in-Step for Administrators Manual

Manual
in-Step
®
for
Administrators
Manual
Copyright
This document is protected by copyright. No part of this document may be reproduced
or transmitted in any form or by any means, electronic or mechanical, including translating, photocopying, recording, or information storage and retrieval systems, without the
express written permission of microTOOL GmbH.
© microTOOL GmbH. Berlin 2007-2012. All rights reserved.
in‑Step and microTOOL making IT better are registered trademarks of microTOOL GmbH.
Microsoft and Windows are registered trademarks of the Microsoft Corporation. Oracle is
a registered trademark of the Oracle Corporation.
in-Step uses Apache Lucene .NET for the full text search with Oracle.
Apache Lucene is protected by copyright, © 2006 The Apache Software Foundation
(http://www.apache.org/). Apache Lucene is released under Apache License Version
2.0.
The reproduction of trade names, product names, trademarks, etc., in this handbook
does not entitle their free use, in the sense of trademark acts, even if they are not specially marked as such.
Issued: January 2012
2
in-Step
®
Contents
The Administrator Manual –
Configuring in-Step for Working
on a LAN
Contents
Here’s How to Control Projects on a LAN or the Internet
with in-Step
Page 5
How to install in-Step
Page 5
Installing in-Step with a Control File
Page 5
Standard Installation
Page 10
Setting Up a Program to Run Every Time You Start in-Step
Page 10
How to License in-Step
Page 10
Workstation License with a License Key
Page 10
Workstation License with a Hardlock
Page 11
Floating License
Page 11
Activating in-Step without an Internet Connection
Page 12
Installing a Local Hardlock Page 12
Manually Configuring the License Server
Page 13
Using a Client Access License
Page 16
Automatic Software Update of in-Step (Clients)
Page 17
Setting up the Update Path for the Automatic
Software Update
Page 18
Controlling the Updating Process
Page 18
Automatic Uninstall
Page 20
in‑Step and Oracle
Page 22
System Requirements
Page 22
A Few Notes on Configuring Oracle
Page 22
How to Configure in-Step Server
Distributing Rights for in-Step Server Services
How an in-Step System is Represented in the File System
Use Rights in the File System
Page 23
Page 36
Page 37
Page 37
3
in-Step
®
Contents
The Administrator Manual –
Configuring in-Step for Working
on a LAN
How in-Step and Oracle Work Together
Page 38
Featuring in‑Step Systems under Oracle
Page 38
Upgrading older Systems (Version 3.6 And Earlier)
Page 38
Creating Systems
Page 38
Creating and Restoring Backups
Page 39
Tip for Configuring: Performance Improvement
by Changing the Oracle Start Parameter
Page 42
Tip for Configuring: Increase Maximum Number of
Sessions/Processes
Page 43
Making in-Step available online
Page 44
How to Check an in‑Step System
Page 44
How to Create a Backup
Page 45
Restoring a System
Page 47
Upgrading Systems
Page 47
Converting to a New Version
Page 48
License Configuration with the ASP Frontend
Page 49
More Settings
Page 50
Support
Page 51
4
Administrator Manual
Here’s How to Control Projects on a LAN or the Internet with in-Step
With in‑Step, projects can be controlled just as safely in distributed projects via the Internet as in your company’s
LAN. To work locally or in your LAN, all you need is in‑Step (clients) installed on local workstations. For LAN operation, the clients work on a common system located on a file server. This system may be edited in multi-user mode.
If you would like to configure in‑Step for different locations, you will need in‑Step Server together with as many
in‑Step clients as you’d like. in‑Step Server is a separate product which makes in‑Step systems visible worldwide and
manages them centrally via TCP/IP. The systems made available can be simultaneously edited in multi-user mode
from different locations in the Internet.
How to install in-Step
You can install in‑Step the standard way or by using a control file. Before you begin installing in‑Step, please read the
following sections in order to decide which type of installation is right for you. In addition, you will find a description of what you need to do if you want a program to run automatically every time you start in‑Step.
Installing in-Step with a Control File
Before beginning with in‑Step’s installation, you will want consider the following: you can use a control file to install
in‑Step clients. For example, this file enables you to set the port for the internet connection to the in‑Step Server, or
the path to where to automatically search for newer versions of in‑Step. Using a control file is thus recommended
whenever you install in‑Step clients on to multiple workstations in a LAN. Like this, you don’t have to configure
every in‑Step client at every workstation manually. You also ensure that in‑Step is configured the same way at each
workstation.
Here you can see an example of a control file:
BATCH=1
PATH=file://\\products\microtool\in-Step\
CHECKVERSION=2
PORT=64711
LANGUAGE=B
LICENCE=B
MAINDIR=C:\Program Files\in-Step
A control file always begins with BATCH=1. Under PATH, the path is specified where in‑Step will check for software
updates.
Furthermore, you can use the following variables – default standards are used if they are not set in the control file.
BATCH
This value is used by the in‑Step installation to identify the applicable control file. The value must be 1
BATCH=1
5
Administrator Manual
MAINDIR
This value is used to determine in which directory in‑Step should be installed. <Program Path>\microTOOL\
in-Step is set as the default.
MAINDIR=C:\Program Files\microTOOL\in-Step
SYSTEMSDIR
This value is used to determine in which directory the sample systems should be installed. C:\in-Step Systems
is set as the default.
SYSTEMSDIR=C:\in-Step Systems
PATH
This value is used to determine the path in‑Step should search for new versions. Read more about this in the paragraph „Automatic Software Update of in-Step (Clients)“.
PATH=file://\\products\microtool\in-Step\
CHECKVERSION
This value is used to determine if and how the automatic software update should be set. If the automatic software
update is activated, you have to use the variable PATH.
Possible values:
1 in‑Step searches for new updates at the first start up of the day.
2 in‑Step searches for new updates with each new start
0 in‑Step never searches for updates
CHECKVERSION=1
PORT
This value determines the default port in‑Step uses to communicate with the in‑Step Server. Unless you enter something else, in‑Step will use the port 64711.
PORT=59152
LANGUAGE
This value determines in which language in‑Step should be installed.
Possible values:
A German (default)
B English
LANGUAGE=B
LICENSE
This value requires that you enter the type of licensing. As long as you are generally working with the systems via
the in‑Step Server, you can ignore this value.
Possible values:
A = Desktop license (default)
B = Floating license
LICENSE=A
6
Administrator Manual
GROUP
This value determines the name of the program group where in‑Step is to be stored.
GROUP=in-Step CoreProcess Edition
DISABLEOPLOCK
This value is used to determine whether or not opportunistic locking should be disabled on the client. By default,
opportunistic looking is enabled by Windows. Opportunistic locking increases performance for multi user operations due to the fact that writing accesses are cached locally. During the default installation of in‑Step, opportunistic
locking is disabled. The data will otherwise be cached and rewritten from server to client at any given point. Due
to the fact that this process can’t be controlled by in‑Step, we explicitly recommend that you disable opportunistic
locking on the server used to save your in‑Step systems if you haven’t already disabled it on the client.
You can find more information about this: http://support.microsoft.com/kb/296264/en
Please note that any changes to this setting may decrease the performance of other operations if you’re not working on the in‑Step Server.
If opportunistic locking is disabled and has never before been disabled, you’ll need to restart your system after the
installation.
Possible values:
1 Opportunistic locking is deactivated
0 The current setting for opportunistic locking has not been changed.
DISABLEOPLOCK=0
SILENT_LOGON
This value is used to determine if an automatic login should be used for the most recently opened system when
starting up in‑Step. For this you also have to set the values for LASTSERVER and LASTSYSTEM.
Please note that the user’s Windows account is used here to login. The user must therefore be able to login to
LASTSYSTEM using their Windows account.
If the most recently opened system was opened exclusively, an automatic login is not possible and the login dialog
will pop up. If there’s a login error, the login dialog will always be shown.
Possible values:
0 There is no automatic login
1 There is always an automatic login for the most recently opened or specified system.
SILENT_LOGON=0
Note: If the login dialog should reappear, press Shift while starting up in‑Step.
LASTSERVER
This value is used to enter the IP address or name of the server you installed the in‑Step Server on. If you use this
value, also include LASTSYSTEM.
LASTSERVER=130.94.122.195
LASTSERVER=SERVERNAME
7
Administrator Manual
LASTSYSTEM
This value is used to determine the most recently opened system. If the system is published by the in‑Step Server,
enter the respective name of the system. Otherwise use the isf file path.
LASTSYSTEM=MySystem
LASTSYSTEM=C:\in-Step Systems\MySystem.isf
SHOWPRODUCTACTIVATION
This value is used to determine whether or not an activation dialog should be provided at the first start up of
in‑Step. Deactivation of the dialog is recommended if the client doesn’t have access to the internet or if you are
using a floating or client access license. If the workstation license is being accessed with a license key, the dialog
should not be deactivated. The license is activated by this dialog.
Possible values:
0 The activation dialog will not be opened.
1 The activation dialog will be opened (default).
SHOWPRODUCTACTIVATION=0
INSTALL_PROCESSTEMPLATES
This value is used to determine whether or not the included templates for organizational units and projects should
be installed.
