BMC Remedy AR System 9.1.02
BMC Remedy AR System 9.1.02
BMC Remedy AR System 9.1.02
Contents
Release notes and notices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
Related topics: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
Known and corrected issues . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
9.1.02: Service Pack 2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80
9.1.01: Service Pack 1 for Remedy Single Sign-On . . . . . . . . . . . . . . . . . . . . . 81
Enhancements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81
9.1.00 enhancements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 82
Centralized configuration available for more parameters . . . . . . . . . . . . . . . 82
Improved search relevancy for Multi-Form Search (MFS) . . . . . . . . . . . . . . 83
Enhancements to armonitor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83
Field encryption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83
Improved functionality for BMC Remedy Deployment Manager . . . . . . . . . 83
Enhancements to BMC Remedy Single Sign-On . . . . . . . . . . . . . . . . . . . . . 83
9.1.00.001: Patch 1 for version 9.1.00 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 84
Where to go from here . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 84
Locating white papers, guides, and technical bulletins . . . . . . . . . . . . . . . . . . . 85
BMC Remedy AR System online documentation . . . . . . . . . . . . . . . . . . . . . 85
BMC Remedy Encryption online documentation . . . . . . . . . . . . . . . . . . . . . 89
BMC Remedy Migrator online documentation . . . . . . . . . . . . . . . . . . . . . . . 89
White papers online . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 90
Product announcements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91
Statement of direction for Compatibility Matrix . . . . . . . . . . . . . . . . . . . . . . . 91
Getting started . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 93
About BMC Remedy AR System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94
Orientation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94
Key concepts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95
Product overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 96
License overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 123
Access control overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 126
Application development overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 134
Architecture . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 171
User goals and features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 208
User roles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 209
Planning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 211
Available BMC Remedy AR System features and configurations . . . . . . . . . . 212
Features you can install . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 212
Configuration Types . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 215
Planning BMC Remedy AR System installation in an enterprise environment . . .
217
Planning a server group installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 219
Server groups overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 220
Server roles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 221
Example configurations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 223
Understanding server group naming . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 225
Planning where software is installed in server groups . . . . . . . . . . . . . . . . 227
System requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 228
Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 228
Security architecture . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 228
Security considerations for BMC Remedy AR System . . . . . . . . . . . . . . . . 230
General security guidelines . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 233
BMC Remedy Encryption Security options . . . . . . . . . . . . . . . . . . . . . . . . . 241
Security policy impact on client-server communication . . . . . . . . . . . . . . . 242
BMC Remedy Encryption Security compatibility . . . . . . . . . . . . . . . . . . . . 243
BMC Remedy Encryption Security modifications to the JRE . . . . . . . . . . . 243
WhiteHat Sentinel PE security penetration testing . . . . . . . . . . . . . . . . . . . 244
WhiteHat Sentinel PE security penetration testing AR 9.1.00.001 Revision . .
251
WhiteHat Sentinel PE security penetration testing - 9.1.02 . . . . . . . . . . . . 258
BMC Remedy AR System standards . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 266
BMC Remedy AR System server standards . . . . . . . . . . . . . . . . . . . . . . . 266
BMC Remedy Mid Tier standards . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 267
Support for IPv6 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 267
Post-installation or post-upgrade considerations . . . . . . . . . . . . . . . . . . . . 268
Supported operating systems for IPv6 . . . . . . . . . . . . . . . . . . . . . . . . . . . . 268
Supported databases for IPv6 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 268
IPv6 considerations with BMC Remedy AR System . . . . . . . . . . . . . . . . . 269
Installing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 269
About BMC Remedy ITSM Suite 9.1 Deployment online documentation . . . . 269
Configuring after installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 271
Upgrading . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 738
About BMC Remedy ITSM Suite 9.1 Deployment online documentation . . . 739
Integrating . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 741
Integration considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 742
Where to integrate BMC Remedy AR System . . . . . . . . . . . . . . . . . . . . . . 742
Multiplatform issues . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 744
Choosing an implementation method . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 744
Integration technologies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 745
Enabling plug-ins . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 747
AR System plug-ins introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 747
Plug-in types supported by BMC Remedy AR System . . . . . . . . . . . . . . . 748
AR Filter API plug-ins introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 750
AREA plug-ins introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 775
ARDBC plug-ins introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 778
Installed plug-in components . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 793
Creating C plug-ins . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 794
C plug-in naming conventions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 795
Configuring the Java plug-in server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 796
Creating Java plug-ins . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 803
Configuring the AR System server to access a plug-in server . . . . . . . . . . 805
Running the plug-in server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 807
Common plug-in C functions and Java methods . . . . . . . . . . . . . . . . . . . . 809
Opening Knowledge Management System Configuration form . . . . . . . . . 811
Integrating with a directory service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 812
Related topic . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 812
LDAP plug-ins in BMC Remedy AR System . . . . . . . . . . . . . . . . . . . . . . . 812
Using the ARDBC LDAP plug-in . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 813
Configuring the ARDBC LDAP plug-in . . . . . . . . . . . . . . . . . . . . . . . . . . . . 813
Building BMC Remedy AR System forms for directory services . . . . . . . . 816
Using the AREA LDAP plug-in . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 822
ARDBC LDAP example - Accessing inetorgperson data . . . . . . . . . . . . . . 828
Integrating BMC Remedy Single Sign-On with other BMC products . . . . . . . . 833
Related topics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 834
Integrating BMC Remedy Single Sign-On with BMC Remedy AR System 834
Integrating BMC Remedy Single Sign-On with BMC Remedy Mid Tier . . . 837
Integrating BMC Remedy Single Sign-On with BMC Remedy with Smart IT or
BMC MyIT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 839
Integrating BMC Remedy Single Sign-On integration with BMC Analytics for
BSM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 843
Migrating from BMC Atrium Single Sign-On to BMC Remedy Single Sign-On
848
AR System external authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 850
Enabling AREA authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 851
Configuring authentication processing . . . . . . . . . . . . . . . . . . . . . . . . . . . . 851
Setting up the AREA hub . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 858
Enabling FIPS support for BMC Atrium SSO . . . . . . . . . . . . . . . . . . . . . . . 859
Data and database integrations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 860
Creating vendor forms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 860
View forms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 863
SQL database access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 869
ODBC database access introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 871
Extending BMC Remedy Developer Studio . . . . . . . . . . . . . . . . . . . . . . . . . . . 882
Creating plug-ins to extend BMC Remedy Developer Studio . . . . . . . . . . 883
Prerequisites for creating plug-ins . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 885
Extension points for BMC Remedy Developer Studio . . . . . . . . . . . . . . . . 885
Developer Studio Java API . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 886
Installation directory for the BMC Remedy Developer Studio plug-ins . . . . 886
BMC Atrium Orchestrator integration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 886
Defining BMC Atrium Orchestrator web services . . . . . . . . . . . . . . . . . . . . 888
Modifying entries in the AR System Orchestrator Configuration form . . . . 889
BMC Remedy AR System workflow for BMC Atrium Orchestrator integration .
890
Obtaining job status for asynchronous execution operations . . . . . . . . . . . 894
Running external processes with the Run Process action . . . . . . . . . . . . . . . 894
Running external processes introduction . . . . . . . . . . . . . . . . . . . . . . . . . . 895
Triggering Run Process on clients and servers . . . . . . . . . . . . . . . . . . . . . 895
Starting applications with the Run Process action . . . . . . . . . . . . . . . . . . . 895
Retrieving data from applications with Run Process . . . . . . . . . . . . . . . . . 898
Using Run Process for the web . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 901
Integrating the BMC Remedy Assignment Engine into an application . . . . . . 902
To integrate the BMC Remedy Assignment Engine with your application . 902
This space contains information about the 9.1 release of the BMC Remedy Action Request System
(BMC Remedy AR System), BMC Remedy Encryption Security, and BMC Remedy Migrator
products, including service packs and patches. BMC Remedy Action Request System enables you
to automate many business processes without learning a programming language or complex
development tools.
Release notes and notices (see page 29)
Tip
The following interactive graphic summarizes enhancements for the BMC Remedy Action Request
System 9.1. (The graphic may take a few seconds to load).
The following updates have been added since the release of the space:
December 9.1.02: This release consolidates all the HotFixes delivered for BMC Remedy AR System version 9.1 and
05, 2016 Service Pack later into a service pack. This pack also includes enhancements for Hierarchical Groups and FTS.
2 (see page
80)
June 23, 9.1.00.001: This patch is a prerequisite for the Service Pack 1 of BMC Remedy IT Service Management
2016 Patch 1 for version 9.1. This release consolidates all the HotFixes delivered for BMC Remedy AR System
version 9.1 version 9.1 and later into a single patch. This patch also includes various performance
(see page 84 improvements. The format of describing the component version is modified in order to have a fixed
) location to get the version information. Hereafter, the versioning of components is as follows:
June 23, 9.1.01: BMC Remedy Single Sign-On 9.1 Service Pack 1 introduces new authentication methods and
2016 Service Pack enhanced security features. The service pack introduces the following enhancements:
1 for BMC
Remedy Kerberos authentication
Single-Sign Certificate-based authentication for CAC, PIV, and Smart Cards
On (see page LDAP authentication with SASL
81) Security enhancements
Note
The BMC Remedy AR System Help file for BMC Remedy Single Sign-On version 9.1.01
that is provided on the product DVD in the
BMC_Remedy_Action_Request_System_RSSO_9.1.01_doc.zip file does not install as
expected.
To install the Help file, download the latest offline documentation from the BMC Remedy
Single Sign-On product download page that is available on the BMC Support site.
December 9.1.00 BMC Remedy AR System 9.1 has been enhanced with the following new features and changes:
22, 2015 enhancements
(see page 82 Centralized configuration available for more parameters
) Improved search relevancy for Multi-Form Search (MFS)
Enhancements to armonitor
Field encryption
Improved functionality for BMC Remedy Deployment Application
Enhancements to BMC Remedy Single Sign-On
Related topics:
Known and corrected issues (see page 31)
Support information (see page 4621)
Learn about the issues that are corrected in the 9.1 release and in its subsequent service
packs and patches.
Look for open issues and workarounds to known problems before contacting BMC
Customer Support.
For known and corrected issues related to installation and upgrades, see Platform (AR
System and CMDB) installation and upgrade known and corrected issues
Tip
The known and corrected issues table includes the Component, Issue, Description,
Affected versions, and Corrected in columns. If you cannot view all the columns, click the
icon on the top-right corner of the page to open it in full screen mode. Alternatively,
use the scroll bar at the bottom of the table.
The following issues pertain to this release of BMC Remedy AR System and its patches. To locate
known and corrected issues, perform any of the following actions:
Select an option from the Corrected in list to filter the table by version number. An issue with
no version number listed here remains open. A workaround is provided, if available.
Select an option from the Category list to filter the table by a specific component, such as
AR System Server or Developer Studio.
Type a character string in one or more of the boxes to filter the list of defects.
Click any column heading to sort this table or change sort direction.
AR System SW00505309 When you select more than 30,000 objects for export, the export fails with the
server following error:
AR System SW00493803 When you use any external third-party web services, a null pointer exception occurs,
server and the following error is displayed:
AR System SW00503401 The following error occurs when you change the sort order on the SYS:Schema Sort
server form:
AR System SW00504064 The AR System server installer does not consider table views because of the
server following reasons:
AR System SW00505310 Bizarre error message is displayed when you enter = sign in Set-fields.
server
AR System SW00507666 A security vulnerability is detected because BMC Remedy ITSM Suite uses several
server Java-based processes that use the Apache Commons Collections (ACC) library.
AR System SW00508967 When a web service that uses SOAP 1.1 protocol fails with version mismatch then
server the AR System server does not automatically use the SOAP 1.2 protocol.
AR System SW00510297 The getProxy call takes longer time when the AR System server or load balancer
server does not respond. This results in performance impact on Overview console and Mid
Tier ports.
AR System SW00510633 When you run a Hierarchical Group query on a table that has many rows, Oracle
server database takes a longer time to retrieve the last row of data from a chunk of records.
AR System SW00511207 When you try to move the Change Request from Scheduled phase to Implementation
server phase, the following error occurs in server side log :
AR System SW00511210 When you select a Company from the list and initiate a Hierarchical Group
server configuration, the Hierarchical Group thread does not update any records for the new
Hierarchical Group Parent in the table.
AR System SW00493878 When you use web report embedded queries, no records are returned because the
server AR reporting plugin does not comply with the AR System server timezone value.
AR System SW00494477 The following error occurs when you run a custom filter on any workflow, with a Run
server If qualification:
AR System SW00494691 In BMC Remedy AR System, if t he Entry ID parameter length on any form is
server longer than the maximum allowed limit, the AR System server does not generate the
correct Request ID for the Metadata field.
AR System SW00494745 For the following API calls, the value returned in BMC Remedy AR System 9.0 is
server different from the value returned in BMC Remedy AR System 8.x:
AR_SERVER_STAT_NUM_THREADS
AR_SERVER_STAT_START_TIME
AR System SW00495270 On any form, a full-text search fails and returns no records if the qualification for the
server search includes wild card characters or any field such as "%" + $field$ +"%".
AR System SW00495608 When you create a new form, Menu Object Definitions are not imported if the form
server name is in Japanese script.
AR System SW00495813 When you start the AR System server, the server start time is displayed in
server milliseconds instead of seconds.
AR System SW00495816 The armonitor.log file shows the following error for the ports on remote nodes:
server
WaitOnPort: Error(10054).
AR System SW00496001 When you export objects, the Java API does not comply with the setting for fetching
server records, which is controlled by the RPC-Client-XDR-Size-Limit option in the ar.cfg
file.
AR System SW00496863 When you run the arexport.sh shell script on an Oracle database to export the
server records from a form, the following error occurs: The arexport.sh shell script cannot
export all the records because the unique file names are too long.
ERROR - java.io.FileNotFoundException .
AR System SW00496974 When you create a new Service Request Definition in Service Request Management
server with a turnaround time of One hour, the Expected Completion date/time field shows a
previous date after you click the Request Now button.
AR System SW00497348 In the server statistics, the RpcQueue thread count differs between AR Server 8. x
server and AR System server 9.1.
AR System SW00497416 When you search the Vendor form, the Request ID field displays different values
server than actual values.
AR System SW00497734 When you access a web service, the short description does not get updated if the
server filter that triggers GetEntry is not initiated.
AR System SW00498037 When you enable the form-level audit, the CMDB Audits do not work for the Modify
server operation on Asset forms.
AR System SW00498588 The ARDCB LDAP Vendor form returns only one page of data; it does not return all
server records.
AR System SW00498684 The gssapi calls are slow and take from 15-32 seconds when the number of users
server and the thread count is high.
AR System SW00498767 The AR System server consistently updates cache and eventually gets into dead-
server lock when multiple users make business time process calls on multiple servers in a
server group.
AR System SW00498808 When the result set has a semicolon in the title or has excerpt data, the following
server error occurs:
The Multi-Form search fails to return expected records and the SQL log indicates
Phase 1 search complete but does not mention of Phase 2 search.
AR System SW00498980 When you try to create or edit Knowledge Article for visibility group, as BCM Remedy
server AR System Administrator , the following error occurs :
AR System SW00499039 When you join Asset forms, the custom-created fields causes issues while migrating
server the Asset attributes. AR System server does not handle errors as expected.
AR System SW00499082 When you try to create SRD on SRD:ServiceRequestDefinition the following error is
server displayed:
AR System SW00500255 If an error occurs while processing escalations on a form , the filter processing stops
server unexpectedly at the first occurrence of a failure and does not process subsequent
records.
AR System SW00500273 After you update the parameter in the arserverd.conf file and restart the AR System
server server services, the Unix server launcher reads arserverd.conf file and replaces the
(Backslash) character with (Forward slash) character.
AR System SW00500337 The qualification that contains time calculation is corrupted in several workflow
server elements. The date is displayed as follows:
AR System SW00502203 The following error occurs and data import fails when you use the arexport utility to 9.1.00.001
server export entries from a regular form:
9.1.00
Unable to locate file.
AR System SW00500395 When you create a new request, the Push field filter action does not work in BMC
server Remedy AR System 9.0.01.
AR System SW00500519 If you create an external web service with input mapping, the data is not mapped
server correctly through the web service and no values are returned.
AR System SW00500842 The escalation process skips 2000 entries for every 2000 entries processed. The
server following error occurs when the escalation process records from the database:
AR System SW00500845 Issues occur when you have more than one instances of AR System server on a
server single computer, and you upgrade the second instance of AR System server from
8.1 to 9.0.01.
AR System SW00500879 When you run the driver.exe utility, the field mapping results are not displayed.
server The C API ARGetAssociation fails to return the
ARAssociationMappingInfoStruct parameter.
AR System SW00500911 When you log out of the AR System Server, the license is not released occasionally.
server
AR System SW00501069 If you create a regular form and specify the wrong value in a selection field, ARERR
server 306 is displayed without the form and field information.
AR System SW00505424 In the Incident Management console, you cannot remove incidents from a watchlist
server when you have a backslash (\) in the login id.
AR System SW00503417 When the AR System server restarts, JMSException exception occurs in arerror.log
server .
AR System SW00501833 When you try to run escalations manually on a form, a database timeout occurs and
server approximately half of the records are not processed.
AR System SW00501980 The integer value is set as the ENUM alias value when you run a Set Field filter on
server the Dairy field, and set values from the Selection field.
AR System SW00502359 The jobs do not run or they remain in progress when you run LDAP jobs for staff,
server student and associated organizations.
AR System SW00508038 If you have integrated BMC Cloud Life Cycle Management with BMC Remedy IT
server Service Management or with BMC Remedy MyIT, the following password issues
exist to a broken integration:
The user password is not transferred to BMC Remedy Cloud Life Cycle
Management.
You cannot perform basic operations even if the user password is manually
set on BMC Cloud Life Management server.
AR System SW00502470 The following error occurs when you use a web service utilizes a preemptive 9.1.00.001
server authentication.
9.1.00
401 unauthorized http response code.
AR System SW00502426 When an impersonated user logs out, a floating license does not get released. The
server AR Java API does not call ARReleaseUser.
AR System SW00502450 The Distributed Server Option fails to update the Distributed Server Option fields 9.1.00.001
server because it wrongly identifies a Regular form as an Active form. The Distributed
9.1.00
Server Option transfer is successful, but the Distributed Server Option transfer status
is not updated on the source server.
AR System SW00502766 The maximum number of threads set in the AR System server are initialized on 9.1.00.001
server startup.
9.1.00
AR System SW00503286 A change approval does not work when you create a join form and click on the
server Approve a Change button, or when you select one of the Change Request pending
approvals from the Request details section. The BMC Remedy AR System server
returns the following exception:
AR System SW00503400 The following error occurs when you change the sort order on the SYS:Schema Sort
server form:
AR System SW00504275 A high volume load test causes the AR System server t o become completely
server unresponsive.
AR System SW00503828 A floating license for an inactive user is not released according to the configured
server license timeout hours.
AR System SW00504143 A memory leak occurs in the AR System server because the database connection 9.1.00.001
server pooling component does not release memory.
9.1.00
9.0.00
AR System SW00504511 The following issues occur when the AR System server runs a lengthy query against 9.1.00.001
server the ft_pending table while obtaining information for the Server Admin console:
9.1.00
Memory usage increases.
The system stops responding.
Server information is not displayed.
AR System SW00504151 An authentication error occurs because the AR System server uses the User ID
server instead of the domain to authenticate users.
AR System SW00504214 When you use Full-Text search, the Configuration Items are not populated in the
server table because the search criteria "(<Fielded>! = $\NULL$ does not work on Asset
Management console.
AR System SW00504216 New Hierarchical group relationships in do not work in the Parent group field on all
server the forms.
AR System SW00504529 When you choose out-of-the-box ITSM or SRM Report from table field and click on
server Schedule icon, The BIRT scheduler plugin uses BIRT Excel emitter instead of Tribex
emitter for creating the Schedule out of the box BIRT Reports.
AR System SW00504564 When you enter '=' sign in the Set-fields, the field on a form is not updated and
server Bizarre error message that looks like a SQL expression is displayed.
AR System SW00504685 When you use the proc driver command on a regular form and run the Application-
server Parse-Val-SField process, the process does not work if you use the (+) sign twice in
the command argument.
AR System SW00504725 In the AR System Administration console, the server event record is not created
server when the archive events are captured in the Server Event tab on the Server Events
form.
AR System SW00504746 When you run the driver.exe utility, the field mapping details do not display
server because the C API ARGetAssociation fails to return the
ARAssociationMappingInfoStruct parameter.
AR System SW00507714 When you create a time- based escalation on the Vendor form to push records to the
server Staging form, the escalation queue processes only 2000 records in a Vendor form
and then stops.
AR System SW00504852 An import fails when the Application-Parse-Qual-Filter on a regular form utilizes user
server charset instead of server charset.
AR System SW00504858 The notification email has an extra forward slash (/) in the URL when you send an
server email with the web URL link selected but no email path configured.
AR System SW00504867 When you click the Email System link from the Function menu, enter the details, and
server click the Send Email Now button, the following exception occurs on the Incident
Management console and the emails are not added to the work log:
java.nio.BufferUnderflowException.
AR System SW00505074 A client timeout occurs when the AR System server reaches the limit of cache after
server handling chunked data calls.
AR System SW00505092 Large emails (over 1 MB) cause the BMC Remedy Email Engine to stop processing
server emails.
AR System SW00505353 The following null pointer exception occurs when you add a server license on the Add
server /Remove License form.
AR System SW00505685 When the Application-Delete-Entry triggers an additional workflow to run the
server filter error handler does not work The filter returns the following error, instead of
calling the error handler:
AR System SW00506449 The AREA LDAP authentication does not work for Authentication String and
server Authentication Login Name when you configure multiple domains on AREA LDAP
Authentication form and create the same User ID with different domains on the User
form.
AR System SW00506705 The following error is displayed when you access the Approval Central while 9.1.00.001
server configuring the AR System server.
9.1.00
GLEWF FAIL java.lang.NullPointerException: null
AR System SW00506783 When you log in to the AR System server as Admin by using API Test Driver, a null
server pointer exception occurs if you update a User form entry that has a null value for the
Default Notify Mechanism field.
AR System SW00506807 A change is detected in Get Entry API call behavior on Self Join forms.
server
AR System SW00496888 The GetListSchema database query results in high response time and increases
server CPU usage.
AR System SW00505627 The AR Sytem server does not check the AR database cases sensitivity before
server checking the SQL properties.
AR System SW00509955 (Spanish locale) Report fields are populated with data in the English language
server instead of the Spanish language.
AR System SW00506962 By default, the Client timeout exception logging is not ON in the Server Admin
server console .
AR System SW00503656 When you create an INC ticket, the Change field the audit log does not have the
server updated entries.
AR System SW00507813 The AR System server stops responding while performing escalations.
server
AR System SW00508073 When you export the definition file from the AR System server the User Tool does
server not load the forms that have a menu reference in an active link.
AR System SW00508233 The AR System server does not authenticate with LDAP authentication when an
server approver approves a change.
AR System SW00506942 When the Application-Get-DetSig-Join-2 command calls a custom form, the
server following error occurs and no entries are fetched:
AR System SW00507339 The AR API call fails intermittently and the following error is displayed when you
server create a user with many groups:
AR System SW00508325 The following error occurs when you try to migrate the Flashboard form:
server
SQL operation Failed - ORA-01407 error.
AR System SW00507976 LDAP Area and LDAP ARDBC entries are not added to the Central Configuration
server Mapping form on startup.
AR System SW00506576 An ARDBC plugin error occurs when you upgrade to BMC Remedy AR System 9.x.
server
AR System SW00506071 BMC Remedy AR System 9.1 returns the wrong request ID.
server
AR System SW00506989 An error occurs when you export a customized form with overlays from a version 9.1
server AR System server and import the form to a newly installed version 9.1 AR System
server.
AR System SW00505314 When you create a package in Deployment Management console, set the Include
server Object Type = Overlay Only and export it, only the package list is included in the
export definition file.
AR System SW00491125 MultiForm Search or Global Search generates the following exception when the 9.1.00,
server search string contains brackets within double quotes
9.0.01
Unknown system error : java.lang.StackOverflowError (ARERR
8790)
AR System SW00491979 In case of termination due to manual shut-down, server restart, or server logout on 9.1.00,
server Windows 2008 or Windows 7 the DDM fails to store the last migrated record ID in the
9.0.01
<instruction_file>_LastSuccessfulID.txt file present in a Working folder under
<MigratorInstallDirectory>\DeltaDataMigration. The CTRL_SHUTDOWN_EVENT and
CTRL_LOGOFF_EVENT are not received on Windows 2008 or Windows 7 which
causes the failure.
AR System SW00492765 When you modify a value for a CI using a Russian locale and retrieve the value using 9.1.00
server ARGetEntry API call, the AR API returns garbage characters.
AR System SW00492280 If you select a non-English locale and perform a message action on a filter or active 9.1.00
server link, the field id in the message are not replaced with the field values.
AR System SW00494143 If you use Oracle database and BMC Remedy Knowledge Management's external 9.1.00,
server file system knowledge source, and when schema reindex or periodic scan is
9.0.01
performed for RKM:VF_FileSystem vendor form, the following error occurs in arerror.
log file:
Workaround:
Prerequisites
1. If you are using Oracle database and BMC Remedy IT Service Management
is already installed before upgrading to BMC Remedy AR System 9.1, or,
2. If you are using Oracle database and BMC Remedy IT Service Management
is freshly installed, after fresh installation of BMC Remedy IT Service
Management is complete.
AR System SW00417387 An email message is sent to all the users registered on the People form 9.1.00,
server (users belonging to a particular group) under either of the following circumstances:
9.0.00,
A user on the People form has an email address such as "00000",
8.1.00,
group IDs, or some garbage characters, and an incident is created for this
user. 7.6.04,
The user who is creating a ticket for the customer for whom the incident is
being created 7.5.00,
replaces the value in the Email address field with zeros (for example, 000000)
7.1.00
or the group ID and submits the incident.
AR System SW00493589 When C API client tries to connect to BMC Remedy AR System 9.1 on Internet 9.1.00,
server Protocol version 6 (IPv6) using a port mapper, the connection fails with the following
9.0.01
error:
Workaround:
AR System SW00445408 If you integrate BMC Remedy AR System and BMC Atrium Single Sign-On in version 9.1.00,
server 8.0.00
9.0.00,
and then you upgrade the BMC Remedy AR System server and
BMC Remedy Mid Tier to version 9.1, you break the integration with the SSO Server. 8.1.00,
Workaround: 8.0.00
Re-run the version 9.1 SSO integration utilities that are installed with the
BMC Remedy AR System server and BMC Remedy Mid Tier to restore the
integration with the version 8.0.00 SSO Server.
AR System SW00467043 In the AR System Job form, when you create a job with Job Type as Report and 9.1.00,
server select
9.0.00,
Schedule Information type as Hourly or By Minute,the record is not created
generating the following error: 8.1.00
Workaround:
For the Schedule Information type as Hourly, manually set the recurrence field. For
example:
weekofmonth=;dayofmonth=;weekdays=0-6;frequency=1;subtype=;hours=0-23;
AR System SW00467816 In BMC Remedy AR System 9.1, when you create a web service filter action and 9.1.00,
server specify
9.0.00,
the username in the format <domainName\username>, the domainName is removed
automatically.
8.1.01
The web service filter action fails and a 401 Unauthorized Error error occurs.
Workaround:
Specify the username in the format <domainName\domainName\username> or
<username@FullyQualifiedDomainName>.
For example if the domainName is abc and username is xyz, specify the username
in the format abc\abc\xyz or xyz@abc.com
AR System SW00469288 In BMC Remedy AR System 9.1 on a Windows Operating System with HR (Croatian) 9.1.00,
server locale,
9.0.00,
the AR Server converts the dates to dd.mm.yyyy HH:MM:SS format,
but it does not convert the date back to EPOCH format. The following error occurs: 8.1.01
ARERR 313: Incompatible data types for intended relational
operation.
AR System SW00488782 The BMC Remedy AR System 9.1 does not support the data type LONG RAW. 9.1.00,
server
After upgrading to BMC Remedy AR System 9.1, when you insert data into the 9.0.01,
character fields,
9.0.00
diary fields or attachment fields which have data type as LONG RAW, and you
search for the data,
the data is not displayed in the search results.
Workaround:
Execute the following commands to search for all the columns that use the data type
as LONG RAW
and convert the data type for these columns to BLOB or CLOB.
1. a. Execute the following command to find the columns which have data
type as LONG RAW:
b. Execute the following command for each entry obtained from the above
query to
convert the data type to CLOB
1. a. Execute the following command to find the columns which have data
type as LONG RAW:
b. Execute the following command for each entry obtained from the above
query
to convert the data type to BLOB
AR System SW00471581 If you upgrade from BMC Remedy IT Service Management 7.6.04 or an earlier 9.1.00,
server version to 9.1,
9.0.00,
there is a potential for view creation failure during the upgrade resulting in a field
count mismatch on forms. 8.1.01
These forms are not cached when you restart the AR Server.
AR System SW00487839 BMC Atrium Integrator data is not available on the AR System Server Group 9.1.00,
server Operation Ranking form.
9.0.01,
Workaround:
9.0.00
Perform the following steps to add the data manually:
1. Open the AR System Server Group Operation Ranking form in New Request
mode.
2. Select Atrium Integrator from Operations list.
3. From the Server list, select the server name.
4. Add rank and click Save.
AR System SW00488374 If you register RKM External File Source to BMC Knowledge Management and 9.1.00,
server upgrade to
9.0.01,
BMC Remedy IT Service Management version 9.1, duplicate Knowledge Articles are
created. 9.0.00
Workaround:
Note: The Rebuild requires time based on the number of files registered as File
System Path Source.
AR System SW00494703 If you enable the Always Logging ON with default settings, the Java plugin server 9.1.00
server heap memory consumption is high.
SW00498954
Workaround:
1. Open the armonitor configuration file. For Windows, armonitor.cfg file located
at <ARSystemInstallDir>\ARSystem\Arserver\Conf folder. For UNIX, armonitor.
conf located at /etc/arsystem/serverName folder.
2. Locate the Java plug-in server command and add the following parameters:
-XX:+UseConcMarkSweepGC
-XX:+UseParNewGC
For example:
AR System SW00496301 If you use the following query on BMC Remedy AR System server with Oracle 12 9.1.00
server database:
you might get the following error: Error: ERROR (552): The SQL database operation
failed.; ORA-00918: column ambiguously defined This error occurs due to the
limitations in Oracle 12 to execute such type of queries.
AR System SW00498432 If you export the User form data and import back, from an old client (for example 9.1.00
server BMC Remedy Mid Tier 9.0 SP1 or BMC Remedy Mid Tier 8.1) which is connected to
SW00499897 BMC Remedy AR System server 9.1, authentication fails.
The login fails due to the change in password storage format. When you login to
BMC Remedy AR System server 9.1, the password is stored in a new format.
However the older clients use the old client libraries to export data and assume that
the password is in old format, and we cannot export the User form data and import
back.
Workaround:
You should use the clients upgraded to 9.1 to export and import data.
AR System SW00497005 If you execute a SQL query on database then the Except operator takes precedence 9.1.00
server over the other operators. For a JDBC query, the query traversal is from left to right
irrespective of the Set operator. So the results for such queries differ.
AR System SW00498437 If you execute JDBC set queries having different alias names, the query is not 9.1.00
server parsed and you might get an error message.
Workaround:
You should use the same alias name for set query.
AR System SW00495468 If you are using an Oracle database and you use a JDBC query with the LPAD and 9.1.00
server RPAD functions, the following error occurs:
Error: ERROR (552): The SQL database operation failed.; ORA-00932: inconsistent
datatypes: expected CHAR got NUMBER The LPAD and RPAD functionality is
supported for character fields only and not supported for integer fields.
AR System SW00500362 After upgrading BMC Remedy AR System to 9.1, if you select full text search 9.1.00
server searching, and then install BMC Remedy ITSM 9.1, and verify the indexes of RKM
Knowledge Article, the number of articles indexed is not equal to the database
entries of RKM Knowledge articles form. You may find duplicated number of articles
indexed.
Workaround:
AR System SW00500149 If you install BMC Remedy AR System 9.1 or upgrade to BMC Remedy AR System 9.1.00
server 9.1 on UNIX environment, and you stop any process, armonitor fails to restart the
process.
Workaround:
When the install or upgrade of BMC Remedy AR System 9.1 completes, restart the
BMC Remedy AR System server.
AR System SW00499617 In the armonitor file, if you add a Java argument for the Java plug-in server 9.1.00
server command such as:
Workaround:
You should create a script file for the argument and provide the script file name with
the parameter.
For UNIX, you should locate the script file in the bin directory.
Example
For Windows,
For UNIX,
BMC SW00506700& When BMC Remedy Single-Sign On (RSSO) is installed and configured for BMC 9.1.00
Remedy SW00510505 Remedy AR System, clicking the Approve, Reject, or Hold options in Approval
9.1.00.001
ITSM Central two dialog boxes are displayed: the credential sign in window and the double
authentication dialog box.
The Reopen button on the authentication dialog box multiple times will open
multiple sign in dialog boxes.
Workaround : Click Reopen on the authentication dialog box only if no sign-in
dialog box is already open.
When using Microsoft Internet Explorer version 11, the authentication window
is displayed on top of the sign-in dialog box.
Workaroud: Click on the sign-in window to enter your credentials and proceed
with the approval process.
When BMC Remedy Single-Sign On is enabled for BMC Asset Management,
approvals initiated by clicking the Approve, Reject, Hold or Adhoc options on
the Approval Details form invoked by clicking the Approvals link on the
Purchasing Console are not processed. The BMC RSSO authentication dialog
box remains open even after entering valid credentials.
Workaround: Open the Approval Details form from Approval Central (
Applications > Quick Links > Approval Central) instead of the Purchase
Request form.
Workaround:
The user must save the configuration and edit the realm to enter a value in the User
ID Attribute field.
The User ID Attribute field remains available even if the user selects any value
other than Custom Attribute in the User ID field.
Workaround:
The user must enter some value in the User ID Attribute field, but BMC Remedy
SSO ignores this value and considers the one entered in the User ID field.
Possible fix could have been to re-import Idp metadata but the problem is that Idp
metadata contains both new and old certificate and RSSO server extracts old
certificate instead of new one.
Workaround
Manually update the signing certificate to a new signing certificate in BMC Remedy
SSO.
BMC SW00494010 After max session time on BMC Remedy Single Sign-On is reached and session is 9.1.00,
Remedy terminated, the user is not redirected to the login screen immediately resulting in
9.0.01
Single Sign- error messages 623 thrown at user every action.
On
Workaround
BMC SW00494024 The memory size consumed by BMC Remedy Single Sign-On Tomcat process 9.1.00
Remedy keeps growing and eventually triggers the Linux OOM killer to kill the process.
Single Sign-
On
BMC SW00497209 While manually configuring BMC Remedy Single Sign-On, when the user uses a 9.1.00
Remedy "plain text password" as the DB password, the user is not able to log on.
Single Sign-
Workaround
On
The user must use the rsso-ds.jar utility to generate an AES-encrypted password.
Example:
The user must then update the password in the database.properties file.
BMC SW00500279 In the BMC Remedy Single Sign-On Admin console, the user can create unlimited 9.1.00
Remedy number of realms with the same Realm ID.
Single Sign-
Workaround
On
Delete the duplicate realms one by one from the user interface and re-create them
using different realm IDs.
BMC SW00500769 If a user is logged into an application that is integrated with BMC Remedy SSO, the
Remedy user can continue to work with the application even if the BMC Remedy SSO session
Single Sign- expires.
On
The user is prompted for re-authentication only when the user's application session
also expires.
BMC SW00507685 When you belong only to the Struct Admin group in BMC Remedy AR System, you
Remedy have no permissions to import content from BMC Remedy Smart Reporting.
Smart
Reporting
BMC SW00501777 When you edit the Incident Dashboard, the Incident dashboard filter does not save
Remedy the manual User Entry in Smart Reporting 9.1
Smart
Reporting
BMC SW00503506 Smart Reporting does not create the users correctly when you run the UserSync job
Remedy after successfully completing the onboarding process and importing all the users.
Smart
Reporting
BMC SW00508540 You cannot perform searches on the last name because the users with first name,
Remedy middle name and last name are not synced correctly in Smart Reporting. The last
Smart name contains a middle name and the last name.
Reporting
BMC Service SW00509191 The Request Details are not displayed for Admin users in the Service Request
Request Management console.
Management
Approval SW00508845 When you run the archgID, the SQL views that are created for the forms are not
Server updated with new IDs. As a result, the SQL statements that use these views fail.
Approval SW00503079 For forms with overlays, duplicate fields are displayed in the Selection list when you
Server click on Fields From Set Fields button on the AP: Rule Definition form.
Approval SW00506039 An error occurs when you set the Required Justification of Rejection to Yes on the
Server AP:Process Definition form. The change request remains in Request For
Authorization status and does not move to Rejected status.
Approval SW00506339 The set field values are blank when you activate or deactivate rules for an existing
Server approval process through the AP:Administration form.
Approval SW00509171 (German locale) In Approval Central, many field labels are truncated and do not
Server show the correct German translation.
Approval SW00510913 Adhoc approval does not work on the Approval Detail form in Approval Central. A 9.1.00.001
Server pop-up window remains open when you enter the credentials.
9.1.00
Approval SW00506346 A null pointer exception occurs when you issue the Sig-Approved application
Server command. The approval on the Application Pending form does not complete.
Approval SW00499237 Matching records are not displayed in the Search Result table, when you search for
Server valid Service Request Management or Remedy Knowledge Management Release
Record ID in the Basic Search field on the Approval console.
Approval SW00496454/ In Approval Central console, you are unable to approve service requests by clicking 9.1.00
Server SW00497035 Approve. The requests are moved back to Pending state.
Approval SW00494125 In Approval Server, if approval engine fails to release the lock when uncaught 9.0.01
Server exception occurs during custom approval process, the Approval Server stops
responding and cannot clear the pending application.
Developer SW00497140 The following exception occurs when you try to export a document from BMC
Studio Remedy Developer Studio:
java.lang.NullPointerException.
Developer SW00501289 You cannot create the View by double-clicking ActiveLinks. BMC Remedy Developer
Studio Studio neither creates the view nor lists the ActiveLinks.
Developer SW00504350 When you reconcile the form properties, the View Differences with option does not
Studio report changes to Dynamic Permission Inheritance.
Developer SW00504588 When you open a form having an overlay, the fields are distorted: either because the
Studio fields have an invalid parent or because the fields are moved to view from not-in-view
.
Developer SW00504595 You cannot disable a knowledge source when you log in to the Remedy Knowledge
Studio Management console and try to disable the RKM: ProblemSolution template.
Developer SW00507255 When you try to add approximately 350 forms across BMC Remedy IT Service
Studio Management, BMC Service Request Management, and BMC Service Level
Management. The following error is displayed:
The L10n Toolkit does not update the labels on Hebrew views if you run archgid.
Developer SW00505534 The image disappears from a cell-based table field when you reopen a form in BMC
Studio Remedy Developer Studio. The image starts appearing if you change the field size.
Developer SW00436945 When you upgrade to version 9.1, the existing overlay objects display the overlay 9.1.00,
Studio type as
9.0.00,
No Overlay for the granular sections such as Permissions, Indexes, Other
Definitions, and so forth. 8.1.00,
Workaround: 8.0.00
Create a new workspace while launching BMC Remedy Developer Studio. The
overlay objects show the overlay type as Overwrite.
Developer SW00475891 When you create an association between the main form and its audit form and you 9.1.00,
Studio have chosen this
to follow this association during archiving, all the related audit entries are also 9.0.00
Workaround:
you can choose to archive those entries in your audit form which were created due to
deletion
on the form by archive user.
Developer SW00498567 When you open the Developer Studio in Base mode, a banner is displayed in yellow 9.1.00
Studio color. If you try to resize this banner, the resizing fails.
Workaround:
Email SW00506337 When BMC Remedy Email Engine processes incoming emails, sometimes it
Engine removes attachment extensions while storing the emails.
Email SW00506774 Occassionally, the incoming emails sent from a Splunk notification do not populate
Engine the HTML body tab on the Email Message form.
Email SW00507327 Performance issues in BMC Remedy Email Engine are detected when there are a lot
Engine of entries in the AR System Email Attachment form.
Email SW00501114 When you create a CRQ that contains more than one approval approve one of the
Engine records from an interface, and approve the other record using email, the Approval
Audit Trail field contains only one entry, which is the last updated created by the
Email Engine. The Approval Audit Trail field should have two entries, one for the
approval performed from the interface , and the second approval performed from the
email.
Email SW00359899 Because the BMC Remedy Email Engine has an open issue for supporting 9.1.00,
Engine LDAP user authentication, the approval notification through the email
9.0.00,
feature is currently not available for users residing on LDAP directories.
8.1.00,
8.0.00,
7.6.03
Email SW00507386 The E-Mail Engine entry is displayed in the AR System Server Group Operation 9.1.00,
Engine Ranking form although the entry is no longer used by AR System server. The entry, if
9.0.01,
it exists, is ignored. Email Engine failover is handled by the service failover
operation.
9.0.00
Foundation SW00508337 An error occurs for Submitter Lock mode when you try to modify settings for an
application in Deployment Management console.
Foundation SW00508338 When you deploy a package and roll back the same, the package always remains in
Rollback Pending status.
Mid Tier SW00501287 BMC Remedy Midtier 9.1 does not work with IBM Websphere and Java 8.
Mid Tier SW00506185 A report is not created and an exception occurs when you create a Web Report on
HPD:Help Desk with the qualification as follows:
Mid Tier SW00510528 The Mid Tier does not have a process to configure trusted host header list. The Mid
Tier application does not accept inputs only from the trusted host header.
Mid Tier SW00503669 The Mid Tier stops responding because of thread deadlock when you upload an
attachment and you close the browser before that attachment is completely
uploaded.
Mid Tier SW00504184 An error occurs when you create a new request on FB: User Privilege form.
Mid Tier SW00504370 Security risk is detected because the config.jsp page input tag does not use
autocomplete = off attribute.
Mid Tier SW00504662 The following error occurs on Mid Tier when you use the FTP protocol for passing
Username and Password and run the PERFORM-ACTION-OPEN-URL action:
Mid Tier SW00504675 When a form loads, the Company field does not populate the value if the initial focus
is set to that field.
Mid Tier SW00505024 The lang attribute that identifies default human language of each web page is
missing from the HTML elements.
Mid Tier SW00505028 The value for <Title> attribute is blank in HTML.
Mid Tier SW00505114 (Internet Explorer) When you preview a long form in Internet Explorer, the Print
Preview of Internet Explorer tries to fit the form into one page because of this, the
field at the bottom is not displayed unless you resize the screen to 30%.
Mid Tier SW00505204 Frequent session timeout occurs when a session cookie gets removed because of
multiple OpenWindow actions on a form.
Mid Tier SW00505214 When an active link runs the PERFORM-ACTION-TABLE-SELECTALL process, a
caught exception occurs and only the first row is fetched instead of all the records.
Mid Tier SW00505415 The default chunk size of the Result List is not configurable in Mid Tier 9.x.
Mid Tier SW00505497 When you enable Preload for all the AR System servers and disable the Cache
Persistence, the config_cache.jsp page throws the following error intermittently:
IllegalStateException.
Mid Tier SW00506195 When you close a form, the ARERR 1000 is not displayed. The error message active
link on the form does not work as expected.
Mid Tier SW00506484 When you open a form in Google Chrome, the Field Input dialog box is not
displayed. You cannot click the field because the panels opened as the tool-tip are
not released and control is not returned to the user interface.
Mid Tier SW00509249 The service fails because the Apache Tomcat server's Catalina.out log grows to a
very large size while building Mid Tier cache.
Mid Tier SW00504817 ( Internet Explorer 11 ) Autocomplete does not work on Service CI on a regular form.
Mid Tier SW00506121 The Field Input dialog box does not open when you open a form in Google Chrome.
The panel that you open as the tooltip is not released and control is not returned to
the user interface. This makes the field unclickable.
Mid Tier SW00507868 An incorrect date is displayed after you change the user's time zone on the User
Preference form. The date is displayed as follows:
12/NaN/2016 8:30:00 PM
Mid Tier SW00505942 (Microsoft Edge browser) Extra scroll bars are displayed on the left hand side when
you open the Service Request console.
Mid Tier SW00508255 The following error is displayed when the Atrium SSO session timeouts, the Mid Tier
redirects to logout.jsp:
Mid Tier SW00487873 (Google Chrome) The data is not displayed under the correct column when you open 9.1.00.001
a form in Google Chrome.
9.1.00
Mid Tier SW00490192 When a No Vision user uses JAWS for navigating to a Flashboard using a mouse, 9.1.00.001
the user gets repeated readout of data due to the tooltip.
9.1.00
This is the expected behavior. No Vision usage requires traversing the Flashboard
using the tab key and not the mouse.
Mid Tier SW00500351 Multiple issues are detected when you enable the Show URL property for the
Character field. The data flickers when you add new lines to the editor and hover
over a URL link.
Mid Tier SW00500536 The length validation for a Character field is different in the following two scenarios:
1. When you Right Click and select the Paste option to paste data in Character
field.
2. When you press CTRL + V to paste data in the Character field.
Mid Tier SW00510817 Security vulnerabilities are detected in HTTP header's value after a fresh install or
upgrade of BMC RemedyMid Tier.
For details, refer to Settings in the config.properties file (see page 499).
Mid Tier SW00509998 The data that is not written in Latin script is corrupted when you run
SECURITY_FILTER in Character field.
Mid Tier SW00503269 The field label is not displayed properly when the label is Null in BMC Remedy
Developer Studio, and you set it dynamically using a Change Field action.
Mid Tier SW00482947 The fields on the Home page navigation bar for all the BMC Remedy IT Service 9.1.00
Management applications do not gain focus even after you access them using
Keyboard.
Mid Tier SW00492953 In Mozilla Firefox, if you select a Chinese locale in the User Locale list on the Locale 9.1.00,
tab in the AR System User Preference form, the field value on the User form is not
9.0.01
displayed properly.
Mid Tier SW00464462 When you create a new incident by using the Incident Management Console, 9.1.00,
if you select a value from a drop-down list or enter multiple characters in a character
9.0.00,
field,
8.1.00
the new screen rendition is delayed. This delay happens when the chat status in
Incident Management Console is Online.
If you change the chat status to Offline, there is no delay in screen rendition.
This issue is observed in Mozilla Firefox 23, Internet Explorer 8 or other browsers.
Mid Tier SW00475922 The Sync Cache operation does not rebuild the image if you make any changes to 9.1.00,
the image.
9.0.00
Also deleting the image during Sync Cache operation, results in a heavy
performance hit in mid tier.
Workaround:
Change the image name, update the form where the image is saved and
then perform the Sync Cache operation to reflect the changes on mid tier.
Mid Tier SW00434214 When you click a bookmark, the link does not point to the exact bookmark location, 9.1.00,
so you cannot identify the bookmark text in an article.
9.0.00,
8.1.00,
8.0.01
Mid Tier SW00434732 If you install the BMC Remedy Mid Tier with the AR Crystal Web application on a 9.1.00,
64-bit Windows system with BusinessObjects XI version 4 installed, the mid tier
9.0.00,
creates ODBC-driver information on the system. If you open the
ODBC Administrator Tool from the Windows Control Panel, you will not see the 8.1.00,
BMC Remedy AR System ODBC driver listed.
8.0.01
Workaround:
Open the ODBC Administrator Tool from a command prompt:
<WindowsHomeDirectory>\SysWOW64\odbcad32.exe
Mid Tier SW00431582 If you log on to a central mid tier in a distributed mid tier environment using a Safari 9.1.00,
browser
9.0.00,
and open a remote mid tier on a new Safari browser to display a form that resides on
a remote server, 8.1.00,
make some changes, and then you log out from the remote mid tier without saving
the changes, 8.0.00
BMC Remedy Mid Tier does not display a warning that the changes are not saved.
Mid Tier SW00380883 When you open the customizable home page in an inline view field, 9.1.00,
the images to expand or collapse the panels, and to add or remove panels do not
9.0.00,
display correctly.
8.1.00,
Workaround:
8.0.00,
1. Open the AR System Customizable Home Page in BMC Remedy Developer
Studio. 7.6.04
2. Select the Default Administrator View tab and open the Properties window.
3. Go to the Web Header Content property and click the ellipses button.
You see the CSS style rules that reference the class img.btnimg enclosed
in the <STYLE> tag.
4. Open the form with a view field on which you have embedded the home page.
For example, Form X.
5. Verify the <STYLE> tag in the Web Header Content property for Form X.
The CSS rules pertaining to the image buttons must be the same as in AR
System Customizable Home Page.
6. If the style is different, and you are in Best Practice Customization Mode,
create an overlay of the form (Form X). For more information about how to
create an overlay, see Developing an application (see page 2185).
7. Copy the style from the home page form and paste it into the Web Header
Content property
on the form (or the form overlay, as appropriate).
8. If you have other views, or outer parent forms, repeat step 4 through step 7.
For example,assume that you have Form Y with a view field. You embed AR
System Customizable Home Page
on Form Y's view field. The Form Y style for image buttons must match with
the home page style.
Mid Tier SW00380696 Inline view fields do not support Right-to-left (RTL) formatting if the parent form is 9.1.00,
using the Left-to-Right (LTR) mode and vice versa.
9.0.00,
Note: IFrame supports this functionality.
8.1.00,
8.0.00,
7.6.04
Mid Tier SW00342716 If you place a table in a panel, set the panel's Layout Style property to Fill, and set 9.1.00,
the table's
9.0.00,
Auto Fit Columns property to True, the table columns will shrink to fit into the panel's
initial size 8.1.00,
(possibly making the columns unreadable), and the panel is not filled as it grows and
extra slack is left behind. 8.0.00,
7.6.04,
Workaround: Set the table's Auto Fit Columns property to False.
7.6.03
Mid Tier SW00466918 When you upgrade from BMC Remedy Mid Tier 7.6.04 Service Pack 1 to BMC 9.1.00,
Remedy Mid Tier 9.1,
the user defined values in server.xml file are not retained. 9.0.00,
8.1.00,
8.0.00
Mid Tier SW00465528 The following error is displayed in Microsoft Internet Explorer 9 or 10 when the 9.1.00,
value of arsystem.emit_X_UA_compatible_mode variable is set to 10 in the Mid-tier
9.0.00,
configuration file:
Workaround:
Change the browser compatibility settings of the Microsoft Internet Explorer manually.
In Internet Explorer, go to Tools > Compatibility view settings,
and deselect the Display intranet sites in compatibility view option.
Mid Tier SW00464696 The following issues were identified with the Remedy Knowledge Management 9.1.00,
Application (RKM)
9.0.00,
and BMC Remedy Service Request Management forms when using JAWS:
8.1.00
When you open a knowledge entry from the Request Entry form, the dialog
box that
appears is different and does not read the knowledge entry data correctly.
On Service Request forms, all the answer fields are identified as edit fields
regardless of their type.
When you cancel a Service Request form, the confirmation dialog box shows
unwanted string
of text before displaying the message Are you sure.
Mid Tier SW00469539 If you create Web Reports using the BIRT report designer tool, and then import the 9.1.00,
report to
9.0.00,
AR System, and then export the report to MS Excel using Mid Tier,
the heap memory usage rises until either you get an 8.1.01
Out of memory error or you get an Invalid row number error from the BIRT
runtime.
You cannot export the report to MS Excel.
Mid Tier SW00485019 While accessing the applications using BMC Remedy Mid Tier, 9.1.00,
you can open multiple browser windows using workflows.
9.0.00
All the forms opened using the workflows are closed after you log out.
But if you make any changes to open the forms (for example, change the URL in
web address bar
or refresh the page or access any other forms by typing form name) or if a new
browser window or
tab is opened and other forms are accessed. Such windows are not closed by the
mid tier after you log out,
but a session timeout error is displayed if you perform any operations on them.
RTF fields SW00363909 When users select multiple table cells in an RTF field, editing operations do not work 9.1.00,
correctly
in Internet Explorer browsers. For example, users cannot delete text in multiple table 9.0.00,
7.6.04,
7.6.03
RTF fields SW00363912 In modify mode, dynamic resizing of RTF fields fails when you switch among panels 9.1.00,
(that were initially collapsed) with RTF Auto Resize set to Vertical in a flow layout
9.0.00,
panel.
This issue occurs in all browsers. In create mode, dynamic resizing works for RTF 8.1.00,
fields.
Only the Collapsible and Accordion panels are affected. 8.0.00,
7.6.04,
7.6.03
RTF fields SW00379854 Inline RTF fields are not supported on floating panels. 9.1.00,
Workaround: Use non-inline RTF fields.
9.0.00,
8.1.00,
8.0.00,
7.6.04
RTF fields SW00383294 In an RTF field with an append menu option, irrespective of where the cursor is set, 9.1.00,
the menu value is always added at the end of the text.
9.0.00,
8.1.00,
8.0.00,
7.6.04,
7.6.03
RTF fields SW00415604 The following are the Rich Text Formatting (RTF) fields open issues for the release: 9.1.00,
SW00414089: When you select the text in the RTF editor and press the Delete 9.0.00,
key,
8.1.00,
an empty box appears in the editor.
SW00411835: After adding an Expand section and typing some text in the
8.0.00
RTF editor,
if you expand and close the section on Internet Explorer 9, the text appears
twice for some time
and then the field refreshes. Also, if you expand the section again, the text
might not display for some time.
SW00410112: When you open a form with an RTF field in Internet Explorer 8
and create a table,
if you then use the mouse to select the table, the table is not highlighted to
identify the selection.
On Firefox, the table border changes to light blue to indicate the selection.
SW00414748: After you click the Spell Checker option on the RTF editor,
if you move the RTF editor to the browser borders, the Spell Checker window
moves or appears outside the browser.
SW00414538: When you enable the Show/Hide Hidden Elements option in an
RTF field in Safari 5.0.5
and close the RTF editor, the option is not enabled when you re-open the
editor.
SW00414535: The Spell Checker option is enabled even when there is no text
in the RTF editor.
SW00402639: Even though the font size is 14, on Internet Explorer 8 the text
appears with
font size 10 in the Expand section Header and the text area.
SW00412246: The Line spaces appear small in the RTF fields and the line
space between the lines
differs in the RTF field and RTF editor. Also, the spaces between the text and
line display differently
in edit mode and display mode.
SW00415767: The spell checker removes some special characters on
Internet Explorer 8.
SW00411837: You cannot cut, copy, and paste the RTF field Expand section
easily on Internet Explorer 9.
SW00411557: You must copy the RTF field Expand section precisely on
Firefox to
copy and paste the section, otherwise the section is not pasted correctly.
SW00416496: In Firefox browsers, the spell checker does always not highlight
all instances of misspelled words.
Also, when you click the Spell Checker option for the second time, sometimes
the Spell Checker window
does not display a message about no misspelled words found.
(These issues only occur when you copy and paste from an outside editor
such as Word.)
SW00414056: Sometimes the cursor is automatically set to the second line
when you open an
RTF editor or set focus to an RTF field.
SW00418290: The spell checker deletes the leading white space above the
Expand section in Internet Explorer.
SW00419728: When you copy the text from an RTF field and pasted in an
another RTF field,
the font size appears different. Also, the font size differs in the Display mode
and Edit mode.
The font size is smaller in the Display mode.
RTF fields SW00424720 The following are the Rich Text Formatting (RTF) fields open issues for the release: 9.1.00,
SW00417023: The spell check feature does not work correctly on double byte 9.0.00,
characters.
8.1.00,
For example, if you add some Chinese words in RTF field, the correct words
are also highlighted. 8.0.00
Note: If you provide space in between the words, the spell check works.
But, the sentence in Chinese must not contain space between words.
SW00417266: The spell check feature does not work correctly on Russian
locale.
If you add some Russian words in RTF field, the correct words are highlighted
and also
does not display words in the suggestion list with the correct spelling.
SW00424712: If you open RTF editor on Internet Explorer 8 and press Enter
while typing
text in the table or the Expand section, the cursor does not appear or move to
the next line.
SW00425010/SW00423983: If you click the strikethrough or underline options
to
apply text formatting in the Expand section and again click the options to
remove formatting,
the options does not work correctly on Firefox or Safari.
On Firefox, to remove the formatting you must highlight the text again
and
include empty line on top and bottom of the text.
On Safari, the strikethrough option applies underline formatting and the
underline option
applies strikethrough formatting to the text.
SW00425333: On Firefox, after you delete an Expand section by selecting the
small delete icon
on the border of expand section, if you add a new Expand section, the section
is not added.
None: Double click on the suggestion list in Spell Checker causes unexpected
results.
You must always perform single click to select a word from the suggestion list.
RTF fields SW00425997 The data length in RTF fields has been increased to support the text formatting in the 9.1.00,
fields.
9.0.00,
8.1.00,
8.0.00
RTF fields SW00466155 The Cut, Copy, Paste toolbar options are supported only by Internet Explorer. Other 9.1.00,
browsers like Firefox,
9.0.00,
Safari, and Chrome support only the keyboard shortcuts for these options (Ctrl+X,
Ctrl+C, Ctrl+V). 8.1.02
Report SW00353206 After deleting fields from a Web report with the Report Console report designer, 9.1.00,
Console an exception is issued when you run the report. Also the Web report is not
9.0.00,
updated after you remove, add, or rename fields. Instead, deleted fields still appear
as a report column, 8.1.00,
added fields do not appear in the available field list, and field names do not change
after being renamed. 8.0.00,
7.6.04,
7.6.03
Report SW00504816 BMC Remedy AR System 9.1.00 does not support reports that have"&" in the report 9.1.00,
Console name. This is a knows issue and presently there are no plans to fix the same.
9.0.00,
The following error is displayed when you process reports that have"&" in the report
8.1.00
name. AR ERROR [9246] Cannot find report reportName of type
reportType for form formName on server serverName. Please see
your administrator.
Assignment SW00465674 When you modify the thread count from the Server Settings in the Assignment 9.1.00,
Engine Engine Administration Console,
and run any process that invokes the AE_CACHE DoCache command, 9.0.00,
the Assignment Engine Cache thread process never finishes. For example, 8.1.01
if you modify the thread count and run the Assignment Engine sanity check, the
check fails.
Workaround:
When you change the thread counts in Assignment Engine, shut down and restart
the AR System Server.
This process terminates the Assignment Engine server and the armonitor restarts the
Assignment Engine server.
Flashboards SW00507425 Data collection randomly runs several times a day when you configure a variable on
a Flash Board server and schedule it to run once daily.
Flashboards SW00438995 If you manually deploy version 9.1 flashboards on the same computer and in the 9.1.00,
same path
9.0.00,
and folder where you have an earlier version of the flashboards binaries already
deployed to 8.1.00,
support remote flashboards, the BMC Remedy Flashboards 9.1 installation fails.
8.0.01
Workaround:
Perform either one of the following actions:
Encryption SW00481606 The BMC Remedy Encryption Performance or BMC Remedy Encryption Premium 9.1.00,
Security installation
9.0.00
is not required on java clients if the AR System server uses RC4 with a 128-bit key
for data encryption.
Migrator SW00510023 The Change.arx import fails when you perform Delta Data Migration.
Migrator SW00504747 The following error is displayed and the BMC Remedy Migrator fails when you use
AR System server 9.x or earlier:
Migrator SW00506023 When you try to migrate a form using BMC Remedy Migrator, the migration is
successful but the fields are not migrated properly. Also, BMC Remedy Migrator
takes around 30 minutes to complete the migration process.
Migrator SW00436853 When an object's permission is set to Additive overlay and new permissions are 9.1.00,
added to the overlay object, the destination server displays duplicate entries
for the existing base permissions after migration. 9.0.00,
For example, if a Struct Admin permission exists for a base form and you add the 8.1.00,
Struct Subadmin permission in the additive overlay, after migration Developer Studio
displays a duplicate entry for Struct Admin as added-in overlay. 8.0.01
Migrator SW00362555 The BMC Remedy Migrator Command Line Interface (CLI) takes a long time to 9.1.00,
generate
9.0.00,
the .migrator file on the BMC Remedy IT Service Management (ITSM) stack.
The size of the .migrator file cannot exceed 2 GB. 8.1.00,
Workaround: Instead of creating the .migrator file for the whole stack, 7.6.04,
create it in chunks based on object types.
7.5.00
Migrator SW00499968 During migration or comparison, the migrator searches for AP: 9.1.00,
Tooltip_Information_Archive form on the source server and destination server using
9.0.01,
the AR_Archive_Forms.xml file. As the BMC Remedy AR System server stores the
form with name AP:ToolTip_Information_Archive, the migrator returns the following
9.0.00
error:
Workaround:
AR System SW00503919 When you disable the Full TextSearch workflow option from the Full Text Search tab 9.1.02
server on the Server Information form, the filter workflow ignores theFull Text Search
workflow setting.
AR System SW00504143 A large chunk of memory is allocated to an Apache database connection pooling 9.1.02
server (dbcp) component in the AbandonedObject pool. As a result, the Apache database
connection pooling component does not release the memory and the AR System
server stops responding.
AR System SW00504347 The AR System server does not honor the high value set on the License Time-out 9.1.02
server configuration tab of the Server Information form. For example, 2000.
AR System SW00504762 Starting with BMC Remedy AR System 9.x, a filter on a Set Field action with 9.1.02
server concatenation operation does not work. For example, Name = Fname+ " " +Lname.
AR System SW00506374 When using a Filter Set Fields action with direct SQL on an Oracle database, the 9.1.02
server following error occurs:
ARERR [8790] Unknown system error : java.lang.
NumberFormatException: For input string: "0THEN2END[@index=0.
AR System SW00509753 In the ar.cfg file, the Db-Host-Name is overwritten by the value in the Central 9.1.02
server Configuration due to cross-contamination with other environments that the user has.
AR System SW00509930 The users authorized for floating licenses gets the read-only licenses even though 9.1.02
server & the floating licenses are available. The licenses are not reused.
SW00509934
AR System SW00510441 In the Change Management console, when you create a Business Events Time 9.1.02
server Segment (Unavailable) and schedule a change during the same business events
change freeze time, the change request is saved without any warning.
AR System SW00511595 When you log in to the Administration console as a Smart Reporting Administrator, 9.1.02
server the rowLimit parameter of the JDBC connection does not honor the value set for
the rowLimit parameter on the Data Source tab. Instead, it considers the getList
parameter value set on the AR System server.
AR System SW00512204 (Linux or UNIX operating systems) When you run plug-in logging at Finest and use 9.1.02
server the Server Admin Console to update the configuration, the UNIX binary file
libarnativesignal.so writes messages to the stderr console rather than the plug-in log.
AR System SW00512421 When you take a backup of the BMC Remedy AR System 7.6.04 SP2 and you 9.1.02
server restore the backup on a new server and run an upgrade for BMC Remedy AR
System 9.1, the upgrade completes with thefollowingerror:
AR System SW00512751 When you create a filter on a join form with the Notify action type as email, which 9.1.02
server is triggered on the Modify action, the Notify action does not contain the value for
fields available for selection.
AR System SW00512697 When you add FTIndexed fields to a join form with many records (for example, >= 1 9.1.02
server million), the reindexing takes a very long time to complete.
AR System SW00513864 When you add FTIndexed fields to a join form with many records (for example, >= 1
server million), the reindexing takes a very long time to complete because of the method of
chunking.
AR System SW00512349 When you configure an LDAP server that does not support sorted and paged 9.1.02
server searches, the following error occurs in the Java plugin:
ERROR (3377): The LDAP operation has failed; javax.naming.
OperationNotSupportedException: [LDAP: error code 12 -
Unavailable Critical Extension];
AR System SW00512848 When you create an external web service that uses only SOAP 1.1 protocol and you 9.1.02
server & invoke that web service by using the AR filter, the data is not populated in a form and
SW00513881 the following error occurs:
AR System SW00513372 The recovery thread for the Full Text Search does not process the records that are 9.1.02
server left out in FT Pending , after the last FTS indexing job.
AR System SW00513631 BMC Remedy AR System 9.1 does not recognize the Run If qualification in some of 9.1.02
server the workflows that have a field value NULL.
AR System SW00513744 When you create a WSDL URL handler and consume a web service, the AR System 9.1.02
server server 8.1 with BMC Remedy Mid tier 8.1 creates a single record in the
TestWebServiceRequest form whereas the AR System server 9.1.00.001
201606141104 with BMC Remedy Mid tier Version 9.1.00 201512160229 creates
two records in the TestWebServiceRequest form.
AR System SW00513809 When you run an SQL query on the TMS:TaskInterface form, the query takes more 9.1.02
server than two hours to complete.
AR System SW00513870 When you try to modify existing records by using a complex web service that has 9.1.02
server parent/child records on a join form, ARERR 326 and ARERR 302 errors occur.
AR System SW00513892 When you create an active link that performs a set fields operation using a SQL 9.1.02
server statement against any AR form, the SQL statement runs twice.
AR System SW00513955 When the File System runs out of space,the ar.conf and the ar.conf.bak files become 9.1.02
server zero byte.
AR System SW00513929 Excessive memory usage is encountered duringFull Text indexing because the AR 9.1.02
server System server retrieves all the table fields from the database forFull Textindexing,
but uses only the character field data.
AR System SW00514518 The AR System server stops responding to Administrative operations if you enable 9.1.02
server Server Events and attach a custom workflow to the Server Events form that performs
an Email notification or a Push Field action that creates and deletes a record.
AR System SW00514536 During BMC Remedy IT Service Management upgrade, the memory leak occurs 9.1.02
server when there are repeated occurrences of the following error:
AR System SW00514546 The Full Text Search re-indexer takes longer time than expected for indexing the 9.1.02
server large tables.
AR System SW00514616 You cannot add a Currency field on the archived form. 9.1.02
server
AR System SW00514650 When you have an escalation that has Run-if qualification associated with a Vendor 9.1.02
server form, an exception occurs.
AR System SW00514864 SNMP crashes on snmpget and snmpwalk on i d s 29, 30 and 31. 9.1.02
server
AR System SW00514989 When you enable Full Text Search on Join form, the AR System server does not 9.1.02
server honor the Full-Text-Search-Threshold-Low configuration setting and does not use a
temporary table to perform the query but creates a giant WHERE clause that results
in the stack overflow.
AR System SW00514702 When you upgrade to BMC Remedy AR System 9.1 and add a group, the AR 9.1.02
server System server does not start. The AR System server shows AR Error 8790 ,
instead of showing the correct error that indicates corruption in a group cache.
AR System SW00514994 When you enable theFull Text re--indexer for a table field, the AR System server 9.1.02
server consumes all the memory and stops responding.
AR System SW00514761 When you import a new filter for updating an existing filter that has an overlay and an 9.1.02
server error handler, the following error occurs:
AR System SW00515297 The floating lienses are not assigned under certain circumstances when the license 9.1.02
server count in the session list is less than the count of reserved licenses in the reserved
pool list.
AR System SW00514836 When you register a user on the AR System Alert User Registration form, an alert is 9.1.02
server created on the Alert Events form, but an alert message is not sentbecausethe
ARSYS.ALRT.WEBSERVICE plug-in is not initialized.
AR System SW00515433 When you create a filter with Set field on submit or modify action to push the 9.1.02
server value from a Real Number field to a Currency field, the record is not updated if you
modify the value in the Real Number field.
AR System SW00515753 In a server group environment, when the Admin server is down and the secondary
server server has not picked up the admin server operations, requests pending from
Hierarchical Group might accumulate.
AR System SW00516587 When you install the AR System server in a server group and the server has multiple
server IP addresses, the server group JSM signing does not work.
BMC SW00514105 When you install BMC Remedy AR System 9.1.00, the BMC Remedy Approval 9.1.02
Remedy Server fails.
Approval
Server
BMC SW00508630 When you create custom menus in the Base Stack, the custom menus are shown as 9.1.02
Remedy deleted in the Objects changed in Base.
Developer
Studio
BMC SW00515529 When you create a character field on a form and set an attribute property to
Remedy $LOWER$, the value does not fall within the limits specified for the field and the
Developer following error occurs:
Studio
(Field ID - , Pattern - $LOWER$) (ARERR 306).
BMC SW00507653 When you have the same names for incoming and outgoing mailboxes on the AR 9.1.02
Remedy System Mailbox configuration form, the outgoing emails work fine but the incoming
Email emails does not reach to the incoming mailbox .
Engine
BMC SW00506702 When you create a page on the mid tier, you can use the same S Token to execute 9.1.02
RemedyMid some other request.
Tier
BMC SW00509531 When you issue a BMC Remedy IT Service Management Broadcast, a security 9.1.02
RemedyMid & vulnerability occurs because the cookie value is exposed.
Tier SW00510777
BMC SW00513867 The jQuery 3rd party library used by the mid tier is vulnerable to cross-site scripting. 9.1.02
RemedyMid
Tier
BMC SW00514153 When you download the MidTier.war file from Electronic Product Download site and 9.1.02
RemedyMid deploy BMC RemedyMid Tier 9.1 SP1 on WAS, you cannot access BMC
Tier RemedyMid Tier.
BMC SW00514589 (Internet Explorer and IBM AppScan only) A security vulnerability is detected when 9.1.02
RemedyMid you log in to BMC Remedy Mid Tier.
Tier
BMC SW00514591 When you log in to the mid tier and create a deployable application, the application is 9.1.02
RemedyMid displayed in the Mid Tier Object List.
Tier
BMC SW00514804 When you try to load the following forms on the Landing console, the forms are not 9.1.02
RemedyMid displayed as expected because the groups are populated erroneously in the udd.js
Tier file:
HPD:HomePageContent:RL_IncidentConsole
CHG:HomePageContent:RL_ChangeConsole
HPD:HomePageContent:RL_IncidentWatchList
PBM:HomePageContent:RL_ProblemConsole
BMC SW00514596 When you access any form with a new group combination, the mid tier makes an 9.1.02
RemedyMid extra API call to fetch the display properties of the fields, which causes performance
Tier issue.
BMC SW00513262 Smart reporting cross launch(Hyperlink) is not working in 9.1, an error occurs and 9.1.02
Remedy you are re-directed to the following link:
Smart https://smartrept91-mar.onbmc.com/onboarding/router.jsp?
Reporting midtierUrl=http://lausd-dev.onbmc.com/arsys/forms/onbmc-s/SHR%
3ALandingConsole/Default+Administrator+View/?mode=search%
26F304255500=HPD:Help%20Desk%26F1000000076=FormOpenNoAppList%
26F303647600=SearchTicketWithQual%26F304255610=%271000000161%
27=%22INC000000000653%22&smartitUrl=http:///ux/smart-it/#
/search/INC000000000653/
BMC SW00514774 When you use the predefined function CurrentDate() in a report, the report does not 9.1.02
Remedy work and the following error occurs:
Smart Ambiguous column name 'CurrentDate.
Reporting
BMC SW00515188 When token information is present in the URL, a security vulnerability occurs. This 9.1.02
Remedy token information can be misused by any attacker.
Smart
Reporting
BMC SW00515193 When you design the out-of-the-box Incident Number Hyperlink field or any Hyperlink 9.1.02
Remedy fields with http URL, the follwoing error occurs:
Smart The Connection was reset..
Reporting
BMC SW00517080 When you log in to the Admin console and perform BMC Remedy IT Service
Remedy Management or BMC Atrium CMDB import content to BMC Remedy AR System
Smart 9.1.02, the content import fails and the upgraded contents are not displayed along
Reporting with the existing contents.
Plug-in SW00515565 When you start the AR System server after performing a fresh installation on UNIX
server and you open the Vendor form through BMC Remedy Developer Studio, the
following error message appears in UNIX:
INFO - Process [ Process_2 ] stopped with return code - [ 1 ]
and error - [ arplugin: unable to create (390695, 19101) for
tcp6.
arplugin: unable to create (390695, 19101) for tcp.
AR System SW00500600 When non-admin users access overlay fields on a regular form, the following error 9.1.02
server occurs :
ARERR 333 You have no access to field.
AR System SW00501400 In several workflow elements, the qualification that contains the date calculation is 9.1.02
server corrupted. The date displays an erroneous year as follows:
'Create-Date' > ($TIMESTAMP$ - "1/1/1970 5:30:00 AM")
AR System SW00501477 When you try to modify any incident through the Incidence Management Console, 9.1.02
server the following errors occur even though the floating licenses are available:
AR System SW00498825 The following error occurs because a process performed by set field active link fails 9.1.02
server and AR System server cannot parse the Currency sub-field in application command:
AR System SW00502450 After a successful DSO transfer, the DSO server does not update the Transfer status 9.1.02
server because the server incorrectly identifies a regular form as an archive form.
