid, and so on.
Some points to take care of while planning are:
Which data sources are to be used?
What are the field specifications of the source data (field name, type, data length)?
Is data required to be synchronized and in what direction?
If required, where are the additional data files like Photos located?
Which fields are to be mapped 1:1?
Which data fields are displayed in a profile entry, and which of them are editable by users?
It is also critical to ensure that IBM Connections has the proper access to the data and that
the two systems can work together regarding data updates and synchronization.
4.1 Photographs
It is also possible to upload individual user photographs while creating IBM Connections
Profiles. To do this, first you must identify which photo repository is to be used and then where
you want the photographs dump to be taken for uploading.
The upload file size limit is 15 KB so this aspect needs to be taken care of while planning.
35
Each user profile contains a manager_uid field which stores the UID value of that person's
manager. This information is used to build the Reports To display widget in the Profiles user
interface.
Additionally, the isManager field (which equates to the Mark manager mapping task in the
Profiles population wizard) is used to mark the user profile as being a manager. This
information is used to build the People Managed display widget in the Profiles user interface.
A Y or N attribute is assigned to an employee to indicate whether the employee is listed as a
manager of other employees.
While planning, you have to decide whether you want to populate these fields or not and
accordingly decide on running the required scripts.
Profiles defines a single base type of snx:person that enumerates the set of fields required
on all profile records.
You can define subtypes of snx:person (such as customer, employee, or contractor) to add
your own unique properties.
A profile-type inherits all the property references from its parent type.
A profile-type hierarchy cannot contain circular loops. The application will fail to start if any
loops are detected in the configured hierarchy.
A profile-type declaration that omits a parentId implicitly inherits from snx:person.
The following is a sample code:
<config>
<type>
<parentId>snx:person</parentId>
<id>customer</id>
...
</type>
</config>
37
38
Chapter 5.
Preinstallation tasks
In this chapter, we explain the tasks that must be performed before installing IBM
Connections. After you have decided the architecture environment, you must prepare your
environment for IBM Connections installation.
5.1, Verify software requirements on page 40
5.2, Setting up DNS and testing host names on page 41
5.3, Setting up LDAP and testing LDAP for data quality on page 42
5.4, Populating photo repository on page 44
5.5, Verifying operating system installation and disk space available on page 47
39
For LDAP servers, we installed IBM Domino. For system requirements, visit
http://www-01.ibm.com/support/docview.wss?uid=swg27007909
For database, we have installed DB2. For system requirements, visit
http://www-01.ibm.com/support/docview.wss?uid=swg27010711
All software installed on our lab environment are provided on IBM Connections packages.
You can find more information about the supported software at:
http://publib.boulder.ibm.com/infocenter/prodguid/v1r0/clarity-reports/report/html
/prereqsForProduct?deliverableId=1284667107599
41
42
Directory Type: Identifies and selects a directory service from the available vendors
and versions.
Primary host name
Port
Bind distinguished name
Bind password
Certificate mapping
Certificate filter, if applicable.
LDAP entity types or classes: Identifies and selects LDAP object classes. For example,
select the LDAP inetOrgPerson object class for the Person Account entity, or the LDAP
groupOfUniqueNames object class for the Group entity.
Search base: Identifies and selects the distinguished name (DN) of the LDAP subtree
as the search scope, for example, select o=ibm.com to allow all directory objects
underneath this subtree node to be searched. Examples for the Group Search, use the
following LDAP attributesor: Group, OrgContainer, PersonAccount, or inetOrgPerson.
43
3. To check whether you set up the LDAP service correctly, use an LDAP search utility such
as ldapsearch provided with Domino, to issue a query to the LDAP service. Example from
a group search:
ldapsearch -D -w -b "o=itso" -s sub
"(|(objectclass=groupOfNames)(objectclass=groupOfUniqueNames))" dn
You have installed and enabled Domino to run LDAP services.
Description
dump_photos_directory
The directory where the extracted files are stored. The default
value is /dump_photos.
dump_photos_file
load_photos_simple_file
Note: When dumping multiple photo files, there must be a period separator between
each entry. If the separator is omitted, an error is generated when you use the load
command to import the files into the profiles database.
2. To populate the new database with the photo files that you saved in the previous step, use
the load_photos_from_files.bat or load_photos_from_files.sh command to read the
files from disk and populate the Profiles database with them.
44
Note:
The table in step 1 shows the properties that relate to this command.
Although in IBM Connections 2.0, the Profiles application can crop the photo
uploaded by a user, the photo size limit in the underlying database is 15 KB. When
Profiles is used with IBM Tivoli Access Manager enabled, the Tivoli Access Manager
can only load files conforming to this size limit.
Example
Here is an example of an entry from the collect_photos.in file:
photo:file:/C:/install_directory/TDISOL/TDI/./dump_photos/img1197046202619_9.dat
uid:FAdams
The characters following uid corresponds to the PROF_UID in the profiles database.
Note the required period separator between each entry, for example,
photo:file:/C:/install_directory/TDISOL/TDI/./dump_photos/img1197046202619_9.dat
uid:FAdams
.
photo:file:/C:/install_directory/TDISOL/TDI/./dump_photos/img1197146402316_7.dat
uid:TAmado
.
You have finished to import your photos to IBM Connections.
45
If prompted to specify a service to connect to, type 1 to pick the first node in the list. Most
commands can run on any node. If the command writes or reads information to or from a
file using a local file path, you must pick the node where the file is stored.
3. Use the following command to check out the profiles-policy.xml file:
ProfilesConfigService.checkOutPolicyConfig("", "cell_name")
where:
working_directory is the temporary working directory to which the configuration XML
and XSD files will be copied. The files are kept in this working directory while you make
changes to them.
cell_name is the name of the IBM WebSphere Application Server cell hosting the
Profiles application. This argument is required.
For example:
ProfilesConfigService.checkOutPolicyConfig("/wsadminoutput",
"jdoe30Node02Cell")
4. Open the profiles-policy.xml file using a text editor, from the temporary directory to which
you checked it out.
5. Edit the following properties for the profile photo feature as needed.
profile.photo
Enables or disables the profile photo feature.
This property takes a string value. Possible values include:
true. Enables the photo feature for users with the specified profile type. The user
interface displays the user's photo and provides options for editing the photo.
false. Disables the photo feature for users with the specified profile type. The user
interface does not display the user's photo or options for editing the photo. A
generic photo image is displayed in place of the user's photo.
profile.photo.update
Control access to view the photo.
In additional to the scope attribute for this access control, dissallowNonAdminIfInactive
can be used to indicate whether photos for inactive users can be viewed.
Administrative users can view photos regardless of the configuration.
Access levels for this property can be defined using one of the following scopes:
none. No one can update the profile photo of users with the specified profile type.
self. Users with the specified profile type can update their own profile photo.
Administrators can also update the profile photo of users with the specified profile
type.
profile.photo.view
Controls access to view the photo.
In additional to the scope attribute for this access control, dissallowNonAdminIfInactive
can be used to indicate whether photos for inactive users can be viewed.
Administrative users can view photos regardless of the configuration.
In the following photo policy sample, users who have been assigned the reader role
can view active user's photos with the default profile type, but photos for inactive users
46
are only viewable by users who have been assigned theadmin role. When a user's
photo is not viewable, the default gray photo image is displayed.
<profileType type="default" enabled="true">
<acl name="profile.photo.view" scope="reader"
dissallowNonAdminIfInactive="true"/>
<acl name="profile.photo.update" scope="self" />
</profileType>
The following sample enables the profile photo feature for the default profile type, but
restricts access to update profile photos to profile owners and administrators. For users
with the contractor profile type, the profile photo is enabled, but no access is provided
to update the profile photo for users of this profile type. The profile photo feature is
disabled for users with the visitor profile type, and no one can update the profile photo
for users of this profile type.
<feature name="profile.photo">
<profileType type="default" enabled="true">
<acl name="profile.photo.update" scope="self" />
</profileType>
<profileType type="contractor" enabled="true">
<acl name="profile.photo.update" scope="none" />
</profileType>
<profileType type="visitor" enabled="false">
<acl name="profile.photo.update" scope="none" />
</profileType>
</feature>
6. Save your changes and check the profiles-policy.xml file back in using the following
command:
ProfilesConfigService.checkInPolicyConfig()
7. To exit the wsadmin client, type exit at the prompt.
8. Stop and restart the Profiles server.
You have enable the photo profile.
47
PackageKit-gtk-module
gtk2.i686
compat-libstdc++-33.i686
compat-libstdc++-296
compat-libstdc++
libXtst.i686
Note: Ensure that the GTK library is available on your system. Even when your IBM
Connection is to be installed on a 64-bit system, you still need the 32-bit version of the
GTK library. If you use silent mode or console mode to install IBM Connections, you do not
need the GTK libraries.
AIX
For IBM Connections on AIX, ensure that you have X11 package installed on you server:
X11.base.rte
X11.apps.config
Windows
IBM Connections on Windows does not required any additional software to be installed.
48
News - 500 MB per message store for holding files reference, images reference, text
content, and so on.
Profiles - 30 MB for cache file directory
Search - 15 GB for index files directory, the disk space required for the search index is
depended on the amount of content in the individual IBM Connections features and the
disk space required will grow when the IBM Connections content grows.
Wiki - 10 GB for content store for holding files reference, images reference, text content,
and so on.
Note: The sizes of these directories will grow when the number of users and activities
increases. Monitor the space available to know when is necessary to increase the capacity.
Note: Content store, are all data generated from an application (Activities, Blogs and
Homepage) and are stored on databases. All other contents (Files, cache, Index,
Temporary and Search) are stored on the shared folder defined during the installation
procedure. For IBM Connections environments in WebSphere Application Server Cluster,
they are stored on a shared file system, for example, a NFS directory of
/opt/IBM/Connections/data/shared on Deployment Manager server
Each product in the IBM Connections environment has its own system requirements. For
more information, see the Information Center of the product:
Cognos Information Center
http://publib.boulder.ibm.com/infocenter/cbi/v10r1m0/index.jsp?topic=%2Fcom.ibm
.swg.im.cognos.qrc_inst.10.1.0.doc%2Fqrc_inst_id426VerifySystemRequirements.htm
l
DB2 Information Center
http://pic.dhe.ibm.com/infocenter/db2luw/v9r7/nav/2_0_2_1_2
WebSphere Application Server Information Center
http://pic.dhe.ibm.com/infocenter/wasinfo/v7r0/topic/com.ibm.websphere.installa
tion.nd.doc/info/ae/ae/tins_prepare.html
Tivoli Directory Server Information Center
(http://pic.dhe.ibm.com/infocenter/tivihelp/v2r1/topic/com.ibm.IBMDS.doc/instal
l202.htm?path=8_3_20#dskspace
Tivoli Directory Integrator Information Center
http://pic.dhe.ibm.com/infocenter/tivihelp/v2r1/topic/com.ibm.IBMDI.doc_7.0/adm
inguide11.htm?path=7_9_0_9_0_4_4_0#wq20
IBM Domino http://publib.boulder.ibm.com/infocenter/domhelp/v8r0/index.jsp
49
50
Chapter 6.
Product deployment
Installing IBM Connections can be broken down in to the following distinct phases:
9. Preparing the computer environment - physical or virtual
10.Pre-installing and configuring the components Connections requires to run:
a. Setting up the installation manager
b. Installing the database
c. Creating the databases;
d. Installing Tivoli Directory Integrator
e. Installing IBM WebSphere Application Server
f. Installing IBM HTTP Server
g. Installing Cognos Business Intelligence
11.Installing Connections
12.Performing post-installation configuration steps
In this chapter, we describe the product installation and post-installation configuration steps.
6.1, Setting up the Installation Manager on page 52
6.2, Installing the database management system on page 54
6.3, Installing Tivoli Directory Integrator on page 63
6.4, Installing WebSphere Application Server on page 70
6.5, Creating databases on page 97
6.6, Populating Profiles using population wizard on page 98
6.7, Installing Cognos Business Intelligence on page 102
6.8, Installing IBM Connections applications on page 108
6.9, Installing IBM HTTP Server on page 117
6.10, Post installation environment configuration on page 127
6.11, Post installation IBM Connections configuration on page 160
51
52
7. Check if the installation was successful and click Restart Installation Manager to start
the Installation Manager console.
53
Note: For more information about the IBM Installation Manager, see IBM Information
Center (http://pic.dhe.ibm.com/infocenter/install/v1m0r0/index.jsp).
You can find the latest version of the IBM Installation Manager at IBM Support Portal
(http://www-947.ibm.com/support/entry/portal/download%3Ci%3Esoftware/rational/ib
m_installation_manager).
54
55
6. We chose to save the responses into a response file, /root/db2ese.rs, for future
installation. We recommend using the .rsp file extension because it is used as a default
when selecting a response file in the future.
56
7. Choose the installation directory for DB2. On Linux, we chose to install it to the default
directory /opt/ibm/db2/V9.7.
8. For our installation, we chose to include the IBM Tivoli System Automation to help us
manage a high-availability solution for DB2.
57
9. Enter the user name and group that the DB2 application will run as. This user name and
group should already exist on the operating system. For safety use a user name and group
name which will not be present in your LDAP directory.
58
12. The installer then asks for you to supply the user name and details for a user to run the
DB2 instance. Use the form to create a new user (you must have rights to do this as the
user who is running the installer), or choose an existing user.
59
13. Supply the name of the Fenced User, which is a special account used to run stored
procedures and other functions.
14. For the Tools Catalog. We chose not to prepare the Tools catalog at install time, but this
can be done later.
60
15. If you want to receive email notifications from the server, such as maintenance
requirements or errors, setup the SMTP server details here.
61
17. Review the settings you select in the Summary screen and click Finish to start
installation.
18. When the installation finishes, you should a successful window as shown below. Take
special note of the Post-Install Steps and click Finish.
62
63
64
5. In the Software License Agreement page, click "I accept the terms in the license
agreement" and click Next.
6. In the Choose Install Folder page. Specify an Installation directory and click on Next. We
recommend keeping the path name short and using 8 character folder names. Common
practice on Windows is to place the installation in a folder such as IBM, not Program Files
(x86) to avoid the spaces and longer folder names.
65
7. In the Choose Install Set page. Select Typical and click Next.
8. In the Solutions Directory page, Select Do not specify use current working directory
at startup time and click Next.
66
9. In the TDI Server Ports page. Accept the default values and click on Next.
10. In the TDI Server Service page. Accept the default values and click Next.
11. In the Integrated Solutions Port Values page. Accept the default values and click on Next .
Chapter 6. Product deployment
67
12. In the AMC Service page. Accept the default values and click Next.
13. In the Pre-Installation Summary page. Review the information in the Pre-Installation
Summary window and click Install.
68
14. In the Installing Complete page. Uncheck Start the Configuration Editor and click
Done.