Possible values:
0 The templates will not be installed.
1 The templates will be installed.
INSTALL_PROCESSTEMPLATES=0
INSTALL_TUTORIALS
This value is used to determine whether or not the included sample systems and tutorials should be installed.
Possible values:
0 Sample systems and tutorials will not be installed.
1 Sample systems and tutorials will be installed.
INSTALL_TUTORIALS=0
INSTALL_OFFICETEMPLATES_FIRSTUSE
This value is used to determine whether or not MS Office Integration should be installed at the first start up of
in‑Step.
Possible values:
0 MS Office Integration will not be installed
1 MS Office Integration will always be installed (without asking the user).
Note: If you don’t select this option, in‑Step will automatically ask at the first start up.
INSTALL_OFFICETEMPLATES_FIRSTUSE=0
8
Administrator Manual
EMAIL_AUTH_NAME, EMAIL_AUTH_PASSWORD, EMAIL_OUTSERVER,
EMAIL_SENDER_ADDRESS, EMAIL_SENDER_NAME
This value is used to determine the e-mail settings. If you’re working on the in‑Step Server, you don’t enter the
value on the client. In this case only the server’s settings will be used.
EMAIL_AUTH_NAME=Peter Lichtenstein
EMAIL_AUTH_PASSWORD=abc123
EMAIL_OUTSERVER=mail.eSystem.eu
EMAIL_SENDER_ADDRESS=p.lichtenstein@eSystem.eu
EMAIL_SENDER_NAME=P. Lichtenstein
CMDIALOGS_SHOWADD, CMDIALOGS_SHOWGET, CMDIALOGS_SHOWCHECKOUT, CMDIALOGS_SHOWCHECKIN, CMDIALOGS_SHOWUNDOCHECKOUT
This value is used to show the dialogs for “Add”, “Check out”, “Get “, “Checkin” or “Undo check out” as default. This is carried out using the value 0.
CMDIALOGS_SHOWADD=0
CMDIALOGS_SHOWGET=0
CMDIALOGS_SHOWCHECKOUT=0
CMDIALOGS_SHOWCHECKIN=0
CMDIALOGS_SHOWUNDOCHECKOUT=0
OFINSIDE_INSTALL
This value is used to determine whether or not you would like to install objectiF inside for requirements modeling in in‑Step. .NET Framework 2.0 is required for the graphical requirements modeling with objectiF inside. If
.NET Framework 2.0 is not installed, the setting 1 will be ignored. If you are using a product version of objectiF, this
value should always be set to 0.
Possible values:
0 objectiF inside will not be installed
1 objectiF inside will be installed (default).
OFINSIDE_INSTALL=0
OFINSIDE_MAINDIR
If you’ve activated the installation of objectiF inside with OFINSIDE_INSTALL, you use this value to determine in
which directory objectiF inside should be installed. You can also do this relative to in‑Step’s installation folder. For
example: OFINSIDE_MAINDIR=%MAINDIR%\objectiF inside.
OFINSIDE_MAINDIR=C:\Programme\objectiF inside
Give the control file the extension.ini and copy it into the same directory as the in‑Step setup file. Then, create a
shortcut to the setup file in the same directory and enter the parameters /S /M together with the name of the control file in the shortcut’s properties in the field Target. For example, INSTEP-COREPROCESSEDITION-SETUP.
exe /S /M=inStep.ini. All you have to do then is double click the shortcut in order to install in‑Step using the
control file.
When updating the software, the control file is automatically transferred to the setup, if the directory with the
setup file contains such a shortcut or an individual control file.
9
Administrator Manual
Standard Installation
Installing in‑Step without using a control file works like this: insert the in‑Step CD-ROM into the CD-ROM drive and
the setup program starts automatically. Simply follow the instructions, which appear on your screen.
To call the setup program directly, select Run in the Windows start menu and enter D:\INSTEP-[EDITION]SETUP or – if you are installing in‑Step Server – D:\INSTEP-SERVER-SETUP, where D: stands for the drive
where the CD-ROM drive is located on your computer. Alternately, you can start the setup program from your Windows explorer by double clicking the file INSTEP-[EDITION]-SETUP.exe or INSTEP-SERVER-SETUP.exe.
`` Please note: both in‑Step Server software and in‑Step client software cannot be installed onto the
same computer at the same time.
Setting Up a Program to Run Every Time You Start in-Step
If you’ve extended in‑Step’s scope of functions to include components of your own, there’s a way of making sure
that all users will always be able to access these components even if in‑Step is newly installed. In this case, you’ll
want to write a batch file which sees to it that these components are registered.
A batch job might look something like this, for example:
@ECHO OFF
regsvr32.exe /s \\Products\microTOOL\in-Step\MyExtension.dll
Give the file the name Autostart.bat and copy this file into the same directory where in‑Step’s setup file is located. The batch file will then be copied into in‑Step’s installation directory whenever the setup file is executed and
automatically run every time the program is started. Like this, you can ensure that any changes you make to your
components will automatically be made available to users.
How to License in-Step
In order to work with in‑Step you will require a valid product license. This license can be provided via a server or
locally. You can determine what type of licensing you wish to use the first time you start in‑Step. If you want to
change the license type later, you can open the product activation dialog again at any time, under the option
Product Activation in the in‑Step Windows program group.
in‑Step can be licensed in three different ways:
Workstation License with a License Key
If you have received a license key with your in‑Step purchase, you can activate it by selecting the option The license
is available locally with a license key, and entering the key. Click Activate to finish the installation and activate
the software.
10
Administrator Manual
The license key is activated over the Internet and is an anonymous process which only takes a few moments. During this process the product license is checked. You only need to carry out this step once when you first start the
tool. If you do not have an Internet connection at your workstation, proceed as described under the heading Activating in-Step without an Internet Connection.
Workstation License with a Hardlock
If you have purchased in‑Step with a hardlock, or are already using one with an earlier version, select The license is
provided by a local hardlock. The hardlock must be installed on the same PC as the software, as described under
the heading Installing a Local Hardlock.
Floating License
Floating licenses are licenses which are not tied to any specific computer. Instead, they are provided via a server
with the help of the microTOOL license server. This gives you the opportunity, for example, to use the licenses flexibly in a project team and use them wherever they are needed at the moment.
If you have purchased one or more floating licenses which are provided via a license server in the network, select
the option The license is provided by a server. Complete the licensing process by clicking OK. Where floating
licenses are concerned, the activation key is entered via the license server software. This must be installed on a
workstation or a server in the network after installing in‑Step. Alternatively, floating licenses can also be provided via
a hardlock.
All information and files relevant to the installation can either be found in the sub-folder
\LicenceServer on the installation CD, or, if you have received the license server over the Internet, in the
downloaded file. Here you will also find a separate ReadMe with detailed information about the installation and
configuration of the license server.
`` Please note: to successfully install the license server under MS Windows NT 4.0 and MS Windows
2000, you must have administrator rights.
You can install the microTOOL license server on a workstation computer or a server with MS Windows 98/
ME/2000/XP/Vista/7 or MS Windows NT 4.0 (or higher).
`` Please note: If the hardlock and license server are installed onto the same workstation where
in‑Step is also installed, the DWORD value LocalHardlock with the value 0 must be created in
the key HKEY_CURRENT_USER\Software\microTOOL GmbH\in-Step\2.0\Licence IV in the
Windows registry database. Additionally at least one active network connection must exist when
you first start in-Step.
You can find more detailed information about the values to be entered on your installation CD, or in the folder \
LicenceServer in the file Readme.doc. Here you can also find out which settings you need to define if you
want to combine several license forms, use a specific license, determine the order of licenses etc.
11
Administrator Manual
Activating in-Step without an Internet Connection
If you want to use a workstation license with a license key but the computer on which you want to activate in‑Step
doesn’t have an Internet connection, you should follow these steps:
- Open the activation dialog by starting in‑Step or via Product Activation from the in‑Step Windows program group. Click Activate. If your computer does not have an Internet connection, a window opens
automatically with your Computer ID.
- Note the computer ID.
- Switch to a workstation with an Internet connection and go to the Website www.microTOOL.de/ProductActivation.
- Enter your license key and your computer ID. After clicking Next you will receive a Windows registry file
which you can download.
- Copy the file onto the workstation where the software is installed and double-click it.
The activation is complete.
Installing a Local Hardlock
Regardless of whether you are using an in-Step workstation or floating license, you must install the hardlock on
your PC or server. With a workstation license, the hardlock must be installed on the same PC as the in-Step software. For a floating license the hardlock must be installed on a server in the LAN. You’ll find the installation file for
the driver software in the directory \Hardlock in your in‑Step program directory. The hardlock is attached to either
a parallel or USB interface.
Only install the hardlock on a PC which is turned off. In other words, turn off your computer now if necessary.
A hardlock for the parallel interface is installed thusly: Plug the end of the hardlock with the 25 point male connector in the socket plug of your PCs parallel interface. If you currently have a printer plugged into this interface, remove the printer plug, install the hardlock and then plug the printer cable into the hardlock. In this case it is recommended the printer is turned on when you are working with in‑Step. This ensures that the hardlock is recognized.
You can plug the USB hardlock into any free USB interface. The hardware recognition then occurs automatically.
in‑Step is now ready for use.