AR System SW00502203 When you try to import data from the .arx file by using the Import Tool, the following 9.1.02
server error is displayed:
AR System SW00502524 When you run the BMC Remedy AR System 9.1 installer on BMC Remedy AR 9.1.02
server System 8.1.02, the BMC Remedy AR System upgrade fails and the following error is
displayed:
ARERR 552 The SQL database operation failed.
AR System SW00503563 When you consume a web service, the AR System server does not perform input 9.1.02
server mapping for the web service.
AR System SW00502835 If the AR System is Unicode and you use an Oracle database, the AR System server 9.1.02
server generates an SQL (SELECT query) that contains an N, which results in a
performance issue.
AR System SW00503941 When you use the DROP FUNCTION [dbo].AR_RLS_split query and restart the 9.1.02
server AR System server, the AR System server does not start due to the database lock
created by some other server in a server group.
AR System SW00503991 When you log in to the Administration Console as a Smart Reporting Administrator, 9.1.02
server for the row limit value, the JDBC connection uses the getList parameter value that
is set on the AR System server rather than the actual rowLimit parameter value
that is set on the Data Source tab.
AR System SW00504063 When you upgrade to BMC Remedy AR System 9.0, the Server Statistic Report on 9.1.02
server & the Server Information form shows the following incorrect values:
SW00504067
the Statistics field does not show the correct number of currently logged-in
users.
The value of Server- Registered Users is populated from the Manage User
Licenses Console.
Fixed and floating write licenses do not show the correct values.
AR System SW00504219 When the AR System server escalation has $TIMESTAMPS$ as a keyword in a run 9.1.02
server if qualification, an error occurs.
AR System SW00504150 When you create a time-based escalation on the Vendor form to push records to the 9.1.02
server target form, the escalation queue processes only 2000 records on the Vendor form
and then stops.
AR System SW00504789 In BMC Remedy Developer Studio, when you delete overlays of an application, the 9.1.02
server entry in AR System Application State form for that particular application is also
deleted.
AR System SW00503851 When the service owner of AR System server is a non-admin local user, the AR 9.1.02
server System server does not start.
AR System SW00505006 If you have already updated BMC Remedy AR System 7.6.04 with BMC Remedy IT 9.1.02
server Service Management 7.1, a failure occurs if you try to upgrade to BMC Remedy AR
System 9.0.01.
AR System SW00506705 When you open the Approval Central Console as a non-admin user and set the 9.1.02
server Disable-New-RLS-Implementation property in Centralize Configuration to True
, the following error occurs:
AR System SW00505828 When you create a new record on a form and modify the new entry by entering text 9.1.02
server in the Audit Log field, the field is not populated with the new text.
AR System SW00506811 When you change field IDs of custom fields from a range specified by BMC to a 9.1.02
server custom range, the archgID program in the AR System server directory stops
responding.
AR System SW00506200 In BMC Remedy AR System 9.0.01, if you use the STRIPHTML function in a filter, 9.1.02
server the function does not strip out comments the same way as it strips out in BMC
Remedy AR System 8.1.
AR System SW00506582 When Audit property is set to a field and you set the same value for the field 9.1.02
server repetitively, a new entry is created every time.
AR System SW00506874 When the AR System server is a member of a server group with different names 9.1.02
server defined for Server-Name and Server-Connect-Name, the AR System server does not
clear the entry in the AR System Current License Usage form after a restart. The
SQL query that the server uses to delete the record from the T table of the AR
System Current License Usage form contains the incorrect server name.
AR System SW00508140 In BMC Remedy AR System 9.0 and later, you cannot use brackets ([ ]) as delimiters 9.1.02
server to search a string. For example, you cannot search for the string [LOGBOOK].
AR System SW00508257 When you run a Full TextSearch on the Oracle database, the AR System server 9.1.02
server creates temporary tables using incremental names. The result is too many GLOBAL
TEMPORARY TABLES on the Oracle database.
AR System SW00507176 When escalations have Direct SQL actions in filters, database deadlocks might 9.1.02
server occur. These deadlocks occur because Direct SQL updates entries that are already
updated in the escalation transaction.
AR System SW00508335 When you change the form type from Audit to Regular, the AR System server flags a 9.1.02
server regular form as an audit form .
BMC SW00504765 An error occurs when you set the Required Justification of Rejection field to Yes on 9.1.02
Remedy the AP:Process Definition form. The change request remains in Request For
Approval Authorization status and does not move to Rejected status.
Server
BMC SW00506704 The following error occurs when you open the Approval Central Console as a non- 9.1.02
Remedy admin user and set the Disable-New-RLS-Implementation property in
Approval Centralize Configuration to True:
Server
-GLEWF FAIL java.lang.NullPointerException: null.
BMC SW00507889 In BMC Remedy Developer Studio, when you click Create Snapshot the snapshot 9.1.02
Remedy file .xml is not created but a message which says that the snapshot is created
Developer appears.
Studio
BMC SW00469801 When you send an email that is localized in German with an attachment, the umlauts 9.1.02
Remedy in the email body are corrupted.
Email
Engine
BMC SW00507657 When you start the BMC Remedy Email Engine service before starting the AR 9.1.02
Remedy System server, the following error occurs and the BMC Remedy Email Engine fails to
Email connect to the AR System server :
Engine
ERROR (90): Cannot establish a network connection to the AR
System server; Connection refused.
BMC SW00502274 After you upgrade to BMC Remedy AR System 9.1, the BMC Remedy Flashboards 9.1.02
Remedy does not start because the following variables are missing from the server.sh
Flashboard script:
flashInstallPath=
JAVA_DIR=
JAVA_BIN=
JAVA_LIB=
BMC SW00499985 You cannot modify the Incident tasks because the Active Link workflow sets an 9.1.02
RemedyMid incorrect value for a field name on the form.
Tier
BMC SW00501818 (Internet Explorer 11) When you select any CI on Asset Management Console, the 9.1.02
RemedyMid two Character type fields are not clickable.
Tier
BMC SW00502416 (Internet Explorer 11 and Google Chrome) You cannot add images to a Knowledge 9.1.02
RemedyMid Article by using Rich Text Format editor. If you try to add an image, the image
Tier disappears and only an x is displayed.
BMC SW00505034 When you schedule Atrium Integrator jobs and web reports for a weekly occurrence, 9.1.02
RemedyMid the Atrium Integrator version 9.0.01 and BMC RemedyMid Tier 9.1 cannot create a
Tier consistent job schedule.
BMC SW00508296 When you create a knowledge article that has a dollar sign ($) in the title and you 9.1.02
RemedyMid search for that article from the RKM:Search dialog box, the Remedy Knowledge
Tier Management search result page is corrupted.
BMC SW00505215 When you use the Run process of an active link on a form for a Table Refresh 9.1.02
RemedyMid event, a Caught exception occurs in the BMC RemedyMid Tier. When you login to
Tier BMC RemedyMid Tier and create an iframe SVG request, the file path or location is
exposed, which is considered a security vulnerability.
BMC SW00505069 If you log in toBMC Remedy Mid Tieras a non-admin user and access a form that 9.1.02
RemedyMid has overlays, the Table field disappears.
Tier
BMC SW00505405 The Real data type field on any form does not display the precise value. The 9.1.02
RemedyMid expected value is displayed intermittently.
Tier
BMC SW00507438 When you perform a search on the SRS:ServiceRequest Console, some of the 9.1.02
RemedyMid search results are not formatted and sorted as expected.
Tier
BMC SW00507804 When you log in toBMC Remedy Mid Tierand create an iframe SVG request, the file
RemedyMid path or location is exposed, which is considered a security vulnerability.
Tier
BMC SW00505632 A thread error occurs when you use BMC Remedy Migrator 9.x with an AR System 9.1.02
Remedy server with a version earlier than 9.x.
Migrator
BMC SW00501587 In BMC Remedy Smart Reporting, the following error occurs when you try to import 9.1.02
Remedy the AdminReports.xml file to load the admin reports:
Smart
ERROR (DBAction:A) - Error occurred when connecting to the
Reporting
database: java.sql.SQLException: ORA-01017: invalid username
/password; logon denied.
java.sql.SQLException: ORA-01017: invalid username/password;
logon denied.
BMC SW00506190 If you have the latest version of BMC RemedyMid Tierand you install BMC Remedy 9.1.02
Remedy Smart Reporting 9.1.01, an error occurs because they are not compatible.
Smart
Reporting
BMC SW00506325 When you run BMC Remedy Smart Reporting 9.0 Service Pack 1 installation files 9.1.02
Remedy and select the Oracle database, the following error occurs and database validation
Smart fails:
Reporting
REPORTING_DB_INSTANCE and installation cannot be proceeded.
BMC SW00506835 If you try to open BMC Remedy Smart Reporting 9.1 during installation, the
Remedy YellowFin page appears, the installation fails, and the following error is displayed:
Smart
Reporting Problem installing Smart Reporting in deploying.
BMC SW00509558 When you generate a notification with Process-Due-Notify command, the BMC 9.01.01
Remedy & Remedy Approval Server stops the Approval Engine because it cannot approve the
Approval SW00514494 records.
Server
BMC SW00513457 When you set the Allow Ad-hoc Approvers field to Anyone on the Approval Process 9.01.01
Remedy Definition form, the Approver Signature is not generated and the approvals for the
Approval Service Request Management and Change remain in the Waiting for Approval
Server status.
BMC SW00513440 (German locale) When you log in to the Approval Central and select the status value, 9.01.01
Remedy ARERR 1588 occurs.
Approval
Server
BMC SW00512239 The BMC Remedy Approval Server is not installed and the sanity check is not 9.01.01
Remedy performed because the BMC Remedy AR System installer does not deploy
Approval arapsignal91_build001.dll for Microsoft Windows or librarapsignal91_build001_32.s0
Server for UNIX if all of the following conditions are true:
You run the BMC Remedy AR System installer to install BMC Remedy AR
System 9.1.
You provide both 64-bit and 32-bit java paths.
You set Allow custom plugins that use the AR Java API of BMC Remedy AR
System 7.1 or earlier on the Java Information User Input tab.
BMC SW00513336 When a change request is rejected, the BMC Remedy Approval Server shows the 9.01.01
Remedy status as approved because of the thread synchronization issue in the BMC Remedy
Approval Approval Server.
Server
BMC SW00513345 On the Change Management Console, the records remain in the Request for 9.01.01
Remedy Authorization status and the items under Changes move directly to Scheduled
Approval phase.
Server
BMC SW00513361 A race condition occurs on the BMC Remedy Approval Server under the following 9.01.01
Remedy & conditions:
Approval SW00513447
Server You create an approval for two or more support groups.
You generate a signature for all the groups.
The users of the groups simultaneously approve or reject the requests.
AR System SW00508561 In the Service Request Management workflow if you have the $PROCESS$ 9.01.01
server SECURITY-FILTER $Fieldname$ command in a set field action of a filter, the
following error occurs:
AR System SW00513452 When you run a QBE (Query By Example) search for any form that has at least two 9.01.01
server fields indexed for theFull TextSearch, the search result returns records that match
either of the QBE search criteria instead of both.
AR System SW00513362 When the workflow executes a special process to trigger an approval, the AR 9.01.01
server System server creates a corrupted record in the Application Pending form. When the
AR System server creates a corrupted record, the dispatcher thread stops
responding.
AR System SW00508711 When you upgrade to the BMC Remedy AR System 9.1 and you try to submit or 9.01.01
server modify any request on any form, AR WARNING 66 is displayed.This problem occurs
because the filter associated with the form does not run.
AR System SW00508851 When you run FTS on the Oracle database, the AR System server creates 9.01.01
server temporary tables using incremental names. The result is too many GLOBAL
TEMPORARY TABLES on Oracle database.
AR System SW00509624 When you update the number of floating licenses on Add Remove License form, the 9.01.01
server same floating write license is allocated to the same user more than once even
though the user already has a license.
AR System SW00509921 The AR System server does not execute the UNIX Shell Run processes as 9.01.01
server mentioned in ar.cfg or ar.conf options A-B(https://docs.bmc.com/docs/display/public
/ars91/ar.cfg+or+ar.conf+options+A-B).( ADD link in actual page link ). Also, you can
execute the Run process for an Active Link from any directory and not from the
directory mentioned in ar.cfg or ar.conf options A-B (https://docs.bmc.com/docs
/display/public/ars91/ar.cfg+or+ar.conf+options+A-B).( ADD link in actual page link )
AR System SW00510222 When you run the BMC Remedy AR System installer files to install BMC Remedy AR 9.01.01
server System 9.1 and provide both 64-bit and 32- bit java paths, the BMC Remedy AR
System installer selects 32-bit java path instead of selecting 64-bit java path.
AR System SW00510397 When you reimport any regular form by changing the Diary entry multiple times, an 9.01.01
server invalid number is displayed as the number of change diary entries.
AR System SW00510501 If you use the ARSYS.REMEDY.LDAP plugin to create a Vendor form and you 9.01.01
server include a filter that is triggered when you click the Display radio button, the data
fields in the filter are empty.
AR System SW00510724 When you upgrade to the BMC Remedy AR System 9.1, the AR System server 9.01.01
server consumes a lot of temporary table space , which does not release the table space.
AR System SW00510892 When you create a custom form and write a custom filter for the submit or modify 9.01.01
server action by setting the default value to $User$, the custom filter fails.
AR System SW00511125 In a server group, when the primary server is down, the secondary server performs 9.01.01
server all the administrative operations successfully. However, when the primary server is
operational again, it does not resume all the administrative operations from the
secondary server.
AR System SW00511178 If you use a date calculation to create a Service Target on the Service Level 9.01.01
server Management Console, null pointer exceptions occur and you cannot submit the Work
Order with the Service Target.
AR System SW00511246 When you use a web service, the web service fails to create or update data into the 9.01.01
server child form in the following scenarios:
AR System SW00511284 When you enable FTS on the AR System server and keep the FTS as single 9.01.01
server threaded, more than one thread is opened.
AR System SW00511442 When you create a table in the database that has an Identity column and you modify 9.01.01
server the table using the View form, the following error occurs and the primaryKeyField is
not updated:
The SQL database operation failed. : Cannot update identity
column 'primaryKeyField'. (ARERR 552) error.
AR System SW00513348 When you send a CreateEntry call from a web service, performance degradation 9.01.01
server occurs because of excessive SELECT calls on the database.
AR System SW00513359 When you fetch an attachment through a web service, unnecessary database calls 9.01.01
server are done. As a result, the performance is affected. <<Talk to Amruta>>
AR System SW00512105 When you export all the records from the AR System Server Group Operation 9.01.01
server Ranking form in .arx format and delete all the records and entries from
servgrp_board table and then try to import the exported file by using the Import Tool,
the following error occurs:
You cannot import the records to the AR System Server Group Operation Ranking
form.
AR System SW00512176 When you use the Accelerated method for upgrading to BMC Remedy AR System 9.01.01
server 9.1, the installation is completed successfully but the 9.1 features are not upgraded
and no errors are displayed.
AR System SW00512181 On AR System Administration Console, when you click the Apply button after 9.01.01
server changing any setting on the Centralize Configuration tab, the BMC Remedy Mid Tier
displays the following warning multiple times :
AR System SW00512206 In BMC Remedy AR System 9.x and later, if you use brackets ([ ]) with the LIKE 9.01.01
server operator, the qualification passes without matching the string.
AR System SW00512211 When you consume a web service through any filter that has field mapping for the 9.01.01
server parent form and the child forms, the AR System server does not send data if the field
mapping for the child form is specified between the field mapping of the parent form.
AR System SW00512317 When you compare the currency values in the Run-if filter and the currency ratio is 9.01.01
server not defined, the following null pointer exception occurs:
AR System SW00512429 When a role is mapped to a public group and the public group user tries to create a 9.01.01
server record by accessing an application, a permission-related error occurs.
AR System SW00512431 In the BMC RemedyMid Tier, if you open any form and submit or modify entries, the 9.01.01
server input document that is sent by the AR System server and logged in the server log
does not contain the mapped values.
AR System SW00512525 On a form, if you create a full-text-enabled field that includes a - (minus) sign, and 9.01.01
server you perform an advanced search, the search does not work as expected.
AR System SW00512498 Through Smar Reporting Console if you try to create a report that consists of a 9.01.01
server UNION operator in a SELECT query with joins, the following error occurs:
ERROR (8790): Unknown system error; java.lang.
ClassCastException: com.bmc.arsys.domain.query.impl.
JoinQuerySource cannot be cast to com.bmc.arsys.domain.query.
impl.FormQuerySource. Please check the SQL syntax and try
again.
AR System SW00512783 The Java Message Service (JMS) does not clean up the files in the kahaDB folder 9.01.01
server that stores the messages. Consequently, the entire disk spacesisconsumed.
AR System SW00513055 The integration between BMC Atrium CMDB and BMC TrueSight does not work in a 9.01.01
server server group environment. As a result, the administrative operations fails.
BMC SW00512876 In BMC Remedy Developer Studio, when you right-click the Object List on theHpd: 9.01.01
Remedy HelpDesk form, the Object Relationship takes more than 30 minutes to load.
Developer
Studio
BMC SW00508999 On the Incident Management console, the following issues occur if you open a field 9.01.01
RemedyMid editor pop-up or a form that is smaller than the default size of the editor and then
Tier expand it:
You can only close the pop-up by pressing the Esc button on the keyboard.
BMC SW00511789 When you expand the expand box of a Character field on a regular form, a security 9.01.01
RemedyMid vulnerability occurs.
Tier
BMC SW00512641 When you consume any web service on a regular form by using a filter, the web 9.01.01
RemedyMid service communication fails if the data contains emoticons.
Tier
BMC SW00512863 When data contains emoticons, the web service communicationfailsand the XML 9.01.01
RemedyMid response is blank.
Tier
BMC SW00513379 (Google Chrome) When you access the Google Chrome Work Order Console to 9.01.01
RemedyMid open a new work order, the System Information portion under the Date/System tab is
Tier not visible.
BMC SW00513397 On the Incident Management Console, when a record has ASCII character in one of 9.01.01
RemedyMid the fields and you fetch this record through a web service GET operation, the AR
Tier System server version 9.1 does not return any data.
BMC SW00510918 When you log in to the BMC Remedy AR System 9.0, the Submit Date field is not 9.01.01
RemedyMid visible on the Work Order form .
Tier
BMC SW00512933 When there is script type data in a Character field on a regular form, a security 9.01.01
RemedyMid vulnerability occurs.
Tier
BMC SW00511446 When you run Delta Data Migration without selecting BMC_PN: Class and Attribute 9.01.01
Remedy Definition, an error occurs.
Migrator
AR System SW00513538 When you define two floating licenses on the Group form and you have three floating 9.01.02
server users, all three users get the Write license.
AR System SW00513581 The Web service SET operation shows AR Error 326 for fields that are not used in 9.01.02
server input mapping.
AR System SW00513820 The search function is very slow in the following cases: 9.01.02
server
When you search a Remedy Knowledge Management article with any of the
template in the following scenarios:
a. When a user has too many groups.
b. When the Full Text Temporary Table threshold setting is larger than the
default value of 200.
The multi-form search is very slow in the following scenarios:
a. When you search on a join form.
b. When row-level security is involved.
c. The user has many groups.
AR System SW00513858 The Server Statistics form shows the incorrect count for the number of current users 9.01.02
server and the number of current write/float/read licenses in use.
AR System SW00513859 When you create/update a record in the parent and child form through a web service, 9.01.02
server the push field action defined in the parent form runs before creating an entry in the
child form.
AR System SW00513865 When you call any external web service and map field to that web service, which 9.01.02
server passes the wrong information, BMC plugin exception error is displayed instead of a
correct error.
AR System SW00513869 When an email notification is sent for the Diary field, the notification erroneously 9.01.02
server contains special characters.
AR System SW00513868 When you have a character field on a form that has a field name in the Japanese 9.01.02
server language, the set field in the active link that includes a $PROCESS$ keyword does
not return the expected result.
AR System SW00513871 When you create a Date field on a form and set the default to $\DATE$ and save the 9.01.02
server record, the date is saved as "1/1/9999" instead of the current date.
AR System SW00513872 When you configure an error handler for a filter that executes submit/modify action 9.01.02
server on a form, the filter error handler incorrectly deletes records but handles the error
event successfully.
AR System SW00513873 When you create an entry on any form that has an attachment, the attachment data 9.01.02
server is lost in the web service response.
AR System SW00513874 When you create an entry in any form to set a value for the Assignee field and you 9.01.02
server consume a web service to perform modify request, the web service SET operation
does not nullify the field value even though you pass an empty value to an element.
AR System SW00513879 When you import a large amount of data from a CSV file to the AR System server by 9.01.02
server using the Data Import Tool, an ARERR 9713 error occurs.
AR System SW00513880 When you try to save data to the Short Description field on a form, the following 9.01.02
server Active Link error occurs:
AR System SW00513891 When you create a filter on a form, the $SCHEMA$ keyword is wrongly translated as 9.01.02
server the Set Field Lookup schema instead of the current schema name.
AR System SW00513894 When you create a record and run an SQL query that has single quotation mark, the 9.01.02
server following errors occur in the browser and in the API/SQL logs:
org.springframework.jdbc.BadSqlGrammarException:
PreparedStatementCallback; bad SQL grammar []; nested
exception is java.sql.SQLSyntaxErrorException: ORA-00933: SQL
command not properly ended.
AR System SW00513895 When you create a web service that uses the parent-child relation in the input and 9.01.02
server output mapping, the data is not populated in the child form.
AR System SW00513897 When you create a Work Info item for an existing TMS:Task record by using the 9.01.02
server UpdateTaskAndWorkInfo WSDL operation, TMS_TaskInterface web service fails
to create new Work Info items.
AR System SW00513899 When the outer filter level handles errors that occurred in an inner filter level, the 9.01.02
server error handler does not work as expected. As a result, the error processing does not
stop.
AR System SW00513904 When BMC Remedy AR System uses a Java Runtime Environment that has never 9.01.02
server & installed an AR System encryption package, the key exchange for standard
SW00514541 encryption on Microsoft Windows invokes the Bouncy castle.
AR System SW00513909 When you consume a web service for a hierarchical input document, the information 9.01.02
server is not added in the destination form.
AR System SW00513913 In BMC Remedy AR System 9.1, when the Table field on a regular form points to a 9.01.02
server & Group form with logical operators (for example, AND, OR, NOT), faulty SQL
SW00514061 statements are created in the Oracle database.
AR System SW00513914 When you try to add a new character field on a form with a default value and you 9.01.02
server enter data in a lowercase pattern, BMC Remedy Developer Studio shows the
following error:
Value does not fall within the limits specified for the field
: (Field ID - <fieldID>, Pattern - $LOWER$), 306.
AR System SW00513915 When you make the ARXMLGetEntry entry call to a form, the call does not return 9.01.02
server headers for the Dairy fields.
AR System SW00513924 When you try to install BMC Remedy AR System with Java version more than 100, 9.01.02
server & an error occurs. For example, jdk-8U51-windows-x64.
SW00514062
AR System SW00513936 (Russian locale) When you export an Active Link with Push Field action that has a 9.01.02
server Russian character and try to import the same again, an error occurs while importing
an Active Link that has Cyrillic symbols in the Push fields.
AR System SW00513946 When you upgrade to BMC Remedy AR System 9.1and you open Join form in BMC 9.01.02
server Remedy Mid Tier, the data for the Date field in the join form is not displayed if that
field is mapped from a View form.
AR System SW00513947 When you select Hierarchical Group configuration for a large number of companies 9.01.02
server from Application Admin Console, only a few companies are updated to have the
parent company that they have selected.
AR System SW00513949 When you try to export the Service Request Definition, the export fails if the 9.01.02
server arexport utility is called.
AR System SW00513953 When you restart servers in a server group, the following issues occurs: 9.01.02
server
You can see two entries added to the hg_pending table: one by the Admin
server and the another by non-admin servers.
When you modify any group and change the Parent Group field, a third entry
might also be added by anon admin server.
Hierarchical Groups are not processed on the Admin server.
Errors are generated in ardebug.log.
AR System SW00513962 When you migrate overlay objects on a form, the following error occurs and BMC 9.01.02
server Remedy Migrator stops working:
Migrator has stopped working.
AR System SW00513951 The set field action of a filter does not update the values for all the fields on any form 9.01.02
server if the Data Source of Set Fields is set to Web Service.
AR System SW00513964 When the User Tool retrieves a menu definition for an SQL menu that has more than 9.01.02
server one field substitution parameter, the following error occurs and BMC Remedy AR
System server does not return a server side menu definition to the User Tool:
AR System SW00514025 When you configure an error handler for a filter that executes a submit or modify 9.01.02
server action on a form, the filter error handler erroneously deletes records but handles the
error event successfully.
AR System SW00514060 When you create or set an entry for a regular form that has 112 field and filter 9.01.02
server perform set field action on 112 field , the Create Entry API call takes three to four
seconds.
BMC SW00513877 When you generate notification with the Process-Due-Notify command, the 9.01.02
Remedy BMC Remedy Approval Server stops the Approval Engine because it cannot approve
Approval the record.
Server
BMC SW00513889 (German locale) In Approval Central, many field labels are truncated and do not 9.01.02
Remedy show the correct German translation.
Approval
Server
BMC SW00513746 Message actions on filters limit the TO field of emails to 255 Characters. 9.01.02
Remedy
Email
Engine
BMC SW00513861 (German locale) When you send an email from MS Outlook/Lotus notes with Umlaut 9.01.02
Remedy character ( Ü/üÖ/ö) in the subject line, the mail does not reach the AR System email
Email message form.
Engine
BMC SW00513898 When you open the expand box for a character field on a form, the expand box 9.01.02
RemedyMid opens with 320pixelwidthand300pixelheightinstead of the default size of520 pixel
Tier width and500 pixel height.
BMC SW00513933 Security vulnerabilities were detected in cross-site scripting. The Summary field is 9.01.02
RemedyMid updated and you can see the debug logs showing a connection established with a
Tier hacker tunnel.
BMC SW00513912 When you migrate data for a single form, the following issues are observed: 9.01.02
Remedy
Migrator Initial caching takes several minutes.
Migration appears to start because the Progress Window is set to Calculating
Related Objects.
The migration either stops or is in a hang state.
BMC SW00513963 The BMC Remedy Migrator shows the new fields on the destination server, but does 9.01.02
Remedy & not show new fields in the overlay form on the source server if all of the following
Migrator SW00514140 conditions are true:
BMC SW00514162 When you try to migrate the form and data from BMC Remedy AR System server to 9.01.02
Remedy a file, a Thread Error 2004 and Migrator Error 3007 occurs.
Migrator
Java Import SW00513866 The AR System Server does not import the value for Create Date field in the 9.01.02
Tool following scenarios:
When you specify data for the Create Date field in the .arx file.
When you select Replace Old Record With New Record option.
The AR System Server assigns current server timestamp as a value to Create Date
field.
AR System SW00514200 When you map a role to a public group, the user cannot access the form or data, and 9.1.02
server permission-related errors occur.
AR System SW00514204 BMC Remedy AR System 9.x does not recognize the latest Java update (Java 8 9.1.02
server update 101) in your environment and displays an error.
AR System SW00514237 When you upgrade the BMC Remedy AR System from version 7.6.04 to 9.x, the 9.1.02
server Setting field from the Status History that contains the enumID 5 and above does not
work.
AR System SW00514512 Un-necessary database calls are made when you get an attachment via a web 9.1.02
server service. A performance issue occurs because of the following reasons:
The API retrieves fields one by one instead of retrieving all the fields in one
call.
The API retrieves display properties of the field.
AR System SW00514523 When you consume a web service with a hierarchical input document, the 9.1.02
server information (data) is not added to the destination form.
AR System SW00514527 When a web service that uses SOAP 1.1 protocol fails, the BMC Remedy AR 9.1.02
server System server does not automatically use the SOAP 1.2 protocol and the following
error occurs:
ARERR [9130] Error encountered while executing a Web Service.
AR System SW00514534 The set field action of a filter does not update all the values for all the fields on a 9.1.02
server form.
AR System SW00514535 When you try to export the Service Request Definition, the export fails if the 9.1.02
server arexport utility is called. When the process is complete, it redirects the user to
SRD Export History schema and shows that the SRD Export operation was
successful, but no file is actually generated.
AR System SW00514540 When you upgrade to BMC Remedy AR System 9.1, open a Join form in the Mid Tier 9.1.02
server and search records on the Join form, the data is displayed for all the fields except for
the Date field that is populated from the View form. The date information is shown in
records only if you search the View form.
AR System SW00514551 When you move a change request from the Scheduled phase to the Implementation 9.1.02
server phase, the following error occurs in the server side log:
AR System SW00514555 When you create/update any record through a web service, the data in the child form 9.1.02
server is not updated from the Push field action.
AR System SW00514559 When the outer filter handles an error that is generated in the inner filter, the error 9.1.02
server processing does not stop as expected because the error handler does not work
correctly.
AR System SW00514567 When the Application-Delete-Entry triggers an additional workflow to run the filter, 9.1.02
server the error handler does not work. The filter returns the following error, instead of
calling the error handler:
AR Error 380: No item matches filter conditions -- this
operation has been defined so that ''No Match'' generates an
error.
AR System SW00503514 The AR System server 9.0 does not support read-only databases. 9.1.02
server
AR System SW00503589 When you upgrade from BMC Remedy AR System version 8.1 Service Pack 2 to 9.1.02
server version 9.0.01, the AREA LDAP authentication does not work.
AR System SW00514569 When you click the Email System link from the Function menu, enter the details, and 9.1.02
server click the Send Email Now button, the emails are not added to the work log and the
following exception occurs on the Incident Management console:
java.nio.BufferUnderflowException.
AR System SW00514601 In BMC Remedy AR System 9.0.01, multiple GetServerStatistics API functions or 9.1.02
server commands return zero values.
AR System SW00514628 When you enter an alphanumeric value in the integer fields on the display-only form,
server an inconsistent behavior occurs.
AR System SW00514606 When you change the sort order on the SYS:Schema Sort form from SQL to Oracle, 9.1.02
server the following error occurs:
AR System SW00514639 When you put a plus sign (+) in an argument more than twice, the Application-Parse- 9.1.02
server Val-S field does not work.
AR System SW00514676 When the web service response has multiple nested response elements, the AR 9.1.02
server System server ignores the output mappings of a web service, which is under the
elements that are not a part of mapping.
AR System SW00514732 When you request any status to the AR System server through the driver or API with 9.1.02
server the request list, the AR System server shows an error that the serverInfoList is null,
instead of showing an error for the request sent.
AR System SW00514792 When you create a new Change Request in the Change Managment Console and 9.1.02
server click the Next Stage button twice, the request does not move to Plan and Schedule
within 9 seconds. It takes more time.
AR System SW00514798 When you create a form that has an invalid Dynamic Permissions Inheritance value 9.1.02
server for Group Permissions, the BMC Remedy AR System saves the form, but the
following error occurs:
AR System SW00514892 The AR System server returns a limited number of entries for the REST API calls 9.1.02
server done by non-admin users. If the limit of REST API calls is suppressed, the AR
System server returns code a 500.
AR System SW00514895 In BMC Remedy Developer studio, when you import a form that has archiving 9.1.02
server enabled, the following error occurs because of unique index violation:
AR System SW00514899 In BMC Remedy AR System 9.x, when you submit or modify any request, the NULL 9.1.02
server qualification in the filter does not evaluate Diary field as expected.
AR System SW00514951 If you export and then import a web service in definition format (.def), the following 9.1.02
server error occurs:
AR System SW00515272 When you create a regular form, add one character field and save the form, the new 9.1.02
server & field is displayed but the DB view is not created.
SW00515543
AR System SW00500913 The zip files are not indexed and you cannot search for a zip file in the Remedy 9.1.02
server Knowledge Mangement 9.0.01 and in BMC Remedy AR System 8.1.02.
AR System SW00502828 The active link on a custom form that uses the Application-Bus-Time2- 9.1.02
server Subtract process command in a set field action, calculates an incorrect result for
Date/ Time fields.
BMC SW00467645 When you select the schemas.xsd file in the XML Schema section and click the 9.1.02
Remedy Reload button, BMC Remedy Developer Studio does not load the selected schema
Developer type and the following error is displayed:
Studio
Unable to process the WSDL Mapping XML Document., 5147,
Untitled Web Service.
BMC SW00496561 When you create an active link on a primary form that is a part of a deployable 9.1.02
Remedy application, Role-Permissions are not available.
Developer
Studio
BMC SW00514666 When you try to create a new record on FB:User Privilege form and click on the New 9.1.02
Remedy Request button, the following error occurs:
Flashboard
Required field cannot be blank FB:User Privilige Group_Parent
(ARERR 307).
BMC SW00514585 When you open any form in the Mid Tier and create a report by performing the 9.1.02
RemedyMid qualified search, all the records from the form are displayed instead of records
Tier filtered by the qualified search.
BMC SW00490213 When you perform My Searches on any form or on the Incident Management 9.1.02
RemedyMid Console, an invalid Date format is returned.
Tier
BMC SW00494394 When you log in to the mid tier, search for a new incident and click on the tEmail 9.1.02
RemedyMid System button, the Email System window displays only the INC number, but it does
Tier not display the INC number with issue description.
BMC SW00503613 When the BMC Remedy Mid Tier uses prototype.js file version 1.4.0 (third-party 9.1.02
Remedy Mid & library), a security vulnerability occurs.
Tier SW00503614
BMC SW00501482 When you initialize Remedy for Smart Reporting from the Flyout menu, the following 9.1.02
RemedyMid error occurs:
Tier
Server is busy serving maximum number of reporting requests,
please try after some time.
BMC SW00514599 When you launch the Smart Reporting console through the Application Console and 9.1.02
Remedy you click on the Dashboards tab, the following error occurs:
Smart
The Connection was reset.
Reporting
BMC SW00514708 When the AR System server time zone is different from the user's time zone a 9.1.02
Remedy & predefined date filter does not work on the report: the date filter chooses the AR
Smart SW00515070 System server's time zone instead of user's time zone.
Reporting
BMC SW00515074 In Remedy for Smart Reporting 9.1, when you edit the Incident Dashboard, the 9.1.02
Remedy Incident Dashboard filter does not save the Manual User Entry from the Value
Smart Entry Method.
Reporting
BMC SW00515178 When you install Remedy for Smart Reporting, Onboarding for CME Customer DB 9.1.02
Remedy fails and the following error is displayed: The char '0x1a' after 'M' is not
Smart a valid XML character.
Reporting
BMC SW00502505 The Site field on AST:BaseElement form shows Site Group data from Site/AST: 9.1.02
Remedy BaseElement table instead of showing Site data from Building/AST:
Smart BaseElement table.
Reporting
Java Import SW00514538 An imported record reflects the current system date and time instead of the actual 9.1.02
tool date and time of the record under all of the following conditions:
You export an existing record to an .arx file.
The existing record is from any regular form that has a Create Date field.
You re-import that record into the same form by using the Data Import Tool.
You select Handle Duplicates By Replace Old Record with New Record option
.
Updates in Row level security and FTS query enhancement is done for improving the AR System performance. For details
Service Pack about install upgrade related enhancements, see 9.1.02: Service Pack 2 installation and upgrade enhancements
2
Known and For information about issues corrected in this service pack, see Known and corrected issues (see page 31).
corrected
issues
Installing the For information about installing the Service Pack 2, see Installing BMC Remedy AR System 9.1.02
service pack
Updates in Service For information about new features added to BMC Remedy Single Sign-On in Service Pack 1, see
Pack 1 Enhancements (see page 81).
Known and corrected For information about issues corrected in this Service Pack 1, see Known and corrected issues (see
issues page 31).
Downloading the For download instructions, see Downloading the installation files.
service pack
Installing the service For information about installing and upgrading the Service Pack 1, see:
pack
Installing
Upgrading
Enhancements
The 9.1 Service Pack 1 provides the following enhancements in the BMC Remedy Single Sign-On
System:
Kerberos authentication
The 9.1 Service Pack 1 introduces Single Sign-On authentication using Kerberos. If the system is
configured for Kerberos authentication, you can log on to the system transparently without
providing the credentials. For more information, see Configuring BMC Remedy SSO for Kerberos
authentication (see page 720).
For more information, see Enabling LDAP with SASL authentication support (see page 716).
Security enhancements
The out-of-the box SAML keystore cot.jks file is not included in the installation anymore.
SAML keystore file, keystore password, and signing key certificate alias are now
configurable through the Admin console instead of being hard coded. For more information
about setting the SP signing certificate, see Setting the SP signing certificate.
All passwords in BMC Remedy SSO such as LDAP bind password, Kerberos SPN
password, and keystore password are AES encrypted.
Encryption key rotation is supported. For more information about changing the encryption
key, see Changing encryption key after upgrading BMC Remedy SSO.
Admin user password that is stored in the database is PBKDF2 hashed.
9.1.00 enhancements
This topic provides information about the following enhancements in this release:
Previously, these parameters were stored and configured either in the ar.cfg file or in the server.
conf file. Starting from this release, changes to the parameters of these components are made only
through the centralized configuration console. You cannot configure the parameters using the ar.cfg
file. For more information, see Centralized configuration (see page 1138).
Enhancements to armonitor
In BMC Remedy Action Request System 9.1, a new Java-based process armonitor is used to
maintain a list of all BMC Remedy AR System processes. The armonitor file provides functionality
to detect changes made to the armonitor.cfg (armonitor.conf) file. The armonitor feature includes a
utility that allows you to start, stop, and restart the processes maintained in armonitor.cfg (
armonitor.conf) file. For more information see, armonitor (see page 1121).
Field encryption
Starting from BMC Remedy Action Request System 9.1, you can configure the character field as
confidential so that the data remains encrypted in the database. To encyrpt the data in the
character field you must set the property Encrypt Data At Rest to True. For more information, see
Encrypt Data At Rest (see page 2556).
Enhancement Description
Rollback functionality Restores the objects in a package to the pre-deployment state if any issues are found during
validation of the package after the package is deployed successfully. For more information, see
Rollback (see page 2139).
Migration support Transfers BMC Remedy AR System service request definitions (SRDs), process definition templates
for Service Request (PDTs), and supporting data easily and reliably across environments. For more information, see
Management Adding SRM objects to a package (see page ).
(SRM) objects
Support for migrating Starting from this release, you can now include base and overlay objects in a package and migrate
base and overlay them across environments. For more information, see Creating a package (see page 2140).
objects
Enhancement Topic
Use silent installations to deploy BMC Remedy Single Sign-On to multiple systems. Installing the BMC
Remedy Single
Silent installations require installing BMC Remedy Single Sign-On, generating an options file, and then Sign-On using
installing BMC Remedy Single Sign-On silently. silent mode
Edit the template used for SAML authentication request. Configuring BMC
Remedy Single
Sign-On for
SAMLv2
authentication (see
page 706)
Compatible with BMC Remedy AR System versions 7.6.04, 8.1, 9.0, and 9.1
Supports additional platforms
The patch includes fixes for defects covering Approval Server, AR System server, Developer
Studio, and Mid Tier components. The patch also includes various performance improvements.
For more information about issues corrected in this patch, see Known and corrected issues (see
page 31).
Administering
Navigating the BMC Remedy AR System Administration console interface (see page 1048)
BMC Remedy AR System configuration files (see page 1057)
AR System server components and external utilities (see page 1121)
Defining your user base (see page 1322)
Setting user preferences (see page 1333)
Capturing server events for workflow or API calls (see page 1799)
Defining business schedules using Business Time (see page 1359)
Enabling alert notifications (see page 1394)
Assigning requests with the Assignment Engine (see page 1402)
Importing data into BMC Remedy AR System forms (see page 1908)
Enabling and disabling full text search (see page 1405)
Troubleshooting
Troubleshooting alert activity (see page 4613)
Troubleshooting full text search (see page 4549)
Troubleshooting
BMC Remedy AR System diagnostic messages (see page 4305)
Working with error messages (see page 4285)
Developing an application
Making applications licensable for integration system vendors (see page 3282)
Publishing the BMC Remedy AR System functionality as a web service (see page 3288)
Troubleshooting
Troubleshooting (see page 4141)
Troubleshooting
Using Analyzer to find problems in your applications (see page 3148)
Working with the Analyzer View tab (see page 3162)
Launching the Analyzer from a command line (see page 3164)
Troubleshooting BMC Remedy Developer Studio issues (see page 4516)
Installing
Starting and stopping the Approval Server (see page 632)
Approval Server post-upgrade procedures in BMC Remedy ITSM Deployment online
documentation.
Using
Opening Approval Central (see page 938)
Approving requests (see page 1011)
Administering
Setting up the approval process (see page 1584)
Adding approvals to an application (see page 2892)
Configuring BMC Remedy Approval Server logging and loopback calls (see page 4201)
Troubleshooting
BMC Remedy Approval Server logging (see page 4247)
BMC Remedy Approval Server installation and upgrade issues (see page 4144)
BMC Remedy Approval Server file locations (see page 4148)
Troubleshooting BMC Remedy Approval Server (see page 4538)
Developing an application
Adding approvals to an application (see page 2892)
Troubleshooting
Configuring BMC Remedy Distributed Server Option logging (see page 4206)
BMC Remedy Distributed Server Option logging (see page 4243)
Installing
Administering
Controlling BMC Remedy AR System through email (see page 1440)
Troubleshooting
Configuring BMC Remedy Email Engine logging (see page 4210)
BMC Remedy Email Engine logs
Debugging options for the BMC Remedy Email Engine (see page 4212)
BMC Remedy Email Engine locations (see page 4149)
Troubleshooting BMC Remedy Email Engine (see page 4523)
Developing an application
Adding graphics to an application with flashboards (see page 2581)
BMC Remedy Flashboards overview (see page 2581)
Creating flashboards (see page 2596)
Planning a flashboard (see page 2590)
Creating flashboard variables (see page 2591)
Creating and managing flashboards (see page 2596)
Adding a flashboard to a BMC Remedy AR System form (see page 2603)
Flashboard fields (see page 3121)
Troubleshooting
Creating flashboards to collect server statistics (see page 4164)
Troubleshooting BMC Remedy Flashboards (see page 4519)
Using
Using the AR System Object List (see page 918)
Running and saving searches (see page 938)
Reporting on BMC Remedy AR System data (see page 954)
Using BMC Remedy Flashboards (see page 1041)
Developing an application
Using customized style sheets (see page 2984)
Mid tier application development guidelines (see page 2853)
Planning
BMC Remedy Encryption Security options (see page 241)
Security policy impact on client-server communication (see page 242)
BMC Remedy Encryption Security compatibility (see page 243)
Installing
Installing BMC Remedy Encryption Security in BMC Remedy ITSM Deployment
documentation.
Upgrading
Upgrading encryption security in BMC Remedy ITSM Deployment documentation.
Troubleshooting
Troubleshooting encryption security (see page 4610)
Performance Benchmarking Tutorial Using SilkPerformer with BMC Remedy Using SilkPerformer to measure and optimize
Mid Tier application performance (see page 3186)
KITE Scripting for BMC Remedy AR System Mid Tier Measuring mid tier performance with KITE
scripting (see page 3172)
BMC Remedy Action Request System Enterprise Quick Reference White Planning BMC Remedy AR System installation in
Paper an enterprise environment (see page 217)
Remedy Application Performance Benchmarking Best Practices Performance benchmarking and tuning in
BMC Remedy ITSM Deployment online
documentation.
BMC Remedy AR System Server 7.6 Performance Tuning for Business Performance tuning for BSM in BMC Remedy
Service Management ITSM Deployment online documentation.
BMC Remedy IT Service Management Suite Delta Data Migration Server Migrating delta data in BMC Remedy ITSM
Setup and Implementation Deployment online documentation.
BMC Remedy Action Request System Behavioral Differences Between BMC This document is obsolete.
Remedy User and Browser Clients
BMC Remedy Action Request System Designing BMC Remedy applications Making your application accessible (Section 508
for Section 508 compliance compatibility) (see page 3107)
BMC Remedy Action Request System Web Application Security Assessment WhiteHat Sentinel PE security penetration testing
and Vulnerability Mitigation Tests (see page 244)
BMC Remedy IT Service Management Suite Installing and Configuring Installing in BMC Remedy ITSM Deployment
Server Groups online documentation.
Integrating BMC Remedy Action Request System with Single Sign-On (SSO) Single sign-on authentication systems integration
Authentication Systems and Other Client-Side Login Intercept Technologies
BMC Remedy Action Request System Using the Certificate Database Tool This document is obsolete.
Using a Hardware Load Balancer with BMC Remedy Action Request System Configuring a hardware load balancer with BMC
Remedy AR System (see page 524)
Supporting Compliance Audits with BMC Remedy Approval Server Supporting compliance audits with BMC Remedy
Approval Server (see page 1830)
Using Oracle CLOBs with BMC Remedy Action Request System Using Oracle CLOBs with BMC Remedy AR
System (see page 726)
Product announcements
This topic describes changes that will occur in future releases of the product. These changes can
affect the way in which you configure or run the installed version of BMC Remedy Action Request
System.
Note
This statement of direction describes changes in the BMC Remedy Action Request (AR) System
Compatibility Matrix introduced in version 9 and provides an indication of future direction.
BMC Remedy AR System supports many combinations of the most popular hardware, operating
systems, web servers, databases, and browsers on the market. This support is captured in the
published compatibility matrix. With each release, BMC evaluates support for the combinations
listed in the compatibility matrix, including additions, removals, and minimum version changes
based on customer and market feedback. All minimum versions support an "or later" policy.
Certification of newer versions by BMC typically lag behind the vendor’s release. However, as long
as the vendor respects backward compatibility, BMC does not anticipate major issues with
certification.
For any items not mentioned in this posting, the details in the compatibility matrix are not expected
to change.
Remove Sybase from the compatibility matrix (removal of Sybase support has already been
announced).
Raise the minimum support for Microsoft SQL Server to 2008 SP2 from the current 2005.
Raise the minimum support for Oracle database to 11gR2 patchset 3 (11.2.0.3.0) from its
current 11gR1.
Certify the platform running on SQL Server 2014 shortly after the next release.
Certify the platform leveraging the SQL Server Always On capability in 2012 and 2014
shortly after the next release.
Add CentOS as a supported operating system (currently for BMC Remedy Mid-Tier only).
Raise the minimum support for Microsoft Windows Server to 2008 R2 x64 from its current
2003.
Drop support for Windows Server 32-bit for platform.
Note
Certification with Oracle Solaris has not been included in this release but will follow
shortly after the release.
HP-UX and AIX operating systems have not been certified for this release, and
BMC is considering dropping them from the compatibility matrix.
Raise the minimum support for Apache Tomcat to 7.0.53 from its current 6.x.
Raise the minimum support for Microsoft IIS to 7.5 from its current 6.x.
Raise the minimum support for Oracle Weblogic to 11g from its current 10g.
Raise the minimum support for RedHat JBoss to EA 7.1 from its current 5.x.
Raise the minimum support for IBM Websphere to 8.5 from its current 7.x (due to no support
for Java 1.7).
Note
BMC Remedy Smart Reporting is currently supported using the Apache Tomcat web
server only. Future releases will expand this coverage.
What are my options if I Typically, you will need to export your data and import it to another system that is running another
am running DB2 today and database. If you need help, we recommend that you engage with BMC Professional Services or a
I want to upgrade? BMC Partner. There is currently no automated migration tool tested by BMC to move from DB2 to
another supported database.
Will not having all the Any existing implementation that leverages the C API will not be impacted. However, new system
features available to me capabilities that are introduced might not be accessible through the C API.
via the BMC Remedy AR
System C API impact my
implementation?
Will changes in the C API No, changes to the compatibility matrix are tied to a version release and do not typically impact
impact my current previous versions.
implementation?
Why did you change so As new technology becomes available, older versions might not support newer features. BMC
many minimum versions? constantly evaluates new and older versions of software and moves minimum supported
statements as we see adoption moving forward.
Why are you dropping Microsoft Internet Explorer 8 has been on a steady decline in usage (see http://www.
Microsoft IE 8? theie8countdown.com/ ) and is being phased out in many organizations. Newer approaches to user
experience typically require support for features that the vendor does not support. Resetting the
minimum to version 9 also aligns with the minimum versions published by BMC MyIT and BMC
Smart IT functionality.
Getting started
The following topics help you to get started with the BMC Remedy AR System product
documentation.
If you are a system administrator and looking for information on installing or upgrading the product,
you should navigate to the BMC Remedy ITSM Deployment documentation.
Applications built with BMC Remedy AR System can automatically track anything that is important
to the processes in your enterprise. Companies use BMC Remedy AR System applications to track
such diverse items as stock trades, benefits data, inventory assets, spare parts, and order
fulfillment. One of the most common uses of BMC Remedy AR System is to automate internal
service desks.
Orientation
Use the information in this section to understand the primary milestones for getting orientated with
the BMC Remedy AR System product documentation. The following table helps you to locate the
information to effectively work with the product.
Goal Where to go
Where do I begin? You can begin with learning the Product overview (see page 96), the key concepts (see page 95
). A Learning path is available for you to get started on the product.
What are the key The BMC Remedy AR System components (see page 134) section gives an overview of all the
components of the product? components and their value.
Where is the install and The install and upgrade information resides in the Deployment documentation area. The
upgrade information? Deployment documentation assists you with the install and upgrade tasks for all the products that
are a part of the BMC Remedy IT Service Management suite.
Below are some direct links to the Atrium CMDB specific topics from the deployment
documentation. However, it is recommended that you go through the preparing section if you are
working with install or upgrade.
How do I plan my system Refer to the Planning (see page 211)section to plan for your hardware and software requirement.
requirements, deployment You can also review security related information, deployment architecture and so on.
architecture and so on?
How do I configure the Refer to the configuration tasks (see page 271) section to complete the configuring tasks after the
product after installation? BMC Remedy AR System product is installed or upgraded.
Goal Where to go
You can visit the BMC Remedy Single Sign-On System Requirements link to plan for your
hardware and software requirement.
You can visit the following links for install and upgrade instructions:
Installing
Upgrading
You can refer the Configuring BMC Remedy Single Sign-On for authentication (see page
701) section to configure any of the authentication methods that BMC Remedy Single Sign-
On supports.
Refer to the following topics to manage Admin console and realms:
Managing the BMC Remedy Single Sign-On administrator console (see page 1733)
Managing realms in BMC Remedy Single Sign-On
Troubleshooting (see page 4621) section has information on resolving errors related to
logon, logoff, installation, upgrade, authentication, and so on.
How do I start using the Access the Using (see page 917)section to perform tasks related to navigating the infrastructure,
product and navigate the reporting, approving requests, and using flashboards .
User Interface?
How do I perform Refer to the Administering (see page 1047)branch to perform the following admin tasks and many
administration tasks? more :
How do I develop Refer to the Developing and Application (see page 2185) and Developing an API program (see
applications, and use API page 3377) sections to develop applications using the AR System platform.
programs?
Where can I find Troubleshooting (see page 4141) section has information on resolving errors related to logs,
troubleshooting performance, AR System components, and so on.
information?
Key concepts
Consult the following topics to learn about the BMC Remedy AR System :
Product overview
Use the following topics to understand how you can use BMC Remedy Action Request System
(BMC Remedy AR System) to address your business needs.
How BMC Remedy AR System enables business process automation (see page 96)
How BMC Remedy AR System products and related products enable additional value and
BSM (see page 98)
How BMC Remedy Migrator automates migration of data and objects between AR System
servers (see page 101)
How BMC Remedy Email Engine enables email-driven business processes (see page 101)
How BMC Remedy Encryption Security enables secure communication between the client
and server (see page 103)
How BMC Remedy Distributed Server Option manages distributed business requests (see
page 104)
How BMC Remedy Approval Server automates approval-driven business processes (see
page 105)
How BMC Remedy AR System integrates with third-party products (see page 107)
BMC Remedy Single Sign-On overview (see page 109)
Using BMC Remedy AR System, non-programmers can build powerful business workflow
applications and deploy them simultaneously in web, Microsoft Windows, UNIX, and Linux
environments.
Applications built with BMC Remedy AR System can automatically track anything that is important
to the processes in your enterprise. Companies use BMC Remedy AR System applications to track
such diverse items as stock trades, benefits data, inventory assets, spare parts, and fulfillment
orders. With sufficient planning, even workflow-intensive procedures can be automatically
maintained in an orderly manner.
Example
Ramona's printer would not work, so she logged on to her company's BMC Remedy AR
System service desk portal and entered information about the problem. The system
automatically offered several knowledge base articles that might apply to her problem, but
none resolved the issue for her.
Ramona then opened a service desk request through the portal to get further assistance from
the IT department. When she entered her phone number into the blank request form on her
screen, details of her configuration and location automatically appeared in the form. Ramona
filled in the remaining details about her problem and submitted the request. She immediately
received a message informing her that the case had been assigned to Becky.
Becky was automatically paged and used her computer to review the problem. Using her
knowledge of similar problems, she fixed the printer and marked the case closed. Ramona
was then notified that the problem was fixed.
If Ramona's problem had been an emergency that was not handled within an hour, the system
would have automatically paged the appropriate support personnel and sent an email
message to Ramona, informing her of the request status.
In this example, BMC Remedy AR System automated the offer of knowledge base articles, the
entry of information in the form, the assignment notification, the paging system, the closure
notification, and the emergency response.
A service desk application and other ready-to-use BMC Remedy AR System applications are
available from BMC and its partners (see BMC Remedy add-on products (see page 98)). You can
also create your own custom solutions.
Perhaps the best way to understand the adaptability of BMC Remedy AR System is through an
example.
Example
Paul owns a small book store and installs BMC Remedy AR System to help track
inventory. Initially, he builds a simple application that has one form. The form collects the
book title, number of copies, price, and customer rating. When his business grows and he
needs to track employees, he adds a form that collects the employee number, salary,
start date, training, and time card.
Next, Paul links his application to a credit/debit verification system by using the BMC
Remedy AR System open API. Later, he adds an order tracking and purchasing
application to automatically order items through web services. He then creates a website
to enable customers to order books online, and to store their purchase history in a
knowledge base. He further automates the system to provide proactive book suggestions
based on the purchase history.
Using BMC Remedy AR System to implement the book store, facilitates Paul to easily
adapt and implement the changes to his business demands and expand his business.
How BMC Remedy AR System products and related products enable additional
value and BSM
The core BMC Remedy Action Request System (BMC Remedy AR System) products are the
foundation for the BMC Remedy product line. These BMC Remedy products and features add
functionality to the core BMC Remedy AR System environment:
BMC Remedy Distributed Server Option (DSO) — Enables you to send and receive data
from forms that reside on physically separate servers. See Distributed environments provide
scalability (see page 173) and How BMC Remedy Distributed Server Option manages
distributed business requests (see page 104).
BMC Remedy Encryption Security products — Enables the BMC Remedy AR System
server and its clients to communicate securely over a network by encrypting the messages
sent between them. See How BMC Remedy Encryption Security enables secure
communication between the client and server (see page 103).
BMC Remedy Encryption Standard Security is built into the BMC Remedy products.
(Optional) BMC Remedy Encryption Performance Security and BMC Remedy
Encryption Premium Security are sold separately. The optional encryption products
provide a higher level of security than standard encryption. They also enable you to
comply with Federal Information Processing Standards (FIPS ) 200. All BMC Remedy
Encryption Security products use third-party encryption technology software
developed by the OpenSSL Project for use in the OpenSSL toolkit (see http://www.
openssl.org/).
BMC Remedy Full Text Search (FTS) — Provides a search mechanism that is typically
much faster than the native database searching functionality for searching in long text fields.
FTS is the only search method available in BMC Remedy AR System for searching text
within documents that are attached to requests. See Performing searches with FTS (see
page 1424).
BMC Remedy Migrator — Provides a fast, easy way to move forms and applications
between BMC Remedy AR System servers, servers and files, or files. This tool helps you
transfer data and workflow objects from a development environment to a production server,
while ensuring the integrity of all migrated changes. See Performing migrations (see page
2053).
BMC Remedy Single Sign-On (RSSO) - The Remedy SSO is a light web application that
helps in providing single sign on and single sign off. You can deploy the Remedy SSO web
application on the same infrastructure as the AR Remedy Mid Tier. The Remedy SSO is
easier to deploy, configure, and maintain. It can be deployed in the failover cluster which
allows adding or removing the nodes easily on demand. See BMC Remedy Single Sign-On
overview (see page 109).
Although not based on BMC Remedy AR System, the following BMC Atrium applications provide
powerful visualization, decision support, and data discovery capabilities. They are pre-integrated
with BMC solutions for BSM and are ready to use out of the box.
HR Administrators create solutions that are a set of tasks and information needed to resolve
cases
HR agents work on HR requests opened by employees using BMC MyIT, and on cases
opened by HR agents on behalf of employees.
For more information about these products and solutions, see the BMC Software website at
http://www.bmc.com.
How BMC Remedy Migrator automates migration of data and objects between AR
System servers
BMC Remedy Migrator can migrate BMC Remedy Action Request System (BMC Remedy AR
System) objects and data to and from the same server, from one server to another, or to many
servers. It can also migrate from a server to a file, from a file to a server, or from a file to a file, and
can migrate data from one form to another as well as to a file.
If you have two or more servers in your BMC Remedy AR System environment, you might need to
transfer or synchronize definitions or data between servers.
By using BMC Remedy Migrator, you can migrate objects and data to and from servers quickly
while still having all clients connected and running. BMC Remedy Migrator checks for the integrity
of objects, such as groups, active links, forms, and so on. It migrates only those objects that have
changed after the initial migration.
BMC Remedy Migrator automates the process of transferring objects and data from one source
(server or file) to another. For example, you can develop workflow applications on a development
server (source) and use BMC Remedy Migrator to transfer the applications to a production server
(destination), ensuring the integrity of all migrated changes.
Note
To send notifications from the AR System server, you must install BMC Remedy Email
Engine.
The Email Engine is a standalone client program that you can install and run on any computer
system as an independent service. It provides the following capabilities:
Receiving mail — The Email Engine receives email messages from an email account on
your company mail server. These email messages can include instructions that are
interpreted by the Email Engine and translated into API calls to your AR System server.
These instructions can involve modifying form entries, submitting entries, or retrieving
multiple entries from your AR System server.
Sending mail — You can use the Email Engine to send email messages, which can include
the results of queries, submissions, or modifications to entries contained on your AR System
server. You can format these emails by using templates that specify the layout of a message
in plain text, HTML, or XML.
Processing notifications — If you choose email when creating a Notify filter or escalation,
you can use the Email Engine to send text messages, contents of select fields, or
attachments when workflow is triggered.
You can connect the Email Engine to mail servers by using the following protocols:
Internet Message Incoming When mail arrives, copies of messages are downloaded from the mail server to your local
Access Protocol mails computer and the copy of each message remains on the server. However, when Email Engine
(IMAP4) is used, this copy is removed from the server.
Post Office Incoming When mail arrives, messages are downloaded to your local computer and removed from the
Protocol (POP3) mails mail server.
MBOX Incoming Used for storing mail messages on a UNIX platform. Messages are stored in a file of type
mails mbox under the user name.
Messaging Incoming Used primarily with the Microsoft Exchange Server (Windows only), as an interface that
Application and enables different email applications to work together to distribute email.
Programming outgoing
Note: The MAPI protocol for incoming and outgoing mail is disabled for the 64-bit Oracle Java
Interface (MAPI) mails
Virtual Machine (Oracle JVM).
All Email Engine settings and all logging information (including error messages, incoming emails,
and outgoing emails) are stored in forms within the AR System server. The Remedy Email Engine
only stores the location of the AR System server where the forms are stored.
Note
You can configure the logs to be stored in a local text file by specifying a handler property
on the AR System Configuration Generic UI form. For more information, see Debugging
options for the BMC Remedy Email Engine (see page 4212).
For more information on updating the AR System Configuration Generic UI form, see
Updating configuration settings by using the AR System Configuration Generic UI form
(see page 1233).
The Email Engine provides additional options, including the ability to create a variety of templates
and to include attachments with email messages. It supports Multipurpose Internet Mail Exchange
(MIME) types for attachments.
Encryption enables the BMC Remedy Action Request System (BMC Remedy AR System) server
and its clients to communicate securely over a network by encrypting the messages sent between
them. At the beginning of every client and server connection, a key exchange protocol negotiates
shared encryption keys between the client and server. These keys encrypt all communication
between the client and server, ensuring that the communication is secure and that third parties
cannot decipher the messages in transit. The encryption options do not encrypt the communication
between the browser and the BMC Remedy Mid Tier. The encryption between the browser and mid
tier requires the X.509 certificate to be installed on the mid tier or on the load balancer depending
upon your deployment and security requirements. Data encryption is invisible to users.
The BMC Remedy AR System client libraries provide built-in encryption capabilities that can be
enabled to secure the connection to the AR System server. Higher levels of encryption are
available from BMC if you need stronger encryption. BMC Remedy AR System is also tested with
database encryption products from your database vendor to ensure that this connection can be
encrypted. The communication between the AR System server and the database are not natively
encrypted. The encryption is subject to the capabilities provided by the database vendor.
Standard security — This level of encryption is built into the BMC Remedy AR System 8.1
API. You do not purchase or install it separately. Its algorithm is 56-bit Data Encryption
Standard (DES ) using Cipher Block Chaining (CBC ) mode. It uses a 512-bit RSA modulus
to exchange keys and MD5 MAC to authenticate messages. By default, standard security is
disabled. To enable it, see Configuring BMC Remedy Encryption Security (see page 693).
BMC Remedy Encryption Performance Security (BMC Remedy Encryption Performance)—
This optional product is installed separately and it provides the following types of encryption:
RC4 with a 128-bit key for data encryption and a 1024-bit modulus for the RSA key
exchange.
AES CBC with a 128-bit key for data encryption and a 1024-bit modulus for the RSA
key exchange. It uses SHA-1 for message authentication. This option supports the
minimum Federal Information Processing Standard (FIPS) 140-2 encryption
requirements. See FIPS encryption options in BMC Remedy ITSM Deployment
documentation.
BMC Remedy Encryption Premium Security (BMC Remedy Encryption Premium) — This
optional product is installed separately and it provides the following types of encryption:
RC4 with a 2048-bit key for data encryption and a 2048-bit modulus for the RSA key
exchange.
AES CBC with a 256-bit key for data encryption and a 2048-bit modulus for the RSA
key exchange. It uses SHA-1 for message authentication. This option supports
premium FIPS 140-2 encryption requirements. See FIPS encryption options in
BMC Remedy ITSM Deployment documentation.
To install BMC Remedy Encryption Premium or BMC Remedy Encryption Performance, see
Installing BMC Remedy Encryption Security in BMC Remedy ITSM Deployment online
documentation. To configure encryption, see Configuring BMC Remedy Encryption Security (see
page 693).
BMC Remedy Encryption Security includes third-party encryption software developed by the
OpenSSL Project for use in the OpenSSL toolkit (see http://www.openssl.org/ ).
Example
Suppose your company repairs office furniture. Desks are repaired in San Francisco,
and chairs are repaired in Chicago. When a request for a chair repair is submitted to
the San Francisco site, DSO can automatically transfer the request to a server in
Chicago. If the request needs the attention of a specialist, such as an upholsterer, DSO
can transfer the request to a different Chicago server that handles upholstery repairs.
Example
Suppose your company has customer support centers in San Francisco, Paris, and
Tokyo. You could configure DSO to forward open requests from San Francisco to
Tokyo at the end of San Francisco's business day, from Tokyo to Paris at the end of
Tokyo's business day, and so on. This helps alleviate employee down time and
increases the speed at which requests are processed.
Important
Example
To ensure that problem-solving information is accessible from any location, you can
create filters or escalations that instruct DSO to forward requests closed on one server
to all other servers in the environment. All servers then have access to the problem-
solving information and solutions contained in the closed requests.
When a BMC Remedy AR System application triggers an approval process, an approval server
routes a request to collect signatures within a defined approval process, handling all notifications
and requests for more information as it collects each response (approval or rejection). The
approval server then reactivates the original application and reports the result of the approval
process.
BMC Remedy Approval Server allows approvers to gather more information about a request from
any BMC Remedy AR System user. You do not need to build custom workflow or separate
solutions for each application. All processes can share the same approval engine, providing a
common approval experience across applications.
Related topics
Configuring the BMC Remedy Approval Server (see page 626)
Note
A strength of BMC Remedy AR System is its rich and robust API. All prospective product
partners are encouraged to integrate with BMC Remedy AR System at the API level
whenever possible. For more information, see Developing an API program (see page 3377)
.
Many customers purchase BMC Remedy AR System as a development platform to create their
own business applications and automate their business processes. BMC also develops and sells
specific applications such as BMC Service Desk, BMC Asset Management, or BMC Change
Management. These BMC applications are built on top of BMC Remedy AR System.
BMC recommends integrating at the API level because your integrated applications can more
easily be adapted to customers who use applications that are purchased from BMC and to BMC
customers who build their own custom applications. BMC Remedy Mid Tier and BMC Remedy
Developer Studio are built on the BMC Remedy AR System Java API.
Integration defined
In the context of software applications, integration means linking products together to provide
increased functionality and efficiency. In other words, two products together do more (or do it
faster) than the products by themselves.
BMC Remedy AR System is a powerful foundation and development environment for applications
that automate business processes. Its flexible multiplatform, multidatabase architecture and highly
customizable user interface enable BMC Remedy AR System to be adapted to the unique
business processes of a particular company and to evolve as those processes change. However,
BMC Remedy AR System alone cannot perform all of the functions in an environment. Instead,
BMC Remedy AR System applications can be integrated with other applications and tools to form
complete business solutions.
Integration benefits
The primary intent of business software is to enable users to do their jobs more quickly with fewer
resources. Using two products separately is usually less efficient than using them in an integrated
fashion.
For example, a user might have to enter the same information into two different applications, which
often results in errors. Or the telephone number of an incoming call might be manually entered by
a customer service representative rather than automatically captured. Application integration can
provide improved efficiency and effectiveness.
Data sharing — Passing data structures back and forth or jointly accessing a common
database.
Process linking — One application (App1) automatically launches another (App2) "in
context" so that App2 "knows" everything entered into App1, and the user is immediately
focused at the part of App2 that continues the process. Or App2 automatically does its job in
the background based on directions from App1, and the user does not even know it is
running.
The overall environment behaves as if it were one large application, and yet the company
can choose the discrete pieces that best meet the business requirements.
Example
In a help desk environment, a user calls a support person with a question. During the call, the
support person enters information about the user and the question into the call tracking
application. If the best way to answer the question is for the support person to walk the user
through a process on the user's workstation, the support person could click a button on the
call tracking application interface that runs a remote control application. The remote control
application opens a window on the support person's workstation that is a copy of the user's
screen, and the support person can take control of the keyboard and mouse functions of the
user's system to step through a process. The user gets an answer and the support person
never leaves his or her desk.
In contrast, some integration is done asynchronously. This means that an application can be
updating another application on an ongoing basis so that the second application is up-to-date the
next time it is accessed.
Example
Suppose a Human Resources application contains the names and office numbers of all of the
current employees of a company. Every night, the HR application writes a file that contains an
alphabetical list of all of the employees to a defined place on a file server. Whenever the help
desk starts the call tracking application, the application reads this file and dynamically builds
menus of the employee names so that the support personnel can fill in their forms quickly.
Conversely, whenever a change request to move an office is processed by the help desk, a
notification is sent to the HR system that contains the affected employee name, the new office
number, and an effective date.
For complete information about integrating with third-party products, see Integrating (see page 741)
.
BMC Remedy SSO allows users to present credentials only once for authentication and
subsequently be automatically authenticated by every BMC product that is integrated into the
system. BMC Remedy SSO supports authentication with traditional system such as Active
Directory through SAML authentication. BMC Remedy SSO is the central integration point that
performs integration with local enterprise systems.
BMC Remedy SSO is a lightweight web application. BMC products such as BMC Remedy IT
Service Management (BMC Remedy ITSM), BMC MyIT, and BMC Analytics applications use BMC
Remedy SSO agents that redirect unauthenticated user requests to the BMC Remedy SSO web
application. BMC Remedy SSO can provide SAML-based authentication wherein the BMC
Remedy SSO web application acts as a SAML service provider. It redirects logon requests to the
SAML identity provider.
BMC Remedy SSO is easy to deploy, configure, and maintain. You can deploy it in the failover
cluster that allows you to easily add or remove nodes on demand. BMC Remedy SSO persists
user sessions in a database instance, sharing sessions between all nodes. BMC Remedy SSO
works with Microsoft SQL and Oracle. Additionally, you can use existing BMC Remedy AR System
database infrastructure to leverage BMC product deployments and decrease maintenance costs.
Related topics
Concept Description
Architecture BMC Remedy Single Sign-On comprises the following components that provide authentication to BMC
(see page 206) applications that are integrated with BMC Remedy Single Sign-On:
BMC Remedy Single Sign On agent: Protects resources from unauthenticated logins.
BMC Remedy Single Sign-On web application: Authenticates users and gets validation requests from
agents.
BMC Mid Tier Remedy Single Sign On authenticator plugin: Validates the token from a user request and
extracts user information from the context .
BMC Remedy Single Sign-On AREA plug-in: Gets an authentication token from BMC Remedy Mid Tier
and verifies the token with BMC Remedy Single Sign-On web application.
Logon and When you log on to or log off from a BMC application using BMC Remedy Single Sign-On, you are
logoff (see automatically logged on to or logged off from other BMC applications as well.
page 111)
Authentication BMC Remedy Single Sign-On can be configured to integrate with different authentication providers, such as
(see page 112) SAML, LDAP, and Kerberos.
High BMC Remedy Single Sign-On web application can be deployed as multiple instances in a High Availability
Availability (HA) environment to form a cluster.
environment
(see page 122)
Realms (see BMC Remedy Single Sign-On provides realms to support multitenancy. Each realm contains one or more
page 117) domains. A realm is authenticated by using one of the authentication methods that BMC Remedy Single Sign-
On supports.
Multiple servers BMC Remedy Single Sign-On web agent supports communication with multiple BMC Remedy Single Sign-On
support (see servers for different domains.
page 121)
Concept Description
Double BMC Remedy Single Sign-On provides double authentication that ensures a second level authentication for
authentication the user while accessing BMC applications. BMC Remedy Single Sign-On implements different methods of
(see page 117) double authentication for BMC Remedy AR System and SAML respectively.
Related topics
When you log off, you are logged off of all BMC Remedy Single Sign-On integrated products.
Logon
When a user logs on to the BMC Remedy Mid Tier, the following events are triggered:
If BMC Remedy Single Sign-On is configured for SAML authentication, the access request
is redirected by the BMC Remedy Single Sign-On web application to the external Identity
Provider (IdP); for example, the Active Directory Federation Services (ADFS) logon page.
If BMC Remedy Single Sign-On is configured for BMC Remedy Action Request System
(BMC Remedy AR System) authentication, the web application logon page is displayed to
the user.
After the user enters valid credentials, a web filter (part of the web agent) that is placed within the
web container checks to see if the request is intended for a protected page. If so, it verifies that the
user is authenticated and then displays the BMC Remedy Mid Tier UI. If authentication does not
occur, the user is redirected to the logon page.
When the user tries to access the BMC Remedy Mid Tier from another browser tab or window, the
filter checks for an existing user session, and checks to determine whether or not the user is
already logged on. If the user has already logged on, as in this case, the BMC Remedy Mid Tier UI
is displayed without the user being prompted for credentials. If the user session does not exist yet,
or the user is not already logged on, the filter does the normal token check (from a cookie) and
redirects the user to the logon page.
Logoff
When the user logs off, the BMC Remedy Mid Tier web agent sends a request to the web
application. A reference counter on the user token table in the web application increments or
decrements the application count when the user logs on or logs off an application. The reference
counter is implemented by the applications logged on to by using the BMC Remedy Single Sign-On
token.
When a user logs off an application but the application count is greater than 0, it means the user is
still logged on. The user will not be prompted for credentials when accessing applications.
If the user logs off an application and the application count is 0, it means the user is logged off from
BMC Remedy Single Sign-On. The user will be prompted for credentials when accessing
applications.
Related topic
Orientation
Troubleshooting BMC Remedy Single Sign-On log on and log off issues (see page 4622)
BMC Remedy Single Sign-On common authentication workflow (see page 112)
SAML authentication (see page 113)
BMC Remedy AR System authentication (see page 114)
Kerberos authentication (see page 115)
Certificate-based authentication concepts (see page 116)
Related topics (see page 117)
1. A user tries to access a protected application by using the application-specific client (usually
from a mobile device) or a web browser.
2. The BMC Remedy Single Sign-On component (web filter or application-specific agent)
intercepts the request and, based on information about the user domain, identifies the realm
to which the user belongs.
If the configuration contains no specific domain-to-realm mappings (or mapping does not
correspond to the user domain), the default realm is used for further processing.