You have finished the IBM Tivoli Directory Integrator V7.1 installation.
Chapter 6. Product deployment
69
70
In this section, we show the steps to install the servers that hosts WebSphere Application
Server, configure the Deployment Manager, configure the additional nodes, install the update
maintenance tool, install fix packs, and enable the console security. For more information
about WebSphere Application Server Network Deployment, see WebSphere Information
Center(http://pic.dhe.ibm.com/infocenter/wasinfo/v7r0/index.jsp?topic=/com.ibm.web
sphere.nd.multiplatform.doc/info/ae/ae/welcome_ndmp.html).
The procedure to set up WebSphere Application Server systems for the IBM Connections is
as follows:
1. Installing and configuring Deployment Manager
This step is to create a server for managing the WebSphere environment. In our example,
we define the Deployment Managera cell and create Integrated Solutions Console (ISC) to
deploy IBM Connections.
2. Installing additional nodes
These nodes are added into Deployment Manager cell to host the IBM Connections files
deployed on WebSphere Application server.
3. Configuring LDAP in the Integrated Solutions Console.
IBM Connections requires an user registry repository to authenticate users. You have to
configure WebSphere to access the LDAP.
4. Configuring security on Integrated Solutions Console.
To secure the WebSphere infrastructure, you must enable the global security using ISC.
After enabled the global security at ISC, all servers under the WebSphere requires
authentication to access them.
The following figure shows the logical topology of the IBM Connections servers of our lab
scenario. In this scenario, we have configured 3 Linux servers con-dmgr, con-app01 and
con-app02. The con-dmgr is our cell (cell is responsible for manage multiple nodes),
con-app01 and con-app02 are defined as a node (node is an administrative grouping of
application servers for configuration and operational management). On our environment all
servers are installed on Linux and WebSphere Application Server Network Deployment.
71
72
Click Launch the installation wizard for WebSphere Application Server Network
Deployment,
3. After you have read the Software license agreement, accept the agreement to continue.
73
4. The installation wizard checks the prerequisites of your operating system. You might
receive an warning informing that your operating system is not detected. This is because
your environment might have been added after the product release, probably your
environment is newer than the minimum required to install WAS ND so you can click on
Next. To check the compatibility, see 5.1, Verify software requirements on page 40.
74
5. In the optional features to be installed on WebSphere Application Serve window, you can
install the Samples to test your environment when the installation finished, add support
language to administrative console and also the support language runtime environment,
can be added. For our installation, we do not need any optional features.
6. The installation wizard allows you to choose the directory to install your WebSphere
Application Server. By default, the installation directory is as follows:
Linux: /opt/IBM/WebSphere/AppServer
AIX: /usr/IBM/WebSphere/AppServer
Windows: :\IBM\WebSphere\AppServer
75
7. Choose the profile to be installed. For the Deployment Manager, select Management as
the profile.
Note: For more information about profile, see WebSphere Application Server V7.0:
Concepts, Planning and Design Redbook
http://www.redbooks.ibm.com/redbooks/pdfs/sg247708.pdf
8. Select Deployment manager as the server type for allowing managing multiple federated
nodes.
76
9. To have the installation wizard configure the secure administrative console during the
installation, mark Enable administrative security and provide an user name and
password., This user name must not exist on LDAP repository., for example wasadmin.
10. The Centralized Installation Manager (CIM) creates a repository with the installation
contents that allows you to install and uninstall WebSphere Application Server binaries
and maintenance patches from a centralized location. Do not check centralized repository
installation.
11. After we have defined all the installation parameters, the installation wizard provides a
summary. Click Verify my permissions to perform the installation to have the
installation wizard check permission before performs the installation.
77
12. If there are no permission issues, the wizard returns success as the validation result.
Click Next to start the installation process.
78
13. The installation wizard provides the success result at the end of the installation. For the
installation log, see AboutThisProfile.txt on
/opt/IBM/WebSphere/AppServer/profiles/Dmgr01/logs/AboutThisProfile.txt.
14. When the installation completes the installer shows the First Steps wizard. This allows
you to perform a number of post-install operations, including Installation Verification. We
recommend running the installation verification process to ensure that the WAS
installation is healthy.
79
15. The installation verification: Checks if your Deployment Manager is able to start and run a
validation.
You have finished the WAS ND installation and configuration, we have a cell deployed named
con-dmgrCell01.
80
6. On the Federation window, provide the Deployment manager host name, SOAP port,
user name and password, defined during the WAS ND installation.
7. After you have defined all the installation parameters, the installation wizard provides a
summary and checks the permission before perform the installation.
81
8. If there are no permission issues, the wizard returns success as validation result. Click
Next to start the installation process.
9. The installation wizard provides the success result when finishes the installation. For the
installation log, see AboutThisProfile.txt on
/opt/IBM/WebSphere/AppServer/profiles/Custom01/logs/AboutThisProfile.txt.
82
For the recommended fixes for WebSphere Application Server, see WebSphere Application
Server fix pack website (http://www-01.ibm.com/support/docview.wss?uid=swg27004980).
IBM Connections requires fix pack 21 to be installed on WAS. You must install the update
installer to apply the fix pack on WAS. Follow these steps to complete update installer
installation and fix pack 21:
1. Stop WebSphere Application Server before start the Update Installer installation.
2. Unzip the downloaded Update Installer source to a temporary folder (for example, /tmp)
and start the installation by running /tmp/UpdateInstaller/ install.
83
3. Read and accept the license agreement to continue. Click on I accept both the IBM and
the non-IBM terms.
84
5. Choose the installation directory to install the Update Installer. The default on a Linux
system is /opt/IBM/WebSphere/UpdateInstaller.
6. The installation wizard reports the summary for you to validate if the parameters are
correctly defined before continuing.
85
7. If you want to to start the Update Installer automatically when the installation is finished,
check Launch IBM Update Installer for WebSphere Software on exit.
If you do not start the Update Installer automatically after the installation, You can start the
Update Installer manually by running /opt/IBM/WebSphere/UpdateInstaller/update.sh.
86
8. Since we selected to start the Update Installation automatically, the update process starts
and the Welcome window shows you the supported products.
To install a WebSphere Application Server fix pack, download the fix pack and store the
files in a temporary directory (for example,
/opt/IBM/WebSphere/UpdateInstaller/maintenance).
9. Select the product that you want to update by clicking the dropdown list and select the
installed product to be updated.
87
10. The following options are available to manage your maintenance update. Select Install
maintenance package.
11. Enter the directory where you have stored your fix pack. The wizard lets you choose the
directory where the fix pack is stored ( for example,
/opt/IBM/WebSphere/UpdateInstaller/maintenance)
88
12. The Update wizard automatically recognizes the files in the maintenance directory and
selects the files to be installed.
13. You can verify the permission before starting the maintenance installation by checking
Verify my permissions to perform the installation.
89
You have installed and applied the fix pack on WebSphere Application Server using Update
Installer.
90
91
5. Enter the following parameters to configure the LDAP connection and credentials:
Repository identifier: Define a name to identify the repository to be added, for example,
Renovations LDAP directory.
Directory Type: Select the LDAP type on the list.
Primary host name: Enter the full qualified host and domain name of the LDAP server
(FQDN).
Port: Enter the TCP port that your LDAP is configured.
Bind distinguished name: If your LDAP does not allow anonymous search, you must
provide a user name and password in canonical format, e.g. cn=Administrator, o=itso
Bind password: Enter the bind user password.
Login properties: Specify the login attribute or attributes that you want to use for
authentication. Common examples are uid; cn; mail for unique ID, common name and
mail. Separate multiple values with semi-colons.
92
6. On the Repository reference page, the following fields represent the LDAP attribute type
and value pairs for the base element in the realm and the LDAP repository.
The type and value pair are separated by an equal sign (=), for example: o=itso. These
can be the same value when a single LDAP repository is configured for the realm or can
be different in a multiple LDAP repository configuration.
Distinguished name of a base entry that uniquely identifies this set of entries in the
realm: Identifies entries in the realm. This base entry must uniquely identify the
external repository in the realm. If multiple repositories are included in the realm, use
this field to define an additional distinguished name (DN) that uniquely identifies this
set of entries within the realm.
Distinguished name of a base entry in this repository: Identifies entries in the LDAP
directory. The base entry indicates the starting point for searches in this LDAP
directory server.
Note: If you have defined flat groups in the Domino directory, do not enter a value in
this field. Flat groups are group names such as SalesGroup, as opposed to:
cn=SalesGroup,ou=Groups,o=itso. If you configure a search base in this Step, you
will not be able to access the groups
93
94
95
96
3. Restart the WebSphere Application Server and try to access the ISC using the user name
defined as the primary administrator.
You have finished the WebSphere Application Server installation and configuration, now you
can install the IBM Connections.
97
5. Verify that the new license has been added by typing the command db2licm -l.
Assuming it reports the correct licence, restart DB2.
You can create DB2 database for IBM Connections using DB2 Database Wizard. Locate the
Database Wizards ZIP file obtained as part of the IBM Connections 4 installation files and
unzip them to a convenient location. Follow these steps to create a DB2 database:
1. If your DB2 is on a Windows 2008 64-bit. system, you must perform DB2 administration
tasks with full administrator privileges.
a. Logged in as the instance owner, open a command prompt and change to the DB2 bin
directory. For example:
C:\Program Files\IBM\SQLLIB\BIN.
b. Enter the following command:
db2cwadmin.bat.
This command opens the DB2 command line processor while also setting your DB2
privileges.
2. From the IBM Connections Wizards directory, open the following file to launch the wizard:
Linux: ./dbWizard.sh
Microsoft Windows: dbWizard.bat
3. Click Next to continue.
4. Select the option to create a database and click Next.
5. Enter the details of the database you want to create and then click Next:
Select a database type.
Select the location of the database.
Specify a database instance.
6. Select an application and click Next.
7. Review the Pre Configuration Task Summary to ensure that the values you entered on
previous pages in the wizard are correct. If you want to make a change, click Back to edit
the value. Click Create to begin creating databases.
Note: Click Show detailed database commands to preview each SQL command
before it is run by the wizard. If you choose to save the commands, you must have
write-access to the folder that you choose to save them in.
8. Review the Post Configuration Task Summary panel and, if necessary, click View Log to
open the log file. Click Finish to exit the wizard.
98
99
100
11. After successful user population, the following screen is displayed. Click Finish to
complete the task.
101
102
12. Run the following command to catalog the database for metrics and cognos
For Metrics: db2 catalog db metrics as metrics at node db2 node
For Cognos: db2 catalog db cognos as cognos at node db2 node
13. To validate a metrics database, execute the following command.
db2 connect to metrics user db2inst1 using db2inst1
103
104
7. Copy the following DB2 jar files from DB2 Server to the
C:\IBM\CognosSetup\BI-Customization\JDBC directory.
db2jcc.jar
db2jcc_license_cu.jar
8. Go to C:\IBM\CognosSetup folder and prepare the cognos-setup.properties. Enter the
following values:
105
Note:
cognos.admin.username must be a valid LDAP user for Cognos administrator.
Password is removed from cognos-setup.properties after the configuration task is
run. You can supply a password from command line.
cognos.cube.path is a shared folder to access the reports in case of Cognos server
is running in multiple node.
9. Run the cognos-setup.bat to set up the Cognos BI server. Upon completion, the logs are
stored at cognos-setup.log. If there are any error occurs, correct the value and re-run the
task again.
10. Run the cognos-configure.bat to configure the Cognos BI Server. The log file
cognos-config.log is created in the same directory. If there are any error occurs while
running the cognos-configure.bat, fix the errors and run it again.
11. The Cognos BI Server and Transformer logs are stored in the following directory.
12. Cognos configuration is completed successfully. Start the server after federating Cognos
BI server into the Deployment Manager running on con-dmgr.itso.ibm.com.
106
107
2. Read the notice and information, license agreement, and License information, select I
accept the terms in the license agreements.
108
109
4. Select the location where the IBM Connections binary files will be installed.
110
6. IBM Connections installation wizard starts the checking process to verify if the
pre-requirement components (WebSphere, database, Cognos, and the setup
environment) are correctly defined. The first component to be check is the WebSphere
Application Server. You must provide the information bellow for verification:
Installation location: Provide the WebSphere Application Server location.
Deployment Manager profile: The profiles are loaded automatically. Select the
Deployment Manager profile (Dmgr01).
Host name: Provide the Deployment Manager host name using full qualified domain
name (FQDN), for example, con-dmgr.itso.ibm.com.
Administrator user ID: Provide the user id configured on WebSphere Application
Server (domadmin).
Administrator password: Pprovide de password for Administrator user.
Click Validate to check the information provided. The validation successful message is
shown in another window.
111
7. Select the topology for installation. For each application, select the servers that will be part
of the cluster. On our lab, we used the large topology where all applications have their own
cluster. We mark con-app01Node01 and con-app02Node01 for all applications.
112
8. Defining IBM Connections database. On our lab, we use DB2 database to store all the
IBM Connections information. Provide the database information:
Database Type: Select DB2 Universal Database(TM)
Databse server host name: provide the DB2 host name using FQDN
(con-db201.itso.ibm.com)
Port: provide the TCP port configured on DB2 (50001)
JDBC driver location: provide the JDBC driver location. (/usr/ibmdb2/V9.7/java)
Note: JDBC driver must exist on all WebSphere Application Server servers at the same
place.
113
9. On the database definition, select Use the same password for all applications, and click
Validate to confirm if the information provided on steps 8 and 9 are defined correctly. The
validation successful information is shown in a pop-up window.
114
10. On Cognos configuration step, provide the information from Cognos server installation.
We enter the information from 6.7, Installing Cognos Business Intelligence on page 102.
Administrator user ID: Provide the Cognos user ID (cogadmin).
Administrator password: Provide the password for the Administrator user ID.
In Node section, click on Load node info button and select the WebSphere Application
Server node where the Cognos was installed (l02w04-w7Node01). Select the server
name from Cognos Server (cognos_server) and provide the web context root from
Cognos (cognos). Click Validate. After receiving the Success Validation message. click
Next to continue.
11. On Common Configurations, you can enable the notifications to allows IBM Connections
to send e-mail. On our lab environment, we just define the notifications by providing the
following information:
Mark Enable Notification only.
Mail server type: Select WebSphere Java Mail Session - Use a single mail server
for all notifications.
Host name of SMTP messaging server: Provide the host name of the SMTP (Simple
Mail Transport Protocol) server (smtp.itso.ibm.com).
Port: Provide de TCP port from the SMTP server (25).
115
12. Check if your IBM Connections was installed successfully and click Finish.
116
117
2. On the Software License Agreement read and select I accept both the IBM and the
non-IBM terms.
3. The wizard checks the system prerequisites requirements on your server. If the operating
system is added to the supported system list after the product was released, you might
receive the following message. Click Next to continue.