12
Administrator Manual
Manually Configuring the License Server
If you run into problems with the previously existing combination of client and server operating systems in your
company and the possible network protocols when you are running the microTOOL license server, then you will
have to make the necessary settings in the registry settings which in‑Step uses.
`` If you don’t want to edit the Windows registry database “by hand”: you can use the tool LicenseConfig.exe which is located in in‑Step’s installation directory to make all of the relevant settings
through a dialog interface.
When you make changes manually, please note: all of the settings described in the following sections need
to be entered in the Windows registry file under HKEY_CURRENT_USER/Software/microTOOL GmbH/
in‑Step/2.0/License IV. If this section does not yet exist, you will need to create it yourself. The same key
can be entered under HKEY_LOCAL_MACHINE. This is a good idea for whenever you can’t be sure which users will
be working at a certain computer. The license configuration is read out of HKEY_LOCAL_MACHINE by default. If
no license can be activated there, then the search continues under HKEY_CURRENT_USER. The license configuration for the client licenses which are managed in in‑Step Server can then be made under /Software/microTOOL GmbH/in-Step/2.0/Client Access License IV.
The following settings can then be made:
AutomaticRescan=n
This setting determines whether the network should automatically be searched for a server with a license. If the
server that was being used is not available at the moment, it will overwrite the settings once it has found another
server with a valid license. This also occurs if it doesn’t find a server with a valid license. If you deactivate the automatic search, your old settings will be kept. The automatic search should always inactivate under
HKEY_LOCAL_MACHINE.
13
Administrator Manual
The following values are possible for n:
0
1
Deactivate the automatic search; the existing server entries are processed.
Automatic search for a server with a license, which will write over the existing settings, if applicable.
The standard setting is [1].
RemoteHardlock=n
This setting lets you determine whether a hardlock that is available in the network should be used, or if a license
server should be searched for.
0
1
Licensing occurs via local hardlock.
Licensing can only occur via license server. Any previously available hardlocks are ignored.
The standard setting is [1].
LocalHardlock=n
This setting lets you determine whether a locally available hard lock should be used or if a search should be initiated for a license server in the network. If this entry is missing (or if nothing has been entered for the value n),
the client will first look for a hardlock installed on the client computer; if no such hardlock can be found and the
segment [License IV] doesn't have any valid server entries, a network-broadcast is initiated, to look for connection
possibilities to a license server. The following values are valid for n:
0
1
Licensing occurs only via a license server. Any previously available local hardlocks are ignored, if applicable.
Licensing can occur via the local hardlock.
The standard setting is [1].
BroadcastTimeout=n
With BroadcastTimeout you set the time (in seconds) that in‑Step waits for an answer from a License Server
present in the network. This value is preset at 5. You can increase the value if your network has heavy traffic and/
or long response times. Please remember that the waiting time entered here is used for each protocol for the client
computer: if the client supports the TCP and SPX protocols, for example, the value n = 5 yields a waiting time of
10 seconds (5 seconds multiplied by 2 protocols).
After the broadcast has been executed, the server answers received are then entered into the initialization file. The
first entry in this way has a value of n. This stands for the number of possible connections, calculated from the
number of servers that reacted to the broadcast and also the number of protocols supported by these servers.
14
Administrator Manual
ServerCount=n
For each supported protocol for each server found, 3 further entries are made. These entries describe the connection type, and have the following structure:
Server_n_NetProtocol=ProtocolName
Server_n_Name=ServerName
Server_n_Address=Address
where "_n_" refers to the number of the respective server, that is "_1_", "_2_" etc. The possible values for n are:
ProtocolNameNP
SPX II
TCP
ServerName
Windows name of the computer on which the License Server software runs
Address
The structure of the values depends on the protocol used:
NP:
SPX:
TCP:
\\ServerName\pipe\PipeName
In which ServerName is the Windows name of the server, pipe a
constant string, and PipeName the name of the pipe to be used,
which is installed on the server. The default value for PipeName is
"mtLicense" and can be changed as necessary (see chap. 4.2).
nnnnnnnn-xxxxxxxxxxxx,
In which "nnnnnnnn" gives the hexadecimal
network address and "xxxxxxxxxxxx" the
hexadecimal IPX node address.
IP address in V4 format (e.g. "111.111.111.11"), V6, DNS, hosts
Hint: if you use the SPX protocol, you can enter the command line "ipxroute servers" in Windows NT to get the
server addresses available in the network. In other environments, please use the appropriate command line here.
Tip: if you created or changed what you entered for an in‑Step client, you can export the changed part structure of
the registry file (menu command Registry/Export Registry File in the Windows Registry Editor). Afterwards, you
can import this part structure to all of the other clients simply by double clicking or with the command Registry/
Import Registry File.
Please note: the server page Opportunistic Locking in the network must be deactivated in order for in‑Step to run
unimpeded.
For an NT server, this means the value of the following key in the Windows registration file must exist, must contain
the DWORD value EnableOplocks and must be set to 0: HKEY_Local_Machine\System\CurrentControlSet\Services\LanmanServer\Parameters.
15
Administrator Manual
Beginning with version 2.0, in order to use a Unix / Linux computer with Samba as your repository server, you must
have the following entries:
blocking locks = no
oplocks = no
in the Samba configuration file /etc/ smb.conf ([Global] section).
Using a Client Access License
A client access license is a special form of floating license for in‑Step where the clients get their licenses from in‑Step
Server. In order to be able to use a client access license, you first have to install in‑Step Server. If a user has logged
on to a server, they can only use the license he or she provided earlier. Access to licenses which are provided locally
is then not used.
16
Administrator Manual
Automatic Software Update of in-Step (Clients)
in‑Step automatically checks if an updated version of the tool has been made available by microTOOL as a standard.
If you did not install in‑Step using a control file (see above), which contained another path for automatic updates,
in‑Step checks the preset address http://instep.microTOOL.de for newer product versions. An update can, however,
also be placed on a LAN, if you prefer.
There are several possibilities to activate the automatic software update of in‑Step Clients:
Manual Configuration in in-Step
In order to edit the current settings for the software update at the individual in‑Step workstations, just execute the
function Tools/Options located in in‑Step’s main menu.
On the tab in‑Step Software Update, you can set up in‑Step to check for a newer version of the software on your
local network instead of in the Internet. You can enter the path to the directory with the update directly or click the
button [...] to browse for the appropriate folder. In addition, you can set in‑Step to look for an update every time
the program is started, only at the first start of the day or to never check for an update. Then when you start the
tool on one of the clients, in‑Step searches for an update at the location you specified in the LAN as frequently as
you defined.
`` Please note: all of the in‑Step clients need to have the same version in order to work on a common
system. We definitely recommend using a control file when you install the software on to several
clients (see above). Otherwise, you will have to select the same the settings as every workstation
for the automatic update manually. Like this, you avoid any problems which occur from working
with several different versions of in‑Step at the same time.
The user will need to have the rights in the specified directory to Read and Execute in order to check for updates
and install the software.
To recognize that the specified path or internet address are valid for updating the software, the file inStepUpdate.xml must be found in this directory.
17
Administrator Manual
Configuration in the Windows Registry Database
The path or internet address used for updating is stored in the Windows Registry Database under the key HKEY_
LOCAL_MACHINE\SOFTWARE\microTOOL GmbH\in-Step\2.0 in the string „CheckVersionPath“. In
order to change this value the user needs at least the rights of a main user.
The configuration for searching for a current version is user-specific and is therefore stored under the key the
HKEY_CURRENT_USER\Software\microTOOL GmbH\in-Step\2.0 in the string „CheckVersion“.
You can enter both of the values manually according to each user or configure them automatically by using AutoStart.bat. In order to pick the second option the user must have at least the rights of a main user.
Configuration During the Installation
As mentioned in “Installing in‑Step with a Control File”, you can set the values of CheckVersion and CheckVersionPath during the installation with the help of the variables CHECKVERSION and PATH.
Setting up the Update Path for the Automatic Software Update
As described in setting up the software update manually, inStepUpdate.xml must be located in the folder selected for updating the software.
If the automatic software update is activated, in‑Step searches for inStepUpdate.xml in the update folder at
start up. The version number is readout and then compared with that of the already installed version of in‑Step.
If the value in the XML file is higher than the currently installed version, in‑Step will suggest an update.
In order for the automatic software update to be carried out, the new in‑Step installation file must also be located
in the update folder.
`` Important: Don’t rename the installation file. During the installation process, in‑Step will check
to see which editions are already installed on the user’s workstation. After an edition has been
detected, in‑Step will then check in the installation directory to see if there is also an appropriate
installation file for it. If it’s not located, the automatic software update will not proceed.
Controlling the Updating Process
Apart from the standard process described above, you can also use the following options to control the updating
process:
Begin Installation with a Control File
You can store an additional control file in the update folder. This file must end in “ini”. If the update folder contains an ini file, the installation will prefer to use it when starting up. Of course, without an ini file, the regular installation file will be used.
Please note: If there are more than one ini files in the folder, this mechanism will not work.
18
Administrator Manual
Installing Using a Link to the Installation File
You can also create a link to the installation file in the update folder. This link must have the same name as the
installation file.