3.
BMC Remedy Action Request System 9.1 Page 112 of 4703
BMC Software Confidential. BladeLogic Confidential.
3. The web filter or agent forms an authentication request and sends it to the BMC Remedy
Single Sign-On server.
The BMC Remedy Single Sign-On server parses the request attributes and identifies the IdP
to use to authenticate the user, based on the user realm information and authentication
configuration.
Note
The authentication subprocess depends on the IdP type (SAML or BMC Remedy
AR System). The workflows for these authentication processes are described in
SAML authentication workflow (see page 114) and BMC Remedy AR System
authentication workflow (see page 114).
The common authentication logoff workflow for BMC Remedy Single Sign-On is as follows:
If any other application agent is associated with the user session, BMC Remedy
Single Sign-On displays a message indicating that the user is logged off from the
application.
If no other application agent is associated with the user session, BMC Remedy Single
Sign-On invalidates the user session and display a message indicating that the user
is logged off from BMC Remedy Single Sign-On. If the Final Logout URL specific to
the user’s realm is configured, the user is automatically redirected to the specified
URL
SAML authentication
Security Assertion Markup Language (SAML) is an XML-based OASIS standard for exchanging
user identity and security attribute information. SAML uses security tokens containing assertions to
pass information about a principal (usually an end user) between an IdP and a requester. SAML V2.
0 is implemented by grouping a collection of entities to form a Circle of Trust. The Circle of Trust is
composed of an SP and an IdP. The IdP authenticates users and provides the authenticated
information to the SP which hosts services that the user accesses. BMC Remedy Single Sign-On
provides support for SP-initiated single sign-on.
User accesses the protected application from a mobile device or through a web browser.
Web Agent redirects the user to BMC Remedy Single Sign-On console.
BMC Remedy Single Sign-On sends a request to IdP to authenticate user.
IdP presents a login form to user for authentication.
User enters valid credentials.
Note
1. The BMC Remedy Single Sign-On server determines that AR-based authentication should
be used.
2.
BMC Remedy Action Request System 9.1 Page 114 of 4703
BMC Software Confidential. BladeLogic Confidential.
2. The BMC Remedy Single Sign-On web application redirects the user to the BMC Remedy
Single Sign-On console logon page.
3. The user enters valid credentials.
4. BMC Remedy Single Sign-On communicates with AR System to authenticate the user
through the BMC Remedy Single Sign-On AREA plug-in.
5. AR System confirms the user authentication.
Kerberos authentication
Kerberos is a trusted third-party authentication service that is used to provide authentication
service for client and server applications by using secret-key cryptography. The clients and servers
are collectively referred to as principals. Kerberos uses a database that contains the private keys of
clients and servers. The private keys are used to authenticate different clients and servers on a
network. Kerberos also generates temporary session keys that are shared between a client and a
server to communicate with each other. All communications between a client and server are then
encrypted with the temporary session key.
The Kerberos architecture consists of the following entities and several modular services:
Kerberos workflow
1. User accesses the protected application from a client, such as a mobile device or a web
browser.
2. Web Agent redirects the user to the BMC Remedy Single Sign-On console.
3. BMC Remedy Single Sign-On sends to the client a 401 un-authorized request setting the
header to “www-authenticate:Negotiate”.
4. The client ends a request for a ticket to the Key Distribution Center (KDC), which is a
domain controller.
5. The Authentication Service of the KDC creates a ticket-granting ticket (TGT) for the client
wrapped in a SPNEGO (Simple and Protected GSS API Negotiation Mechanism) Token and
sends the TGT to the client.
6. The client then attempts to decrypt the TGT by using its password. If the client successfully
decrypts the TGT, the client keeps the decrypted TGT, which indicates proof of the client's
identity.
7.
BMC Remedy Action Request System 9.1 Page 115 of 4703
BMC Software Confidential. BladeLogic Confidential.
7. The client then sends to BMC Remedy Single Sign-On the user access request + the
Negotiate SPNEGO TGT in an Authorization: Negotiate base64(token) header and requests
for a service ticket. A client can uniquely identify an instance of a service by a service
principal name (SPN). A given service instance can have multiple SPNs. For example, an
SPN always includes the name of the host computer on which the service instance is
running, so a service instance might register an SPN for each name or alias of its host
8. BMC Remedy Single Sign-On validates the token with KDC.
9. KDC validates the token.
10. BMC Remedy Single Sign-On creates a session for the user’s access request.
11. The user accesses the protected application.
Before the Kerberos Authentication Service can use an SPN to authenticate a service, the SPN
must be registered on the account object that the service instance uses to log on. A given SPN can
be registered on only one account.
Certificate-based authentication concepts
The following list contains the concepts that you must understand to work with the certificate-based
authentication:
Common Access Card is a smart card about the size of a credit card. It is the standard
identification for active-duty military personnel, Selected Reserve, United States Department of
Defence (DoD) civilian employees, and eligible contractor personnel. It is the Department's
Homeland Security Presidential Directive 12 authorized personal identity verification cards.
This CAC technology allows for rapid authentication, and enhanced physical and logical security.
The card can be used in a variety of ways. Also, the CAC covers the bases for digital signature and
data encryption technology like authentication, integrity, and non-repudiation.
A CAC card contains one or more integrated circuits and may also employ one or more of the
following technologies:
Magnetic stripe
CAC is based on X.509 certificates with software middleware enabling an operating system to
interface with the card using a hardware card reader. X.509 is the established standard that
defines basic formats for Public Key Infrastructure (PKI) such as certificate and Certificate
Revocation List (CRL) format and enables basic interoperability.
Related topics
Integrating BMC Remedy Single Sign-On with other products (see page 833)
Configuring server settings for BMC Remedy SSO (see page 702)
BMC Remedy Single Sign-On agent supporting multiple servers (see page 121)
Configuring BMC Remedy SSO for BMC Remedy AR System authentication (see page 705)
Configuring BMC Remedy SSO for SAMLv2 authentication (see page 706)
Configuring BMC Remedy SSO for LDAP authentication (see page 714)
Configuring BMC Remedy SSO for certificate-based authentication (see page 717)
Configuring BMC Remedy SSO for Kerberos authentication (see page 720)
When the authentication mechanism is BMC Remedy AR System and when a user accesses a
BMC application, the web agent redirects the user to BMC Remedy Single Sign-On. After the user
presents her/his credentials, the first level of authentication is complete. Then, BMC Remedy
Single Sign-On again prompts the user to confirm her/his password before the user gains access
to the application.
When SAML is the authentication mechanism, the IdP does both the first and second levels of
authentication. In both instances, IdP prompts the user to present the complete credentials.
BMC Remedy Single Sign-On provides realms to support multitenancy, which is a default
functionality of Remedy Single Sign-On. Each realm is identified by a unique realm identifier and
contains one or more application domains. A realm is configured to be authenticated through one
of the authentication methods that BMC Remedy Single Sign-On supports. Multitenancy is
supported by creating additional realms for different domains.
You can manage realms from the Admin console of BMC Remedy Single Sign-On. For more
information about managing realms, see Managing realms in BMC Remedy Single Sign-On (see
page 1734).
The following example describes how BMC Remedy Single Sign-On realms work.
Notice, that each application has a different domain. You can create two realms, helpdesk and
itsm, and map the application domains and authentication methods to these realms as listed in the
following table.
The helpdesk realm contains one domain, helpdesk.yourcompany, and this domain will
authenticated by the SAMLv2 authentication method.
The itsm realm has two domains, itsm.yourcompany and myit.yourcompany, and both
domains will be authenticated by the Kerberos authentication method.
When a BMC Remedy Mid Tier user clicks the link of a protected application, the BMC Remedy
Single Sign-On web agent that is deployed on the protected application intercepts this request.
Based on the configuration data that is stored in the database for the domain of the protected
application, the web agent identifies the realm to which this user belongs. The web agent then
sends the realm and user information to the BMC Remedy Single Sign-On web application. The
BMC Remedy Single Sign-On web application creates a record in the session data storage and
identifies the authentication provider for the realm. BMC Remedy Single Sign-On web application
then redirects the user to the logon page of the authentication provider. For example, if the
authentication provider for the realm is an Active Directory Federation Services (ADFS), BMC
Remedy Single Sign-On displays the ADFS logon page to the user.
The web agent maps the server host name that is used by the user to access a protected
application to the full logon and logoff URLs. The logon URLs contain the information, such as
domain name and authentication provider ID, required to separate different domains from one
another.
In the above example, suppose a user clicks the link to access the Helpdesk application. The web
agent deployed on the Helpdesk application identifies the realm based on the domain of the
Helpdesk application, which is helpdesk. The web agent sends the user and the realm information
to the BMC Remedy Single Sign-On application. Based on the configurations made for the
helpdesk realm, the BMC Remedy Single Sign-On application identifies that the authentication
provider for helpdesk realm is ADFS. The BMC Remedy Single Sign-On application displays the
ADFS logon page to the user.
For multi tenancy, create a unique realm for each tenant and add a comma-separated values of
application domains for that realm.
Each value in the application domain is a host of an application URL for that tenant. For example, if
the URL for the MidTier application is http://tenant1.midtier.company.com/arsys, the host will be
tenant1.midtier.company.com.
Ensure that all applications of a tenant have a corresponding value in the application domain string.
For example, consider that you created realm1 for a tenant that has two applications the following
URLs:
In this scenario, for realm1, the application domain value will be a comma-separated string of
tenant1.midtier.company.com and tenant1.myit.company.com.
Related topic
An advanced feature of the BMC Remedy Single Sign-On web agent supports communication with
multiple BMC Remedy Single Sign-On servers for different domains.
The mapping between a domain and a BMC Remedy Single Sign-On server (<domain>:<url>) is
defined through the following properties in the “rsso-agent.properties” file.
sso-external-url
Agent redirects the browser (user’s request) to this url when it detects that the
request needs to be authenticated.
Agent redirects browser to this URL when it detects that the application logout is
completed (i.e. if the request refers to ‘logout-urls’).
sso-service-url
Agent uses this URL to call BMC Remedy Single Sign-On webapp APIs to:
Retrieve configuration details such as cookie name, cookie domain, and realm-
domain mappings.
Check if the token cookie from the browser (user's request) is valid and if it is
valid, retrieve BMC Remedy Single Sign-On.
Register on BMC Remedy Single Sign-On server to track other application
agents. The tracking helps the agent to know the login status of other
application agents prior to logging out.
To support multiple BMC Remedy Single Sign-On servers on an agent, set the different values of
domain to sever mapping as comma-separated strings. For example, assume that the BMC
Remedy Single Sign-On server for the domain “firstcompany” is firstcompany-rsso.bmc.com and
the BMC Remedy Single Sign-On server for the domain “secondcompany” is secondcompany-rsso.
bmc.com. Then the properties definition will be as follows:
sso-external-url=firstcompany:https://firstcompany-rsso.bmc.com:8443/rsso,
secondcompany:https://secondcompany-rsso.bmc.com:8443/rsso
sso-service-url=firstcompany:http://firstcompany-rsso.bmc.com:8080/rsso,secondcompany:
http://secondcompany-rsso.bmc.com:8080/rsso
Related topics
When operating as a cluster, BMC Remedy Single Sign-On functions as a single virtual server.
Therefore, certain configuration information and user sessions data are stored in the database and
shared (not replicated) between nodes. For example, when one node is configured, the other
nodes have the same information.
Administrative accounts
Configuration of the authentication providers
Branding-related data
Issued tokens and user-session data
License overview
AR System licensing grants the legal use of BMC Remedy AR System and is necessary for
performing unlimited operations that change the database (for example, updating requests).
Note
You do not need a license to install BMC Remedy AR System features, such as BMC
Remedy Developer Studio.
Use this section to get information about the types of licenses, license charges, and obtaining your
license key for the AR System server.
To add any license to a BMC Remedy AR System server, you must first add an AR System server
license (see Adding or removing licenses (see page 274)).
To add an AR System server license, you need a license key (see Obtaining BMC Remedy license
keys in BMC Remedy ITSM Deployment documentation).
After installing your server and adding its license, you can:
Because servers in a server group use the same database, they share licenses. Each server must
have its own AR Server license and license key, but it shares all other licenses with the other
servers in the group. For more information about server groups, see Configuring server groups
(see page 375).
For more information on how to track license usage, see Displaying and tracking server group
license usage (see page 278).
Licensing behavior
This table lists the behavior of licenses:
Component Behavior
License Only BMC Remedy AR System server licenses need keys. Customers can add all non-server licenses without the
keys need for a key.
Dedicated Dedicated server licenses are not used. During upgrade, dedicated server licenses are upgraded to full AR System
server server licenses at no cost. In addition, licenses for any applications associated with the dedicated server are
licenses automatically added to your system.
License notes
The following notes apply to BMC Remedy AR System licensing:
Fixed user licenses are considered site licenses, where a site is defined as all of the AR
System servers licensed under a single Support ID. Fixed user licenses are assigned to a
named user who is entitled to use the same fixed user license anywhere within the site.
If the fixed user license is entitled only as a development fixed user license, it may be used
only on development servers.
When you add AR System or application user floating licenses to a server, you specify the
number of such licenses that can be concurrently used in the Number of Licenses field. This
number is the maximum number of licenses available for use. This number does not have to
be the same as the number of licenses you purchased. The peak number of user floating
licenses in use at the same time during each billing period is tracked and used for billing
purposes.
A floating user license is associated with a single instance at any given time. While it can be
transferred between instances, it cannot be associated with two instances at one time.
Important
To remain in compliance with your purchased licenses, be sure to set the appropriate use
limits in the Number of Licenses field for each license.
BMC Remedy AR System User— The following types of licenses provide users write access
to an AR System server:
AR User Fixed
AR User Floating
See License types for users to access BMC Remedy AR System server (see page
1323).
Server options — Optional server components, such as Distributed Server Option (DSO),
require separate licenses.
Application — To be run on an BMC Remedy AR System server, most applications must be
licensed on the server.
Application user— To use BMC Remedy AR System-based applications, each user needs
the following licenses:
BMC Remedy AR System user (fixed or floating)
Application user (fixed or floating)
An BMC Remedy AR System server with no server license enables you to assign these licenses:
You can evaluate BMC Remedy AR System without purchasing or activating any licenses. You are
limited, however, to a maximum of 2000 requests per form.
To purchase additional licenses, contact your BMC Remedy product sales representative or an
authorized reseller.
For information about licensing applications that you create using BMC Remedy products, see
Making applications licensable for integration system vendors (see page 3282).
BMC Remedy AR System provides a rich set of features that protect your data from unauthorized
access. In addition, it has a logical, multitiered access control structure that is straightforward for
you to implement and for users to understand.
BMC Remedy AR System enables you to meet these seemingly opposing security goals. It
enables you to control which users can access data and perform certain actions such as modifying
a request or triggering an active link. User access is determined by these conditions:
BMC Remedy AR System uses a multitiered approach to control access at these points:
Server
Form (or table)
Field (or column)
Active link and active link guide
Request (or row)
This approach provides a wide range of control over data access, enabling you to restrict access
broadly at the highest levels (server and form) and narrowly at the request and field levels.
Because you can refine your data access criteria so precisely, you can use a single form for many
different purposes simply by setting the appropriate permissions.
When users start an BMC Remedy AR System client, they must enter a user name and a
password, which are checked against every AR System server with which the client is trying to
connect. After a connection is made, each request that goes between the client and the server has
the current user name and password checked to verify that the values are still valid.
In addition to having a unique user name and password on a server, every user is a member of
zero or more groups. Groups are defined and maintained with the Group form, where each record
is a different group definition. For example, there might be groups defined for First-Level Support,
Back-Line Support, and Support Management. Groups are used to control information access to
forms, requests, fields, and active links/guides. As a practical matter, most users are likely to
belong to the Public group.
You could use group access to forms so that a particular form is visible to users in the Support
Management group, but not to users in the First-Level Support and Back-Line Support groups. For
a particular form, an administrator can determine that certain requests are accessible only by
members of one group and that other requests are accessible by members of a different group.
In addition, every field on a form has access control. You set field permissions when you define the
field properties in BMC Remedy Developer Studio. Each field can have a list of groups that can
view the field and the data entered into it. Some or all of the groups with View permission might
also have "change" access so that they can enter and modify the data. If a user opens a form on
his or her workstation and the groups he or she is a part of do not have View access to some of the
fields, those fields are not displayed on the form. A field can also be visible to users or hidden so
that it is accessible only through workflow.
Finally, each active link and active link guide has its access control assigned when it is created. A
user who has access to an active link does not automatically have access to the field associated
with it. Similarly, a user who has access to a guide does not automatically have access to the
active links in the guide.
Access control in BMC Remedy AR System is additive. That is, each user starts out with no access
permissions; administrators then add permissions as needed. In this way, BMC Remedy AR
System implements strict access control. Administrators must make a conscious decision to grant
access to specific groups on a case-by-case basis. However, if desired, the default permissions
can be changed.
Each access control group is defined for a particular server. An access control group has
permissions that determine whether and how its members can access application components,
such as forms, requests, fields, active links, and active link guides. (Administrators can also set
default permissions for each component type so that whenever they create a component, selected
groups automatically have access to it.)
Users are assigned to groups according to their need to access information. For example, you
might create a group called Employee Services Staff whose members are permitted to view and
change only certain fields in an Employee Information form. You might have another group called
Employee Services Managers whose members are permitted to view and change all fields in the
Employee Information form, including salary information. You can also configure a hierarchical
relationship between groups to allow the parent group to inherit the permissions of the child group.
BMC Remedy AR System has predefined groups that perform specific functions (see Types of
access control groups (see page 128)). In addition, you can create any number of custom groups
in BMC Remedy AR System to enforce access control. You can also permit unregistered users to
access BMC Remedy AR System as guests. Guests are members of the predefined Public group.
Explicit A group to which you must assign users. Any regular and computed groups that you create.
Administrator Regular groups are groups to which you assign a
Sub specific list of users. Computed groups are groups
Administrator to which users are assigned based on their
Customize memberships in groups included in an expression.
Implicit A group to which a user automatically (or Any dynamic groups that you create.Dynamic
implicitly) belongs by virtue of the Public groups use the contents of special fields to
contents of certain fields in a request. Submitter determine group membership.
You cannot assign users to implicit Assignee
groups. All users are members of Public. Assignee
You use the other types of implicit groups Group
to control access to requests (row-level
database access).
For more information, see Licensing BMC Remedy AR System (see page ).
Access control in BMC Remedy AR System is additive. This means that each user in BMC
Remedy AR System begins with no permissions. Administrators then add permissions as needed.
The server verifies the permissions of an object to determine if access to the object is granted. If
access is granted at any step along the decision tree, as shown in "Additive permissions" (see
page 129), the user has permission to access the object. As you add permissions to various BMC
Remedy AR System objects, users have access to the object if they are members of any group
with access or any role that maps to a group with access.
In this example, Lydia Lan is a member of two groups: Engineering and Engineering Managers.
The Engineering group does not have access to Form1, but the Engineering Managers group
does. Thus, although Lydia does not have access to Form1 through the Engineering group, she
does have access through the Engineering Managers group.
Additive permissions
You must assign permissions to every application, form, field, active link, active link guide, packing
list, and web service that requires access control. Start by designing the access control for your
application or forms. Define default permissions before you create objects and fields to save time
and prevent errors. You can also use batch Edit dialog box and the Assign Group Permissions
dialog box to change permissions for multiple object in one operation. For more information, see
Assigning permissions (see page ).
Users often belong to multiple groups in an organization. They inherit permissions from each of the
groups to which they belong.
If a group has permission to access a form, field, request, active link, or active link guide and a
user belongs to that group, the user has access, even if the user belongs to other groups that do
not have access.
Roles make deployable applications easy to install on multiple servers. You can assign users to
groups, then associate the groups with roles. This enables you to install an application on servers
that have different groups without redefining the application's object permissions for each server.
The following table lists the roles used to access the deployable applications:
AR Definition Allows read access to the AR System metadata forms. The AR Definition Administrator also has the ability to
Administrator modify definitions through configurations.
Archive Configures and manages the archive policies. The Archive Administrator performs the following tasks:
Administrator
Accesses the AR System Archive Manager console
Enables and disables system-wide archiving
Enables and disables individual archive policies
Runs an on-demand archive process
Exports and deletes archive data
Email Engine Configures the Incoming and Outgoing mailboxes to work with the mail server and manages email
Administrator templates.
Home Page Specifies the default home page for a server and configures the AR System Customizable Home Page.
Administrator
Reporting Defines who has access to view a report. Views and manages the reports shared by all users.
Administrator
User Adds and deletes users in the AR System server, manages user permissions and user preferences.
Administrator
Notes
The AR System Administrator has all the rights defined for the above roles.
To simplify, user access is usually described in terms of group permissions. For
the deployable applications that use role permissions, the user access is ultimately
determined by the groups that are mapped to the roles.
For more information, see Creating and mapping roles (see page 1262).
BMC Remedy AR System uses a multitiered approach to control data access. At each access
level, a user's permissions are checked. If access is permitted, the user proceeds to the next level.
If access is denied at any point except active links and active link guides (workflow), the user
cannot proceed. (If access is denied at workflow, the user might be able to proceed, but his data
access capabilities will be limited.)
For example, if a user is denied access to a form, the user cannot see any fields associated with
the form. For another example, a user's ability to access a request depends on whether he belongs
to a group that has access to the Request ID field.
Access Description
level
BMC Users must pass an initial checkpoint when they start an BMC Remedy AR System client, such as a browser. At this
Remedy point, users must enter a valid user name, a password, and, as an option, an authentication string. BMC Remedy AR
AR System servers check the user name, password, and authentication string each time a client requests a transaction,
System such as when opening a form or changing a field. If your BMC Remedy AR System server is configured to allow guest
server users, such users can log in to the server without a valid user name or password. See User form access (see page
1327).
Form
Access Description
level
As an administrator, you give groups access to forms according to each group's need to view or change information in
the form. Visible access enables users to access a form from the Object List. Hidden access makes a form available
only through workflow. Static permissions inheritance and dynamic permissions inheritance properties control access
to the form for parent groups. If a group is not given access to a form, members of that group cannot view the form or
change the requests that it contains.
Field You can control access to each field on a form, including nondata fields such as trim fields, table fields, and active link
control fields. You can make a field visible to users or hide the field so that it is accessible only through workflow. For
data fields, you also specify whether a group can only view field information or also change it. If a group cannot
access a field, the field does not appear when members of the group open the form.
Active In addition to controlling access to form and field data, you can control access to active links, which trigger a variety of
link workflow actions. For example, you might allow support staff to trigger several active links appropriate to their work but
not allow other users to trigger those active links. Groups do not automatically have access to the field associated with
an active link. You must grant them access to the active link and to the field. For active links that fire when users click
a button or choose a menu item, the users must have access to both the button or menu item and the active link to
trigger the active link.
Active When you create an active link guide, you specify the groups that have access to it. To access an active link guide, a
link user must have permission to each active link in the guide and to the guide itself. If a user has access to all active
guide links in a guide but not to the guide, the guide does not appear.
Request You can strictly control who can access requests associated with a form. For example, you might want only managers
to access requests with confidential employee information. Or you might provide an outsourcing service in which you
use BMC Remedy AR System as the central service desk for several companies, and you do not want one company
to see requests from another company.
Note
BMC Remedy AR System includes a setting that enables you to permit users who are not
recognized users to access to BMC Remedy AR System applications as a member of the
Public Group. For more information, see User and group access overview (see page 128)
.
Although licensing is not a component of access control, licensing can affect a user's ability to
perform an operation that you grant the user permission to perform. For example, if a user is a
member of a group that has Change permission to a field but you did not give appropriate write
license, the user cannot change the field.
This section describes application types and components, describes localization features for the
applications, and provides an example of the BMC Remedy AR System application.
BMC Remedy has developed a number of applications, including BMC Remedy Help Desk, BMC
Asset Management, BMC Change Management, BMC Remedy Service Level Agreements, BMC
Remedy Quality Management, BMC Remedy Customer Support, and BMC Remedy Citizen
Response. These applications are used to track information such as trouble tickets, change
requests, asset records, purchase orders, stock trades, and service level agreements.
Form — The main BMC Remedy AR System application component that users interact with
is a form. Each form is composed of fields. Forms display information in fields. A field can be
a unit of information, such as an employee's last name, or it can be a visual element, such
as a line or a box. You can design different field arrangements, or views, of forms for
different user functions.
Each data field on a form has a set of properties that define the size of the field, the type of
data that the field stores, and any access permissions. There are also several fields that
don't contain data but instead organize data or improve the appearance of the screen: active
link control fields (buttons and hotlinks), table fields, trim fields, and panel fields. Fields from
existing forms can be combined into join forms.
Adding fields to a form causes the AR System server to create columns in a database table.
When a user fills in the fields and saves the data, the system creates a request to track. In
database terms, each request is a record.
You can bundle related forms into an application. For example, a human resources
application might include forms for basic employee data, health benefits, and salary
information. You can deploy the application to multiple servers to make it accessible to
employees in different locations. You can also display your application on the web to allow
access from a browser on any platform, as shown in the following figure.
Menu — Menus are lists that you create to guide the user in entering information in fields on
forms. Menus are attached to fields on forms as fill-in aids. They can provide suggestions for
entering data into a field, or can be mandated as the only possible choices. Menus can be
statically defined, dynamically built by querying other AR System database tables, read from
text files written by other applications, or created from SQL queries to external databases. A
menu can contain all possible values for a field, or it can contain some possible values,
enabling users to enter text that is not on the menu. You can design dynamic menus, which
change their contents based on the data already entered in the form. See Field menus (see
page ).
Workflow — While forms provide the mechanism to structure data capture and menus offer
options for specific field data, additional components (active links, filters, and escalations)
act on the data to automate business processes, or workflow. These components trigger
actions in response to execution options that you define. In BMC Remedy AR System,
workflow generally refers to the operations triggered by these components, but BMC
Remedy AR System also addresses the broader meaning of workflow, which consists of the
processes that your organization uses to run itself. See Workflow overview (see page 139).
Association — If you want to create a relationship between two different forms in BMC
Remedy AR System, you can create an association. Association is a new object added in
BMC Remedy Developer Studio which is used for creating relationships. These relationships
are used in various BMC applications.
Forms are the foundation of BMC Remedy AR System. A form captures and displays information
and a set of forms can be grouped into an applications. An AR System application is a server
object that contains references to one or more forms. When an application references a form, BMC
Remedy AR System automatically includes all the workflow and other components (such as
menus) associated with the form in the application.
Sometimes a single form can contain all of an application's functionality. For example, a small
application that tracks product defects can use a single defect-tracking form to capture and display
all required information.
Most applications, however, need several forms to capture, track, and organize information. One or
more forms make up the application's main forms (sometimes called primary forms) that users
interact with directly. Often, the main form is a console that serves as a navigation and information
center. The application can also have other forms, called supporting forms, which supply
information needed by the main forms.
For example, a service desk form captures information needed to fix a user's computer problem. A
purchase requisition form captures the information needed to purchase an item. The following
figure illustrates a BMC Remedy AR System form.
Each form contains fields. Some fields, known as data fields, capture a certain type of information,
such as a user name or problem details, and have their own set of rules about who can view or
modify that information (see Field types (see page 150)). Some fields can have attached menus
that help users fill in the form (see Field menus (see page )).
Each form in an application is like a template to capture or present information. When a user opens
a form to perform a task, the template is presented to help the user complete the task. When the
form is filled in and submitted to BMC Remedy AR System, the system creates a request, also
known as a record in database terms.
Forms are stored as tables in the database. Each data field on the form corresponds to a column in
the table. A request corresponds to a row (or record) in the table.
You can create the following types of forms, as illustrated in the following figure:
Form types
Form Description
type
Regular Information submitted through and displayed in regular forms is stored in database tables. These forms are typically
the main forms in applications. They are also called data forms.
Display-
only
Form Description
type
These forms contain display-only fields that enable users to accomplish specific tasks. These forms are typically used
to create control panels, which are launch points from which users choose other tasks. Display-only forms can also be
used to create dialog boxes, which prompt users as they fill out a form. Display-only forms do not contain data, so no
database tables are associated with them.
Join These forms are composed of fields from two or more existing forms. Join forms are useful when you have information
in multiple forms that you want to display in a single form. Join forms do not contain data, so they have no database
tables associated with them. The data is contained in the underlying forms that make up the join form.
View These forms enable users to connect to database tables created outside of AR System. These forms enable you to
bring data from other applications that is stored in a database into AR System without replication or programming.
Vendor These forms enable users to connect to external data sources such as text files, spreadsheets, or database tables
residing on local or remote servers through an ARDBC plug-in. Some programming is required to connect to the data
source.
You can create as many views of a form as you need. For example, you can provide views
customized according to the following criteria:
Workflow overview
The function of workflow is to process the data captured in forms in accordance with your business
needs. In BMC Remedy AR System, workflow automates your company's processes through the
use of active links, filters, and escalations. In general, workflow can be defined as the set of
processes that your company uses to run itself — for example, tracking defects or administering
employee benefits.
You use the workflow components of BMC Remedy AR System to enforce business rules in a
variety of ways, including notifying people of events, escalating problems to a higher level,
automatically routing information, and checking whether key data is correctly entered. For example,
if your organization decides that purchase orders for amounts above a certain level need director
approval, you can design workflow that allows only correctly approved purchase orders to be
automatically forwarded to the purchasing department.
If a workflow definition is triggered and the qualification is met, one or more actions can be taken
by BMC Remedy AR System.
Some of the actions that workflow components can take to automate processes and ease data
entry include:
Active link — An active link is an action or group of actions performed on the browser. Active
links are triggered by user actions in a form. They can be used to perform a variety of tasks,
such as giving quick responses during data entry and auto-filling fields. For example, an
active link can verify a value entered in the Employee ID field of a request and then pull
information from a supporting People form to fill in other fields on the request, such as
Requestor Name, Department, and Phone Number, dramatically reducing the time required
for support staff to fill out a request.
Filter — A filter is an action or group of actions performed on the AR System server. Filters
are used to enforce business rules and to ensure system and data integrity. As the server
processes a request, the filters associated with that form and action evaluate the data in the
request. For example, you can verify the values in a completed form by using a filter to
compare them against your business rules and return an error if the request violates any of
those rules.
Escalation — An escalation is an action or group of actions performed on the server at
specified times or time intervals. Basically, an escalation is an automated, time-based
process that searches for requests that match certain criteria at specified times and takes
actions based on the results of the search. For example, an escalation can trigger AR
System to notify the next level of management if a problem is not assigned to a technician
within one hour of submission.
This following example illustrates how the workflow objects work together with other BMC Remedy
AR System application components. In the example, when Ramona entered her telephone number
into the Telephone # field, the following sequence occurred, as illustrated in the following figure:
1. An active link searched the Employee form to retrieve the name, configuration, and location
associated with the telephone number.
2. After Ramona finished entering information into the form and submitted it, filters triggered an
external paging system integrated with AR System to notify Becky that Ramona's printer
was not working.
3. Becky fixed the problem.
4. Becky changed the status of the request, and a filter notified Ramona that her problem was
solved.
If the situation had been flagged as an emergency and no one was assigned to the request within
an hour, an escalation would have paged all required support personnel, and a filter would have
sent Ramona an email message informing her of the status of her request.
The workflow components in guides are organized in a processing sequence. Using guides
enables you to give a name to a set of workflow operations that accomplish a specific task.
In addition, interactive or navigational active link guides can interact with users by requesting
information and then waiting for input. This enables you to create tasks that guide users through
application processes in a way similar to wizards.
An active link guide is a group of active links. Because active link guides run on a browser, they
can augment training by leading users through the steps necessary to fill in one or more forms to
accomplish a specific task. For example, when an employee clicks a Request Business Cards
button on a human resources form, an active link guide might open a business cards form and then
display input instructions, field by field, until the card request is complete and ready to submit.
Active link guides can also be used as subroutines to accomplish common tasks.
A filter guide is a group of filters that can be used as a subroutine in workflow. Because filter guides
run on the server, they cannot be used like active link guides to lead users through a form.
This table summarizes how and where you use filters, active links, and escalations:
For example, a filter can notify a support manager whenever a request is submitted with a priority
of High or Critical. The submission of the request is the event. Other events that can trigger filters
are updating, deleting, and retrieving requests. Actions that can trigger active links include opening
or closing a window, displaying a request, clicking a button on a form, pressing Enter when the
cursor is in a field, or selecting a menu item.
Escalations are triggered by the passage of time. The trigger (or execution option) can be either
absolute time, such as "every day at 2:00 p.m.," or a time interval, such as "one hour between
escalation runs." For example, an escalation can warn a group of users that in one hour their
manager will be notified that a problem has been unsolved for too long.
Workflow running on clients versus servers
Active links are executed on the client side in response to actions that users perform in forms,
whereas filters and escalations are executed on the server.
For example, active links can change how a form looks or behaves, validate data entered by users,
or use data in a form to find other data for the form. Unless an active link queries the AR System
server for information or runs a process on the server, it can complete its operation without sending
a request to the server. This capability helps decrease overall network traffic and improves the
performance of an application.
Filters and escalations implement business rules by examining newly created or changed requests
and taking actions based on the new data and the business rules. For example, if your business
wants to avoid handling purchase orders that are not properly approved, you can create a filter that
stops AR System from processing such purchase orders after they are submitted to the server and
then notifies the requester accordingly.
Actions associated with filters and escalations take place after the transaction is transferred to the
server for processing. Then, processing can return to the browser, where more active link actions
can take place.
Note
API calls to the server trigger filters but not active links. If a business rule must be fired on
any input (including user input and input from an integrated process using an API), the
business logic must be in both an active link and a filter.
You define workflow by specifying the actions that active links, filters, and escalations should
perform under specified circumstances. The circumstances are called execution options. You can
create workflow components for a single form, or you can share workflow components with multiple
forms. (Workflow components cannot exist independently of forms.)
The basic questions about workflow are "What can I do, and when can I do it?" The actions that
workflow can take are the what, and the execution options are the when.
For example, users could click a button labeled Display My Active Cases to display a list of all
requests assigned to the user.
You can refine execution options by specifying a qualification that must be met before an action is
taken. Qualifications are often required to ensure that workflow actions apply only to certain
requests. In addition, carefully designed qualifications make workflow components more efficient
and powerful.
You can specify a primary action and an alternative action. If an operation meets the qualification,
the primary ("if") action is performed; if not, the alternative ("else") action is performed, as shown in
the following figure.
For more information about workflow actions, execution options and qualification, see
Workflow actions
The following table lists some of the actions that active links, filters, and escalations can perform.
For a complete list, see the Types of workflow actions (see page 2713) topic.
Workflow actions
Change Changes the appearance of fields. For example, a Change Field action can perform +
Field one or more of these actions:
Message Prompts with advice, gives reactive information, warns of a particular situation, or + +
presents an error message and stops the processing of current workflow. Active links
execute on the client, so they can display messages immediately. For example, when
users fill in a particular field, an active link could warn that a related field must be filled
in first. Active link messages can appear in different display formats, such as a dialog
box, the Prompt Bar, or a tooltip. Filters execute on the server, so they are useful for
checking entire transactions and sending error messages or informational messages.
For example, a filter could display a message indicating that the support staff has been
notified about a problem.
Notify Sends event notifications to users or groups by email, or a custom mechanism, such + +
as a Windows service that pages users. For example, a filter might notify support staff
when they are assigned a request. Or an escalation might notify the service
department when an asset warranty has expired.
Open Opens a window of any type in the client. The action can open a New window and load +
Window some default data. Or it can open a Modify window with requests matching a specified
qualification. This action can also open a dialog box. Data can be passed between the
dialog box and the window that calls it. Processing of active links from the calling
window is suspended until the dialog box interaction is completed.
Push Changes the values of fields in another request to the values in the current request + + +
Fields (that is, it "pushes" the values from the current request to another request). This action
can also change the value to a keyword or a function. You can use Push Fields to set
values in related requests or to create requests that are associated with the current
one. For example, you can use this action to create multiple work orders for a
telephone connection, a network address, and new furniture when an employee is
hired.
Run Runs a separate process (program) on the server for filters and escalations or on the + + +
Process Windows client or server for active links. For example, a filter can send a page, or an
active link can launch a browser on a user's desktop.
Service Works with an AR System web service to obtain external services or with a Set Fields + + +
filter action to consume an internal AR System service.
Set + + +
Fields
Sets fields on a form to specified values. For example, a filter can automatically set the
Status field to Assigned every time a name is entered into the Assigned To field. The
value set in a field can be static (always the same), a keyword value, or a value
retrieved from another data source.
Execution options determine when workflow runs. For active links and filters, you specify what
event triggers the workflow; for escalations, you specify the execution schedule for the workflow.
For all workflow components, you can refine the execution option by adding a qualifying statement
that tells the system which set of actions to run if the additional criteria are met and which set to run
if the criteria are not met.
The following table lists examples of execution options for active links and filters. For a complete
list, see Defining workflow execution options (see page 2635).
Button/Menu Executes when a user selects the button or menu item associated with the active link. +
Field
Gain Focus Executes when a user or a Change Field action moves the cursor to a field. +
Display Executes after a request is loaded into a form but before the request appears in the Details +
pane.
Hover on Field Executes when a user hovers the mouse pointer over a field, field data, or a field label. To +
Hover on Data display tooltips, use a Hover execution option to trigger a Message action.
Hover on Label
Lose Focus Executes when a user or a Change Field action moves the cursor out of a field. +
Menu Choice Executes when a user chooses an item from a character menu associated with a specified +
field.
Modify Executes after a user modifies an existing request but before the request is sent to the AR + +
System server (for active links) or to the database (for filters). An active link with this
execution option does not run during a Modify All operation.
Submit Executes after a user submits a new request but before the request is sent to the AR + +
System server (for active links) or to the database (for filters).
Table Refresh Executes when a user updates a table's contents by loading the field, sorting, refreshing, or +
displaying the previous or next part (chunk) of the table.
Window Open +
Executes when a user opens a form or dialog box or changes a form to a different mode.
This is especially useful for establishing initial environments. It executes before any data is
loaded into the window.
Some execution options depend on how a user interacts with fields on the form. For example, if the
user does not click a particular button, that active link does not fire (the user "controls" whether the
active link fires). Use "user-controlled" execution options to provide additional helpful information,
such as a list of nearby printers.
Active links that are not under a user's control, however, fire whenever the user finishes a task.
That is, if the user follows the normal steps, from opening a window through closing the window,
the active links not under explicit user control always fire. (Of course, if a user does not submit or
modify the request, the active links that fire on Submit or Modify do not execute.) Use execution
options that are not controlled by users to ensure that consistent, complete data is maintained
regardless of whether users perform certain actions. For example, to guarantee that every
submitted request includes the host name, an active link could retrieve the host name of the client
and copy it into a field in the form whenever a request is submitted.
Execution order of active links and filters
Active link execution options have an implicit order in relation to one another and to the interaction
between the client and server. You can use this order to control when the active link runs. For
example:
If field values were required for workflow processing before a request is displayed, you
would set them on Window Open. However, to set any values that you want the user to see
when a request is displayed, you would use the Display execution option.
An active link that runs on Window Open might check the user's permission to open a
Modify All window and, if the user does not have permission, generate an error message,
preventing the window from opening.
More than one active link or filter can run on the same execution option. In this case, you can
specify the order that you want it to fire in relation to the other active links or filters. One reason to
do so is that the output of one active link can affect another active link. By carefully ordering a
group of active links, you can perform very complex operations.
When active links and filters are bundled into guides, execution order within the guides is ignored.
Instead, workflow executes in positional order within a guide. This enables a guide procedure to
run without affecting the order of workflow outside the guide.
Escalation execution options
In contrast to active links and filters, which react to events, escalations respond to the passage of
time. You can trigger an escalation at a specific time, such as every Monday at 6 a.m., or at a time
interval, such as eight hours after each run of the escalation.
When the specified time arrives, the server searches for requests in the database that meet the
escalation's qualification. If it finds any, the server runs the escalation's primary ("if" ) actions for
each matching request. If no requests meet the qualification, the server runs the escalation's
alternative ("else" ) actions, if any, once. The following figure illustrates how escalations work.
An alternative ("else") action for the example in the figure might be to notify the manager that all
requests comply with the assignment rule. This action would run only if no requests meet the
escalation qualification.
Workflow qualifications
Qualifications in active links, filters, and escalations enable you to define the data condition that
causes the workflow component to take action.
You can use qualifications to check values in fields, the amount of time that has passed since a
specified event occurred, and many other factors. For example, a qualification might check whether
the priority of a request is High or Critical or whether the day is a weekend day.
Qualifications with active links and filters work differently from qualifications with escalations:
Active link and filter qualifications control which actions, if any, are run for the current
request. For example, an active link can run actions whenever a specific field is filled in
(execution option), or it can run actions whenever the field is filled in and the value in the
field is invalid (qualification).
Escalations are run whenever the scheduled time arrives. The qualification is an essential
part of most escalations, not simply a refinement. It determines the requests on which the
primary ("if" ) escalation actions are run. Without a qualification, the primary actions are run
on every request (record) in the form to which the escalation is attached. For example, if an
escalation simply sent a notification every hour (execution option), the notification would be
meaningless. A meaningful escalation, however, might check every hour (execution option)
whether three or more hours have elapsed since a request was submitted and the request is
unassigned (qualification), and then send a notification listing the unassigned requests to a
manager. If no requests meet the qualification, the escalation might specify alternative
("else" ) actions that are executed once, such as sending the manager a notice that all
requests comply with the assignment rule. For an illustration of how qualifications are used
in escalations, see How escalations work (see page 147).
For filters, the qualification can check the value of a field in the database, in the current transaction,
or both. This makes it possible to check whether the value of the field is changing. For example, if
you have a business rule that service desk requests can be closed only if they have been fixed, a
filter could check all transactions that change the status of a request to Closed. If the database
value of the status is Fixed, the request can be modified; otherwise, the change is not allowed.
Keywords in qualifications
A keyword is a variable whose value is defined by AR System. Keyword names are uppercase and
enclosed in dollar signs. For example, $USER$ represents the name of the user who is currently
logged in, $TIMESTAMP$ represents the current date and time, and $OPERATION$ represents the
operation currently in progress.
Keywords are used to build qualifications. Keywords can be used almost anywhere a qualification
can be defined or a value specified:
Defining qualifications for search menus and for workflow. For example, workflow can check
the value of the keyword $OS$ to ensure that the operating system can run a process that
you specify in workflow.
Specifying a value in the Set Fields action.
Defining searches and macros.
Fields overview
Fields enable you to control how information is captured and displayed in forms. You can add as
many fields as you need to a form (within the limits of your database) to capture and display the
information required by your application.
You can use workflow to manipulate the attributes of fields. For example, you can set permissions
for a group of trim fields or active link control fields so that they are inaccessible to certain groups
of users, or you can add tabs in a panel field that are visible to some users (such as managers or
support staff) but not to others.
Use this section to get information about the core fields, field types and its characteristics:
Fields have properties that determine their structure within BMC Remedy AR System. For an
alphabetical list of field properties, see Field properties (see page 2548).
These fields provide basic capabilities that most application designers need. For more information,
see Core fields (see page 2471).
BMC Remedy AR System has templates for blank forms and forms with core fields. You cannot
delete core fields from a form created with them, but you can hide them from a user's view and
change their labels, location, and appearance.
The following table shows the meaning of the field label styles :
Style Description
Bold Field requires a value — default, user-entered, or from workflow — when a user submits a request
Field types
The following table provides information about different field types. For more details, see Creating
and managing fields (see page 2470).
Data Contains data values stored in database tables. You can set these characteristics of data fields:
Whether users can access the field and, if so, whether they can only view the field or also change its
contents
The type of data that the field can contain (such as characters, integers, dates, or times)
The amount of information that the field can contain (field length)
Whether the field is visible or hidden
Whether the field is enabled or disabled
Whether the field is required, optional, or display-only (A display-only field is a temporary field for which no
space is allocated in the database.)
Where the field appears on the form
How the field is displayed (for example, its label and physical appearance)
How information is entered into the field (for example, by typing or by selecting items from a list or a menu)
The field's default value
Whether fields are indexed for faster searches
Table Displays data from other requests in the context of the current request. Table field styles are list view, tree view,
cell-based, results list, and alert list.
View Provides a browser window in a form. The browser can display any URL, HTML content, or file format (including
contents of attachments) that is compatible with a browser.
Data Augments BMC Remedy AR System with HTML-based content such as web pages, flashboards, and other
visualization graphics that can interact with the field's parent form through workflow
Application Displays a list of entry points. An entry point is a link that users click to open forms on the correct server in the
list required mode (New or Search). BMC Remedy AR System automatically generates the contents of the application
list. The entry points that a user sees in the list are only those to which the user has access. Any form that
contains an application list field can be used as a home page . A home page is a single point of access into BMC
Remedy AR System.
Enables users to navigate to the correct screen in an application quickly and easily
Horizontal
and vertical
navigation
Control Triggers active links. Control fields include buttons, menu items, and toolbar buttons.
Panel Organizes other fields on forms into smaller containers that can be hidden when not needed. Panel fields can
have various formats, such as tabbed, collapsible, splitter, and accordion.
Trim Adds boxes, lines, and text to enhance the visual appearance of forms
Field characteristics
All fields in BMC Remedy AR System share the following characteristics in common:
Menus are separate objects stored independently of a form. This means that you can create a
single menu and use it for multiple forms and for multiple fields in one form.
Menu types
Menu Description
type
Character Stored and maintained as a list of items in BMC Remedy AR System. These menus are useful for fields that have a
predefined series of choices that change infrequently. They can have submenus.
File
Menu Description
type
Contains items that are created and maintained in a plain text file. The file can be stored on the system where a
client is running or on the AR System server. File menus are convenient when you do not want to store the data in
the AR System database. To change a file menu, simply update the file; the changes are applied when the menu is
refreshed. File menus can have submenus.
Search Retrieves information from requests stored in AR System databases. The information is used to build a menu
dynamically in the current form. Search menus are often used when the choices in a menu depend on values
entered in fields on the current form.
SQL Also retrieves information from databases, but the databases can be outside BMC Remedy AR System. When you
access an SQL menu, BMC Remedy AR System uses an SQL query to extract the data and then generates the
menu from that data.
Data Retrieves lists of fields and forms from an AR System server. These menus are useful for creating special
dictionary configuration interfaces. They are generally not used to help users perform their work.
Associations overview
An association is a BMC Action Request (AR) System server object that describes relationships
between entries in BMC Remedy AR System forms. The association enables you to manage
relationships between entries in two forms to support referential integrity, cascade deletes, and
archiving related entries.
An association defines a relationship between entries in two forms. The relationship can have three
cardinality options: One to One, One to Many, and Many to Many. For one-to-one and one-to-many
relationships, an association between two forms is defined by specifying one form as primary and
another form as secondary. For these relationships, the primary form can have only one entry in
the relationship. For many-to-many relationships, there are no primary and secondary forms.
Note
BMC Remedy AR System associations are used in BMC Remedy ITSM application
primarily for archiving. You can also use these associations with RESTful APIs to get
related entries. For more information, see Operations on entry objects (see page 3390).
Associations can also be used to govern the behavior of archive definitions. For more information,
see Defining associations to follow (see page 1839).
Cardinality
Each association has cardinality, which dictates how the entries in the two forms are related. The
options are:
One to One — This cardinality describes a relationship in which an entry from the primary
form can be related to exactly zero or one entry in the secondary form.
One to Many — This cardinality describes a relationship in which an entry from the primary
form can be related to zero or more entries in the secondary form.
Many to Many — This cardinality describes a relationship in which an entry from the primary
form can be related to zero or more entries on the secondary form and an entry from the
secondary form can be related to zero or more entries on the primary form.
Note
All cardinality options may have an entry that is related to no other entries. For example,
a one-to-one relationship between an employee and email address includes the
possibility that an employee might not have any email addresses.
Relationships
Data relationships defined by associations may be enforced (strong) or not enforced (weak).
Enforced associations
If an association is defined as enforced, the BMC Remedy AR System server ensures data
integrity is maintained. Data integrity means that the server will enforce the cardinality of the
association and will ensure referential integrity. Thus, an entry will not be able to refer to another
entry that does not exist.
Note
Associations enforced on forms are also enforced on the archives of those forms.
Only one-to-one and one-to-many cardinality can be enforced. You cannot create an enforced
many-to-many relationship in BMC Remedy AR System. The server performs the following
functions for the enforced association:
If an entry is deleted from the primary form, the server deletes all related entries from the
secondary form (cascade delete).
Server does not allow duplicate primary key values in the primary form. For example, each
employee must have unique ID.
Server does not allow entries in the secondary form with invalid foreign key values. For
example, an entry in the contact form must reference a valid employee.
Server does not allow changing primary key values in the primary form if they are
referenced in a secondary form. For example, you cannot change an employee ID if that
employee is referenced in a birth information form.
For one to one associations, the server does not allow creation of entries in the secondary
form if that breaks the cardinality defined by associations. For example, it will not allow
creation of a second birthday entry for the same employee.
Note
If an enforced association is created between forms that already contain data, it is not
necessary that the existing data should have referential integrity. However, any changes
to the data after the association is created will follow enforcement and should have
referential integrity.
Unenforced associations
If an association is not enforced, the BMC Remedy AR System server allows creation of records
even if the creation breaks the cardinality defined by the association or the referential integrity. If an
association is not enforced, the server does not perform the actions listed above for enforced
associations.
Unenforced associations provide a way to describe data relationships that are not directly enforced
by the server. These associations may be otherwise enforced, by defining workflows in BMC
Remedy Developer Studio.
Note
BMC Remedy Data import tool has an option to disable association enforcement while
importing data. For more information, see Form mapping data options (see page 2099).
ARMergeEntry api provides an option to disable association enforcement as well. For
more information, see ARMergeEntry (see page 3852).
Type of associations
Entries in forms may contain direct references to each other, or may be related through a third form
that contains references to each of the related entries. The association type describes which of
these approaches is used.
Direct One to Yes Direct associations are primary key and foreign key associations between two forms.
One
Multiple fields from main form can be used as a primary key and similarly multiple fields
One to from the secondary form can be used as a foreign key. In other words, each field of the
Many primary key maps to a field in the foreign key and is called direct association.
Indirect One to Yes These types of associations are called external associations where the associations are
One created by using a third form. This third form, called an association form, stores the
foreign key for both the primary and secondary forms. Multiple fields from the primary
One to form can be mapped to the same number of fields on the association form and similarly
Many multiple fields from the secondary form can be mapped to the same number of fields on
association form.
Many to No
Many
Direct associations
Direct associations involve only two forms, and require that references from one form to the other
use only data that is present on the forms. Direct associations can be used for one-to-one and one-
to-many relationships. They cannot be used for many-to-many relationships. In the following
example, the Employee Phone form directly holds reference to Emp ID of the Employee form.
Indirect associations
Indirect associations include a third form that contains references to each of the related
forms. Entries in the two related forms in an indirect association do not have references to each
other. Indirect associations can be used for any kind of relationship, and only an indirect
association can be used for a many-to-many relationship. In the following example, the Employee-
Department form (third form) contains references to the two related forms: Employee and
Department.
Note
Whether the association is enforced or not, for an indirect association, the server will
always delete related entries from association form if an entry is deleted either from
primary or secondary form.
Qualifications
When defining an association, you have the option of specifying a qualification for each of the
forms involved. Qualifications allow different relationships between entries in the same two forms
or the storage of multiple relationships in a single indirect association form.
When you specify qualifications, only entries matching the qualification are related to the
association. For example, you might have a Phone details form that includes a Phone Type field
indicating that an entry is an office phone number or another type of phone number. You could
then create different associations between an employee form and the phone details form:
You would add a qualification in the first association requiring that the field on the telephone
number form be office phone option.
Permissions
An Association object does not have any permissions. Only administrators are allowed to create,
modify and delete associations. All other users can view an association, if they have access for
viewing the all the fields and forms used in that association.
Note
This video is recorded using the earlier version of BMC Remedy AR System and is valid
for BMC Remedy AR System 9.1.
Related topic
Using associations (see page 2232)
Application localization
Localization is the process of customizing an application for use in various languages, countries,
and cultures. BMC Remedy AR System provides an internationalized environment for building,
testing, and localizing applications.
A locale describes the language, country setting, and other characteristics of the local system's
user interface. You can create a BMC Remedy AR System application to run in a particular locale,
or you can make your application simultaneously available in multiple locales.
The development environment enables you to localize all aspects of the user interface:
Language used for labels, messages, help text, reports, menus, and any other words that
are part of a form's user interface
Separator symbol for decimal numbers that include a fraction
Separator symbol for numbers greater than 999
Format for dates and times
Layout, colors, and images
You can store each localized version of a form as a view. Therefore, the same application can
provide separate user interfaces (views) for British English, Australian English, Mexican Spanish,
and Peruvian Spanish.
Note
Although the user interface is tailored to each user's locale, the data and workflow are the
same for all users. Therefore, you need to agree on the language for the data before the
application is made available.
The localization features are automatic for the user and easy to implement for the application
builder. To localize an application for a given locale, an administrator need create views only for
that locale and add corresponding messages to the message catalog. Utilities are available to
assist with this work. See Localizing an application to other languages (see page 3061).
Considerations
After defining the application goals, the staff begins more detailed planning. This section discusses
various questions that any organization needs to consider to create a useful application, including
data analysis, workflow analysis, identifying the business rules to be enforced, mapping the
business rules to workflow components, and considering whether any integrations are required.
Note
The planning and design process is thoroughly covered in the "BMC Remedy AR System
7.x: Application Requirements Analysis, Design, and Development" course offered by
BMC. See http://www.bmc.com/education.
Analyzing data
As the park staff members begin to plan their animal management application, they analyze the
data by answering these questions:
The staff determines that they need these forms (shown in the following figure) to capture
information:
Animal form — Contains detailed information about each animal. The staff considers using
panel fields to organize the form modularly, keeping related fields together.
Species Info form — Contains details about a particular species, such as feeding
requirements, life span, medical needs, and whether it is endangered. This is a supporting
form.
Feeding form — Contains information about each animal's feeding schedule.
Enclosure form — Contains information about the number and types of animals each
enclosure can hold and so forth.
Medical History form — Contains the complete medical history of each animal.
Former Resident form — Contains information about animals that no longer reside in the
park.
Analyzing workflow
Next, the staff considers the park's current organizational processes:
Some of the BMC Remedy AR System groups or roles that the park needs are:
Appropriate permissions will be assigned to each group or role according to the information that
they need to access.
For example, one of the rules might be that every animal must be checked by a veterinarian within
24 hours of arrival. If the rule is broken, that might indicate a need to hire more medical staff or to
increase clinic capacity.
An escalation to enforce the rule that animals must be checked by a veterinarian within 24
hours of arrival.
An escalation to notify keepers when an animal has not been fed within one hour of its
scheduled feeding time.
Considering integrations
The staff considers what other software products or databases must initially be integrated into the
application and what future integrations are desirable:
The staff must be able to enter data while they are out in the park, perhaps using handheld
devices.
Future integration with a sister zoo must be possible.
Integration with an international database of endangered species is also necessary, partly to
locate new individual animals that can contribute to the gene pool at the park.
Eventually, the staff might want to integrate information about the botanical gardens at the
park, although this could be maintained separately.
The park needs to accomplish these goals with the animal tracking application:
All these goals relate to tracking animals throughout their life at the park, as shown in the following
figure.
This section focuses on the first application, managing and tracking animals.
This section describes an example in which the hypothetical wild animal park acquires a tiger. This
scenario illustrates a complete process, but not every component of the process is discussed in
detail.
As shown in the following figure, when a Sumatran tiger named Karuna is obtained, a staffer fills in
the Animal form, and then clicks a button called List Enclosures. An active link opens a dialog box
displaying the Enclosure form with a table field that lists enclosure information, including availability
and habitat. The staffer can double-click any enclosure in the list to get more information.
Next, the staffer selects an appropriate choice — in this case, enclosure 16 — and submits the
request. A filter notifies the Animal Handlers group and sends a message to inform the staffer that
the appropriate persons have been notified. In addition, the Status field changes from New to Move
Pending.
During trial runs of the system, the application developer realizes that the animal handlers are
frequently away from their computers and rarely check email. The developer integrates the
application with a paging program and has the filter notify the handlers about new animals with a
page. Handlers can then use their cell phones to get information about their assigned tasks.
Gary from Animal Handlers receives a page that says a new tiger must be moved from the
temporary cages to enclosure 16.
After he transfers the tiger, Gary changes the Status field from Move Pending to Permanent. When
he saves his changes, workflow components create new requests in related forms and notify the
Veterinarian group and the Animal Handlers group to begin the care and feeding of the new
animal. These requests and notifications illustrate one way of handling work orders in AR System.
Tip
This example is similar to moves, adds, and changes (MAC) in an employee services
application.
This section describes an example in which the tiger at the hypothetical wild animal park is injured.
This scenario illustrates a complete process, but not every component of the process is discussed
in detail.
One morning when the keepers are making their daily rounds, they notice that the tiger, Karuna,
has been injured, so they notify the veterinarians. A veterinarian looks at the Animal form and
checks a table field that contains data from the Medical History form, as illustrated in the following
figure. She discovers that Karuna has no history of serious injury or illness.
To be treated, Karuna must be tranquilized and moved to the veterinary hospital for surgery. He
has been tranquilized before without incident as indicated by the Tranquilizer Notes field on the
Animal form, so the veterinarian computes the dosage and sets out with several animal handlers to
bring in the tiger.
During the prototyping phase, staffers had to open the Medical History form separately to learn
about Karuna's record with tranquilizers. The veterinary staff pointed out that they wanted that
important information readily available during an emergency. So the Tranquilizer Notes field was
added to the Animal form, and a filter that executes on Submit was added to post a message to the
veterinarians, reminding them to update the Tranquilizer Notes if necessary.
Tip
This process is similar to handling a customer call in a technical support application. The
technical support representatives might decide that they need important information about
a customer on a main form rather than on a supporting form.
This section describes an example in which the tiger, named Karuna, at the hypothetical wild
animal park is transferred to a different zoo. This scenario illustrates a complete process, but not
every component of the process is discussed in detail.
After several years, the animal park determines that it should have a different male tiger to
maintain genetic diversity in its tiger population. By examining a database maintained by zoos
worldwide, the staff discovers a tiger that is available and has no common ancestors with Karuna
or with the park's female tigers. They decide to trade Karuna, and a staffer changes Karuna's
status from Permanent to Trade Pending, thereby triggering the same notification filter that was
used when Karuna arrived. This time, it notifies the animal handlers to move Karuna to a temporary
cage, as shown in the following figure.
After Karuna leaves the park, his status is changed to Traded. When the changed request is
submitted, a filter uses a Push Fields action to move all of Karuna's data from the Animal form to
the Former Resident form, as shown in the following figure.
The Medical History form is not archived or changed because the staff might, at any point, want
information from the medical records. For example, they might want information about all tiger
surgeries performed at the park.
Tip
This process is similar to retiring an asset in an asset management application: you need
to track the problem history of an asset during its active use and after its retirement.
Archiving overview
The archive feature of BMC Remedy AR System provides a convenient way to periodically store
data (not definitions) from a form to an archive form; this reduces the amount of data accessed
during searches on the main form, thus improving system performance. Archiving applies to all
types of forms, except display-only forms, vendor forms, and join forms. You can manage the
production system efficiently and utilize the available infrastructure and resources optimally. When
you archive your data, you can improve system performance and enable data retention.
By archiving, the main application has fewer records which results in quicker searches and better
performance, while the records are still archived. You can also reduce the database size by
periodically extracting archived data.
The main form is the form on which archive is set (data is read from this form), and the archive
form is the form to which data is copied. It is important that when you archive the main form, the
related forms are also archived. For providing ability to archive related data, you can explicitly
create associations between forms in the Developer Studio. For more information, see Defining
associations to follow (see page 1839).
The following image displays the concept of archiving in BMC Remedy AR System.
BMC Remedy AR System does not support archiving if you have read-only database. For more
information on using read-only database, see Using read-only database (see page 308).
Related topics
To know more about these concepts, see BMC Remedy archiving concepts (see page 169)
.
To know more about properties for form level changes, see Configuring data archiving for a
form (see page 1835).
Archiving concepts
This topic provide information about the archiving concepts.
The Archive Manager console displays the values from the archive definition, and allows the user
to override or accept those values. The archive definition controls the appearance of an archive in
the console, which is an element of the form definition that can be accessed using BMC Remedy
Developer Studio.
You can also export and delete your archived data directly from your application using the AR
System Archive Manager console now. For more information, see Managing the archiving process
(see page 1850).
Age qualification
This is a new parameter added in the archive definition, which specifies that the records should be
archived when they have reached a specific age. The definition includes the field on the form that
is used to determine the record’s age, and the age in number of days after which records should
be archived. You can set this definition on the archive panel for each form. For more information,
see Configuring data archiving for a form (see page 1835).
The age specified in the definition appears in the Archive Manager console as well. You can
choose to override the value from the console.
Note
The existing archive definitions are updated so that they appear in the Archive Manager
console with an age specified as zero. Because the qualification still includes an age
component, the records are archived at the greater age in the qualification and at the age
specified in the console. By default, the archiving happens as before, but the age of the
archived records will not be entirely controlled from the console. To resolve this issue,
you can adjust the definitions so that the age of records is not added in the qualifier.
Associations to follow
The form definition includes a list of associations that is followed when an entry on the form is
archived. The associated records in other forms are archived with the original entry in a single
transaction so that a parent and all of its related child records can be archived together. For more
information about understanding associations, see Associations overview (see page 152).
Note
Indirect associations having Many to Many cardinality cannot be followed for archiving.
Even if you select those associations, they will be ignored during the archiving process.
If a form contains some records that are archived because they are associated with other records,
and others that are not associated then the form definition should include a qualifier that applies
only to the unassociated records.
If records in a form are archived only because they are associated with other records, then this
flag should not be set.
When records in the form are archived because they are associated with other records, the
qualification in the form’s archive definition is ignored.
Archive interval
The definition is removed and all archives in the policy form are archived at the same time, based
on the single archive interval specified for all archives. For more information, see Setting global
archive interval for forms (see page 1843).
Architecture
Use this section to understand the architecture of BMC Remedy AR System and its related
components.
Within these functional environments, several system components work together to provide power,
flexibility, and scalability.
The following figure depicts the relationship among the components that reside within each of the
functional environments of the BMC Remedy AR System architecture. Notice that no definitive
starting and ending point separates the environments because their functions sometimes overlap.
For example, as illustrated in the following figure, you can transfer copies of a request to other
servers and ensure that any changes made to the copies are also made to the original request.
The way that you define the processes for transferring information is similar to the way that you
define business processes for an application. First, managers at each site must agree on what
information to transfer from one application to another, what conditions drive transfers, and which
sites control the ability to update a record. An administrator at each site then uses DSO to
implement these decisions.
BMC Remedy Developer Studio on a computer running Windows can manage forms on a
UNIX or Linux server.
Browsers can use a Windows-based mid tier to access forms on a UNIX server.
Related topics
AR System server architecture and scalability (see page 179)
BMC Remedy AR System is based on a multitiered client/server architecture that includes the
client tier, the mid tier, the server tier, and the data tier. The following figure shows the different
tiers of BMC Remedy AR System.
Client tier — Contains AR System clients. Most clients present information to application
users and receive input from them, but the tools for migration and application development
are also clients.
Mid tier — Contains components and add-in services that run on a web server, enabling
users to view applications on the web.
Server tier — Contains the BMC Remedy AR System server, which controls workflow
processes and access to databases and other data sources in the data tier. This tier also
contains server-side applications (such as Approval Server, Email Engine, and the BMC
Remedy Flashboards server) and the C and Oracle Java plug-in servers with plug-ins.
Data tier — Contains database servers and other data sources that can be accessed by the
BMC Remedy AR System server. The database server acts as the data storage and
retrieval engine.
AR System clients provide the user interface. The BMC Remedy Mid Tier makes the user interface
available in browsers. The AR System server implements the workflow functions, access control,
and flow of data into and out of the database. The database server acts as a data storage and
retrieval engine. (For information about supported platforms, see Compatibility matrix in the BMC
Remedy ITSM Deployment online documentation.)
Examples include SQL*Net for Oracle and OpenClient for Sybase. Some database engines are
multithreaded. This means that the database can perform multiple transactions simultaneously. In
BMC Remedy AR System, the arserverd server process is also multithreaded. Each of these
arserverd threads is connected to a different thread in the database engine. This provides
tremendous data throughput and system scalability.
Many-to-many connections
In an BMC Remedy AR System environment, one AR System server can theoretically support any
number of AR System client connections (limited by network bandwidth and server host and
database performance). The clients can be on any mix of platforms. Similarly, an AR System client
can be connected to any number of servers at the same time. These servers can be any mix of
server hosts and underlying database engines. In an environment with multiple AR System
servers, the Distributed Server Option (DSO) can be added to share common information among
servers and keep that information consistent. DSO also enables records to be forwarded between
servers if workflow determines that the record should be transferred. This permits building large-
scale distributed support environments that behave as a single virtual system. Some of the many
uses of DSO include:
Many-to-many architecture
(Click the image to expand it.)
BMC Remedy AR System clients can be broadly divided into user client and developer clients.
User clients
Through the BMC Remedy Mid Tier, users can access BMC Remedy AR System in a browser.
Using the web-based interface, users can submit and modify new requests, to search for
information about requests, and to generate reports. Web pages are written in JSP and rendered in
JavaScript and HTML.
The following table summarizes the main clients used to perform administrative, user and
development tasks.
Client Tasks
A Administrator tasks:
browser
Create groups and roles.
Create users and assign licenses.
Manage AR System server settings and licenses.
User tasks:
Access BMC Remedy AR System forms and applications to create, submit, search and modify requests.
Receive and respond to AR System notifications
Chart data
Generate reports
Display alerts in the Alert List form, which can be refreshed automatically at specified intervals or manually at
any time.
Search records, run or generate reports, view flashboards
Developer clients
The developer clients are used to create, modify, and extend BMC Remedy AR System
applications.
Client Tasks
Client Tasks
Integration clients
BMC and its partners also offer the following tools for expanding the capabilities of core BMC
Remedy AR System. These tools act as clients of BMC Remedy AR System.
See AR System and web services introduction (see page 3289) and BMC Remedy AR System
REST API overview (see page 3379).
Server Use
AR System Processes data it receives from AR System clients, and passes the data to the database server to be stored.
server
Server Use
Web server Serves as a repository for web applications. Displays the appropriate page to an authorized user.
For more information about tuning AR System servers, see Tuning the AR System server.
Application programming interface (API) — A set of functions and data structures that
provide application programmers with access to the full functionality of a product.
Developers can create clients written in C, Java, or REST API. The BMC Remedy AR
System APIs are documented in the Developing an API program (see page 3377) and in the
ardocVerNum.jar file located in the ARSystemServerInstallDir\Arserver\api\doc folder
(Windows) or the ARSystemServerInstallDir/Arserver/api/doc folder (UNIX).
Access control and data validation — A security feature in which BMC Remedy AR System
administrators limit user access to forms, to specific fields within a form, to specific functions
within the system, and to data stored within the system.
Alerts — A client program that functions as a "desktop pager." This component of the AR
System server supports desktop pages such as flashing icons, audible beeps, sound files,
and message windows. For example, it can display a message alerting help desk personnel
that a problem was assigned to them.
For more information about alerts, see Using alerts (see page 1394).
Filters — Actions performed on the AR System server, which is the portion of the software
that controls the flow of requests to an underlying database. As a request is processed by
the server, the filter actions take place. Filters enable you to implement constraints, make
decisions, and take action when operations are performed on data stored in BMC Remedy
AR System.
Escalations — Actions performed on the server at specified times or time intervals. They are
automated, time-based processes that search for requests that match certain criteria and
take action based on the results of the search.
BMC Remedy AR SystemFilter (AR Filter) API Plug-In — A filter that offers a programming
interface directly invoked by filter workflow. This provides a flexible and efficient mechanism
for communicating with various applications or web services. Use of plug-ins reduces
system overhead. AR filter plug-ins also apply to escalations.
See AR filter API plug-ins introduction (see page 750).
BMC Remedy AR SystemExternal Authentication (AREA) — A process that accesses
network directory services and other authentication services to verify user login name and
password information. When you use an AREA plug-in, you do not need to maintain
duplicate user authentication data in the BMC Remedy AR System directories because the
AR System server can access user identification information and user passwords at many
locations.
See AR System external authentication (see page 850).
View form — A form that enables BMC Remedy AR System to point to and access data in a
database table created outside BMC Remedy AR System. The table can be in the same
database or in any other database accessible from the current BMC Remedy AR System
database.
See View forms (see page 863).
Vendor form — A form that enables BMC Remedy AR System to access arbitrary external
data sources through the use of an ARDBC (BMC Remedy AR System Database
Connectivity) plug-in. This type of form provides for easy integration with external data
without replicating the data.
See Vendor forms introduction (see page 860).
Database servers — The BMC Remedy AR System uses standard relational databases for
storing and retrieving data. Architecturally, the database server is a set of processes that are
completely separate from the AR System server processes. Physically, the database server
processes can be running on the same computer as the AR System server or on a different
computer. The database server can be run on any platform that the particular database
supports.
Related topics
BMC Remedy AR System functional components (see page 172)
The AR System multithreaded server is scalable from a single thread performing all server
functions to multiple threads, each performing specific functions. The threads adapt to the
configuration parameters defined, and they distribute the load. You determine what amount of
operating system resources to dedicate to BMC Remedy AR System.
The following figure shows multithreaded architecture uses queues and threads. The following
sections describe how queues and threads function in the AR System server.
Note
For 64-bit Windows operating systems and production environments, the 64-bit Windows
version of AR System is required.
process memory and server gets malloc error. It is recommended to increase the user-mode
process memory to 3 GB, by using the operating system startup switch to avoid or reduce malloc
errors. The 3 GB switch is used for this allocation change. The switch is entered in the system's
boot.ini file and takes effect after a operating system restart.
Note
The following table lists the types of BMC Remedy AR System queues. Each queue has an RPC
program number associated with it.
Admin 390600
Alert 390601
Escalation 390603
Fast 390620
List 390635
Note
Administration, alert, escalation, fast, and list queues use a fixed RPC program number.
Private queues, however, can be configured to use any RPC program number within the
ranges of RPC program numbers reserved for private queues.
Administration queue
The administration (admin) queue is the only BMC Remedy AR System queue that can perform
every operation within the system. It performs all administrative restructuring operations,
guaranteeing the serialization and integrity of all restructuring operations. This queue can have
only one thread.
All servers include an admin queue, which is the default server setting. Because an admin queue
has a single thread available to handle requests, a server that has only an admin queue (and no
fast or list queues) functions as a single-threaded server. While the admin queue handles all
administrative functions, it can also perform the functions of all other queues if no other queues are
configured. If no other queues are configured, all requests are placed in the admin queue.
Alert queue
The alert queue handles all alerts sent to registered clients. The alert queue handles only internal
requests, not requests from outside the AR System server. The threads in this queue do not open
database connections, so they do not use many resources.
To configure an alert queue, see Defining queues and configuring threads (see page 328).
Escalation queue
All servers automatically create an escalation queue unless Disable Escalations is configured. The
escalation queue handles only internal requests, not requests from outside the AR System server.
It handles escalations specified by the administrator and performs all escalation processing. The
escalation queue is multithreaded.
Fast queue
The fast queue handles the operations that generally run to completion quickly without blocking
access to the database. The fast queue handles all server operations, except for:
Administrative operations that restructure the database. These operations use the
administration queue.
The ARExport, ARGetListEntry, ARGetListEntryWithFields, and
ARGetEntryStatistics, and other API calls (which use the list queue).
For more information about API calls, see the Developing an API program (see page 3377).
One or more threads can serve the fast queue if a fast queue is configured. To configure a fast
queue, see Defining queues and configuring threads (see page 328).
List queue
The list queue handles BMC Remedy AR System operations that might require significant time,
block access to the database, or both. Examples of these operations include ARExport,
ARGetListEntry, ARGetListEntryWithFields, and ARGetEntryStatistics.
One or more threads can serve the list queue if a list queue is configured. To configure a list
queue, see Defining queues and configuring threads (see page 328).
Private queues
Administrators can also create private queues for specific applications or users that require
dedicated access. For example, you might create a private queue for the BMC Remedy Approval
Server or other plug-in application, or for a user who is performing critical operations that you do
not want blocked by other users. Private queues guarantee a certain bandwidth dedicated to
clients using these queues.
Private queues support all operations except restructuring operations. Restructuring operations are
supported only by the administration queue (see Administration queue (see page )). To
configure a private queue, see Defining queues and configuring threads (see page 328).