118
4. Select the directory to install the product. The default directory is shown. We recommend
removing Program Files and making the path shorter, e.g. C:\IBM\HTTPServer
5. You can choose the TCP port to be used by IBM HTTP Server and Administration, leave
the default option.
119
6. Select both options to run IBM HTTP Server and IBM HTTP Server Administration as
Windows services, and define an account name an password to start the process.
120
7. The IBM HTTP Server Administration user ID is for managing the IBM HTTP Server over
the WebSphere Integrated Console Solution (ISC). Select the option to have the installer
create the ID.
8. Select install the IBM HTTP Server Plug-in for IBM WebSphere application Server to
create plug-in configuration file. Define the web server name and host name from IBM
HTTP Server.
121
9. Validate if all parameters defined are correct, and click Next the continue the installation.
10. The installation wizard shows that both IBM HTTP Server and Plug-in are installed
successfully.
122
After the IBM HTTP Server is installed, you must apply the latest fix pack. See the fix pack
installation procedure in 6.4, Installing WebSphere Application Server on page 70.
123
4. Verify if the node that you have added are listed on the Nodes on the Integrated Solutions
Console. Click Save to save the configuration.
Repeat this the add node step to add additional nodes on the Integrated Solutions
Console.
5. After you have added the node on WebSphere Application Server, add web servers on the
servers management on the Integrated Solutions Console.
6. Under Servers on the left menu, expand Server Types and click Web servers. Click New
to add the IBM HTTP Server on the console.
124
7. Choose the web server node to be added from the select node field drop-down list. The
Server name is displayed for you. Select the corresponding web server type.
125
Application mapping to the web server: Select All to support the application mapping
on WebSphere.
Administration Server Port: Enter the TCP port for the Administration process.
Username: Enter the name of the Administration user that you have defined during the
IBM HTTP Server installation.
Password: Enter the password defined.
Confirm Password: Confirm the password.
Use SSL: Do not check the SSL.
10. Review the summary and click finish if the information provided is correct to complete the
configuration process.
11. Confirm that you have the web server listed on the console and click Save.
126
Run this procedure for each additional web server on your environment.
You can now manage your IBM HTTP Server from the ISC.
Enabling SSL
In our example, we use self-sign certificate to enabling SSL. With SSL enabled, all the
communications are encrypted and the connections between the client browsers and the web
server are secured.
To enabling SSL on the IBM HTTP server, you must use the key management utility, iKeyman,
to create a key for securing your network communication. This key is installed on IBM HTTP
Server configuration file.
127
Note: For more information about enabling SSL on the IBM HTTP server, see WebSphere
Application Server Information Center
(http://pic.dhe.ibm.com/infocenter/wasinfo/v6r1/index.jsp?topic=%2Fcom.ibm.websp
here.ihs.doc%2Finfo%2Fihs%2Fihs%2Fwelc_ikeymangui.html).
2. From the menu bar, select Key Database File New. Select CMS for Key database type.
Enter a name for the the key file on File Name (connections.kdb) and the path on the
Location (C:\Program Files\IBM\HTTPServer\conf).
128
3. On the password prompt, define and confirm a password. Check Stash password to a
file.
4. From menu bar, select Create New Self- Sign Certificate and fill the following
options:
Key Label: Define a label to identify your certificate on the key file, for example,
connections.
Version: Define the SSL version to X509 V3.
Key Size: Set the size to 2048.
Signature Algorithm: Define the signature to SHA1WithRSA.
Common Name: Define the full qualified domain name (FQDN) that you choose to
access your IBM Connections, for example, connections.itso.ibm.com.
Organization Name: Define the organization name, for example, IBM.
Organization: Define your unit, for example, ITSO.
Country or region: Select your country, for example, US.
Validity period: Set the days that the certificate is valid, for example, 3650 days.
129
5. You have created an SSL key add to your IBM HTTP Server configuration file to secure
your connection.
130
Enabling HTTPS
1. On the WebSphere console, click Servers on the left menu and expand Server Types.
Click Web servers and choose the server that you want to configure. In our example, it is
con-ihs01.
2. On Additional Properties, click Configuration File to edit the IBM HTTP Server
configuration file.
3. Add the following lines before "LoadModule was_app22_module..." at the end of the file,
and click OK.
LoadModule ibm_ssl_module modules/mod_ibm_ssl.so
<IfModule mod_ibm_ssl.c>
Listen 0.0.0.0:443
<VirtualHost *:443>
ServerName server_name
SSLEnable
</VirtualHost>
</IfModule>
SSLDisable
Keyfile "path_to_key_file"
SSLStashFile "path_to_stash_file"
where
server_name: Host name of the IBM HTTP Server, for example, con-ihs01
131
veyfile:The path and the SSL key file that you create using the iKeyman utility, for
example, C:\IBM\HTTPServer\conf\connections.kdb
SSLStashFile:The path and the stash file that you associate the stash using the
iKeyman utility, for example, C:\IBM\HTTPServer\conf\connections.sth
5. After finishing the configuration, you must restart the web server. Select the web server
(con-ihs01) that you edited and click Stop. Check if the server is down and then click
Start to start the web server.
6. Access the web server using https from a web browser, in our example,
https://con-ihs01.itso.ibm.com/ Because we use a self signed certificate, a warning is
displayed informing you that the certificate is not trusted by a Certificate Authority (CA).
Click Continue to this website (not recommended),
132
This concludes the SSL configuration on IBM HTTP Server. The network connection
security between your browser and the web server is enabled.
3. Verify each cluster that your applications is assigned on the Server column, for example,
WebSphere:cell=con-dmgrCell01,cluster=ActivitiesCluster
4. On Clusters and servers, select the corresponding cluster
(WebSphere:cell=con-dmgrCell01,cluster=ActivitiesCluster) that is responsible for the
application that you are configuring (Activities) and the web servers
133
(WebSphere:cell=con-dmgrCell01,node=con-ihs02,server=con-ihs02
WebSphere:cell=con-dmgrCell01,node=con-ihs01,server=con-ihs0).
Using Ctrl key on your keyboard, select all modules as shown in the following figure. Click
Apply.
5. Verify if all modules are configured with both servers that you have selected on the
previous step and click OK.
134
Activities
Blogs
Common
Communities
Dogear
Files
Forum
Help
Homepage
Metrics
Mobile
Mobile Administration
Moderation
News
Profiles
Search
WebSphereOauth20SP
WidgetContainer
Wikis
8. On the left menu, expand Servers and Server Types, and select Web Servers.
9. Check the web servers listed and click Generate Plug-in then Propagate Plug-in.
Restart the web servers.
135
10. From WebSphere Application Server console, stop all application servers.
11. On the Deployment Manager host server, edit LotusConnections-config.xmlto update the
URL for each application. For example: change
http://con-dmgr.itso.ibm.com:<port>
to
http://connections.itso.ibm.com/
To secure connection, change
https://con-dmgr.itso.ibm.com:<port>
to
https://connections.itso.ibm.com/
Change
<sloc:href>
<sloc:hrefPathPrefix>/activities</sloc:hrefPathPrefix>
<sloc:static href="http://con-dmgr.itso.ibm.com:9083" ssl_href="https://con-dmgr.itso.ibm.com:9446"/>
<sloc:interService href="https://con-dmgr.itso.ibm.com:9446"/>
</sloc:href>
to
<sloc:href>
<sloc:hrefPathPrefix>/activities</sloc:hrefPathPrefix>
<sloc:static href="http://connections.itso.ibm.com" ssl_href="https://connections.itso.ibm.com"/>
<sloc:interService href="https://connections.itso.ibm.com"/>
</sloc:href>
136
13. On left menu, expand Serves and Clusters, click WebSphere application server
clusters and restart all applications clusters by clicking Stop then Start.
Upon complete these steps, your environment is ready for users using the URL that you
defined. On our lab environment, it is http://connections.itso.ibm.com/homepage/ and , for
secure connections, https://connections.itso.ibm.com.
Homepage redirection
IBM Connections creates its own application context to be accessed (/homepage, /blogs,
/news, and so on). You can configure IBM HTTP Server to redirect users to IBM Connections
applications. For example, a user visiting http://connections.itso.ibm.com can be
redirected to http://connections.itso.ibm.com/homepage. Follow these steps to set up this
redirecting:
1. On Web server hosts (con-ihs01.itso.ibm.com and con-ihs02.itso.ibm.com), edit httpd.conf
on C:\Program Files\IBM\HTTPServer\conf directory.
137
RewriteEngine on
RewriteRule ^/$ https://connections.itso.ibm.com/homepage [R,L]
5. Save and close file.
6. Restart the IBM HTTP Server
Now you can access your environment by typing the URL and you are automatically redirect
to the IBM Connections application.
138
139
4. Select CellDefaultTrustStore.
140
6. Click Retrieve from port to get the certificate straight from the server provider.
141
8. Verify if the certificate that you have imported are on the list and click Save.
Now your IBM Connections are able to accept the SSL communication between the servers.
142
2. In the Server Infrastructure area, expand Java and Process Management and click
Process Definition.
143
4. Set the Minimum Heap Size and Maximum Heap Size to 2506 MB (recommended).
Note: Ensure that you are not allocating more memory than the physical capacity of the
system where the JVM is installed.
144
3. Select the Role on the list. Click Search and select the user or users (Abauer) that you to
add the profile and click the right arrow then click OK.
4. Check if the user or users and roles that you selected are correct and click Save.
145
5. Log off from the ISC and try to log in using the users that you have added.
You have added more users with certain rights to access the ISC.
Note: For more information about the roles you can visit the WebSphere Application
Server Information Center
(http://pic.dhe.ibm.com/infocenter/wasinfo/v7r0/index.jsp)
146
147
10. Start the Cognos BI server node agent using command line. Make sure that the password
is present in cognos-setup.properties. If password is not there, supply the password as an
arguments to the cognos-setup-update.bat script.
11. Generate the Cognos. ear file by running the following command:
Windows: Run the cognos-setup-update.bat.
UNIX: Run cognos-setup-update.sh
The log file, cognos-setup-update.log is stored in same directory.
148
149
150
151
8. Right click the namespace IBMConnections and click Test to validate the LDAP settings.
10. Login to the Deployment Manager console with the user ID domadmin.
11. Stop the cognos_server and wait for one minute to ensure that the Cognos server is
stopped.
12. Validate the Java processes cgsLauncher.exe and CAM_LPSvr do not exist on the
Cognos BI server.
13. Start the cognos_server.
152
Note: Failing to add Cognos Administrator domadmin into metrics-report role, you can
not configure IBMConnectionsMetricsAdmin role and the request will throw an error
message, "Access is restricted"
4. Save and synchronize the nodes.
5. Go to System Administration Node Agents and restart node agents for the IBM
Connection servers.
153
154
con-ihs02:
155
CAM_LPSvr processes
15. Enter the following URL to validate the Cognos server:
https://connections.itso.ibm.com/cognos/servlet
156
2. Request is route to IBM Connections login page. Enter the user ID as domadmin.
157
10. Select Show Users in the list and click IBMConnections from the list.
158
11. Add domadmin user to the list. At least, the following users must be added to the list. The
domadmin user ID is part of all the roles mentioned below.
The Cognos administrator
IBM Connection administrators
All users assigned to metrics-report-run role
12. Click OK to save the changes.
13. Go to Security Directory Cognos.
14. Search for the System Administrators role and select More.
15. S elect the Set Properties icon
16. Select the Members tab.
17. Remove Everyone from the Members tab.
Additional languages
Media components
Configuring and creating search indexes
Setting up RSS feeds
File size quotas
Status update retention
Trash file retention
Application security roles
Configuring moderation for connection applications
In this section, we describe how to configure IBM Connections to add additional languages,
media components and creating search indexes.
Arabic
Catalan
Chinese - simplified and traditional
Czech
Danish
Dutch
Chapter 6. Product deployment
159
Finnish
French
German
Greek
Hebrew
Hungarian
Italian
Japanese
Kazakh
Korean
Norwegian
Polish
Portuguese -- Brazilian and traditional
Russian
Slovenian
Spanish
Swedish
Thai
Turkish
4. Run the following command to check out the IBM Connections server configuration file:
LCConfigService.checkOutConfig("/opt/IBM/work","con-dmgrCell01")
160
161
162
10. Run the following command to build the search index for IBM Connections applications.
SearchService.indexNowWithOptimization("activities,blogs,calendar,communities,d
ogear,files,forums,profiles,status_updates,wikis")
11. Go to /opt/IBM/Connections/data/local/search/index directory of first search cluster
node. The presence of file INDEX_READY and CRAWLING_VERSION confirms that
index is created successfully.
163
164
Chapter 7.
165
clustering support, and online backup are features that provides the capability of 24x7 data
availability.
The IBM Connections data should be backed up regularly with database utility or by exporting
data and back them up.
In this wiki, we use IBM DB2 as the repository for the IBM Connections data. For more
information about the DB2 high availability and disaster recovery options, see
High Availability and Disaster Recovery Options for DB2 for Linux, UNIX, and Windows
http://www.redbooks.ibm.com/abstracts/sg247363.html, SG24-7363.
166
167
168
7. Validate if all features defined are correct, and click Next to continue the installation.
8. The installation wizard shows that Edge Components were installed successfully. Click
Finish.
169
170
171
CompressionFilterAddContentType
CompressionFilterAddContentType
CompressionFilterAddContentType
CompressionFilterAddContentType
CompressionFilterAddContentType
CompressionFilterAddContentType
CompressionFilterAddContentType
CompressionFilterAddContentType
CompressionFilterAddContentType
text/xsl
text/css
text/javascript
application/x-javascript
application/javascript
application/xml
application/xhtml+xml
application/atom+xml
application/octet-stream
MaxActiveThreads 700
ServerConnPool on
ServerConnTimeout 5 seconds
ServerConnGCRun 1 minutes
CacheTimeMargin 0 seconds
SendRevProxyName yes
PureProxy off
CacheTimeMargin 0 minutes
KeepExpired On
Enable CONNECT
Enable PUT
Enable DELETE
CacheQueries PUBLIC
LimitRequestBody 100 M
4. Continue to edit the ibmproxy.conf configuration file using a text editor, and change
according to your environment:
Define the amount of memory to associate with the cache memory.
This is done by specifying CacheMemory amount directive using the following format:
CacheMemory amount {B | K | M | G}
The amount can be specified in one of the following units: bytes (B), kilobytes (K),
megabytes (M), and gigabytes (G).
For example: CacheMemory 1200 M
Define the reverse pass rules:
The ReversePass rule has the following formats:
ReversePass http:///* http:///*
ReversePass https:///* https:///
where is the host name of the HTTP server. The * in the URL to indicate that all URLs
will be sent to back-end server.