If in‑Step finds a link with the name of the installation file during the update process, this file will be preferably
used.
As described in the paragraph „Installing in‑Step with a Control File“, a control file will only be considered if you
extend the link using the switch /M. Additionally, you can also begin the installation in silent mode by using the
switch /S.
Installing Using a Link to the Batch File
The link in the update folder is not compelled to refer to the installation file. Alternatively, the link can refer to a
batch file. The only thing to take notice of is the name of the link: In order for in‑Step to recognize it as a valid update file, the link must share the same name as the batch file.
The installation can be started in the batch file with the relevant switches. However, there are also a few other options before the installation begins, for instance setting up a message to be shown before the installation begins.
Updating in‑Step Server can be done with ease. To do this, you will need to open in‑Step Server’s configuration settings.
19
Administrator Manual
Automatic Uninstall
To unistall in silent mode you would carry out the following calls in a batch file:
General:
<in-Step Installation Directory>\Unwise.exe /S <in-Step Installation Directory
>\Install.log
It’s especially important to include the switch /S directly after Unwise.exe and to enter the path of Install.
log afterwards. If not, the setting will not be acknowledged.
The Registry Database query (to the in‑Step installation directory) and the subsequent calls in the batch file could look
something like this:
rem Uninstall - begin
set regkey=HKEY_LOCAL_MACHINE\SOFTWARE\microTOOL GmbH\in-Step\2.0
set keyname=AppPath
::Create temporary directory
if not exist %temp%\isUpdate md %temp%\isUpdate
::Create registration key (required if it doesn’t exist)
> “%temp%\isUpdate\tmp0.reg” ECHO REGEDIT4
>>”%temp%\isUpdate\tmp0.reg” ECHO.
>>”%temp%\isUpdate\tmp0.reg” ECHO [%regkey%]
START /WAIT REGEDIT /S “%temp%\isUpdate\tmp0.reg”
Del %temp%\isUpdate\tmp0.reg
::Get registration key
Start /Wait %windir%\Regedit /E %temp%\isUpdate\tmp1.reg “%regkey%”
Find “%keyname%” < %temp%\isUpdate\tmp1.reg | Find /V “” >”%temp%\isUpdate\
nvcpath.txt”
Del %temp%\isUpdate\tmp1.reg
FOR /F “tokens=* delims==” %%A IN (‘TYPE %temp%\isUpdate\nvcpath.txt’) DO SET
rootkey=%%A
FOR /F “tokens=1* delims==” %%A IN (‘ECHO.%rootkey%’) DO CALL :Parse01 %%A %%B
:Parse01
:: %1 gives the key, %2 gives its value
SET instep=%2
:: Replace double quotes and double backslash\\
SET instep=%instep:”=%
SET instep=%instep:\\=\%
“%instep%\Unwise.exe” /S “%instep%\Install.log”
rem Uninstall – end
20
Administrator Manual
A temporary .reg file is created in order to get the relevant key. The result – also temporary – is stored in a text file
where its content will be evaluated. The directory is stored in the variable “instep”. The files will be deleted and
then the uninstalling process will begin.
Alternatively, the “possible” installation directories can be “tested” in the batch file:
rem Uninstall - begin
‘C:\Program Files\microTOOL\in-Step\Unwise.exe’
microTOOL\in-Step\Install.log’
‘D:\Program Files\microTOOL\in-Step\Unwise.exe’
microTOOL\in-Step\Install.log’
‘C:\Program Files\microTOOL\in-Step\Unwise.exe’
microTOOL\in-Step\Install.log’
‘D:\Program Files\microTOOL\in-Step\Unwise.exe’
microTOOL\in-Step\Install.log’
rem Uninstall - end
/S ‘C:\Program Files\
/S ‘D:\Program Files\
/S ‘C:\Program Files\
/S ‘D:\Program Files\
In both cases the installation process can be subsequently carried out in silent mode. The uninstalling routine is only
visible for users who don’t have installed in‑Step in one of the used directories (2nd option), or if access to the registry database fails. This is because in this case it will not be uninstalled.
21
Administrator Manual
in‑Step and Oracle
If you want to use in‑Step together with Oracle, you have to install in‑Step Server for Oracle. Direct access via
in‑Step Clients to an Oracle database is not possible.
System Requirements
The in‑Step Server can run on the same computer as the one containing the Oracle database. If the in‑Step Server
is installed at a different location, the Oracle Client Software must be installed there. So that the in‑Step Server can
access Oracle, there must be an OracleNet-connection. The supported Oracle-Versions are Oracle 9i, Oracle 10g,
and Oracle 10g Express Edition (XE) and Oracle11g.
The program isOracleConnectionTest.exe in the in‑Step Server installation directory lets you check, whether in‑Step Server can be combined with Oracle. Enter the database ID and an Oracle user with password. If the
connection is successful, you will receive the respective message, if not, you receive an Oracle error message.
A Few Notes on Configuring Oracle
Before you go on to learn in the next section how to publish systems via in‑Step Server for Oracle, here are a few
notes on what you have to pay attention to during configuration of your Oracle installation.
-
-
-
-
-
First it is important to remember the SYS password for the Oracle database. You will need it when creating
a new system via in-Step Server Konfiguration.
It is very important to choose a font (NLS_CHARACTERSET) that supports the usual characters used in Windows and in‑Step forms (with layout). If the chosen font does not support these characters, then they cannot be stored later on in the database and arte displayed as upside-down question marks. We recommend
using the font WE8MSWIN1252. If this font is not installed by default, you have to assign when creating a
user-defined database. There are known problems with WE8ISO8859P15. Do not use this font.
The Oracle Client installed on the in‑Step Server for Oracle computer has to be a 32 bit client. Because
in‑Step Server for Oracle is a 32 bit application.
Also, the NLS_LANG parameter has to be set correctly on the Oracle client computer. That means, under
Windows, a system variable NLS_LANG has to be defined with the value AMERICAN_GERMANY.WE8MSWIN1252 or GERMAN_GERMANY.WE8MSWIN125. TZhis setting can be made on some operating systems via the registry. The entry NLS_LANG can be found under e.g. HKEY_LOCAL_MACHINE\SOFTWARE\
Wow6432Node\ORACLE\KEY_OraClient11g_home1. Experience shows that an entry in the registry is not
enough. The environment variable has to be set as well for that reason.
If the NSL_LANG parameter is not set correctly, it may happen, that special characters and umlauts are
replaced by upside-down question marks.
There should only be one Oracle client installed on the Oracle client computer. If multiple clients are needed anyway, the PATH ewnvironment variable should be adapted, so that only one client path is specified
there. If that is not the case, accessing the OCIWrapper.dll is may not be possible. We also recommend setting the path for accessing the Oracle client up front in the PATH environment variables.
Accessing Oracle can be tested with the program isOracleConnectionTest.exe that is installed
with in‑Step Server for Oracle.
It is located in installation directory of in‑Step Server for Oracle.
22
Administrator Manual
How to Configure in-Step Server
in-Step Server and in-Step Server for Oracle are additional components in the in‑Step editions. They enable you
to plan and execute IT projects via TCP/IP over the Internet/intranet. in-Step Server for Oracle also allows you to
manage project results in an Oracle database. in‑Step Server and in‑Step Server for Oracle come with a service for
sending e-mail notifications. In addition, in‑Step Server for Oracle also comes with two index services for the full
text search based on Apache Lucene .NET.
After installing an in‑Step Server, you will find the heading in‑Step Server Configuration in the microTOOL
in‑Step Server program group. Use it to open a dialog where you can specify the server’s configuration in detail.
The dialog is made up of five tabs.
Service
The Service tab shows the server’s current status: if the button Start is active, the server is not running. If the Stop
button is active, it means the server is currently running. If the server is running and you change its configuration,
you will need to restart the server using the button Restart in order for the changes to take effect.
23
Administrator Manual
Configuration
You will find the port for communication between server and clients on the tab Configuration. By default,
in‑Step uses the port 64711. To change settings, click Edit.
You can change the port, but you will need to do so for all of the clients and other servers as well. If you use a
firewall, you will need to activate the selected port there, as well. By the way, in‑Step uses as proprietary protocol.
Security is always ensured through the use of 128-bit encryption and the user identification (login and password).
The number of simultaneous connections you can have depends on your network resources. You can influence the
time it takes for the server to answer requests from the clients via the number of threads. If it’s taking too long, you
should reduce the number of threads.
You can also set the language of the configuration dialogs. Select the desired language from the dropdown-list.
The selected setting will become active the next time you call up the in‑Step Server Configuration.
To keep a log of every time a user logs on or off, you can create two log files: the start and end times of the connections between clients and server are recorded under in‑Step Service. In addition, the systems, which the clients
logged on to are listed under Server. You can also create a logfile under Notification Service, which protocols errors
and information from mail exchanges.
You can enter the name of the server under Server Name. That will be the name in‑Step uses for generating web
links. This entry is required whenever you specified automated actions that contain a link to objects, which are
provided by the in‑Step Web Client.
24
Administrator Manual
Published Systems
The tab Published Systems displays the names of the systems managed by the server. If you have installed in‑Step
Server for Oracle, you not only can make available those systems managed by the in-Step system (type: isf) file but
also the systems located in the Oracle database (type: Oracle).