Each private queue can be supported by one or more threads. To connect a user to a private
queue, see Configuring clients for AR System servers (see page 287).
For more information on Private Queues, see the blog Utilizing Private Queues shared on BMC
Communities.
All threads within a process share network and system resources; therefore, consider carefully the
available resources of your system and network when establishing the minimum and maximum
thread settings for your server queues.
For more information about tuning AR System servers, see Tuning the AR System server.
Dispatcher thread
The dispatcher thread routes requests to the appropriate queues. This thread receives connection
requests from clients. The dispatcher thread then places the requests into the appropriate queue
where each request can be handled by one of multiple worker threads.
Every call that the dispatcher thread receives is assigned an RPC ID that can be used to identify
the call from the time the call is placed into a queue until a response is sent to the client.
In general, the dispatcher thread uses the following logic to dispatch calls:
If no other queues are defined, the dispatcher thread routes all requests to the admin queue.
If, however, fast and list queues are created in addition to the admin queue, the dispatcher
routes client requests according to the type of operation being performed. If private queues
are created, the dispatcher directs the call to the appropriate private queue based on the
RPC program number of the request.
A request is routed to the appropriate queue based on its RPC program number. For
example, a call that has RPC program number 390600 is routed to the admin queue.
If a call with RPC program number 390620 (fast) or 390635 (list) is received and no fast or
list queue exists, the dispatcher thread routes the call to the admin queue. If only a list
queue exists, the dispatcher thread places the call in that queue. If only a fast queue exists,
the dispatcher thread directs the call to that queue. If both fast and list queues exist, the
dispatcher routes the call to the appropriate queue based on the call number.
If a call is received with RPC program number 390601 (previously supported by the
Notification server, which is now merged with the AR System server), the dispatcher routes
the call to the fast queue.
If a call is received with an RPC program number other than those specified for admin, fast,
list, and Flashboards queues, the dispatcher identifies the call as destined for a private
queue. If a private queue supporting the RPC program number exists, the dispatcher thread
routes the call to that queue. If no private queue exists but a fast or list queue exists, the call
is routed to the appropriate queue based on its RPC program number. If no fast or list queue
exists, the call is routed to the admin queue.
The escalation and alert queues do not receive calls from the dispatcher.
Worker threads
Worker threads respond to the RPCs dispatched to individual queues. Each queue creates one or
more worker threads. The worker threads within a queue are identical and can handle any request.
Only the worker thread started by the admin queue, however, can handle calls that modify
definitions or server configuration settings.
On startup, each thread creates a connection to the database that it uses throughout its existence.
If the thread is unable to establish a connection, it terminates itself, notifying the queue that no
more threads are to be started. The database connection is dedicated to the thread, even when
that particular thread is not busy.
Any available worker thread can remove the request from the queue, read the request, process it,
and return results to the client before returning to the queue to respond to another request. When a
request is placed in a queue and no existing threads are available to handle it, a new thread is
started until the queue reaches the maximum number of threads allowed for its thread type.
Thread manager
The thread manager is responsible for ensuring that a thread is restarted if it dies.
Another consideration is that list threads require more memory than fast threads. For example, a
complicated query might require a great deal of memory at a given moment. A few of these large
queries can temporarily exhaust your system resources.
To determine how many threads of each type you need, start by examining the types of API calls
by using AR System Log Analyzer tool. For more information, see Viewing AR System Log
Analyzer output (see page 4274). If your system processes many fast operations, you might decide
to increase the number of fast threads. A different rule of thumb is to specify a larger maximum of
list threads than fast threads, simply because fast operations are generally performed more quickly
than list operations.
Do not specify an artificially high number of maximum threads because the threads would
consume resources that other threads need. To set the number of minimum and maximum
threads, see Setting ports and RPC numbers (see page 303).
Related topics
Note
For the most accurate information about supported platforms and software, see
Compatibility matrix in the BMC Remedy ITSM Deployment online documentation.
The server is implemented as several service processes that are normally started automatically
when the server host is powered up.
The AR System server has no direct user interface. Clients, such as the mid tier and other
applications, communicate with BMC Remedy AR System by means of a well-defined application
programming interface (API). An API is one possible way to integrate with BMC Remedy AR
System. The APIs use remote procedure calls (RPCs) to communicate with the server. Both a C
interface and a Java interface are available.
The AR System server processes all data entered through a client. As the workflow engine
between client and database, the server writes data to the database when a request is created and
retrieves data from the database when a client requests it. The server verifies that a user has
permission to perform each transaction, thereby enforcing any access control defined in an
application. The server also continuously evaluates the data in the database and each transaction
to determine whether the server should perform workflow. The server might also perform workflow
on a timed basis.
When a client submits a request to the server, the request enters through the API, goes through
access control and data validation, filter processing, and then transactions are committed to the
data repository as appropriate.
arserver process — the primary AR System server process. It handles requests from the
clients and interacts with the database.
Plug-in server process— A companion process to the AR System server. It loads configured
plug-in modules to interface with external data while processing vendor forms, validates
users with external authentication sources, and extends filter workflow. When the AR
System server needs to access a plug-in, it interfaces with the plug-in server to perform the
operation.
Email engine process — the process that links arserver process with email systems. For
example, users can submit service requests to an AR System server by sending an email
message to an email account. In addition, workflow can cause email messages to be sent to
particular email addresses as a notification option.
BMC Remedy AR System can also work with data stored in external databases and other data
sources that are not managed by BMC Remedy AR System. BMC Remedy AR System accesses
these data sources through view forms . In addition, BMC Remedy AR System can use BMC
Remedy AR System database connectivity (ARDBC ) to work with data not stored in databases as
if the data was locally owned.
Because the AR System server manages all workflow, applications are independent of the
database. Therefore, applications created on an AR System server running one type of database
can easily be moved to a server running a different type of database. BMC provides a simple export
/import utility for this purpose.
BMC Remedy AR System is not a database application in the typical sense. All of the workflow is
managed by the AR System server, so proprietary database features such as triggers and stored
procedures are not used. An application created on an AR System server running one type of
database engine can easily be moved to a server running a different database engine through a
simple export/import process.
The user or administrator of AR System clients does not need to know anything about SQL or the
underlying database.
BMC Remedy AR System workflow components can search for records (requests) in the AR
System database and act on the results of the search. Clients can use the following types of
searches:
Query-by-example (QBE)
Advanced search
Predefined
Recent
An administrator can create and store searches that are commonly performed by users. A user can
define personal searches for forms to which the user has access.
Multiple browser sessions in a distributed mid tier environment (see page 194)
BMC Remedy Mid Tier serves as a client of the AR System server and as a server to the browser.
The mid tier enables you to view BMC Remedy AR System applications on the web and access the
AR System server from a web server. It also provides instructions to the browser in the form of
document markup and downloadable scripts. These instructions describe how to present
application data and how to interact with the user.
BMC Remedy Mid Tier translates client requests, interprets responses from the server, handles
web service requests, and runs server-side processes that bring BMC Remedy AR System
functionality to web and wireless clients. A browser is a generic client that has no inherent
knowledge of any application that might run within it. By acting as an interpreter, the mid tier allows
a browser to become a fully functional BMC Remedy AR System client.
Note
While accessing the applications using BMC Remedy Mid Tier, you can open multiple
browser windows using workflows. All the forms opened using the workflows are closed
after you log out. But if you make any changes to open the forms (for example, change
the URL in web address bar or refresh the page or access any other forms by typing form
name) or if a new browser window or tab is opened and other forms are accessed. Such
windows are not closed by the mid tier after you log out, but a session timeout error is
displayed if you perform any operations on them.
The BMC Remedy Mid Tier requires a Oracle Java Server Pages (JSP) engine, that is supported
by AR System. For a list of supported engines, see Compatibility matrix in the BMC Remedy ITSM
Deployment online documentation. Apache Tomcat is bundled with the mid tier and is installed with
the mid tier by default.
The mid tier leverages a Java servlet engine and includes a collection of servlets plugged in to the
web server to serve forms, images, and other resources. The servlet engine facilitates
communication between the browser and the web server. It provides components and add-in
services that run on the web server.
The web server manages the transfer of all HTML content to the browser. Infrastructure
components, such as servlets and other services (special Java classes), translate client requests
and interpret responses from the AR System server.
Web server
A server that receives requests for a web page and maps the uniform resource locator (URL) to a
local file or servlet on the host server. The server then loads the content and serves it across the
network to the user's browser.
JAVA API
An API used to communicate with the AR System server. The object model provides a set of
classes representing the data structures and functions of the API.
Settings include the list of AR System servers to access, session time-out interval, directory
locations, reporting tool options, logging options, cache policy options, connections for load
balancing, flashboard options, home page server options, and user authentication for web services.
BMC Remedy Mid Tier Configuration Tool is accessible through a .jsp file in a browser using a
separate login. The tool knows 1 unnamed user and the password can be changed within the tool.
The standard password is arsystem.
For the most current information about supported web servers and JSP engines, see Compatibility
matrix in the BMC Remedy ITSM Deployment online documentation.
for processing.
The CMS is the server component of BusinessObjects Enterprise and Crystal Reports Server. It
listens for and executes report requests, using the BMC Remedy AR System ODBC driver to
retrieve the BMC Remedy AR System data, publishes the report in the Crystal environment and
renders it for display in the browser.
The AR Web ReportViewer is a component of the mid tier. It can be installed together with the mid
tier or as a separate component, but it must reside on the same computer as the CMS.
Once the necessary components have been installed together and configured, any authorized
BMC Remedy Mid Tier can direct requests for Crystal reports to the mid tier or AR Web
ReportViewer on the Crystal reports server.
Install BMC Remedy Mid Tier on the same Windows computer as the CMS. In this case the
AR Web ReportViewer is installed as part of the mid tier.
Install the mid tier on a separate computer (any supported platform), and install only the AR
Web ReportViewer on the same Windows computer as the CMS.
BusinessObjects Enterprise or Crystal Reports Server and the AR Web ReportViewer must be
installed on a Windows computer because the CMS uses the AR System BMC Remedy ODBC
Driver to contact the AR System server when retrieving report data.
The use of JSP servlets makes the mid tier scalable in the following ways:
Additionally, the architecture supports server clusters, or web forms that are hardware setups in
which several physical web servers share the load directed to one logical server (one IP address).
In a web form, a load balancer receives requests and sends them to whichever physical server has
the most resources available to handle them.
A mid tier allows you to launch a browser on another mid tier so that users can work on records in
a distributed mid tier environment. This feature allows you to link a central mid tier to one or more
remote mid tiers (also known as federated mid tiers) to display forms residing on the remote AR
System server(s).
Note
You configure only the servers that are running the BMC Remedy AR System Server as
the central server.
This feature is used by the Hub and Spoke implementation of BMC Remedy IT Service
Management (BMC Remedy ITSM). It can also be used independently without the Hub and Spoke
implementation. For more information about Hub and Spoke capabilities in BMC Remedy ITSM,
see Hub and Spoke capability overview.
When a remote AR System server (the spoke AR System server) is configured to a central AR
System server (the hub AR System server) for this feature, a support staffer can work with records
from any of the remote AR System servers to which his central AR System server is connected.
The central AR System server receives and stores only a subset of the transactional data from the
original record located on the remote AR System server. This feature allows a support staffer to
seamlessly work with remote AR System servers in the Hub and Spoke scenario.
Without requiring authentication, the central system displays the remote transactional data in a new
mid tier window on a workstation connected to the central AR System server. The support staffer
can open the record from the remote server, view the record's details, and work the record through
its lifecycle.
Notes
If the user name and password for the user on the central AR System server and remote
AR System server do not match, then a browser launches on another mid tier as follows:
If guest users are enabled on the remote AR System server, then the user is
logged in as a guest user and has guest user privileges. The user receives a guest
user warning message.
If guest users are not enabled on the remote AR System server, then the user
receives an authentication failure message from the mid tier. When reloading the
page, the user is directed to the remote mid tier login page.
If the remote mid tier is from a release earlier than 8.1, the user is directed to the remote
mid tier login page for authentication.
Note
If a user has multiple records open in multiple remote windows when working with central
and remote (hub and spoke) servers, logging off of one remote window invalidates the
session that is established for all open remote windows. The remaining sessions become
invalid even if they appear active. BMC recommends that work be completed and saved
in all remote windows before logging off from any remote window.
Related topics
For information about configuring this feature with an AR System, see Configuring a mid tier to
launch a browser in a different mid tier (see page 495).
For information about configuring this feature within a BMC Remedy IT Service Management Suite
hub and spoke system, see Registering hub and spoke servers.
In addition to server objects, BMC Remedy Migrator can transfer data entries from one or more
BMC Remedy AR System forms. You can select single, multiple, or searched sets of data. You can
migrate data immediately or save your migration in a script to be run later.
Related topics
How BMC Remedy Migrator automates migration of data and objects between AR System servers
(see page 101)
Migrating applications and data between AR System servers (see page 1987)
Information flow for web services published in AR System server (see page 196)
Information flow for consuming a web service in AR System server (see page 198)
When a client contacts a BMC Remedy AR System web service, the interaction works as follows:
1. The external client sends a Simple Object Access Protocol (SOAP) request to the mid tier.
The URL for the service is either built into the application or is obtained from the web
services registry at run time.
2. The mid tier extracts the web service name, the operation name, and the authentication
information from the SOAP request packet. It retrieves the web service object corresponding
to the web service name from the BMC Remedy AR System server and searches the web
service for details about the operation, such as the operation type (Get, Create, Set, or
Service), the query string, and the input and output mappings. Then it expands the XPATH
expressions in the query string, extracts the XML document from the SOAP request packet,
and sends it to the BMC Remedy AR System server along with the operation type, the input
and output mappings, and the expanded query string.
3. The BMC Remedy AR System server parses the XML document using the mapping
information and converts it into field data. The operation type determines how the data is
treated:
For Get, the BMC Remedy AR System server ignores the input fields.
For Create, the BMC Remedy AR System server creates an entry with the input
fields.
For Set, the BMC Remedy AR System server searches for an entry using the
expanded query string and then modifies the data using the input fields.
For Service, the BMC Remedy AR System server sends the input fields to the
Service Entry call.
For complex documents, the data is pushed into one or more forms. This action might
trigger some filters.
4. The BMC Remedy AR System server also uses the mapping information to get the data
from one or more records and generate an XML document. The operation type determines
how the data is treated:
For Get, the BMC Remedy AR System server performs a query based on the query
string.
For Create, the BMC Remedy AR System server reads the record that was created.
For Set, the BMC Remedy AR System server reads the record that was modified.
For Service, the BMC Remedy AR System server reads the output fields from the
Service Entry call. This action might also trigger some filters.
5. The XML document is returned to the mid tier.
6. The mid tier packages the XML document as a SOAP response and returns it to the external
client.
1. A filter process triggers a Set Fields filter action that sets fields using data from a web
service.
2. The filter uses the mapping information stored on the server to construct an XML document
with data from the base form and the child form (if any).
3. The BMC Remedy AR System server sends the XML document to the web service plug-in.
4. The web service plug-in receives the XML document, packages it into a SOAP request
packet, and calls the external web service.
5. The external web service replies with the SOAP response packet.
6. The web service filter plug-in extracts an XML document from the SOAP packet and returns
it to the BMC Remedy AR System server.
7. The BMC Remedy AR System server receives the XML document and uses the mapping
information to parse the document and push data into the current record and any child
forms.
8. The Set Fields filter action is finished.
Plug-in architecture
(Click the image to expand it.)
Note
The arrows in this figure identify the directions in which each program or process can
initiate API function calls. Data can flow in any direction.
BMC Remedy AR System client code links to the provided C API libraries. The C APIs create an
interface layer between the AR System server and C-based AR System clients. The Java API
serves the same function for Java-based clients. AR System clients perform all database
operations through the API interface.
BMC Remedy AR System includes a plug-in server that extends its functionality to external data
(data not contained in the BMC Remedy AR System database). The plug-in service supports three
types of plug-ins with corresponding C and Java APIs:
AREA plug-in
ARDBC plug-in
BMC Remedy AR System Filter (AR Filter) API plug-in
BMC Remedy AR System offers the following ready-to-use plug-ins that you access through BMC
Remedy Developer Studio:
For information about the C plug-in APIs, see BMC Remedy AR System plug-in API functions (see
page ). For information about the Java Plug-in API, see the online documentation located at
ARSystemServerInstallDir\ARserver\api\javaplugins\arpluginsdocVerNum.jar.
For information about configuring and running all types of plug-ins, see Enabling Plug-ins (see
page 747).
Note
The arrows in the preceding figure identify the directions in which each program or
process can initiate API function calls. Data can flow in all directions.
Important
The Java API also uses a Java Native Interface (JNI) library and the C API library to
connect to a pre-7.0.01 AR System server. You can control when the JNI library is used
by setting the jniLoadMode parameter in the Java API configuration file. See the
comments in the sample file, arsys_sample.xml.
C API
The BMC Remedy AR System clients use the C APIs to manipulate data. For example, the clients
use C APIs to create, retrieve, update, and delete schemas, entries, and menus, and to control
workflow. You can use the C API to extend BMC Remedy AR System functionality.
The BMC Remedy AR System API contains data structures that store both simple and complex
information. Structures that store simple information, such as the type of value or the product of an
arithmetic operation, serve as the building blocks for complex structures.
You can run API programs from a command line or from the BMC Remedy AR System; in the Set
Field $PROCESS$ action from an active link, filter, or escalation; or with the Run Process action in
an active link, filter, or escalation.
C API components
The C APIs consist of a set of functions, most of which cause the server to perform a specific
database or data source operation and return a result. For example, you can create an entry or
retrieve information about a particular BMC Remedy AR System object.
BMC Remedy AR System C API functions (see page ) describes the purpose and use of each
BMC Remedy AR System C API function. BMC Remedy AR System plug-in API functions (see
page ) describes the purpose and use of the common BMC Remedy AR System, AREA,
ARDBC, and AR filter API plug-in functions.
In addition, almost all of the BMC Remedy AR System C API functions accept one or more
structure-type parameters. Data structures (see page ) explains some of the most common
structures and the operations they apply to. These types are defined in the ar.h file. If you
understand the functions and structures that comprise the API, you can interact with the BMC
Remedy AR System server to customize and extend your applications.
The driver directory contains source code for the driver program. This program provides a
command line interface for calling BMC Remedy AR System C API functions. The driver program
also includes print routines for every data structure in the API, making it a useful debugging tool.
See Using the driver program (see page ) for additional information about this topic.
Java API
The BMC Remedy AR System Java API is a collection of Java classes that provide the full BMC
Remedy AR System API functionality in a Java development environment.
Provides an object model of BMC Remedy AR System server entities (also called server
objects), definitions, and data.
Includes a single class, ARServerUser, that provides both the context and the methods
required to interact with the BMC Remedy AR System server.
The JavaDriver directory contains source code for a Java program like the C driver program.
For more information about the Java API, see BMC Remedy AR System Java API overview (see
page 4127) and the Java API documentation HTML files in the ardocVerNum.jar file in the
\Arserver\Api\doc folder (Windows) or the /ARServer/api/doc folder (UNIX). To access the Java API
documentation, unzip the ardocVerNum.jar file to create a tree of directories, then open the index.
html file.
Write server-side web applications that you access through the Java server page (JSP) or
Java servlets web tier layer.
Implement BMC Remedy AR System clients in Java.
The Java Virtual Machine (JVM) uses garbage collecting functions to automatically
deallocate objects that are created with the Java API. The C API includes a set of memory
deallocating functions that you can use to deallocate memory.
In the C API, the control parameter provides server access information with every call. In the
Java API, the ARServerUser object encapsulates this information
The C API and Java API have different naming conventions.
The REST API uses the base URI for the web service, such as https://<localhost>:<port>
/api/{namespace}/{version}
For more information about the REST API, see BMC Remedy AR System REST API overview (see
page 3379).
Monitor Monitors the mailbox for statistical information such as when the connection dropped and the length of time the
connection was down.
Creator Primarily responsible for creating an email based on a template and the data it retrieves from BMC Remedy AR
System.
Monitors the BMC Remedy AR System Email Messages form for outgoing messages.
Formats messages to be sent.
Sender Runs as a separate thread, and sends formatted messages to the mail server.
Logging Logs messages, error messages, and warnings to the BMC Remedy AR System Email Errors form or local file.
Configuration Maintains configuration information for the system specified in the BMC Remedy AR System Mailbox
Configuration form and EmailDaemon.properties file.
All modules run as separate threads. An incoming mailbox uses two threads to process email in
the message queue--the Receiver and Execution modules. An outgoing mailbox uses separate
threads running for the Creator and Sender modules to format and send outgoing messages.
You can specify various troubleshooting parameters, for example, the queue size of email
messages or how finely you want to log information within a module. For more information, see
Debugging options for the BMC Remedy Email Engine (see page 4212) and EmailDaemon.
properties file (see page 638).
Depending upon the NumberOfSenderThreads value and the number of configured outgoing
mailboxes, a connection pool is created. The Sender thread uses the connections from this
connection pool for sending the outgoing messages.
Note
The number of connections for each configured outgoing mailbox depends upon the
number of Sender threads.
As per the above figure, there are 3 configured outgoing mailboxes and the value of
NumberOfSenderThreads is assumed to be 2. Due to this, 2 Sender threads and a connection
pool with 6 connections (2 connections for every mailbox) is created. The Sender threads send the
outgoing messages from the common message queue created for the 3 Creator threads by using
the connections from this connection pool.
Related topic
Email engine service failover in a server group (see page 1241)
BMC Remedy AR System Server (see page 705) Where to find more information
SAMLv2 (see page 706)
LDAP (see page 714) Installing BMC Remedy Single Sign-
Kerberos (Service Pack 1) (see page 720) On
Certificate-based (Service Pack 1) (see page 717)
Remedy SSO allows users to present credentials only once for authentication and
subsequently be automatically authenticated by every BMC product that is
integrated into the system.
You should install the Remedy SSO server and configure it with an authentication server such as
SAML or BMC Remedy AR System. Remedy SSO supports authentication with traditional system
such as Active Directory through SAML authentication. You can deploy the web application on the
same infrastructure as the AR Remedy Mid Tier. BMC products such as Remedy ITSM, BMC
MyIT, BMC Analytics for Business Service Management (BSM) use Remedy SSO agents that
redirect unauthenticated user requests to the Remedy SSO web application. BMC Remedy SSO
can provide SAML based authentication, where the Remedy SSO web application acts as a SAML
service provider. It redirects the login requests to the SAML identity provider.
The Remedy SSO web application is light weight and easier to deploy, configure, and maintain. It
can be deployed in the failover cluster which allows adding or removing the nodes easily on
demand. Remedy SSO persists user sessions in a database instance sharing sessions between all
nodes. Remedy SSO supports Microsoft SQL and Oracle database. The existing BMC AR System
database infrastructure can be used to leverage BMC products deployment and decrease
maintenance cost.
Component Description
BMC The agent filters protected resources from unauthenticated logins. When it detects an unauthenticated request, it
Remedy redirects the user to the Remedy Single Sign-On server web application. The agent defines the right domains for
Single Sign- the users depending on their domains. It defines the right server to communicate in a multi server environment.
On agent
Authenticates users and gets validation requests from agents. If authentication succeeds, the BMC Remedy
Single Sign-On web application generates authentication tokens and stores them in its database. It now supports
SAML V2.0 and BMC Remedy AR System authentications. If SAML is selected, BMC Remedy Single Sign-On
Component Description
BMC acts like a SAML service provider and redirects authentication requests to the SAML IDP to display the logon
Remedy page with an encoded SAML authentication request. The BMC Remedy Single Sign-On web application then
Single Sign- processes the authentication response by allowing or disallowing the authentication request.
On web
application
BMC Mid It validates the token from the user request and extracts user information from the context. It then passes the
Tier Remedy information to the BMC Remedy AR System Server through the BMC Remedy Mid Tier authentication
Single Sign- infrastructure. The authentication request is then processed on the BMC Remedy AR system side by BMC
On Remedy Single Sign-On AREA plugin.
authenticator
plugin
BMC Gets user information from the BMC Remedy Mid Tier API call as an authentication token and then makes a
Remedy REST API call to the BMC Remedy Single Sign-On web application to verify the token's validity.
Single Sign-
On AREA
plug-in
User roles
Use this section to learn about the roles and responsibilities of BMC Remedy AR System users
associated with each key section shown in the preceding figure.
Administrator responsibilities
Typically, BMC Remedy AR System administrators are responsible for some or all of these tasks:
Writing plug-ins and custom clients that use the BMC Remedy AR System C API, Java API,
or Java plug-in API
Integrating external applications with BMC Remedy AR System
Developer responsibilities
Typically, BMC Remedy AR System developers are responsible for some or all of these tasks:
Creating an BMC Remedy AR System application that reflects a set of work processes and
business rules, or working with a consultant to create an application
Localizing an BMC Remedy AR System application for use in other languages or countries
Modifying an BMC Remedy AR System application to reflect changes in the organization's
work processes
Planning
Use the following topics to help you plan for a BMC Remedy Action Request System
installation.
Note
Before you begin your planning process, review the Known and corrected issues (see
page 31) to understand any issues you might encounter.
Goal Instructions
Plan your BMC Remedy AR System installation. Planning BMC Remedy AR System
Learn about the available features and installation in an enterprise environment
configuration types. (see page 217)
Learn about the performance benchmarks and Performance benchmarking and tuning
tuning for BMC Remedy AR System. in the BMC Remedy ITSM
Deployment space.
Learn the hardware and software requirements System requirements (see page 228)
for installing and running BMC Remedy AR
System
Plan for securing your applications through Security (see page 228)
encryption and other methods.
Learn about how IPv6 is supported in BMC Support for IPv6 (see page 267)
Remedy AR System.
BMC Remedy AR System has a flexible and scalable architecture, and can be configured
depending on current and future needs.
BMC Remedy AR System requires several compatible features to function correctly. See
Compatibility matrix in the BMC Remedy ITSM Deployment online documentation to check if your
current features are compatible with the BMC Remedy AR System version you are using.
This topic discusses the available features and configurations for BMC Remedy AR System:
The BMC Remedy AR System server is the primary feature that manages user interaction with the
underlying database. The BMC Remedy AR System server interacts with the database and
provides information to the user independent of the underlying database. For more information, see
Understanding the AR System database (see page 1957).
See also BMC Remedy AR System functional components (see page 172).
BMC Remedy AR System can be installed with Microsoft SQL Server database or Oracle
database. The database can be installed on any computer that is accessible to the BMC Remedy
AR System server.
The BMC Remedy AR System installer creates an BMC Remedy AR System database with a
series of tables that make up a data dictionary where form, filter, escalation, and other definitions
are stored. The BMC Remedy AR System installer also creates the user of the BMC Remedy AR
System database. The structure of the BMC Remedy AR System database varies depending on
the underlying database. For more information, see Understanding the AR System database (see
page 1957).
Mid tier is optional middleware that enables BMC Remedy AR System access through a browser.
A web server and the mid tier must be installed on the same computer. This computer can be
networked to the BMC Remedy AR System server computer. One mid tier can permit access to
multiple BMC Remedy AR System servers.
Best Practice
For best results, install the BMC Remedy Mid Tier on a separate computer from the BMC
Remedy AR System server.
BMC Remedy Mid Tier Configuration Tool is installed with the mid tier. Use this tool to define which
BMC Remedy AR System servers the mid tier can access.
Client computers must have a supported browser installed. Users need BMC Remedy AR System
permissions to submit BMC Remedy AR System requests and search the database through the
web.
For more information, see BMC Remedy Mid Tier functional components (see page 191).
The Email Engine is a process (on UNIX) or a service (on Windows) that transforms email
messages into an interface to the BMC Remedy AR System server. The Email Engine enables
users to instruct the BMC Remedy AR System server to perform queries, submissions, or
modifications to entries, all using email. The Email Engine can also return the results of such
requests in email, formatted as plain text, RTF, HTML, or XML content. In addition, the Email
Engine can process notifications using workflow actions, such as filters and escalations.
The Email Engine can connect to mail servers by using protocols such as Internet Message
Access Protocol (IMAP4), Post Office Protocol (POP3), Simple Mail Transfer Protocol (SMTP),
Messaging Application Programming Interface (MAPI), and MBOX.
Note
The MAPI protocol for incoming and outgoing mail is disabled for 64-bit Java Virtual
Machine (JVM).
For more information, see Controlling BMC Remedy AR System through email (see page 1440).
Assignment Engine
The Assignment Engine enables you to use processes instead of workflow to automatically assign
requests to individuals. When you install the Assignment Engine, the installer installs forms to help
you set up the processes. See Assigning requests with the Assignment Engine (see page 1402).
Flashboards
Flashboards enable you to include dynamic, graphical representations of data in the BMC Remedy
AR System forms. You can use flashboards to process, store, and display data in the form of
graphs, charts, text boxes, and meters. You can summarize data for trend or historical analysis.
BMC Remedy Developer Studio uses the Java-based Eclipse platform to provide a framework for
its functions. Eclipse includes functions to organize the user interface (UI) and to work with UI
components that the Developer Studio provides.
Note
BMC Atrium Integration Engine is being replaced with a new offering called BMC Atrium
Integrator (see page 215). The currently available BMC Atrium Core version 8.1 will be
the last release that includes BMC Atrium Integration Engine. No new versions (major or
minor) of BMC Atrium Integration Engine will be released after 8.1. For more information
see, Statement of direction for the end of life of BMC Atrium Integration Engine.
Note
Configuration Types
The following sections show the required and optional features in sample configurations. These
sample configurations do not demonstrate all possibilities. BMC Remedy AR System is flexible,
adaptable, and scalable, so you can mix and match features as needed.
Note
The sample configurations shown in this section do not represent all possible
combinations. Configurations are also flexible; you can change your configuration any
time.
Each BMC Remedy AR System server communicates with one database. Multiple BMC Remedy
AR System servers can communicate with the same database.
You can install the mid tier and the required supporting features on a web server computer to allow
users to access BMC Remedy AR System through a browser. The web server and mid tier must be
installed on the same computer, and this computer can be networked to the BMC Remedy AR
System server computer. All features can be installed on the same computer, but verify that the
computer has adequate resources available (memory, disk space, processor power).
Client computers require a supported browser and Internet or intranet access for the mid tier
computer to access BMC Remedy AR System.
A mail server that supports either SMTP (on UNIX or Windows) or MAPI (on Windows only)
for outgoing mail, and POP3, IMAP4, MAPI, or MBOX for incoming mail. The mail server
must be accessible by the Email Engine.
Note
The MAPI protocol for incoming and outgoing mail is disabled for 64-bit Java
Virtual Machine (JVM).
For more information, see Controlling BMC Remedy AR System through email (see page 1440).
Topic AR System Mid tier Email Engine Assignment Approval BMC Atrium
Server Engine Server CMDB
Installing See Installing section from the BMC Remedy ITSM 9.1 Deployment online documentation.
User Specifying
authentication internal and
external
authentication
(see page 852)
Distributed Distributed
deployment operations
introduction
(see page 1738)
Integration
capabilities
Topic AR System Mid tier Email Engine Assignment Approval BMC Atrium
Server Engine Server CMDB
Log files and Collecting BMC Remedy BMC Remedy Assignment BMC Remedy BMC Atrium
monitoring diagnostics Mid Tier logging AR System engine logs Approval CMDB log files
(see page 4156) (see page 4187) Email Engine (see page 4186 Server logging (see page 4240)
logging levels ) (see page 4247)
(see page 4248
)
Common Troubleshooting
problems and tips issues with
BMC Atrium
CMDB
Links to federated
systems
Topic AR System Mid tier Email Engine Assignment Approval BMC Atrium
Server Engine Server CMDB
Configuring
federated data
in BMC Atrium
CMDB
Answer these questions before starting a server group setup. Additionally, create a list of licenses
that will be needed for all products, including the AR System server licenses.
After you have answered these questions and license issues, continue to the following topics for
server group planning:
Note
The servers within a server group need not have the same operating system, but you
should ensure that any workflow that interacts with the operating system will run on all
operating systems within the server group.
A server group acts as a single AR System server to support applications running on multiple AR
System servers. The individual servers in the server group are configured to spread the load of
shared services, and to provide backup for each other to ensure that those services are always
available. BMC applications that are based on AR System, such as the BMC Atrium CMDB and its
related applications, as well as the BMC Remedy ITSM suite of applications can be installed and
configured to operate within a server group.
To ensure high availability of AR System operations, a server group can be configured to provide
failover protection by assigning rankings for specific AR System operations to the servers in the
group.
The following are the benefits of configuring your AR System implementation using a server group:
Heavy user traffic can be distributed across multiple AR System servers using a third-party
load balancer.
Automatic server failover (if a server goes down the system seamlessly keeps running).
Ease of administration; it has only one database to manage and back up.
AR System servers share all BMC software licenses except AR Server licenses.
There is one server designated as an administrative server. (When the workflow and
applications are handled on the administrative server, the changes are automatically
propagated to other servers in the group.)
Specific servers in the group can also be configured to handle reporting, reconciliation, and
other tasks that can impact performance, freeing up the remaining servers in the group to
handle user traffic.
Inexpensive servers can be added to a server group to increase the growth in users and
workload without having to replace or upgrade a single server. The environment is easier
and less expensive to scale.
Server groups also work in conjunction with hardware load balancers that direct user traffic to
some or all servers in the group. For best performance and reliability, BMC recommends that you
use a load balancer when implementing server groups. For specific details on using a load
balancer, see Configuring a hardware load balancer with BMC Remedy AR System (see page 524)
and Using a load balancer with server groups (see page 527).
Implement a server group if you require failover protection, or if you have a large environment that
requires multiple servers. AR System can be setup to run on multiple servers without using a
server group, and there may be some cases where that is the best solution, however the
recommendation for running multiple servers is to install them as a server group.
Note
It is required to always use the exact same version and patch level for all BMC software
applications on each server included within a server group. And, to always upgrade each
application on each server within the server group at the same time.
Server roles
In a server group, each server is typically the primary owner of one or more specific roles. Each
role represents a specific BMC Remedy AR System application or component. In any server group
implementation, no matter how simple, there is one server that is configured the administration
role. This is typically the first server installed and is used to perform all administration operations
for the server group. Because all of the servers share the same database, this allows the group to
Other servers can be assigned specific primary roles. For example, a server might be dedicated to
just one specific primary task, such as Approval Server, while another server might be setup as a
primary server to host a group of roles that might be closely related such Atrium CMDB and Atrium
Integration Engine. The primary roles are configured on the AR System Server Group Operation
Ranking form (see page 378), and each server should have at least one other server configured for
failover.
Following is the complete list of server group roles for BMC software, as supported by the AR
System Server Group Operation Ranking form (see page 378).
Administration — Performs all administration tasks for the entire server group.
Approval Server — The approval server provides the approval functionality within BMC
Remedy applications. An approval represents the signature or acknowledgment of an
individual where required in a process. The approval server records all necessary
information to provide an audit trail and proof of authenticity of all approvals.
Archive — The archive feature of BMC Remedy AR System provides a convenient way to
periodically store data (not definitions) from a form to an archive form; this reduces the
amount of data accessed during searches on the main form thus improving system
performance. Archiving applies to all types of forms, except display-only forms.
Assignment Engine — Using processes instead of workflow, the Assignment Engine
enables you to automatically assign requests to individuals. The assignment method
determines who is assigned to an issue when more than one person matches the
qualification.
Atrium Integration Engine — The BMC Atrium Integration Engine (AIE) provides the hooks
to enable data to pass between AR System and other systems, such as an Enterprise
Resource Planning (ERP) system. AIE consists of the Data Exchange application and the
AIE service as well as a configuration tool and an event request interface.
Business Rules Engine — The business rules engine is a component of BMC Service Level
Management that is used to interpret stored rules to construct the filters that are required to
implement the rules. The main form that the business rules engine is the SLA:Business
Rules form which contains references to objects required to create a filter.
CMDB — BMC Atrium Configuration Management Database. This is a core component of
any IT Service Management (ITSM) environment and adds substantial value to a simple
Incident Management environment. Specifically, it makes incident management more
efficient by providing support staff and IT management an up-to-date image of their
production IT environment.
DSO — The BMC Remedy Distributed Server Option (DSO) is used to build large-scale,
distributed environments that behave like a single virtual system. DSO enables an
organization to share common information among geographically distributed servers and to
keep that information consistent. DSO enables you to transfer requests between servers
and to keep copies of a request synchronized across multiple servers, even if those servers
are geographically dispersed.
E-Mail Engine — A server-based module provided with BMC Remedy AR System that
communicates with both the BMC Remedy AR System server and an email server. Email
Engine receives email messages and can parse and interpret the messages to execute
specific instructions on a BMC Remedy AR System form. It also sends email messages to
BMC Remedy AR System and directs notifications as a result of filters and escalations.
Escalation — An escalation is an action or group of actions performed on the server at
specified times or time intervals. Basically, an escalation is an automated, time-based
process that searches for requests that match certain criteria at specified times and takes
actions based on the results of the search. For example, an escalation can trigger BMC
Remedy AR System to notify the next level of management if a problem is not assigned to a
technician within one hour of submission.
Flashboards — A real-time visual monitoring tool that can show the state of service
operations, warn about potential problems, and collect and display trend data.
Full Text Index — Full text index is the indexing feature for the full text search (FTS) method
used in BMC Remedy AR System to search for text in long text fields or attached
documents. It is typically much faster than using the native database searching functionality
Reconciliation Engine — The reconciliation engine is a patent-pending component of the
BMC Atrium CMDB. The reconciliation engine is based on business rules, which allow you
to leverage existing data coming from third-party asset or discovery tools. The solution does
not lock you into any one vendor's discovery tools or existing asset repositories.
Example configurations
This section contains examples of a simple configuration and a complex configuration.
Simple example
In the simplest form, a server group can be setup with two AR System servers and a database
server. Each of the AR System servers have all Remedy products installed.
In this example, the first server installed should be configured to be the primary administration
server. Then, using the AR System Server Group Operation Ranking form (see page 378), the
applications should be distributed evenly across both servers, so that each server handles about
half of the load, and each server has the other server configured for failover on each of its
applications.
The exception to this is the Email Engine and the Flashboards server. In a simple configuration,
those two items are only installed and configured on one server. Configuring failover for those
operations can be complex and may not be necessary in a simple configuration.
The full text search feature should be installed on each server. Each server has the ability to read
from FTS, but only one server can be set to write, which is the server that is set with a higher
priority on the AR System Server Group Operation Ranking form. It is also recommended that the
FTS collection directory (location where the search index files are stored) and FTS configuration
directory (location where the search configuration files are stored) be located on the same
computer.
Complex example
A more complex server group implementation contains three or more AR System servers. In this
example we are using four AR System servers. It is still recommended to install all Remedy
products on each server, but it is not required. However, each application or component should be
installed on at least two servers so that failover can be provided.
Again, the first server installed should be configured to be the primary administration server. Then,
using the AR System Server Group Operation Ranking form (see page 378), the applications are
distributed evenly across all four servers, so that each server handles about one quarter of the
load, and each server has at least one other server configured for failover on each of its
applications and components.
In this case, even the Email Engine server and the Flashboards have a failover server assigned.
Configuring failover for those operations is somewhat complex because it means that each server
has to be specifically configured to handle those items, but the secondary server for each is
Note
The applications and components listed for the servers above are just the primary roles
for each server. It is recommended that all applications and components be installed on
each server. This is important because users could be accessing any components from
any server in the group, and there are dependencies such as plug-ins and other binary
files that could be called when a user opens certain forms, creates a new record, or
modifies a record.
In this example, FTS is setup on all the servers so that failover is possible. The FTS feature should
be installed on each server. It is also recommended that the FTS collection directory (location
where the search index files are stored) and FTS configuration directory (location where the search
configuration files are stored) be located on the same computer.
Related topics
Configuring server groups (see page 375)
You must also define a unique name for each server in the group so that the servers in the group
can identify each other and so that you can direct administrative or specialized operations to a
specific server. Both the server alias name and the unique names must be able to resolve by DNS.
This documentation assumes that if there is more than one BMC Remedy AR System server
pointing to the same database, that work is directed to the individual servers via some automated
functionality (such as a hardware or software load balancer), or through manual configuration (such
as directing some users to one server and other users to another server). It is also possible that
one server is used primarily for users while the other server is used for automations and
integrations. In any case, the actual configurations for various settings, such as the server name
alias, need to be considered for the specific environments.
Note
Make sure that you use a name that will be translated to the IP address of the load
balancer. So, either the DNS should resolve the name or you must map the name in etc
/hosts file.
Clients can, therefore, be directed to the load balancer by using the server name parameter.
Note
If the server name alias setting is not the same as the load balancer short DNS name,
ARTask email attachments generated by the server might not work. When generating an
ARTask attachment, the server generates a reference to itself by using the server name
parameter with the domain name appended. Clients opening the ARTask will then use
the fully qualified domain name to be routed to the server group through the load
balancer.
To identify the unique name for each server in the group, the following line is added to each
server's configuration file:
Server-Connect-Name: <serverName>
DNS must be able to resolve this name, and it is used exactly as specified (that is, no domain
name is appended). Each server uses this name to register as a server group member. Other
servers in the group use the name when communication between servers is required. In addition,
various external server components use the name when connecting to the local server. This name
can be specified as either the short name or the fully qualified name.
To configure DSO in a server group environment, you need to specify a server group
name.
Create a list in a text file for each server and its IP address, as well as all accepted fully qualified
names. This saves you time when configuring the other servers. Each server must have the same
set of entries containing all resolvable names for each server. Include the IP address, short name,
and fully qualified name for each server in the server group and the load balancer, if one is used. In
the installation instructions, a two-system server group is used and the systems have the following
information. (Ensure to obtain similar information for your implementation before you start the
installation process.)
The following example uses a format that you can easily copy and paste into the ar.cfg files on the
servers in your server group. It includes the entire set of IP-Name entries for this example.
AR System Server 1:
IP-Name: svr_grp_tst0
IP-Name: svr_grp_tst0.svgroup.com
IP-Name: svr_grp_tst0.test.svgroup.com
IP-Name: 92.161.135.31
AR System Server 2:
IP-Name: svr_grp_tst3
IP-Name: svr_grp_tst3.svgroup.com
IP-Name: svr_grp_tst3.test.svgroup.com
IP-Name: 92.163.169.2
System requirements
See the topic Reviewing system requirements from the BMC Remedy ITSM Deployment online
documentation.
Security
The following topics contain information and instructions on BMC Remedy Action Request System
security planning:
Security architecture
This topic describes the BMC Remedy AR System security architecture.
Note
The IT environment and network infrastructure in which your BMC Remedy AR System
runs must be properly secured and include standard IT network security tools and
systems such as firewalls and intrusion detection systems (IDS).
System architecture
The BMC Remedy AR System architecture is multi-tiered; it consists of a Presentation layer, a
Logic layer, and a Data layer as shown here.
Presentation layer
The Presentation layer consists of the web browser client connected to the mid tier with secure
socket layer (SSL) encryption. You must implement SSL to secure the connection between the
browser and the web server. BMC supports any SSL version that is supported by the HTTP web
services vendors listed in the BMC Remedy AR System Compatibility Matrix (see Compatibility
matrix in the BMC Remedy ITSM Deployment online documentation).
Logic layer
The Logic layer includes instances of a mid tier, a JavaServer Pages (JSP) engine, a web server,
and the BMC Remedy AR System server. The JSP engine and accompanying servlets provide
dynamically generated HTML and XML documents in response to web client requests. The mid tier
installer includes and can automatically install a bundled version of the Tomcat web server.
The mid tier translates client requires, interprets responses from the BMC Remedy AR System
server, handles web service requests, and runs server-side processes that present BMC Remedy
AR System functionality to the client from the BMC Remedy AR System server. The server
executes workflow and business logic that define all BMC Remedy AR System applications.
Because all BMC Remedy AR System clients are API-based, turning on encryption ensures that all
interactions with the server are encrypted.
Data layer
The Data layer consists of one or more databases, which perform data storage and retrieval
functions. The BMC Remedy AR System server connects to the Data layer using database client
API libraries. The server can work with the database encryption libraries used to protect data that is
transmitted between the server and database.
Information
Password security — AR System ensures that passwords are always encrypted. An MD5
hash of passwords is stored in the database, ensuring that the system (and therefore a
reader of the database) cannot retrieve passwords. In addition, the AR System server allows
you to use policies to enforce password changes. For password policy information, see
Enforcing a password policy introduction (see page 1303).
FIPS Compliance — In version 7.5.00, AR System was enhanced so that data transmitted
between AR System servers and clients can comply with FIPS 140-2 encryption
requirements. BMC Remedy Encryption Performance Security now includes a FIPS
encryption option. For more information, see FIPS encryption options in BMC Remedy
ITSM Deployment online documentation
Important
BMC recommends to use a secure socket layer (SSL) or HTTPS connection to encrypt
the data between the web server and the browser client.
Enabling SSL can impact performance due to the extra overhead required to encrypt and decrypt
on both ends.
Note
You can now log on to BMC Remedy Mid Tier using only HTTP POST requests.
Use BMC Remedy Encryption Performance Security or BMC Remedy Encryption Premium
Security to encrypt communication between AR System components, including the mid tier.
SSL
The mid tier works with SSL. SSL encryption is a few layers below the web application
(between the HTTP web server and the browser client sending the HTTP requests). All web
server vendors provide a method to create and store certificates to enable SSL encryption
over HTTP.
Configuring the environment for SSL support is beyond the scope of any guidance BMC
provides.
Apache HTTP server has an SSL mode and, when that mode is enabled, the server can
cache the encryption information to speed up performance.
XSS
Cross-site scripting (XSS) is a type of computer security vulnerability (typically found in web
application) that allows code injection by malicious web users into the web pages viewed by other
users. Examples of such code include HTML code and client-side scripts.
Cross-site scripting is addressed in every release of the mid tier by running the code through a tool
to identify potential problems to ensure no vulnerability is introduced. All user-supplied HTML
special characters are encoded into character entities, thereby preventing them from being
interpreted as HTML.
WebDAV
Web Distributed Authoring and Versioning (WebDAV) extensions on web servers allow users to
collaboratively edit and manage files on remote web servers. If your web servers has the WebDAV
extensions enabled by default, they should be disabled.
HTTP transport
To ensure that the HTTP transport method POST is used for XML/HTTP requests in the browser,
you must set the arsystem_xmlhttp.get flag in the Config.properties file to false.
Warning
If you use the pwd parameter in a URL, passwords are exposed by the browser in the
locator and in bookmarks or favorites. For URLs that include the pwd parameter, use
https:// (https://*).
Use BMC Remedy Encryption Performance Security or BMC Remedy Encryption Premium
Security to encrypt communication between AR System components, including the Approval
server. Approval server uses the encrypted password for the Remedy Application Service user,
which is available in the ar.cfg (ar.conf) file for making any backend calls to AR System.
For information on Assignment Engine security, see Configuring the Assignment Engine server
settings (see page 680).
Additional Information
For more information on security guidelines, see the blog Choose your request methods carefully
shared on BMC Communities.
BMC Remedy AR System provides BMC Remedy Encryption Performance Security and BMC
Remedy Encryption Premium Security components that you can install to provide well-protected
communication among BMC Remedy AR System components.
BMC Remedy AR System uses transport layer security and digital signatures to perform
end-to-end validation after a connection is made.
Use secure socket layer (SSL) to encrypt the traffic between the HTTP web server and the browser
client. Configuring the environment for SSL support is beyond the scope of guidance that BMC
provides.
Note
Enabling SSL can impact performance due to the extra overhead required to encrypt and
decrypt traffic.
Using this technique, attackers make victims perform actions that they did not intend to, such as
logging out, purchasing items, or other functions provided by the vulnerable website. The user's
browser is tricked into issuing a command to a vulnerable web application.
The vulnerability is caused by browsers automatically including user authentication data such as a
session ID, IP address, or Microsoft Windows domain credentials with each request.
The AR System disables web server scripting in the mid tier. The processes that run on the AR
System server is restricted by the AR System permissions model, and are restricted to specific
directories on the server.
Because the Tomcat JSP engine is bundled with the mid tier, the BMC Remedy AR System
installation script performs the following clean-up tasks to ensure that security issues in Tomcat are
resolved:
These tasks make the Tomcat installation more secure; however, determining whether the mid tier
or the Tomcat engine suffered an incorrect installation can be difficult, because all extraneous
services are removed. To ease this problem, an index.html page is also installed that is displayed
when Tomcat is running.
If the mid tier fails to run after installation, complete the following steps to determine whether the
problem is the Tomcat installation or the mid tier installation:
1. Stop Tomcat.
2. Open the <TomcatInstallationDirectory>/conf/server.xml file and uncomment the Connector
entry at port 8080.
3. Restart Tomcat.
4. In a browser on the same computer as the Tomcat installation, go to http://<localhost>:8080.
If the Tomcat engine is running correctly, the following message is displayed in the browser:
Tomcat is running
HTTP TRACE is a default function in many web servers, primarily used for debugging. The client
sends an HTTP TRACE request with all header information, including cookies, and the server
simply responds with that same data.
To prevent cross-site tracing (XST) attacks that use XSS and the HTTP TRACE function, the HTTP
TRACE function in the mid tier is disabled by default. To disable the HTTP TRACE function
completely, you must also disable HTTP TRACE on the application server hosting the mid tier. For
information about how to enable the TRACE function, see HTTP tracing in the mid tier (see page
3172).
To mark all cookies as secure, you must uncomment the secure cookie filter.
Note
Enable this filter only when BMC Remedy Mid Tier is configured to work with HTTPS or a
reverse proxy configured to work with HTTPS. When using a reverse proxy, you can
access the mid tier either through a proxy or by connecting to the computer that hosts the
mid tier.
If the reverse proxy is configured with HTTP, do not enable the secure cookie filter and
access the mid tier either by connecting through the URL that is configured as the proxy
(for example, http://xyz:8080/arsys) or by accessing the mid tier from the same computer
on which it is installed (for example, http://<localhost>:8080/arsys).
If the reverse proxy is configured with HTTPS, you must enable the secure cookie filter
and access the mid tier only by connecting through the URL that is configured as the
proxy (for example, https://xyz:8080/arsys). You cannot, however, access the mid tier
from the same computer on which it is installed.
3. Remove <!- and -> from before and after the entry to uncomment the entry.
4. Save the web.xml file.
5. Restart the mid tier.
By default, security is disabled for data passed through the mid tier by using the data visualization
model plug-ins. To enable mid-tier security for the plug-ins, you must add the following option to
the config.properties file:
arsystem.plugin_securitycheck=true
What should I do prevent the Mid Tier from allowing a user to submit a URL containing a Return
Back parameter?
The Return Back parameter in a URL allows a user to alter a base return URL when the URL is
sent back to the browser from the web server. This behavior could make the system vulnerable to
a phishing attack. For example, http://hostname/arsys/shared/login.jsp?
http://www.google.com returns to www.google.com.
The default value of the Return Back parameter is true. You must change the value to false to
prevent the mid tier from allowing the use of a URL containing a Return Back parameter (
http://www.google.com in the example). With the parameter set to false the mid tier redirects
users to their default Home page form.
arsystem.allow.returnback.url=false
To prevent frame phishing vulnerabilities in the mid tier, the mid tier verifies that it is not placed
inside a portlet container or displayed in third-party frames or iFrames. If a portlet container, third-
party frame, or iFrame is detected, the mid tier automatically disconnects from the object and
displays the content in a single window.
When encryption is employed, unsafe key generation, non-rotating keys, and weak algorithm
usage is common. The use of weak or unsalted hashes to protect passwords is also common.
All sensitive data is encrypted within AR System. All communication between the web browser and
the web server can be encrypted using HTTPS. All communication between the web server and
the AR System server can be encrypted using API encryption.
The Mid Tier access is prevented by some security software. What should I do?
Mid tier access might be prevented if your security software blocks URLs with special characters
such as < (left angle bracket), > (right angle bracket) and '(apostrophe). To resolve this issue,
change the arsystem.xmlhttp.get setting in the config.properties file from true to false and
enable the use of HTTP POST for backchannel calls.
Note
Enabling the XSS filter impacts the BMC Remedy AR System server performance.
Example
You can add an inclusion list of URLs to be redirected to when you log on to the mid tier and when
you log out of the mid tier. An inclusion list of URLs is allowed in the goto request parameter of
LoginServlet and LogoutServlet so that the user is automatically redirected to the specified URL.
arsystem.inclusion_goto_urls=http://www.google.com,http://www.microsoft.
com,
http://<midTierServer>/
Note
The inclusion list must also contain the mid tier's own URL to allow the mid tier to redirect
to itself.
To prevent XSS attacks using some attachments, mid tier allows you to add an inclusion list of
supported file extensions for attachment.
HIPAA Compliance is about the business itself and the processes within that organization. A
software product itself cannot be HIPAA compliant, but can support the HIPAA compliance
goal of an organization. BMC Remedy AR System provides number of features that support
customers in building HIPAA compliant processes. For example, forced (re-)authentication
for approval and electronic signature.
When used correctly, BMC Remedy AR System and applications built on BMC Remedy AR
System, like, BMC Remedy IT Service Management (ITSM), provide the necessary
capabilities for a business to meet HIPAA guidelines.
There is no standardization around using an authenticated RSS feed with a RSS feed client.
The subscription to RSS feed in BMC Remedy AR System requires an additional factor of
security, as it asks for authentication credentials and encrypts them using RSA Asymmetric
cryptography as part of the RSS feed URL. For more information, see Subscribing to RSS
feeds (see page 2155).
When the user accesses an RSS feed using an RSS feed client, the encrypted credentials
from the RSS feed URL are used by BMC Remedy AR System server for authenticating the
user and querying the data requested based on the user's permissions.
Note
The end user needs to ensure that no unauthorized person can get access his RSS Feed
URL.
Cookies carrying sensitive information can be marked as HTTPOnly. The browsers supporting this
attribute prevent access to such Cookies by client-side script (JavaScript).
The SessionID cookie (JSessionID) is the only cookie used by BMC Remedy Mid Tier that carries
information about user's SessionID. By default, all SessionID cookies are marked as HTTPOnly to
prevent unauthorized access to the SessionID cookies.
There is a newly reported TLS POODLE vulnerability. For more information, see https://community.
qualys.com/blogs/securitylabs/2014/12/08/poodle-bites-tls. There is a new critical vulnerability
reported for this issue on F5 load balancers. It appears that F5 load balancer is vulnerable to this
TLS POODLE vulnerability. For more information, see https://cve.mitre.org/cgi-bin/cvename.cgi?
name=CVE-2014-8730.
It is important to apply the F5 hot fix if you are using a F5 load balancer. If you are using any other
load balancer, confirm with your load balancer vendor if it suffers from the TLS POODLE
vulnerability and get a hotfix for the issue. For more information, see https://www.imperialviolet.org
/2014/12/08/poodleagain.html which lists other load balancer vendors affected by this vulnerability.
Use the SSL Labs SSL Server Test tool https://www.ssllabs.com/ssltest/ to check your server for
SSL related vulnerabilities.
When you configure the list of trusted host headers, the server checks whether the request is
received from the header that is listed in its trusted host headers list. This prevents any redirections
from a tampered host header. The request is rejected if the header is not listed.
There is no default configuration for trusted host headers. Perform the following steps to configure
trusted host headers:
The following procedure is applicable only when you apply BMC Remedy AR System 9.1
patch 1 (9.1.00.001)
Example
arsystem.host.header_list=host1.bmc.com,host2.customer.com
<filter>
<filter-name>HEADERVALIDFILTER</filter-name>
<filter-class>com.remedy.arsys.stubs.HeaderValidFilter</filter-class>
<filter> <filter-mapping>
<filter-name>HEADERVALIDFILTER<filter-name>
<url-pattern> <url-pattern>
<filter-mapping>
Related topic
Cookies used by BMC Remedy Mid Tier (see page 498)
1.
Standard security
BMC Remedy Encryption Performance Security
BMC Remedy Premium Encryption Security
Federal Information Processing Standard (FIPS) encryption options
These options are described in How BMC Remedy Encryption Security enables secure
communication between the client and server (see page 103).
Server Security 8.1 client with encryption 8.1 client 5.1.2 -7.1.00 client with 5.1.2 -7.1.00 Pre-5.1.2
version policy without encryption client client
encryption without
encryption
8.1 Optional (Default) Encrypted if client Unencrypted (Default) Encrypted if Unencrypted Unencrypted
encryp-tion level matches client encryp-tion level
server configuration OR matches server
Unencrypted 1 configuration OR
Unencrypted 1
5.1.2- Optional (Default) Encrypted if client Unencrypted (Default) Encrypted if Unencrypted Unencrypted
7.1.00 encryp-tion level matches client encryp-tion level
server configuration OR matches server
Unencrypted 1 configuration OR
Unencrypted 1
1
When a server's Security Policy is Optional and a client cannot support the encryption algorithm
required by the server, their communication is unencrypted. For example, if the server is configured
to use BMC Remedy Encryption Premium Security AES or RC4 algorithms and the client has only
BMC Remedy Encryption Performance Security installed, the server will not "drop down" to
Performance-level algorithms. Instead, communication between the server and client will take
place in plain text.
2
For information about FIPS, see Activating FIPS compliance (see page 699) and FIPS encryption
options in BMC Remedy ITSM Deployment online documentation.
Pre-7.5.00 clients and servers cannot use the AES algorithm to exchange data.
AR System 7.5.00 and later clients and servers cannot exchange any encrypted data with 5.0 or
5.1 clients and servers.
Encryption libraries are version-specific to the servers and clients on which they are used:
If a client from a version prior to 8.0 exchanges data with an 8.0 or later server that has
BMC Remedy Encryption Performance Security or BMC Remedy Encryption Premium
Security, the client must use the encryption library file for its version, not for 8.0 or later.
(Windows only) If an application uses AR System components whose version numbers differ
and you need BMC Remedy Encryption Performance Security or BMC Remedy Encryption
Premium Security, you must add encryption libraries for all the versions. For example, if the
application uses the 7.1.00 AR System plug-in server and a 7.0.00 plug-in, you must add the
arencrypt71.dll and arencrypt70.dll libraries to your environment.
Important
Warning
If you update the JRE or JDK on a computer on which the current version of
BMC Remedy Encryption Performance Security or BMC Remedy
Encryption Premium Security is installed, these modifications might be lost.
To reapply them, you must reinstall BMC Remedy Encryption Performance
Security or BMC Remedy Encryption Premium Security.
BMC Remedy ITSM 9.1 and BMC Remedy AR System 9.1 use the WhiteHat Sentinel Premium
Edition (WhiteHat Sentinel PE) service, a dynamic application security tool (DAST), for security
penetration testing. By performing security penetration testing, BMC can identify whether
applications are vulnerable to web attacks and implement the required countermeasures to reduce
vulnerabilities.
As of December 13, 2015, BMC Remedy ITSM 9.1 and BMC Remedy AR System 9.1 do not have
any security penetration vulnerabilities.
Note
For BMC Remedy ITSM 9.1 and BMC Remedy AR System 9.1, BMC schedules
automated security scans with WhiteHat Security that are run on the SaaS-based
WhiteHat Sentinel platform. Automated scans are augmented by manual penetration
tests performed by WhiteHat security experts. After the tests are completed, BMC
receives vulnerability assessment reports. For more information about WhiteHat Sentinel,
see https://www.whitehatsec.com/sentinel_services/benefits.html.
For BMC Remedy ITSM 9.1 and BMC Remedy AR System 9.1, security penetration tests were
performed using a BMC Remedy OnDemand instance deployed in the following environment:
WhiteHat Security employs the following types of tests during the security testing:
Authentication tests (brute force, insufficient authentication, weak password recovery, cross-
site request forgery, credential/session prediction, insufficient authorization, insufficient
session expiration, session fixation)
Client-side attack tests (content spoofing, cross-site scripting, HTTP response splitting)
Command execution tests (buffer overflow, format string attack, LDAP injection, OS
commanding, SQL injection, server-side include injection, XPath injection)
Information disclosure tests (directory indexing, information leakage, path traversal,
predictable resource location)
Logical attack tests (abuse of functionality, denial of service, insufficient anti-automation,
insufficient process validation)
For more information about WhiteHat Security, see the website security statement for WhiteHat
Security.
Injection flaws
Buffer overflow
Insecure Cryptographic Storage
Insecure Communications
Improper Error Handling
Cross Site Scripting
Improper Access Control
Cross Site Request Forgery
Broken Authentication and Session Management
Whitehat reports
For more information about the WhiteHat Sentinel PE tests that were used and the results, which
are zero technical and business logic vulnerabilities, see the following reports:
BMC and Whitehat Security are continually running tests as BMC augments the environment or
adds new security tests.
Test environment
Component Server specifications VM Operating system
used?
BMC Remedy Mid Tier 9.1 Yes CentOS release 6.5 (Final)
2 CPUs (Intel® Xeon® CPU E7 4870 @
2.40 GHz)
8 GB RAM
25 GB drive for BMC Remedy applications
15 GB drive for paging
Configuring Apache Tomcat settings to disable directory listings (see page 247)
Creating an SSL profile on the reverse proxy to disable RC4 ciphers (see page 247)
Restricting attachments by using Attachment Security (see page 248)
Enforcing the default password policy in BMC Remedy AR System (see page 249)
F5 Load Balancer hotfix (see page 249)
BMC Remedy Mid Tier security settings (see page 249)
Enabling secure cookie in BMC Remedy SSO (see page 250)
When you disable the directory listings, you will also disable online help. To enable online help:
1. Install a separate Tomcat instance on a different port on the BMC Remedy Mid
Tier computer.
2. Install online help in the Tomcat container in the Root folder of the Tomcat instance.
3. Log on to BMC Remedy Mid Tier as an administrator and open the SHARE:
Application_Properties Form.
4. Search for Property Name = Help File Path.
5. Update the Property Value for all search result entries to point to the new online Help URL
with the correct port number.
If you are using a reverse proxy (load balancer), further changes may be required
to allow access to the new online help URL.
The following procedure is specific to how BMC Remedy OnDemand uses SSL. An on-
premise installation requires changes to the Apache Tomcat configuration to disable the
RC4 ciphers.
1. Log on to the Configuration utility for the reverse proxy (load balancer).
2. Click Local Traffic.
3. Click Profiles.
4. From the SSL menu, select Client.
5. Click Create.
6. Type a name for the SSL profile.
7. From the Parent Profile menu, select clientssl.
8. From the Configuration menu, select Advanced.
9. Click the Custom box for Ciphers.
10. In the Ciphers box, enter the following string:
DEFAULT:!SSLV3:!RC4
11. Click Finished.
12. Associate the SSL profile with the virtual server.
.txt
.png
.jpg
To restrict attachments, BMC used the following procedure to make the changes to the Attachment
Security tab of the AR System Administration: Server Information form:
For additional information about how to restrict attachments, see Setting security restrictions on file
uploads (see page 349).
The following image shows the changes made to the Attachment Security tab.
Parameter Setting
arsystem.plugin_securitycheck=true
Parameter Setting
<filter>
<filter-name>SecureCookieFilter</filter-name>
<filterclass>com.remedy.arsys.stubs.SecureCookieFilter</fliter-
class>
</filter>
<filter-mapping>
<filter-name>SecureCookieFilter</filter-name>
<url-pattern>/*</url-pattern>
</filter-mapping>
<filter>
<filter-name>XSSFILTER</filter-name>
<filter-class>com.remedy.arsys.stubs.XSSFilter</filter-class>
</filter>
<filter-mapping>
<filter-name>XSSFILTER</filter-name>
<url-pattern>/plugins/*</url-pattern>
</filter-mapping>
<filter-mapping>
<filter-name>XSSFILTER</filter-name>
<url-pattern>/pluginsignal/*</url-pattern>
</filter-mapping>
<filter>
<filter-name>CLICKJACKFILTER</filter-name>
<filter-class>com.remedy.arsys.support.ClickJackFilter</filter-
class>
<init-param>
<param-name>mode</param-name>
<param-value>SAMEORIGIN</param-value>
</init-param>
</filter>
<filter-mapping>
<filter-name>CLICKJACKFILTER</filter-name>
<url-pattern>/*</url-pattern>
</filter-mapping>
1.
BMC Remedy Action Request System 9.1 Page 250 of 4703
BMC Software Confidential. BladeLogic Confidential.
1. Navigate to BMC Remedy SSO admin console > General > Advanced.
For more information, see Configuring server settings for BMC Remedy SSO (see page 702).
BMC Remedy ITSM 9.1 Service Pack 1 (SP1) and BMC Remedy AR System 9.1 patch 1
(9.1.00.001) use the WhiteHat Sentinel Premium Edition (WhiteHat Sentinel PE) service, a
dynamic application security tool (DAST), for security penetration testing. By performing security
penetration testing, BMC can identify whether applications are vulnerable to web attacks and
implement the required countermeasures to reduce vulnerabilities.
As of June 08, 2016, BMC Remedy ITSM 9.1 (SP1) and BMC Remedy AR System 9.1.00.001 do
not have any security penetration vulnerabilities.
Note
For BMC Remedy ITSM 9.1 and BMC Remedy AR System 9.1, BMC schedules
automated security scans with WhiteHat Security that are run on the SaaS-based
WhiteHat Sentinel platform. Automated scans are augmented by manual penetration
tests performed by WhiteHat security experts. After the tests are completed, BMC
receives vulnerability assessment reports. For more information about WhiteHat Sentinel,
see https://www.whitehatsec.com/sentinel_services/benefits.html.
For BMC Remedy ITSM 9.1 (SP1) and BMC Remedy AR System 9.1.00.001, security penetration
tests were performed using a BMC Remedy OnDemand instance deployed in the following
environment:
WhiteHat Security employs the following types of tests during the security testing:
Authentication tests (brute force, insufficient authentication, weak password recovery, cross-
site request forgery, credential/session prediction, insufficient authorization, insufficient
session expiration, session fixation)
Client-side attack tests (content spoofing, cross-site scripting, HTTP response splitting)
Command execution tests (buffer overflow, format string attack, LDAP injection, OS
commanding, SQL injection, server-side include injection, XPath injection)
Information disclosure tests (directory indexing, information leakage, path traversal,
predictable resource location)
Logical attack tests (abuse of functionality, denial of service, insufficient anti-automation,
insufficient process validation)
For more information about WhiteHat Security, see the website security statement for WhiteHat
Security.
Injection flaws
Buffer overflow
Insecure Cryptographic Storage
Insecure Communications
Improper Error Handling
Cross Site Scripting
Improper Access Control
Cross Site Request Forgery
Broken Authentication and Session Management
Whitehat reports
For more information about the WhiteHat Sentinel PE tests that were used and the results, which
are zero technical and business logic vulnerabilities, see the following reports:
BMC and Whitehat Security are continually running tests as BMC augments the environment or
adds new security tests.
Test environment
Component Server specifications VM Operating system
used?
Configuring Apache Tomcat settings to disable directory listings (see page 254)
Creating an SSL profile on the reverse proxy to disable RC4 ciphers (see page 255)
Restricting attachments by using Attachment Security (see page 255)
Enforcing the default password policy in BMC Remedy AR System (see page 256)
F5 Load Balancer hotfix (see page 256)
BMC Remedy Mid Tier security settings (see page 256)
Enabling secure cookie in BMC Remedy SSO (see page 258)
When you disable the directory listings, you will also disable online help. To enable online help:
1. Install a separate Tomcat instance on a different port on the BMC Remedy Mid
Tier computer.
2. Install online help in the Tomcat container in the Root folder of the Tomcat instance.
3. Log on to BMC Remedy Mid Tier as an administrator and open the SHARE:
Application_Properties Form.
4. Search for Property Name = Help File Path.
5. Update the Property Value for all search result entries to point to the new online Help URL
with the correct port number.
If you are using a reverse proxy (load balancer), further changes may be required
to allow access to the new online help URL.
The following procedure is specific to how BMC Remedy OnDemand uses SSL. An on-
premise installation requires changes to the Apache Tomcat configuration to disable the
RC4 ciphers.
1. Log on to the Configuration utility for the reverse proxy (load balancer).
2. Click Local Traffic.
3. Click Profiles.
4. From the SSL menu, select Client.
5. Click Create.
6. Type a name for the SSL profile.
7. From the Parent Profile menu, select clientssl.
8. From the Configuration menu, select Advanced.
9. Click the Custom box for Ciphers.
10. In the Ciphers box, enter the following string:
DEFAULT:!SSLV3:!RC4
11. Click Finished.
12. Associate the SSL profile with the virtual server.
.txt
.png
.jpg
To restrict attachments, BMC used the following procedure to make the changes to the Attachment
Security tab of the AR System Administration: Server Information form:
3.
BMC Remedy Action Request System 9.1 Page 255 of 4703
BMC Software Confidential. BladeLogic Confidential.
3. Click Apply.
For additional information about how to restrict attachments, see Setting security restrictions on file
uploads (see page 349).
The following image shows the changes made to the Attachment Security tab.
Parameter Setting
Parameter Setting
arsystem.plugin_securitycheck=true
<filter>
<filter-name>SecureCookieFilter</filter-name>
<filterclass>com.remedy.arsys.stubs.SecureCookieFilter</fliter-
class>
</filter>
<filter-mapping>
<filter-name>SecureCookieFilter</filter-name>
<url-pattern>/*</url-pattern>
</filter-mapping>
<filter>
<filter-name>XSSFILTER</filter-name>
<filter-class>com.remedy.arsys.stubs.XSSFilter</filter-class>
</filter>
<filter-mapping>
<filter-name>XSSFILTER</filter-name>
<url-pattern>/plugins/*</url-pattern>
</filter-mapping>
<filter-mapping>
<filter-name>XSSFILTER</filter-name>
<url-pattern>/pluginsignal/*</url-pattern>
</filter-mapping>
<filter-mapping>
<filter-name>CLICKJACKFILTER</filter-name>
<url-pattern>/*</url-pattern>
</filter-mapping>
Parameter Setting
<filter>
<filter-name>HEADERVALIDFILTER</filter-name>
<filter-class>com.remedy.arsys.stubs.HeaderValidFilter</filter-
class>
</filter>
<filter-mapping>
<filter-name>HEADERVALIDFILTER</filter-name>
<url-pattern>/*</url-pattern>
</filter-mapping>
1. Navigate to BMC Remedy SSO admin console > General > Advanced.
For more information, see Configuring server settings for BMC Remedy SSO (see page 702).
BMC Remedy AR System 9.1 Service Pack 2 (SP2) and BMC Remedy IT Service Management
(ITSM) 9.1 SP2 use the WhiteHat Sentinel Premium Edition (WhiteHat Sentinel PE) service, a
dynamic application security tool (DAST), for security penetration testing. By performing security
penetration testing, BMC can identify whether applications are vulnerable to web attacks and
implement the required countermeasures to reduce vulnerabilities.
As of November 16, 2016, BMC Remedy AR System 9.1 SP2 and BMC Remedy ITSM 9.1 SP2 do
not have any security penetration vulnerabilities.
Note
For BMC Remedy ITSM 9.1 and BMC Remedy AR System 9.1, BMC schedules
automated security scans with WhiteHat Security that are run on the SaaS-based
WhiteHat Sentinel platform. Automated scans are augmented by manual penetration
tests performed by WhiteHat security experts. After the tests are completed, BMC
receives vulnerability assessment reports. For more information about WhiteHat Sentinel,
see https://www.whitehatsec.com/sentinel_services/benefits.html.
For BMC Remedy AR System 9.1 SP2 and BMC Remedy ITSM 9.1 SP2, security penetration tests
were performed using a BMC Remedy OnDemand instance deployed in the following environment:
WhiteHat Security employs the following types of tests during the security testing:
Authentication tests (brute force, insufficient authentication, weak password recovery, cross-
site request forgery, credential/session prediction, insufficient authorization, insufficient
session expiration, session fixation)
Client-side attack tests (content spoofing, cross-site scripting, HTTP response splitting)
Command execution tests (buffer overflow, format string attack, LDAP injection, OS
commanding, SQL injection, server-side include injection, XPath injection)
Information disclosure tests (directory indexing, information leakage, path traversal,
predictable resource location)
Logical attack tests (abuse of functionality, denial of service, insufficient anti-automation,
insufficient process validation)
For more information about WhiteHat Security, see the website security statement for WhiteHat
Security.
Injection flaws
Buffer overflow
Insecure Cryptographic Storage
Insecure Communications
Improper Error Handling
Cross Site Scripting
Improper Access Control
Cross Site Request Forgery
Broken Authentication and Session Management
Whitehat reports
For more information about the WhiteHat Sentinel PE tests that were used and the results, which
are zero technical and business logic vulnerabilities, see the following reports:
BMC and Whitehat Security are continually running tests as BMC augments the environment or
adds new security tests.