For example:
ReversePass
http://con-lb01.itso.ibm.com/*http://connections.itso.ibm.com/*
ReversePass
https://con-lb01.itso.ibm.com/*https://connections.itso.ibm.com/*
Define the proxy rule:
The proxy directive indicates which protocols the caching proxy is to process and map
a request to a server. The following are examples used in our lab exercise:
172
http://*/activities/service/atom/*
http://*/activities/service/atom2/*
http://*/activities/service/atom2/forms/*
http://*/activities/service/download/*
http://*/activities/service/download/forms/*
http://*/activities/service/getnonce
http://*/activities/service/getnonce/forms
NoCaching
NoCaching
NoCaching
NoCaching
NoCaching
NoCaching
NoCaching
NoCaching
NoCaching
NoCaching
NoCaching
NoCaching
NoCaching
NoCaching
NoCaching
NoCaching
NoCaching
NoCaching
NoCaching
NoCaching
NoCaching
NoCaching
NoCaching
NoCaching
http://*/blogs/api*
http://*/blogs/api_form*
http://*/blogs/approvedmsg.jsp*
http://*/blogs/confirmflagged.jsp*
http://*/blogs/notify.jsp*
http://*/blogs/notifyedit.jsp*
http://*/blogs/notifyflagged.jsp*
http://*/blogs/notifyquarantined.jsp*
http://*/blogs/ownermsg.jsp*
http://*/blogs/roller-services/*
http://*/blogs/roller-ui/admin*
http://*/blogs/roller-ui/createWebsite.do*
http://*/blogs/roller-ui/favorites*
http://*/blogs/roller-ui/homepage*
http://*/blogs/roller-ui/myupdates*
http://*/blogs/roller-ui/rendering/api/*
http://*/blogs/roller-ui/rendering/api_form/*
http://*/blogs/roller-ui/scripts/authCheck.jsp*
http://*/blogs/roller-ui/servermetrics.do*
http://*/blogs/roller-ui/yourWebsites.do*
http://*/blogs/services/atom*
http://*/blogs/services/atom_form*
http://*/blogs/services/xmlrpc*
http://*/bookmarklet/post/*
NoCaching
NoCaching
NoCaching
NoCaching
NoCaching
NoCaching
http://*/communities/dsx/*
http://*/communities/forum/service/atom/*
http://*/communities/service/atom/communities/my*
http://*/communities/service/atom/community*
http://*/communities/service/forum/get/nonce
http://*/communities/service/json/communityview*
NoCaching http://*/dogear/atom/inbox/*
NoCaching http://*/dogear/atom/mybookmarks/*
Chapter 7. High availability and disaster recovery
173
NoCaching
NoCaching
NoCaching
NoCaching
NoCaching
NoCaching
NoCaching
NoCaching
http://*/dogear/atom/mynotifications/*
http://*/dogear/atom/mysentnotifications/*
http://*/dogear/html/inbox/*
http://*/dogear/html/mybookmarks/*
http://*/dogear/html/mynotifications/*
http://*/dogear/html/mysentnotifications/*
http://*/dogear/seedlist/*
http://*/dogear/templates/*
NoCaching http://*/files/form/authenticated
NoCaching
NoCaching
NoCaching
NoCaching
NoCaching
NoCaching
NoCaching
NoCaching
http://*/homepage/web/getuserpref
http://*/homepage
http://*/homepage/web/widgets
http://*/homepage/web/jsp/*.jsp
http://*/homepage/web/servermetrics
http://*/homepage/admin/admin.jsp
http://*/homepage/atom/search/*
http://*/homepage/atom/mysearch/*
NoCaching http://*/mobile/activities/*
NoCaching http://*/mobile/blogs/*
NoCaching http://*/mobile/profiles/*
NoCaching http://*/profiles/aboutView.do
NoCaching http://*/profiles/home.do*
NoCaching http://*/profiles/html/*.do
NoCaching http://*/search/atom/mysearch
NoCaching http://*/search/serverStats
NoCaching http://*/search/web/*
NoCaching
NoCaching
NoCaching
NoCaching
NoCaching
NoCaching
NoCaching
NoCaching
NoCaching
NoCaching
http://*/wikis/basic/api/*
http://*/wikis/dm/atom/*
http://*/wikis/form/api/*
http://*/wikis/form/authenticated
http://*/wikis/seedlist/*
http://*/wikis/templates/about.jsp*
http://*/wikis/templates/demo.jsp*
http://*/wikis/templates/faq/en/tour1.jsp*
http://*/wikis/templates/statistics.jsp*
http://*/wikis/templates/toolbox.jsp*
174
NoCaching
NoCaching
NoCaching
NoCaching
NoCaching
NoCaching
NoCaching
NoCaching
NoCaching
NoCaching
NoCaching
NoCaching
NoCaching
NoCaching
NoCaching
NoCaching
NoCaching
NoCaching
NoCaching
NoCaching
NoCaching
https://*/blogs/confirmflagged.jsp*
https://*/blogs/notify.jsp*
https://*/blogs/notifyedit.jsp*
https://*/blogs/notifyflagged.jsp*
https://*/blogs/notifyquarantined.jsp*
https://*/blogs/ownermsg.jsp*
https://*/blogs/roller-services/*
https://*/blogs/roller-ui/admin*
https://*/blogs/roller-ui/createWebsite.do*
https://*/blogs/roller-ui/favorites*
https://*/blogs/roller-ui/homepage*
https://*/blogs/roller-ui/myupdates*
https://*/blogs/roller-ui/rendering/api/*
https://*/blogs/roller-ui/rendering/api_form/*
https://*/blogs/roller-ui/scripts/authCheck.jsp*
https://*/blogs/roller-ui/servermetrics.do*
https://*/blogs/roller-ui/yourWebsites.do*
https://*/blogs/services/atom*
https://*/blogs/services/atom_form*
https://*/blogs/services/xmlrpc*
https://*/bookmarklet/post/*
NoCaching
NoCaching
NoCaching
NoCaching
NoCaching
NoCaching
https://*/communities/dsx/*
https://*/communities/forum/service/atom/*
https://*/communities/service/atom/communities/my*
https://*/communities/service/atom/community*
https://*/communities/service/forum/get/nonce
https://*/communities/service/json/communityview*
NoCaching
NoCaching
NoCaching
NoCaching
NoCaching
NoCaching
NoCaching
NoCaching
NoCaching
NoCaching
https://*/dogear/atom/inbox/*
https://*/dogear/atom/mybookmarks/*
https://*/dogear/atom/mynotifications/*
https://*/dogear/atom/mysentnotifications/*
https://*/dogear/html/inbox/*
https://*/dogear/html/mybookmarks/*
https://*/dogear/html/mynotifications/*
https://*/dogear/html/mysentnotifications/*
https://*/dogear/seedlist/*
https://*/dogear/templates/*
NoCaching https://*/files/form/authenticated
NoCaching
NoCaching
NoCaching
NoCaching
NoCaching
NoCaching
NoCaching
NoCaching
https://*/homepage/web/getuserpref
https://*/homepage
https://*/homepage/web/widgets
https://*/homepage/web/jsp/*.jsp
https://*/homepage/web/servermetrics
https://*/homepage/admin/admin.jsp
https://*/homepage/atom/search/*
https://*/homepage/atom/mysearch/*
NoCaching https://*/mobile/activities/*
NoCaching https://*/mobile/blogs/*
NoCaching https://*/mobile/profiles/*
175
NoCaching https://*/profiles/aboutView.do
NoCaching https://*/profiles/home.do*
NoCaching https://*/profiles/html/*.do
NoCaching https://*/search/atom/mysearch
NoCaching https://*/search/serverStats
NoCaching https://*/search/web/*
NoCaching
NoCaching
NoCaching
NoCaching
NoCaching
NoCaching
NoCaching
NoCaching
NoCaching
NoCaching
https://*/wikis/basic/api/*
https://*/wikis/dm/atom/*
https://*/wikis/form/api/*
https://*/wikis/form/authenticated
https://*/wikis/seedlist/*
https://*/wikis/templates/about.jsp*
https://*/wikis/templates/demo.jsp*
https://*/wikis/templates/faq/en/tour1.jsp*
https://*/wikis/templates/statistics.jsp*
https://*/wikis/templates/toolbox.jsp*
176
177
2. From the menu bar, select Key Database File New and complete these fields:
Key database type: Select CMS
File Name: ProxyKeyConnections.kdb
Location: The file location, for example, /opt/ibm/keyfile
4. From menu bar, select Create New Self-Sign Certificate and fill the following
options:
Key Label: Define a label to identify your certificate on the key file, for example,
connections.itso.ibm.com
Version: Define the SSL version to X509 V3
Key Size: Set the size to 2048
Signature Algorithm: Define the signature to SHA1WithRSA
Common Name: Define the full qualified domain name (FQDN) that you choose to
access your IBM Connections, for example, connections.itso.ibm.com
Organization Name: Define the organization name, for example, IBM
Organization: Define your unit, for example, ITSO
Country or region: Select your country, for example, US
Validity period: Set the days that the certificate is valid, for example, 3650 days
179
Next step is to extract the an SSL certificate from IBM HTTP server to import into the IBM
Edge Components Cache Proxy server.
180
2. From the menu bar, select Key Database File Open. Complete these fields:
Key database type: Select CMS.
File Name: connections.kdb
Location: The conf file location of HTTP server such as c:\Program
Files\IBM\HTTPServer\conf
181
182
Next step is to import this SSL certificate extracted from IBM HTTP server into the Edge
Component Caching Proxy server.
183
2. From the menu bar, select Key Database File Open and complete these fields:
Key database type: Select CMS
File Name: ProxyKeyConnections.kdb
Location: The file location, for example, /opt/ibm/keyfil
184
3. Select Signer Certificates, click Add..., and enter the following data:
File name: ihscert.arm
Location: /root/
185
5. You have finished the import the IBM HTTP SSL certificate.
186
This concludes the SSL configuration on IBM Edge Component Caching Proxy server. The
network connection security between your browser and the web server is enabled.
187
188
189
190
9. Validate if all features selected are correct, and click Next the continue the installation.
191
10. The installation wizard shows that Edge Components were installed successfully on
your server. Click Finish.
192
In this topology, we include one WebSphere Edge Load Balancer 6.1 component for
balancing the incoming HTTP connections for two HTTP servers. We use the same topology
for Edge Caching Proxy servers.
In lab scenario, we have installed WebSphere Edge Load Balancer and assigned two static IP
addresses are assigned to it. For the Load Balancer system, note the following:
The server selected for the Load Balancer installation must reside on the same LAN
segment as the nodes to be clustered.
Ensure that /opt/ibm/edge/ulb/bin is added to the PATH.
193
server
server
server
server
add
set
add
set
10.52.78.28@80@10.52.78.26
10.52.78.28@80@10.52.78.26 weight 14
10.52.78.28@80@10.52.78.27
10.52.78.28@80@10.52.78.27 weight 14
9. Repeate the steps 6 and 7 to setup dispatcher in port 443 used by https protocol.
dscontrol
dscontrol
dscontrol
dscontrol
dscontrol
10. Start the manager function to improves load balancing. To start the manager, run the
following command:
dscontrol manager start manager.log 10004
11. Start the advisor function. The advisors give the manager more information about the
ability of the load-balanced server machines to respond to requests.
dscontrol advisor start http 80 http_80.log
dscontrol advisor start https 443 http_443.log
194
Conclusion
Your Load Balancer is now configured and ready to use. For information on managing your
Load Balancer, a full list of advisors, metric server functions for Dispatcher, and other
advanced features, refer to the product documentation that comes with the Load Balancer.
195
196
Chapter 8.
197
f. Enter the URL or IP address which is accessible from your device to the IBM
Connections server. This might be the internal URL if you connect first with a VPN
client or the external DNS name of the Connections server if you do not.
g. Enter your user name and password.
h. Tap Login.
8.2 Troubleshooting
The most common problem with the mobile client is that it is unable to connect to the server.
The lack of good diagnostic tools on mobile devices makes troubleshooting this issue quite
difficult. Test, therefore, with a regular browser that you can reach the mobile site for your IBM
Connections server, for example, https://greenhouse.lotus.com/mobile. Compare this with
the server name you have provided in the URL field. Note that it is not necessary to specify
the /mobile in the URL on the mobile device.
Sometimes in a poorly configured IBM Connections environment it is necessary to log in to
the mobile service using your email address and not your "common name". For example, I
might log in to IBM Connections on my computer as " Frank Adams" but it might be necessary
to log in on the mobile device as frank.adams@renovations.com. This indicates a poor
configuration of the Federated LDAP repositories on the IBM Connections application server.
199
200
Chapter 9.
201
The user mapped to admin role can access the Metrics link for all communities even though
user is not a member for a specific community.
9.1.4 Reader-role
The reader-role is present for the following applications:
Activities
Blogs
Bookmarks
Wikis
Files
Forums
Profiles
By default, this role is mapped to everyone. If a user is mapped to any specific application,
user can access reports for that application only using the global Metrics URL such as
https://connections.itso.ibm.com/metrics.
202
9.2.1 People
In this category, IBM Connections Metrics application provides report about how many people
logged into the IBM Connections server. This report can be generated based on the time
frame and group by options. The following figure is an example of the report that shows how
many people logged into the IBM Connections server.
9.2.2 Content
In this category, Metrics report gives details for most active content in IBM Connections
server so that leaders can take decision to update or modify the content to utilize the IBM
Connections server effectively. The following report example shows the most active content in
communities and forums.
203
9.2.3 Participation
In this category, metrics report gives details for how many people contributed to the IBM
Connections server. The following report example shows the number of users contributed to
the IBM Connections Server.
204
10
Chapter 10.
205
10.1.1 Email
The following table lists the functions available with the Email feature:
What do you want to do?
How you do it
Read a message
Reply to a message
Forward a message
Delete a message
When composing a new message within IBM Connections Mail, type-ahead look up is
available which checks your existing contacts (in IBM Connections and IBM Notes or
Microsoft Outlook) for matches with the characters that you are typing. A Check Names
button is also provided so that you can verify that the email addresses specified in the
To/Cc/Bcc fields do match what you have in your Contacts. In addition, you can add
attachments to the message that exist either on your Workstation or in the IBM Connections
Files Application.
Here are other exciting features of IBM Connections Mail:
Preview image files
Open someones profile page
Re-share a file if you have access
Follow or stop following a person or file
Accept or reject a request to join your network
See, like, and comment on files, status updates, and wall posts
Sort, add, edit, or delete comments on a file or wall post that you own
Note: Some are available only with IBM Domino Servers.
10.1.2 Calendar
The Calendar function provided with the IBM Connections Mail feature is essentially
read-only, where you can view your schedule from a previous day, the current day, or a
specific date. A handy ability in the Calendar function are the identification of conflicting
206
entries within your Calendar. Conflicting entries within a Calendar displayed in IBM
Connections have an orange-bar to clearly indicate a possible scheduling problem.