Name, number of users and visibility can be edited right away: just double-click the corresponding column.
Before a new system can be accessed over the server, it needs to be registered on the list of available systems. To
do this, click the button New on the toolbar.
First you must choose whether you want to open an existing system or a new one. Then click Next.
Publishing an Existing System...
Once you have installed in‑Step Server for Oracle, you decide whether you want to make available an in-Step system file, meaning a file with the extension *.isf, or one in an Oracle scheme. When using in‑Step Server, only systems located in in-Step system files can be made available.
25
Administrator Manual
… in in-Step System File
In the follow-up dialog, enter name and path of the system or click the button [...], to select an existing system.
Next, you can enter a name for the system to be made available by in‑Step Server. By default, in‑Step suggests a
system name. If you click Next, you can make entries regarding visibility and number of users.
If you select Finish right away, the default entries (Visible = yes and Max. number of Users = unlimited) apply.
Please note. Systems located in in‑Step system files should normally be made available locally, i.e. on the computer
where the server is installed. If an in‑Step system is located somewhere else in the network, the path must be selected and a user must be assigned with access rights to the system. To do this, first open your Windows control panel.
Select the folder Administrative Tools followed by the heading Services. Next, call the properties of the microTOOL
in‑Step Server. On the tab Log On, the option This Account must be selected, a user must be assigned and a
password must be entered. Take on these settings for the e-mail notification service too.
26
Administrator Manual
… in Oracle Scheme
Under Database ID, you first enter the name of the Oracle database, where the new system (= Oracle Scheme)
will be managed.
Under User, enter the name of the in‑Step Server logging onto this database. The user name corresponds to the
name of the system schema in Oracle. Then enter the login Password used for Oracle. No products are stored
in the Oracle database. Under Directory you can specify the storage location for all binary files, not accessible to
outside parties. Should several in‑Step servers access one Oracle database, they always have to enter the same directory.
As a next step, enter the name of the system in‑Step Server provides. By default, in‑Step suggests the system name.
If you click Next, you can make entries regarding visibility and number of users. If you select Finish right away, the
default entries (Visible = yes and Max. number of Users = unlimited) apply.
27
Administrator Manual
Creating and Publishing a System
Once you have installed in‑Step Server for Oracle, you decide whether you want to make available an in-Step system file, meaning a file with the extension *.isf, or one in an Oracle scheme. With in‑Step Server, only systems
located in the in-Step system file can be made available.
… in-Step System File
Enter a name and path for the system in the follow – up dialog or click the button [...] to locate a suitable storage
place.
Is there a suitable system template already? You can define the system template to be used for the system in the
follow-up dialog or you can mark the option Create Empty System.
As a next step, enter the name of the system in‑Step Server provides. By default, in‑Step suggests the system name.
If you click Next, you can make entries regarding visibility and number of users. If you select Finish right away, the
default entries (Visible = yes and Max. number of Users = unlimited) apply.
28
Administrator Manual
... in Oracle Schema
Under Database ID, you should first enter the name of the Oracle database, where the new system (= Oracle
Scheme) should be created.
Log on to this database as Oracle administrator and enter your Password under Oracle. The entered User must
have the right to create a new scheme and tablespaces. With Log On as, you can specify the user group to which
the Oracle user belongs.
As a second step, specify the name of the new schema under which the system should be managed. It corresponds
to the name of the User, entered by in‑Step Server when logging on to the database. Choose a Password for the
logon under Oracle and verify it by re-entering under Confirm Password. If necessary, select a directory for creating tablespaces. If you do not enter a Tablespace Directory, Oracle will use the default one.
No products are stored in the Oracle database. Under Directory, you can specify the storage location for all binary
files, not accessible to outside parties. Should several in‑Step servers access one Oracle database, they always have
to enter the same directory.
29
Administrator Manual
Is there a suitable system template already? You can define the system template to be used for the system in the
follow-up dialog or you can mark the option Create Empty System.
As a next step, enter the name of the system in‑Step Server provides. By default, in‑Step suggests the system name.
If you click Next, you can make entries regarding visibility and number of users. If you select Finish right away, the
default entries (Visible = yes and Max. number of Users = unlimited) apply.
30
Administrator Manual
More Options Featured on the Tab Published Systems
The buttons on the tab Published Systems also offer more functions:
If you have installed in‑Step Server for Oracle and you select an available Oracle system, the button Properties is
activated. It opens a dialog where you can change the directory and/or the password for the in‑Step Server login.
This is necessary, for example, if the directory in the file system was moved or the password was changed in Oracle.
After a warning, the button Remove deletes the selected system from the list of the server’s available systems.
The functions summarized under System offer you the following options:
Show logged-in users opens a window where you can identify which users are working on the current system.
You can update the display by clicking the symbol at the foot of the window.
Import project or organizational unit lets you populate a system with data. Click the button to start the in‑Step
Import Wizard. You will find more information on the import and export of results in the Help section. Just press F1
key.
With Configure e-mail notifications you can determine when a user should be notified about the contents of a
view as default. You can determine which views a user should be informed about in in‑Step, under the user properties of the user concerned. The command opens a dialog where you must authorize yourself as a system administrator with your login and password.
31
Administrator Manual
Enter the time at which when notifications should occur under time. If you check the box Disable notifications,
you may not request that users in the system receive notifications regarding view contents.
The command Reorganize data directory enables you to re-organize the directory in which the products of the
selected system are saved as binary data. Here, the files are distributed across several sub-directories, which can
then be further divided into sub-directories as required. Reorganize data directory opens a login dialog where
you need to login to the selected system as the System administrator. You can then define the directory depth for
re-organizing the data.
If the data directory contains more than 30,000 files, a directory depth of 1 is recommended; for 80,000 files or
more, select the value 2. A directory depth of 3 is only recommended if the data directory contains more than
1,000,000 files. After selecting the appropriate value, check the box Reorganize data directory now and click
OK. Please note, this process may last anywhere between a few minutes and a few hours, depending on the
amount of data to be reorganized and the directory depth selected. It cannot be interrupted.
Under Configure system indexing you can determine whether or not the selected system should be indexed for
the full text search. A dialog will open where you’ll sign in as System Administrator, using your login and password.
Only after being authorized as the system administrator can you enter the settings for indexing the system.
Please note: This function is only available for Oracle systems.
32
Administrator Manual
If the checkbox Activate indexing for this system is selected, a digital Index can be created for versioned texts in
the system, allowing for a quick and easy search for each word or word part and their location in the text(s). Under
Login data for indexing service you’ll specify the user account through which the index service can login to the
system. This user must have access to the System Administrator Rights. If the index service isn’t running on the
same computer as in‑Step Server, select Index service is running on a remote server, and enter the location of
the index/ search service in the appropriate fields. Should you change the location, a new index must then be created. A corresponding message will appear when you close the dialog by clicking OK.
Activate system indexing for the selected system with Rebuild system index. If you click Yes in following message, you won’t be able to stop the indexing process.
`` Warning: If a system is being indexed for the first time, or if a new index must be created because
the index service is now operating on a different server, it could take several hours for the index
to be created. It is therefore recommended to let the indexing process run over night or over the
weekend, especially when dealing with larger systems.
Tips for Fulltext Search and IFilter
in‑Step full text search based on Lucene .NET searches through all texts versioned in the product library. This includes everything from MS Office documents and PDFs to HTML pages and in‑Step forms. In order for a user to be
able to access more than just simple text files, a compatible IFilter must be installed on the same server as the index
service. This ensures that the content of the documents can be collected and analyzed without concern for the
layout or document structure.
Several applications, such as Microsoft Office, already come equipped with compatible IFilters. However, in some
cases you may have to download them from the internet.
33
Administrator Manual
Where can you find compatible IFilters? What are some problems that might occur?
Adobe PDF:
32Bit: included in Adobe Acrobat and Acrobat Reader installation; cannot be individually installed.
64Bit: http://www.adobe.com/support/downloads/detail.jsp?ftpID=4025
Microsoft Office:
Office 2010:
http://www.microsoft.com/downloads/details.aspx?FamilyID=5cd4dcd7-d3e6-4970
75e-aba93459fbee
Office 2007:http://www.microsoft.com/downloads/details.aspx?FamilyId=60C92A37-719C-4077
B5C6-CAC34F4227CC&displaylang=en
Office 2003:
can be installed together with MS Office. You’ll find more specific instructions here:
http://intranomic.com/download/office/Office2003.pdf
Text Files:
The IFilter is included in Windows, but limited to 25MB. If necessary, it can be adapted in the Windows Registry:
http://support.microsoft.com/?scid=kb%3Ben-us%3B318747&x=14&y=16
OpenOffice:
There are a few issues with the IFilters currently available with OpenOffice. Other free IFilters for OpenOffice intended for commercial use are currently not available.
A useful tool to see which IFilters have been installed is the IFilterExplorer:
You can download it here:
http://www.citeknet.com/Products/IFilters/IFilterExplorer/tabid/62/Default.aspx
At the CiteKnet website there are several more IFilters available for download:
http://www.citeknet.com/Downloads/tabid/53/Default.aspx
Now back to the menu System: Perform system upgrade still needs to be described. Published Systems on the
tab are only available if the client’s version number matches the version number of the current in‑Step system and a
valid path has been entered. If No appears in the list Available, it means that either the path entered to the system
is incorrect or the version is no longer valid. This can happen if the in‑Step Server has been upgraded, for example.