Test environment
Component Server specifications VM Operating system
used?
BMC Remedy Mid Tier 9.1.02 Yes CentOS release 7.5 (Final)
2 CPUs (Intel® Xeon® CPU E7 4870 @
2.40 GHz)
8 GB RAM
25 GB drive for BMC Remedy
applications
15 GB drive for paging
Configuring Apache Tomcat settings to disable directory listings (see page 261)
Creating an SSL profile on the reverse proxy to disable RC4 ciphers (see page 262)
Restricting attachments by using Attachment Security (see page 262)
Enforcing the default password policy in BMC Remedy AR System (see page 263)
Configuring the password lockout policy in BMC Remedy AR System (see page 263)
F5 Load Balancer hotfix (see page 264)
BMC Remedy Mid Tier security settings (see page 264)
Enabling secure cookie in BMC Remedy SSO (see page 266)
When you disable the directory listings, you will also disable online help. To enable online help:
1. Install a separate Tomcat instance on a different port on the BMC Remedy Mid
Tier computer.
2. Install online help in the Tomcat container in the Root folder of the Tomcat instance.
3. Log on to BMC Remedy Mid Tier as an administrator and open the SHARE:
Application_Properties Form.
4.
BMC Remedy Action Request System 9.1 Page 261 of 4703
BMC Software Confidential. BladeLogic Confidential.
If you are using a reverse proxy (load balancer), further changes may be required
to allow access to the new online help URL.
The following procedure is specific to how BMC Remedy OnDemand uses SSL. An on-
premise installation requires changes to the Apache Tomcat configuration to disable the
RC4 ciphers.
1. Log on to the Configuration utility for the reverse proxy (load balancer).
2. Click Local Traffic.
3. Click Profiles.
4. From the SSL menu, select Client.
5. Click Create.
6. Type a name for the SSL profile.
7. From the Parent Profile menu, select clientssl.
8. From the Configuration menu, select Advanced.
9. Click the Custom box for Ciphers.
10. In the Ciphers box, enter the following string:
DEFAULT:!SSLV3:!RC4
11. Click Finished.
12. Associate the SSL profile with the virtual server.
.txt
.png
.jpg
To restrict attachments, BMC used the following procedure to make the changes to the Attachment
Security tab of the AR System Administration: Server Information form:
For additional information about how to restrict attachments, see Setting security restrictions on file
uploads (see page 349).
The following image shows the changes made to the Attachment Security tab.
Parameter Setting
arsystem.plugin_securitycheck=true
<filter>
<filter-name>SecureCookieFilter</filter-name>
<filterclass>com.remedy.arsys.stubs.SecureCookieFilter</fliter-
class>
</filter>
<filter-mapping>
<filter-name>SecureCookieFilter</filter-name>
<url-pattern>/*</url-pattern>
</filter-mapping>
Parameter Setting
<filter>
<filter-name>XSSFILTER</filter-name>
<filter-class>com.remedy.arsys.stubs.XSSFilter</filter-class>
</filter>
<filter-mapping>
<filter-name>XSSFILTER</filter-name>
<url-pattern>/plugins/*</url-pattern>
</filter-mapping>
<filter-mapping>
<filter-name>XSSFILTER</filter-name>
<url-pattern>/pluginsignal/*</url-pattern>
</filter-mapping>
<filter-mapping>
<filter-name>CLICKJACKFILTER</filter-name>
<url-pattern>/*</url-pattern>
</filter-mapping>
<filter>
<filter-name>HEADERVALIDFILTER</filter-name>
<filter-class>com.remedy.arsys.stubs.HeaderValidFilter</filter-
class>
</filter>
<filter-mapping>
<filter-name>HEADERVALIDFILTER</filter-name>
<url-pattern>/*</url-pattern>
</filter-mapping>
Parameter Setting
<filter>
<filter-name>HSTSFilter</filter-name>
<filter-class>com.remedy.arsys.support.HSTSFilter</filter-class>
<init-param>
<param-name>hsts-MaxAgeSeconds</param-name>
<param-value>31536000</param-value>
</init-param>
</filter>
<filter-mapping>
<filter-name>HSTSFilter</filter-name>
<url-pattern>/*</url-pattern>
</filter-mapping>
1. Navigate to BMC Remedy SSO admin console > General > Advanced.
For more information, see Configuring server settings for BMC Remedy SSO (see page 702).
AR System web services implementation is based on SOAP 1.1 and WSDL 1.1
specifications from W3C. SOAP 1.2 is supported for consuming web services only.
Use HTTP 1.1. (HTTP 1.0 is not supported.) Ensure that your browser uses HTTP 1.1 so
that the mid tier can take advantage of data compression, persistent connection, and chunk
transfer.
BMC supports any SSL version that is supported by each HTTP web server vendor listed on
the compatibility matrix.
The mid tier supports 32-bit and 64-bit version of Java runtime environment.
The following table lists standards supported by recent versions of the mid tier. See the
Compatibility matrix in the BMC Remedy ITSM Deployment online documentation for potential
incompatibilities.
BMC Remedy Action Request System supports Internet Protocol version 6 (IPv6) network
addresses. You can deploy BMC Remedy AR System servers in an IPv6 configured network and
make them accessible to clients on IPv4, IPv6, or both IPv4 and IPv6 (dual stack) configured hosts.
IPv6 is an internet protocol that replaces IPv4. It expands the IP address space from 32-bit to 128-
bit to significantly increase the number of available IP addresses. To comply with a United States
of America federal mandate, the software products of government vendors must support operation
on IPv6 networks.
Note
For Windows 2008 and earlier, all 32-bit versions support only IPv4.
Oracle 11g R2
Microsoft SQL Server 2008
http://[2001:db8:123:1234:a12:1b23:4c56:d7e8]:8080/arsys/forms/<ARSystemServer>
/<formName>
For more information about using URLs to open forms, see URLs for opening forms and
applications (see page 2856).
Installing
For the latest installation information, see BMC Remedy ITSM 9.1 Deployment online
documentation .
Note
BMC supports only BMC Remedy Single Sign-On with BMC Remedy Action Request
System 9.1. Note that BMC Atrium Single Sign-On is not supported.
The following table describes the contents of the different branches in this online documentation.
Branch Description
Planning the This section describes the deployment scenarios for the following new components:
deployment
Click here for a list of topics in this section
Preparing This section provides information about the preparation you must do before installing or upgrading any
component of the BMC Remedy ITSM Suite.
Installing This section provides information about the steps for performing a fresh installation.
Upgrading This section provides information about the steps for performing an upgrade.
Branch Description
Troubleshooting This section provides information about troubleshooting the issues specific to install or upgrade.
Goal Instructions
Setting up a server group to provide fail-over protection Configuring server groups (see
page 375)
Presenting application data and interacting with the user BMC Remedy Mid Tier
by using the BMC Remedy Mid Tier configuration (see page 426)
Using a hardware load balancer to improve the scalability Configuring a hardware load
and availability of the BMC Remedy AR System balancer with BMC Remedy
AR System (see page 524)
Monitor BMC Remedy AR System using the BMC BMC Remedy SNMP Agent
Remedy SNMP Agent configuration (see page 551)
Configuring BMC Remedy AR System web and crystal Configuring reporting (see
reports for the end users page 594)
Creating and configuring BMC Remedy Email Engine Configuring BMC Remedy
mailboxes and setting security options Email Engine (see page 633)
Goal Instructions
Learn about the storage and performance impacts of Using Oracle CLOBs with BMC
using Oracle character large object (CLOB) storage in a Remedy AR System (see page
database table 726)
BMC Remedy Data Import Starting Data Import and logging on to AR System servers (see page 1908)
BMC Remedy Developer Studio Starting and logging on to BMC Remedy Developer Studio (see page 2197)
BMC Remedy Migrator Logging on to an AR System server using BMC Remedy Migrator (see page 1998)
BMC Remedy Mid Tier Logging on to the Mid Tier Configuration Tool (see page 460)
BMC Remedy Mid Tier URLs for opening forms and applications (see page 2856)
Note
Modify the wait cursor for actions when customizing views for forms (see page 2998) or turn
off the wait cursor (see page 3000).
Set up a mid tier server to use cache table statistics (see page 475).
Enable the HTTP TRACE function to return HTTP header information (see page 3172).
Adding licenses
To add licenses to a BMC Remedy AR System server, you can enter them into a form or import
them from a file. Licenses are active as soon as they are added to the server.
1. In the AR System Administration Console, click System > General > Add or Remove
Licenses.
2. In the Add or Remove Licenses form, click Add New.
3. In the fields under the table, enter the following information:
License From the list, select the type of license to activate. You can also enter a custom license type that is not in
Type the list.
Note: You can add only one entry for each license type except server licenses (multiple server licenses are
distinguished from each other by license keys). To increase or decrease the number of licenses available
for other license types, modify the existing entry.
Field Description
Number For the specified license type, enter the appropriate number of licenses.
of Server, server option, and application licenses
Licenses 0 indicates the license is inactive.
1 indicates the license is active.
User licenses
0 indicates the license is inactive.
Any number greater than 0 indicates the maximum number of licenses available for use.
Key (Server licenses only) Enter the appropriate license key in this field. To get a key, see Obtaining BMC
Remedy license keys in BMC Remedy ITSM Deployment documentation.
Note: Do not enter a 6.0-7.0.x key in this field. Instead, import it from a .lic file. See Importing licenses.
Expiration For trial licenses, enter the date after which the license is no longer in effect. (In BMC Remedy AR System
Date 7.1.00 and later, only trial licenses expire.)
4. Click Save.
Removing licenses
To remove a BMC Remedy AR System license from a server, follow this procedure:
1. In the AR System Administration Console, click System > General > Add or Remove
Licenses.
2. In the table at the top of the form, select the license to remove.
3. Do one of the following:
Click Delete, and then click OK in the confirmation message.
4. Set the Number of Licenses field to 0, and then click Save.
Note
Related Topics
Exporting licenses
You can export license information in the Add or Remove Licenses form to a .lic file to create a
backup copy. You must export all the licenses, you cannot select specific licenses to export.
1. In the AR System Administration Console, click System > General > Add or Remove
Licenses.
2. Click Export Licenses to File.
3. In the Save Attachment dialog box, navigate to the directory in which to save the . lic file.
4. In the File name field, enter a name for the license file or accept the default (arsystem.lic).
5. Click Save.
Importing licenses
To import licenses from BMC Remedy AR System 7.x or 6.x. lic files into a BMC Remedy AR
System 7.1.00 or later server, use this procedure.
Notes
Except for AR Server licenses, license keys are not imported. In addition, expired
licenses are not imported.
In BMC Remedy AR System 7.1.00 or later, dedicated server licenses -provided for
common components such as the BMC Atrium Definitive Software Library or CMDB- are
not used. If you had a dedicated server license in a previous release, it is upgraded at no
cost to a full AR Server license when you import your licenses. In addition, licenses for
any applications associated with the dedicated server are automatically added to your
system.
1. In the AR System Administration Console, click System > General > Add or Remove
Licenses.
2. Click Import Licenses from File.
3. In the Add Attachment dialog box, navigate to the location of the license (.lic) file to import.
4. Select the file name to add it to the File name field.
5. Click Open.
6. When asked "Do you want to overwrite any matching licenses?," click one of these buttons:
No — Merges the contents of the .licfile with the contents of the Add or Remove
Licenses form as follows:
When the form and the .lic file contain a matching license type, the entries for
that type are not imported from the .lic file.
Example
If the form has an entry for five AR User Fixed licenses and the .lic file
has an entry for three AR User Fixed licenses and another entry for four
AR User Fixed licenses, the form retains its entry, and neither entry is
imported from the .lic file.
When the .lic file contains multiple entries for a particular license type and the
form contains no matching entry, all entries in the file are imported into the
form and merged into one entry.
Example
If the form has no entries for AR User Fixed licenses and the .lic file has
an entry for three AR User Fixed licenses plus another entry for four AR
User Fixed licenses, the two entries in the .lic file are merged into one
entry in the form. The new entry in the form is for seven AR User Fixed
licenses.
Yes — Clears the contents of the form and replaces it with the contents of the .lic file.
Multiple entries in the file for the same license type are merged into one entry in the
form.
Warning
Select Yes only to update all your licenses. This option deletes all
information from the form. To replace deleted information, you must reenter
it. See Adding licenses (see page ).
Related Topics
Field Description
Group ID ID of the pool that the license belongs to (applies only to floating licenses)
Note
When BMC Remedy AR System starts recording data in this form, it creates records for every license in
use. Those records include the time that each license was acquired (or consumed), not the time that
recording started. For example, if a user acquires license A at 10:15 A.M. and BMC Remedy AR System
starts recording data in this form at 10:30 A.M., the Time Acquired for license A is 10:15 A.M.
Field Description
To get a report about license usage, see Generating a license usage report (see page 283). You
can also get information about what type of license a user has by searching the user form.
Note
To record information in this form, you must turn on the Enable License Tracking option.
See Recording data in the license usage forms (see page 280).
Field Description
User Name Name of the user who acquired and released the license
Group ID ID of the pool that the license belongs to. Applies only to floating licenses
Note: AR System Historical License Usage form tracks only fixed and floating licenses.
Total Use Time The total amount of time in seconds that the license was in use
Note
To record information in this form, you must turn on the Enable License Tracking option.
See Recording data in the license usage forms (see page 280).
AR System Current License Usage and AR System Historical License Usage forms track
only fixed and floating licenses.
1. In the AR System Administration Console, click System > General > Server Information.
2. On the Configuration tab, select the Enable License Tracking option.
3. Save your changes.
BMC Remedy AR System immediately starts recording data in the license usage forms. You
do not need to restart the AR System server.
All data in the AR System Current License Usage form is lost when
If the user acquires another license of the same type on another server in the group without
releasing the first license, the second license is recorded as another subrecord of the main record.
The same is true of all additional licenses of that type acquired while the main record has at least
one subrecord.
When the user logs out of the sessions from a server by releasing one of his licenses, its
subrecord for the license is deleted. When the last subrecord is deleted, it indicates that the user
has logged out and released all the licenses from the server, the main record is also deleted and
an entry for the entire session tracked by the main record is added to the AR System Historical
License Usage form.
Related Topics
Note
If you have more than one AR System server, regardless of their starting or restarting
time, the logging time stamp is synchronized across the servers and the required
information is logged in the file at the same time.
In this topic:
For BMC Remedy AR System and application user fixed licenses, the greatest number of
licenses assigned at the same time during the period covered by the report
For BMC Remedy AR System and application user floating licenses, the greatest number of
licenses in use at the same time during the period covered by the report
For each type of license, the maximum limit specified in the Add or Remove Licenses form
For BMC Remedy AR System and application server group licenses, the usage of licenses
across the entire server group, including the individual server against which the report is run
Note
Although all servers in a server group use licenses from the same Add or Remove
Licenses form, each server in a group generates its own LicenseReport.txt file.
For BMC Remedy AR System and application server group licenses, the server group name
and the host ID
The report is written to a file named ReportResult.csv. You can generate it from the Administration
Console.
1. In the AR System Administration Console, click System > General > Add or Remove
Licenses.
2. In the Add or Remove Licenses form, click Generate License Usage Report.
3. Click the calendar icon next to the License Report Start Date field, and select a date from
the calendar.
The start time is 12:00:00 A.M. on the specified date.
4. Click the calendar icon next to the License Report End Date field, and select a date from the
calendar.
The end time is 11:59:59 P.M. on the specified date.
Note
- If the selected start or end date exceeds the time period covered by the server,
the first or last date covered by the server is used instead. The time period covered
by the report is specified in the report header.
- Make sure that the time zone for BMC Remedy Mid Tier and BMC Remedy AR
System server is same, to map the start and the end date requested while
generating the License Usage Report. If the time zone for BMC Remedy Mid Tier
and BMC Remedy AR System server is different, the time zone for BMC Remedy
AR system server is considered.
Note
You can also use the produse.exe utility to generate a license usage report. See
Generating a license usage report (see page 283).
Related Topics
Displaying and Tracking server group license usage (see page 278)
Generating a license usage report (see page 283)
Note
Although all servers in a server group use licenses from the same Add or Remove
Licenses form, each server in a group generates its own LicenseReport.txt file.
Important
produse [-i <inputFilePath>] [-o <outputFilePath>] [-s <startDate>] [-e <endDate>] [-r]
Where
-i Specifies the full or relative path to the input file. By default, the input file is LicenseReport.txt and is in this directory:
(UNIX) ARSystemServerInstallDir/Db
(Windows) ARSystemServerInstallDir/ARServer/Db
If this parameter is not specified, the current directory and the LicenseReport.txt file name are used.
- Specifies the full or relative path to the output file. By default, the output file name is ReportResult.csv and is in this directory:
o
(UNIX) ARSystemServerInstallDir/Db
(Windows) ARSystemServerInstallDir/ARServer/Db
To rename it, specify a different file name. If this parameter is not specified, the current directory and the ReportResult.
csv file name are used.
- Specifies the start date of the report in D/M/YYYY format. The start time is 12:00 A.M. on the specified date. If this parameter
s is not specified, the report includes data from the beginning of the LicenseReport.txt file. If this parameter exceeds the range
covered by the LicenseReport.txt file, the range covered by the file is used instead, and that range is indicated in the report
header.
- Specifies the end date of the report in D/M/YYYY format. The end time is 12:00 P.M. on the specified date. If this parameter
e is not specified, the report includes data to the end of the LicenseReport.txt file. If this parameter exceeds the range covered
by the LicenseReport.txt file, the range covered by the file is used instead, and that range is indicated in the report header.
- Backs up the current LicenseReport.txt file by renaming it LicenseReport- fileCreateDate- currentDate.txt and generating a
r new LicenseReport.txt file.
Note
You can also generate a license usage report from the Administration Console. See
Reviewing license usage (see page 282).
Related Topics
Displaying and Tracking server group license usage (see page 278)
Reviewing license usage (see page 281)
All other license types, such as all types of Fixed and Floating user licenses and application
licenses, are stored in the database and are therefore shared by all servers in the server group.
You can add these other product licenses at any time. However, for all AR System servers, except
the first server, the license must be added prior to installing the server.
Related Topics
Use the AR System Administration: Server Information form from the BMC Remedy AR System
Administration Console to display information about the selected server and to set server options.
You must be an administrator to make changes.
For more information about the BMC Remedy AR System Administration Console, see Navigating
the BMC Remedy AR System Administration console interface (see page 1048).
The following table lists the tabs in the AR System Administration: Server Information form. The
information provided in each tab is described in the sections that follow.
Advanced Sets parameters related to AR System efficiency, security, and localization. Setting performance and
security options (see page )
Always On Configures the options for Always On Logging feature. Setting Always On logging (see
Logging page 371)
Connection Enables you to configure passwords used between the AR System server and Setting server passwords, RPC
Settings its external subsystems. options, and plug-in timeouts
(see page )
Currency Specifies currency types available in AR System. Setting currency types (see
Types page )
Database Displays information about the database that the selected server Setting database options (see
communicates with. You also define a database password and configuration page )
file location in this tab.
Encryption Enables you to view and modify your AR System server's encryption Activating and deactivating
configuration. encryption security (see page
697)
Full Text Configures full text search (FTS) options. Configuring Full Text Search
Search (see page 578)
Licenses Displays the type and number of BMC Remedy AR System licenses on a Setting license options (see
server. You also set the Submitter Mode in this tab. page )
Log Files Enables the logging for various log files. You also set the log level in this tab. Setting log files options (see
page )
Log Filtering Enables you to apply restrictions on the AR System server logging, based on Configuring AR System server
one or more parameters. logging (see page 4226)
Platform Displays information about the platform on which the selected server is Setting platform options (see
running. page )
Ports and Configures BMC Remedy AR System to communicate with client tools,
Queues services, and other servers on the network. Displays information relevant to the Setting ports and RPC
user of the multiple threads in the AR System server. numbers (see page )
Configuring a server for
alerts (see page 290)
Server Sets the options for logging internal server changes. Setting server logging options
Events (see page )
Timeouts Sets various timeouts for the selected server. Setting timeout options (see
page )
Version Sets source control integration within BMC Remedy AR System. Setting version control options
Control (see page )
WS Registry Enables the use of the AR System Web Service Registry form by configuring a Setting a connection to the
Integration connection to a BMC Atrium Web Services Registry. Also provides a button to BMC Atrium Web Services
update the registry. Registry (see page 296)
Atrium SSO Enables the integration of the AR System server with the Atrium SSO server for Setting a connection to the
Integration the purpose of single-sign on. BMC Atrium SSO server (see
page 296)
Server Sets parameters related to server statistics. Setting server statistics options
Statistics (see page 354)
Attachment Enables you to restrict users from uploading and viewing files with certain Setting security restrictions on
Security extensions in BMC Remedy Mid Tier. file uploads (see page 349)
Call Home Allows you to share information related to product versions and server plug in Using the Call Home
configurations. Call Home also tracks the sequence of BMC Remedy AR functionality
System upgrade and the related upgrade activities.
You also need to perform the following tasks while configuring AR System servers:
Note
For information about the mid tier and BMC Remedy Mid Tier Configuration Tool, see
Accessing the Mid Tier Configuration Tool (see page 460).
Important
The specifics of your firewall configuration vary from manufacturer to manufacturer. Ask
the network and security professionals at your company for more information.
For more information about TCP port numbers, see Assigning TCP port numbers to AR System
servers (see page 303).
Port 111 is used for Portmapper, and this port can be blocked for requests coming through the
firewall. Internal requests are affected by this rule because Register-With-Portmapper: T is the
default configuration setting of the portmapper. See the discussion in Configuring a server to use
plug-ins (see page ).
In the following figure, the BMC mid tier client connects to a specific port of the AR System server.
When the user makes a request of the AR System server, the response is returned on the same
TCP connection that makes the request. For more information about setting ports, see Setting
ports and RPC numbers (see page ).
To enable these connections through the firewall, the AR System server and the client must be
configured to communicate on the proper ports:
AR System server — The AR System administrator assigns a specific port number in the
Server TCP/IP Port box as described in Assigning TCP port numbers to AR System servers
(see page 303).
Client — In the browser, the administrator or user configures the Advanced Server
Properties in the Accounts dialog box as described in Configuring clients for AR System
servers (see page ). In BMC Remedy Developer Studio, the administrator configures the
Server List accessed from the Login window. This informs the clients of the location on the
firewall through which they can connect to AR System servers.
Tip
When a firewall or a load balancer exists between clients and BMC Remedy AR System
server, you must set the TCP "keep alive" value properly. The operating system of the
host BMC Remedy AR System server maintains the keep-alive socket (not the
client). Make sure that the keep-alive value on the firewall or load balancer is at least as
long as or longer than the keep-alive value on the largest host server of all BMC Remedy
AR System servers connected to the firewall or load balancer.
Example
Many configurations of Windows require you to remove all DNS servers when running as a
stand-alone server. This avoids long pauses caused by the Windows networking software
trying to communicate with the network during BMC Remedy AR System interaction. Write
down what you removed so that you can add it back when reconnecting to the network.
3. Save the file.
4. Shut down and restart the system.
The earlier Notification Server command-line configuration options are not available in BMC
Remedy AR System 5.0 or later.
1. In a browser, open the AR System Administration Console, and click System > General >
Server Information.
The AR System Administration: Server Information form appears.
2. Click the Server Ports and Queues tab, and perform the following steps:
a. In the Alert Outbound Port field, enter the port number that the server uses when
sending alerts. If you enter 0, the server uses random port selection.
b. Configure the Alert queue, and adjust the minimum and maximum threads. For more
information, see Setting ports and RPC numbers (see page ).
3. Click the Timeouts tab, and in the Alert Send Timeout (seconds) field, enter the number of
seconds the server must wait during connection attempts before timing out.
4. Click the Configuration tab, and perform the following steps:
a. Select the Verify Alert Users check box to have the server verify at boot-up time that
each of the users it thinks is registered is still running and listening for alert
messages.
b. Select the Disable Alerts check box so that the server does not send alert messages
when alert events are entered into the system.
5. Click OK to close the form.
6. If you want the server to translate IP addresses before sending alert messages to users, edit
the Map-IP-Address option in the AR System Administration: AR System Configuration
Generic UI form, see
Map-IP-Address in Configuration settings E-M (see page 1197).
To the operating system (UNIX only) — The AR System server authenticates to the
operating system. The authentication string has no effect when authenticating to a UNIX
operating system.
To the server domain (Windows) — The AR System server authenticates to the Windows
server domain. If a value is entered in the Authentication String field, that value is used as
the domain name to which the AR System server authenticates.
To the AREA service — If you have configured external authentication to an AREA service,
the user name, password, and authentication values entered are provided to the AREA
service.
Note
Two of these authentication methods use the authentication string described in Login and
session information (see page 3448). See also Setting up an authentication alias (see
page 1318).
Before configuring external authentication for an AREA service, you must configure your server to
use plug-ins (see Configuring a server to use plug-ins (see page )). You must also start the
plug-in server (see AR System server components and external utilities (see page 1121)).
After the service is started, set up the server for external authentication as described in the
following procedure.
1. In a browser, open the AR System Administration Console, and click System > General >
Server Information.
2. In the AR System Administration: Server Information form, click the EA tab.
3. To enable authentication using an AREA service, set the External Authentication Server
RPC Program Number to 390695.
Entering 390695 enables authentication using an AREA service. Entering no value or 0
disables authentication using an AREA service.
If you enter 0, the AR System server makes no attempt to communicate with the AREA
server.
4. Set the RPC and SYNC time-outs for External Authentication.
External Authentication Timeout (seconds)is the amount of time within which the AREA
server must respond to a call from the Plug-in server before an error is returned. The
options are
RPC — Used when making calls to the AREA server
If set to 0, the AR System server does not invoke the call to the external
authentication server. The default is 40 seconds.
Need To Sync — The interval for periodically invoking the AREA server's
AREANeedToSyncCallback() call. If set to 0, the AR System server does not invoke
the call to the external authentication server. The default is 300 seconds.
5. Select one or both of the following settings:
Authenticate Unregistered Users — Specifies that all users in the User form can log
on and be authenticated internally; users not in the form are authenticated externally.
If this option is cleared, AR System stops the validation process and manages the
user as a guest user.
Cross Ref Blank Password — Specifies that all users in the User form can log on and
be authenticated externally if the Password field in the form is left blank for that user.
If Cross Ref Blank Password is cleared, a blank Password field in the User form is
treated as no password for that user, and that user is allowed to log on.
6. Optionally, specify an authentication chaining mode.
Authentication chaining modes
Mode Description
ARS - AREA BMC Remedy AR System tries to authenticate the user by using the User form and then the AREA plug-
in.
AREA - ARS BMC Remedy AR System tries to authenticate the user by using the AREA plug-in and then the User
form.
ARS - OS - BMC Remedy AR System tries to authenticate the user by using the User form, then Windows or UNIX
AREA authentication, and then the AREA plug-in.
ARS - AREA BMC Remedy AR System tries to authenticate the user by using the User form, then the AREA plug-in,
- OS and then Windows or UNIX authentication.
Tip
For maximum benefit, use Ignore Excess Groups and Group Mapping
together.
BMC Remedy AR System supports the plug-in server and API, but if you have problems with a
specific plug-in (plug-in which is not provided by BMC), contact the plug-in service provider for
assistance.
For more information about creating ARDBC, AREA, or ARF plug-ins, see Enabling Plug-ins (see
page 747).
1. Modify these settings in the ar.cfg file (Windows) or ar.conf file (UNIX):
Plugin (see page )
Number of threads, for example:
Plugin-ARDBC-Threads (see page )
Plugin-AREA-Threads (see page )
Plugin-Filter-API-Threads (see page )
Plugin-Log-Level (see page )
Plugin-Port (see page )
Server-Plugin-Alias (see page )
Server-Plugin-Default-Timeout (see page )
2. Modify the plug-in target password (Configuring server groups (see page )).
3. Modify the plug-in log file settings (Setting log files options (see page )).
Related topic:
ar.cfg or ar.conf (see page 1059)
1. In a browser, open the AR System Administration Console, and click System > General >
Server Information.
The AR System Administration: Server Information form appears.
2. Click the Version Control tab.
Object Selecting Enforced causes the server to require object reservation. See Using object reservation (see
Reservation page 2262).
Note
If you are logged in to the server in BMC Remedy Developer Studio when you enable object
reservation, you must log on again before you can reserve objects.
See To give sub-administrators access to an AR System server with object reservation enforced (see
page 294).
Object Selecting Enabled causes the server to log every change to objects. See Using the object modification
Modification log (see page 2264).
Log
Save Selecting Yes causes the server to write a definition file each time an object is created or changed. This
Definition option is available only when the object modification log is enabled.
Files
2.
BMC Remedy Action Request System 9.1 Page 294 of 4703
BMC Software Confidential. BladeLogic Confidential.
2. Grant the group Hidden permission (not sub-administrator permission) to the AR System
Version Control: Object Reservation form. A user must have access to this form to connect
to a server using BMC Remedy Developer Studio.
To set timeouts
1. In a browser, open the AR System Administration Console, and click System > General >
Server Information.
The AR System Administration: Server Information form appears.
2. Click the Timeouts tab.
Process Prevents a server from being blocked when a process requested in a Set Fields filter or
Timeout escalation action does not return a value soon enough.
(seconds) The server waits a specified interval and then returns a $NULL$ value even if the process is
incomplete. The default is 5 seconds. The minimum is 1, and the maximum is 60. Specifying
long intervals can increase the response time for users.
Alert API Sets the time limit for making contact with alert clients.
Send Two attempts are made to deliver an alert and if the second attempt fails, the alert registration is
Timeout removed. The default is 7 seconds.
(seconds)
Sets the time limit (in seconds) for the Filter API RPC to respond to the server's request.
The default is 40 seconds. The minimum is 1, and the maximum is 300.
Filter API
RPC
Timeout
(seconds)
Floating Write Sets a time limit for how long a floating license remains reserved if the user is not accessing AR
License System.
Timeout When a user is using a floating license, a license is reserved while the user is connected to the
(hours) server. If the user does not perform an AR System operation for the period of time specified in
this field, the license is automatically released back to the pool of available licenses. The client
tool must acquire a license for the user again when the next licensable operation occurs. The
default is 2 hours. The minimum is 1, and the maximum is 99.
Currency Client Sets the interval (in minutes) that clients (for example, the Web) use when refreshing currency
Ratio Refresh conversion ratios stored on the server.
Cache Interval This refresh action makes sure that calculations for functional currencies are up to date.
Refresh
Interval
(minutes)
4. Click Apply.
For more information about the BMC Atrium Web Services Registry, see Web Services Registry
and web service registration.
1. In a browser, open the AR System Administration Console, and click System > General >
Server Information.
The AR System Administration: Server Information form appears.
2.
BMC Remedy Action Request System 9.1 Page 296 of 4703
BMC Software Confidential. BladeLogic Confidential.
Server Displays the version number of the BMC Remedy AR System software on the server.
Version This value corresponds to the $VERSION$ keyword.
Server Displays the folder (directory) where the AR System server is installed on the server system.
Directory
Operating Displays the operating system software version running on the server system.
System This value corresponds to the $OS$ keyword.
Server Displays the current time on the server (in the local time zone).
Time
4. Click Apply.
After being activated, logging starts immediately. You can activate logging at any time.
Warning
Do not keep logging turned on continuously. Log files can consume increasing amounts
of disk space as messages accumulate unless you limit the log file size. Monitor your disk
resources carefully while logging is active. After you activate logging for workflow objects,
logs are created for only those workflow objects that are processed after that activation.
(Windows) ARSystemInstallDir\Arserver\Db
(UNIX) ARSystemInstallDir/db
You can enter a different location. You can also specify the same location and file for multiple types
of logging so that all data is logged to a single file.
During server installation, all the predefined log forms are imported into ARSystemInstallDir\AR
SystemserverName\ARServer\SystemForms\en. The definition file names begin with LogForm.
They are treated as system forms and are recovered from this definition file whenever the AR
System server restarts.
Each supported log type has a separate form, and a common form (AR System Log: ALL)
accommodates all types of logging information. You can specify whether the information should be
logged to a specific form or the common form.
The log forms are identified with their reserved fields. This enables administrators to rename the
forms at any time using BMC Remedy Developer Studio. Request IDs can be used to sort the log
The following options in the AR System server configuration file help identify the forms to which
information is being logged:
Types of logs
The following table lists the types of logs you can create.
Types of logs
API Logs information about all API calls made by all clients. arapi.log AR
This information is logged on entry and exit of every API call. System
Log: API
Filter Logs information about filter activity for each operation. arfilter.log AR
This information includes the filters that tried to execute and all filter actions performed. System
Log: Filter
Thread Logs information about threads being started and restarted on the server. arthread. AR
log System
Log:
Thread
User Logs information about connection activity for each user. aruser. AR
This information includes whether the user can obtain a license and when each floating log System
license is released. This enables you to keep an audit trail of user activity to help you Log: User
determine whether you need more floating licenses.
Alert Logs detailed information about user registration and about the generation and delivery of aralert. AR
alerts. log System
Log: Alert
Full Text Logs information about full text search indexer activity. arftindx. AR
Index log System
Log: Full
Text Index
AR
System
Log:
Server
Group
DSO If you are licensed for Distributed Server Option (DSO), logs information about DSO server ardist.log No form is
activity. See BMC Remedy Distributed Server Option logging (see page 4243). created
for DSO.
Plug-In Logs the events of plug-ins that AR System uses. For more information about plug-ins, see arplugin. No form is
Server Enabling Plug-ins (see page 747). log created
for the
plug-in
server.
Archive Logs information about scheduled or on-demand archive by any user. For more ararchive. AR
Log information about archiving, see Archiving overview (see page 168). log System
Log:
Archive
1. In a browser, open the AR System Administration Console, and click System > General >
Server Information.
The AR System Administration: Server Information form appears.
2. Click the Log Files tab.
AR System Administration: Server Information form — Log Files tab
3. Select the check box next to each log that you want to create.
4. Select the type of log to create: File or Form.
Note
When the Form option is selected, various LogFiles.txt are created under the
ar_install_dir/bin directory on UNIX. Because this behavior is as designed, you
must provide read-write access to the ar_install_dir/bin directory to make sure that
this functionality works correctly.
5. In the Namefield, specify the full path to the log file or the name of the form.
Important
When naming log files, do not use special characters such as a forward slash or a
question mark. Use alphanumeric characters only.
6. To view a log file or form for any selected log, click View.
Log forms are opened in the Search mode.
7. Edit the other options, as needed:
Plugin Specifies the level of logging for the plug-in server. The options are
Log Level All — All log information. The default value is 100.
Finest — Code-level information. The default value is 400.
Finer — Logs tasks as they are executed within the system. The default value is 500.
Fine — Internal exceptions. The default value is 600.
Config — Configuration, status, severe, and warning messages. The default value is 700.
Info — Status, severe, and warning messages. The default value is 800.
Warning — Severe and warning messages. The default value is 900.
Severe — Only severe messages. The default value is 1000.
Off — None. The default value is 10000.
Client- Defines the group that can use logging options in AR System clients. Logging options are disabled for users
Side who are not members of this group. For more information about client logging, see Enabling logs (see page
Logging 4181).
Group
Maximum Defines the maximum size (in bytes) for the log file. A value of 0 (the default) specifies no limit. Except for 0,
Log-File the log file size cannot be set to less than 4096. When the log file reaches the maximum, new information
Size wraps to the top of the file, overwriting the old information. If you do not specify a maximum size limit, you
(byte) run the risk of running out of disk space on your system.
Maximum Defines the maximum number of backup (.bak) log files to be allowed when the log file reaches the
Backups Maximum Log-File Size value and a new log file is created. By default, the number of backup log files
allowed is 1, and the maximum number of backup log files allowed is 999.
Reload Enables JMX logging and third party loggers log level in logback_server.xml file without restarting the
Log Conf server.
File
Buffer Buffers logged lines instead of having them immediately written to disk. Selecting this option decreases the
Logged impact to AR System performance when logging is enabled. See Buffering log output (see page 4189).
Lines
Log Per Creates per-thread log files. Selecting this option decreases the impact to AR System performance when
Thread logging is enabled. See Thread log (see page 4265).
8. Click Apply.
When you select specific server events, those events are logged in to the Server Events form,
thereby making server-related changes available to workflow and API programs. For information
about the Server Events form, viewing recorded server events, and using server events in
workflow, see Capturing server events for workflow or API calls (see page 1799).
1. In a browser, open the AR System Administration Console, and click System > General >
Server Information.
The AR System Administration: Server Information form appears.
2. Click the Server Events tab.
Server Specifies the name of the form populated with information about specific server events. BMC
Events Remedy AR System automatically generates this form, and the form is defined from a unique
Form combination of BMC Remedy AR System reserved fields. Only one Server Events form per server
is allowed. The default name is Server Events; you can rename the form, as needed.
Server Server Determines the objects for which changes are recorded in the Server Events form. Select the
Event Cache check box next to any of the following events to log changes to these objects:
Type Changes Active Link
Container
Escalation
Field
Filter
Import
Form
View
User Determines whether to log additions, modifications, or deletions to Users or Groups in the User or
/Group Group form, or any user or group changes using the access control utilities arcache and arreload
Changes . Changes are recorded in the Server Events form.
Server Determines whether an entry is created in the Server Events form as a result of a ARSetServerInfo
Setting call.
Changes
Archive Determines whether an entry is created in the Server Events form as a result of archiving data to
an archive form.
Server Determines whether an entry is created in the Server Events form as a result of server group
Group activities.
Actions
4. Click Apply.
In this topic:
Clients must be configured with the server port number to enable server access without the use of
a portmapper. If you do not allow the server to register with a portmapper, you must assign a TCP
port number for the AR System server. For more information about configuring clients, see
Configuring clients for AR System servers (see page ).
Do not assign port numbers that conflict with port numbers used by other applications or programs
running on your system. If you assign conflicting port numbers, your servers might not start as
expected. To find out which port numbers are in use, enter one of the following commands at the
command-line prompt:
UNIX — rpcinfo -p
Windows — netstat -a
Ports 1-1024 are reserved ports; avoid using these ports. On UNIX, port numbers within the range
1-1024 are available only for the superuser, and many of these numbers are reserved.
1. In a browser, open the AR System Administration Console, and click System > General >
Server Information.
The AR System Administration: Server Information form appears.
2. Click the Ports and Queues tab.
Server TCP TCD-Specific- Defines the TCP/IP port number for the AR System server. Enables clients to have
/IP Port Port access to the server without a portmapper. When set to 0, which is the default, the
portmapper assigns the port.
Ensure that you set the same port number as the value of the server_port parameter
in the pluginsvr_config.xml file that is located in the <Install Dir>/pluginsvr directory.
Note
If you set the Server TCP/IP Port field to a value less than 1024, older clients
cannot connect.
Distributed Obsolete. See Assigning an RPC program number to DSO (see page 571).
Server
RPC
Program
Number
Number of Num- Defines the number of threads that can be used to monitor all live client socket
Selector selector- connections for IO activity. When the thread detects any activity, it forwards the call to the
Threads threads appropriate queue. The default value is 1.
JMX Port Jmx-port Defines the JMX port number that enables administrators to connect to JVM by using
Java Messaging Extensions (JMX). The default port number is 61500.
Message Default- The specific port to which the JMS broker binds when sending messages to registered
Broker Port messaging- clients. The default port number is 61617.
port
Cache Peer-listener- Defines the port number where all ehcache instances from different servers communicate
Peer port with each other. The default port number is 40001.
Listener
Port
Alert The specific TCP port to which the server binds when sending alert messages to
Outbound registered clients. If multiple alert threads are started, the number represents the starting
Port port number in a consecutive range of numbers available for the alert threads. If no port
number is specified or if 0 is entered, the portmapper randomly assigns an available port
to the server.
Plugin Plugin- Defines a private queue for all loopback calls from the plug-in server, regardless of which
Loopback Loopback- plug-in application initiates the call. For more information about Plugin Loopback RPC
RPC RPC-Socket Socket, see Private queues for loopback calls (see page 4202).
Program
Number
Register Register- Defines whether the AR System server and the plug-in server are registered with AR
with With- System Portmapper. If the check box is
Portmapper Portmapper Selected — They are registered. The server is registered if not previously
registered. AR System clients can get the port number of the AR System server
and the plug-in server from AR System Portmapper.
Cleared — They are not registered. If the server was previously registered, this
option removes the registration. AR System clients cannot get the port number of
the AR System server and the plug-in server from the portmapper.
If you are running multiple servers on a single computer, you can select the Register with
Portmapper option for one server only.
Server Private-RPC- Enables you to define server queues specific to your needs. For most types of server
Queue Socket queues, you can specify a minimum and maximum number of threads. For the escalation
queue, only the maximum threads number is used, and all threads are started at startup
time.
If you do not specify a fast or list queue or specify only one thread, three threads
are started to meet the minimum system requirements for each queue.
If the server starts more threads than specified to meet system requirements for
fast and list queues, it does not change the number specified.
For all other types, if you do not specify a number, the system defaults to one
minimum and one maximum thread per server queue.
For more information, see Defining queues and configuring threads (see page 328).
Client Enables you to direct all API calls from a given client type to a private queue.
Type to Add Client RPC Mapping allows you to select the client types from the predefined list and
RPC assign them to a private queue.
Restriction To create user defined client types, select Add Custom Client Type, which displays the
Mapping Client Type Registration form and allows you to create custom client types.
The settings are updated under the shared components in the Centralized Configuration
form, after you click Apply. For more information, see Configuration settings N-R (see
page 1223).
Note: You can only direct the Java API calls created using BMC Remedy AR System 9.0
Service Pack 1 or later.
4. Click Apply.
5. Restart the server for the changes to take effect.
Note
To change the port number that the AR System server uses when communicating
with the plug-in server, edit the Plugin-Port option on the AR System Configuration
Generic UI form, and restart the server. See Plugin-Port (see page 1213).
1. In a browser, open the AR System Administration Console, and click System > General >
Server Information.
The AR System Administration: Server Information form appears.
2. Click the Database tab.
The information displayed on this tab varies depending on the relational database you have
installed.
3. Edit the options, as needed:
Database Displays the type of database that the AR System server is using.
Type
Database (UNIX only) Displays the directory path of the underlying database that the AR System server is using.
Home
Database Displays the name of the database created for AR System in the underlying database server.
Name
Database Displays the version of the database that the AR System server is using.
Version
Database Displays the user name that BMC Remedy AR System uses to access the database.
User Name
Database (Oracle, Microsoft SQL Server databases only) Enables you to define the password that BMC Remedy
Password AR System uses to access the database. The existing password is not displayed. To change the
password, enter a value in the Database Password field. The default database password created by
BMC Remedy AR System is AR#Admin#. If you changed the password and do not remember it or if you
changed it outside AR System and must reflect the change in AR System, log on to the database as the
database administrator and change it back to the default. If the encrypted password is in the ar.conf
configuration file, delete it from that file.
Database Displays the contents of the ardb configuration file used by the advanced BMC Remedy AR System
Configuration feature that appends clauses to the SQL statements that create tables and indexes. For more
File information about the ardb file, seeardb.cfg or ardb.conf.
Database Indicates whether the database in use is case sensitive. This field is read-only.
Case
Sensitive
Request ID (Microsoft SQL Server only) Indicates whether AR System creates the Request ID field as a clustered
Uses index to boost performance. By default, this option is selected.
Clustered
Index
Store CLOB (Oracle databases only) Specifies how Oracle CLOBs are stored:
In-Row By default, this option is not selected, and CLOBs are created "out row." Out-row CLOBs can
cause the database to grow rapidly.
If this option is selected, CLOBs are created "in row." In-row CLOBs can degrade CPU
performance.
Note:Before installing BMC Remedy AR System applications, select this option so that all database
tables for applications are created in-row.
4. Click Apply.
Example — Using Java Driver command to disable archiving for server group
Command: ssi
SET SERVER INFO
Number of server info operations ( 0 ): 1
Operation ( 1 - 443 ) ( 1 ): 419
Datatype
Null/Key/Int/Real/Char/DiaryList/Enum/Time/Bitmask/Byte
Decimal/attach/currency/date/timeofday/join/trim/control/Table/Column/ulong/coords/view
/display
( 0 - 14 , 30 - 34 , 40 - 43 ) ( 0 ): 2
Integer Value ( 0 ): 1
Set Server Information Status
ReturnCode: OK
Status List : 0 items
Replace 419 in the above example with the ID for the feature to be disabled. Refer to the table
below for IDs.
Feature ID
Vendor form You cannot search Vendor form if you have read-only database because Vendor form search results in
search creating temporary tables.
Note
Web reports support currency fields, but do not support currency value and currency type.
BMC Remedy AR System reports support currency value and currency type.
1. In a browser, open the BMC Remedy AR System Administration Console, and click System
> General > Server Information.
The AR System Administration: Server Information form appears.
2.
BMC Remedy Action Request System 9.1 Page 309 of 4703
BMC Software Confidential. BladeLogic Confidential.
Choose Allowable currency types are types that are valid entries in a currency field. These currency types are
Default visible in menus or lists in BMC Remedy Developer Studio and in client screens. From the list in the left
Allowable column, select a currency type, and click Add. Your selection is added to the table on the right, which
Types shows the three-character currency type and the default decimal precision level for that currency type. For
example, the currency type USD has a default of two decimals of precision. You can modify this precision
level by entering a new value in the Precision column. For example, to specify four decimals of precision,
enter 4. To remove a currency type, select it and click Remove.
Choose You must also specify the functional currencies stored as part of the field value. When a request is
Default submitted that includes a currency value, the server converts that value to a functional currency type and
Functional stores it. You must include at least one functional currency type. You can specify an unlimited number of
Types functional currency types; however, adding more than five currency types might have an adverse effect on
server performance. From the list in the left column, select a functional currency type, and click Add. Your
selection is added to the table on the right, which shows the three-character currency type and the default
decimal precision level for that currency type. For example, the currency type USD has a default of two
decimals of precision. You can modify this precision level by entering a new value in the Precision column.
For example, to specify four decimals of precision, enter 4. To remove a currency type, select it and click
Remove.
4. Click Apply.
1. In a browser, open the BMC Remedy AR System Administration Console, and click System
> General > Server Information.
The AR System Administration: Server Information form appears.
2.
BMC Remedy Action Request System 9.1 Page 310 of 4703
BMC Software Confidential. BladeLogic Confidential.
Fixed Displays the total number of AR System User Fixed licenses on the server.
Write
Licenses
Floating Displays the total number of AR System User Floating licenses on the server.
Write
Licenses
Max Displays the number of forms your license allows you to create on the server. If this field reads Unlimited,
Forms you can create as many forms as you want.
Allowed
on Server
AR Displays the BMC Remedy AR System identifier code attached to the server license.
System
Server ID
Submitter Defines the conditions under which submitters can modify the requests they initially submit (that is, where
Mode their names are in the Submitter field). Select one of the following options:
Locked — Users can modify requests they submit without a write license. This does not apply to
users with a Restricted Read license who cannot modify requests under any circumstances. In the
locked submitter mode, after the entry is submitted, the value in the Submitter field cannot be
changed.
Changeable — (Default) Users must have a write license to modify requests.
Note
Changes to the Submitter Mode settings do not take effect until the server is stopped and
restarted.
4. Click Apply.
1. In a browser, open the BMC Remedy AR System Administration Console, and click System
> General > Server Information.
The AR System Administration: Server Information form appears.
2. Click the EA tab.
External Enables an external authentication (AREA) server. The RPC program number for the
Authentication plug-in service is 390695. Entering no value or 0 disables authentication using an
Server RPC AREA service, and the BMC Remedy AR System server accesses the operating
Program system for authentication purposes.
Number
Note
You must have an AREA server built and prepared before you set the RPC
Socket number here.
RPC
External Sets the time limit (in seconds) within which the plug-in server must respond to the
Authentication BMC Remedy AR System server when making external authentication (AREA) calls
Server before an error is returned. If this is set to 0, BMC Remedy AR System server uses
Timeout the default of 40 seconds.
(seconds)
Need To Sync Sets the interval for periodically invoking the AREA server's
AREANeedToSyncCallback() call. If this option is set to 0, BMC Remedy AR System
server does not invoke the call to the external authentication server. The default is
300 seconds. For more information about the external authentication server, see
Configuring a server to use plug-ins, and AR System external authentication.
Authenticate Defines how BMC Remedy AR System validates a user who has no record in the
Unregistered User form. When a user logs in to BMC Remedy AR System, the server tries to
Users validate the user against registered users (users who are listed in the User form). If a
match is found, that user definition and the permissions specified in the matching
User record are used. If no match is found, BMC Remedy AR System continues trying
to validate the user or stops the validation process depending on whether this option
is selected. If the check box is
Selected, and External Authentication is not configured — (Default on UNIX
servers) On a UNIX server, BMC Remedy AR System searches the /etc
/passwd file or NIS password map for a match. If a match is found, the user is
considered a valid user (not a guest) of the system. The UNIX group
specification from the file or NIS is retrieved, and the user is considered a
member of the BMC Remedy AR System group whose Group ID matches the
UNIX group. On a Windows server, BMC Remedy AR System authenticates to
the default domain. The optional authentication string that the user enters
when logging in is used as the Windows domain name for authentication
purposes. On Windows servers, the user is considered a member of the group
whose Group ID is 0.
Selected, and External Authentication is configured — BMC Remedy AR
System sends a request to the external authentication server to authenticate
the user. If a match is found, the user is considered a valid user (not a guest
user) of the system. See Configuring a server to use plug-ins. The
authentication string entered by the user when logging in is passed to the
external authenticator for its use.
Cleared — (Default on Windows servers) BMC Remedy AR System stops the
validation process and manages the user as a guest user if Allow Guest Users
is enabled.
For information about configuring external authentication, see To set server ports and
queues.
Cross Ref Defines how BMC Remedy AR System authenticates a user whose User form record
Blank has no password. When a user logs in, BMC Remedy AR System searches its own
Password database for that user. If the user has a password, the system uses it. If the Password
field is empty and this option is
Selected — BMC Remedy AR System tries to validate the password against
one of the following items:
An external authenticator if one is configured
The password in the Windows server domain
The UNIX server's /etc/passwd file
Cleared — (Default) BMC Remedy AR System concludes that an empty
password field means that the user has no password.
In the Login window, users see an Authentication field. If your AR System server is
running on Windows, the contents of this field are used as a domain name when the
server authenticates the user with the operating system. If the server is instead
configured to use an external authenticator, the contents of this field are passed to the
authenticator. See Setting up an authentication alias. If you enable the Cross-
Reference Blank Password option, make sure that it does not conflict with the User
Password Management feature. If you enforce a password policy, BMC Remedy AR
System periodically forces users to set a password that cannot be blank. If a user's
password is authenticated outside of BMC Remedy AR System and that user sets a
non-blank password, BMC Remedy AR System performs the authentication. This is
not an issue if enforcement of a password policy is not enforced. If a policy is
enforced, you must disable the policy for users whose passwords should be blank.
For information about enforcing password policies, seeEnforcing a password policy
introduction. To disable the policy for users whose passwords should be blank, see
Disabling password management for individual users.
Authentication Specifies the order in which BMC Remedy AR System tries to authenticate users
Chaining when they log on:
Mode Default — Disables authentication chaining.
ARS - AREA — 1) the User form; 2) the AREA plug-in.
AREA - ARS — 1) the AREA plug-in; 2) the User form.
ARS - OS - AREA — 1) the User form; 2) Windows or UNIX authentication; 3) the
AREA plug-in.
ARS - AREA - OS — 1) the User form; 2) the AREA plug-in; 3) Windows or UNIX
authentication.
Group LDAP Area The name of the LDAP group to map to the BMC Remedy AR System group in the
Mapping name same row of the Group Mapping table.
AR Group The name of the BMC Remedy AR System group to map to the LDAP group in the
Name same row of the Group Mapping table.
Ignore Enables BMC Remedy AR System to authenticate a user when any single LDAP
Excess group to which the user belongs matches a BMC Remedy AR System group.
Groups
1. In a browser, open the BMC Remedy AR System Administration Console, and click System
> General > Server Information.
The AR System Administration: Server Information form appears.
2.
BMC Remedy Action Request System 9.1 Page 314 of 4703
BMC Software Confidential. BladeLogic Confidential.
3. Edit the options listed in the following table, as needed, and click Apply.
Default Specifies the base URL for the mid tier and is used by clients such as Flashboards. The
Web Path URL looks like this:
http://<hostName>/<contextPath>
hostName is the name of the server (for example, eng.remedy.com).
contextPath is the URL context path of the AR System application registered with
the servlet engine. This is set up during installation. The default value is arsys. If
your company has multiple domains, use a fully qualified path name.
Enable Indicates whether you want to enable the system for tracking service operations.
Service By default, tracking is disabled.
Recording
API Indicates the client types for which you want to monitor the API calls. By default, this field
Recording does not have any value set which means that the calls from all client types are
Client Types monitored. Specify values separated by semicolons in the following format:
<clientType>;<IPAddressExpression>;<clientType>;<IPAddressExpression>.
clientType — Indicates the client type to be monitored. This takes an integer value
and a * value in this field indicates that API calls from any client type are
monitored. For information on supported client types and their values, see Client
types (see page ).
ipAddressExpression — Indicates a regular expression used to match the source
address. This is an optional value to specify. If you do not specify any value, all
source addresses are matched by default.
Enable API Specifies whether you want to enable the system for monitoring API calls.
Recording Valid values:
Yes — Indicates that monitoring is enabled.
No — (Default) Indicates that monitoring is disabled.
Maximum For forms that contain hierarchical data, such as manager and employee relationships,
Depth for specifies the maximum number of levels in the hierarchy that a recursive query retrieves.
Hierarchical By default, the maximum is 25. Enter any integer greater than 0. See
Query ARGetListEntryWithMultiSchemaFields (see page 3714).
Maximum Specifies the maximum number of temporary tables that can exist on an AR System
Vendor server for a single vendor form. The ARGetListEntryWithMultiSchemaFields
Temp function stores data from vendor data sources in these tables. By default, only one
Tables temporary table can exist for each vendor form. This setting applies to all vendor forms on
the server. It is overridden by the value of an individual vendor form's Maximum Vendor
Temp Tables property. Enter any integer greater than 0. See
ARGetListEntryWithMultiSchemaFields (see page 3714).
Email Suppress Suppresses the server domain in the URL. The option is clear by default.
Server
Domain in
URL
Maximum Specifies the maximum line length that can be in an email. The default is 1024. If a single
Line Length line of the message is over this length, a return is automatically inserted. Limits the line
in Email length of email messages passed through the mail server to protect users from
excessively long lines.
Email Specifies the base URL that appears in email notifications. If this field is left blank, the
Notification Default Web Path is used. (The Email Notifications Web Path field is available because
Web Path the Default Web Path is specified for other applications like Flashboards, and it might be
different from the mid tier web path for opening requests in a notification.) If your
company has multiple domains, use a fully qualified path name.
Security Active Link Specifies the only directory that the Run Process active link action can run from, for
Run example, C:\arsys. If no directory is specified, active link processes can run from any
Process directory.
Directory
Active Link Specifies the type of shell the Run Process action can use, for example, /bin/csh. If no
Run path is specified, administrators can specify any shell.
Process
Shell (UNIX
servers
only)
Allow Enables the administrator to use the arcache and arreload utilities. See arcache.exe or
arcache arcache (see page 1131) and arreload.exe or arreload (see page 1134). The option is
and selected by default.
arreload
Transaction Maximum Specifies the maximum number of client managed transactions (CMT) which are allowed
Control Connections on the system. Valid values are 0 to 100. When set to 0, CMT is disabled on that system.
The default is 10.
Transaction Specifies the maximum allowed time interval (in seconds) between client managed
Timeout transaction API calls. When a client managed transaction starts, if the consecutive API
(seconds) call is not made within the specified time interval by the client, then the server rolls back
the transaction and the transaction handle becomes invalid. Valid values are 0 to 600.
The default is 60.
Localized Selected — The server is localized and is enabled for such tasks as searching
Error entries in localized forms, or using BMC Remedy AR System Message Catalog to
Messages load the message. Clients are enabled to display localized messages, but clients
still have local catalogs, such as the user.dll. You must select the Localize Server
check box to see localized error messages.
Cleared (default) — The server is not localized. Such tasks as searching localized
forms and the localization of messages are disabled. The server does not use the
BMC Remedy AR System Message Catalog form, and messages are shown from
the error catalog. The default message is displayed.
Note: If users in a different locale open a form with localized views before you select this
option, you must flush the mid tier cache after setting this option to make the localized
view available on the web. See Configuring the Cache Settings page (see page 472).
Catalog Displays the name of the form the server uses to resolve error messages when Localize
Form Name Server is selected. For more information about the BMC Remedy AR System Message
Catalog form, see Localizing BMC Remedy AR System applications (see page 3062).
Filters Maximum Specifies the number of filters that can be performed in an operation. The default and
Filters for recommended number is 10000. Increase this number at your own risk only if you reach a
an limit in your system and you have verified that your workflow is valid.
Operation
Maximum Specifies the maximum number of nested filters and filter guides that execute to prevent
Stack of recursive actions on the server. The default and recommended number is 25. Increase
Filters this number at your own risk only if you reach a limit in your system and you have verified
that your workflow is valid.
Server Server If the server belongs to a server group, specifies the name of the group. All servers in the
Group Group server group share this setting.
Names
Check Specifies how often the server communicates with other servers in the group. Each server
Interval can register its own status, determine whether any server is delinquent, establish the
parameters needed for sending signals, and determine operational responsibilities.
Values are
Default — 60 seconds
Minimum — 10 seconds
Maximum — None
All servers in the server group share this setting, and when it is changed, all the
AR System servers in the group must be restarted.
Preference Preference Specifies where user preferences are read from. The options are
Server Server User Defined — Users can select whether to use a preference server, and this
Option server might or might not be used depending on whether the Centralized
Preference forms are defined.
Use This Server — Users must use a preference server, and this server is an
available preference server.
Use Other Server — Users must use a preference server, and this server is not
available as a preference server.
See Establishing a mandatory preference server (see page 1334).
Preload Preload If the number of preload threads is not zero, specifies whether the threads are used only
Tables Tables At at server startup or for all cache reloads from the database. See Setting the Preload
Configuration Init Only Tables Configuration option (see page 403). Values are
Yes — If preload threads are configured, use them only at server startup.
No — If preload threads are configured, always use them when loading the cache
from the database.
For information about the corresponding configuration file setting, see Preload-At-
Init-Only (see page ).
Number of Specifies the number of preload threads used when information is loaded from the
Preload database into the server cache. The maximum value is 30 or twice the number of preload
Threads segments, whichever is lower. The server might reduce the number of threads at runtime
if it determines that threads would be started with no work to do. If this field is set to 0, the
Preload Tables Configuration option is off. For information about the corresponding
configuration file setting, see Num-Preload-Threads (see page ).
Number of Specifies the total number of preload segments handled by the preload threads. Vary this
Preload setting to balance the load between preload threads and to optimize cache load time. A
Segments good initial setting for this option is 1/3 the number of schemas (forms) in the AR System
server. See Determining the optimum preload settings (see page ). For information
about the corresponding configuration file setting, see Num-Preload-Schema-Segments
(see page ).
Change application server passwords, which are required passwords used by BMC Remedy
applications when they connect to the AR System server. Components that use application
server passwords include BMC Remedy Mid Tier, plug-in servers, the DSO server, the
Flashboards server, the Email Engine, and custom applications. Most application server
passwords are initially set when you install BMC Remedy AR System, but you can change
them at any time by using the Connection Settings tab.
If you change an application server password on a BMC Remedy AR System server, you
must also make the change for the application that connects to that server. For more
information, see the Configuring the Connection Settings page (see page 493) in the table
below.
Set the RPC program number and port information for plug-in and DSO servers.
Configure timeout settings for the plug-in servers.
1. In a browser, open the BMC Remedy AR System Administration Console, and click System
> General > Server Information.
2. Click the Connection Settings tab.
Application Specifies the password that the Email Engine and Flashboards server use to access the AR
Service System server. Asterisks in the field indicate that a password is defined. If you change this
Password password on the AR System server, you must also change it for the Email Engine and
Flashboards server if they are installed. To change the Application Service Password for the
Email Engine, update the EmailDaemon.properties file (see EmailDaemon.properties file).
To change the Application Service Password for the Flashboards server, update the server.
conf file (see Resetting the Application Service password).
Mid-Tier Specifies the password used by the mid tier to access the AR System server. If you change
Administrator this password on the AR System server, you must also change it in the Mid Tier
Password Configuration Tool, which updates the config.properties file (see Configuring the Change
Password page). In the Mid Tier Configuration Tool, this password is called the Admin
Password.
Plug-In Local Sets a password for other BMC Remedy AR System servers to use when they connect to
Server Password this server's plug-in server. If this option is specified, the plug-in server accepts connections
only from AR System servers configured to use the same password. If you change this
password, you must also change the appropriate plug-in server target password on any AR
System servers that connect to this plug-in server. See Setting server passwords, RPC
options, and plug-in timeouts. If this option is not specified, the plug-in server accepts
connections from AR System servers not configured to use a plug-in server target password.
Plugin Specifies the number of seconds in which the plug-in server must respond to the AR System
Default server before an error is returned.
Timeout
Server Name Specifies the name of the AR System server associated with the target plug-in server.
Note: In this tab's table, you enter target connection settings. The AR System server uses
these settings to connect to other plug-in servers.
Port Number Specifies the name and port number for the target plug-in server.
Password Specifies the password for the target plug-in server. The server name and port number
create a unique entry. If you modify a server name or port number, the password is cleared.
If you remove the password for a particular entry, you can specify a server name and port
number with no password for that entry. The next time you display the table, the entry is not
displayed. The edit masked option is not supported in tables on forms. Therefore, when you
type a new password in the Password column, it is visible. Saved passwords are masked.
DSO DSO Local Specifies the password that a DSO server uses to access this AR System server. If you
Server Password change DSO Server password, you must also change the target password for any DSO
servers that connect to this AR System server. See Configuring BMC Remedy Distributed
Server Option .
DSO Local Specifies a dedicated (private) RPC program number that a DSO server uses for all
RPC communication with the AR System server. If you leave this field blank, the fast and list
Program queues process all distributed operations.
Number
Target Specifies RPC program numbers, TCP/IP ports, and DSO passwords that a DSO server
connection uses when accessing remote AR System servers. See Configuring BMC Remedy
settings Distributed Server Option .
tables
Remote Local Specifies the password that another AR System server uses to access this server through
Workflow Password workflow. If you change this password, you must also change the appropriate remote
workflow target password on any server containing workflow that connects to this server.
Password Specifies a password to use when this server accesses the specified remote server through
workflow. This occurs when an active link contains an SQL or Process command against the
remote server and is activated by a non administrator user. If the remote server specifies a
workflow password, you must register that server and password, or you cannot access that
server through workflow. The edit masked option is not supported in tables on forms.
Therefore, when you type a new password in the Password column, it is visible. Saved
passwords are masked.
4. Click Apply.
5. Restart the AR System server for the Connection Settings to take effect.
Note
If your environment contains AR System servers earlier than release 5.1, set the
minimum API version to 9 to ensure that secure servers cannot communicate with
servers running previous BMC Remedy AR System versions. For information
about setting the API version, see Setting administrative options (see page 321).
1. In a browser, open the BMC Remedy AR System Administration Console, and click System
> General > Server Information.
The AR System Administration: Server Information form appears.
2. Click the Configuration tab.
AR System Administration: Server Information form — Configuration tab
(Click the image to expand it.)
Users Specifies whether users are prompted for their log on credentials.
Prompted By Preference --- The prompt appears by preference.
For Login Once Only — The prompt appears only once per session.
Always — The prompt appears every logon session.
Max Entries Limits how many database entries are returned from a search. For example, setting the maximum
Returned by entries to 50 would return a maximum of 50 entries, even if more entries satisfied the search
GetList qualification. BMC Remedy AR System warns users that the search matched more entries than the
administrator allows to be retrieved. If users specify a maximum in their preferences, the lesser value is
used. A value of 0 (default) specifies no limit.
Server Table For server-side table fields, determines the number of entries (or size of the chunk) that the server
Field Chunk retrieves at one time from the database and stores in-memory to process during filter or filter guide
Size actions. The server then retrieves, stores, and processes the next chunk until all the rows are
processed. Entering a value of 0 causes the server to retrieve an unlimited number of rows. The default
is 1000 rows. Entering a low value in this field causes the server to process smaller chunks, which
keeps the server memory usage down, but results in slower processing because the server needs to
access the database many times, especially for large tables. Entering a high value causes the server to
retrieve and process large chunks of data and access the database fewer times. This results in higher
performance at the cost of memory use.
Displays the language and character set of the computer on which the server is running.
Server
Language
User Email Identifies the sender of email notifications. The default sender for email notifications is ARSystem. To
Notifies From specify another user name, enter that name in this field. The name must match the name you use in the
BMC Remedy AR System Email Configuration Form for notifications. For more information about
configuring a mailbox for notifications, see Sending notifications (see page 1447).
Minimum Specifies the oldest version of the C and Java APIs with which the server communicates. The
API Version corresponding API and BMC Remedy AR System versions are as follows:
API 23 and AR System 9.1.00
API 21 and AR System 9.0.00
API 20 and AR System 8.1.00
API 19 and AR System 8.0.00
API 18 and AR System 7.6.04
API 17 and AR System 7.6.03
API 14 and AR System 7.5.00
API 13 and AR System 7.1.00
API 12 and AR System 7.0.00
API 11 and AR System 6.3.00
If you set the minimum API version to 14, clients earlier than version 7.5.00 cannot communicate with
the BMC Remedy AR System 7.5.00 or later server. If you set the API version to 0 or none, all clients
can communicate with the server. For information about setting passwords to increase security, see
Configuring server groups (see page ).
Default Specifies the path to a home page form to be used system-wide as the default home page for this
Home Form server when a user logs in. This default Home form is only used if one of the following statements is
true:
This server is designated as the server for the home page in the BMC Remedy AR System User
Preference form.
This server is designated as the home page server on the General Settings page in BMC
Remedy Mid Tier Configuration Tool. See Homepage Server (see page ).
No home page is specified in the BMC Remedy AR System User Preference form.
Note: If the home page form is deleted, this field is cleared and you must re-enter a default home page.
Max Number Specifies the maximum number of consecutive bad password attempts allowed for a user after which
of Password the user account is marked INVALID.
Attempts For example, if the value is set to 3, the user has 3 chances to log on. If all 3 attempts have bad
passwords and the user enters a bad password in the fourth attempt, then the user account is marked
INVALID.
Values for this field are 0 (turns features off) and all positive integers. This option can also be set with
the AR System Configuration Generic UI form (see page 1233).
This parameter can be used in conjunction with Display-General-Auth-Message. See Configuration
settings C-D (see page 1166). See also the description for error 624 (see page 4362).
Next Specifies whether to allocate Next-IDs in blocks rather than one at a time. Allocating in blocks increases
Request ID performance during a create operation. To allocate in blocks, enter a positive number greater than 1 (up
Block Size to 1000). The default value is 1 (Next-IDs are not allocated in blocks). If 0 or a negative number is used,
the server uses the default value of 1. You do not need to restart the server for the change to take
effect. The option is started immediately. Warning: The use of this configuration setting might result in
unpredictably large Next-ID sequence gaps. The likelihood of this occurring increases with the use of
multiple servers that share a database. The BMC Remedy AR System server does not malfunction
because of this gap and should not be considered a defect.
Allow Guest Specifies whether BMC Remedy AR System permits access to guest users, who are not registered
Users users of the system, to log on. If the check box is selected (default), guest users can log on and perform
the following tasks:
View all forms and fields for which the Public group has Visible permission.
Execute all active links for which the Public group has permission.
View all fields for which the guest user is the submitter or assignee, if the Submitter Group or
Assignee Group has View permission for the field.
Submit new requests if the fields on a form have the Allow Any User to Submit check box
selected. See Special submit setting (see page 1282).
Modify all fields for which the guest user is the submitter, if the Submitter Group has Change
permission for the field and if the Submitter Mode is Locked, as described in Setting license
options (see page ).
Give Guest Defines whether guest users receive a restricted read license when they log on to BMC Remedy AR
Users System. If this option is not selected, guest users receive a read license.
Restricted
Read
Allow Defines whether the server accepts unqualified searches (searches for which no search criteria are
Unqualified specified). If the check box is
Searches Selected (default) — All database searches are allowed.
Cleared — You force users to enter a search criteria when performing queries.
Note: Consider restricting unqualified searches to prevent the performance penalty of retrieving and
returning large blocks of data because of accidental unqualified searches to the database.
Administrator- Enables only administrators and sub-administrators to access BMC Remedy AR System. Users who are
Only Mode not administrators or sub-administrators cannot perform any BMC Remedy AR System operations. This
is useful during system maintenance. By default, this option is not selected. Only administrators (not sub-
administrators) can set the Administrator-Only Mode. After an administrator sets this option, sub-
administrators can access only forms for which they have permission.
Disable Disables the archive operations on the server. You can disable one server operating with one database,
Archive but in the case of multiple servers attached to the same database, you can disable all servers except
one to prevent conflicts. By default, this option is not selected. See Archiving data (see page 1834). If the
Server Group Member option is selected, this setting is ignored. Server groups can be configured in the
BMC Remedy AR System Server Group Operation Ranking form to make sure that only one server
performs the operation. See Configuring server groups (see page 375).
Development If the check box is not selected (the default), the server is in production cache mode. In this mode,
Cache Mode administrative operations cause the server to create an administrative copy of its cache so that other
users can continue using the shared cache while administrative operations are performed.
Ensure that you always use the default value (Production cache mode) to perform your server
operations. The users should not switch to Development Cache Mode.
Note: Ensure that you do not change the default value.
Server Indicates whether the server is a member of a server group. By default, this option is not selected.
Group
Member
Disable Disables certain operations performed only by administrators and sub-administrators, which enable you
Admin to control changes to the database by disabling administrator (Developer Studio) operations. You can
Operations disable one server operating with one database, but in the case of multiple servers sharing same
database, use this setting to disable all servers except one to prevent conflicts. If the check box is
Selected — Administrators cannot perform operations that affect the server's data dictionary.
Cleared (default) — Administrators can perform their usual operations including all data
dictionary restructuring operations.
If the Server Group Member check box is selected, this setting is ignored. Server groups can be
configured in the BMC Remedy AR System Server Group Operation Ranking form to make sure that
only one server performs these operations. See Configuring server groups.
Disable Enables you to stop escalations running on the server. You can disable one server operating with one
Escalations database, but in the case of multiple servers attached to the same database, use this setting to disable
all servers except one to prevent conflicts. By default, this option is not selected. If the Server Group
Member check box is selected, this setting is ignored. Server groups can be configured in the BMC
Remedy AR System Server Group Operation Ranking form to make sure that only one server performs
escalations. See Configuring server groups (see page 375).
Disable Alerts Enables you to prevent alert messages from being sent to users when an alert event is entered in to the
system. No threads are run in the Alert Queue. This setting is acknowledged only at startup, so any
changes do not take effect until the server is restarted. By default, this option is not selected.
Verify Alert Indicates whether the server needs to check its list of registered alert clients to determine if they are
Users listening and ready to receive alert messages. This setting is acknowledged only at server startup, so
any changes do not take effect until the server is restarted. Selecting this option can result in a large
amount of network activity at server startup. If the check box is
Selected — The server verifies the list of clients. If the clients are not listening, they are removed
from the list of registered clients.
Cleared (default) — The server does not perform the verification.
Regardless of the setting, if a subsequent alert message is sent to a client that is not listening, the client
is removed from the list of registered clients.
Enable Enables multiple roles, groups, and user names to be stored in the row-level security Assignee Group
Multiple field (ID 112) and in dynamic group fields (ID 60000-60999 ). This enables multiple users, or users
Assign from multiple groups, to access the same entry (as in the sample qualification, 'Assignee Group' = ";50;
Groups 51;-90;'Mary Manager';" ). If the check box is not selected (the default), only one role, group, or user
name can be stored.
Disallow Non When selected, restricts server access to Unicode-safe clients. This option applies to all non-Unicode
Unicode clients. This check box is visible only for AR System 7.0.00 servers or later. If the server uses a non-
Clients Unicode database, the check box is disabled.
Record Determines whether the AR System server records the relationships between workflow objects. If the
Object check box is
Relationships Selected — The server creates entries in a database table to track the relationships between
many types of workflow objects.
Cleared(default) — The server does not record relationships.
Note: If using a server group, all servers within the same server group must have the same setting for
this option. If they do not, the servers in the group inconsistently populate and un-populate the object
relationship database should they be the highest ranked server for the Administration operation when
they are restarted. Only the highest ranked server for the Administration operation in the server group
will perform the required object relationship actions when restarted.