Before you begin, you must prepare your IBM Connections 4 environment to deploy IBM
Connections Mail. Aside from ensuring that your environment is working properly, you must
set a single sign-on (SSO) solution. If you use a Microsoft Exchange Server, you must
configure your IBM Connections environment to use SPNEGO. The IBM Connections Mail
feature supports SSO with IBM Domino Servers through SPNEGO or LTPA. The user email
addresses must:
Be valid email addresses.
Be visible in IBM Connections.
Their records of email addresses on the Mail Server must match what is stored in IBM
Connections.
Refer to product documentation Preparing to install IBM Connections Mail
(http://www-10.lotus.com/ldd/lcwiki.nsf/xpDocViewer.xsp?lookupName=IBM+Connections
+Mail+1.0+documentation#action=openDocument&res_title=Preparing_to_install_IBM_Con
nections_Mail_icm1&content=pdcontent)for more details about preparation that you must
take before proceeding to deploy the IBM Connections Mail feature.
Fix Pack 1 (FP1) for IBM Connections Mail V1.0 is a prerequisite of Component Refresh #2
for IBM Connections 4.0 deployments that use the IBM Connections Mail V1.0 feature. Plan
to install this FP1. More details on IBM Connections Mail V1.0 FP1 and its prerequisites, see
IBM Greenhouse - IBM Connections Mail 1.0 FP1
https://greenhouse.lotus.com/plugins/plugincatalog.nsf/assetDetails.xsp?action=edi
tDocument&documentId=31651AAAE1F4913685257A5F00548896.
207
Product Documentation > IBM Connections Mail 1.0 documentation > Deploying IBM
Connections Mail > Preparing to install IBM Connections Mail
(http://www-10.lotus.com/ldd/lcwiki.nsf/xpDocViewer.xsp?lookupName=IBM+Connecti
ons+Mail+1.0+documentation#action=openDocument&res_title=Preparing_to_install_I
BM_Connections_Mail_icm1&content=pdcontent)
3. Restart all Connections servers.
4. Download and extract the IBM Connections Mail installation file.
5. Open IBM Installation Manager from the server on which you are installing Connections
Mail. This server must be running the WebSphere Application Server Deployment
Manager.
6. Select File Preferences, and then select Repositories:
7. From the Repositories panel, select Add Repository, navigate to the directory to which
you saved the IBM Connections Mail files, and select the repository.config file.
8. Click OK until you are returned to the Installation Manager main panel. Click Install.
9. Select IBM Connections Mail, and click Next.
208
10. Read and accept the license agreement, and select Next.
11. Select Create a new package group. Accept the default value for the Installation
Directory field or specify the path to another directory, and click Next. You must remember
this file path for Enabling the discovery service for IBM Connections Mail.
209
4. In the Security role to user/group mapping table, select the check box next to the mail-user
role with Special subjects set to None.
210
211
From
To
socialmail-discovery-con
fig-template.xml
C:\IBM\Connections Mail\
C:\WAS-root\AppServer\profiles\Dmgr0
1\config\cells\cell-name\LotusConnectio
ns-config\socialmail-discovery-config.x
ml
socialmail-discovery-con
fig-template.xml
/opt/IBM/Connections
Mail/
/WAS-root/AppServer/profiles/Dmgr01/c
onfig/cells/cell-name/LotusConnectionsconfig/socialmail-discovery-config.xm
socialmail-discovery-con
fig.xsd
C:\IBM\Connections Mail\
C:\WAS-root\AppServer\profiles\Dmgr0
1\config\cells\cell-name\LotusConnectio
ns-config\socialmail-discovery-config.xs
d
socialmail-discovery-con
fig.xsd
/opt/IBM/Connections
Mail/
/WAS-root/AppServer/profiles/Dmgr01/c
onfig/cells/cell-name/LotusConnectionsconfig/socialmail-discovery-config.xsd
Value
Enter DOMINO
Enter the IP address or fully qualified host name of the Domino
LDAP server that is used to determine the validity of email
addresses and to return users mail setup data.
Example: 9.119.6.07 or serverName.company.com
Optional:
212
Property
Optional:
Value
To specify a mail server that might not be the users primary server,
enter the IP address or fully qualified host name, for example:
9.119.6.08 or https://serverName.company.com
If this server includes a non-default port, the protocol must match
the protocol used to access Connections, for example,
9.119.6.08 or https://serverName.company.com:843
For each domain of email addresses that use this server
configuration, enter a <MailPattern
type=" " /> containing the domain. The domain is the portion of the
email address that follows the @ symbol.
Example: <MailPattern type="example.com"/>
Value
Enter REDIRECT
Enter the URL to an IBM iNotes redirection application.
Example: http://domino2.example.com/dwaredir.nsf or
http://domino2.example.com
If this URL includes a non-default port, the protocol must match the
protocol used to access Connections.
Example: http://domino2.example.com:843
For each domain of email addresses that use this server configuration,
enter a containing the domain.
You can add multiple in the ServerConfig tag.
Example: <MailPattern type="domino2.example.com"/
213
Value
Enter EXCHANGE.
Enter the IP address or fully qualified host name of the Active Directory
LDAP server that is used to determine the validity of email addresses and
to return users mail setup data.
Example: 9.119.6.77 or servername.example.com
Enter the domain for access to the Active Directory Server.
Enter the name of an Exchange user that has read access to the Active
Directory.
Note: Enter only the username. For example, do not include "cn=" or
"domain/".
Enter the password for the Exchange user specified in the DirectoryUser
tag.
Enter the file path and file name to the keystore file that was created in
step 2.
Enter the six-character password that was created in step 2.
Enter the domain qualifier and user name used to authenticate to the
Autodiscovery servers.
Example: SMDEV2010\Administrator
Enter the password used to authenticate to the Autodiscovery servers.
For each domain of email addresses that use this server configuration,
enter a
type=" " /> containing the domain. The domain is the portion of the email
address that follows the @ symbol.
Example:<MailPattern type="example.com"/>
Example:
EXCHANGE
exchange1.example.com
username
adminExpw
exchange1.example.com
c:\example\exchangecertificate
exampleCellManager01/certificateFileAuth
7. (Optional / Recommended): To encrypt user names and passwords in the
socialmail-discovery-config.xml file, follow these steps:
a. Using the Integrated Solutions Console, create aliases for each user name and
password pair that you want to encrypt, by following these steps: Creating the J2C
authentication data entry
214
(http://publib.boulder.ibm.com/infocenter/mpadoc/v7r0m0/index.jsp?topic=%2Fc
om.ibm.websphere.wemp.doc%2Fconfiguring%2Fcreate_j2c_auth_de_t_mssql.html).
b. In the socialmail-discovery-config.xml file, replace the following tags with the new tags
indicated. In the new tags, enter the alias that corresponds to one that you created in
WebSphere Application Server.
Example:
<ServerConfig name="EncrytpedExchange2">
<ConfigType>EXCHANGE</ConfigType>
<DirectoryServer>exchange2.example.com</DirectoryServer>
<DirectoryServerDomain>exchange2.example.com</DirectoryServerDomain>
<DirectoryAuthAlias>exchangeLdapAuth</DirectoryAuthAlias>
<CertificateFile>c:\example\exchangecertificate</CertificateFile>
<CertificateFileAuthAlias>exampleCellManager01/certificateFileAuth</CertificateFileAuthAlias>
<ADDomainAuthAlias>shimcon81CellManager01/addDomainAuth</ADDomainAuthAlias>
<MailPattern type="exchange2.example.com"/>
</ServerConfig>
8. Delete examples from the xml file that do not apply to your environment.
9. Save and close the socialmail-discovery-config.xml file.
10. Synchronize the changes from the deployment manager to the nodes.
4. Next execute this command to work with the configuration of IBM Connections:
215
execfile("connectionsConfig.py")
5. If you are running AIX or Linux, create a temporary directory that allows writing:
mkdir /temp/dir
chmod +w /temp/dir
6. And then use this command to indicate the applications that you want to provide help
information for. Note, application(s) not mentioned will not be included in the IBM
Connections Help:
LCConfigHelp.setHelp("C:/temp","activities","blogs","bookmarks","communities","
files","forums",homepage","profiles","wikis","icmail")
7. Then open a web-browser and access the WebSphere Integrated Console.
8. Goto Applications WebSphere Enterprise Applications.
9. Put a check beside the Help Application & click Stop.
10. Delete the directory that you specified in Step 6. Note, this directory will be recreated as
the application starts.
11. Restart all Connections servers.
12. Open a web browser & login to Connections.
13. Enter the following URL into your browser, where test-user-email is a users email
address:
http://domino1.example.com/resources/discovery/DiscoveryServlet?email=test-user
-email
The following information will be displayed in your web browser if IBM Connections Mail is
configured correctly:
DOMINO domino1.example.com mail/user-email.nsf
http://domino1.example.com/mail/testuser.nsf
216
11
Chapter 11.
11.1 Branding
One of the first targets for any customization is the basic branding of the IBM Connections
user interface. For the most part the white sections should be left alone and the basic layout
of the system should not be customized to ensure future functionality and upgrades work.
However, the top banner and the links it displays is a common candidate for customization.
To change the color scheme and the navigation options in the top banner bar, you change the
header.jsp file, according to the instructions below:
1. Enable customization debugging - see
http://www-10.lotus.com/ldd/lcwiki.nsf/xpDocViewer.xsp?lookupName=IBM+Connectio
ns+4.0+documentation#action=openDocument&res_title=Enabling_and_disabling_custo
mization_debugging_ic40&content=pdcontent.
2. Follow tge instructions at
http://www-10.lotus.com/ldd/lcwiki.nsf/xpDocViewer.xsp?lookupName=IBM+Connectio
ns+4.0+documentation#action=openDocument&res_title=Customizing_the_navigation_b
ar_ic40&content=pdcontent to modify the header.jsp file which contains the navigation
bar.
Copyright IBM Corp. 2013. All rights reserved.
217
218
4.0+documentation#action=openDocument&res_title=Overriding_and_extending_JavaScrip
t_in_IBM_Connections_ic40&content=pdcontent.
Lastly, your organization may wish to change the terminology used in Connections. Some
organizations prefer to call Activities Projects, others want to call wikis Knowledge Bases, and
so on. IBM has documented how to do this at
http://www-10.lotus.com/ldd/lcwiki.nsf/xpDocViewer.xsp?lookupName=IBM+Connections+
4.0+documentation#action=openDocument&res_title=Customizing_product_strings_ic40&c
ontent=pdcontent.
219
11.4 Notification
When installing Connections, an important post-installation configuration step is to ensure
that the email address that is used as the sender address of email notifications complies with
your corporate guidelines. If you do not customize the sender address you will typically
receive emails from news-admin@example.com and other such standardized addresses.
To customize the administrator email addresses used (like news-admin@example.com),
use
http://www-10.lotus.com/ldd/lcwiki.nsf/xpDocViewer.xsp?lookupName=IBM+Connections+
4.0+documentation#action=openDocument&res_title=Defining_valid_administrator_email
_addresses_ic40&content=pdconten.
To customize which notifications end users receive, review
http://www-10.lotus.com/ldd/lcwiki.nsf/xpDocViewer.xsp?lookupName=IBM+Connections+
4.0+documentation#action=openDocument&res_title=Enabling_users_to_specify_email_no
tification_preferences_ic40&content=pdcontent.
The content of the email notifications themselves can also be customized. Doing so is quite a
lengthy process and involves the use of a specialist markup language called Freemarker
(http://freemarker.sourceforge.net/).
To customize the email digests (sent out at scheduled intervals), review
http://www-10.lotus.com/ldd/lcwiki.nsf/xpDocViewer.xsp?lookupName=IBM+Connectio
ns+4.0+documentation#action=openDocument&res_title=Customizing_email_digests_ic
40&content=pdcontent.
To customize the individual email notifications (sent when users choose to notify others
when they create something), review
http://www-10.lotus.com/ldd/lcwiki.nsf/xpDocViewer.xsp?lookupName=IBM+Connectio
ns+4.0+documentation#action=openDocument&res_title=Customizing_standard_notific
ations_ic40&content=pdcontent.
220
221
222
12
Chapter 12.
223
Activities
Wikis
Portlets are available only for IBM Connections V 3.0.1.1 only and these portlets work on IBM
Connections 4.0 server also. These portlets can be downloaded from Greenhouse solutions
catalog and there is no support from IBM. The URL for downloading the portlet is
http://greenhouse.lotus.com
12.2 Sametime
If you have an IBM Sametime proxy server configured in your organization and have the
Profiles application deployed, you can enable presence awareness and simple chats in IBM
Connections.
224
When you enable presence awareness using the Sametime Proxy server, a person's online
status is indicated by a set of icons and an associated status message that is available from
the person's profile and business card. Presence awareness can tell you whether the person
is available to chat, busy in a meeting, or away from their computer. In addition to seeing a
person's availability, you can also chat with that person even when no Sametime client is
installed.
12.2.2 Pre-requisite
Before you start setting up Sametime function, enable single sign-on between the Domino
environment and the IBM Connections server.
12.2.3 Procedure
1. Start the wsadmin client from the following directory of the system on which you installed
the deployment manager:
app_server_root\profiles\dm_profile_root\bin
2. Use the wsadmin client to access and check out the IBM Connections extension
configuration files.
3. Enter the following command to access configuration file
execfile("connectionsConfig.py")
4. Enter the following command to check-out the LotusConnections-config.xml file
LCConfigService.checkOutConfig("working_directory","cell_name")
5. From the directory you specified as the working directory in the previous step, open the
LotusConnections-config.xml file in a text editor, and then find the sametimeProxy service
section.
6. Specify the attributes as per the example below:
<sloc:serviceReference enabled="true" isConnectClient="true"
serviceName="sametimeProxy"
ssl_enabled="true"><sloc:href><sloc:hrefPathPrefix/>
<sloc:static href="http://sametimeproxyserver.enterprise.example.com/"
ssl_href="https://sametimeproxyserver.enterprise.example.com:9444"/>
<sloc:interService
href="https://sametimeproxyserver.enterprise.example.com:9444/>
</sloc:href>
</sloc:serviceReference>
7. Save and close the LotusConnections-config.xml file.
Chapter 12. Integrating with other software
225
12.3 Quickr
Using the IBM Connections Connector for Quickr you can integrate the Communities within
IBM Connections with the Team Space and Files within a Quickr implementation. To find out
more, read
http://www-10.lotus.com/ldd/lcwiki.nsf/xpDocViewer.xsp?lookupName=IBM+Connections+
4.0+documentation#action=openDocument&res_title=Customizing_product_strings_ic40&c
ontent=pdcontent.