Systems, which were managed using an older version of in‑Step Server can easily be updated. Just select these
systems in the dialog and click the Perform system upgrade under System. All of the systems are then updated
automatically.
34
Administrator Manual
E-Mails
Next, there’s the tab E-Mail. Here you can configure the settings for the case when you want an e-mail to be sent
automatically when a transition in a product or activity’s state occurs, as well as notifications from users. You can
read what rights are required for the notification service in the following section. You will need to determine the
SMTP server for outgoing messages under Outgoing Mail Server. If this server requires you log in before you can
send mail, select the check box Server requires authentication and enter your access information under Account Name and Password. Enter the sender data under Name and E-Mail.
Please also keep in mind that a valid e-mail address must be entered under in‑Step in the Properties dialog of the
recipient.
Software Update
That just leaves the tab Software Update: you can enter a path for updating in‑Step Server here. You can check if
a newer version is available by clicking the button Check for New Version.
35
Administrator Manual
Distributing Rights for in-Step Server Services
Services such as the in‑Step Server and the e-mail notification service require certain rights in order to work. By
default the in‑Step Server and the notification service use the local system account. If you would like to launch the
service under a different account name, you are required to issue the following rights. If you let the in‑Step Server
and the notification service run under the system account, no further settings will be required. This account has
universal access to the system.
The following rights must be issued for the non-system account
-
-
-
-
Read permission in the installation directory
By default: C:\Program Files\microTOOL\in-Step
Read permission in the directory for the common data
By default: C:\Program Files\Common Files\microTOOL
Write permission on the systems provided by the in‑Step Server
Read permission on HKEY_LOCAL_MACHINE\SOFTWARE\microTOOL GmbH\in-Step Server\2.0
Without these rights, access to the configuration and the provided systems is not possible. The message:
Error Message Server:“ Method ‘~’ of object ‘~’ failed” will be shown or rather, the list of
provided systems remains empty.
The in‑Step Server service also requires the following rights:
-
-
Read permission on: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\isService\Parameters
Without these rights, the configuration cannot be read and no logfile is created.
The right to start, activate and connect to isServer.Session
Without the rights listed, the component isServer.Session cannot be instanced and the instance
created cannot be accessed. You can change the security settings with DCOMCNFG.EXE. Administrator
rights are required for this program.
The Notification Service also requires the following right:
-
The right to start, activate and connect to isLogon.Logon
Without the rights listed, the component isLogon.Logon cannot be instanced and the instance created
cannot be accessed. You can change the security settings with DCOMCNFG.EXE. Administrator rights are
required for this program.
36
Administrator Manual
How an in-Step System is Represented in the File System
An in‑Step system is basically composed of a file with the extension isf. As a rule, you will find a
folder with the name Systemname.data in the same directory. This folder contains binary data
which cannot be accessed directly. This folder can only be missing if there are no documents in
the system. When you work with in‑Step, a folder with the name Systemname.temp is created
for saving temporary files. There is usually also another folder, e.g. Systemname.html, in the
same directory where the help texts are located. If you would like to move an in‑Step system to another directory,
you will definitely need to move both the system file and the folder Systemname.data to the same target directory.
When a user takes advantage of the possibility of sending instant messages with in‑Step, the subdirectory ShortMessages is created in the folder Systemname.data.
Use Rights in the File System
If an in‑Step system is accessed by clients from a server in a LAN, we recommend assigning the following use rights:
for the folder where the in‑Step system is located, Read (R) and Execute (X) rights should be given. For the files in
the system, Read (R) and Write (W) access should be granted. Like this, you ensure that no one is able to delete
files from the directory where the system is located.
For the folder Systemname.data, we recommend granting Read (R), Write (W) and Execute (X) rights. This enables
users to create new files in the folder from their workstations. We recommend the rights Read (R) and Delete (D)
for the files in the folder Systemname.data. These use rights allow users to delete older versions of files from there
workstations. If only Read (R) is assigned, the binary data would remain even if older versions of files are deleted.
This would mean that only a system administrator would be able to eliminate unnecessary files via the in‑Step System Check. We will describe this tool’s operation in the next section.
All of the users need to have read and write authorization to the temporary files (Systemname.temp), otherwise the
folder becomes unnecessarily full. All rights to delete should be granted to the directory Systemname.data/ShortMessages. Please note that this subfolder is only created once the first instant message has been sent.
Finally, please note the following: the first time you access a system, in‑Step automatically generates a log file in
the folder Systemname.data. This file always has the name inStep.log. All of the actions performed on the
corresponding system are recorded in this file. In case something goes wrong, you can always trace who did what
when. Errors are indicated by an “E” in the log file, whereas a successful action has an “I”. Before the actions can
be recorded, all of the users need to be granted read and write access to the log file. In other words, Read (R) und
Write (W) need to be set for the file inStep.log in the LAN.
37
Administrator Manual
How in-Step and Oracle Work Together
If you want to use in‑Step together with Oracle, you have to install in‑Step Server for Oracle. Direct access via
in‑Step Clients to an Oracle database is not possible.
Featuring in‑Step Systems under Oracle
An in‑Step-System corresponds to an Oracle Schema. The in‑Step Server logs on as a user under the name of the
schema.
Only in‑Step administrative data is stored in Oracle. The project results, meaning the documents and files which
were created during the course of the project are stored as consolidated files in the file system – similar to the way
it is done with a system featured in the in‑Step system files (*.isf). You can create the directory individually for each
system when configuring in‑Step Server for Oracle.
Upgrading older Systems (Version 3.6 And Earlier)
If you are using an older version of in‑Step, you will have to export an XML export file or conduct an XML backup,
before the existing systems can be run via in‑Step Server for Oracle.
This is what you have to do prior to uninstalling the old in‑Step version:
- With the tool „in‑Step System Backup“ you create a backup of the affected systems. You can find the
application in the program files of in‑Step in the group Tools, where a double click on its symbol will start
the application.
- Before creating the backup with Start, deactivate the option Copy File Directory.
System Backup creates a system export file in the target directory you chose (Systemname001.xml_system).
- The existing file directory (<Systemname>.data) can be used as before! If necessary, copy or move this
directory to the server intended for replacement by Oracle.
After installing in‑Step Server for Oracle you only have to upgrade the system export file so that the data can be
further processed with the current version:
- To do this, start the tool “in‑Step System Upgrade“ in the program files of in‑Step.
- After a successful upgrade, this xml_system file can be used as a system template for creating a system
under Oracle-the same way as was described in the section How to Configure in‑Step Server.
Creating Systems
An in‑Step system schema can be created easily with the tool “in-Step Server Configuration“. The individual options are described in detail in the section How to Configure in‑Step Server.
To create the system schema, use the SQL script located in the installation directory of in‑Step Server in the folder \
OracleScripts. It is called in-Step Oracle Script.sql. This script contains the definitions of all the database objects necessary for an in‑Step system. Additionally, when running this script, two tablespaces are created.
One for files, the other for the indices.
You can also run this script manually with the corresponding Oracle tool. Please note the added commentary notes.
38
Administrator Manual
`` Caution: the original script must not be changed!
Just like in the section How to Configure in‑Step Server, a manually created system must then be published via
the tool “in-Step Server Configuration“.
Creating and Restoring Backups
`` To plan and realize backups, keep in mind that besides the Oracle data files, you must also save
the in‑Step-data directory.
As described above, XML backups can be created with the help of the tool “in‑Step System Backup“. You can
find more detailed information on how to do this in the section How to Create a Backup.
Before you introduce the XML backup, you have to delete the old scheme including the two tablespaces for data
and indices under Oracle. An example of a batch file can be found below. Only then can you make the system you
have saved available under the same name on in‑Step Server for Oracle.
Oracle itself offers two backup options:
-
-
Backup with the Oracle Recovery Manager. For this purpose the XE version provides Backup Database
and Overwrite Database, i.e. similarly configured tasks.
Script-guided backup using the Oracle import/export tool.
We recommend that you always export or import on the Oracle server and not on the client.
Here’s an example for a batch file where you can create a backup with the help of scripts:
echo Exporting Oracle scheme and tablespaces
expdp userid='sys/<Password>@<Database> as sysdba' dumpfile=<Export File>
schemas=<Schema/User>
echo Saving in-Step data directory
xcopy <Data Path> <Backup Path> /Y /E /Q
Export file is only for specifying the file name. The following folder is used as the path for exporting and importing:
<Oracle Installation Directory>\Admin\<Database>\dpdump
The export file will be created there automatically. Files which you would like to import have to be stored there.
39
Administrator Manual
Older versions of Oracle do not support the expdp command. If you are using Oracle 9 or older to create a backup, substitute the expdp command with the following command:
exp userid='sys/<Password>@<Database> as sysdba' file=<Export Path>
owner=<User>
`` Caution: Backups made under Oracle 11.2 using the exp command cannot be restored.