When the server is recording relationships, it updates the relationship data whenever an object is
created, modified, or deleted. You might notice that installing an application or importing a large number
of objects takes longer because of additional database operations.
When you select the check box, it records the relationships of all server objects before it
accepts connections from clients. Therefore, the first time you set the value to T, you
cannot connect to the server by using any client temporarily. The more the number
of objects defined on the server, the more time it takes to connect to the server. With a
large number of objects, such as with an ITSM application installed, and depending on the
performance of the database, this could take up to an hour. When you can reconnect to
the server, the recording of object relationship data is complete.
When you clear the check box, it removes all the recorded relationships from the
database. This option must be selected on a development server to enable the following
features of BMC Remedy Developer Studio:
Analyzer
Search
Show Relationships
For more information about Analyzer, see Using Analyzer to find problems in your applications (see
page 3148). For more information about Search and Show Relationships, see Relationships tab (see
page 2196). Also, BMC Remedy Developer Studio uses that object relationship data, if available, to
improve performance of some features, including object lists, related working lists, and exporting related
objects. To view these relationships directly, use the BMC Remedy AR System Object Relationships
form.
Max Attach Specifies the maximum size of the attachment in bytes. The default is 0, which allows users to attach
Size files of any size.
Use Prompt Specifies whether system messages appear in the prompt bar or a pop-up box. The options are:
Bar For Notes and Warnings (default) — Notes and warnings appear in the prompt bar, but Errors appear
in a pop-up box.
All System Messages — All system messages appear in the prompt bar.
None, Show in Popup — No messages appear in a prompt bar. Instead, all messages appear in
a pop-up box.
Required Specifies the character to add to the label of a field whose entry mode is Required.
Field Prefix on Label — Add the character to the beginning of the label.
Identifier Suffix on Label (default) --- Add the character to the end of the label.
Identifier — The character to add to the label. The default is an asterisk.
For information about field entry modes, see Field Properties (see page 2548).
Display This option can be set to restrict the number of form display properties the server loads into memory at
Property startup. The result of a restricted option (Cache Only Server Display Properties) is less memory use at
Caching start-up, and more memory available for the server process to grow. Form display properties are used
for the background image of form views and the display properties of each form field. If an unloaded
display property is needed, the server loads it on demand instead of caching it up front. Use the radio
button to select one of these options: Restart the server after changing this setting.
Cache Only Server Display Properties— Only display properties associated with server workflow
are cached. This setting does not decrease start-up time because the server still must read all
properties for load selection. Reduced memory use impacts performance when data must be
read from the database. It might also adversely affect server performance, database
performance, or both when used with mid tier caching.
Note: This option is not useful in a 64-bit environment. Most 64-bit environments do not impose
memory limitations and setting the option could unnecessarily impact performance.
Cache All Display Properties (default) — All display properties are loaded into the cache. This
increases the memory requirement for the cache but can improve the performance of the server
when a form is first opened by the client.
Note: To configure settings for individual forms, use the check boxes on the Basic page of the
Form Properties dialog box. See Setting form properties (see page 2323).
License Determines whether information is recorded in the AR System Current License Usage and AR System
Tracking Historical License Usage forms. By default, this option is not selected (information is not recorded in the
forms). For information about tracking license usage, see Displaying and Tracking server group license
usage (see page 278).
Disable Causes the system to disable ARSignals. By default, this check box is not selected.
ARSignals
Disable Audit Causes the system to record all fields when auditing a record. By default, this check box is not selected,
Only indicating that only those fields whose values have changed during a transaction are audited.
Changed
Fields
Note
Using the 2014.01 version, you can monitor only email services.
1. In a browser, open the AR System Administration Console, and click System > General >
Server Information.
2. In the AR System Administration: Server Information form, click the Advanced tab.
3. In the Enable Service Recording drop-down list, indicate whether you want to enable the
system for tracking service operations. By default, tracking is disabled.
Recommendation
You must follow the steps displayed in this section to configure the tracking of service
operations. If you have not set the following parameters for a service operation, it will not
be tracked.
1. Open the AR System Service Statistics Configuration form by typing the URL in a browser in
this format: http://<midtier>:<port>/arsys/forms/<server>
/AR+System+Service+Statistics+Configuration.
To view the details, open the AR System Service Statistics form by typing the URL in a browser in
this format: http://<midtier>:<port>/arsys/forms/<server>/AR+System+Service+Statistics.
Count Indicates the total number of service operations. For example, incoming and outgoing emails.
Start Indicates the time when the service tracking started. Start time is specified in hours. The tracking time frame is
Timestamp 1 hour.
Server Indicates the IP address of the computer where the AR System server is running
Related topic
Setting performance and security options (see page 314)
When you define additional queues, you must assign corresponding RPC program numbers, and
you must define the minimum and maximum number of threads for each queue that you are using.
To add server, escalation, or full text indexer queues and to configure threads
1. In a browser, open the BMC Remedy AR System Administration Console, and click System
> General > Server Information.
The AR System Administration: Server Information form appears.
2. Click the Server Ports and Queues tab.
3. In the Server Queue box, click at the bottom of the Type column.
4. Click in the RPC Port Number column, and enter the appropriate number for the queue that
you want to add:
Type RPC Prog Number Default Default
Min Max
Threads Threads
Alert 390601 1 1
Escalation 390603 1 1
Fast 390620 3 6
List 390635 3 6
Note
To enable the debug queue, the Min Threads and Max Threads count must
be 1.
If you do not want to enable the debug queue for the list and fast threads,
the minimum number of threads must be 2.
Even if you delete the escalation queue, the AR System server starts the
thread in the background.
5. In the Min Threads field, enter the minimum number of threads that you want started at
startup.
The default is 1.
6. In the Max Threads field, enter the maximum number of threads that your system is allowed
to start.
The default is 1. When all the existing worker threads are in use, the system starts additional
threads as needed until the maximum number is reached. These additional threads remain
active until the server is rebooted.
For the escalation queue, the maximum number of threads are started when the server
starts up.
7. Select the Yes check box to create a debug queue.
8. Click OK to close the form.
When you return to the form, the new queues are listed.
Note
If you have removed a queue or decreased the maximum number of threads for a
queue, restart the server for the changes to take effect.
Update the Customization Comments column and check the tasks as you complete them.
Download checklist
This section describes the configuration procedures required to change the server name of a BMC
Remedy Action Request System (BMC Remedy AR System) server when you upgrade from
versions earlier than 9.0.
For more information on configuration procedures to change the server name of BMC Remedy AR
System server for version 9.0 and later, see Renaming the AR System server (see page 363).
Server-Name is the alias name by which an AR System server recognizes itself. You might need to
change a Server-Name alias because:
Use Description
case
Use You are setting up a staging server (as part of the upgrade process) by installing all of the products first and then restoring
case the database from the production server. The database might contain references to the production server, which might not
1 be applicable to the staging environment. In this case, you need to change only the form data.
Use You are setting up a staging server (as part of the upgrade process) by restoring the database first and then installing the
case new BMC Remedy AR System environment (this is called an accelerated installation). In this case, you need to change
2 only the form data.
Use The Server name is changing due to a policy or host name change. In this case, you must change the Registry (on
case Windows), the configuration files, and the form data.
3
Use You are moving the server into a server group and using a new Server-Name alias. In this case, you must change the
case Registry (on Windows), the configuration files, and the form data.
4
Note
The steps describe both Microsoft Windows and UNIX environments. In some cases
(such as working with the Registry), the steps apply only to Windows.
The following section provides information about procedures you need to perform to change the
sever name of BMC Remedy Action Request components and applications.
Use case 1
The following table lists steps for renaming BMC Remedy AR System sever if you are setting up a
staging server by installing all the products first and then restoring the database from the
production server.
Sr. Steps
No
1 Update the Server field in the AR System Searches Preference form. (see page 340)
2 Update the Server Login List field in the AR System User Preference form. (see page 340)
3 Update the Server field in the Report form. (see page 340)
4 Update the Email Server Name/IP field in the AR System Email Mailbox Configuration form. (see page 343)
5 Update all server name occurrences of each record in the AR System Web Services Registry form. (see page 343)
6 Update all server name occurrences in the SHARE:Application_Properties form where the Property Name field has an entry
of Help File Path. (see page 344)
1. Update the server name in the Help File path from the BMC Atrium Integration Engine Console. You can also reset
user name and password if changed. (see page 344)
2. Run REPAI option for aiexfer. (see page 344)
8 Atrium Integrator
1. Update the Host field in the UDM:Config form. (see page 348)
2. Update the Server Name and RAppPassword field in UDM:RAppPassword form. (see page 348)
3. Remove all existing entries from the UDM:ExecutionInstanceform. (see page 348)
4. For the executed jobs, remove the old server entry from the UDM: PermissionInfo form. (see page 348)
5. Change the server name in the Atrium Integrator console. (see page 348)
6. Update the server name in Atrium Integrator Spoon. (see page 348)
7. Update the new server name in Job scheduler. (see page 348)
8. Delete all the schedules and then reschedule the jobs after restoring the database.
9 Update the ARServerName field in the BMC.CORE.CONFIG:BMC_FederatedDataInterface form. (see page 340)
Update the charAISCellHost and iAISCellPort fields in the AIS:GlobalPreferences form. (see page 340)
11 Update the Server field the AST:ARServerConnection form. (see page 341)
12 Update the ARServerName field in the AST:ComplianceARBased_Advanced form. (see page 341)
13 Update the ARServerName field in the BMC.CORE.CONFIG:BMC_FederatedDataInterface form (see page 341).
14 For Atrium Impact Simulator, update the charAISCellHost and iAISCellPort fields in the AIS:GlobalPreferences form. (see
page 341)
Sr. Steps
No
15 Update the Record Server field in the SYS:Escalation form. (see page 341)
16 Update the URL field in the SYS:Attachments form. (see page 341)
(If the out-of-box data for survey is modified by replacing the < arserver> or <midtierserver> placeholders with the host
names, only then change these values to the correct server host name.)
17 Update the Server field in the CAI:AppRegistry form. (see page 345)
18 Update the AppInstanceServer and SRServer fields in the SRM:AppInstanceBridge form. (see page 341)
19 Update the Mid Tier path field in the SYS:System Settings form. (see page 346)
20 Update the Hostname field in the PDL:ApplicationSettings form. (see page 346)
21 Update the Server field in the Configure Advanced Interface Information form. (see page 346)
22 Update the Mid Tier field the SLM:ConfigPreferences form. (see page 341)
23 Update the Host and Port fields in the SYS:Integration Management form. (see page 341)
Use case 2
The following table lists steps for renaming BMC Remedy AR System sever if you are setting up a
staging server by restoring the database first and then installing the new BMC Remedy AR System
environment.
Sr. Steps
No
1 Update the Server field in the AR System Searches Preference form. (see page 340)
2 Update the Server Login List field in the AR System User Preference form. (see page 340)
3 Update the Server field in the Report form. (see page 340)
4 Update the Email Server Name/IP field in the AR System Email Mailbox Configuration form. (see page 343)
5 Update all server name occurrences of each record in the AR System Web Services Registry form. (see page 343)
Sr. Steps
No
Update all server name occurrences in the SHARE:Application_Properties form where the Property Name field has an entry
of Help File Path. (see page 344)
1. Update the server name in the Help File path from the BMC Atrium Integration Engine Console. You can also reset
user name and password if changed. (see page 344)
2. Run REPAI option for aiexfer. (see page 344)
8 Atrium Integrator
1. Update the Host field in the UDM:Config form. (see page 348)
2. Update the Server Name and RAppPassword field in UDM:RAppPassword form. (see page 348)
3. Remove all existing entries from the UDM:ExecutionInstance form. (see page 348)
4. For the executed jobs, remove the old server entry from the UDM: PermissionInfo form. (see page 348)
5. Change the server name in the Atrium Integrator console. (see page 348)
6. Update the server name in Atrium Integrator Spoon. (see page 348)
7. Update the new server name in Job scheduler. (see page 348)
9 Update the ARServerName field in the BMC.CORE.CONFIG:BMC_FederatedDataInterface form. (see page 340)
Update the charAISCellHost and iAISCellPort fields in the AIS:GlobalPreferences form. (see page 340)
11 Update the Server field the AST:ARServerConnection form. (see page 341)
12 Update the ARServerName field in the AST:ComplianceARBased_Advanced form. (see page 341)
13 Update the ARServerName field in the BMC.CORE.CONFIG:BMC_FederatedDataInterface form (see page 341).
14 For Atrium Impact Simulator, update the charAISCellHost and iAISCellPort fields in the AIS:GlobalPreferences form. (see
page 341)
15 Update the Record Server field in the SYS:Escalation form. (see page 341)
16 Update the URL field in the SYS:Attachments form. (see page 341)
(If the out-of-box data for survey is modified by replacing the < arserver> or <midtierserver> placeholders with the host
names, only then change these values to the correct server host name.)
17 Update the Server field in the CAI:AppRegistry form. (see page 345)
18 Update the AppInstanceServer and SRServer fields in the SRM:AppInstanceBridgeform. (see page 341)
19 Update the Mid Tier path field in the SYS:System Settings form. (see page 346)
20 Update the Hostname field in the PDL:ApplicationSettings form. (see page 346)
21 Update the Server field in the Configure Advanced Interface Information form. (see page 346)
22 Update the Mid Tier field the SLM:Config Preferences form. (see page 341)
Sr. Steps
No
23 Update the Host and Port fields in the SYS:Integration Management form. (see page 341)
Use case 3
The following table lists steps for renaming BMC Remedy AR System sever if the server name
changed due to a policy or host name change.
Sr. Steps
No
2 Update the -x <newServerName> string in the armonitor.cfg file. (see page 338)
3 Update the server_name field in the pluginsvr_config.xml file. (see page 338)
6 Update the Server field in the AR System Searches Preference form. (see page 340)
7 Update the Server Login List field in the AR System User Preference form. (see page 340)
8 Update the Server field in the Report form. (see page 340)
10 You must delete records from the ft_pending and ft_schedule tables that do not match the servers in the new server group.
9 Using the BMC Remedy Mid Tier Configuration Tool, update the AR Server Settings, General Settings, and Report Settings.
(see page 341)
11 Update oldServerName with newServerName in the EmailDaemon.properties email server configuration file. (see page 343)
12 Update the Email Server Name/IP field in the AR System Email Mailbox Configuration form. (see page 343)
13 Update the ARServerName property in the server.conf file in the Flashboards folder. (see page 338)
14 Update all server name occurrences of each record in the AR System Web Services Registry form. (see page 343)
15
Sr. Steps
No
Update all server name occurrences in the SHARE:Application_Properties form where the Property Name field has an entry
of Help File Path. (see page 344)
1. Update the AR System server name, user name, and password in the aie.cfg file. (see page 344)
2. Update the server name in the Help File path from the BMC Atrium Integration Engine Console. You can also reset
user name and password if changed. (see page 344)
3. Run REPAI option for aiexfer. (see page 344)
17 Atrium Integrator
1. Update the Host field in the UDM:Config form. (see page 348)
2. Update the Server Name and RAppPassword field in UDM:RAppPassword form. (see page 348)
3. Remove all existing entries from the UDM:ExecutionInstanceform. (see page 348)
4. For the executed jobs, remove the old server entry from the UDM: PermissionInfo form. (see page 348)
5. Change the server name in the Atrium Integrator console. (see page 348)
6. Update the server name in Atrium Integrator Spoon. (see page 348)
7. Update the new server name in Job scheduler. (see page 348)
18 Update the ARServerName field in the BMC.CORE.CONFIG:BMC_FederatedDataInterface form. (see page 340)
Update the charAISCellHost and iAISCellPort fields in the AIS:GlobalPreferences form. (see page 340)
20 Update the Server field the AST:ARServerConnection form. (see page 341)
21 Update the ARServerName field in the AST:ComplianceARBased_Advanced form. (see page 341)
22 Update the ARServerName field in the BMC.CORE.CONFIG:BMC_FederatedDataInterface form (see page 341).
23 For Atrium Impact Simulator, update the charAISCellHost and iAISCellPort fields in the AIS:GlobalPreferences form. (see
page 341)
24 Update the Record Server field in the SYS:Escalation form. (see page 341)
25 Update the URL field in the SYS:Attachments form. (see page 341)
(If the out-of-box data for survey is modified by replacing the < arserver> or <midtierserver> placeholders with the host
names, only then change these values to the correct server host name.)
26 Update the Server field in the CAI:AppRegistry form. (see page 345)
27 Update the AppInstanceServer and SRServer fields in the SRM:AppInstanceBridge form. (see page 341)
28 Update the Mid Tier path field in the SYS:Application Settings form. (see page 346)
29 Update the Hostname field in the PDL:ApplicationSettings form. (see page 346)
30 Update the Server field in the Configure Advanced Interface Information form. (see page 346)
31 Update the Mid Tier field the SLM:Config Preferences form. (see page 341)
Sr. Steps
No
32 Update the Host and Port fields in the SYS:Integration Management form. (see page 341)
Use case 4
The following table lists steps for renaming BMC Remedy AR System sever if you want move
server to server group and want to use new Server-Name alias.
Sr. Steps
No
2 Update the -x <newServerName> string in the armonitor.cfg file. (see page 338)
3 Update the server_name field in the pluginsvr_config.xml file. (see page 338)
6 Update the Server field in the AR System Searches Preference form. (see page 340)
7 Update the Server Login List field in the AR System User Preference form. (see page 340)
8 Update the Server field in the Report form. (see page 340)
10 You must delete records from ft_pending and ft_schedule tables that do not match the servers in the new server group.
9 Using the BMC Remedy Mid Tier Configuration Tool, update the AR Server Settings, General Settings, and Report Settings.
(see page 341)
11 Update oldServerName with newServerName in the EmailDaemon.properties email server configuration file. (see page 343)
12 Update the Email Server Name/IP field in the AR System Email Mailbox Configuration form. (see page 343)
13 Update the ARServerName property in the server.conf file in the Flashboards folder. (see page 338)
14 Update all server name occurrences of each record in the AR System Web Services Registry form. (see page 343)
15 Update all server name occurrences in the SHARE:Application_Properties form where the Property Name field has an entry
of Help File Path. (see page 344)
Sr. Steps
No
16
1. Update the AR System server name, user name, and password in the aie.cfg file. (see page 344)
2. Update the server name in the Help File path from the BMC Atrium Integration Engine Console. You can also reset
user name and password if changed. (see page 344)
3. Run REPAI option for aiexfer. (see page 344)
17 Atrium Integrator
1. Update the Host field in the UDM:Config form. (see page 348)
2. Update the Server Name and RAppPassword field in UDM:RAppPassword form. (see page 348)
3. Remove all existing entries from the UDM:ExecutionInstance form. (see page 348)
4. For the executed jobs, remove the old server entry from the UDM: PermissionInfo form. (see page 348)
5. Change the server name in the Atrium Integrator console. (see page 348)
6. Update the server name in Atrium Integrator Spoon. (see page 348)
7. Update the new server name in Job scheduler. (see page 348)
18 Update the ARServerName field in the BMC.CORE.CONFIG:BMC_FederatedDataInterface form. (see page 340)
Update the charAISCellHost and iAISCellPort fields in the AIS:GlobalPreferences form. (see page 340)
20 Update the Server field the AST:ARServerConnection form. (see page 341)
21 Update the ARServerName field in the AST:ComplianceARBased_Advanced form. (see page 341)
22 Update the ARServerName field in the BMC.CORE.CONFIG:BMC_FederatedDataInterface form (see page 341).
23 For Atrium Impact Simulator, update the charAISCellHost and iAISCellPort fields in the AIS:GlobalPreferences form. (see
page 341)
24 Update the Record Server field in the SYS:Escalation form. (see page 341)
25 Update the URL field in the SYS:Attachments form. (see page 341)
(If the out-of-box data for survey is modified by replacing the < arserver> or <midtierserver> placeholders with the host
names, only then change these values to the correct server host name.)
26 Update the Server field in the CAI:AppRegistry form. (see page 345)
27 Update the AppInstanceServer and SRServer fields in the SRM:AppInstanceBridge form. (see page 341)
28 Update the Mid Tier path field in the SYS:System Settings form. (see page 346)
29 Update the Hostname field in the PDL:ApplicationSettings form. (see page 346)
30 Update the Server field in the Configure Advanced Interface Information form. (see page 346)
31 Update the Mid Tier field the SLM:Config Preferences form. (see page 341)
32 Update the Host and Port fields in the SYS:Integration Management form. (see page 341)
Related topics
Duplicating the production server database for the upgrade in BMC Remedy ITSM Deployment
documentation.
ar.cfg (ar.conf)
In the ar.cfg (ar.conf) file, update the following properties. (You might not need to update all
directory and file path properties, but update any properties that point to AR System servers and
the mid tier.)
armonitor.cfg
In the armonitor.cfg file, replace the old AR System server name with the new AR System server
name in the following string: -x <newServerName>
You will see several lines that contain this string. Edit each occurrence.
pluginsvr_config.xml
In the pluginsvr_config.xml file, the server_name user-defined tag contains the server name for
the following plug-ins. Adjust the server_name value with newServerName.
Typically, when you install the BMC Remedy ITSM Suite, several Java plug-in servers are
installed. Be sure to replace the server_name value for each plug-in server. To find the location of
these plug-in servers, look at the -classpath parameter for each Java command in the armonitor.
cfg file.
server.conf
Find and replace the occurrences of <oldServerName> by <newServerName>.
1. Before changing the services, export the following Registry entries from
HKEY_LOCAL_MACHINE/SYSTEM/CurrentControlSet/Services.
BMC Remedy Action Request System Server - <oldServerName>
BMC Remedy Email Engine - <oldServerName 1>
BMC Remedy Flashboards Server - <oldServerName>
Stop the services of BMC Remedy Action Request System, Email Engine,
and Flash boards before proceeding with the next steps.
2. Create new BMC Remedy Action Request System Server service in the Registry.
a. Open the registry backup of BMC Remedy Action Request System Server - <
oldServerName> taken at step 1.
b. Save this file as BMC Remedy Action Request System Server - <newServerName>.
c. In the same file, find and replace the occurrences of <oldServerName> by <
newServerName>.
d. Save the file.
e. Right-click on the BMC Remedy Action Request System Server - <newServerName>
file and click Merge to update the Windows registry settings.
3. Create a new BMC Remedy Email Engine service in the Registry.
a. Open the registry backup of BMC Remedy Email Engine - <oldServerName 1> taken
at step 1.
b. Save this file as BMC Remedy Email Engine - <newServerName 1>.
c. In the same file, find and replace the occurrences of <oldServerName 1> by <
newServerName 1>.
d. Save the file.
e. Right-click on the BMC Remedy Email Engine - <newServerName 1> file and click
Merge to update the Windows registry settings.
4. Create a new BMC Remedy Flashboards Server service in the Registry.
a. Open the registry backup of BMC Remedy Flashboards Server - <oldServerName>
taken at step 1.
b. Save this file as BMC Remedy Flashboards Server - <newServerName>.
c.
BMC Remedy Action Request System 9.1 Page 339 of 4703
4.
c. In the same file, find and replace the occurrences of <oldServerName> by <
newServerName>.
d. Save the file.
e. Right click on the BMC Remedy Flashboards Server - <newServerName> file and
click Merge to update the Windows registry settings.
BMC SYS:Attachments (If the out-of-box data for Survey is modified by URL 1000002261
Remedy IT replacing the <arserver> or <midtierserver> placeholders with the
Service host names, only then change these values to the correct server
Management host name.)
Updating the configuration with the BMC Remedy Mid Tier Configuration Tool
1. Use the following URL to open the BMC Remedy Mid Tier Configuration Tool:
http://<midTierServerName>:8080/arsys/shared/config/config.jsp.
Replace midTierServerName with your mid-tier server name to form the actual URL in your
case.
The system prompts you for a password (default is arsystem) to open the Mid Tier
Configuration Tool.
2. Update the AR Server Settings.
a.
BMC Remedy Action Request System 9.1 Page 341 of 4703
BMC Software Confidential. BladeLogic Confidential.
2.
a. Click AR Server Settings.
(Click the image to expand it.)
b. Update the following fields with the newAR System server name:
Preference Server(s)
Data Visualization Module Server(s)
Homepage Server
Authentication Server (if you want the mid-tier to use a specific authentication
server)
4. Click AR Server Settings, and delete the old AR System server name.
5. Update the Report Settings.
a. Click Report Settings.
(Click the image to expand it.)
b. If the BOXI/Crystal Report Server 11 Location field is not empty, update the field with
the new BOXI/Crystal server name.
c. Make sure that the Report Working Directory field is pointing to the correct directory.
1.
BMC Remedy Action Request System 9.1 Page 342 of 4703
BMC Software Confidential. BladeLogic Confidential.
1. After you rename the server for the mid tier, stop the Java Virtual Machine (JVM) on which
the mid tier is running.
2. Delete all the contents of the midTierInstallationFolder/cache folder and
midTierInstallationFolder/cachetemp folder (if it exists).
3. Delete the viewStats.dat and viewStats.dat.bak files if they exist under
midTierInstallationFolder/WEB-INF/classes folder.
4. In you are using the prefetchConfig.xml file in midTierInstallationFolder/WEB-INF/classes
folder to precache forms, update the server-name element to the new server name.
5. Start the JVM mid tier.
6. Delete the browser's temporary internet files.
com.bmc.arsys.emaildaemon.servers=<oldServerName>.labs.bmc.com
com.bmc.arsys.emaildaemon.<oldServerName>.labs.bmc.com.TCP=0
com.bmc.arsys.emaildaemon.<oldServerName>.labs.bmc.com.RPC=0
com.bmc.arsys.emaildaemon.<oldServerName>.labs.bmc.com.Language=en_US
com.bmc.arsys.emaildaemon.<oldServerName>.labs.bmc.com.
Password=M7D17cnnrgyyQnLF1RgTctJ6w6xtv+Tzdb9Ag3SdrbBgfgQ6SV54mic6HG/
xtJM1Fyu8FABW/C4h0zOv/rObN3CLl/Y9Y12VVw0ngJe5r+VCyqE5vo95FA==
com.bmc.arsys.emaildaemon.<oldServerName>.labs.bmc.com.Interval=30
com.bmc.arsys.emaildaemon.<oldServerName>.labs.bmc.com.Authentication=
2. In a browser, open the AR System Email Mailbox Configuration form. (This form appears
only if Email Engine is installed.) Go to http://<newServerName>:<port>/arsys/forms
/<newServerName>/AR+System+Email+Mailbox+Configuration/Default+Admin+View/.
3. In the Email Server Name/IP field, enter the new email server's name. (Make this change
only if the actual Email Post Office server has changed.)
Configuring the BMC Remedy AR System Web Services registry to rename the
server
The following procedure describes how to update the server name in the BMC Remedy AR System
Web Services registry.
1. In a browser, open the BMC Remedy AR System Web Services Registry form.
2.
BMC Remedy Action Request System 9.1 Page 343 of 4703
BMC Software Confidential. BladeLogic Confidential.
2. For all occurrences of each record on this form, replace the old server name with the new
server name.
1. Within an administrative Notepad session, open the aie.cfg file, and change the AR System
server name, user name, and password.
Note
To open Notepad as an administrator, choose Start Menu > Accessories > Notepad
, right-click on the Notepad icon, and choose Run as administrator.
2. If you change the user name and password, complete the following steps:
a. From the Services panel, stop the AIE service if it is running.
b. In a web browser, open IT Home, and click BMC Atrium Integration Engine Console.
c. Select Configuration > Integration Engine App.
d. Update the Admin Login Name and Admin Password fields.
(Click the image to expand it.)
e. In the Help File Path field, replace the old AR System server name with the new
name.
f. Click Save.
3. Run the REPAIR option for aiexfer:
a.
BMC Remedy Action Request System 9.1 Page 344 of 4703
3.
The path to the service64 folder might be different, depending on the installation path
chosen for the BMC Suite.
c. Click on Start > Run and enter Services.msc to open the Services MMC.
d. Right-click the BMC AIE Service, and choose Start.
e. Ensure that the BMC Remedy Action Request System service is Started.
f. In a browser, open the AIE Console via the Home Page form. (You must be logged in
as an administrator.)
g. In the left column of the AIE Console, select Integration Engine App.
h. In the dialog box that appears, verify that the user name is an administrator within
your system, and re-enter the password for that user.
i. Click Save and close the AIE Console form.
j. Restart the BMC AIE Service.
To do this, choose Start > Run, and enter Services.msc. Right-click on the BMC AIE
Service entry, and select Restart.
k. In the browser, re-open the AIE Console and verify that you are viewing the Data
Exchange screen.
l. Open each Data Exchange entry and click the Instance drop-down menu.
m. Select the Instance listed, and click Save and Close.
SYS:Escalation
SYS:Attachments (If the out-of-box data is modified by replacing the arserver or
midtierserver placeholders with the host names, only then change these values to the
correct server host name.)
Note
Some forms might not be available (depending on the BMC Remedy IT Service
Management installation).
2. In the Mid Tier Path field, replace the mid-tier server name with the new mid-tier server
name and the port number (for example, newMidTierServerName:8080).
3. Update the server name in the PDL:ApplicationSettings form.
a. In a browser, open the PDL:ApplicationSettings form.
(Click the image to expand it.)
a.
BMC Remedy Action Request System 9.1 Page 346 of 4703
4.
BMC Software Confidential. BladeLogic Confidential.
Note
For existing service request records, when a user views the Process View tab
under Service Request Details, the URL for the fulfillment application (see the ID
field in the following screenshot) will refer to the old server name specified in the
CAI Application Registry. Consequently, the URL will not work. The URL cannot be
updated, so the user must open the corresponding fulfillment application manually.
New service requests (submitted after the server name was changed) will pick up
the updated CAI Application Registry server name, and the URL will work
correctly.
You need to update the new server name at the following locations:
d.
BMC Remedy Action Request System 9.1 Page 348 of 4703
BMC Software Confidential. BladeLogic Confidential.
d. In the Explorer pane click Database connections> <old server name>. Database
connection dialog box is displayed.
Restricting attachments
Use the Attachment Security tab in the AR System Administration: Server Information form in the
BMC Remedy AR System Administration Console. You must be logged on as an administrator to
perform this procedure.
To restrict attachments
1. In a browser, open the AR System Administration Console, and click System > General >
Server Information.
The AR System Administration: Server Information form appears.
2. Click the Attachment Security tab as shown in the following figure:
AR System Administration: Server Information form — Attachment Security tab
(Click to expand the image.)
3. Enter the attachment options that you need, and click Apply.
The following table describes the available options:
Attachment
criteria Include all attachments — No restrictions on uploading attachments
Allow attachments with following extensions — Upload attachments with extensions listed in Comma
separated list of limit extensions.
Disallow attachments with following extensions — Do not upload attachments with extensions listed in
Comma separated list of limit extensions. All other attachments are allowed.
Comma Attachment extensions that are allowed or not allowed, based on the Attachment criteria selected.
separated
list of limit
extensions
Attachment The list of Form names (field ID) for which attachment limitations do not apply—for example, Data Visualization
exception list Module(3450298).
If the user uploads any attachment in the form fields specified in attachment exception list, these fields are not
validated and the attachments are uploaded without verification in the fields.
Attachment Name of the custom validation plug-in that you developed for verifying attachments.
validation
The custom validation can perform any function per your requirements. You can develop the plug-in for
plugin name
performing functions like verifying the attachment containing malicious content, verifying whether the attachment
is a virus, verifying whether the user has changed the extension for uploading the attachment, and so on.
If you are using a C plug-in, add the .dll/.so path in the ar.cfg or ar.conf file in the following format to load the plug-
in: Plugin: <CompletePath>/myplugin.dll
The custom validation plug-in should be a Filter API Plug-in, which has only one API. Following is the prototype
for the API:
Attachments flowchart
The following flowchart helps you understand the attachment security based on the options that
you select from the Attachment criteria list.
Comma doc xls jpg doc xls jpg gif doc xls jpg gif doc xls jpg gif exe dll db exe dll db
separated gif
list of limit
extensions
example.jar (JAR
File field on Data
Visualization
Module form)
Status File is File is attached. File is attached. File is not File is attached. File is not
attached. The JAR File field Its extension is attached. Its Its extension is attached. Its
All ID is added to the on the list of extension is not not on the list of extension is on
attachment attachment permitted on the list of disallowed the list of
options are exception list. extensions. permitted extensions. disallowed
permitted. extensions. extensions.
Disabling views
You can also restrict users from viewing the content of certain types of files. Use the Attachment
Security tab in the AR System Administration: Server Information form in the BMC Remedy AR
System Administration Console. You must be logged on as an administrator to perform this
procedure.
1. In a browser, open the AR System Administration Console, and click System > General >
Server Information.
The AR System Administration: Server Information form appears.
2. Click the Attachment Security tab, shown in the following figure
AR System Administration: Server Information form — Attachment Security tab
(Click to expand the image.)
3. Enter the display options that you need, and click Apply.
The following table describes the available options:
Display criteria
Allow display of all attachments — Users can view all the attached files by clicking the Display
button in the Attachments pool.
Allow display of attachments with the following extensions — Users can view attached files that
have extensions specified in Comma separated list of display extensions.
Disallow display of attachments with the following extensions — Users cannot view attached files
that have extensions specified in Comma separated list of display extensions. All other attachments
are allowed.
Disallow display of all attachments — Users cannot view any attachment.
The display criteria are applied to all the existing extensions in the BMC Remedy Mid Tier application.
Comma separated Lists the attachment extensions that you want to allow or not, based on Display criteria.
list of display
extensions
For any particular attachment that you want to view, the Display button in BMC Remedy
Mid Tier or the Display menu command in the BMC Remedy User Tool is enabled only if
Display criteria enables you to view that attachment. For all other attachments, the Display
button or menu command is dimmed.
The AR System server adds exception logging, where API and SQL performance exceptions are
recorded in a new log file, arexception.log.
Finding out which calls are causing delays can help you troubleshoot performance issues.
For details about the performance exception logging feature, see Exception Logging (see page 357)
.
1. On the AR System Administration: Server Information form, click the Server Statistics tab.
Field Description
Enable When selected, displays API and SQL events in the console when an automatic save is triggered (by the time
Console specified in the Auto Save and Purge Interval (min) field) and when you click one of the Save buttons:
Display
Save Completed API
Save Completed SQL
Save Pending API
Save Pending SQL
This is a debugging aid that is available if you are running the server from a command window. (This option is not
available when you are running the server on Windows as a service because there is no console.)
Enable When selected, enables exception logging, where all API and SQL calls that exceed the value specified in the
Exception Minimum Elapsed Time (mSec) field are immediately written to the arexception.log file.
Logging
Number of Defines the maximum number of completed longest operations that can be saved in memory. The number applies
Saved to both API and SQL lists of operations.
Operations
The default is 20. If you decrease this number, you must restart the server for the change to take effect. (A restart
is not required if you increase the number.) Although 20 is the recommended value to control the overhead of
statistics management, you can increase this number up to 100.
Auto Save Defines the interval (in minutes) for when the longest operations saved in memory are flushed to the
and Purge corresponding forms in the database and then purged.
Interval
The default is 0 (no interval); no automatic save and purge are performed. If you change the interval, the new
(min)
interval is used if it is less than the time remaining for the old interval. Otherwise, the new interval is used after the
current interval expires.
Minimum Sets the minimum duration of the longest API and SQL events saved in the memory buffer in milliseconds. Any
Elapsed event shorter than this value is discarded.
Time (mSec)
If an event is at the minimum or a greater number of milliseconds, it qualifies to be saved. Consequently, if the
event is not one of the longest operations in the list, it is not saved. (The maximum is defined by the Number of
Saved Operations field.)
The default is 5,000 milliseconds. If you enter 0, all events (up to the limit set in the Number of Saved Operations
field) are saved.
1. On the AR System Administration: Server Information form, click the Server Statistics tab.
2. Click the appropriate button for the type of statistics you want to gather:
Save Completed API
Save Completed SQL
Save Pending API
Save Pending SQL
The Save Pending API and Save Pending SQL buttons record the API calls and SQL
commands that are currently in process. In-process events are not subject to the Minimum
Elapsed Time setting.
The Save Completed API and Save Completed SQL buttons record the longest API and
SQL operations that are currently saved in memory. After flushing to the corresponding
forms in the database, the currently saved operations are cleared from memory.
3. To view the results:
a. Open the appropriate form by entering one of the following URLs:
http://<midTierServer>/arsys/forms/<ARSystemServer>/Server Statistics:
Longest APIs
http://<midTierServer>/arsys/forms/<ARSystemServer>/ Server Statistics:
Longest SQLs
b. Enter search criteria, and click Search.
Field Contents
API name Text name of the API associated with the event (or INTERNAL)
Result Error code that resulted from the event. If there is no error, 0 is the error code.
Code
Server Name of the server where the event occurred. All servers in a server group share the same form.
Name
Parameters (API only) Additional details about the API call (for example, the form name on entry-related calls)
SQL (SQL only) First 1,000 characters of the SQL command issued to the database
Command
Extended If the API parameters or SQL command exceed 1,000 characters, the entire string is contained in this field.
Data
Elapsed Time (in milliseconds) required to complete the event. For SQL events, this time represents the statement
Time execution only. It does not include any subsequent record retrieval time.
(mSec)
Client Type Text name of the type of client used to send the API (or Unidentified Client)
(API only) Time (in milliseconds) in the thread queue before processing started
Field Contents
Queue
Delay
(mSec)
Create Date and time the entry was added to the form (not the event time)
Date
Exception Logging
The BMC Remedy AR System server adds exception logging to the API and SQL server statistics
feature. This feature provides additional options for managing API and SQL performance
statistics. The key additions are:
A new log file, arexception.log, is the repository for all exception-logging activity. The
arexception.log file is managed like the arerror.log file.
API calls that reach the server and are not completed before the client times out are logged
to arexception.log. A client timeout server event is also available that allows client timeouts
to be detected through server workflow.
API and SQL calls that exceed the defined minimum time threshold are logged immediately
to arexception.log if the exception-logging option is enabled.
You enable exception logging for the performance statistics feature on the Server Statistics tab of
the Administration Server form by selecting Enable Exception Logging in the API/SQL Performance
Tracking form.
For more information about the API/SQL Performance Tracking form, see Setting server statistics
options.
arexception.log contents
Like the arerror.log file, the arexception.log file is created automatically with no options for its name
or location. Log lines are always appended to arexception.log, and the file does not have an
artificial size limit. The AR Server version string is written to arexception.log every time the server
starts up.
Logging Messages
The format of the exception log is similar to the arerror.log file in that each entry starts with a
message, followed by supporting information. A message is tagged as an ARNOTE. The following
messages are used in exception logging:
The threshold value for long-running API and SQL calls is specified in the Minimum Elapsed Time
field of the API/SQL Performance Tracking form. The threshold value is shared with the
performance statistics feature, with a default value of 5,000 ms (5 seconds).
1. Pre-execution check
This occurs when an API has just started being processed by the thread assigned to the call, and
the call is not one that performs updates. This check ensures that the call has not already spent all
of its time in the Dispatcher queue and that it does not start performing any work when the client is
no longer waiting. This type of call is logged as a failure, because the server records an error in the
status. For example:
2. Post-execution check
This occurs when the call is completed and the API performance statistics have been gathered.
This type of call is logged as a success or failure depending on what occurs when the call runs.
There are two variations of this occurrence:
An API call with no SQL identified as the root cause of the timeout -- If multiple SQL
statements within the API exceed the client timeout by themselves, only the first and most
important SQL statement is included.
An API call with an SQL statement that exceeds the client timeout value - -If multiple SQL
statements within an API each contribute to the excessive overall time, but none in particular
exceed the client timeout, no SQL statement is included. Diagnosing this case still requires
full API/SQL/filter logging.
The following figures show examples of the two cases. The first shows an API call with no SQL,
and the second shows an API call with an SQL call that exceeds the client timeout:
Standalone SQL
The following example shows a typical logging sequence for an SQL call with no associated API
call:
API call
An API call that exceeds the threshold without any corresponding SQL looks like this:
You enable server event support for client timeouts by selecting Client Timeout on the Server
Events tab of the Admin Console:
The information provided in the Server Event form is tailored to notifications, with fields that can be
easily used in the qualification and as substitution parameters in the notification text. For more
information, see Types of events you can record and Viewing client timeout server event details
(see page 1816).
Important
This section describes the configuration procedures required to change the server name
of a BMC Remedy Action Request System (BMC Remedy AR System) server when you
upgrade from version 9.0 or later.
For more information on configuration procedures to change the server name of BMC
Remedy AR System server for versions earlier than 9.0, see Changing a server name
when using a duplicated or migrated environment (see page 329). (see page 363)
You must scan for AR System server names and rename servers in the following circumstances:
Use the BMC Remedy AR Server Rename utility to rename an AR System server and to ensure
that the server name used by the mid tier and the AR System server is the same.
This topic explains how to use the Rename utility to scan for and replace the server name:
1. Replace the server name in the database. In a server group environment, perform this
operation only on the primary AR System server.
2. Replace the server name in files. In a server group, perform this operation on all servers in
the server group.
3. (Windows only) Replace the server name in the Windows Services and Registries. In a
server group, perform this operation on all servers in the server group.
4. Restart your computer. In a server group, restart the computers on which the primary and
secondary servers are running.
arsrename
[-u] [-p] [-a] [-x] [-t] [-timeout]
[-o] [-tokens] [-f] [-fsf] [-fsv] [-ie] [-ief]
The following table describes the arsrename command options, which can be used in any order
in the command.
Option Description
-u Name that identifies the user account for the AR System server
If the user account has no password, use -p "". You can ignore this parameter if the password is empty or blank.
This option is related to the Login window's Authentication field. See Authentication String Alias introduction (see
page 1319).
- Time, in seconds, during which the connection must occur, specified in the following format:
timeout
-timeout Normal:Long:XLong
Option Description
Note: You must specify all three values even if you want to set a single timeout value.
For example, if you want to set the Long timeout value to 600 seconds, use the following command:
-timeout 120:600:1800.
-o Operation code:
1—Scan
-f File path of the CSV file that contains the list of forms and fields for token replacement (required if your operation
code is 3)
While performing a scan operation, use the -f parameter to generate the output CSV file. While performing a
replacement operation, use the -f parameter to pass the input CSV file.
Valid values:
0—Do not use inclusion-exclusion list
1—Forms specified in the list are scanned along with other forms
2—Only the forms specified in the list are scanned
If the path is not specified or if the value of the -ie option is 1 or 2, the default text file available in the
ARSystemInstallationFolder\ARSystem\artools\etc\arsrename folder is used.
The output of the scan operation is a CSV file (output.csv) that displays the results of the scan as a
table consisting of the information shown in the following figure and described in the subsequent
table:
output_csv.png
Column Description
Name
Form name Name of the regular form in which the AR System server name is found
Field ID ID of the character field in which the AR System server name is found
Is Partial (Y Flag that indicates whether the field contains a partial or a complete string of the server name:
/N)? Y—Partial string
N—Whole string
Merge (Y Flag that indicates whether the scanned server name is to be replaced or not; this value is referred to during the
/N)? replace operation
Y—Standard field
N—Custom field; not replaced during replace operation
If you want even the custom fields to be replaced, you must enter Y in the column for the custom field whose
server name value you want to replace.
Special (Y Flag that indicates special handling required during the replace operation
/N)?
Tip
You can use the output generated by the scan operation directly as input for the replace
operation, which replaces the server name in database.
Examples
Use the following command to perform a fast scan for 5,000 entries:
Use the following command to scan only the forms listed the inclusion-exclusion list (a
text file) available at the specified path:
The following sample code shows the format of the inclusion-exclusion list:
#--Inclusion list
#----the following qualification is for fetching outgoing messages that are sent
#----The following qualification scans only those SRDs which are not closed.
i,SRM:Request,'7'!=9000
#--Exclusion list
e,ServerStatistics
Format Description
Archive forms
Audit forms
Reserved fields on any regular forms
Core fields with field IDs ranging from 1 to 99 (except field ID 8)
Distributed Server Option (DSO) fields with field IDs ranging from 300 to 322
Dynamic groups with IDs ranging from 60000 to 60999
Special fields
112 (Access control)
179 (GUID)
160 (Locale)
Notes
The input.csv file contains the information required to replace the server names in
a tabular format with the same columns as the output.csv file.
Use the input.csv file if you have not done any customizations to get the server
name in any base field, overlay, or custom field.
Warning
In the input.csv file, delete the rows that contain these form names.
The replace operation replaces only those forms or fields that have a Merge flag set to Y in the
input.csv file. To handle special cases, specify Y in the Special (Y/N?) column of the input.csv file.
As an example, use the following command to replace the onbmc-s string with tenant1-onbmc-s:
BMC Remedy AR
System Server AR_SERVER_HOME\ARSystemInstalledConfiguration.xml
AR_SERVER_HOME\conf\ar.cfg
AR_SERVER_HOME\conf\armonitor.cfg
AR_SERVER_HOME\AREmail\EmailDaemon.properties
AR_SERVER_HOME\flashboards\server.conf
AR_SERVER_HOME\pluginsvr\pluginsvr_config.xml
AR_SERVER_HOME\pluginsvr\fts\primary\pluginsvr_config.xml
AR_SERVER_HOME\pluginsvr\fts\secondary\pluginsvr_config.xml
AR_SERVER_HOME\diserver\.kettle\arservers.xml
C:\Windows\System32\drivers\etc\hosts
C:\Program Files\Common Files\AR System\Licenses\server_HostName
If the name of the folder contains the server name, the folder name is replaced. In the
preceding example, the folder name server_HostName gets replaced.
Services
BMC Remedy Action Request System Server server_HostName
BMC Remedy Email Engine - server_HostName 1
BMC Remedy Flashboards Server - server_HostName
Registry entries
HKEY_LOCAL_MACHINE\SOFTWARE\Remedy\ARServer\server_HostName
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Remedy\server_HostName
Examples
Use the following command to replace a server name that contains the onbmc-s string
with tenant1-onbmc-s in AR System and other files:
Use the following command to replace a server name that contains the onbmc-s string
with tenant1-onbmc-s in the Windows services and registry entries:
Notes
The Rename utility changes the server name in the configuration files, property
files, and XML files. The utility does not change the data in the archive (.arx) files.
Before you run the command to replace server names in the files, ensure that the
following environment variables are defined:
ATRIUMCORE_HOME = D:\BMCSoftware\BMCAtriumCore
BMC_AR_SYSTEM_HOME = D:\BMCSoftware\BMCARSystem
BMC_REMEDY_ITSM_SUITE_HOME = D:\BMCSoftware\BMCITSM
BMC_SERVICE_REQUEST_MANAGEMENT_HOME = D:
\BMCSoftware\BMCSRM
BMC_SLM_HOME = D:\BMCSoftware\BMCSLM
BMC_RKM_HOME = D:\BMCSoftware\BMCRKM
If any of these environment variables is not defined, the server name in the files is not
replaced.
Note
Shut down the BMC Atrium Integration Engine before running the Server Rename utility.
Using the operation code 5 available in the AR Server Rename utility, you can call the aiexfer.exe
utility to repair server name references. The server name passed to this command is the newly
renamed server.
For example:
Now, the Always On Logging option helps you to reduce, and in some cases, eliminate the need to
enable logging. This option allows BMC to immediately perform an analysis and in some cases,
provide a root cause of the failure without having you to enable the logging and wait for the
problem to reoccur. The Always On Logging option helps you identify the root cause of issues
faster and also helps in improving the support for BMC Remedy AR System server.
Enabling the Always On Logging feature logs several types of information. To understand the
different types of log information, see Types of logs . For BMC AR System server, t he Always On
Logging option is enabled by default and is initiated when BMC Remedy AR System server starts.
You can manually enable or disable the option, if required.
Important
For some instances, you may still have to generate additional log files.
Always On Logging option may utilize 5% to 10% excess CPU depending on the
usage of the system. If CPU utilization is around 90%, consider adding extra CPU
capacity.
The size of the allocated buffer impacts heap available for rest of the process. If
you want to increase the buffer size while Always On Logging is enabled, increase
the maximum heap size by the same amount. The usage of heap memory might
increase temporarily. However, the heap size will reset to the original usage after
garbage collector reclaims the unused memory.
You can also enable the Always On Logging option from an user interface. The following video
walks you through the Always On Logging feature.<p> </p>
https://www.youtube.com/watch?v=sklqnVk3l7k
1. In a browser, open the AR System Administration Console, and click System > General >
Server Information.
The AR System Administration: Server Information form appears.
2.
BMC Remedy Action Request System 9.1 Page 372 of 4703
BMC Software Confidential. BladeLogic Confidential.
3. In the Always On Logging tab, specify the desired values for the given fields:
a. In the File Name field, enter the log file name along with the location path.
b. In the BufferSize (byte) field, enter the log size (in bytes). The default file size is 5MB.
Important
If you configure the size to 0 MB, the Always On Logging option gets
disabled.
c. In the Errors Triggering Log field, enter the required error code . You can enter
multiple error codes separated by a semicolon. The log file will record all the
information related to the specified error codes. For more information on error codes,
see BMC Remedy AR System error messages (see page 4310).
d. In the Maximum Backups field, enter the number of backup files that you need to
store.
4. Click Apply.
5. Click Ok.
Note
You can use the Save to File button to generate logs as and when desired. You need not
wait for an error to occur and a log file to be generated. The Save to File button can be
safely used to monitor the progress/performance of BMC AR System server.
Important Considerations
The Always On Logging option ensures the following:
A minimum set of logs is always available either on-demand or at the time of an issue like a
server or an operation failure.
If you have not enabled the server-side logging and the BMC Remedy AR System server
failure occurs or any other server related issues occur, the Always On Logging option
provides a snapshot of the most recent activity in the server. This snapshot is saved into a
file for review and analysis.
In a server group environment, ARGetServerInfo (GSI) having the operation number 430
saves the logging information for all the servers in the group. The logging information is
saved for the server, its plug in server contents, and the thread stack traces of all the
processes associated with the respective server.
If the BMC Remedy AR System server failure occurs, it automatically takes a snapshot.
Alternatively, you can also manually trigger a snapshot for other events.
The Maintenance Utility Log Zipper also collects these logs. You can dump the log file and
use the Log Zipper to send a single zip file.
Note
The BMC Remedy AR System server automatically runs the Always On Logging
option. Logging information using this option is independent of the existing logging.
The Always On Logging option does not save the log file information for ordinary
shutdown options like arsystem stop or a Microsoft Windows stop service.
When you enable the Always On Logging option, the logging information is saved on the following
conditions:
1. On Demand: You can choose when to save the log information as required. This is
applicable to server group environments as well.
2. On Error condition : This option checks if the error exists in the configured error list and
only then save the buffer content in a log file. In a server group environment, logging
information is saved on the server on which the error occurred.
Note
The size of the log file will not be same as the specified buffer size. The actual size of the
generated log file will be approximately half the size of the specified buffer size. For
example, if you specify the buffer size as 5MB, the log file generated will be roughly
around 2.5MB.
Related topics
To enable Always On Logging for plug-in server, see Setting plug-in server options (see page 397).
To ensure high availability of BMC Remedy AR System operations, you can set up a server group
to provide failover protection by assigning rankings to servers in the group for specific BMC
Remedy AR System operations. Servers in a server group can provide failover protection for the
following functions:
Administrative operations
Archiving
Assignment Engine
BMC Atrium CMDB
BMC Atrium Integration Engine
BMC Remedy Approval Server
BMC Remedy Distributed Server Option (DSO)
BMC Remedy Email Engine
BMC Remedy Flashboards
BMC SLM Collector (a component of BMC Service Level Management)
Business Rules Engine (a component of BMC Service Level Management)
Escalations
Full Text Indexing
Reconciliation Engine
A server group can also provide ease of administration because it has only one database to
manage and back up. In addition, AR System servers that belong to a server group share all
licenses except BMC Remedy AR System server licenses. One server in the group is designated
as the administrative server. When you change workflow and applications on this server, the
changes are automatically propagated to other servers in the group.
You can also configure specific servers in the group to handle reporting, reconciliation, and other
tasks that can impact performance, freeing up the remaining servers in the group to handle user
traffic.
A server group can provide load balancing for heavy user traffic. You can use a hardware load
balancer with a server group to direct user traffic to some or all servers in the group. See
Configuring a hardware load balancer with BMC Remedy AR System (see page 524).
Server group functionality is not supported for multiple servers on one computer, and servers
earlier than release 6.0 are not compatible with server groups.
Note
You can set up two or more AR System servers to share the same database without
making them members of a server group. In this case, failover protection is not available,
but you can manually configure the servers to provide load balancing and other scaling
operations. See Sharing a database without using a server group (see page ).
The following topics provide detailed information about how to configure server groups:
Checking server group status and reporting status generates a certain amount of database traffic,
so you should tune this setting to balance the time to failover against the frequency of posting the
check and query to the database.
3. In the Check Interval field, enter how often you want the server to identify itself and check
the status of other servers in the group.
Values are:
Default — 60 seconds
Minimum — 30 seconds
Maximum — None
If you change this value after a server group is running, you must restart all the AR
System servers.
The information shared between servers in the group includes:
The current server's own status
Whether any server is delinquent
The parameters needed for sending signals
Information about operational responsibilities
For more information, see Setting failover rankings for servers and operations (see
page 378).
4. Click OK.
5. Restart each server in the server group.
When the form is created, it is populated with default entries and the first server added to the
server group is assigned the primary ranking for all operations. The remaining server group
members have null (empty ranking) entries, serving as placeholders. Entries for operations that
require a license (for example, DSO) are not pre-populated unless a valid license is detected. You
can add these operations at any time.
Note
Remove the default entries for operations that do not run in your environment.
Operation rankings
The fields named Operation, Server, and Rank work together to define which server is the primary
server for the operation, which server takes over if the primary server fails, and so on.
Note:
The E-Mail Engine entry in the AR System Server Group Operation Ranking form is no
longer used. If this entry exists, it is ignored by AR System Server. Email Engine failover
is handled by the service failover operation. For more information, see service failover
(see page 1235).
The servers for any one operation are ranked lowest to highest. A value of 1 indicates the
server chosen first to perform the operation. The next highest value indicates the server that
takes over the operation if the first server fails, and so on.
Ranking numbers do not need to be consecutive.
If a value is null, the server ignores the entry.
If an operation has no server designated with a valid rank, it is not run on any of the servers
in the group.
Avoid assigning two servers the same ranking for the same operation. (For ease of
configuration, the form enables you to do this temporarily.)
Operations can be spread freely across different servers, with the exception of operations
involving BMC Remedy Approval Server, BMC Atrium CMDB, and the BMC Service Level
Management engine (labeled Business Rules Engine in the form). These operations must
reside on the same server as the administration operation; therefore, the operations must
have the same ranking as the administration operation so that they move as a unit.
If you are implementing full text search (FTS), an additional restriction for multi-platform
server groups exists. The Administration and Full Text Indexing operations must be
restricted to server group nodes that can have a compatible directory structure for the
Search Server configuration files.
1. In a browser, log on as a user with Administrator privileges to any server in the group.
2. Open the AR System Server Group Operation Ranking form in search mode.
http://<midTierServer>:<portNumber>/arsys/forms/
<ARSystemServer>/AR+System+Server+Group+Operation+Ranking/
3. Perform an unqualified search to see the entries in the form.
4. Modify entries as required to construct a fail-over hierarchy for ownership of operations.
5. Save the AR System Server Group Operation Ranking form.
6. Restart all the AR System servers in the group.
Note
Refresh Ranking allows you to save your changes without restarting the AR System
server.
Delinquent threshold
The Delinquent Threshold field determines the number of times the specified server can miss
reporting its status before the next server in the ranking takes responsibility for the operation. This
setting works together with the Check Interval to determine the total time to failover for any
operation.
Note
For Java servers, arsignald process is not used for communication in a server group.
JMS message
When a server needs to communicate with the other servers in the group to process a request, the
following actions occur:
Sever sends JMS to the coordinator server for the specific request.
The coordinator server fetches information from the ranking form about the servers that
need to be notified.
The coordinator server sends JMS message to notify the servers to process the request.
This type of communication is used in operations such as Full Text Search (FTS), application
pending messages (for example, Approval, Atrium Integrator).
For more information on the AR System Server Group Operation Ranking form, see Setting failover
rankings for servers and operations (see page 378).
Example
Consider a server group with three servers, S1, S2 (coordinator server), and S3.
When performing an FTS operation, suppose a user creates an entry with FTS fields, which is
picked by server S1, a non-FTS sever. Sever S1 then sends JMS to the coordinator server S2.
Sever S2 checks the ranking form and notifies server S3 to process the operation.
License release
JMS messages are also used to notify servers when a user logs out, releasing a fixed or floating
license on a server in the server group. Set the Suppress-Logoff-Signals parameter in Centralized
Configuration to False. This ensures that when a user logs off from a server in a server group,
other servers are notified about it, and the license is released back to the license pool.
Heartbeat mechanism
The heartbeat mechanism enables a server to determine the active status of all other servers in a
server group. Each server in the group updates the servgrp_board table in the database to notify its
availability. Heartbeat mechanism is also used during the startup of the server or when a new
server is added to the server group.
For more information on servgrp_board table, see Table support for server group tables (see page
1973).
As events occur within AR System that cause data to be indexed, the AR System server sends a
message to FTS Indexer which then adds, deletes, or updates data within the index. Other events
could include a request to search the index.
If AR System server is not the indexer in a server group, the AR System server sends the search
request to the FTS plug-in which is running under remote FTS plug-in server on the indexer server
(where the index exists). The remote FTS plug-in server returns the search results to AR System
server and then the AR System server processes the data accordingly.
If AR System server is the indexer, it performs the search requests locally in the index and then
returns the search results to the client.
When you configure a server group for FTS, ensure that the following conditions are met:
The required number of servers are designated as FTS indexing servers in the server group.
The FTS indexing server is the AR System server that also has the FTS collection and conf
directories located on a local disk.
The FTS indexing server hosts a FTS plug-in server for serving the search requests from
the remote AR System servers that are not designated as indexer server.
You can designate a server as the FTS indexing server by ranking it in the AR System Server
Group Operation Ranking form. For more information, see Setting failover rankings for servers and
operations (see page 378).
FTS uses only one plug-in server as the reader (searcher). The reader plug-in is installed on the
FTS indexing server. Only the designated indexing FTS server has a ranking entry in the AR
System Server Group Operation Ranking form. This AR System server acts as FTS indexer and
FTS searcher for local search requests. The reader (searcher) FTS plug-in server serves as the
searcher for all the other AR System servers in the server group that are not designated as
indexing server, so you must configure all other non-indexing servers to connect to the searcher
FTS plug-in server instance running on the FTS indexing server. The searcher instance runs on a
separate port on the FTS indexing server.
The events that cause data to be written to the index result in data being put into the AR System
database as a queue of items to index. Only the FTS indexing server processes index requests
from this queue. However, any instance of AR System server can send a search request to its
corresponding FTS plug-in. This ensures index integrity. For more information, see FTS plug-in
configuration (see page 762). There is no search fail-over for the indexer AR System server.
Each FTS indexing server has its own virtual queue of data to index. When AR System queues
data for indexing in parallel to AR Database changes in data, it queues separately for each FTS
Indexing server as designated by the Server Group Ranking form for FTS.
In a server group, the server that owns the full text indexing operation processes all pending
indexing tasks regardless of their server of origin. (The other servers have read-only access to the
index files.)
FTS is configured after all servers in the group have been installed and configured to run within a
server group. It is recommended that the FTS collection directory and the FTS configuration
directory be located on the same computer.
1. Rank the FTS servers in the AR System Server Group Operation Ranking form. For more
information, see Setting failover rankings for servers and operations (see page 378).
Note
You should use the FTS indexing server, which is ranked 1 in the AR System
Server Group Operation Ranking form, for searching and the other FTS indexing
server, which is ranked 2, as the failover server.
2. In a browser, open the BMC Remedy AR System Administration Console, and click System
> General > FTS Configuration.
3. Complete the form as per FTS Configuration form in the AR System Administration Console
(see page 584).
Related topics
In a BMC Remedy AR System environment with load balancing or multiple servers, a DSO server
process runs on each server, but only one process actively distributes data. The configuration
needed to support DSO fail-over is limited to modification of the distributed mappings to indicate
that any server in the server group can act as the source server.
To configure DSO for load balancing, you must configure multiple servers to use a single database
(in addition to configuring the hardware load balancer). To do this, a server group is used. In a
server group, you can use DSO to provide automatic fail-over capability for transfer operations
typically restricted to one server. You do this by creating a distributed mapping and then specifying
that transfers can be initiated from any server in the group. See Creating distributed mappings (see
page 1756).
For example, as illustrated in the following figure, you can transfer copies of a request to other
servers and ensure that any changes made to the copies are also made to the original request.
The way that you define the processes for transferring information is similar to the way that you
define business processes for an application. First, managers at each site must agree on what
information to transfer from one application to another, what conditions drive transfers, and which
sites control the ability to update a record. An administrator at each site then uses DSO to
implement these decisions.
Note
To configure DSO in a server group environment, you must specify a server group name.
Log on to the primary server, and perform the following steps:
1.
BMC Remedy Action Request System 9.1 Page 385 of 4703
BMC Software Confidential. BladeLogic Confidential.
Related topics
DSO for load balancing (see page 576)
Enabling DSO on an AR System server (see page 569)
If multiple email engines are configured for the server, each engine must have a unique RMIPort.
For a multiple email engine configuration, use semicolons to separate the RMIPort numbers:
Server-Group-Email-Admin-Port: 2020;2030;2040
This enables the server to communicate email administration information to BMC Remedy Email
Engine during server group processing. When multiple port numbers are specified, the server
sends the same information to each port number.
Check this video to see how to better use Email Engine in a server group environment for High
Availability.
https://youtu.be/UwWbb7s1ECM
When a computer failure or BMC Remedy AR System failure occurs, the active BMC Remedy
Flashboards server on that computer also shuts down. In this case, an associated BMC Remedy
AR System server detects the shutdown and activates a backup BMC Remedy Flashboards server
in the same group. When the computer becomes active, the BMC Remedy AR System server
reactivates the first BMC Remedy Flashboards server and deactivates the backup server.
However, when a BMC Remedy Flashboards server fails on a host on which an BMC Remedy AR
System server is still functioning correctly, the BMC Remedy AR System server cannot detect the
failure and cannot activate the backup server.
Note
If a BMC Remedy Flashboards server and an BMC Remedy AR System server are
part of the same group, they must be installed on the same computer.
See Updating configuration settings by using the AR System Configuration Generic UI form (see
page 1233).
This enables the server to communicate flashboards administration information to the flashboards
server during server group processing.
To do this, you can connect to the server by using the unique server name rather than the load
balancer name (which is the same as the common server name alias for the group).
To ensure that the server recognizes references to itself as the current server while designing
workflow and applications, add the IP Name setting to the configuration file. This setting indicates
to the server that any of a given set of server names is recognized as the current server. You might
need to designate a short name and a long name for each server as shown in the following
example:
IP-Name: serverA
IP-Name: serverA.remedy.com
If BMC Remedy Developer Studio used either of these server names to log in, that server is
recognized as the current server in workflow.
For a server group, you can disable archiving on all the servers except one if you want archiving to
take place on only one server. To do this, configure the server group in the AR System Server
Group Operation Ranking form to make sure that only one server performs the archiving operation.
1. Open the AR System Administration: Server Information form, and click the Log Files tab.
2. Select the logging to use:
For server group logging, select the Server Group Log check box.
For arsignald logging, select the ARSIGNALD Log check box.
3. Enter a path for each log file if you do not want to use the default paths.
4. Click OK.
1. Open the AR System Administration: Server Information form, and click the Server Events
tab.
2. Select the Server Group Actions check box.
3.
BMC Remedy Action Request System 9.1 Page 388 of 4703
BMC Software Confidential. BladeLogic Confidential.
3. Click OK.
Note
1. Open the AR System Administration: Server Information form, and click the Configuration
tab.
2. Clear the Server Group Member check box.
3. Restart the server.
1. Open the AR System Server Group Operation Ranking form, and remove all the entries for
the server name.
2. Restart one of the servers in the server group.
The server that you restarted removes all the server group references for a server that does not
have any ranking entries.
This approach can be sufficient for managing performance. For example, you can use a shared
database in an environment where the user traffic all goes to one AR System server. In this
scenario, you can use another server on the same database to handle tasks such as reporting or
reconciliation, which can have a performance impact on the AR System server.
When you share a database without using a server group, you must designate one server as the
administrative server by disabling administrative functions on the other servers sharing the
database. Also note that specific services can only be running on one system at a time, and in
some cases, additional configuration is required to manage them (that is, escalations need to be
disabled on all but one server and the assignment engine should only run on one server).
To share a database between AR System servers without using a server group, perform the
following installation and configuration steps:
During installation
Select the Overwrite or Upgrade option for the first server installed.
Select the Server Group option when installing subsequent servers that share the same
database.
Specify the same database information for all servers that share the database.
Note
Choosing Server Group during AR System installation does not configure the
servers as members of a server group. It merely indicates to the installer that the
server shares the database with an existing AR System server, with or without
server group membership.
After installation
Determine which server is the administrative server, where you manage and modify forms,
workflow, and applications with BMC Remedy Developer Studio.
Isolate BMC Remedy Developer Studio access, escalations, and archiving to the
administrative server.
To turn off Developer Studio access, escalations, and archiving on the non-
administrative servers (without server groups)
Note
The AR System Administration:Plugin Server Config form is for Java plug-in servers only.
You cannot use this form to configure native plug-in servers.
For more information about the BMC Remedy AR System Administration Console, see Navigating
the BMC Remedy AR System Administration console interface (see page 1048).
The following table lists the common fields on the AR System Administration:Plugin Server Config
form:
Plugin Server Select a plug-in server instance from the list of available plug-in server
Instance instances .
Plugin Server Enter the path where the selected plug-in server instance is running.
Instance Path
Plugin Set Select a plug-in set from the list. Creating Java plug-in sets
(see page 392)
This property enables you to load multiple plug-ins that share a common
parent class loader.
Note: The Plugin Set Configuration tab (see page ) is visible only if you
select a value for this field.
Plugin Server Host Enter the host name of the computer where the selected plug-in server
instance is running.
The following table lists the tabs in the AR System Administration:Plugin Server Config form. The
information provided in each tab is described in the sections that follow.
Global Plugin Server Enables you to configure the default plugin server settings Setting global plug-in server options
Configurations (see page 392)
Plugin Server Enables you to create and configure the plug-in server settings Setting plugin server configuration
Configuration options (see page 394)
Note: These settings override the settings defined in the Global
Plugin Server Configurations tab.
Plugin Configuration Enables you to view, create, modify, and delete plug-ins and Working with Java plug-ins (see page
their configurations 398)
Plugin Set Enables you to view, create, modify, and delete plug-in sets Working with Java plug-in sets (see
Configuration and their configurations page 401)
Note: This tab is visible only after you add a plug-in set (see
page 391).
Note
If you modify the Java plug-in server configuration data, you must restart the Java plug-in
server for the changes to take effect.
Related topics
Centralized configuration (see page 1138)
Troubleshooting issues with plug-in servers (see page 4555)
Plugin Instance This field is populated with the value from the Plugin Server Instance field.
Related topics
Centralized configuration
Troubleshooting issues with plug-in servers
1. In a browser, open the BMC Remedy AR System Administration Console, and click System
> General > Plugin Server Configuration.
2. In the AR System Administration:Plugin Server Config form, click the Global Plugin Server
Configurations tab.
3. Edit the options listed in the following table as needed.
Area name Field name Description
General Register Specifies whether you want the Java plug-in to register with the portmapper
Configurations With Valid values:
PortMapper true
false (default)
Threads Max Threads The maximum number of threads allowed in the thread pool. This is for worker threads
Configurations of plug-in servers.
Valid value: Any positive integer
Default: 10
Global default: 30
Number Of Specifies the total number of core worker threads that the Java plug-in server initializes
Core to process various RPC requests
Threads Valid value: Any positive integer
Default: 5
Global default: 30
Number Of Specifies the total number of selector threads that the Java plug-in server uses to
Selector dispatch RPC requests to the core worker thread task queue
Threads Valid value: Any positive integer
Default: 2
Global default: 5
Encryption Encryption Determines whether the plug-in server allows or requires encrypted communication with
Configurations Policy the AR System server
Valid values:
0 - Allowed but not required
1 - Required
2 - Not allowed (default)
Data Determines the network data encryption algorithm that the plug-in server uses to
Encryption communicate with its clients
Algorithm Valid values:
1 - RSA low encryption, modulus 512 bits (default)
2 - RSA medium encryption, modulus 1024 bits (requires BMC Remedy
Encryption Performance Security)
3 - RSA high encryption, modulus 2048 bits (requires BMC Remedy Encryption
Premium Security)
Note: If the value of the Encryption Policy option is set to 2, this option is ignored.
Data Key Specifies the expiration time for the network data encryption key
Expiry Valid value: Any positive integer
Default: 2700 (seconds)
Note: If the value of the Encryption Policy option is set to 2, this option is ignored.
Public Key Specifies the publickey-privatekey encryption algorithm that the plug-in server uses to
Algorithm communicate with its clients
Valid values:
4 - RSA low encryption, modulus 512 bits (default)
5 - RSA medium encryption, modulus 1024 bits (requires BMC Remedy
Encryption Performance Security)
6 - RSA high encryption, modulus 2048 bits (requires BMC Remedy Encryption
Premium Security)
Note: If the value of the Encryption Policy option is set to 2, this option is ignored.
Other Work Queue Specifies the interval at which the core worker thread task queue monitor checks
Configurations Monitor Log whether the tasks in the queue exceed the threshold set for the Work Queue Task
Interval Threshold option
Valid value: Any positive integer (milliseconds)
Default: 0
Specifies the maximum time that the excess idle threads will wait for a new task before
terminating
Reload Specifies the interval between the time that you add a plug-in configuration and the time
Delay that the system dynamically loads and initiates the plug-in
During this interval, you can modify the new plug-in configuration if necessary without
restarting the plug-in server. After the system dynamically loads and initiates the plug-
in, any changes you make to the plug-in configuration require a plug-in server restart.
Valid value: Any positive integer (milliseconds)
Default: 30000 ms
Work Queue Specifies the threshold for the core worker thread task queue. When the tasks in the
Task queue exceed this number, a message is logged in the arjavaplugin.log file.
Threshold Valid value: Any positive integer
Default: 5
Note: If the value of the Work Queue Monitor Log Interval option is set to 0, this
threshold is ignored.
Native Enable Routes the AREAVerifyLogin calls to the Native Plugin Server through a bridge
Configurations Native Valid values:
Bridge true
false (default)
4. To save the changes, click Apply, or click Reset to restore the default values.
Related topics
1. In a browser, open the BMC Remedy AR System Administration Console, and click System
> General > Plugin Server Configuration.
2. Select a Plugin Server Instance.
3. Click the Plugin Server Configuration tab
General Plugin Port Specifies the TCP port number where the Java plug-in server runs
Configurations
You enter this port when you install the AR System server, which sets the value of the Server-
Plugin-Alias property in the ar.cfg or ar.conf file.
Note: If you have a single plug-in server instance, you can enter this value in the Plug-in Server
list on the Connection Settings tab of the AR System Administration:Server Information form.
Register With Specifies whether you want the Java plug-in to register with the portmapper
PortMapper
Valid values:
True
False (default)
Example: com.bmc.arsys.plugins.signal.SignalMaskForSpecificPlugins
Encryption Encryption Determines whether the plug-in server allows or requires encrypted communication with the
Configurations policy AR System server
Valid values:
Data Determines the network data encryption algorithm that the plug-in server uses to communicate
Encryption with its clients
Algorithm
Valid values:
Data Key Specifies the expiration time for the network data encryption key
Expiry
Valid value is any positive integer. The default is 2700 (in seconds).
Public Key Specifies the publickey-privatekey encryption algorithm that the plug-in server uses to
Algorithm communicate with its clients
Valid values:
Threads Max Threads The maximum number of worker threads allowed in the thread pool of plug-in servers
Configurations
Valid value: Any positive integer
Default: 10
Global default: 30
Number Of Specifies the total number of core worker threads that the Java plug-in server initializes to
Core Threads process various RPC requests
Number Of Specifies the total number of selector threads that the Java plug-in server uses to dispatch
Selector RPC requests to the core worker thread task queue
Threads
Valid value: Any positive integer
Default: 2
Other Work Queue Specifies the interval at which the core worker thread task queue monitor checks whether the
Configurations Monitor Log tasks in the queue exceed the threshold set for Work Queue Task Threshold
Interval
Valid value: Any positive integer (milliseconds)
Default: 0
Excess Core Specifies the maximum time that the excess idle threads waits for a new task before
Threads Idle terminating
Keep Alive
Valid value: Any positive integer (milliseconds)
Time
Default: 0 (unlimited time)
Reload Delay Specifies the interval between adding a plug-in configuration and the system dynamically
loading and initiating the plug-in
During this interval, you can modify the new plug-in configuration if necessary without
restarting the plug-in server. After the system dynamically loads and initiates the plug-in, any
changes that you make to the plug-in configuration require a plug-in server restart.