You can also integrate file storage within Activities to publish files into Quickr instead of
holding the file in the Activity itself. The result is that the file is published to a Quickr place and
a link placed into the Activity to the file in Quickr, rather than the file residing in two places. For
information on implementing this feature, review
http://www-10.lotus.com/ldd/lcwiki.nsf/xpDocViewer.xsp?lookupName=IBM+Connections+
4.0+documentation#action=openDocument&res_title=Integrating_Activities_with_IBM_Lo
tus_Quickr_ic40&content=pdcontent
For optimum results, you should enable Single Sign-On between the IBM Connections
environment and the Quickr environment. If your Quickr environment is based in IBM Domino,
you must import an LTPA token from the IBM WebSphere Application server running IBM
Connections into the Domino server running Quickr. Full instructions on exporting the LTPA
keys from WebSphere and importing them into Domino can be found at
http://www-10.lotus.com/ldd/lcwiki.nsf/xpDocViewer.xsp?lookupName=IBM+Connections+
4.0+documentation#action=openDocument&res_title=Enabling_single_signon_for_Domino_
ic40&content=pdcontent
12.4 FileNet
IBM FileNet P8 is a reliable, scalable, and highly available enterprise platform that enables
you to capture, store, manage, secure, and process information to increase operational
efficiency and lower total cost of ownership. IBM Connections can be integrated with IBM
FileNet Content Manager using linked library widgets so that documents can be stored in
content repository.
FileNet Services for IBM Quickr is an adaptable web service component that integrates IBM
Connections server and IBM FileNet Content Manager. A Linked Library is a custom IBM
Quickr widget installed on the IBM Connections server and by default it is not enabled.
226
227
helpLink="{helpSvcRef}/topic/com.ibm.lotus.connections.communities.help/c_com_l
ibrary_frame.html" iconUrl="{contextRoot}/nav/common/images/iconFiles16.png"
uniqueInstance="true" displayLoginRequired="true"> <itemSet><item
name="allowCustomServers" value="false"/><item name="allowedHosts" value="
http://<FileNetQuickrServices Host Name>:<port>"/></itemSet></widgetDef>
5. Run the following command to check-in the widget-config.xml:
CommunitiesConfigService.checkInWidgetsConfig("working_directory","cell_name")
6. Run the following command to initialize the general service:
execfile(connectionsConfig.py)
7. Run the following command to check out the proxy-ecm-config.tpl file:
LCConfigService.checkOutProxyEcmConfig("working_directory", cell name)
8. Go to the working directory and modify the proxy-ecm-config.tpl file to allow IBM
Connections server to communicate with FileNet Services for Quickr server:
Before:
<proxy:policy url="http://www.myECMServer.com:8080/*" acf="none"
basic-auth-support="true">
After:
<proxy:policy url="http://<FileNet Services for Quickr>:<port>/*" acf="none"
basic-auth-support="true">
9. Run the following command to check in the proxy-ecm-config.tpl file:
LCConfigService.checkInProxyEcmConfig("working_directory","cell name")
10. Restart the IBM Connections server.
11. Log into IBM Connection server with administrator user ID.
12. Go to Communities tab and select a Community.
13. Select Customize.
14. Add the newly configured linked library widgets to the list.
15. Export the LTPA token from FileNet WebSphere Application server to IBM Connections
WebSphere Application Server. The domain name must be same and share the same
LDAP to enable Single Sign on (SSO) between IBM Connections and IBM FileNet ECM
server.
228
4. Login to the FileNet Services for Quickr application with existing credential or new
credential
5. Library will be retrieved from the FileNet Content Manager repository.
6. User can add files or folder that will be stored in the FileNet Content Manager repository.
7. Log out from the IBM Connections server after completing the task.
12.5 Microsoft
IBM Connections can be integrated into existing SharePoint Document Libraries to provide
Communities with access to the file resources in SharePoint. This might be useful for
organizations who have initially deployed SharePoint for file sharing and now wish to
collaborate better using IBM Connections without abandoning their existing deployment Full
details on implementing the SharePoint connector can be found at
http://www-10.lotus.com/ldd/lcwiki.nsf/xpDocViewer.xsp?lookupName=IBM+Connections+
4.0+documentation#action=openDocument&res_title=IBM_Connections_Widget_for_Microso
ft_SharePoint_ic40&content=pdcontent.
In addition to SharePoint, IBM Connections has a Microsoft Windows Desktop Integration tool
which provides drag and drop access to the Files in IBM Connections to the Windows
desktop. You can download the desktop enabler from the IBM Greenhouse Product Catalog
at
https://greenhouse.lotus.com/plugins/plugincatalog.nsf/assetDetails.xsp?action=edi
tDocument&documentId=8AE593DC335311DE852579C2006D6F66
229
230
13
Chapter 13.
231
User interface (customized CSS, JSP, and HTML; labels and strings)
Header and Footer
Email notification templates
Blog themes
Security role mappings
service-location.xsd
profiles-policy.xml
validation.xml
JavaScript.
IBM Connections Connector for IBM Quickr
Server whitelist for publishing file attachments from Activities to IBM Quickr
232
3. Copy the migration tool in the current environment under /migration directory.
4. Export application data.
Perform full synchronization of all the nodes.
Rename migration directory.
Copy the migration_4.0.0.0_date_time.zip file from the
IBM_Connections_Install/IBMConnections/native directory of the installation media,
where date and time represent the date and time stamps of the file.
Extract the file to the IBM Connections 3.0.1.x installation directory. You should get a
migration directory at the same directory level as the ConfigEngine directory.
Open a command prompt on the version 3.0.1.x system, change to the migration
directory and run the following command depending on your OS:
./migration.sh|bat lc-export.
Back up the migration directory to a location outside your 3.0.1.x deployment.
5. Shut down your 3.0.1.x deployment and uninstall it.
6. Clean up all the nodes.
7. Upgrade database to 4.0.
8. Upgrade Websphere Application Server to 7.0.0.21.
9. Delete local content store and anything related with search in shared content store.
10. Install IBM Connections 4.0.
11. Create a back-up copy of WAS Deployment Manager profile directory.
12. Keep the Deployment Manager running but shut down all the nodes.
13. Copy the exported applications data to the 4.0 environment under /migrations/work.
14. Import application data using:
/migration.sh|bat lc-import -DDMUserid= -DDMPassword=
15. Restart Deployment Manager.
16. Start and sync all nodes and start cluster.
233
9. Run the Deployment Manager but shut down all the nodes.
10. Copy the exported applications data to new system under <IC_Home>/migration/work.
11. Import application data using:
/migration.sh|bat lc-import -DDMUserid= -DDMPassword=.
12. Restart Deployment Manager.
13. Start and sync all the nodes and start cluster.
14. Verify your new setup.
15. Shut down 3.0.1.x deployment.
16. Copy 3.0.1.x content store to 4.0 content store.
17. Perform in- place database upgrade.
18. Modify your JDBC and other parameters accordingly.
234
14
Chapter 14.
234
Here is the login screen for the ISC. The name and password asked for here are the ones that
you use when you originally installed WebSphere, usually "wasadmin" as the login name and
whatever you chose as the password.
If you can not login here, consider if the login you set up also exists in LDAP, in which case,
WebSphere sees it as a duplicate login and it will not work. You must remove the login from
LDAP so it is unique as a WebSphere account.
The ISC menu, after you log in, looks identical for any WebSphere 7.x hosted application.
Therefore, when you learn where to find things, the same rules apply regardless of what
application that you are working with. Here are some key menus within the ISC and what they
do.
Servers
The server menu is where you find the Application servers that are installed into this cell and
details of any WebSphere proxy servers, web servers, and cluster configurations. Under each
menu you can see and manage the running status of the servers.
Applications
The applications menu is where you find any installed J2EE applications, such as each of the
IBM Connections applications that are installed. These menus allow you to review, restart,and
update individual applications.
235
Security
The Global Security menu is where you define the LDAP servers and application security and
configure the single sign-on options.
Troubleshooting
The Logs and trace menus under Troubleshooting are where you can view the log activity for
each server and cluster as well as altering the diagnostic logging level. If you are asked by
support to increase the logging level for a server in order to gather more data, you do so
through the Logs and trace menu.
236
System Administration
The system administration menus give you complete control over all the deployed servers and
the status of their configurations. Managed by the deployment manager of the cell the menus
contain a list of all the network deployed servers, nodes, and node agents. It is through these
menus that changes are manually distributed out from the deployment manager to the nodes
(by synchronizing the nodes). You can also use this section to instruct the Node agents to
restart all their managed servers.
237
Name is the name of the server and this cannot be changed. Name is defined during
installation and this is what you use to identify the server when issue commands. The
server name is case sensitive
The Node is the name of the instance that manages this server. You can see that we have
multiple servers all managed by the same node in our installation. The role of the Node is
to start and stop the servers and ensure the configuration held by the deployment
manager is updated onto the servers. The name of the Node cannot be changed after
installation.
Host Name is the location of the installed server. This is usually a fully qualified host name
derived from the name of the physical or virtual server where the server was created. It is
critical that this host name is resolvable from all servers within the cell. It is possible to
change this host name after install by manually editing some XML files, however, this is
not recommended. Therefore, ensure that your host names are correct before installing.
Version is the WebSphere Application Server version installed for this server. This cannot
be changed but will automatically update if the server is upgraded or patched. Not all
servers have to be running the same version but it is best practice for them to do so.
Cluster Name was defined during the earlier installation of IBM Connections. The Cluster
Name cannot be changed post installation.
Status shows a green arrow if the server is running, a red cross if the server is stopped,
and a question mark in a circle if the node agent for the server is stopped which prevents
the ISC from querying the server status. A question mark also shows if the ISC has
problems reaching the server, usually due to DNS or firewall issues.
From the menus you can select multiple servers and choose to stop, start ,or restart their
instances. These options are only available if the servers node agent is started and the
server is showing either a started(green right arrow) or stopped(red X). The advantage of
starting and stopping the servers from this screen is that multiple servers on different
machines can be managed at once.
Chapter 14. Administering IBM Connections
238
Alternatively, you can view the status of servers, start, and stop them from a command line on
the server itself. To do this, connect to a command line on you system and navigate to the
profile containing the server that you want to work with. All WebSphere Application Server
profiles appear under the AppServer directory, In Windows, this is default to
C:\Program Files\IBM\WebSphere\AppServer\profiles. We do not recommend using the
\program files\ path.
On Linux or AIX , the default is (case sensitive) /opt/IBM/WebSphere/AppServer/profiles .
The directory for the Deployment Manager profile is DMgr01 and for the Application Servers
AppSrv01 . To manage an application server, you d navigate to
/AppSrv01/bin and run the following commands:
startServer.sh (or startServer.bat on Windows)
stopServer.sh (or stopServer.bat on Windows)
serverStatus.sh OR -all (or serverStatus.bat on Windows)
The stopserver and serverstatus commands prompt you for the WebSphere server
credentials each time. If you want to avoid having to enter these continually, you can add them
to the soap.client.props file in the \properties directory under each profile.
239
The general Properties lists options for what to do next. We use two menus:
JVM Logs - where you can view and configure the size and location of the log files
240
Change Log Detail Levels - where you can adjust the level of detail. In most cases the
detail level is set to *=info and this should not be changed unless instructed by IBM under
a support call.
To start with, you can review the logs by going into JVM Logs and choosing the Runtime tab.
Here you see the critical SystemOut.log and SystemErr.log. These two files tell you what the
server is doing and whether any errors are being generated. You can also see the location of
the log files if you wanted to connect directly to the server and retrieve or read the log files
from the file system.
The ISC has a built-in log file view that renders the current logs if you select "View" from the
menu above. The log files are then read in line by line and you can navigate through them.
The important thing to note about WebSphere Application Server log files is that they can
become large and difficult to read through the small built-in viewer and it is usually a better
idea to retrieve the files from the file system for reading.
The layout of a WebSphere Application Server log file is simple to spot any errors as, when
properly aligned, there is a center column showing the status of each message, for example:
I = informational message
W = warning message
E = error message
241
F = fatal message
C = configuration message
To ensure the log files do not grow too large, you can also configure log file sizes for rollover
and historical retention. You do this under the "Configuration: tab:
Log file retention instructs the server to create a new instance of the SystemOut (or
SystemErr) log file when it reaches a certain size or age. The recommendation is to have
these files at least 20 MB in size, depending on how your internal monitoring and backup
systems work. You might change to make the log file rollover time dependent instead.
As each file is rolled over, the new file is created but the historical files are not removed unless
you specifically configure that. In the configuration screen, you can also specify the number of
historical files to retain, in the above example, we have chosen to create log files of 20 MB in
size for SystemOut.log and retain 10 historical instances. We have the same options to set for
242
the SystemErr.logs. Because these are configuration settings, they will not take effect until the
server they are being applied to is restarted.
On the Enterprise Application panel, you can see which applications are successfully started
(right pointing green arrow), stopped (red X), or unavailable (question mark). An application is
shown as unavailable or unknown if the applications host server cannot be queried. In an
IBM Connections installation, the initial server has a DefaultApplication installed. You do not
need this and it can be left not running.
243
You do sometimes needs to go into each application to work with the configuration of the
application itself. This is different from the server configuration that is controlled by
WebSphere. The application configuration is controlled by the designers of the application
itself. An application installed on multiple servers is only listed once and uses the same
configuration on each server where it runs.
If you select a particular application, there are two options that you primarily work with:
Manage Modules - where you tell the application which server it is hosted on and which
web server it is to route traffic to
Security role to use group mapping - this is the application security written by the
application designers.
244
245
Everyone means all users who can access the application, even anonymous ones.
All Authenticated in Applications Realm means all users who can login and be validated
by your defined LDAP servers.
In a Connections environment there are some applications that do not support anonymous
access (such as Profiles or Activities) because the applications functionality is based around
a user being logged in.
246
14.6.1 Databases
Prior to installing the IBM Connections applications, you have to first create the databases for
each application and the installer uses those databases to build the original environment. All
databases must be hosted on the same enterprise database server and must be of the same
type, either DB2, Oracle, or SQL Server.
The following databases are created for each application, we do not recommend attempting
to use different database names than those suggested by the default install. The databases
have self explanatory names with the exception of-:
OPNACT - used by Activities
SNCOMM - used by Communities
247
There are many variables across all the applications that each have their own roles. However,
you can filter the list down to those you are interested in. In the figure below, we have filtered
by *CONTENT_DIR that shows us the defined content directories.
248
There are other variables that define data locations by application and you might want to
review them all (by disabling the filter) if you are looking to document all possible locations.
249
The primary application data is stored on your Enterprise database server and a backup and
data retention policy should be put in place to manage those databases. Although each
application has its own database, in some situations, information is stored outside of the
expected applications. For example, Communities data is stored across multiple applications
such as Forums, Files, and Activities. For this reason, it is not often possible, certainly not
with Communities, to restore a single database in order to roll back your application to a point
in time.