The file for restoring the backup may look somewhat like the following:
echo Deleting in-Step data directory
rmdir /S /Q <Data Path>
echo Getting in-Step data directory
xcopy <Backup Path> <Data Path> /Y /E /Q
echo Deleting Oracle scheme and tablespaces
sqlplus -S "sys/<Password>@<Database> as sysdba" @DeleteOracleUser.sql
echo Creating Oracle scheme and tablespaces
sqlplus -S "sys/<Password>@<Database> as sysdba" @CreateOracleUser.sql
echo Importing database
impdp userid='sys/<Password>@<Database> as sysdba' dumpfile=<Export File>
schemas =<Schema/User>
Older versions of Oracle do not support the impdp command. If you are using Oracle 9 or older to restore a backup, substitute the impdp command with the following command:
imp userid='sys/<Password>@<Database> as sysdba' file=<Export File>
fromuser=<User> touser=<User>
Please keep in mind that the same name has to be entered for fromuser and touser.
40
Administrator Manual
There is an SQL script for either deleting or creating the Oracle system scheme.
DeleteOracleUser.sql:
DROP USER <User> cascade;
drop tablespace <User>_DATA including contents and data files cascade
constraints;
drop tablespace <User>_INDEX including contents and data files cascade
constraints;
CreateOracleUser.sql:
CREATE USER "<User>" PROFILE "DEFAULT" IDENTIFIED BY "<Password>"
TEMPORARY TABLESPACE "TEMP" ACCOUNT UNLOCK;
GRANT UNLIMITED TABLESPACE TO "<User>";
GRANT "CONNECT" TO "<User>";
GRANT "RESOURCE" TO "<User>";
CREATE TABLESPACE "<User>_DATA"
DATAFILE '<Tablespace Path>\<User>_DATA.DBF' SIZE 126 M AUTOEXTEND ON NEXT
20 M MAXSIZE UNLIMITED
LOGGING
ONLINE
PERMANENT
EXTENT MANAGEMENT LOCAL UNIFORM;
CREATE TABLESPACE "<User>_INDEX"
DATAFILE '<Tablespace Path>\<User>_INDEX.DBF' SIZE 426 M AUTOEXTEND ON NEXT
20 M MAXSIZE UNLIMITED
LOGGING
ONLINE
PERMANENT
EXTENT MANAGEMENT LOCAL UNIFORM;
ALTER USER "<User>" DEFAULT TABLESPACE "<User>_DATA";
ALTER USER "<User>" QUOTA UNLIMITED ON "<User>_DATA";
ALTER USER "<User>" QUOTA UNLIMITED ON "<User>_INDEX";
By the way: This script is part of the file in-Step Oracle Tables Script.sql. It is located in the folder
\OracleScripts in the installation directory of your in‑Step Server for Oracle.
41
Administrator Manual
Tip for Configuring: Performance Improvement by Changing the Oracle Start Parameter
Even if your server has more memory, a standard Oracle installation only utilizes max. 1 GB RAM. The performance
for read operations can be improved by changing the Oracle start parameters.
Three parameters are relevant for this purpose:
sga_max_size = maximum size of the so-called System Global Area
db_cache_size = size of the caches for data and index blocks
memory_target = total RAM to be used by database instance
The following table will give you a first impression of how changing these parameters can influence the time it
takes to open views in in‑Step. We measured the time it took to open all of a user’s views.
This is how to change the start parameters in Oracle 11g:
Oracle uses a so-called SPFILE usually during start-up in which, besides the binary Oracle information, the configuration settings for using the Oracle instance resides. In addition, there are also so-called PFILEs in Oracle. Just like
SPFILEs, they contain configuration settings, but no binary Oracle information.
To find out, which file your Oracle instance utilizes, start SQLPlus and send the following query “SYS as SYSDBA“:
select value from v$parameter where name ='spfile';
To change the configuration settings the SPFILE has to be converted to a PFIL. The following command does the
trick. It also has to be executed as a SYSDBA:
create pfile='C:/mypfile.ora' from spfile;
The configuration settings can be adapted using any editor. Afterward, the PFILE has to be converted back to a
SPFILE. The following command does the trick. It also has to be executed as a SYSDBA:
create spfile from pfile='C:/mypfile.ora';
The changes take effect after restarting the Oracle service.
42
Administrator Manual
Tip for Configuring: Increase Maximum Number of Sessions/Processes
If the maximum number of sessions or processes which you have set for Oracle has been reached, then no further
users can log onto the system, because no connection can be made to the Oracle server.
Incease the number of max. sessions and processes in Oracle/Oracle XE in this manner:
Start SQLPlus on the server and log on to the database:
sqlplus sys/passwort@dbname as sysdba
Now you can have the max. number of sessions and processes displayed using the following commands:
show parameter sessions
show parameter processes
Use these commands to change the values:
alter system set processes=100 scope=spfle;
alter system set sessions=120 scope=spfile;
Then you have to restart Oracle for the changes to take effect:
43
Administrator Manual
Making in-Step available online
In order to make in‑Step available online, the computer must first be accessible from the outside. If the web client is
available, this is already disclosed (however only for port 80). You have to open port 64711 (or port 80 for the web
client) in all the firewalls between the in‑Step client and the server, or you have to make sure that in‑Step Server/
in‑Step are allowed to communicate via this port. Here it’s important to make sure that these ports are accessible
from the outside. All queries concerning these ports must be automatically rerouted to the relevant server.
In the in‑Step login dialog enter the name or IP address (followed by a colon and deviant port number if necessary)
under Location.
Example: Under http://in-Step.microTOOL.de/in-Step you’ll find one of our public web clients with a
tutorial you can use to try it out for yourself. You can also reach this system via a desktop client: Enter in-Step.microTOOL.de under Location.
If necessary, you can adjust the port in in‑Step Server Configuration. In this case you must declare the port on
the client. To do this you would either enter the port in addition to in-Step.microTOOL.de (in-Step.microTOOL.
de:64711) under Location, or adjust the value of “Port” in the Windows Registry Database by editing the key
“HKEY_LOCAL_MACHINE\SOFTWARE\microTOOL GmbH\in-Step\2.0”. (This is then applicable for all connections of this client to an in‑Step Server).
How to Check an in‑Step System
in‑Step includes the tool “in‑Step System Check” in its standard delivery package. This tool enables you to quickly
and easily check your system for physical and semantic errors. System Check generates the report file Systemname.txt into the directory of your choice and automatically corrects as many of the semantic errors as possible.
You will find the tool “in‑Step System Check” in the in‑Step or in‑Step Server program group. Double-click its symbol to start it. The following options are available:
The name and path of the system to be checked is displayed under the heading System. To check an Oracle
system, enter the name under which the system was published here. By default, in‑Step suggests the last system
edited. In addition, the last 10 systems you edited are offered in a dropdown list for easy selection. If the system
44
Administrator Manual
you’d like to back up is not offered for selection, click the button [...]. A dialog opens where you can browse for
the system of your choice. In the drop-down list User, you need to select the user name (login) under which you
are registered for the selected system. in‑Step automatically suggests the last user name entered. If you have set a
password in order to protect access to the selected system, please enter it in the field Password. If no password
has been defined, you do not need to enter anything in this field. You can also determine the extent of the system
check: select the check box Run Physical Check (only for isf files), if you want to physically check an isf system.
If you want to check your system for semantic errors which affect several projects, select Run System Specific
Checks. Select the check box Run Project Specific Checks for if the semantic check should be carried out for
individual projects. If you click the blue, underlined phrase All Projects and Organizational Units, you can limit the
check to individual projects or organizational units. A dialog will appear where you can select the elements to be
checked. Specify the name and path of the Report File which the test results will be saved to in the field Report.
in‑Step automatically suggests the current system directory with the name of the selected system. Click the button
[...] to determine another directory which the system will be saved to. Select the option Correct errors, if possible
if you would like semantic errors to be corrected automatically.
After you press Check, the System Check tests the system according to your settings and generates the report file.
Alternately, System Check can be executed command line oriented – for automatic jobs with the Windows Scheduler, for example. The command looks like this:
inStepCheck-system “<System>” -user <Username> -password “<Password>” -reportfile “<Report>” -winlogon
<Logintype> -checksystem <1I0> -checkprojects <1I0> -checkphysical <1I0> -checkonlyopenprojects <1I0> -project
<Project> -project
System and Report must be specified, but all other entries are optional. You can enter every user, listed in the system. The user does not need administrator rights and he/she need not be a member of the project team. If you do
not enter a User Name, the user account Administrator will automatically be used to sign on without a password.
If you do use a password, you must enter a user name beforehand. The password can be entered in plain text.– in
this case, we recommend you create a separate user for each in‑Step system when running a system check – or encrypted with the help of the provided tool isCryptPassword.exe. The encrypted password is generated in the
notepad and can be easily entered into command lines, or used for BATCH Jobs. To sign on in Windows, enter “1“
as the Login Type. In each check, 1 is Yes and 0 is No. The parameter project can be used repeatedly.
How to Create a Backup
in‑Step also includes the tool “in‑Step System Backup” in its standard delivery package. This tool enables you
to quickly and easily make a copy of your in‑Step system for safekeeping. System Backup exports a copy of the
in‑Step system to the directory of your choice in a system export file (Systemname001.xml_system). If applicable, the
export files will be numbered consecutively. You will find the tool “in‑Step System Backup” in in‑Step’s program
group. Double click its symbol to start it.