Work Queue Specifies the threshold for the core worker thread task queue
Task
When the tasks in the queue exceed this number, a message is logged in the arjavaplugin.log
Threshold
file.
Note: If the value of Work Queue Monitor Log Interval(mSec) is set to 0, this threshold is
ignored.
Logging To understand more details about logging configuration, see the following videos:
Configurations
To understand the concept of configuring plug-in server logging, see BMC Remedy AR System Plugin
server logging feature and its value. .
For a quick demo on how to configure plug-in server logging, see BMC Remedy AR System Plugin server
logging feature. .
To understand how to enable debug logs for AR plug-in server , see BMC Remedy AR System Plugin
server logging feature. .
Note: The videos are recorded using the earlier version of BMC Remedy AR System. So the UI displayed in the
videos may differ than the UI available for BMC Remedy AR System 9.1.
Enable Plugin The setting that determines whether logging is turned on. The available values are as follows:
Log
False
True
Log File The absolute path and the name of the log file.
Log Level This setting determine the types of messages that are logged for the calls. The following
different types of log levels are available
TRACE
DEBUG
INFO
WARN
ERROR
FATAL
Maximum Log The maximum size (in bytes) a log file can reach before an automatic backup copy is made.
File Size The backup copy is made with the same file name and an incremental number. The default
size is 5242880 bytes (5 MB) . Parameters added to the pluginsvr_config.xml file:
pluginSvrLogMaxFileSize
Log History The maximum number of backup files that the system will save. A backup file is generated any
time the log file size reaches the limit specified in the Maximum Log File Size parameter. The
default value is 10. Parameters added to the pluginsvr_config.xml file:
pluginSvrLogMaxHistory
Native Enable Native Routes the AREAVerifyLogin calls to the Native Plugin Server through a bridge
Configurations Bridge
Valid values:
True
False (default)
Always On Log File The absolute path and the name of the log file.
Note:
If you configure the size to 0 MB, the Always On Logging option gets disabled.
1. To save the changes, click Apply, or click Reset to restore the default values.
2. (Optional) To copy the global settings for the selected plug-in server, click Copy Global.
Note
When you configure plugin server logging, the logging parameters are saved in
the Pluginsvr_config.xml file. The logging configuration changes are applied
immediately; you do not have to restart the plug-in server.
To apply changes to configuration settings other than logging configuration, you
must restart the plug-in server.
Related topics
Note
When you create a new plug-in, it is loaded dynamically. You do not need to restart the
AR System server.
1. In a browser, open the BMC Remedy AR System Administration Console, and click System
> General > Plugin Server Configuration.
2. On the AR System Administration:Plugin Server Config form, open the Plugin Configuration
tab, and click Create to open the Create New Plugin form.
3. Enter values for the following fields, and click OK:
Plugin Class Enter the name of the Java class that will implement the plug-in.
Name
Value: Any valid class name from the JAR file
Plugin File Enter the name of the file that the plug-in server loads to access the plug-in implementation.
Name
Note: This file is located in the plug-in server class path.
Value: The absolute file name of the JAR file that contains the class that contains the plug-in implementation
and all the dependent JAR files
AR Server Enter the AR System server name where the Server-Plugin-Alias entry will be created.
Create Server Select the check box to create the Server-Plugin-Alias entry in the AR System Configuration Component
Plugin Alias Setting form. Note: For the AR System server to communicate with the Java plug-in, you must create the
Entry in Server-Plugin-Alias entry in the AR System Configuration Component Setting form.
ARServer
Path Elements Click the plus sign and enter the location of a dependent JAR file or the path to a dependent native library.
Each plug-in element can contain zero or more pathelement elements.
User Defined (Optional) Click the plus sign and enter the user-defined configuration elements:
Elements
Setting Name — Name of the user defined element.
The syntax for this element is:
pluginName.userDefined.settingName
Note: pluginName is automatically populated based on the value entered in the Plugin Name field.
Setting Value — Value for the element.
Note:
You must define values for both Setting Name and Setting Value.
If you add two values for the same Setting Name, only the first value is applicable.
1. In a browser, open the BMC Remedy AR System Administration Console, and click System
> General > Plugin Server Configuration.
2. On the AR System Administration:Plugin Server Config Form form, open the Plugin
Configuration tab.
Plugin Class Displays the name of the Java class in the JAR file that implements the plug-in
Name
Plugin File Enter the name of the file that the plug-in server loads to access the plug-in implementation.
Name Note: This file is located in the plug-in server class path.
Value: The absolute file name of the JAR file that contains the class that contains the plug-in
implementation and all the dependent jar files.
Path Elements Displays the location of the dependent JAR file or the path of the dependent native library
User Defined (Optional) Displays the user-defined configuration elements for the selected plug-in
Elements
1. In a browser, open the BMC Remedy AR System Administration Console, and click System
> General > Plugin Server Configuration.
2. On the AR System Administration: Plugin Server Config form, open the Plugin Configuration
tab.
3. In the Plugins list, select the plug-in that you want to modify.
4. Click Modify to open the Modify Existing Plugin form.
5. Modify the data as needed, and click OK.
1. In a browser, open the BMC Remedy AR System Administration Console, and click System
> General > Plugin Server Configuration.
2. On the AR System Administration:Plugin Server Config Form form, open the Plugin
Configuration tab.
3. In the Plugins list, select the plug-in that you want to delete, and click Delete.
4. In the confirmation box, click Confirm.
Note
You must restart the Java plug-in server for these changes to take effect.
Related topics
Note
The Plugin Set Configuration tab is visible only if you select a value for the Plugin Set
(see page 391) field.
1. In a browser, open the BMC Remedy AR System Administration Console, and click System
> General > Plugin Server Configuration.
2. On the AR System Administration:Plugin Server Config form, open the Plugin Set
Configuration tab, and click Create to open the Create\Modify Plugin Set Configuration form.
3. Enter the values for the following fields, and click Create:
Key Prefix Enter the key prefix by using the following format:
pluginSetName.pathelement.type
pluginSetName must match the name in Creating Java plug-in sets (see page 392).
Value If you entered location in the Key field, enter the complete path to the JAR file.
For example: D:\BMCSoftware\BMCARSystem\pluginsvr\rle\lib\aspectjrt.jar
If you entered path in the Key field, enter the path of the folder that contains the JAR file.
For example: D:\BMCSoftware\BMCARSystem\pluginsvr\chg
Note
There is no validation for the values you enter in the Key and Value fields. The plugin
server validates this internally. If these values are incorrect, they are not saved in the
pluginsvr_config.xml file. There is no error message logged in the arjavaplugin.log or
arplugin.log files either.
1. In a browser, open the BMC Remedy AR System Administration Console, and click System
> General > Plugin Server Configuration.
2.
BMC Remedy Action Request System 9.1 Page 401 of 4703
BMC Software Confidential. BladeLogic Confidential.
2. On the AR System Administration:Plugin Server Config form, open the Plugin Set
Configuration tab.
The Plugin Set Path Elements area displays the list of available plug-in sets with their
values.
1. In a browser, open the BMC Remedy AR System Administration Console, and click System
> General > Plugin Server Configuration.
2. On the AR System Administration:Plugin Server Config form, open the Plugin Set
Configuration tab.
3. In the Plugin Set Path Elements list, select the plug-in set that you want to modify.
4. Click Modify to open the Create\Modify Plugin Set Configuration form.
5. Modify the data as needed, and click Update.
1. In a browser, open the BMC Remedy AR System Administration Console, and click System
> General > Plugin Server Configuration.
2. On the AR System Administration:Plugin Server Config Form form, open the Plugin Set
Configuration tab.
3. In the Plugin Set Path Elements list, select the plug-in set that you want to delete, and click
Delete.
4. In the confirmation box, click Confirm.
Related topics
The Preload Tables option allows the server to make better use of system resources, such as
multiple CPUs and network bandwidth, when loading the cache during server initialization and in
server group operations. Using the Preload Tables option, can greatly reduce server startup time
and the time required for cache reloads in a server group, but it requires that larger amounts of
memory are available to the AR System server. This option preloads metadata from database
tables into the server cache. The metadata includes field definitions and display properties.
When the Preload Tables Configuration option is on, the server uses multiple threads running in
parallel (preload threads) to load data in segments from database tables into memory.
Each preload segment represents one or more schemas (forms). For example, if you have 3,000
schemas and you configure 300 preload segments, each segment represents 10 schemas. In that
case, a preload thread reading a segment of the field definitions table would process field
definitions for 10 schemas.
Because all forms do not have the same amount of data, configuring multiple preload segments for
each preload thread enables threads to balance their load effectively. For example, if you configure
only one segment per thread and some threads finish before others, the finished threads have no
more work to do. But if you configure multiple segments per thread, as a thread finishes loading
Each thread uses a separate connection to the database. Any thread can load any segment. When
a thread finishes loading a segment, it begins loading another segment. When all segments have
been loaded, the thread terminates.
After the segments are loaded, the server populates the cache by reading the information from
memory instead of directly from the database.
You can configure the server to use preload threads at either of these times:
To configure preload threads, use the Preload Tables Configuration option on the Advanced tab of
the Server Information form.
The Preload Tables Configuration option is on by default for 64-bit UNIX or Linux servers. It has
the following default settings:
Note
If you configured the Preload Tables Configuration option before applying patch 001, the
patch installation does not change your settings.
To determine the optimum settings in your environment, vary the number of preload threads and
segments to find the configuration that produces the fastest cache load time. Adjusting the number
of preload segments balances the load between the preload threads.
Such testing also helps identify the amount of preload memory required in addition to cache
memory.
Note
Initial testing of this feature at BMC Software indicates that a Unicode server with the full
ITSM suite and all language packs installed consumes about 500 MB more memory at
initial cache load when it uses preload threads than when it does not use preload threads.
When determining whether to use preload threads and how to configure them, consider the
following factors:
The amount of memory available to the AR System server at startup and at runtime.
BMC recommends that servers with 64-bit address spaces and plenty of memory be
configured to use preload threads anytime the cache is loaded from the database (
Preload Tables At Init Only = No).
BMC recommends that servers with limited memory, such as Windows servers with
32-bit address spaces, be configured to use preload threads only when the cache is
initially loaded from the database (Preload Tables At Init Only = Yes).
In the case of extremely limited memory, configure the server not to use preload
threads.
Whether the server is part of a server group. Non-administrative servers in a server group
load the cache from the database whenever server object changes occur. These servers
derive the most benefit from using preload threads for all cache loads.
The number of database connections available. Each preload thread uses one connection
to the database.
From release 7.5.00 or later, this option no longer distinguishes between form backgrounds and
field display properties. Instead, it provides these settings:
Cache all display properties (Default) — Server response time is faster when a client opens
a form for the first time, but the memory space required for the server cache is larger.
Cache only server display properties — Memory usage for the cache is smaller, but when a
client opens a form for the first time, response time is slower. This delay occurs because the
server must load the display properties from the database at that time.
To specify how display properties are cached, use the Display Property Caching option on the
Configuration tab of the Server Information form.
Note
This option is not useful in a 64-bit environment. Most 64-bit environments do not impose
memory limitations and setting the option could unnecessarily impact performance.
To remove all unqualified searches, review existing workflow and modify it as necessary.
Option Description
Delay-Recache-Time For details about this setting, see Delay-Recache-Time (see page ).
Cache-Mode For details about this setting, see Cache-Mode (see page ).
Max-Entries-Per-Query For details about this setting, see Max-Entries-Per-Query (see page ) .
Cache-Display-Properties For details about this setting, see Cache-Display-Properties (see page ) .
Disable-ARSignals For details about this setting, see Disable-ARSignals (see page ).
Note
For more information about configuring cache properties to maximize memory utilization,
see Guidelines for resolving cache memory issues (see page 407).
arserverd (UNIX)
arserver.exe (Windows)
The following topics provide detailed guidelines for resolving cache memory issues:
For more information on resolving cache memory issues, see the blog Memory leak shared on
BMC Communities.
For Release 7.5.00 and 7.1.00 patch 007, data is now stored in the field_dispprop table so
that it can be read from and written to more efficiently. For more information, see The field
table in the AR System data dictionary (see page ).
Tip
This change allows field display properties of 4000 bytes or less, which previously were
stored as a character large object (clob), to be stored as a varchar in the propShort
column on Oracle and Microsoft SQL databases. For details about converting fields
stored previously as clob objects, to varchar objects, see "knowledge base article ID
20015708".
For Release 7.5.00 and later, the BMC Remedy AR System server can use multiple threads
running in parallel (preload threads) to load information from the database tables into
memory. The server then populates the cache by reading the information from memory
instead of directly from the database. For more information, see Setting the Preload Tables
Configuration option (see page 403).
If you use an earlier version of BMC Remedy AR System, consider upgrading to one of these
versions.
This ban includes actions in ITSM applications that can cause an admin copy cache or a client
cache load (see Actions in ITSM applications that trigger caching (see page 425)).
Identify a time period when administrative changes can be performed, and ensure that all
developers and application administrators understand the importance of making administration
changes during this period only.
After start-up, be aware that certain actions can cause the following caches to occur:
For details about activities that can trigger a re-cache, see Actions that trigger cache events (see
page ).
Warning
These cache loads can add multiple copies of the cache to memory. If the cache grows
too large, the BMC Remedy AR System server memory can quickly be depleted, which
can cause the server to stop working. To prevent this, follow the guidelines listed in BMC
Remedy Mid Tier recommendations (see page 420).
Client cache loads can cause a severe performance problem if all the BMC Remedy AR System
server's clients perform caching tasks at about the same time such as, at the start of the business
day. Simultaneously processing multiple client cache load requests limits the BMC Remedy AR
System server's ability to support normal client activity.
Server cache loads from the database occur primarily at BMC Remedy AR System server startup,
but several actions can trigger them after startup (see Actions that trigger cache events (see page
)).
To determine the amount of memory that will be temporarily required for any server cache load
from the database, check the size of arserverd (UNIX) or arserver.exe (Windows) in the host
computer's process list at the following time:
Immediately after the BMC Remedy AR System server process starts up — The startup time
of the BMC Remedy AR System server process varies and is affected by the amount of
workflow and the number of forms, menus, fields in forms, and so on in the database.
But before any user actions that require more memory occur — At runtime, user actions
such as queries cause the server process to request more memory. Therefore, the size of
the process is no longer based only on objects cached from the database.
The memory impact of a server cache load affects performance, especially if the operating
system starts to page. Depleted memory might cause malloc errors. Server cache loads
from the database can cause severe performance problems if paging occurs in a virtual
machine (VM) environment.
In server groups, the non-administrative or secondary servers perform server cache loads
from the database instead of admin cache copy.
Checking the BMC Remedy AR System log files for long-running operations
Certain long-running operations, such as escalations, archiving, or API calls, prevent the copy of
the cache that they use from being freed until the operation is finished. Multiple long-running
operations can tie up two or more copies of the cache. Check the BMC Remedy AR System log
files for such activity, and avoid it during peak hours.
1. Stop the Tomcat server for the previously installed versions of BMC Remedy AR System
server.
2. Copy the viewstat file from C:\Program Files\BMC Software\ARSystem\midtier\WEB-
INF\classes to any location on the local drive of your computer. For example C:\viewstat.dat
Note
You should copy the viewstat file from the previously installed version of BMC
Remedy AR System.
1. Open the BMC Remedy AR System Administration: Server Information form for the local
BMC Remedy AR System server.
2. Click the DSO tab.
3. In the Cache Check Interval field, enter a refresh interval in seconds. The maximum value is
43200 seconds (12 hours). The corresponding entry in the AR System Configuration
Generic UI form is DSO-Cache-Check-Interval.
4. Click OK. The change takes effect immediately. You do not need to restart the BMC
Remedy AR System server.
Events that trigger cache and re-cache events (see page 411)
Actions that trigger cache or re-cache events (see page 412)
Reducing memory using Display Property Caching (see page 414)
Client re-cache — A client cache load occurs when the client detects that its local cached
copy of an BMC Remedy AR System object is older than the server's cached copy (for more
information, see Client cache loads (see page 409)).
Server re-cache — A server cache load from the database occurs when AR System server
rereads all the data dictionary information from the database to update the server's internal
cache (for more information, see Server cache loads (see page 409)).
Admin Copy Cache — The AR System server creates an administrative copy of its cache for
any administrative change.
Note
For details about mid-tier caching, see Actions that affect mid tier caching (see page )
.
Modify a user NO NO NO
Delete a user NO NO NO
Remove a group from the Group List in the User form NO 5 (see page 413) NO YES
Add a group to a computed group YES 3 (see page 413),8 (see YES NO
page 414)
Remove a group from a computed group YES 3 (see page 413),8 (see YES NO
page 414)
Add a user to a group that is part of a computed group YES 3 (see page 413),8 (see NO YES
page 414)
Remove a user from a group that is part of a computed group YES 3 (see page 413),8 (see NO NO
page 414)
arsignal -a NO NO NO
arsignal -b NO YES NO
arsignal -c NO NO NO
arsignal -e NO NO YES
arsignal -l NO NO NO
arsignal -m NO NO YES
arsignal -r NO YES NO
arsignal -u NO NO NO
Create, modify, or delete an active link YES 2 (see page 413) NO YES
Create, modify, or delete an entry in the Group form (not every NO NO YES 6 (see
field must be affected) page 413)
Create, modify, or delete an entry in the Role Mapping form (not NO NO YES 6 (see
necessarily every field) page 413)
Create, modify, or delete a menu NO 3 (see page 413) NO 3 (see page YES
413)
1. A re-cache will occur in this case if one of the above changes that cause a re-cache were made before running the
arsignal command.
3. If you attach the menu to the form, that will cause the client to re-cache the form definitions if the user opens that
form.
4. In this case, a server cache load from the database occurs if the arsignal command is run after an administrative
5. Clients are unaware of group changes and load their cache only if an object is changed. If a group change makes an
object unavailable to the client, users cannot see the object on the BMC Remedy AR System server anymore.
6. Creation, modification, or deletion of entries in this form by workflow (not users) cause an admin copy cache. For
example, changes to the People form in an ITSM application that trigger a change in the underlying Group form cause
In the Server Configuration tab, set the Display Property Caching field to Cache only server display
properties. This reduces memory use and allows for a run-time re-cache if needed. This feature
can be used alone or in conjunction with preload threads.
For more information, see Configuration tab fields (see page 321), Display Property Caching (see
page ).
Note
The Cache only server display properties setting might impact performance when display
properties are requested, but the impact is not significant.
Also refer to the mid tier caching recommendations (see page 415).
Note
While you upgrade BMC Remedy Mid Tier, if the cache version number changes, the
catalina.out file logs the following message, and BMC Remedy Mid Tier rebuilds the
cache:
To minimize the usability impact of this performance hit, the Mid Tier Configuration Tool (see page
460) includes the following configuration options:
Flush cache — Removes all items from the mid tier cache. When the objects are requested,
the most up-to-date versions are retrieved from the BMC Remedy AR System server. For
details about the Flush Cache feature, see Flush Cache (see page ).
Sync cache — Clears only objects that have changed on the server after the last cache
clear event. In this case the mid-tier contacts BMC Remedy AR System server and
compares the last-changed-timestamp on elements and synchronizes any changes. For
details about this feature, see Using the sync cache option (see page 476).
Note
-- The Sync cache option is not available for 7.1.0 and prior releases.
-- When you restart BMC Remedy Mid-Tier (or Tomcat), it starts building views and
performing sync cache operations to ensure that the cache contents are up-to-
date. Loading those views in the cache takes time if there are a lot of AR System
server views in the viewstats.dat statistics file, which subsequently delays the sync
cache operation. During this period, if mid tier gets any request, it sends the older
version of the requested data.
As an administrator, you can check the sync status on the Cache Settings page to
verify whether the sync was completed successfully.
Definition Change Check Interval — This mid tier cache setting is configured to set an
interval (in seconds) at which information in the cache is updated. The default value is
86400 seconds. For details about the Definition Change Check Interval setting, see AR
Server Settings (see page 470).
Disable Mid-Tier Prefetch — Prefetch has always been a brute force approach to loading
forms into memory based on a somewhat arbitrary list of forms configured in the
prefetchConfig.xml file by the system administrator. Forms and other cache objects end up
in memory, but are not actually ever used by end users wasting valuable memory space. To
disable Prefetch, log on to the Mid-Tier Configuration tool, on the Cache Settings page,
remove the contents of the prefetchConfig.xml file so only these elements remain and save
changes:
On the AR Server Settings page, ensure that the Perform check check box is selected. The
Perform check check box activates the feature called Sync Cache that eliminates the need
for administrators to flush the entire Mid-Tier cache after a form, active link, menu, etc.
definition change on the AR System server. Mid-Tier now automatically synchronizes its
cache for just the changed objects. It performs this check at the interval selected in the
Definition Change Check Interval field. Or, an administrator can press the new Sync Cache
button on the Cache Settings page to have the changes synchronized immediately. The
Sync Cache operation, whether done automatically via Perform check interval or by
pressing the Sync Cache button for the AR System server, synchronizes any of the following
objects whose last changed timestamp is newer on the AR System server than in the
current mid tier cache: Forms, Active Links, Containers (such as Guides, Applications, Web
services, etc.), and Menus (Character menus). Sync Cache completely removes and
rebuilds the following cache items since the performance hit is minimal: Group data, Role
data, and Image objects.
On the AR Server Settings page in the Mid Tier Configuration tool, enable the new feature,
Preload, by selecting the check box. Preload will, on a restart of mid tier, load all Active
Links and Menus to the disk cache and any form which is user facing, that is, any form
which has an Active Link associated with it.
Note
The viewstats.dat statistics file is not related to the cache (ehcache) statistics (see
About the cache table (see page 475)). The viewstats.dat file is based on user
activity and is not dependent on any configuration.
After 1-2 days of usage, disable Preload using the Mid Tier Configuration tool, by
deselecting the check box on the AR Server Settings page.
Stop the JSP engine.
Start the JSP engine. With Prefetch and Preload disabled, the mid tier, upon startup, use its
statistics file to quickly load up into memory from the disk cache, only forms which users
have been accessing. This allows for the most efficient use of mid tier's in memory cache
and the best form access performance for end users.
When a browser sends a request to the mid tier server, the response might contain a Cache-
Control header. The browser uses this Cache-Control header to identify whether the content
should be cached and when this cached content expires. The browser uses the cached content
until it expires, after which it sends a new request to the mid tier server. If the response does not
contain the Cache-Control header, the browser sends a new request each time.
After browser cache is enabled, if the content on the mid tier server changes, the browser does not
detect the change because it uses the content from its cache.
The following topics provide information about working with browser cache:
Types of requests
The mid tier server controls browser cache based on the following types of requests:
Dynamic — These requests fetch dynamic data, such as records, from the BMC Remedy
AR System database, and thus are not cached on the browser.
Example
/arsys/Backchannel/*
Resources — These requests handle static data, such as static Javascript files (.js) or style
sheets (.css), and thus can be cached.
Note
When a new BMC Remedy Mid Tier patch or hotfix is applied, the content of these
files might change.
You can adjust the Cache-Control expiry time for these requests in the config.properties file.
See Modifying the cache expiry settings (see page 419).
Example
/arsys/resources/*
Form HTML / Javascript — These requests fetch the HTML and active link .js files for a
requested BMC Remedy AR System form or schema.
Note
The content of these requests can change when changes are made to form
definitions or workflows.
You can adjust the Cache-Control expiry time for these requests in the config.properties file.
See Modifying the cache expiry settings (see page 419).
Example
/arsys/forms/*
Resources — The default setting for this request type is 86400 seconds (1 day). To change
the cache expiry settings for this request type, modify the following entry:
arsystem.resource_expiry_interval=86400
Form HTML / Javascript — The default setting for this request type is 3600 seconds (1
hour). To change the cache expiry settings for this request type, modify the following entry:
arsystem.formhtmljs_expiry_interval=3600
Notes
You need not manually flush the browser cache whenever there is a change in
forms and other metadata in the AR System server. The changed forms are
automatically fetched from the mid tier and are reloaded in your browser.
If you have a server group setup with a load balancer, the browser cache
approximately takes 10 minutes to update and reflect the changes. You must sync
the cache after the shared database is updated with the changes.
Whenever there are changes in the AR System server, to keep the mid tier cache
up-to-date, you must still do a sync cache or flush cache.
In a Mid Tier cluster environment, to maintain consistency across all users, make
sure that the sync cache or flush cache operation is successfully completed across
all mid tiers.
If the browser cache is not up-to-date, you might get some JavaScript errors. For information about
these errors and the importance of updating the browser cache, see Knowledge Base article ID
000096746.
To flush the cache, you need to delete the temporary internet files.
Note
You do not need to delete the cookies, form data, saved passwords, or browsing history.
For a list of compatible web browsers, see Compatibility matrix in the BMC Remedy ITSM
Deployment online documentation.
Each browser vendor uses different options to delete the temporary internet files. As a user, you
must be aware of these options so that you do not delete the cookies that store other important
information, such as saved passwords.
Microsoft Internet Explorer 8 or 9 — Browse to Tools > Internet Options > Browsing History
> Delete > Delete Browsing History, clear all options except Temporary Internet Files, and
click Delete.
Mozilla Firefox — Browse to Tools > Options > Advanced > Network, and click Clear Now.
Apple Safari — Browse to Edit > Empty Cache, and click Empty.
Note
An administrator can press the new Sync Cache button to have the changes
synchronized immediately.
The Sync Cache operation synchronizes any of the following objects, if the changed
timestamp on BMC Remedy AR System server is more recent than the cached item in the
mid-tier cache:
Forms
Active links
Containers (guides, applications, web services)
Menus (character menus)
Because the performance hit is minimal, Sync Cache completely removes and rebuilds the
following cache items:
Group data
Role data
Image objects
Note
The Sync Cache option is not available in pre 7.5, patch 004 versions.
Activating Pre-Load
When the Pre-Load option is activated, the following items are loaded when the server is started
(or restarted):
Active links and menus in the AR System server, and all user facing forms (any form with an
associated active link)
All usage history data
Note
1. Open the Mid Tier Configuration Tool and click AR Server Settings.
2. Select the server to edit, and click Edit (If you are adding a server, click Add Server).
4. Click Save.
Note
While BMC Remedy AR System supports the use of load balancers, BMC does not test
or recommend a specific third-party load balancer. BMC supports BMC Remedy AR
System within the environment, but not the configuration or debugging of a load balancer
itself beyond generic interaction expectations of BMC Remedy AR System with any load
balancer.
Add a user
Modify a user
Delete a user
Add a group
Remove a group
Remove a group from the Group List in the User form
Add a user to a group
Remove a user from a group
Add a computed group
Add a group to a computed group
Remove a group from a computed group
Add a user to a group that is part of a computed group
Remove a user from a group that is part of a computed group
Create, modify, or delete an application
Create, modify, or delete an active link
Create, modify, or delete an active link guide
Create, modify, or delete an entry in the Group form (not every field must be affected)
Create, modify, or delete an entry in the Role Mapping form (not necessarily every field)
Create, modify, or delete a form
Create, modify, or delete a menu
Create, modify, or delete a packing list
Create, modify, or delete a view
Create, modify, or delete a web service
Approval mapping
Cause
Operational category
Product category
Site
Status reason
2. Support groups are not used as permission groups in structures. This action does not trigger a client cache load.
Related topic
Actions that trigger cache or re-cache events (see page 412)
Configuring BMC Remedy Mid Tier as a shared service (see page 426)
Onboarding a new tenant (see page 449)
Offboarding a tenant (see page 454)
Configuring the mid tier through a firewall (see page 456)
Configuring mid tier memory (see page 458)
Accessing the Mid Tier Configuration Tool (see page 460)
Configuring the Change Password page (see page 461)
Configuring the Overview page (see page 462)
Configuring the General Settings page (see page 464)
Setting pagination properties (see page 467)
Configuring the AR Server Settings page (see page 468)
Configuring the Cache Settings page (see page 472)
Configuring the Report Settings page (see page 490)
Configuring the Web Service Settings page (see page 492)
Configuring the Connection Settings page (see page 493)
Configuring a mid tier to launch a browser in a different mid tier (see page 495)
Cookies used by BMC Remedy Mid Tier (see page 498)
Settings in the config.properties file (see page 499)
Setting up a cluster with multiple tenants (see page 522)
Note
Before you perform the configuration steps for BMC Remedy Mid Tier as a shared
service:
1 Add the first tenant to Onboard a new tenant on a BMC Remedy Mid Tier in the cluster. Configure the ECCS and
the cluster by provide the Cluster Identifier, add the tenant AR server and edit the tenant specific properties for
onboarding a new the BMC Remedy Mid Tier . For all other BMC Remedy Mid Tiers in the cluster, only configure
tenant on a BMC the ECCS and provide the Cluster Identifier that is the same as for the first BMC Remedy Mid
Remedy Mid Tier Tier. The Cluster Identifier for the cluster should be unique.
(see page 449)
2 Create a good cache A copy of the cache is used to restore the cache if it gets corrupted.
and back up the Mid
Tier cache (see page
486)
3 (Optional) Perform this step if you have installed BMC Atrium Single Sign-On as a High Availability (HA)
cluster environment for multitenancy support.
Configure BMC
Atrium Single Sign-
On for tenant
4 Configure BMC Perform the BMC Service Management Process Model (SMPM) configuration procedures.
Service Management
Process Model for a
tenant (see page 448)
5 Configuring the load Configure the load balancer to ensure that the user requests for the new tenant are diverted to
balancer (see page this cluster. Test the cluster and provide access to the new tenant.
524)
6 Add the remaining Add the remaining tenants to the cluster one by one by following steps 4 through 8.
tenants
7 (Optional) Add (n+1) If required, add an extra BMC Remedy Mid Tier to the cluster.
th BMC Remedy Mid
Tier to the cluster
8 (Optional) If a tenant needs to be moved from a cluster or is unsubscribed from the environment, offboard
Offboarding a tenant the tenant.
on a BMC Remedy
Mid Tier cluster (see
page 454)
9 (Optional) Set up If required, configure the tenant server to work with the chat server.
Openfire chat server
Related topics
Lays down the deployment strategy and provides instructions to the BMC Remedy
administrator to implement the deployment strategy. See the following figure for a sample
deployment strategy.
Note
This diagram is only representative and does not indicate the actual number of
tenants or mid tiers in any cluster.
Decides how many clusters to create to support the existing Remedy customers based on
the benchmarking done for the RoD environment
Decides which mid tiers to include in the cluster based on the following guidelines:
Each computer hosting a mid tier must have the same hardware capacity (for
example, four CPUs at 2.0 GHz with 8 GB RAM and a 120-GB hard disk drive.
Each computer must have only one Tomcat instance and only one mid tier installed
within Tomcat.
If there are different subdomains or isolated networks, all computers in a cluster must
be a part of the same subdomain or isolated network to ensure optimal performance.
Decides which tenants must be added to the same mid tier in a cluster based on the
following guidelines:
The total number of concurrent users across all tenants added to a given mid tier
cluster must be less than or equal to 2,500.
For a symmetric configuration with three backups, a single mid tier instance does not
scale beyond 800 concurrent users. Remember these numbers while adding a tenant
to a given mid tier.
To take full advantage of cache objects comparison and sharing, all tenants in a
single mid tier must have the same number of languages. For example, if all tenants
in a mid tier have views only in English in all BMC Remedy IT Service Management
and BMC Service Request Management forms, maximum sharing of cache objects
across the tenants is achieved.
Combine all the tenants that have the same version. For example, add all tenants
that have BMC Remedy AR System 7604 SP2 to a single mid tier cluster.
Combine all tenants that have minimum customizations.
Decides the rules for the load balancer that are in line with the deployment strategy. For
example, sticky session should always be used, but routing the requests to the appropriate
clusters or mid tier must be based on which tenant is supported by which mid tier. Such
rules must be defined when a decision on the final cluster and tenant deployment is made.
Defines the necessary rule changes for the n+1 scenario (that is, while temporarily adding a
mid tier to or removing one from a cluster)
Identifies which mid tiers to add to a cluster
Assigns a unique cluster ID for each mid tier added to a cluster
Designates an AR System server as the Centralized Configuration Server (CCS)
Decides whether a dedicated cluster is required for a large Tier-1 tenant. Typically, tenants
should not be used across clusters. A large tenant (Tier-1) can use a dedicated cluster for
service.
Related topics
Install and upgrade BMC Remedy Mid Tier to the latest version.
Install BMC Atrium Single Sign-On.
Based on the deployment strategy, configure a Tomcat cluster.
Install and configure Centralized Configuration server. For information, see Centralized
configuration (see page 1138) and Centralized configuration for mid tier (see page 439).
Decide on and adhere to a naming convention for cluster IDs.
Onboard a tenant.
Add a tenant.
Configure tenant-specific properties.
Preload the cache.
Configure a load balancer.
Shut down the mid tier and back up the good copy of the cache. For information, see
Backing up mid tier cache (see page 487).
Keep the setup ready to deploy an additional mid tier to the cluster on the fly. For
information, see Adding an extra mid tier to a cluster (see page 438).
Enable the tenant console from the web.xml file. For information, see Enabling and disabling
multi-tenancy support.
Add a realm for the tenant to access the Tenant Console. For information, see Adding or
deleting realms for multi-tenancy support.
Add users to the BMCSaaSAdmin group for providing tenant administrator privileges. For
information, see Managing the Tenant Console.
For more information about configuring a Tomcat cluster, see Configuring a cluster (see page 431).
When a user logs on to a node, in-memory session replication happens in real time.
The following diagram shows that Request 1 with Session X and Request 2 with Session Y are
handled by the load balancer. Assume that Request 1 is served by Node 1 and Request 2 is
served by Node 2. Even so, both nodes will have information about both the sessions, that is,
Session X and Session Y are part of session replication. Either node can pick up the other session
seamlessly if the other node crashes. A user does not have to log on again even if the serving
node is down. This session is picked up immediately by the second node.
Related topic
Guidelines for BMC Remedy deployment architect (see page 428)
Configuring a cluster
Notes
BMC recommends you to configure a BMC Remedy Mid Tier cluster using Tomcat.
BMC does not support the clustering for webservers other than Tomcat.
BMC Remedy AR System installer allows you to only install or upgrade the BMC
Remedy Mid Tier and does not provides an option for Tomcat clustering.
You should setup the cluster manually, following the steps provided in this topic.
See the Compatibility matrix in the BMC Remedy ITSM Deployment online
documentation for supported version of Tomcat.
Ensure seamless failover by configuring the mid tier on an Apache Tomcat cluster (see page 430)
. To add the mid tier in a Tomcat cluster, install mid tiers on different virtual computers and
configure the cluster with the following procedure.
1. Stop Tomcat.
2. Open the server.xml file located in the TomcatInstallationFolder\conf folder in a text editor
and make the following changes:
</Cluster>
Note
3. Enter the multicast IP address of the host on which you want the session replication to take
place in the Address value instead of auto. For example, in the <Receiver> tag, modify
address="auto" to address="172.x.x.x". For more information, see FAQ about
cluster configuration (see page 436).
4. (Optional) Add two new file handlers 5cluster.org.apache.juli.FileHandler and 6cluster.org.
apache.juli.FileHandler in the handlers section to the logging.properties file.
handlers = 1catalina.org.apache.juli.FileHandler, \
2localhost.org.apache.juli.FileHandler, \
3manager.org.apache.juli.FileHandler, \
5cluster.org.apache.juli.FileHandler, \
6cluster.org.apache.juli.FileHandler, \
java.util.logging.ConsoleHandler
5. (Optional) To increase the cluster logging, change the log level to FINE for the following file
handlers in the logging.properties file located in the TomcatInstallationFolder/conf folder:
5cluster.org.apache.juli.FileHandler and 6cluster.org.apache.juli.FileHandler.
5cluster.org.apache.juli.FileHandler.level = INFO
5cluster.org.apache.juli.FileHandler.directory = ${catalina.base}/logs
5cluster.org.apache.juli.FileHandler.prefix = cluster.
6cluster.org.apache.juli.FileHandler.level = INFO
6cluster.org.apache.juli.FileHandler.directory = ${catalina.base}/logs
6cluster.org.apache.juli.FileHandler.prefix = ha.
org.apache.catalina.tribes.MESSAGES.level = INFO
org.apache.catalina.tribes.MESSAGES.handlers = 5cluster.org.apache.juli.
FileHandler
org.apache.catalina.tribes.level = INFO
org.apache.catalina.tribes.handlers = 5cluster.org.apache.juli.FileHandler
org.apache.catalina.ha.level = INFO
org.apache.catalina.ha.handlers = 6cluster.org.apache.juli.FileHandler
6. Restart Tomcat.
7. Verify whether the node is added to the cluster:
a. Open the ha.date.log file located at /opt/apache/tomcat7.0/logs for Linux and <C:
\Program Files\Apache Software Foundation\Tomcat7.0\logs> for Windows.
b. Search for memberAdded entry. If you have added four mid tiers to the cluster, you
should see three memberAdded entries and their IP addresses in the file for the other
three members. Ensure that the IP address does not represent a localhost.
Note
To add an extra mid tier to the cluster (see page 438), perform the same configurations
on the extra (n+1) mid tier.
To access the mid tier configuration URL, BMC recommends that you use the HTTP URL in the
following format:
http://mtMachineName:8080/arsys/shared/config/config.jsp
Recommendations
BMC recommends that to improve application scalability, increase the File Descriptor limit in mid
tiers running in a cluster. If you have a cluster of two mid tiers with 12 tenants, which is serving
3600 users, set the File Descriptor limit to 35,000 .
Note
Edit the /etc/bashrc file and set the unlimit value as follows:
ulimit -n 35000
fi
Edit the /etc/sysctl.conf file and increase the File Descriptor limit for the system as follows:
fs.file-max = 210000
Note
Ensure that you set the system-wide limit of File Descriptors to approximately 6 times of
the per process limit set in the limits.conf file.
Refer to the following table for guidance on deciding the File Descriptor limit:
1 Tomcat maxThreads setting in Tomcat HTTP maxThreads defines the maximum connections used by
connections Connector Tomcat when
BIO Connector is used.
3 Tomcat and Mid Estimate is 1200 Class loader for JAR files loaded by Tomcat. This includes
Tier Class JARs in Mid Tier distribution, configured Third-party JARs,
Loaders and DVF plug-ins.
4 Mid Tier 1 + 1 * Number of Tenants 1 for global configuration and 1 per tenant
properties files
5 Mid Tier Cache 27 x 2 = 54 27 categories x 2 files per category. Data files are always
files open.
Index files are read into Memory at startup and closed and
later written to
during Mid Tier shutdown.
8 Java API JMS 1 + 1 * Number of Tenants 1 for ECCS and 1 per Tenant
Connections for
CCS
9 Attachments Estimate is 20% * Maximum Concurrent Attachment files and report files created by MT on Disk
and Reports Users on the Mid-Tier Node
10 SSO Agent - 1 A single Configuration file is used by the SSO Agent which
Files is queried from the SSO Server
11 SSO Agent – maxThreads setting in Tomcat HTTP SSO Agent opens a URLConnection to SSO Server when it
Connections to Connector logs in a
SSO Server User or validates SSO Token with SSO Server
Related topics
Edit the server.xml file located in the TomcatInstallationFolder\conf folder and in the
Receiver tag, for the address value, instead of auto, enter the IP address of the network
interface card to which you want the session replication to take place.
For example, if you have two network interface cards, eth1 with 10.x.x.x as the IP address and
eth2 with 172.x.x.x as the IP address, and if you want the session replication to happen on eth2,
you must set the address value to 172.x.x.x.
<Receiver className="org.apache.catalina.tribes.transport.nio.
NioReceiver"
address="auto"
port="4000"
autoBind="100"
selectorTimeout="5000"
maxThreads="6"/>
<Receiver className="org.apache.catalina.tribes.transport.nio.
NioReceiver"
address="172.x.x.x"
port="4000"
autoBind="100"
selectorTimeout="5000"
maxThreads="6"/>
For information about clustering and session replication, see the Apache Tomcat documentation at
https://tomcat.apache.org/tomcat-7.0-doc/cluster-howto.html.
Disable the network interface that you do not intend to use. For example, if you want to
disable eth1, use any one of the following commands at the command prompt:
ifconfig eth1 down
ifdown eth1
Note
Verify your etc/hosts file. Remove any bad entries that are present.
I see the IP address of the local host against the memberAdded entry in the cluster log. What do I
do?
Edit the server.xml file located in the TomcatInstallationFolder\conf folder and in the
Receiver tag, for the address value, instead of auto, enter the IP address of the host to
which you want the session replication to take place.
<Receiver className="org.apache.catalina.tribes.transport.nio.
NioReceiver"
address="auto"
port="4000"
autoBind="100"
selectorTimeout="5000"
maxThreads="6"/>
<Receiver className="org.apache.catalina.tribes.transport.nio.
NioReceiver"
address="172.x.x.x"
port="4000"
autoBind="100"
selectorTimeout="5000"
maxThreads="6"/>
For information about clustering and session replication, see the Apache Tomcat documentation at
https://tomcat.apache.org/tomcat-7.0-doc/cluster-howto.html.
Note
This procedure also applies when a mid tier in a cluster goes down and the BMC Remedy
AR System administrator brings it up.
Plan your deployment strategy. For example, you might have to decide whether to deploy
n+1 or n+2 mid tiers to the cluster.
Ensure that you have a separate computer. If you are deploying n+2 mid tiers, ensure that
you have two computers available.
Ensure that the computers have the same configuration as that of other mid tiers in the
cluster in terms of memory, CPU usage, disk space, and so on.
Ensure that the computers have the same cluster configuration (see page 431).
Notes
Ensure that the extra mid tier is already set up in the cluster but is not running, and
that you have deleted the midTierInstallationDirectory/cache folder before starting
the mid tier.
To avoid the extra time required to copy the cache folder, ensure that you already have a
"good copy" of the preloaded cache in the n+1 mid tier (for example, in the /opt
/Preload_Cache folder). Ensure that you store the good copy of the cache on a local drive
and not on a shared drive, which can delay copying the cache folder.
Add the cache directory path to the arsystem.ehcache.midTierBackupCacheDir
property in the config.properties file of the n+1 mid tier. For example:
arsystem.ehcache.midTierBackupCacheDir = /opt/Preload_Cache
Note
If you are using a Centralized Configuration Server (CCS), ensure that this
property (Cache Backup Directory) is set correctly from the Cache Settings page
from any of the mid tiers in the cluster. Ensure the availability of the good copy of
the cache in this folder on all mid tiers. For more information, see Backing up the
mid tier cache (see page 487).
If you are using Centralized Configuration Server, copy the ccs.properties file in the
midTierInstallationDirectory/WEB-INF/classes folder from other mid tier.
The newly added mid tier can now handle all requests seamlessly without causing delays and
performance issues.
You must configure a BMC Remedy AR System server to act as a Centralized Configuration
Server (CCS). The Centralized Configuration Server is a BMC Remedy AR System server that
does not have any applications installed or any end-user interactions. Centralized Configuration
Server needs limited resources in terms of CPU and RAM.
For example, you have 10 mid tiers in a cluster. Before centralized configuration, each tenant was
managed independently. To change a configuration setting, you had to make the same change for
each tenant in the cluster. With centralized configuration, because all settings are stored in forms,
you can change the settings for multiple tenants in a cluster at one time. Centralized configuration
enables you to share configuration settings across all tenants in a cluster.
Centralized configuration
Note
If you are using a version of BMC Remedy AR System server earlier than 9.0 and cannot
set Centralized Configuration Server and Tenant Configuration Server, you must
manually update the global and tenant-specific settings for all the mid tiers in the cluster.
Use the Mid Tier Configuration Tool to update the settings. If you do not have access to
the Mid Tier Configuration Tool, edit the config.properties and tenants/config_tenantName.
properties files.
1. Open the BMC Remedy Mid Tier Configuration Tool from the URL: http://hostname:port
/arsys/shared/config/config.jsp.
2. Click Central Config Settings.
3. In the Central Config Settings page, enter the following information:
a. In Server Name, enter the name of the AR System server that is the designated as
the Centralized Configuration Server in the cluster.
b.
BMC Remedy Action Request System 9.1 Page 440 of 4703
3.
b. In Cluster ID, enter the unique cluster ID (see page 447) of the cluster to which the
mid tier belongs.
c. Enter the administrator password.
d. (Optional) Enter the port number and RPC number.
4. Click Save.
Note
5. Click Publish to create or update global properties from the config.properties file to
Centralized Configuration Server.
Note
After you publish, properties that are deleted from the config.properties file are not
deleted from the Centralized Configuration Server. However, deleted properties
are reflected in the current mid tier memory immediately and are restored when the
mid tier is restarted. Click Restore to restore global settings from the Centralized
Configuration Server to the config.properties file. Exercise caution when deleting
any property directly from the Centralized Configuration Server forms.
6. Click Restore to update the global settings from Centralized Configuration Server to the
config.properties file.
Note
The properties that are not available for editing through the Centralized Configuration
Settings page must be edited directly in the config.properties file.
arsystem.cluster.id
The cluster identifier of the mid tier cluster. All mid tier instances in the same cluster share
the cluster identifier.
arsystem.ccs.password
The encrypted mid tier service password for the Centralized Configuration Server.
arsystem.ccs.host
The name of the Centralized Configuration Server.
arsystem.ccs.port
The port number of the Centralized Configuration Server.
The mid tier uses the ccs.properties file for connecting to the Centralized Configuration Server on
startup and for updating its configuration files for global settings (config.properties) and tenant-
specific settings (config.tenantName.properties).
Note
To add a tenant
1. Open the BMC Remedy Mid Tier Configuration Tool from the URL http://hostname:
portnumber/arsys/shared/config/config.jsp
2. Click the Tenant Settings link.
3. On the Tenant Settings page, click Add Tenant.
Note
You must map this virtual host name with the pool name in the f5 load
balancer. For more information, see f5 rules (see page ).
c. In the Web Reports Base URL field, enter the base URL (for example, https://Tenant1.
onbmc.com:8080/).
d. (Optional) From the Tenant Configuration Server list, select an AR System server as
your configuration server.
This list is populated based on the AR System servers that are added to the mid tier.
For more information, see Adding or deleting a server (see page 470).
e. (Optional) Click Browse to specify the location of the config.properties file.
By default, the existing config.properties file is located in the
midTierInstallationDirectory\WEB-INF\classes folder.
f. (Optional) Clear the Also add to tenant's server list check box.
The configuration server is not added as a server to the tenant. By default, this check
box is selected.
5. Click Save.
Note
Ensure that the virtual host is accessible to the users by making appropriate changes in
DNS or load balancer settings.
The tenant is added to the mid tier. Each tenant that is added to the mid tier has a corresponding
tenant-specific property file. For example, if you add a tenant named Tenant1, a properties file
called config.Tenant1.properties is added to the midTierInstallationDirectory\WEB-
INF\classes\tenants\ folder.
Note
If you add a tenant with the name of a tenant that was deleted or offboarded from any mid
tier previously, a warning message is displayed. When you delete a tenant, the tenant is
deleted but the tenant configuration is not deleted from the Centralized Configuration
forms. For more information, see Centralized configuration for the mid tier (see page 439)
.
1. On the Tenant Settings page, select a tenant that you want to edit and click Edit.
2. On the Edit Tenant page, edit the tenant-specific properties that you want to change for this
tenant.
3. Click Save Tenant.
To delete a tenant
1. Open the BMC Remedy Mid Tier Configuration Tool from the http://hostname:portnumber
/arsys/shared/config/config.jsp URL.
2. Click the Tenant Settings link.
3.
BMC Remedy Action Request System 9.1 Page 444 of 4703
BMC Software Confidential. BladeLogic Confidential.
3. From the Tenant Settings page, select the check boxes in the Delete/Edit column for one or
more tenants.
4. Click Delete.
Note
Use caution when deleting a tenant. Ensure that the users who are logged on using the
tenant's virtual URL stop accessing the mid tier; otherwise they might see unexpected
behavior.
Note
For a mid tier to be accessed in multitenant mode, ensure that at least one tenant with a virtual
host name is added to the mid tier.
Note
The Mid Tier Configuration Tool is accessed only by the BMC Remedy AR System
administrator using the actual mid tier host name rather than the virtual host name.
Enabling logging
To debug issues with session replication or to verify whether failover is taking place in the Tomcat
cluster, you must edit the logging.properties file located in the TomcatInstallationFolder/conf
directory.
Note
Edit the attached logging.properties file to add new file handlers and set the debug log level to Info.
For example, create two new file handlers: 5cluster.org.apache.juli.FileHandler and 6cluster.org.
apache.juli.FileHandler, as shown in the following code. Add the code to the logging.properties file.
5cluster.org.apache.juli.FileHandler.level = INFO
5cluster.org.apache.juli.FileHandler.directory = ${catalina.base}/logs
5cluster.org.apache.juli.FileHandler.prefix = cluster.
6cluster.org.apache.juli.FileHandler.level = INFO
6cluster.org.apache.juli.FileHandler.directory = ${catalina.base}/logs
6cluster.org.apache.juli.FileHandler.prefix = ha.
org.apache.catalina.tribes.MESSAGES.level = INFO
org.apache.catalina.tribes.MESSAGES.handlers = 5cluster.org.apache.juli.FileHandler
org.apache.catalina.tribes.level = INFO
org.apache.catalina.tribes.handlers = 5cluster.org.apache.juli.FileHandler
org.apache.catalina.ha.level = INFO
org.apache.catalina.ha.handlers = 6cluster.org.apache.juli.FileHandler
Note
When you install Tomcat through the latest version of BMC Remedy AR System, the
cluster log settings are already added by the installer. However, you can change the log
level whenever required.
Glossary
load balancer
A transparent network device that distributes the traffic from multiple tenants to several tenant AR
System servers, preventing BMC Remedy AR System servers from becoming overloaded.
Distributing workload among several BMC Remedy AR System servers leads to performance
benefits and cost savings.
multitenancy
Refers to the ability of a single instance of an application running on a server to serve multiple
customers. Customers, in this case, are called the tenants. In the multitenant environment, each
tenant is given the provision to customize the application according to their requirements.
server group
Multiple servers that are connected to each other and operate together; they share the work load
and also balance the load. One server in the server group is usually designated as the primary
server, which performs administrative activities and others are designated as secondary servers.
shared service
The consolidation of business operations that are used by multiple parts of the same organization.
tenant
A customer subscribing to the services provided in the SAAS model.
About Cluster ID
A cluster ID is a unique identification given to a cluster operating in the RoD environmen t. All mid
tiers within a cluster share a unique cluster ID. When you configure the Centralized Configuration
Server settings for each mid tier, ensure that the mid tiers within a cluster are configured with the
same cluster ID. Having a cluster identified by a unique cluster ID is essential because Centralized
Configuration Server can notify changes to the global properties across all the mid tiers within a
cluster. For more information about configuring the cluster ID for each mid tier, see Centralized
configuration for the mid tier.
You must decide a unique cluster ID for each cluster. For example, for Cluster1, you can add
Cluster1 as the cluster ID, for Cluster2, add Cluster2, and so on.
Related topics
Configuring a cluster
Guidelines for BMC Remedy deployment architect
5.
BMC Remedy Action Request System 9.1 Page 448 of 4703
BMC Software Confidential. BladeLogic Confidential.
5. For the following records, update the entry with the following details and then save each
entry.
Host = /
Port = “” (Empty)
Status = Enabled
If the mid tier is installed on the local computer using the default context path, enter
http://localHost/arsys/shared/config/config.jsp in your browser.
If the mid tier is not installed on the local computer, open a browser and enter the
URL in the following format:
http://hostName:portNumber/contextPath/shared/config/config.jsp
hostName is the name of the host computer for the mid tier.
portNumber is an optional port number; it is required if the web server is not
using the default port (port 80).
contextPath is the path to the location of the mid tier in the Oracle JSP engine (
arsys, by default).
2. When the Login page appears, enter the logon password for the Mid Tier Configuration Tool.
If you have not changed the password from the default, enter arsystem.
3. Click the Tenant Onboarding link.
4. (Optional) In the Centralized Configuration Server Settings page, shown in the following
figure, configure the Centralized Configuration Server settings.
For more information, see Centralized configuration for the mid tier (see page 439).
7.
BMC Remedy Action Request System 9.1 Page 450 of 4703
BMC Software Confidential. BladeLogic Confidential.
8. Add a new tenant (see page 442) with a name such as tenant1.
Ensure that the tenant name does not contain any special character.
9. (Optional) Select a tenant and click the Next Step button or the Tenant Configuration tab.
10. In the Edit Tenant page, make changes to tenant-specific properties (see page 442).
11. Click the Preload New Tenant tab.
The Cache Settings page opens.
12. Click Preload for the tenant AR System server.
(The Preload button is not available if you did not select the Pre-load check box in the AR
Server Settings page in step 6.)
You will see that initially the status of the preload is shown as Not Running.
Recommendation
BMC recommends that you perform preload when your system has a lesser load
and that you use the round-robin method to preload servers one at a time.
13. After the preload is completed, configure your load balancer to start sending requests to this
tenant using the virtual host name.
For example, the virtual host name of the tenant1 tenant can be http://tenant1.onbmc.com.
14. Verify whether the tenant is successfully added by logging on to the BMC Remedy IT
Service Management application, using the virtual host name of that tenant.
If the Centralized Configuration Server is not configured, perform all the steps in To onboard
a tenant on the first mid tier in the cluster (see page 449).
If the Centralized Configuration Server is configured, review all the steps in To onboard a
tenant on the first mid tier in the cluster (see page 449) and make changes, if required.
However, you must explicitly preload the tenant AR System server. For information, see
Setting up a cluster with multiple tenants (see page 522).
Related topics
Click to view a quick video for an example on setting up BMC Remedy Smart Reporting
as a cluster.
1. To set up BMC Remedy Smart Reporting as a cluster (Tomcat only), perform the following
steps:
Note
Before you configure the cluster, ensure that all the severs in cluster are in same
time zone and are in sync. Also, ensure that BMC Remedy Smart Reporting is
installed on all the nodes pointing to primary node repository.
<init-param>
<param-name>EncryptSessionId</param-name>
<param-value>true</param-value>
</init-param>
<init-param>
<param-name>EncryptSessionData</param-name>
<param-value>true</param-value>
</init-param>
<init-param>
<param-name>AutoTaskDelegation</param-name>
<param-value>true</param-value>
</init-param>
<load-on-startup>11</load-on-startup>
</servlet>
<init-param>
<param-name>DisableTaskScheduler</param-name>
<param-value>TRUE</param-value>
</init-param>
Note
<servlet>
<servlet-name>SystemTaskManager</servlet-name>
<servlet-class>com.hof.servlet.SystemTaskManager</servlet-class>
<load-on-startup>8</load-on-startup>
</servlet>
<web-app>
<distributable/> <!-- System Event and Debug classes --
>
<listener>
<listener-class>com.hof.servlet.SysSessionListener</listener-class>
</listener>
e. Perform this step if HTTPS traffic is offloaded at Load Balancer and Smart Reporting
is configured to run on HTTP:
In the server.xml file (Tomcat configuration file), set the HTTP Connector proxyPort
and scheme to the values displayed in the following code snippet. The path of
server.xml file is <AR Installation
Path>\SmartReporting\appserver\conf\server.xml
<Connector
port="8080"
protocol="HTTP/1.1"
connectionTimeout="20000"
proxyPort="443"
scheme="https"
disableUploadTimeout="true"/>
When the cluster is set up, on board the tenant. See Onboarding users and importing content in
BMC Remedy Smart Reporting .
Offboarding a tenant
You can offboard a tenant from the multi-tenant mid tier setup for the following reasons:
To offboard a tenant, you must first delete the tenant, then delete the tenant AR System server,
and then clean up the AR System server cache. Cleaning up the cache ensures that the resources
are made available for other tenants and that there is no contention of resources.
To offboard a tenant
2.
BMC Remedy Action Request System 9.1 Page 454 of 4703
BMC Software Confidential. BladeLogic Confidential.
6. On the AR Server Settings page, select the server that you want to delete.
Tip
Ensure that the tenant name and the tenant AR System server name are similar so
that you can easily identify which tenant was mapped to the AR System server.
This procedure assumes that the administrator remembers which tenant is
mapped to the tenant AR System server.
7. Click Delete.
8. Click the Next step button or the Cache Cleanup tab.
.
9. On the AR Server Cache Cleanup page, in the Action column, click Cleanup Cache for the
server whose cache you want to clean up.
Recommendation
10. After the cache cleanup is completed, click Remove From List to remove the AR System
server.
Notes
The Remove From List button appears only when the cache cleanup status is
Completed.
If multiple mid tiers are in the cluster, you must perform cache cleanup on each
mid tier.
If you are removing the last server from the mid tier, you must flush the cache
instead of clicking the Remove From List button.
You cannot clean up the cache unless you delete the AR System server.
You cannot delete the AR System server unless you delete the tenant that is
mapped to the server.
The cleanup process might result in any one of the following states:
Not started
Starting
Running
Completed
Failed
Related topic
Onboarding a new tenant (see page 449)
The following topics provide detailed information about internal and external firewalls:
Note
Firewall configurations vary from manufacturer to manufacturer. Ask the network and
security professionals at your company for more information. For information on the
cookies used by BMC Remedy Mid Tier, see Cookies used by BMC Remedy Mid Tier
(see page 498).
The firewall would need port 8080 open for HTTP. No mid-tier-specific configurations are needed
for this connection through the external firewall.
To enable these connections through the firewall, you must configure the AR System server and
the BMC Remedy Mid Tier to communicate on the proper ports, as described in the following
steps:
1. In the Ports and Queues tab of the AR System Administration: Server Information form, set
the BMC Remedy AR System server to use a specific TCP port. Because you are
configuring the mid tier to use a specific port, registering the server with portmapper is
optional.
For more information about the AR System Administration: Server Information form, see
Configuring AR System servers (see page ).
2. Ask your network administrator to open the port on which the BMC Remedy AR System
server is listening on the internal firewall for TCP.
For more information about assigning a specific port number in the Server TCP/IP Port field
on the Ports and Queues tab, see Setting ports and RPC numbers (see page ).
3. In the Mid Tier Configuration Tool, select AR Server Settings, and then set the Port# field to
the BMC Remedy AR System configuration.
These settings allow the mid tier to connect to the BMC Remedy AR System server, using the port
specified.
Allocating enough memory for your application and the mid tier (see page 458)
Monitoring mid-tier memory use and performance in real time (see page 458)
Configuring Apache Tomcat after installing BMC Remedy Mid Tier (see page 459)
Allocating enough memory for your application and the mid tier
If there is not enough memory allocated to your application server to run your BMC Remedy AR
System application on the BMC Remedy Mid Tier, the application server will produce out-of-
memory exceptions. (You can see this in the application server log file.)
1. Add the following parameters to the Java Virtual Machine (JVM) started by the mid-tier
JavaServer Pages (JSP) or servlet engine.
To monitor the mid tier on the mid-tier host:
At the At the command-line prompt, set the JAVA_OPTS environment variable as
follows, and then start Tomcat:
set JAVA_OPTS=-
Dcom.sun.management.jmxremote
Alternatively, add that parameter to the JAVA_OPTS entry in the TomcatInstallDir/bin/
catalina.bat file, and then restart Tomcat.
To monitor the mid tier remotely:
At the command-line prompt, set the JAVA_OPTS environment variable as follows,
and then start Tomcat:
set JAVA_OPTS=-
Dcom.sun.management.jmxremote.authenticate
=false
-Dcom.sun.management.jmxremote.ssl=false
-Dcom.sun.management.jmxremote
-Dcom.sun.management.jmxremote.port=portNumber
portNumber is the port number to connect to your JMX Remote Method Invocation
(RMI) connector. Specify an unused port number.
Alternatively, add those parameters to the JAVA_OPTS entry in the TomcatInstallDir
/bin/catalina.bat file, and then restart Tomcat.
2. To enable real-time monitoring, select the Enable Mid Tier Performance MBean check box
on the General Settings page In the BMC Remedy Mid Tier Configuration Tool. See
Configuring the General Settings page (see page 464).
3. Restart the mid tier.
Note
You can monitor the performance by analysing the entries in the armidtier.log file. For
more information, see BMC Remedy Mid Tier logging (see page 4187).
For Windows:
1. From the Microsoft Windows Start menu, select Programs > BMC Software > AR System 1 >
BMC Remedy Mid Tier > Configure Tomcat.
2. On the Java tab, select Java Option section.
3. Set the JAVA_OPTS="$JAVA_OPTS -XX:MaxMetaspaceSize parameter to 512m.
For UNIX:
1. When the Login page appears, enter the login password for the Mid Tier Configuration Tool.
If you have not changed the password from the default, enter arsystem.
2. Click Login.
After you log on, the Mid Tier Configuration Tool Overview page appears. It displays the current
settings for your installation. Use the navigation pane at the left to select configuration tasks.
The following topics provide detailed information about working with the Mid Tier Configuration
Tool:
Using the Mid Tier Configuration Tool with a load balancer (see page 461)
Setting MIME types (see page 461)
Each web server must have its own mid tier. You must configure each mid tier individually, and you
must configure each mid tier identically.
Note
BMC recommends configuring the load balancer without using a "sticky bit" (session
affinity) to allow sessions from any BMC Remedy Mid Tier server to be distributed to any
BMC Remedy AR System server on the fly. For more information, see Configuring the
Connection Settings page (see page ).
A persistent session allows login content to be maintained. Session migration between JSP engine
instances is not supported.
To verify that the new configuration password is in effect, log out of the Mid Tier Configuration Tool
and log on again.
The following topics provide detailed information about the parameters for the Mid Tier system
information and the current configuration settings:
The Overview page displays information about BMC Remedy Mid Tier system settings.
Setting Value
Mid Tier The version of the BMC Remedy Mid Tier that is installed.
Version
Installation The directory path being used for your BMC Remedy Mid Tier installation.
Directory
Web The product name of the web server being used with this installation of the BMC Remedy Mid Tier (for example,
Server Microsoft IIS) and the product name of the Java servlet engine being used with this installation of BMC Remedy Mid
Information Tier (for example, Apache Tomcat).
Note: In some web configurations, only the servlet engine details are shown.
Operating The operating system used on your computer (for example, Oracle Solaris 10 or Windows 2003 Server).
System
Name
Java The version of the Java Software Development Kit (SDK) that is installed on your computer (for example, 1.5.0).
Version
Setting Value
AR Server(s) The AR System servers currently used with the BMC Remedy Mid Tier.
Preference The servers currently designated as preference servers. You can add or delete servers from the General
Server(s) Settings page. See Setting user preferences (see page 1333).
Setting Value
Data
Visualization
Module Server
(s)
Homepage The AR System server for the BMC Remedy Mid Tier on which the home page resides.
Server
Log Directory The directory path in which session-related information, such as logs and temporary files, is stored.
Session The number of minutes after which a session expires. When the system has exceeded this amount without any
Timeout activity, the user must log on again. The default value is 90 minutes. You can change this value on the General
(Minutes) Settings page.
Setting Description
Session The number of minutes after which the current session will expire. When the system has exceeded this amount
Timeout without any activity, you must log on again. A session timeout clock in the status bar appears in the web browser
(Minutes)* of each user session. The clock shows how much time is left before an HTTP session will time out. If a
user performs any activity in an application on the BMC Remedy Mid Tier and that activity results in a server-
side call such as a backchannel call or opening a new form, the clock timer starts over. If a user action is only on
Setting Description
the client side such as data entry, the clock does not reset. The session timeout clock has an update granularity
of 1 minute. At each 60-second interval, the Oracle JavaScript controlling the session timeout clock is executed
to update the clock with the amount of time available before the HTTP session times out. For example, if 1
minute and 32 seconds remains, the display time will read 2 minutes.
If the form is viewed in a Firefox browser and the form includes a view, flashboard, or data visualization
field, the session timeout clock might not appear.
If a user is entering data in a form, that data might be lost if the session times out before the user submits the
data. To prevent possible data loss after a timeout, the user should leave the data visible in the form and use the
same login ID to open a new instance of the browser window. In the new browser, the user should then navigate
to the form, copy the data, and paste it into the new form. If users experience frequent timeouts, increase the
session timeout interval. The default value is 90 minutes; there is no upper or lower limit. The entry in the
Session Timeout in Minutes field of the AR System User Preference form (Web tab) will override this setting for
a specific user.
License The number of seconds before BMC Remedy Mid Tier releases an AR System user license associated with a
Release user if that user does not log out of BMC Remedy Mid Tier properly. To log out properly, the user must close the
Timeout ([30 - last browser window associated with the current HTTP session or navigate away from BMC Remedy Mid Tier.
300] Seconds) The default delay is 60 seconds. BMC Remedy Mid Tier initiates a delay timer when the user closes the last
* browser window associated with the established HTTP session. When the delay timer expires, the user's license
is released, and the HTTP session terminated. If the user navigates back to the mid-tier URL before the delay
time expires, the delay timer is cancelled, and the current HTTP session is resumed.
Preference The name of the AR System server designated as a preference server. You can specify more than one server if
Servers you need multiple preference servers to support different departments or business units. If you enter more than
one preference server, the system searches the list until it finds the first preference server that matches the user
name and uses that server as the preference server. To add or update preference servers, enter the name of
each server that you want to designate as a preference server. If you are adding more than one server, separate
each name with a comma (for example, mars, jupiter, saturn). A fully qualified server name is not valid in this
field.
All servers designed as preference servers must be included in the AR System Server list on the AR
Server Settings page. For more information, see Configuring the AR Server Settings page.
Data The name of the BMC Remedy AR System server designated as a data visualization module server. You can
Visualization specify more than one server if you need to copy the modules to another server as a backup in case the first
Module module server goes down. To add or update module servers, enter the name of each server that you want to
Servers designate as a module server. If you are adding more than one server, separate each name with a comma (for
example, mars, jupiter, saturn). A fully qualified server name is not valid in this field.
All servers designed as module servers must be included in the BMC Remedy AR System Server list
on the AR Server Settings page.
For information, see Using Crystal reports with BMC Remedy AR System.
Homepage The server that contains the home page that you want to open in the browser when the user logs on. The home
Server page URL is: http://<midTierServer>/<contextPath>/home. The home page server must already in the list of
BMC Remedy AR System servers on the AR Server Settingspage. For information, see Configuring the AR
Setting Description
Server Settings page. BMC Remedy Mid Tier searches this server for the designated or default home page. This
server is used globally if you have not selected a home page server in the AR System User Preference form. A
home page server specified in the AR System User Preferences form takes precedence over the server set
here. The form used for the home page has the following precedence on a specific server:
Authentication The server that BMC Remedy Mid Tier uses to authenticate the user. If an authentication server is specified,
Server BMC Remedy Mid Tier authenticates with the specified server only. The server specified here must already be
in the list of BMC Remedy AR System servers on the AR Server Settings page. For more information, see
Configuring the AR Server Settings page. If an authentication server is not specified, BMC Remedy Mid Tier
behaves as follows:
Prefer One of the settings evaluated when the system is progressing through the view selection algorithm; it indicates
Standard whether you want a standard view or a web view to be the default for the view type selection. If no view is
/Windows selected and the check box is:
Views
Selected - The browser displays the standard view of the form.
Cleared (default) - The browser displays the web view of the form, if one is available. If no web view is
available, the standard view is displayed. For more information, see How a view is selected and Selecting
a form view for the user.
Enable Object Indicates whether you want to enable the AR System Object List that displays all the forms and applications that
List BMC Remedy Mid Tier can access. If the check box is:
Selected - The Object List is displayed automatically when the system cannot determine the specific form
to load because an incomplete URL is entered into the browser or an application does not define a
primary form.
Cleared (default) - The AR System Object List is not enabled and is not displayed when the system
cannot determine which form to load.
Enable Mid Indicates whether mid tier memory use and performance can be monitored in real time through a Java
Tier Management Extension (JMX) console, such as JConsole. If the check box is:
Performance
MBean Selected - Memory use and performance can be monitored using a JMX console.
(requires Cleared (default) - Real-time memory use and performance monitoring is not enabled.
restart)
For more information, see Configuring mid tier memory.
Enable End Indicates whether Page Response Time is measured and displayed on mid tier application pages in the
User browser. If the check box is:
Response
Time Indicator Selected - Page Response Time Monitor is enabled on all pages.
Cleared (default) - Page Response Time Indicator is not enabled and is not visible when a page is
displayed.
For more information, see Monitoring mid tier response time (see page 4514).
Max Entries Returned — If you set this value, the results list display the number of records
equal to this value on one page. The remaining records are displayed in subsequent pages
having number of records equal to this property value. If you have set this value, the Max
Entries Returned By GetList property is not considered for pagination. Set using Definitions
> Basic properties on any form in Developer Studio. For details about how to set form
properties, see Setting basic form properties (see page 2323).
Max Entries Returned By GetList — This property limits how many database records are
returned from a search. For the results list, The property value is used for configuring the
maximum number of results returned in one page and distributing the results list into
subsequent pages having same number of records equal to this property value. If you have
set the Max Entries Returned property, this property value is not used for pagination. Set
using General > Server Information. For details about this property, see Setting the general
tab on server information form (see page 321).
View Level Size of Chunk for Result List — This property limits records in results list on form
views. If you set this value on form views, the cSet on any form view using properties. For
details about this property, see Setting form view properties (see page 3011).
Limit Number of Items returned — Set using User Preferences > My User Preferences. For
details about this property, see Setting the general tab on user preference form (see page
1344).
The minimum value of either the View Level Size of Chunk for Result List property or the Limit
Number of Items returned property is provided to the server and this minimum value is compared
with the Max Entries Returned form property. The smaller value is then used to display the form
results list. If you do not provide a value for the Max Entries Returned form property, the Max
Entries Returned By GetList server property is used for comparison.
User Scenarios
Formula
X = Lesser value between "View Level Size of Chunk for Result List" and "Limit Number
of Items returned"
The following table displays the list of values set for each property and the number of records
displayed in the results list:
Scenarios Max Entries Max Entries View Level Limit Number Property value
Returned Returned Size of of Items returned used for
By GetList Chunk for Result List Pagination
(Form property) (User Preference
(Server property) (Form View property) property)
1 20 50 0 0 20
2 20 50 10 - 10
3 20 50 10 5 5
4 0 50 0 0 50
5 5 50 10 20 5
6 10 5 20 30 10
7 0 0 0 0 1000
Note
If you have not provided value for any of the pagination properties, 1000 is the default
value used for showing results in a results list.
The following topics provide detailed information about the AR Server Settings page:
AR Server settings
Setting Description
Delete Click in the check box to select a server. To select all servers in the list, click Select All; to clear all selections in the
/Edit list, click Clear All.
AR The name of the AR System server that BMC Remedy Mid Tier is using. The name must be from a server that AR
Server System recognizes. BMC Remedy Mid Tier must be able to resolve this server name to an IP address. BMC Remedy
Name Mid Tier must also be able to reach the server through the defined port or through port 111, if the server is running
over the portmapper.
Domain The domain name portion of the fully qualified server name for the AR System server.
Name
Use Specifies whether the BMC Remedy Mid Tier always uses the short name of the AR System server. For example,
Short serverName. This value is set by the Use Short Name check box when adding or editing an AR System server.
Name
AR The specified password for an AR System account with administrator privileges. Set the BMC Remedy Mid Tier
Server Administration Password under the Connection Settings tab in the AR System Administration: Server Information
Admin form. (If a password has been entered for a server, asterisks appear in this column instead of the actual password
Password characters.) Version 7.0 and later AR System servers require a password.
AR The port number you previously configured to access the AR System server. If you have not configured a port
Server number, this field is blank.
TPC Port
Number
AR The Remote Procedure Call (RPC) protocol number that the server will use. This number can be used for connecting
Server to a private server. If you have not configured an RPC number, this field is blank.
RPC
Pre-Load Specifies whether preloading of forms to the system's memory is enabled for the server.
Setting Description
Definition The interval (in seconds) at which cache information is automatically updated.You can specify the interval in the
Change Definition Change Check Interval field from the Edit AR Server page.
Check
The default value is 86400 seconds. To change the interval, enter the new number of seconds in this field. If you do
Interval
not want the cache to be updated, clear the Perform Check check box from the Edit AR Server screen.
Enable Specifies whether skins are enabled and made visible for form views.