There are tools available from IBM to restore deleted Communities, however, they are difficult
to deploy and cannot restore all data.
It is critical that all IBM Connections servers are stopped before a database restore is
attempted.
250
251
15
Chapter 15.
Performance tuning
In an IBM Connections environment, there are many moving parts, most of which are
dependent on each other. Poor performance or availability of one element can lead to a poor
user experience overall.
The critical elements that can affect IBM Connections functionality are
Database server
Databases
IBM HTTP Server
DNS
LDAP
SMTP
WebSphere servers being able to access the shared data area on an accessible
networked location
The critical elements that can affect IBM Connections performance are
LDAP performance
Database server performance
Database performance
IBM HTTP Server performance and caching
252
database server is going to be brought off-line, this must be coordinated with downtime on the
IBM Connections environment.
The database servers should always be deployed in a high availability configuration to lesson
the risk of system downtime. DB2, SQL Server, and Oracle all have high availability options
and the licensing for IBM Connections includes limited DB2 HADR options.
If you do not have multiple LDAP servers configured on your network to resolve to a single
host name, you can use the federated repository configuration inside the Integrated Solutions
Console to set up multiple failover servers in case your primary server becomes unavailable.
253
One key thing to avoid in LDAP directories is the use of heavily nested groups for assigning
membership or ownership throughout the IBM Connections environment. LDAP lookups
perform particularly slowly against nested groups and that will be reflected in the user
experience.
In any WebSphere environment, all the servers must be able to communicate amongst
each other and they do this using the fully qualified host names for each server that were
in place when the servers were installed.
254
The IBM HTTP Server uses its plugin configuration file that contains the fully qualified host
names of each WebSphere Application Server server to redirect traffic to the correct one
hosting the application being requested.
The WebSphere Application Server servers will attempt to connect to the databases using
the fully qualified host name that they have been given for locating the enterprise database
server.
Authentication onto the IBM Connections environment is done through LDAP and the
LDAP server is found using a DNS lookup of the LDAP host name as defined in the
Deployment Managers configuration.
In any network environment, not every request is looked up every time from the DNS servers
and in fact many requests , especially those on the IHS server, are cached from previous
lookups. However, a poor performing or unavailable DNS will cause the Connections
environment to slow down, start throwing errors, and eventually fail completely.
255
16
Chapter 16.
Troubleshooting IBM
Connections
Troubleshooting the IBM Connections product can appear to be a difficult task when
considering all of the software where the problem could be caused by.
This section is designed to simply the various tasks that you can perform to diagnose the
problem or when working with IBM Software Group Support.
16.1, What can be found in WebSphere Application Server logs on page 256
16.2, How to troubleshoot IBM Connections Applications on page 258
16.3, Adding additional tracing to the logs on page 262
16.4, Gathering information for support on page 264
16.5, Using the IBM SWG Support Portal to upload files to a PMR on page 266
256
The Application prefixes and message level codes are defined in the product documentation
at:
http://www-10.lotus.com/ldd/lcwiki.nsf/xpDocViewer.xsp?lookupName=IBM+Connections+
4.0+documentation#action=openDocument&res_title=IBM_Connections_log_file_ic40&cont
ent=pdcontent)
by go to Product Documentation IBM Connections 4.0 documentation
Troubleshooting and support Troubleshooting checklist Troubleshooting tips
IBM Connections log file.
The description of common error codes generated by the IBM Connections Applications that
contained in the WebSphere Application Server logs are also defined in the product
documentation at:
http://www-10.lotus.com/ldd/lcwiki.nsf/xpDocViewer.xsp?lookupName=IBM+Connections+
4.0+documentation#action=openDocument&res_title=Error_codes_ic40&content=pdcontent
by go to Product Documentation IBM Connections 4.0 documentation
Troubleshooting and support Troubleshooting checklist Troubleshooting tips
Error codes.
The following table shows the default WebSphere Application Server log file locations:
Server type
Operating system
Path
Deployment Manager
(Dmgr01)
Microsoft Windows
C:\IBM\WebSphere\AppServer\profiles\Dmg
r01\logs\dmgr
Application Server
Microsoft Windows
C:\IBM\WebSphere\AppServer\profiles\\logs
\
Node Agent
Microsoft Windows
C:\IBM\WebSphere\AppServer\profiles\\logs
\nodeagent\
Deployment Manager
(Dmgr01)
AIX
/usr/IBM/WebSphere/AppServer/profiles/Dm
gr01/logs/
Application Server
AIX
/usr/IBM/WebSphere/AppServer/profiles//log
s/
Node Agent
AIX
/usr/IBM/WebSphere/AppServer/profiles//log
s/nodeagent/
Deployment Manager
(Dmgr01)
Linux
/opt/IBM/WebSphere/AppServer/profiles/Dm
gr01/logs/
Application Server
Linux
/opt/IBM/WebSphere/AppServer/profiles//log
s/
Node Agent
Linux
/opt/IBM/WebSphere/AppServer/profiles//log
s/nodeagent/
Each log file contains a header of information about the WebSphere Application Server that
generated it. See the following example.
************ Start Display Current Environment ************
WebSphere Platform 7.0.0.21 [ND 7.0.0.21 cf211150.04] running with process name
<cell_name>\<node_name>\<server_name> and process id xxxx (where xxxx are numerical digits)
257
A message whose application prefix, error code, and message level code that can indicates
an IBM Connections Application is starting is the WSVR0200I message. For example:
[09/21/12 9:14:19:397 EST] 0000001d ApplicationMg A
application: Profiles
WSVR0200I: Starting
A message whose application prefix, error code, and message levelcCode that can indicates
an IBM Connections Application has started is the WSVR0221I message. For example:
[09/21/12 9:14:39:427 EST] 0000001d ApplicationMg A
started: Profiles
WSVR0221I: Application
You can use the following troubleshooting steps to narrow the scope of the problem and
identify its cause:
1. Check if the client and server environment are supported.
258
Most common problems are caused by the version or brand of software not-being
supported. It is always an idea to review the IBM Connections system requirements
documents to rule out incompatibility as the cause. For the IBM Connections system
requirements, see Detailed System Requirements for IBM Connections at
http://www-01.ibm.com/support/docview.wss?rs=899&uid=swg27012786.
2. Record the time and date at which the problem was encountered.
This is critical to identifying the problem because the information can be used to correlate
data between software within the IBM Connections topology.
3. Determine whether any error messages are being reported when the problem occurs.
The first place to check is on the device that encountered the problem. For example, if a
problem with an IBM Connections Application was encountered with a web browser, look
for error messages reported either by the web browser itself of the Java console of the
browser. Sometimes the error reported by the device indicates a problem with the device's
configuration, such as not accepting cookies or an untrusted security certificate.
4. Review WebSphere Application Server log files.
After you have determined whether the device which encountered the problem reported
an error, then review the SystemOut.log file(s) generated by the WebSphere Application
Server which hosts the IBM Connections Application that you encountered a problem with.
Use the date and time of the error you recorded in step 2 to narrow the scope of data to
analyze and correlate with the problem encountered. Typically, when an error occurs
within an IBM Connections Application, it is reported with a backtrace of J2EE class
function calls that can help determine what Application reported the exception and
perhaps even what part of it.
For example, let us briefly examine the following exception generated by an IBM
Connections Application. We numbered the line for explanation purpose.
1.[1/18/13 6:54:46:178 CST] 00000096 SeedlistValid W
com.ibm.lotus.connections.search.admin.seedlist.SeedlistValidation
validateSeedlist CLFRW0263I: Seedlist
validation failed. Refer to the log for details.
2.com.ibm.lotus.connections.search.registries.exceptions.CrawlerUnavailableException: CLFRW0313E: Attempt by
crawler registry to retrieve an unconfigured search service files, wikis. Check your LotusConnections-config.xml
file.
3.atcom.ibm.lotus.connections.search.registries.impl.CrawlerRegistryImpl.getCrawler(CrawlerRegistryImpl.java:152)
4.atcom.ibm.lotus.connections.search.admin.seedlist.SeedlistValidation.validateSeedlist(SeedlistValidation.java:5
1)
5.atcom.ibm.lotus.connections.search.service.admin.mbean.SearchService.validateSeedlist(SearchService.java:1144)
6. atsun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
7.atsun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:60)
8.atsun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:37)
9. atjava.lang.reflect.Method.invoke(Method.java:611)
10.atcom.sun.jmx.mbeanserver.StandardMBeanIntrospector.invokeM2(StandardMBeanIntrospector.java:105)
11.atcom.sun.jmx.mbeanserver.StandardMBeanIntrospector.invokeM2(StandardMBeanIntrospector.java:39)
12.atcom.sun.jmx.mbeanserver.MBeanIntrospector.invokeM(MBeanIntrospector.java:220)
13.atcom.sun.jmx.mbeanserver.PerInterface.invoke(PerInterface.java:132)
14.atcom.sun.jmx.mbeanserver.MBeanSupport.invoke(MBeanSupport.java:274)
15.atcom.sun.jmx.interceptor.DefaultMBeanServerInterceptor.invoke(DefaultMBeanServerInterceptor.java:848)
16.atcom.sun.jmx.mbeanserver.JmxMBeanServer.invoke(JmxMBeanServer.java:773)
17.atcom.ibm.ws.management.AdminServiceImpl$1.run(AdminServiceImpl.java:1331)
18.atcom.ibm.ws.security.util.AccessController.doPrivileged(AccessController.java:118)
19.atcom.ibm.ws.management.AdminServiceImpl.invoke(AdminServiceImpl.java:1224)
20.atcom.ibm.ws.management.connector.AdminServiceDelegator.invoke(AdminServiceDelegator.java:181)
21.at com.ibm.ws.management.connector.ipc.CallRouter.route(CallRouter.java:242)
22.atcom.ibm.ws.management.connector.ipc.IPCConnectorInboundLink.doWork(IPCConnectorInboundLink.java:353)
23.atcom.ibm.ws.management.connector.ipc.IPCConnectorInboundLink$IPCConnectorReadCallback.complete(IPCConnectorIn
boundLink.java:595)
24.atcom.ibm.ws.ssl.channel.impl.SSLReadServiceContext$SSLReadCompletedCallback.complete(SSLReadServiceContext.ja
va:1784)
25.atcom.ibm.ws.tcp.channel.impl.AioReadCompletionListener.futureCompleted(AioReadCompletionListener.java:165)
26.atcom.ibm.io.async.AbstractAsyncFuture.invokeCallback(AbstractAsyncFuture.java:217)
27.atcom.ibm.io.async.AsyncChannelFuture.fireCompletionActions(AsyncChannelFuture.java:161)
28.atcom.ibm.io.async.AsyncFuture.completed(AsyncFuture.java:138)
29.atcom.ibm.io.async.ResultHandler.complete(ResultHandler.java:204)
30.atcom.ibm.io.async.ResultHandler.runEventProcessingLoop(ResultHandler.java:775)
31.at com.ibm.io.async.ResultHandler$2.run(ResultHandler.java:905)
32.at com.ibm.ws.util.ThreadPool$Worker.run(ThreadPool.java:1604)
259
Line1: Contains the Application prefix of an exception reported by the IBM Connections
Search Application and its description.
Line 2: Contains another class-function call that reported an exception which caused the
Seedlist validation to fail reported in Line 1. It also provides a suggestion to resolve the
problem. Although it does not point out the exact problem, the details collected thus far
can be a rather powerful suggestion. For example, the search services defined in the
LotusConnections-config.xml file of the WebSphere Application Server that generated this
exception appears to contain a syntax-related problem with this string of characters: files,
wikis
Line 3: Contains the class-function call that led to the exception generated in Line 2 which
caused the exception generated in Line 1.
Here is an exception example that is related to an IBM Connections Application, but was
not generated by an IBM Connections Application.
1.09/15/12 16:17:28:290 EST] 00000095 IndexReplicat W
Places index replication failed
2.com.ibm.lotus.search.replication.ReplicationException: java.io.FileNotFoundException:
/opt/ibm/Connections/data/local/catalog/index/Places/tmpDeltaIndex/taxonomyIndex/_0.fnm (No such file or
directory)
3.at com.ibm.lotus.search.replication.IndexUpdater.addIndex(IndexUpdater.java:238)
4.atcom.ibm.lotus.search.replication.IndexUpdater.updateIndex(IndexUpdater.java:142)
5.atcom.ibm.lotus.search.engine.IndexReplicationService.replicate(IndexReplicationService.java:93)
6.atcom.ibm.lotus.search.engine.messaging.CollectionCommittedMessage.handle(CollectionCommittedMessage.java:54)
7.atcom.ibm.lotus.search.engine.messaging.AdminTopicMessageDrivenBean.onMessage(AdminTopicMessageDrivenBean.java:
70)
8.atcom.ibm.ejs.container.MessageEndpointHandler.invokeMdbMethod(MessageEndpointHandler.java:1093)
9.atcom.ibm.ejs.container.MessageEndpointHandler.invoke(MessageEndpointHandler.java:778)
10.at $Proxy134.onMessage(Unknown Source)
11.atcom.ibm.ws.sib.api.jmsra.impl.JmsJcaEndpointInvokerImpl.invokeEndpoint(JmsJcaEndpointInvokerImpl.java:192)
12.atcom.ibm.ws.sib.ra.inbound.impl.SibRaDispatcher.dispatch(SibRaDispatcher.java:900)
13.atcom.ibm.ws.sib.ra.inbound.impl.SibRaSingleProcessListener$SibRaWork.run(SibRaSingleProcessListener.java:552)
14.at com.ibm.ejs.j2c.work.WorkProxy.run(WorkProxy.java:399)
15.at com.ibm.ws.util.ThreadPool$Worker.run(ThreadPool.java:1604)
16.Caused by: java.io.FileNotFoundException:
/opt/IBM/Connections/data/local/catalog/index/Places/tmpDeltaIndex/taxonomyIndex/_0.fnm (No such file or
directory)
17.at java.io.RandomAccessFile.open(Native Method)
18.at java.io.RandomAccessFile.<init>(RandomAccessFile.java:229)
19.atorg.apache.lucene.store.SimpleFSDirectory$SimpleFSIndexInput$Descriptor.<init>(SimpleFSDirectory.java:69)
20.atorg.apache.lucene.store.SimpleFSDirectory$SimpleFSIndexInput.<init>(SimpleFSDirectory.java:90)
21.atorg.apache.lucene.store.NIOFSDirectory$NIOFSIndexInput.<init>(NIOFSDirectory.java:91)
22.at org.apache.lucene.store.NIOFSDirectory.openInput(NIOFSDirectory.java:78)
23.at org.apache.lucene.store.FSDirectory.openInput(FSDirectory.java:353)
24.at org.apache.lucene.index.FieldInfos.<init>(FieldInfos.java:68)
25.atorg.apache.lucene.index.SegmentReader$CoreReaders.<init>(SegmentReader.java:118)
26.at org.apache.lucene.index.SegmentReader.get(SegmentReader.java:578)
27.at org.apache.lucene.index.SegmentReader.get(SegmentReader.java:556)
28.at org.apache.lucene.index.DirectoryReader.<init>(DirectoryReader.java:113)
29.atorg.apache.lucene.index.ReadOnlyDirectoryReader.<init>(ReadOnlyDirectoryReader.java:29)
30.at org.apache.lucene.index.DirectoryReader$1.doBody(DirectoryReader.java:81)
31.atorg.apache.lucene.index.SegmentInfos$FindSegmentsFile.run(SegmentInfos.java:736)
32.at org.apache.lucene.index.DirectoryReader.open(DirectoryReader.java:75)
33.at org.apache.lucene.index.IndexReader.open(IndexReader.java:428)
34.at org.apache.lucene.index.IndexReader.open(IndexReader.java:274)
35.atcom.ibm.ilel.facet.taxonomy.lucene.LuceneTaxonomyWriter.addTaxonomies(LuceneTaxonomyWriter.java:749)
36.atcom.ibm.lotus.search.replication.IndexUpdater.addIndex(IndexUpdater.java:202)
Line 1: This only lists the date/time, the number of the thread which generated it, the name
of the service, the Message-level code, and then a description of the Exception.