45
Administrator Manual
The following options are available:
Enter the name and path of the system to be copied under System. To check an Oracle system, enter the name
under which the system was published here. By default, in‑Step suggests the last system edited. In addition, the last
10 systems you edited are offered in a dropdown list for easy selection. If the system you’d like to back up is not
offered for selection, click the button [...]. A dialog opens where you can browse for the system of your choice. In
the drop-down list User, you need to select the user name (login) under which you are registered for the selected
system. in‑Step automatically suggests the last user name entered. If you have set a password in order to protect
access to the selected system, please enter it in the field Password. If no password has been defined, you do not
need to enter anything in this field.
You can decide if you’d like to use your in‑Step or your Windows login under Login. Would you like to make sure
that no one changes any data while you’re backing up a system? Just select the check box Open system exclusively to keep others from accessing the selected system for as long as you have it open.
Specify the path of the directory where the backup will be created in the field Backup Directory. in‑Step automatically suggests the current system directory with the name of the selected system. Click the button [...] to determine
another directory which the backup will be saved to. Select the option Copy Data Directory if you not only want
to back up the system’s repository structure but also the data places under configuration management. System
Backup then creates an additional directory Export_Filename.xml_system_data within the backup directory. When
moving or copying files this directory and its contents must always be kept together with the system export file.
Only then will you be able to reuse the exported data successfully. After pressing Start, the System Backup exports the system according to your settings and generates the system export file.
Alternately, System Backup can be executed command line oriented – for automatic jobs with the Windows
Scheduler, for example.
The call looks like this – for the case where the data directory is also copied: inStepBackup <System> <BackupDirectory> <1> <User> <Password>
Or if you would prefer not to include the data directory, use the following call: inStepBackup <System> <BackupDirectory> <0> <User> <Password>
The password can be entered in plain text, or encrypted with the help of the provided tool isCryptPassword.
exe.
Hint: please keep in mind that standard backup software cannot back up open files. For this reason, you should
always back up a system which contains open files with in‑Step.
46
Administrator Manual
Restoring a System
You restore an *. isf system that is not accessable via an in‑Step server as follows: click the button Other Systems
in in‑Step’s login dialog and Create in the following window. Give the created file a name, and select the option
Use system template in the dialog Create in‑Step System. In the resulting dialog Choose in‑Step System
Template, you can select an export file and initialize the system accordingly.
In order to restore an XML backup of a system, that is accessible via an in‑Step server, you have to create and publish a new system using the “in-Step Server Configuration” tool. Use the exported file as system template. The
individual steps are described in the chapter How to Configure in‑Step Server: Creating and Publishing a
System, in full detail.
Please note: in order to make a system available under the same name via in‑Step Server for Oracle, you have to
delete the former schema including both tablespaces for data and indexes in Oracle, before you restore the XML
backup. An example of a respective batch file can be found in the chapter How in‑Step and Oracle Work Together: Creating and Restoring Backups.
Upgrading Systems
You can update an in‑Step system, created with an older version, with different methods:
- Open it with the new in‑Step version and log on. Upon being asked a security question, the system is upgraded automatically
-Run in‑Step System Upgrade – under Tools – in the in‑Step program group. In the follow-up dialog you
can choose the in‑Step system and upgrade it.
Systems, managed by in‑Step Server can be updated via the user interface. More about this topic can be found in
How to Configure in‑Step Server.
47
Administrator Manual
Converting to a New Version
If you use in‑Step Server or in‑Step Server for Oracle, use the following steps to update your software.
Make sure that no one is working on in‑Step during the course of the conversion process.
Stop the in‑Step Server in in‑Step Server Configuration or Windows Services.
Close all open applications.
First, uninstall the in‑Step web client and the in‑Step web service (in the event that you’ve installed these
extensions).
5.Uninstall in‑Step Server or in‑Step Server for Oracle.
6. Now install the new version of in‑Step Server or in‑Step Server for Oracle. As soon as the new version has
been installed, it is no longer possible to access the server with older versions of in‑Step.
7. Start the new in‑Step Server in in‑Step Server Configuration.
8. Carry out the upgrade process of your systems in in‑Step Server Configuration. Select the intended system
from the list of published systems and select Upgrade from the System menu.
9. Before the actual conversion process, in‑Step Server creates a backup. Whether the system is presented
under Oracle or as an *.isf system file is irrelevant.
10. If you’re using the automatic software update, copy the new inStepUpdate.xml and the new in‑Step
installation file into the update folder.
11. The users can now install the new version or access the automatic software update.
1.
2.
3.
4.
If you do NOT use in‑Step Server or in‑Step Server for Oracle, use the following steps to update your software:
1. If you’re using the automatic software update, copy the new inStepUpdate.xml and the new in‑Step
installation file into the update folder.
2. Regardless of whether you install the software manually or automatically, make sure that in‑Step and all
MS Office applications are closed.
3. Follow the suggested steps for uninstalling in‑Step.
4. Install the new version of in‑Step.
5. Convert the in‑Step systems with the provided upgrade component. Make sure that no user is still logged
in to the system.
Optional – License Server Installation:
If you need to install a new version of the License server, use the following steps:
1. Stop the License server in Windows Services.
2. Uninstall the old License server
3. Install the new version of the License server
48
Administrator Manual
License Configuration with the ASP Frontend
You have the option of conveniently configuring your licenses with the ASP frontend. To do this, open the page
license.asp in your browser. The path to the hosting server for this page could look something like this, for
example:
http:// <Server> \<Path>\License.asp
You can make possible settings for the Automatic Rescan in the section Options. If you select the corresponding
check box, the network is automatically searched for a server with a license. If the server that was being used is not
available at the moment, it will overwrite the settings once it has found another server with a valid license. This also
occurs if it doesn’t find a server with a valid license. If you deactivate the automatic search, your old settings will be
kept.
In the section Add License Server, enter the name of the new server under Server Name. You can type in the
address of the server under Server Address. This could be the server’s IP address or its name once again. You can
choose between the protocols TCP, NP and IPX II in the drop-down list Protocol. Click Add Server and the server
will be added to the list under License Configuration, in the upper section of the page.
Use the headings Up und Down in order to reposition existing servers in the list. If you would like to delete a server from the list, simply click Remove.
`` Please note: the Internet user (iuser) must be authorized with write access to the registry values.
You can change this setting under Windows 2000 with Start/Run/RegEdt32.exe. You can then
grant the iuser full access to Regedit32 in the main menu under Security/Permissions. For
Windows XP, call regedit.exe first. The command Permissions is located in the context menu
of the individual users.
49
Administrator Manual
More Settings
Some of the configuration settings can only be made in the Windows registry database.
Turning Off the Display of the List of Users for the Domains
Would you like to use the Microsoft Windows login for authentication in your projects? When you want to enter or
change user data, it can take a long time until the complete list of all of the domain users is loaded. But you have
the option of turning off the user list for a domain. Simply open the Windows Registry Editor and locate the key:
HKEY_LocalMachine\SOFTWARE\microTOOL GmbH\in-Step\2.0.
Create the DWORD value DontShowDomainUsers. Its value must be set to 1.
The heading Click here to view all domain users will then no longer be offered for editing the user data.
Turning Off the Suggestion Mechanism
When you move your cursor onto New in the context menu of a product or activity, in‑Step determines which products or activities could be created at this location in the hierarchy according to the process model and offers these
to you in a submenu for selection. You can turn off the suggestion mechanism, however. Simply open the Windows Registry Editor and locate the key:
HKEY_Local_Machine\SOFTWARE\microTOOL GmbH\in-Step\2.0.
Create the key Optimization at this location and then the key StdProjectCS.ProductCS under that one.
Under the lower key, you will finally need to specify the string LoadChildTypes and assign the value 1 to it.
In the server mode, you will need to turn off this feature for the server user under HKEY_USERS\.DEFAULT\
Software\microTOOL GmbH\in-Step\2.0.
Check if a Directory Contains Products
in‑Step displays a plus sign in front of each folder by default, regardless of whether or not the folder has been refined further or now. You can configure in‑Step, so the tool first checks whether the folder contains any products,
although this takes more time than the default setting. Simply open the Windows Registry Editor and locate the
key:
HKEY_Current_User\SOFTWARE\microTOOL GmbH\in-Step\2.0.
Create the key Optimization under it and then the key StdReporter.ProductCS under that one. For the
final specification, you will finally need to type in the characters TestChildExistence and assign the value 1 to
them.
Afterwards, plus signs will only appear if the folder really contains products.
For server operation, you will need to specify this option under HKEY_USERS\.DEFAULT\Software\microTOOL GmbH\in-Step\2.0.
50
Administrator Manual
Support
Do you have any questions about configuring in‑Step? Then just contact our technical support at
in‑Step.Service@microTOOL.de. We are always happy to help.
microTOOL GmbH
Voltastr. 5
13355 Berlin
Germany
Phone +49 (30) 467 086-0
Fax
+49 (30) 464 47 14
Mailinfo@microTOOL.de
www.microTOOL.biz
51