Line 2: This lists the class-function call which reported the exception and a brief
description of the issue. Again, although it-is brief, it does offer a powerful amount of
information that can be used to further investigate the cause of the problem.
Line 3: This lists the class-function call which led to the exception reported in Line 2.
5. Review Troubleshooting tips document.
After you have identified whether any exceptions or error codes are being reported in the
SystemOut.log of the WebSphere Application hosting the IBM Connections Application
where the problem occurred within, the next step is to review the issues listed in the
Chapter 16. Troubleshooting IBM Connections
260
Troubleshooting tips section of the Product Documentation to see if the problem you are
having is addressed at:
Product Documentation > IBM Connections 4.0 documentation > Troubleshooting and
support > Troubleshooting checklist > Troubleshooting tips
http://www-10.lotus.com/ldd/lcwiki.nsf/xpDocViewer.xsp?lookupName=IBM+Connectio
ns+4.0+documentation#action=openDocument&res_title=Troubleshooting_tips_ic40&co
ntent=pdcontent
6. Check if you have the latest product fixes installed.
Fixes for IBM Connections are packaged in several different ways. The difference between
the packages are the number of fixes included and the amount of testing which the fixes
underwent before making publically available:
Fix Packs:
Fix Packs contain a substantial amount of fixes for problems that were frequently reported
or identified to have a high-impact. These also contain the most amount of fixes in a single
package. Although they undergo a significant amount of testing, these are not released as
often as Component Refreshes. And sometimes new features are also featured in Fix
Packs, though not often.
Component Refreshes:
Component Refreshes (CRs) also contain multiple fixes for problems that were frequently
reported or identified to have a high-impact. Although they do not usually contain as many
fixes as a Fix Pack, they do however undergo a significant amount of testing. These are
released much more frequently than a Fix Pack.
iFixes
An iFix is a single fix associated with an IBM Authorized Problem Analysis Report (APAR).
These are delivered to address a specific problem, as opposed to CRs & FPs which are to
address a variety of problems.
Note: For Information about obtaining fixes for the IBM Connections product, see Fix
lists for IBM Connections
http://www-01.ibm.com/support/docview.wss?uid=swg27019738
7. Search IBM Knowledge Bases for a related problem report
If you have the latest product fixes installed, then proceed to search the IBM Knowledge
Bases for a related problem report at IBM Connections 4.0 Known Issues
http://www-01.ibm.com/support/search.wss?rs=3265&tc=SSYGQH&atrn=SWVersion&atrv=
4.0.
8. Report problem to IBM Support.
If you are not able to locate a report of the same or similar problem, begin to collect
diagnostic data to send to IBM Support. The data required by IBM Software Group to
begin troubleshooting your issue can be identified within one of the following MustGather
TechNotes for each IBM Connections Application.
261
Note: The new MustGathers are published often, so be sure to utilize your favorite
search-engine if you are not able to locate one for the IBM Connections Application you
are having a problem with in this list:Collecting Data:
IBM Connections 4.0 Activities
http://www.ibm.com/support/docview.wss?uid=swg21608844
Collecting Data: IBM Connections 4.0 Blogs
http://www.ibm.com/support/docview.wss?uid=swg21608485
Collecting Data: IBM Connections Bookmarks 4.0
http://www.ibm.com/support/docview.wss?uid=swg21609614
Collecting data: IBM Connections 4.0 Cognos and Metrics
http://www.ibm.com/support/docview.wss?uid=swg21610705
Collecting Data: IBM Connections 4.0 Communities
http://www.ibm.com/support/docview.wss?uid=swg21610336
Collecting Data: IBM Connections 4.0 Forums
http://www.ibm.com/support/docview.wss?uid=swg21609775
Collecting data: IBM Connections 4.0 Cognos and Metrics
http://www.ibm.com/support/docview.wss?uid=swg21610705
Collecting Data: IBM Connections 4.0 Mail 1.0
http://www.ibm.com/support/docview.wss?uid=swg21614358
Collecting Data: IBM Connections 4.0 Installation and Migration
http://www.ibm.com/support/docview.wss?uid=swg21609917
Collecting Data: IBM Connections 4.0 Profiles
http://www.ibm.com/support/docview.wss?uid=swg21610506
9. Contact IBM Software Group
Contact IBM Software Group either through 1-800-IBM-SERV or an Electronic Service
Request (ESR) through the IBM Support Portal to report the problem at:
IBM Software Group - Service requests & PMRs
http://www.ibm.com/support/electronic/uprtransition.wss?category=2.
If you choose to open the PMR using telephone, you can submit the data for analysis once
you are issued a PMR number. And there are several ways of submitting data to IBM (FTP,
Email, or Web-browser) that are described in this TechNote at:
Using ECuRep to exchange information with IBM Technical Support for Lotus software
http://www.ibm.com/support/docview.wss?uid=swg21138787
262
Note: Your environment might have been configured use a port other than the default
listed below: https://:9043/ibm/console/logon.jsp
3. Enter the user name and password of the WebSphere Application Server Administrator.
Click Submit.
4. One the Welcome page of the WebSphere Integrated Solutions Console (ISC), the left is a
navigation pane whose contents displays on the right:
5. Go to Troubleshooting Logs and trace and select the server on which you want to
enable the trace options.
6. Go to Change log detail levels.
If the problem you are having occurs when the WebSphere Application Server itself was
starting up, click the Configuration tab, otherwise, click the Runtime tab.
263
7. Copy and paste the trace options specified in the MustGather TechNote or by IBM SWG
Support, click Apply and then OK.
8. If you pasted trace-options into the Configuration tab, you must then restart the
WebSphere Application Server on which the trace options were enabled. The runtime
trace options take effect immediately.
9. After you complete generating the data with the trace options, revisit the Change log detail
levels page for the same WebSphere Application Server and change them back to the
default of *=info.
264
3. You might be prompted to install a security certificate from the Fiddler client. This is
required to decrypt HTTPS traffic sent and received by your web browser.
4. Close and restart the Fiddler client for the changes to take effect.
5. Now you are ready to capture a Fiddler trace while reproducing a problem with a web
browser and an IBM Connections problem.
When instructed either by a MustGather TechNote or IBM SWG Support to collect and submit
a Fiddler trace of the reported problem, use this procedure:
1. Close all programs that contain an HTTP client on your Workstation.
2. Open a single web browser with a single tab.
3. Open the Fiddler client.
4. Press F12 on your keyboard to begin capturing HTTP/HTTPS traffic with the Fiddler client.
5. Reproduce the problem you are having.
6. After you have reproduced the problem, switch back to the Fiddler client and press F12
again to stop capturing traffic.
265
266
7. A pop-up window containing a summary of the information and data you want to send IBM
appears. You also have the option to specify how you want to be contacted. Click Submit.
8. After files upload completes, a page stating whether the update was successful will
appear. Unless an error occurred, this is the last step in the process.
267
Appendix A.
IBM Greenhouse
IBM launched the IBM Greenhouse
(https://greenhouse.lotus.com/wpsgh/wcm/connect/ghcontent/lotus+greenhouse+next+si
te/home/lgh+next+homepage+)to show off and allow users to try at no charge IBM
Collaboration Solutions software without the requirement of deploying it in their own
environments. Included in the IBM Greenhouse are the following software products:
IBM Connections
IBM Sametime
IBM Mashup Center
IBM Websphere Portal
IBM Quickr for Domino
IBM Quickr for Websphere Portal
IBM Forms Builder Experience
IBM Symphony
IBM Notes Traveler
IBM iNotes Social Edition
IBM Lotus Designer
IBM Docs
IBM encourages everyone to create a public
account(https://greenhouse.lotus.com/gh_next/lotusgreenhouserequests.nsf/MainDocum
entSelf?openForm) that then also grants you access to the IBM Collaboration Software
Solutions Catalog. The catalog is a collection of free and downloadable widgets, plugins, and
more for your own environment. All of the catalog is searchable.
Also found inside IBM Greenhouse is the IBM Greenhouse Labs
(https://greenhouse.lotus.com/wpsgh/wcm/connect/ghcontent/lotus+greenhouse+next+si
te/home/labs/lgh+next+labs?pageDesign=ghdesign/LGH+Next+PT+Labs+-+GH+Anon). The
labs allowing trying out alpha code to help build future product directions. Many of these are
simply ideas while some become integrated or their own products in the future. IBM
Symphony through the web is an example because it was known as Concord during IBM
Greenhouse Labs testing. These products are added and evolve consistently so visit the IBM
Greenhouse Labs site
(https://greenhouse.lotus.com/wpsgh/wcm/connect/ghcontent/lotus+greenhouse+next+si
268
te/home/labs/lgh+next+labs?pageDesign=ghdesign/LGH+Next+PT+Labs+-+GH+Anon)for
current projects.
269
The following figure shows a sample image of the search area the IBM Greenhouse
Collaborations Solution Catalog.
Solution Area:
There are over 20 solution areas available to search against from B2B Integration to
Unified Communications.
Product:
The products search covers many of the products found in the IBM Greenhouse. While not
every product has had a solution entered into the catalog, make sure to search the entire
catalog for results to make sure you find them by tag or text in case they were not
categorized appropriately.
Industry:
From banking to telecommunications, the searches allow you to sort industry specific
solutions from the catalog.
Text:
You can enter any text into this box to help you narrow your results. Boolean type
searching (such as using a minus sign to discard results) is not allowed.
Tags:
Each entry in the Solutions Catalog is tagged to help you do a simple search or use the
provided slider to narrow the results.
270
3. License Agreement:
The license agreement is from the widget creator, usually an IBM Business Partner. The
license agreement is to protect the creator of the free utility and notify you of any licensing
requirements for usage. While most of the catalog solutions are free, some are for
personal use and not meant to deploy to everyone in the enterprise without a purchased
license. Make sure to read each one before continuing.
4. Download option:
Some of the solutions in the catalog might be a template or portlet, while others allow you
to deploy it immediately into the IBM Notes client with a simple drag and drop (depending
on your security policies) as the figure shown below.
271
272
273
Appendix B.
What is customizable?
Creating and using custom functions to manipulate data
Creating custom mapping
Setting up Tivoli Directory Integrator properties files
274
The most common source of user data is the LDAP directory, to load data from the enterprise
LDAP directory to Profiles database, you can use IBM Tivoli Directory Integrator (TDI) and
IBM Connections TDI Solutions Package.
276
Time Zone
New York
America/New_York
London
Europe/London
Bangalore
Asia/Kolkata
So Paulo
America/Sao_Paulo
277
278
Primary Key
Null Value
Description
PROF_KEY
profile key
PROF_PROPERTY_ID
PROF_NAME
PROF_DATA_TYPE
PROF_VALUE
Profiles adds extension attributes by inserting rows in this table. The following figure shows an
example of the extension attribute rows in the PROFILE_EXTENSIONS table.
279
3. Run wsadmin:
AIX/Linux: # ./wsadmin.sh -lang jython -user wasadmin -password <your
password>
Microsoft Windows: > wsadmin.bat -lang jython -user wasadmin -password
4. Load Profiles administration scripts:
wsadmin> execfile("profilesAdmin.py")
5. Check out files:
AIX/Linux: wsadmin
>ProfilesConfigService.checkOutConfig("/root/temp",AdminControl.getCell())
Microsoft Windows: wsadmin
>ProfilesConfigService.checkOutConfig("c:/prof/temp",AdminControl.getCell())
6. Edit the profiles-config.xml file using a text editor to add elements. The follow is our
example. We define the extension attribute by adding the following code to the element
under :
<simpleAttribute extensionId="division" length="64" />
<simpleAttribute extensionId="twitterid" length="64" />
<simpleAttribute extensionId="org_nr" length="64" />
7. To display the extension attribute., add child element under the element.
In our example, we specify the values for bundleIdRef and labelKey to be used with our
custom Label files. The following table shows the XML attributes associated with
extensionAttribute.
280
wsadmin> exit
282
3. Running the scripts in IBM Connections TDI Solution directory to populate or synchronize
the profile data:
If this is initial population,use populate_from_dn_file script, as follow:
AIX/Linux:
# chmod +x populate_from_dn_file.sh
# ./populate_from_dn_file.sh
Microsoft Windows:
> populate_from_dn_file.bat
If your data is already loaded, use sync_all_dns script to synchronize data:
AIX/Linux:
# chmod +x sync_all_dns.sh
# ./sync_all_dns.sh
Microsoft Windows:
> sync_all_dns.bat
283
284
285
Appendix C.
286
3. Search the product you need using the part-numbers or product names:
287
4. Expand the corresponding sections to locate the correct image. Select I Agree and click
Download to begin downloading the software:.
The following website contains demonstrations about how to access and download software
from IBM Passport Advantage:
IBM Passport Advantage Login: Online Access Guide:
http://www.youtube.com/watch?v=9pYOfSad5p0
IBM Passport Advantage: Downloading Products from Passport Advantage:
http://www.youtube.com/watch?v=HuatqV8jpu4
288
289
Back cover
Produced in
collaboration with:
INTERNATIONAL
TECHNICAL
SUPPORT
ORGANIZATION
BUILDING TECHNICAL
INFORMATION BASED ON
PRACTICAL EXPERIENCE
IBM Redbooks are developed
by the IBM International
Technical Support
Organization. Experts from
IBM, Customers and Partners
from around the world create
timely technical information
based on realistic scenarios.
Specific recommendations
are provided to help you
implement IT solutions more
effectively in your
environment.
Content in this document was produced in collaboration with IBM Collaboration Solutions and IBM Redbooks