Skins
Related topic
Editing server properties (see page 471)
myserver
myserver.bmc.com
myserver.labs.bmc.com
1.160.11.240
For more information about reserved fields and their use, see Reserved fields (see page 2474
).
4. If you want the BMC Remedy Mid Tier to use the short name of the AR System server
instead of the long name (shortName+domainName), even if the domain name is defined,
select the Use Short Name check box. This includes use for $server$ keyword, URL
generation, etc.
If the Use Short Name check box is clear, the BMC Remedy Mid Tier will always use the
long name of the AR System server, even if the domain name of the AR System server is
defined.
5. Enter an administrator password, port number, and RPC number for the new server.
6. If you want to validate the password for the server, select the Validate Password check box.
If you select the check box and you enter the correct password, the server is added to the
list of servers that BMC Remedy Mid Tier uses. If you enter the wrong password, you cannot
edit the server.
7. To preload forms to the system's memory, select the Pre-Load check box.
8. Click Add Server.
Note
If a server that you have selected for deletion is being used as a preference server
or a home page server, you must delete it from the General Settings page before
you can delete it from this list. For more information, see Configuring the General
Settings page (see page ).
Note
You cannot edit the server name. To change the name of a server, delete the
server and add it again with the new name. Although the interface appears to allow
it, you cannot edit multiple servers at the same time.
3.
BMC Remedy Action Request System 9.1 Page 471 of 4703
BMC Software Confidential. BladeLogic Confidential.
The following sections provide detailed information about configuring the Cache Settings page:
Cache settings
Setting Description
Sync in Indicates whether you want the cache to be synced automatically on a group of mid tiers.
cluster
If the check box is:
Selected — The cache will be synced periodically and simultaneously across all mid tiers in a group.
Cleared (default) — The cache will be synced automatically at the interval that you specify in the Definition
Change Check Interval field.
For more information about this option, see Knowledge Base article ID 000030484.
Resource The time limit (in seconds) for which resources (such as images, .css files, and JavaScript files) can be used. The
Check default value is 86400 seconds. If a user closes a form and opens it again within the specified expiry time, the
Interval image is cached and is not downloaded again. This helps increase the performance of BMC Remedy Mid Tier.
(Seconds)
Enable Specifies whether forms cached in memory are written to files for faster retrieval. If the check box is:
Cache
Persistence Selected — Forms cached in memory are written to files. This option enables faster retrieval of forms when
the server is restarted.
Cleared — Forms cached in memory are not written to files.
AR System forms can be stored on disk only after Enable Cache Persistence is selected. AR System forms loaded
before the Enable Cache Persistence is selected are not saved to disk. For more information, see About the
Persistent Cache option.
Backup Full path of the directory where good cache backup exists. For more information, see Backing up the mid tier cache
Directory (see page 487).
Flush Removes all items from the caches that BMC Remedy Mid Tier maintains. The next time the mid tier needs those
Cache objects, the most up-to-date versions are retrieved from the AR System server.
Sync For the selected servers, clears the cache only for the objects that have been changed. For more information, see
Cache Using the sync cache option.
Preload Triggers the preload process for the specified AR System server.
(button in
the Action
column)
Setting Description
Completed - <timestamp> - if sync operation has completed successfully, and has deleted some metadata
from the cache because of the changes detected on AR System server.
Nothing To Sync - <timestamp> - if sync operation has completed successfully, but there are no changes to
the metadata changes on the AR System server.
Failed — if some errors occurred during the sync operation. The BMC Remedy Mid Tier logs contain details
about the failure.
This table is useful for monitoring your application's performance. If objects are being flushed due
to server definition changes, serious performance degradation can occur.
Note
By default, cache statistics (hit count and miss count) are not displayed even though they
are actually being collected. To enable cache statistics, see #Setting up a mid tier server
to use cache table statistics (see page 475).
http://<midTierServer>:<portNumber>/arsys/shared/config/config_cache.jsp
The Sync Cache operation synchronizes any of the following objects, if the changed timestamp on
BMC Remedy AR System Server is more recent than the cached item in the BMC Remedy Mid
Tier cache:
Forms
Active links
Containers (guides, applications, web services)
Menus (character menus)
Sync Cache completely removes and rebuilds the following cache items since the performance hit
is minimal:
Group data
Role data
Image objects
Note
The Sync Cache feature is not available in pre 7.5, patch 004 versions.
The Sync in Cluster option indicates whether you want the cache to be synced automatically on a
group of mid tiers. This option allows you to see the changes from Sync Cache from any mid tier in
the group without clearing browser cache.
Selected — The cache will be synced periodically and simultaneously across all mid tiers in
a group. It does not require the mid tiers to be in a clustered deployment. All the mid tiers
run the timed Sync Cache at the same time if the following conditions are true:
The mid tiers in the group should have the same interval definition specified from the
Definition Change Check Interval field of the AR Server Settings > Edit AR Server
Settings page.
The mid tiers should be running on computers with the same system clock time.
Note
The mid tiers in a group do not communicate with each other internally. All
mid tiers that have same system clock time and Definition Change Check
Interval value are defined as a group of mid tiers.
Cleared (default) — The cache will be synced automatically at the interval that you specify
on each mid tier in the Definition Change Check Interval field of the AR Server Settings >
Edit AR Server Settings page.
For information about this option, see Knowledge Base article ID 000030484.
When a user opens a BMC Remedy AR System on a form for the first time, BMC Remedy Mid Tier
must download the form and its workflow objects. It must then construct a Java object from these
items. This object is used to generate the Dynamic HTML needed to display the form in a browser.
The initial construction of this Java object is time-consuming, but after it is built, BMC Remedy Mid
Tier caches it in memory and accesses it for all users who open the same form from that point on.
You can activate serialization from the cache page of the Mid Tier Configuration Tool by selecting
the Enable Cache Persistence option.
Note
If the application server hosting BMC Remedy Mid Tier shuts down unexpectedly, BMC
Remedy Mid Tier reloads all forms specified in the prefetch configuration from the AR
System server when the application server is restarted.
For example, if you are using the version of Tomcat that was bundled with your Windows BMC
Remedy AR System installation, the service might fail to restart if the timeout setting is too low and
you have cached many forms.
Note
You must use the Tomcat configuration tool to configure these settings and restart
Tomcat.
You do not need to adjust the shutdown time when running Tomcat from the command line.
1. Select Start > All Programs > Apache Tomcat > Configure Tomcat.
2. Click the Shutdown tab.
3. In the Timeout field, enter a value that is appropriate for the number of forms you have
cached. The more forms you have cached, the larger this number should be. A value of 60
seconds is recommended. Use a higher value if you will be caching a large number of
forms.
4. Click the General tab.
5. Click Start.
6. Click OK.
Note
You must use the Tomcat configuration tool to configure these settings and restart
Tomcat.
To increase the JVM memory allocation and thread stack size in the Tomcat configuration tool
1. Select Start > All Programs > Apache Tomcat > Configure Tomcat.
2. Click the Java tab.
3. Enter the following recommended values:
Initial memory pool — 1024 MB
Maximum memory pool — 1024 MB
Thread stack size — Leave this field empty
4. Click the General tab.
5. Click Start.
6. Click OK.
To increase the JVM memory allocation and thread stack size for Tomcat from the command
line
where:
Xms is the initial (start) memory pool
Xmx is the maximum memory pool
Xss is the thread stack size
How the prefetch process retrieves forms after Tomcat is started or restarted
When Tomcat is started or restarted, the system retrieves specified forms as follows:
The prefetch process retrieves an entry for a form from the prefetchConfig.xml file, and
checks the timestamp on the AR System server.
If the timestamp indicated on the AR System server is identical (that is, if the form has not
been changed on the server), the prefetch process requests the specified form from the
cache manager.
If the timestamp indicated on the AR System server is newer, the prefetch process retrieves
all forms specified in the prefetchConfig.xml file from the AR System server.
Note
If Tomcat starts when the BMC Remedy AR System server is not running, prefetch does
not occur. To make sure forms are correctly prefetched, verify that the BMC Remedy AR
System server is running before starting or restarting Tomcat.
arsystem.resource_expiry_interval — Sets the cache expiry time (in seconds) after which
the browser checks BMC Remedy Mid Tier for updated resources such as images and
JavaScript files. The default value is 3600.
arsystem.ehcache.maxElementsInMemory — Sets the maximum number of objects that will
be maintained in the memory cache. If set to 0, the number of objects is unlimited. The
default value is 2147483647.
arsystem.ehcache.eternal — Sets whether elements are eternal. If eternal, timeouts are
ignored and the element is never expired. The default value is true.
arsystem.ehcache.timeToIdleSeconds — Sets the maximum amount of time between
accesses before an element expires. This setting is used only if the element is not eternal (
arsystem.ehcache.eternal=false). A value of 0 means that an element can idle for infinity.
The default value is 0.
arsystem.ehcache.timeToLiveSeconds — Sets the maximum time between creation time
and when an element expires. This setting is used only if the element is not eternal (
arsystem.ehcache.eternal=false). A value of 0 means that an element can live for infinity.
The default value is 0.
arsystem.ehcache.overflowToDisk — Sets whether the disk store persists to disk between
restarts of the Java Virtual Machine. The default value is true. If the Enable Cache
Persistence option is selected in the Mid Tier Configuration Tool, the value is set to true.
arsystem.ehcache.overflowToDiskTemp — Sets whether to cache items to overflow from
memory to disk. The cache items are not preserved between restarts of the Java Virtual
Machine. The default value is false. If set to true when arsystem.ehcache.overflowToDisk is
set to true, duplicate storage of the same cache item on disk might result.
arsystem.ehcache.maxElementsOnDisk — Sets the maximum number of objects that will be
maintained in the DiskStore. The default value is 0 (unlimited).
arsystem.ehcache.diskExpiryThreadIntervalSeconds — Sets the number of seconds
between runs of the disk expiry thread. The default value is 600.
The value in each of the following properties is multiplied with the value specified by the arsystem.
ehcache.referenceMaxElementsInMemory property to determine the maximum number of
elements in memory allowed for the specified cache. After the maximum has been reached,
elements are spilled over to disk using the policy specified by the property arsystem.ecache.
memoryStoreEvictionPolicy, if disk persistence has been enabled.
arsystem.ehcache.overflowToDiskTemp=true
arsystem.ehcache.midTierCacheTempDir=
Setting the above two properties will allow cache elements to spill over to disk temporarily. The
spilled-over cache elements are stored in the directory midTierRootDirectory/cachetemp.
arsystem.ehcache.referenceMaxElementsInMemory=1250
arsystem.ehcache.referenceMaxElementsInMemoryWeight.formImages=0.104
arsystem.ehcache.referenceMaxElementsInMemoryWeight.activeLinks=4.904
arsystem.ehcache.referenceMaxElementsInMemoryWeight.groups=0.025
arsystem.ehcache.referenceMaxElementsInMemoryWeight.roles=0.036
arsystem.ehcache.referenceMaxElementsInMemoryWeight.js=0.195
arsystem.ehcache.referenceMaxElementsInMemoryWeight.displayedFields=0.157
arsystem.ehcache.referenceMaxElementsInMemoryWeight.fieldMaps=0.323
arsystem.ehcache.referenceMaxElementsInMemoryWeight.sysdata=1.202
arsystem.ehcache.referenceMaxElementsInMemoryWeight.compiledForms=1.14
arsystem.ehcache.referenceMaxElementsInMemoryWeight.forms=0.400
arsystem.ehcache.referenceMaxElementsInMemoryWeight.html=0.195
arsystem.ehcache.referenceMaxElementsInMemoryWeight.formFields=8.577
arsystem.ehcache.referenceMaxElementsInMemoryWeight.actorViews=0.32
arsystem.ehcache.referenceMaxElementsInMemoryWeight.actorViewsMapping=0.32
As noted in the following table, setting these properties specify the maximum number of elements
for each cache:
BMC Remedy AR System can now preload active links and menus, and in turn detect and preload
the associated forms. This preloading can be enabled by selecting an option in the General
In addition, form views are preloaded based on usage statistics gathered by BMC Remedy Mid Tier.
Administrators can configure BMC Remedy Mid Tier to preload (prefetch) forms into the system's
memory so that forms can be loaded faster when they are opened in a browser. This capability is
especially useful for larger forms that otherwise might take several seconds to load.
Prefetching processes
Prefetching is triggered whenever BMC Remedy Mid Tier is restarted, or when the cache is
flushed. Prefetching includes these processes:
1. Forms with active links and menus are preloaded into the system's memory.
2. If a prefetchConfig.xml file exists (from a previous release of BMC Remedy AR System), all
of the forms and views specified in that file are preloaded.
3. Views are preloaded according to usage statistics gathered by the BMC Remedy Mid Tier
server.
The first prefetching process can be enabled by checking the Enable Preload option from the
General Settings page of the BMC Remedy Mid Tier Configuration Tool.
In this topic:
For example, suppose you have two groups, Group A and Group B, and two users, User 1 and
User 2. Group A includes both users; Group B includes only User 2. User 1 has a permission set
for Groups A and B; User 2 has a permission set for Group B only.
Even though both users belong to Group B, their unique permission sets differ. BMC Remedy Mid
Tier will have a different set of compiled forms, HTML, and JavaScript for each user.
Prefetching is made easier if users are assigned a set of permission groups that perform the same
function.
The Cache Settings page in the Configuration Tool includes a text box that shows the content of
the prefetchConfig.xml file. By default, this content is commented out. By removing the comment
tags, you can edit the content, using the appropriate XML tags to enter the users, servers, locales,
and forms to which prefetching should apply. Multiple users or forms can be specified.
Each form is prefetched according to the specified user's permissions for that form and its fields.
For example, if you select a form that has 75 fields, and specify a user who has permission to view
only 20 fields on that form, the prefetch process can fetch and cache the form with only the 20
fields for which the use has access.
Any changes you make to the file also appear in the Prefetch text box the next time you open the
Configuration Tool.
Remember the following conditions when working with the prefetchConfig.xml file directly or in the
Mid Tier Configuration Tool:
The prefetchConfig.xml file must be specified as UTF-8. When editing the file, do not alter
the UTF-8 information.
Do not change the name of the prefetchConfig.xml file.
If you flush the cache in the Mid Tier Configuration Tool, any prefetched forms you
previously specified are flushed from the memory cache. The prefetch process is performed
again for these forms the next time the web server is restarted.
If you specified an invalid form name (for example, if a form name is misspelled or a form
does not exist on the specified server), that form will not be prefetched. The mid tier log
notes the names of forms that were not prefetched.
You can also click the XSD file link on the Cache page to display a copy of the XSD file, which
shows the syntax used for the prefetch information.
For example, suppose you have two groups, Group A and Group B, and two users, User 1 and
User 2. Group A includes both users; Group B includes only User 2. User 1 has a permission set
for Groups A and B; User 2 has a permission set for Group B only.
Even though both users belong to Group B, their unique permission sets differ. BMC Remedy Mid
Tier will have a different set of compiled forms, HTML, and JavaScript for each user.
Prefetching is made easier if users are assigned a set of permission groups that perform the same
function.
Creating a cache
A cache is used for restoring the cache if the cache gets corrupt.
Note
Set up a separate BMC Remedy Mid Tier outside BMC Remedy Mid Tier cluster
for creating a cache.
Share a central location to store the copy of the cache.
1. Install and set up BMC Remedy Mid Tier 9.1 on a computer outside of the BMC Remedy
Mid Tier cluster with no tenants added.
2. Update the Cache Backup Directory folder path for the BMC Remedy Mid Tier. For example
/opt/bmc/ARSystem/midtier/backup.cache
a. Open the BMC Remedy Mid Tier Configuration Tool.
b. Click the Cache Settings link to open the Cache Settings page.
c. Update the Cache Backup Directory folder path.
3. (Optional) Perform this step after you have onboarding the first tenant.
a. Stop the BMC Remedy Mid Tier.
b. Copy the backup cache from shared location to backup folder of the BMC Remedy
Mid Tier.
c. Delete all the content from the cache folder.
d. Start the BMC Remedy Mid Tier.
4. Add a new tenant BMC Remedy AR server to the BMC Remedy Mid Tier.
5. Start the preload for the tenant BMC Remedy AR System server.
6. When the preload is complete, stop the BMC Remedy Mid Tier.
7. Back up the cache folder.
See Backing up the Mid Tier cache (see page 487).
8. Replace the backup cache that is stored at the shared location.
9. Update the backup cache directory folder path for all the BMC Remedy Mid Tiers in the
cluster with the new backup cache directory folder path.
1. Stop Tomcat.
2. Open the .lck file located in the midTierInstallationDirectory\cache directory.
3. Verify whether the SHUTDOWN_COMPLETED state is available in the file.
4. Restart Tomcat.
1. Create a directory in any location on the computer where the mid tier is running, and copy
the intact cache to this location.
For example, copy the mid tier cache (see page 489) directory located in the
midTierInstallationDirectory\cache folder to the /opt/cache_backup folder.
Note
Ensure that you retain the timestamps of the data and index files. The backed up
copy is not considered as a good copy if the timestamp does not match.
2. On the Cache Settings page, in the Backup Directory field, enter the path and name of the
directory that you created in the previous step.
3. On the Cache Settings page, click Save Changes.
4. (Linux) Stop Tomcat and use the backup utility (see page 488) to take a back up of the
cache.
5. Restart Tomcat and click Sync Cache to sync the cache for the AR System server.
Notes
This utility is available for Linux only. For Windows, you must manually back up the
cache.
BMC recommends that you use the cache backup utility so that you always get a
good copy of the cache without a timestamp mismatch.
Before running this utility, ensure that the mid tier is not running.
1. Ensure that the target mid tier, on which you want to use good copy of the cache, is not
running.
2. Copy the /opt/cache_backup/cache.tar from the first mid tier to the target mid tier and extract
it on the target mid tier. For example, use the following commands to copy and extract the .
tar file:
To copy:
cd /opt/cache_backup
tar -xvf cache.tar
3. Ensure that the path to the backup directory is set to /opt/cache_backup in the arsystem.
ehcache.midTierBackupCacheDir property.
4. Go to the target mid tier and delete the midTierInstallationDirectory/cache directory.
5. Start the mid tier which will automatically start using the good copy of the cache.
Related topics
If you are running the mid tier in multi-tenant mode, use the Sync Cache option over the Flush
Cache option to avoid removal of complete cache contents rather than just refreshing changed
objects in the cache. For information on using the sync cache, see Using the sync cache option
(see page 476).
Note
Always use Sync Cache option to get any of your metadata changes reflected in mid tier.
There should be no reason to use the Flush Cache option unless you see cache
corruption (such as EOFException) in the mid tier logs due to an unclean shutdown or
some other system issue. Using Flush cache hinders the mid tier performance as
compared to using Sync cache and the performance-related issues multiply when running
the mid tier in multi-tenant mode.
The Report Settings page displays different options, depending on your installed configuration:
If the AR Web ReportViewer is installed with the mid tier, additional settings specific to
BusinessObjects Enterprise and Crystal Reports Server appear on the Report Settings page
in the Mid Tier Configuration Tool.
If the AR Web ReportViewer is installed without BMC Remedy Mid Tier, the AR Web
ReportViewer Configuration Tool is also installed. It is a subset of the Mid Tier Configuration
Tool that contains only those settings needed to configure the AR Web ReportViewer.
This section describes all the possible settings on the Report Settings page. For additional
information about the AR Web ReportViewer and using BMC Remedy Mid Tier with Crystal reports,
see Using Crystal reports with BMC Remedy AR System (see page ).
If the AR Web ReportViewer is installed without the mid tier, you can access the AR Web
ReportViewer Configuration Tool from the BMC Software entry in the Windows Programs menu, or
by using the URL to configreport.jsp, for example, http://<ARWebReportViewerHost>/arreports
/shared/config/configreport.jsp.
Report settings
Setting Description
Crystal/BO How you are deploying your BOXI or Crystal Reports report engine:
Report Engine
Deployment No Report Engine — Select this if you are not using Crystal reports.
(Mid Tier BOXI/Crystal Report Server on this machine — This selection appears only when BMC Remedy Mid
Configuration Tier is installed on the Crystal reports server.
Tool only) BOXI/Crystal Report Server on a different machine without a mid tier but with AR Web ReportViewer
installed.
BOXI/Crystal Report Server on a different machine with a mid tier.
Reporting The working directory where BMC Remedy Mid Tier deposits report definitions to be picked up by the relevant
Working report engine (Web, BMC Remedy AR System, or BOXI/Crystal). Enter the complete (absolute) path for this
Directory directory, for example: ARSystemInstallDir\midtier\reports If this directory is not under the web server's root
document directory, configure your web server with a virtual directory to point to this directory.
Setting Description
BOXI/Crystal The URL prefix, including the host name and port number, if any, used to access the mid tier or AR Web
Reports Server ReportViewer on the BOXI or Crystal Reports server. For example, if the URL for BMC Remedy Mid Tier on
Location (Mid the BOXI or Crystal Reports server machine ishttp://<hostName>:8080/arsys/, enter http://<hostName>:8080
Tier
If the context path is not arsys, then include the context path: http://<hostName>/<contextPath>or
Configuration
http://<hostName>:<portNumber>/<contextPath>
Tool only)
CMS Machine Host name of the computer where the Crystal Reports Management server resides. Do not include the port
Name number.
If this field is blank, the default system DSN, AR System ODBC Data Source, is used. This is the
recommended configuration. (The ODBC driver is installed on the Crystal reports server when the mid tier or
AR Web ReportViewer is installed.)
CMS Folder Name — (BusinessObjects Enterprise only) The name of the folder where the Crystal
reports are published.
CMS User Name and CMS Password — (BusinessObjects Enterprise only) The user name and
password of a user with full administrator rights in the CMS. BMC Remedy Mid Tier uses this user
information to log on to the CMS and publish the reports.
If the web service call does not contain an AuthenticationInfo header, you must specify an
Anonymous User Name and Anonymous Password on the Web Service Settings page that is a
Remedy User Name. If the AR System server hosting the web service allows guest users, then the
Anonymous User Name of the Web Service Settings page must have an entry, but it does not have
to be an AR User ID.
For published web services used by AR System, user information such as user name, password,
and domain name are passed to the service through Simple Object Access Protocol (SOAP)
headers. If a user name and password cannot be found in the SOAP headers, the name and
password specified in these fields are used to connect to the server where the needed web service
resides. There is no default value for these fields.
For more information, see Using Crystal reports with BMC Remedy AR System (see page ).
Note
BMC recommends configuring a load balancer between BMC Remedy Mid Tier servers
and the BMC Remedy AR System servers without using a "sticky bit" (session affinity).
If your system uses a hardware load balancer between BMC Remedy Mid Tier and BMC Remedy
AR System servers, make sure the Enable Lifespan check box is selected on the Connection
Settings page. This configuration allows sessions from any mid tier server to be distributed to any
BMC Remedy AR System server on the fly, and enables the system to rebalance in a timely
manner if a server is added to or removed from the system. This top group of settings facilitates
load rebalancing within a server group.
The settings on the Connection Settings page enable you to limit the number of proxy connections
and specify how long proxy connections can stay open. Whether the Connection Lifespan or
Connection Timeout setting is met first determines the number of current idle connections, which is
displayed in the Idle column in the Connection Pool Status area.
For more information, see Configuring a hardware load balancer with BMC Remedy AR System
(see page 524).
This section describes all the possible settings on the Connection Settings page.
The following sections provide detailed information about configuring the Connection Settings
page:
Parameters to support load balancers between BMC Remedy Mid Tier and server group
without a sticky bit (see page 494)
Connection Pool Settings parameters (see page 494)
Connection Pool Status parameters (see page 495)
Parameters to support load balancers between BMC Remedy Mid Tier and server
group without a sticky bit
The following table lists the Connection Settings parameters which support load balancers between
BMC Remedy Mid Tier and server group without using a sticky bit:
Connection settings
Setting Description
Enable Specifies whether to enable the rebalancing of connection loads between BMC Remedy Mid Tier group and the
Lifespan server group. If the check box is:
Selected — any connection session open longer than the Connection Lifespan parameter value will be
reopened with a rebalanced load within the server group.
Cleared — load balancing will not be enabled.
Connection The amount of time (in minutes) that a connection will be load balanced after it is created. To prevent any load
Lifespan balancing on the connection, keep this parameter at its default value of 0. Whether the Connection Lifespan or
(Minutes) Connection Timeout setting is met first determines the number of current idle connections.
Balance Sets the Connection Lifespan to 5 minutes, temporarily for a 10 minute period, to quickly rebalance the connection
Now loads between BMC Remedy Mid Tier group and the server group. If an AR System server is down, the mid tier
quickly routes connections to functional AR System servers. It also starts rebalancing existing not-in-use
connections that had the original Connection Lifespan value.
When the 10 minute period concludes, the connections then go back to their configured Connection Lifespan value.
Setting Description
Maximum The maximum number of proxy connections that a connection pool can contain per server. If the number of
Connections existing connections for the requested server does not exceed this value, a connection is allocated to that server.
per Server The default value is 80.
Note
This setting is usually not changed from its default value, because it represents a pool of connections
and not the number of users who can connect to a BMC Remedy AR System server.
Connection The amount of time (in minutes) that the pooled connections exceeding the Idle Connections per Server can be
Timeout idle before being terminated. This time limit makes sure that active pools routinely clean up their excess idle
(Minutes) connections. To prevent any idle pooled connections from terminating before the client shuts down, set this
parameter to 0. Whether the Connection Lifespan or Connection Timeout setting is met first determines the
number of current idle connections.
Idle The maximum number of idle connections per server that are not subject to the Connection Timeout. These
Connections connections are always available after they are established. The default value is 5. If the Idle Connections per
per Server Server is set to 0, then the connection pool will be closed when all connections are closed.
Setting Description
Pool Name The host name and port number for the server hosting the connection pool.
Idle The number of established connections that are available in the connection pool.
Max Available The maximum number of pooled proxy connections for this pool.
Last Used The datetime stamp when the pool was last used.
If you use BMC Remedy ITSM Suite applications, see Registering hub and spoke servers.
Note
BMC recommends that you do not configure your central AR System server until you
have prepared a remote AR System server to be configured at the same time.
Note
Perform this procedure on the central server for each remote server that you are
configuring.
1. On the central AR System server, add a new server to the AR System Server to Key Map
form for the remote AR System server.
a. In the Server Name field, type the name of the server used for registering the remote
AR System server with the remote mid tier.
Note
If you enter the Fully Qualified Domain Name (FQDN) of the AR System
server, then make sure that the FQDN of the remote AR System server can
be resolved by using the domain name system (DNS) from the central mid
tier server and from the remote mid tier server.
If the FQDN of a remote AR System server is invalid, make sure the Server
Name value for the remote server is valid in the AR System Server to Key
Map form on the central server. Make sure the valid remote Server Name
can be resolved from outside the specific DNS.
b. In the Public Key field, copy the Public Key from the AR System Server to Key Map
form for the remote AR System server.
Make sure to click the expand box of the Public Key field, then copy the Public Key
into the expand box.
c. In the Web Path field, type the mid tier base URL for the remote mid tier.
If there is a load balancer situated between the browser and the remote mid tier, then
type the URL of the load balancer instead of the mid tier base URL.
Note
For improved security, BMC recommends using HTTP over SSL (HTTPS)
on all mid tiers. If a reverse proxy or load balancer is set up with HTTPS
protocol, and the mid tier server is set up with HTTP protocol, then the
transfer of information between these two servers is less secure. The less
secure transfer of information between the two servers is most likely limited
to within the secured intranet zone.
If higher security is needed with encryption at all levels, the mid tier server
can also be set up with HTTPS protocol. However, this might impair
performance to end users due to multiple levels of encryption and
decryption.
If you configure multiple remote servers on the same reverse proxy, make
sure to configure those servers with name-based virtual hosting and not URI
path-based naming. For example, one central server and two remote
servers on a single reverse proxy would be named hub.eng.remedy.com,
spoke1.eng.remedy.com, and spoke2.eng.remedy.com. For details, see
Sample configuration of a single reverse proxy server.
2. Write a workflow that invokes an Open Window action on the remote AR System server. For
an example workflow, see the Scenario for creating an Open Window action workflow.
Note
You can only process a request in one session at a time. Therefore, click Open in New
Window only once and then process that request. If you log on to the remote server in
another browser window on the remote AR System server, and then close the new
window without logging off, you can receive an error while attempting to process a
request in the original session. This error is caused by concurrent sessions.
Note
All cookies used by the mid tier are required. When configuring the mid tier firewall, if you
do not accept cookies, BMC Remedy Mid Tier might not function correctly.
See the following table for a list of cookies used by BMC Remedy Mid Tier:
G IP-Restriction GUID — A persistent cookie used to track the user so that the same Persists for a day
user cannot log on from multiple computers
GKW Global Keywords — Used to track the global keywords used by the mid tier Deleted when the session
times out or the browser
is closed
JSESSIONID JSESSIONID — An HTTP-only session cookie created by the application server Deleted when the session
containing the encrypted data of the user session times out or the browser
is closed
P Pop-up Blocker — Indicates whether a pop-up blocker is to be shown or not Deleted when the session
times out or the browser
is closed
T Session Tracker — Used to track the total number of open windows Deleted when the session
times out or the browser
is closed
w Window — Used to display the name of the window Deleted when the session
XXXXXXXXX times out or the browser
is closed
FC Flash Cookie — Used to hold the cookie data in a Flash or shared object Deleted when the session
times out or the browser
is closed
GF Global Fields — Used to track the values of global fields when the fields are used Deleted when the session
across forms times out or the browser
is closed
LT License Timeout — Used to track when the license times out Deleted when the session
times out or the browser
is closed
ST Session Timeout — Used to track when the active session times out Deleted when the session
times out or the browser
is closed
MJUID Midtier Javascript Unique Identifier — Contains a unique value used to track the Deleted when the session
user’s Global field and keyword values during the lifespan of the user’s session with times out or the browser
the application server. is closed
Related topic
Notes
When you modify any property directly through config.properties file, you must
restart BMC Remedy Mid Tier for the changes to take effect. If the changes to a
property are done through AR System Configuration Generic UI form, restart is not
required for some properties.
BMC recommends that you use the AR System Configuration Generic UI form to
modify the centralized configuration settings. Do not use the config.properties file
to modify the configuration settings on the AR System Configuration Generic UI
form. For more information on the centralized configuration settings, see
Configuration settings A-B (see page 1142).
For the settings which are not centralized, you should use the config.properties file
to modify these settings.
arsystem. No Use this property to set the minimum value allowed for the table auto
table_autoRefreshMinInterval refresh interval rate. This is applicable for the entire table.
The system administrator sets the minimum value for the table auto refresh
interval rate by using this property in config.properties file. When the
system administrator sets the value of this property, the BMC Remedy AR
System considers only those values that are equal to or greater than the
value set by the system administrator. BMC Remedy AR System ignores
the user values that are less than the values set by the system
administrator.
Default value — 0
Needs restart? — No
arsystem.host.header_list No Note: The following procedure is applicable only for BMC Remedy AR
System 9.1.00.001 and later.
Perform the following steps before applying BMC Remedy AR System 9.1
Patch 001.
arsystem.session_timeout Yes Number of minutes for which the current logon session remains inactive.
When the time exceeds the arsystem.session_timeout value, you must log
on again.
Needs restart? — No
arsystem.licenserelease_timeout Yes Number of seconds before BMC Remedy Mid Tier releases an AR System
license for a user, if the user does not log out of mid tier correctly.
Note: When logging out, the user must close the last browser window
associated with the current HTTP session or navigate away from the mid
tier.
Needs restart? — No
Needs restart? — No
Needs restart? — No
No
arsystem.arservers.<serverName>. Port number that the user previously configured to access the AR System
port server. If you have not configured a port number, leave this field blank.
Needs restart? — No
arsystem.arservers.<serverName>. No Remote Procedure Call (RPC) protocol number that the AR System server
rpc uses. The RPC protocol number is used for connection to a private server.
If you have not configured an RPC number, leave this field blank.
Needs restart? — No
arsystem.arservers.<serverName>. No Indication that the BMC Remedy Mid Tier always uses the short name of
useshort an AR System server.
Needs restart? — No
arsystem.arservers.<serverName>. No Indication that preloading of the forms has been enabled for this AR
preload System server.
Values are:
true (default)
false
Needs restart? — No
To add or update preference servers, enter the name of each server that
you want to designate as a preference server. To add multiple servers,
separate each server name with a comma.
Needs restart? — No
arsystem.authentication_server Yes Server that the mid tier uses to authenticate a user. If an authentication
server is specified, the mid tier authenticates with the specified server. The
authentication server must already be in the list of mid tier servers on the
AR Server Settings page.
Needs restart? — No
arsystem.arservers_list Yes List of AR System servers that are added to the selected mid tier on the AR
Server Settings page.
Needs restart? — No
arsystem.homepage_server Yes AR System server that contains the home page that you want to open
when the user logs on
The home page server must be added to the list of mid tier servers in the
AR Server Settings page.
The mid tier searches the designated server for the home page. If you
have not selected a home page server in the AR System User Preference
form, the home page server specified in the AR Server Settings page is
used globally . A home page server specified in the AR System User
Preferences form takes precedence over the server set in the AR Server
Settings page.
The form used for the home page has the following precedence on a
specific server:
Needs restart? — No
arsystem.plugin_servers_list Yes Name of the AR System server designated as a data visualization module
server. You can specify additional servers as backup servers in case the
first module server goes down.
To add or update module servers, enter the name of each server you want
to designate as a module server. If you are adding more than one server,
separate each name with a comma.
Needs restart? — No
Values are:
Values are:
Note: You can see the pre-load start and end timestamp when you set the
log level to Info or Warning. Irrespective of the logging level, mid tier logs
the pre-load start and end time.
Needs restart? — No
arsystem.log_viewer Yes Method by which you want to view the log files.
Values are:
Needs restart? — No
arsystem.log_category Yes Type of information that should be stored in the log file.
Values are:
Needs restart? — No
arsystem.log_format Yes Log output, which is generated using the standard Java 1.5 logging API,
including Simple and XML formatting. Values are:
Needs restart? — No
arsystem.log_filename No Name of the file with which the log file will be generated.
Needs restart? — No
Needs restart? — No
arsystem.log_filesize Yes Maximum size (in kilobytes) a file can reach before a backup copy is
automatically made. When the log file reaches this limit, a backup copy is
made with the same file name and an incremental number (for example,
armidtierN.log).
Needs restart? — No
arsystem.log_backups Yes Maximum number of backup files that the system will generate when the
log file size exceeds the limit specified in the Maximum Log File Size (
arsystem.log_filesize).
Needs restart? — No
After you enter the user name and save changes, a new log file is started.
For log messages displayed on the screen, the filter applies only to new
entries. Older entries that existed before the user name was changed will
still be displayed on the screen, up to the limit set in the View Logs setting.
If the field is left blank, all logs related to the current session are stored,
regardless of who is logged in. You can enter only enter one name in this
field.
Needs restart? — No
arsystem.pooling_max_ Yes Maximum number of connections in the AR System server Java API
connections_per_server connection pooling.
Default value — 80
Values are:
true (default)
false
arsystem.cache_update_interval No Interval (in seconds) at which the cache information will be automatically
updated.
Note: For Development cache mode, the value must be 0. For Production
cache mode, the value must be greater than 0.
Needs restart? — No
arsystem.cache_update_needed No Indication that the cache is updated automatically. You can still update the
cache manually by clicking the Sync / Flush Cache button.
Values are:
arsystem.crt_working_dir No Working directory where the BMC Remedy Mid Tier saves the report
definitions. These report definitions are collected by the relevant report
engine (Web, AR System, or BOXI/Crystal).
Enter the complete (absolute) path for this directory, for example:
ARSystemInstallDir\midtier\reports.
If this directory is not under the web server’s root document directory, you
must configure your web server with a virtual directory to point to this
directory.
Needs restart? — No
arsystem.crtXI_location No URL prefix, including the host name and port number, if any, that is used to
access the mid tier or AR Web ReportViewer on the BOXI or Crystal
Reports server.
For example, if the URL for the BMC Remedy Mid Tier on the BOXI or
If the context path is not arsys, then include the context path: http://
hostName/contextPath or http://hostName:portNumber/contextPath
Needs restart? — No
Needs restart? — No
Needs restart? — No
arsystem.browser_version_error No Flag that indicates whether browser version error message is on or off.
If you use an unsupported browser, you can use this setting to turn the
error message on or off.
Values are:
On (default)
Off
Needs restart? — No
arsystem.authenticator No Fully qualified class name of the login authentication module to be used,
such as DefaultAuthentication or AtriumSSOAuthenticator.
ardev.webwriter.comments No Comments that are added to the generated HTML that is cached by the
mid tier to make the workflow debugger output more readable.
Values are:
true
false (default)
Needs restart? — No
ardev.webwriter.whitespace No White space that is added to comments in the generated HTML that is
cached by mid tier to make the workflow debugger output more readable.
Values are:
true (default)
false
Needs restart? — No
ardev.webwriter.indent No
Values are:
0
2 (default)
Needs restart? — No
ardev.jswriter.comments No Comments that are added in the generated JS that is cached by mid tier to
make workflow debugger output more readable.
Values are:
true (default)
false
Needs restart? — No
ardev.jswriter.whitespace No White space that is added in the generated JS that is cached by mid tier to
make workflow debugger output more readable.
Values are:
true (default)
false
Needs restart? — No
ardev.jswriter.indent No Indentation that is added in the generated JS that is cached by mid tier to
make workflow debugger output more readable.
Values are:
0
2 (default)
Needs restart? — No
ardev.allow_unconfigured_servers No Indication that server information for an AR System server that is not
configured in mid tier can be retrieved.
Values are:
true (default)
false
arsystem.js_profile No Indication that the javascript generated from active links should be profiled
and shown in the workflow logs.
Values are:
true
false (default)
arsystem.image.spinnerup No Name of the image from resources folder to use as the UP spinner for an
integer field.
arsystem.image.spinnerdown No Name of the image from resources folder to use as the DOWN spinner for
an integer field.
arsystem.image.diary No Name of the image from resources folder to use as an icon for a diary field.
arsystem.image.calendar No Name of the image from resources folder to use as an icon for a calendar.
arsystem.image.currency No Name of the image from resources folder to use as an icon for a currency
field.
arsystem.image.menu No Name of the image from resources folder to use as an icon for a menu.
arsystem.image.text No Name of the image from resources folder to use as an icon for a character
field.
arsystem.image.time No Name of the image from resources folder to use as an icon for a time field.
arsystem.image.tablechunkleft No Name of the image from resources folder to use as an icon for a left chunk
image in a table field.
arsystem.image.tablechunkdown No Name of the image from resources folder to use as an icon for a down
chunk image in a table field.
arsystem.image.tablechunkright No Name of the image from resources folder to use as an icon for a right
chunk image in a table field.
arsystem.image.open No Name of the image from resources folder to use as an icon for a file upload
button.
arsystem.image.edit No Name of the image from resources folder to use as an icon for an edit
button.
arsystem.image.rtf No Name of the image from resources folder to use as an icon for an RTF
button.
arsystem.flash.image.spinnerup No Name of the image from resources folder to show UP spinner for an integer
field in flashboards.
arsystem.flash.image.spinnerdown No Name of the image from resources folder to show DOWN spinner for an
integer field in flashboards.
arsystem.flash.image.diary No Name of the image from resources folder to be shown as an icon for a
diary field in flashboards.
arsystem.flash.image.calendar No
arsystem.flash.image.currency No Name of the image from resources folder to be shown as an icon for a
currency field in flashboards.
arsystem.flash.image.menu No Name of the image from resources folder to be shown as an icon for a
menu in flashboards.
arsystem.flash.image.text No Name of the image from resources folder to be shown as an icon for a
character field in flashboards.
arsystem.flash.image.time No Name of the image from resources folder to be shown as an icon for a time
field in flashboards.
arsystem.flash.image.tablechunkleft No Name of the image from resources folder to be shown as an icon for left
chunk image in a table field in flashboards.
arsystem.flash.image. No Name of the image from resources folder to be shown as an icon for down
tablechunkdown chunk image in a table field in flashboards.
arsystem.flash.image. No Name of the image from resources folder to be shown as an icon for right
tablechunkright chunk image in a table field in flashboards.
arsystem.flash.image.open No
Name of the image from resources folder to be shown as an icon for file
upload button in flashboards.
Default value — 1
Default value — 1
arsystem.enableHttpTrace No Flag that enables recording of an http trace by a web server for every
request in mid tier.
Values are:
true (default)
false
arsystem.resource_expiry_interval No Time limit (in seconds) for which resources (such as images, .css files, and
JavaScript files) can be used
If you close a form and open it again within the specified expiry time, the
image is cached and is not downloaded again. This helps increase the
performance of mid tier.
Needs restart? — No
arsystem.formhtmljs_expiry_interval No Time limit (in seconds) for which a form's generated html and JS data can
be used
If you close a form and open it again within the specified expiry time, the
html and JS data is cached and is not downloaded again. This helps
increase the performance of mid tier.
Needs restart? — No
arsystem. No Flag that enables content compression for userdata.js and AppList.html.
enableContentCompression This property helps improve the performance of mid tier especially when a
large amount of data returned by these files.
Values are:
true (default)
false
Needs restart? — No
arsystem.prefer_native_views No Default view, standard or web view, for the view type selection
Note: This setting is evaluated when the system progresses through the
view selection algorithm.
Needs restart? — No
arsystem. No Flag that enables the content compression for the html and JS data
enableBackChannelCompression returned from the backchannel calls. This property helps improve mid tier
performance when a large amount of data is returned.
Values are:
true (default)
false
Needs restart? — No
arsystem.ehcache.overflowToDisk No Flag that indicates whether the mid tier cache persists items to disk so that
they survive between JVM restarts
Note: If you enable this setting, BMC recommends that you disable the
arsystem.ehcache.overflowToDiskTemp setting to avoid possible
duplication of cache items on disk when mid tier is running.
Values are:
true (default)
false
arsystem.ehcache. No Flag that indicates whether the mid tier cache can overflow cache items
overflowToDiskTemp temporarily to disk
Note: Setting this property to True might create duplicate cache items.
Values are:
true
false (default)
arsystem.ehcache. No Maximum number of objects to be kept in the mid tier cache's disk storage
maxElementsOnDisk
Default value — 2147483647
arsystem.ehcache.diskcache. No Maximum number of objects to be kept in memory for the disk cache
maxElementsInMemory component of the mid tier cache. When the number of total objects in the
disk cache goes beyond this limit, these objects are stored on the disk.
Default value — 1
arsystem.ehcache. No Policy with which objects are swapped between memory and disk
memoryStoreEvictionPolicy
Default value — LRU
arsystem.ehcache. No Default maximum element weight for form fields images cache
referenceMaxElements
InMemoryWeight.formFields To get the exact number of objects in the memory, you must multiply the
value of this setting with the value of the arsystem.ehcache.
referenceMaxElementsInMemory setting.
arsystem.ehcache. No Default maximum element weight for actor views mapping cache
referenceMaxElements
InMemoryWeight. To get the exact number of objects in the memory, you must multiply the
actorViewsMapping value of this setting with the value of the arsystem.ehcache.
referenceMaxElementsInMemory setting.
arsystem.ehcache.peerListener. No Replication scheme with which the selected listeners interact. Each peer
scheme provider has a scheme name that can be used by caches to specify a
replication type.
Values are:
RMI (default)
JMS
Jgroups
arsystem.ehcache.enableStats No Flag that indicates whether the cache statistics records cache hits and
misses
Values are:
true
false (default)
arsystem.enable_Animation No Flag that indicates whether animation in Javascript should be enabled. This
applies to animations, such as open dialog and flashboard.
Values are:
true (default)
false
Needs restart? — No
arsystem.xmlhttp.get No Flag that indicates whether the AJAX calls made within the Backchannel
requests use the http GET or POST method while sending requests to
BMC Remedy Mid Tier
Values are:
Needs restart? — No
arsystem.windowiis.installed No Flag that indicates whether mid tier is running on the IIS server. This
setting is used to display the information on the configuration overview
page.
Values are:
true
false (default)
Needs restart? — No
flashboards.showgraphinflash No Indication that charts are drawn by.using either Flash (interactive) or
JFreeChart (image) in Flashboards
Default value — 1
Needs restart? — No
Needs restart? — No
arsystem.searches.maxAllowed No Maximum number of search qualifications that can be stored for a user
Default value — 90
arsystem.enableMidTierPerfMBean No Flag that indicates whether the mid tier performance Mbean is deployed on
startup and whether mid tier can provide additional monitoring parameters
through JMX
Values are:
true
false (default)
arsystem. No Maximum number of threads spawned during the preload operation. This
max_number_of_prefetch_thread parameter is per AR System server.
Default value — 4
Values are:
true — Adds the header to every response, with the value as client
IP address. This header can be used in load balancer or other
proxies to create rules.
false — (default) Does not add the header.
Needs restart? — No
arsystem.allow.returnback.url No Flag that indicates whether direct access URL through LoginServlet is
allowed
Values are:
true (default)
false
arsystem.daemonthread_priority No Priority for the daemon threads spawned from BMC Remedy Mid Tier for
background threads, such as preload and synch
Default value — 4
arsystem.serverinfo.alertschema. No Time interval to verify whether the server information cached in mid tier is
update.interval considered old. If this value is reached or exceeded, the server information
is recached.
Needs restart? — No
arsystem.plugin_securitycheck No Flag that indicates whether the cross-site script attack detection should be
checked for plugins
Values are:
true (default)
false
Needs restart? — No
arsystem.use_connectionpooling No Flag that indicates whether to use connection pooling for the AR System
server
Values are:
true (default)
false
arsystem.flash.detect_flashplayer No Flag that indicates whether the validation for the flash plugin in the browser
should be performed on the login page
Values are:
true (default)
false
Needs restart? — No
arsystem.loginpage. Yes Flag that indicates whether the Accessible mode field is enabled in the
enable_accessible_mode login page.
Values are:
true
false (default)
Needs restart? —
Needs restart? — No
arsystem. No Timeout value for the auto complete functionality after which the auto
autoCompleteTypingTimeout complete menu will disappear
Needs restart? — No
arsystem. No Minimum number of entries retrieved in a native report after which the
min_entries_for_streaming information is transferred to the browser
Needs restart? — No
arsystem.flash.enable_ui_rendering No Flag that indicates whether the HTML user interface should be rendered by
using flash objects or simple HTML and images
Values are:
true (default)
false
Needs restart? — No
arsystem. No Flag that indicates whether to emit compatible mode for browsers
emit_X_UA_compatible_mode
Property to set the document mode for the BMC Remedy Mid Tier forms or
pages.
Values are:
Needs restart? —
arsystem.nativereport. No Maximum number of entries that will be displayed on the screen for native
onscreen_max_entries reports
arsystem.FileExport_max_entries No Maximum number of entries that will be displayed for native reports while
exporting to a file
Needs restart? — No
arsystem.webreport. No Maximum number of entries that will be displayed on the screen for web
onscreen_max_entries (BIRT) reports
Needs restart? — No
arsystem.objectlist No Flag that indicates whether the object list is enabled on mid tier
Values are:
true (default)
false
Note: When set to true, ensure that the corresponding form to display
object the list is imported on the AR System server.
Needs restart? — No
arsystem.enableSkins No Flag that indicates whether skins are enabled on the mid tier.
Values are:
true (default)
false
Needs restart? — No
arsystem. No Comma-separated list of all file extensions that are allowed for
inclusion_attachment_extensions attachments.
Note: Attachment security must be defined on the server side for this
property to have any effect. For more information, see Setting security
restrictions on file uploads (see page 349).
Needs restart? — No
arsystem.inclusion_goto_urls No Comma-separated list of URLs that are allowed in the goto request
parameter of LoginServlet and LogoutServlet so that the user is
automatically redirected to the specified URL.
Needs restart? — No
arsystem.myreport. No Maximum number of reports that will be saved for quick reports.
report_cache_limit
Default value — 20
Needs restart? — No
arsys.arf.atssoconfirmpwd No Plugin used by the BMC Remedy AR System server to fetch the user
password information from the BMC Atrium Single Sign-On (SSO) server.
arsystem.host.header_list No
Perform the following steps before applying BMC Remedy AR System 9.1
Patch 001.
2.
BMC Software Confidential. BladeLogic Confidential.
2. Navigate to \ARSystem\midtier\WEB-INF\classes\config.
properties location.
3. Edit config.properties to add the following parameter.
For example: arsystem.host.header_list = <Trusted Host
name(s) with comma separation>,
Where,
localhost is the computer on which the Mid Tier is installed.
4. Save the settings.
5. Start the server where Mid Tier is running.
arsystem.ehcache. No Absolute path of the folder that contains the good copy of the backed up
midTierBackupCacheDir cache
Recommendations
Set the Maximum Heap Size property value based on the number of tenants. For example,
if you are setting up a cluster with 8 tenants, ensure that the Maximum Heap Size is 6 GB
for all the mid tiers in the cluster.
Change the arsystem.ehcache.referenceMaxElementsInMemory property value ( located at
C:\Program Files\BMC Software\ARSystem\midtier\WEB-INF\classes\config.properties )
based on the number of tenants. For example, for 8 tenants, set the value of this property to
14000. For more information, see JVM runtime analysis in the BMC Remedy ITSM
Deployment documentation.
1. Ensure that only one mid tier is up and running in the cluster.
2. Enable preload for all Tenant AR Configuration servers on this mid tier.
3. Start the preload for all Tenant AR Configuration servers by clicking the Preload button for
each of the Tenant AR Configuration server on the Cache Settings page.
Note
4. Verify that the preload is completed successfully for all Tenant AR Configuration servers.
Note
If any one of preload statuses is Aborted, start preload again for that Tenant AR
Configuration server by clicking the Preload button.
Warning
Do not kill the Tomcat process. As an example, for 8 tenants, it takes about 10
minutes to shut down Tomcat.
Related topics
System scalability is dependent upon the capacity of the hardware. If the existing hardware
is at its limit, it needs to be replaced by bigger, more powerful hardware. New hardware is
often much more expensive than existing hardware. The old hardware could only be used
as a "hot" standby system. (A hot standby system is running and ready for immediate
service. It can be switched into service manually or automatically upon detection of a failure
in the active equipment.)
The system needs to be available for as much time as possible. This can be challenging
and often requires redundant systems. The backup system is often in hot standby mode and
is only activated in the event of an outage. Only one system can be used in production.
The solution to both challenges is a technology commonly used in the web environment — a load
balancer. You can use a hardware load balancer to improve the scalability and availability of BMC
Remedy Action Request System (AR System) servers.
A load balancer is a valuable component in building a scalable, highly available BMC Remedy AR
System infrastructure. Scalability is achieved through the ability to add BMC Remedy AR System
servers as demand and workload increase. High availability is achieved by configuring multiple
BMC Remedy AR System servers to handle client requests, and if one server fails, other servers in
the group handle the additional workload. By creating an infrastructure that scales with workload
and reduces downtime, you can maximize the return on your BMC Remedy AR System
investment.
This section provides the following topics to help you understand how to use a hardware load
balancer to improve the scalability and availability of the BMC Remedy AR System:
A load balancer also provides high availability through redundancy and fail-over protection. Fail-
over is the process of moving operations from one server to another upon service or machine
failure. If one BMC Remedy AR System server becomes unavailable for software reasons or if the
machine hardware fails, other BMC Remedy AR System servers in the group (or cluster) can take
over the workload. Users will not be aware of any problems, nor will they experience any downtime.
Most load balancers work on the TCP level of the network protocol and can therefore balance the
load of many applications that use this protocol. Some examples include HTTP, FTP, and the BMC
Remedy AR System server. The load balancer is transparent to users, so the client application
cannot see it and is unaware that the client requests are being load-balanced.
You can think of the load balancer as a virtual system, or as a super BMC Remedy AR System
server in this case. The load balancer is given a virtual IP address and a DNS name, either of
which is used by BMC Remedy Mid Tier clients when connecting to the group of load-balanced
BMC Remedy AR System servers. Both the short and long DNS names must be resolvable. (Long
DNS names are fully qualified with a domain.) When a client request is received, the load balancer
passes the request to one of the actual BMC Remedy AR System servers within the group. The
chosen BMC Remedy AR System server performs the work and sends the results to the client.
This balancing of connections spreads out the client requests evenly and distributes the load.
Note
For performance reasons, the BMC Remedy AR System API clients establish a
connection with the BMC Remedy AR System server and keep the connection until the
session is terminated or the connection is interrupted.
To distribute client requests across each group of BMC Remedy AR System servers, the load
balancer can use various scheduling policies. The following two policies are the most common:
Round Robin — This policy directs client requests to each BMC Remedy AR System server,
one at a time. Successive requests are routed to the next BMC Remedy AR System server,
then the next, and this process is repeated consecutively.
Least Connections — This policy directs client requests to the BMC Remedy AR System
server that has the fewest connections.
For better throughput, most load balancers offer multiple network ports. This method avoids
collisions between the incoming and outgoing routed network traffic.
The load balancer also offers clients the ability to stick to one target system. This means that all
requests from a single client are routed to the same system.
For versions 7.6.04 or later, BMC recommends configuring the load balancer that is located
between the web servers and BMC Remedy AR System servers without setting a "sticky" bit. In
versions earlier than 7.6.04, BMC recommended setting the sticky bit to activate session affinity to
route all connections from one web server to the same BMC Remedy AR System server. For more
information, see Scenarios for load balancing between the web servers and BMC Remedy AR
System servers (see page ).
Note
If you use other BMC products that also support load balancing without setting the
"sticky" bit, make sure your BMC Remedy AR System server and other BMC product(s)
use the same version. For example, BMC Atrium CMDB supports configuring the load
balancer without setting a "sticky" bit for version 7.6.04 Service Pack 1 or later, and does
not support it for version 7.6.04. If you configure load balancing without setting a "sticky"
bit for both of these products, your BMC Remedy AR System server must also use the
matching 7.6.04 SP1 or later version.
BMC Remedy AR System includes the capability for automatic fail-over of special operations and
the sharing of floating licenses among the servers. Server groups are independent of load
balancing, but the concepts are complementary.
To enable load balancing across multiple AR System servers, configure each server as outlined in
Configuring AR System servers. (see page 285)
You can run multiple AR System servers in a cluster and distribute the load between them with a
third-party load balancer. All of these instances work on the same database, so they are always in
sync. This is a typical server group configuration. This clustered environment creates a highly
scalable and highly available AR System installation.
The servers in a server group can be given different responsibilities (such as one handing
approvals, another escalations, etc). The servers in the group are aware of each other, and if one
of the servers fails, another can take over its responsibilities
When installing applications in a server group environment, install all of the software on
each computer before setting up the server group. This is necessary because the installer
creates required configuration file entries, creates all required folders, and puts all the
binary files in place. After installing the software, add each server to the server group, and
configure the load balancer to distribute load among these instances.
The example below uses a load balancer to direct traffic to a server group of three AR System
servers. In the following figure, the uppermost AR System server has the primary ranking for the
Administration and Escalation operations. The other two AR System servers can be used to back
up these operations, when the uppermost server is not running.
For more information, see Configuring a hardware load balancer with BMC Remedy AR System
(see page 524).
Note
If the load balancer belongs to a different domain than the AR System servers, then the
fully qualified domain name of the Server-Name alias will be wrong. In this case, the
domain name parameter should be specified in the ar.cfg file for each AR System server
using the domain of the load balancer.
Tip
When a firewall or a load balancer exists between clients and AR System servers, you
must set the TCP "keep alive" value properly. The operating system of the host BMC
Remedy AR System server maintains the keep-alive socket (not the client). Ensure that
the keep-alive value on the firewall or load balancer is at least as long as or longer than
the keep-alive value on the largest host server of all AR System servers connected to the
firewall or load balancer.
Configuring a load balancer with multiple AR System servers (see page 529)
Configuring a load balancer with a firewall and multiple AR System servers (see page 530)
Configuring a load balancer with a firewall, web servers, and multiple AR System servers
(see page 531)
Configuring a load balancer with a firewall, web servers, a second load balancer, and
multiple AR System servers (see page 531)
Verify that the following configuration steps have been completed before you review the examples:
In the following figure, the uppermost server has the primary ranking for the administration
operation, but the bottommost server has the primary ranking for the escalation operation. As
mentioned earlier, the administrative server can be a computer other than the escalation server.
In the following figure, AR System server client traffic comes into the firewall on TCP port 3030 and
is directed to the load balancer. The load balancer routes this traffic to one of the BMC Remedy AR
System servers listening on port 2020. As shown in the diagram, the port number for the virtual
address can be different from the port numbers for the real BMC Remedy AR System servers.
Load-balancer configuration with a firewall, a virtual AR System server, and real AR System servers
(Click the image to expand it.)
Configuring a load balancer with a firewall, web servers, and multiple AR System
servers
In this example, client requests pass through a firewall and into the load balancer. The load
balancer directs the web requests to three web servers. The web servers access the BMC Remedy
AR System servers to fulfill BMC Remedy AR System requests. The three servers share a single
database, as shown in the following figure.
Using the hosts file, the IP address of the AR System server needs to be resolved manually on
each web server. This is necessary because all web servers reference the same AR System server
name; however, each web server is linked to a different AR System server, and each AR System
server has a different IP address. If the server name was resolved using a DNS server, this server
name would resolve to the same IP address and all the web servers would communicate with the
same AR System server. Therefore, each web server uses the hosts file, and manually resolves
the AR System server name to the appropriate server.
On Windows platforms, the hosts file is located in the %WINDIR%\system32\ drivers\etc directory.
On UNIX, the hosts file is located in the /etc directory.
The hosts file on Web 1 should include the following line: myarserver 11.40.35.47
The hosts file for Web 2 should include the following line: myarserver 11.40.35.49
The hosts file for Web 3 should include the following line: myarserver 11.40.35.51
In the preceding sample hosts files, myarserver is the AR System server name that all the web
servers reference.
Configuring a load balancer with a firewall, web servers, a second load balancer,
and multiple AR System servers
In this example, client requests pass through a firewall and into a load balancer. The first load
balancer directs web requests to the web servers. Web server requests to the BMC Remedy AR
System servers are directed through a second load balancer. The three servers share a single
Load-balancer configuration with a firewall, web servers, BMC Remedy AR System servers, and
two load balancers
Notes
For versions 7.6.04 or later, BMC recommends configuring the load balancer that is
located between the web servers and BMC Remedy AR System servers without setting a
sticky bit. In versions earlier than 7.6.04, BMC recommended setting the sticky bit to
activate session affinity to route all connections from one web server to the same BMC
Remedy AR System server. For more information, see Scenarios for load balancing
between the web servers and BMC Remedy AR System servers (see page ).
If you use other BMC products that also support load balancing without setting the
"sticky" bit, make sure your BMC Remedy AR System server and other BMC product(s)
use the same version. For example, BMC Atrium CMDB supports configuring the load
balancer without setting a "sticky" bit for version 7.6.04 Service Pack 1 or later, and does
not support it for version 7.6.04. If you configure load balancing without setting a "sticky"
bit for both of these products, your AR System server must also use the matching 7.6.04
SP1 or later version.
This type of configuration can also be used with a WAN, DMZ, or LAN as shown in the following
figure. Client requests pass through the firewall and into the first load balancer. The load balancer
routes the traffic to one of the web servers. BMC Remedy AR System requests from the web
servers pass through the first load balancer, then through the firewall, and finally to the second
load balancer. The second load balancer then routes the request to one of the BMC Remedy AR
System servers in the group.
Load-balancer configuration with a WAN, a firewall, web servers, BMC Remedy AR System
servers, and two load balancers
For better throughput, such as might be required in a high-performance environment, you can add
a second firewall, as shown in the following figure. BMC Remedy AR System server traffic from the
web servers is routed through the second firewall. The server traffic from web servers follows a
different route from that of incoming BMC Remedy AR System client requests, thereby reducing
the likelihood of a network bottleneck in the load balancer.
Load-balancer configuration with a WAN, two firewalls, web servers, BMC Remedy AR System
servers, and two load balancers
(Click the image to expand it.)
interface e6
bridge vlan 20
circuit VLAN20
service www-server2
ip address 172.23 . 41.16
active
content rule1
add service www-server1
For information about how to configure a load balancer with the Cisco CSS, see the Cisco Systems
website at http://www.cisco.com. The following documents are relevant to load-balancer
configuration:
Note
Website addresses change frequently. If you have difficulty finding these documents, go
to http://www.cisco.com and navigate to the Documentation pages.
Scenarios for load balancing between the web servers and BMC Remedy AR
System servers
For versions 7.6.04 or later, BMC recommends configuring the load balancer between the web
servers and BMC Remedy AR System servers without setting a sticky bit. This allows a session
from any web server to be distributed to any BMC Remedy AR System server.
Note
If you use other BMC products that also support load balancing without setting the
"sticky" bit, make sure your BMC Remedy AR System server and other BMC product(s)
use the same version. For example, BMC Atrium CMDB supports configuring the load
balancer without setting a "sticky" bit for version 7.6.04 Service Pack 1 or later, and does
not support it for version 7.6.04. If you configure load balancing without setting a "sticky"
bit for both of these products, your BMC Remedy AR System server must also use the
matching 7.6.04 SP1 or later version.
This section describes the configuration for a load balancer between the web servers and BMC
Remedy AR System servers without setting a sticky bit for version 7.6.04 or later. As a starting
point, the configuration for setting a sticky bit for the load balancer for versions earlier than 7.6.04
is first discussed.
Load balancing between the web servers and BMC Remedy AR System servers by setting a
sticky bit
In versions earlier than 7.6.04, BMC recommended configuring the load balancer between the web
servers and BMC Remedy AR System servers by setting a sticky bit. In this configuration, the load
balancer between the web servers and the BMC Remedy AR System servers routed all
connections from one web server to the same BMC Remedy AR System server, resulting in
session affinity.
The following figure illustrates session affinity between the web servers (WS) and the BMC
Remedy AR System servers (ARS) when the load balancer (LB) is configured with a sticky bit. For
example, session affinity is established between WS1 and ARS1, WS 2 and ARS2, and WS3 and
ARS3. The load balancer routes all connections from WS1 to ARS1.
Load-balancer configured with the sticky bit between the web servers and BMC Remedy AR
System servers
Load-balancer configuration with three web servers and two BMC Remedy AR System servers with
session affinity established
If a new BMC Remedy AR System server (ARS3) is added to this BMC Remedy AR System, ARS3
is never considered as available because WS1, WS2 and WS3 have already established session
affinity to either ARS1 or ARS2 (the following figure).
Load-balancer configuration with a new BMC Remedy AR System server added to three web
servers and two BMC Remedy AR System servers with session affinity established
(Click the image to expand it.)
In version 7.6.04 or later, you can route connections from a web server to a new BMC Remedy AR
System server on the fly by selecting the Enable Lifespan setting on the Connection Settings page
of the Mid Tier Configuration Tool (the following figure). This setting enables load balancing without
Enable Lifespan setting on the Connection Settings page of the Mid Tier Configuration Tool
(Click the image to expand it.)
With Enable Lifespan selected, the load balancer distributes sessions from any web server (in this
case, WS3) across the BMC Remedy AR System server group according to its scheduling policy
(round robin or least connections). The newly-available BMC Remedy AR System server (ARS3) is
considered within that distribution, as shown in the following figure. Connections may or may not
get routed to ARS3 depending on the scheduling policy.
Load-balancer configuration with a new BMC Remedy AR System server added without setting a
sticky bit for the load balancer
(Click the image to expand it.)
Reestablishing a BMC Remedy AR System server after fail-over with the sticky bit set
In BMC Remedy AR System versions earlier than 7.6.04 (the following figure), suppose that ARS3
fails. If a sticky bit is configured for the load balancer, the following occurs:
The following figure illustrates the resulting unbalanced connections between the web servers, load
balancer, and BMC Remedy AR System servers.
Load-balancer configuration with web servers and BMC Remedy AR System servers with the
sticky bit set for the load balancer when a BMC Remedy AR System server fails
When ARS3 recovers and is recognized as an active resource by the load balancer, it does not
receive connections from any of the three web servers because session affinity has been
established between the web servers and either ARS1 or ARS2. To rebalance the servers in
versions earlier than 7.6.04, you need to shut down the BMC Remedy AR System servers, load
balancer, and web servers and then restart them in the proper sequence.
In version 7.6.04 or later, make sure the Enable Lifespan check box is selected on the Connection
Settings page of the Mid Tier Configuration Tool (the following figure). If a sticky bit is not set, the
load balancer distributes sessions from any web server to any BMC Remedy AR System server,
including a recovered or new BMC Remedy AR System server.
The source from these open idle sessions connections is not redistributed.
To avoid problems from idle connections in version 7.6.04 or later, you can configure the fields in
the Connection Pool Settings section on the Connection Settings page in the Mid Tier
Configuration Tool (the following figure). The Idle Connections per Server setting allows you to limit
the number of idle connections per server. The Connection Timeout field allows you to specify how
long the connections exceeding that limit will remain open before being terminated.
Lowering the Idle Connections per Server value minimizes the number of idle connections that can
stay open until their sessions ends. If the Idle Connections per Server field is set to 0, then the
connection pool will be closed when all connections are closed.
Lowering the Connection Timeout value minimizes the time that idle session-based connections
can stay connected before being closed, resulting in better load redistribution. The number of
current idle connections is determined by whether the Connection Time or Connection Lifespan
Connection Pool Settings on the Connection Settings page of the Mid Tier Configuration Tool
Configuring the Connection Pool Settings allows idle sessions to be used again in a timely manner.
The BMC Remedy AR System server end users see no change in behavior because their
connections are not dropped.
Load balancing between the clients and web servers without setting a sticky bit
If the web servers in your BMC Remedy AR System were installed in a cluster (with fail-over
enabled), then setting the sticky bit on the load balancer between the clients and web servers is not
needed.
com.bmc.arsys.emaildaemon.Mailboxes
3.
BMC Remedy Action Request System 9.1 Page 540 of 4703
BMC Software Confidential. BladeLogic Confidential.
3. Give different names to each mailbox, so that each installed email engine will work for only a
particular mailbox.
4. Ensure that all of the email engines refer to the same AR System server.
Note
This topic provides only a sample configuration of the f5 load balancer. BMC Quality
Assurance department used this configuration for operating mid tiers in a multi-tenant
environment. Your f5 configuration can vary depending on your requirements. For more
information about f5 documentation, see http://www.f5.com/products/documentation/.
Creating a pool
You need to create a pool to which nodes can be added.
To create a pool
1. From the f5 home page, click Local Traffic > Pools > Pool list.
Creating a node
A node represents a Tomcat instance in the cluster. For example, if you have a cluster of 4 tomcat
instances, you will have to create 4 nodes in f5.
To create a node
1. From the f5 home page, click Local Traffic > Nodes > Node List.
2. Click Create.
Adding nodes
When a cluster is created, you need to add the nodes to a single pool.
1. From the f5 home page, click Local Traffic > Pools > Pool list.
2. Click the Members tab.
3. Click Add.
4. Click Node List.
5.
BMC Remedy Action Request System 9.1 Page 543 of 4703
BMC Software Confidential. BladeLogic Confidential.
5. From the Address drop-down list, click to select the node that you want to add to the pool.
6. Enter the service port number.
7. Keep the default configurations.
8. Click Finished.
Repeat these steps for as many nodes you want to add to the pool.
1. From the f5 home page, click Local Traffic > Virtual Servers > Virtual Server List.
2. Click Create.
3. Click the Properties tab.
4. In the General Properties area, enter the following information:
a. In the Name field, enter a name for the virtual server. For example, add a virtual
server named vs_rod_arsys.
b. In the Destination field, select the
c. Enter the service port number.
5. Click the Resources tab, from the Default Pool drop-down list select the pool you have
created. For more information on creating a pool, see To create a pool (see page 541).
6. Click Finished.
Running a client from the command line on Windows (see page 544)
Running a Unicode client from the command line on UNIX (see page 545)
Restricting client access to an AR System 7.x and later Unicode server (see page 546)
arcache
archgid
archgsel
ardisabled
arhelp
arl10nmenu
arlabel
arreload
artext
arworkflow
fbupdate
For an example, see arlabel.txt (online documentation for the arlabel utility) in the Unsupported
folder where AR System is installed.
To simplify the process, if you are running on the UNIX system where the AR System server is
installed, you can use the arsystem env command:
$ <ARSystemInstallationDirectory>/server/bin/arsystem env <commandName>
<arguments>
This automatically sets the dynamic library path and locale variables to the same values that the
AR System server uses.
Consider disallowing access by pre-7.x clients to prevent use of a 6.3 or earlier version of BMC
Remedy Administrator with a Unicode-enabled server. The BMC Remedy AR System
Administration Console enables you to specify the minimum API that the server supports. AR
System 7.x or later clients use API version 12, so enter the number 12 to prevent access to older
clients.
How BMC Remedy AR System converts character sets (see page 546)
How field widths are determined (see page 547)
How serialized strings are encoded and decoded (see page 549)
Unicode composition and normalization (see page 549)
How BMC Remedy AR System derives a codeset in an API program (see page 549)
Important
It is possible to convert all characters from any character set supported by BMC Remedy
AR System into Unicode. It is not possible, however, to convert all Unicode characters
into any other single character set. Where such conversion is not possible, BMC Remedy
AR System replaces the characters in question with another character.
Where conversion between code sets occurs in BMC Remedy AR System depends on which
versions of the BMC Remedy AR System clients you are running and whether the AR System
server is running in Unicode. Possible combinations are as follows:
When you run a pre-7.0.00 client against a 7.x or later AR System server running in
Unicode, the AR System server converts data to the codeset it would use if the server were
not running in Unicode.
When you run a 7.x or later client against an AR System server running in Unicode, the AR
System server transmits in UTF-8, and lets the API library code running in the client handle
any conversion. If the client program expects UTF-8, the library need not do anything. If the
client program expects some other codeset, the library converts the characters.
When you run a 7.x or later client against a 7.x or later AR System server not running in
Unicode, the API library code running in the client handles any necessary conversion. If the
client does not expect Unicode, no conversion is needed.
If one side (either server or client) is running in Unicode, and the other is not, AR System converts
between the other code set and Unicode. For compatibility with existing practice, the system uses
Windows code pages instead of the ISO-standard encodings usually used in UNIX to represent
certain languages, as outlined in the following table.
Windows code page ISO character set Used with these languages
1252 8859-1 (Latin 1) English and most Western European languages written in the Latin alphabet
1251 8859-5 Russian and other languages written in the Cyrillic alphabet
1250 8859-2 (Latin 2) Polish, Czech, and other Central European languages
If BMC Remedy AR System determines that the client is running in Shift-JIS (universal, for
Japanese Windows systems), and the server is running in EUC-J (Japanese UNIX systems), it
converts characters between these encodings.
Traditional Chinese using the Big5 character encoding (BMC Remedy AR System converts
characters between Big5 and Unicode as needed.)
Simplified Chinese using the GB2312 character encoding (BMC Remedy AR System
converts characters between GB2312 and Unicode as needed.)
Korean using the EUC-KR character encoding (BMC Remedy AR System converts
characters between EUC-KR and Unicode as needed.)
The system does not support any other character-set conversions between servers and clients.
The character encodings between clients and servers must match to prevent errors and data loss.
However, a character sequence encoded in UTF-8 tends to be longer than the same characters in
one of the other encodings. Also, characters from European languages, which occupy 1 byte each
in the other encodings, can occupy 1 or 2 bytes in UTF-8, as outlined in the following table.
European 1-2 European texts combine ASCII with accented and inflected letters and special punctuation. The actual
expansion depends on the text itself, and somewhat on the language. For example, Italian text is
closer to 1 because it uses relatively few accented letters; Russian text is closer to 2 because nearly
all Russian words are spelled with non-ASCII (2-byte) characters, leaving only spaces and punctuation
as 1-byte characters.
Chinese, 1-2 Chinese and Korean encodings use 2 bytes for each character; the same characters in UTF-8 occupy
Korean 3 bytes. The actual expansion is near 1.5 unless the text makes heavy use of ASCII (which makes the
expansion slightly smaller).
Japanese 1-3 On average, this expansion is 1.5 as with Chinese and Korean: Most Japanese characters occupy 2
bytes in a codeset like Shift-JIS and 3 bytes in UTF-8. EUC (the Japanese encoding historically used
on UNIX systems) offers 3-byte forms. If your text has many of these, the expansion is
correspondingly smaller. The Japanese language is written using kanji (the full-width characters
resembling Chinese text), but also uses two other writing systems known as hiragana and katakana.
These "kana" characters occupy just 1 byte in Shift-JIS, and 3 bytes in UTF-8. So a character
sequence with a high proportion of these expands by a factor of nearly 3. (Japanese punctuation and
double-wide digits occupy 2 bytes in Shift-JIS and EUC, so they do not expand as much as kana do.)
Note
Because of this expansion on conversion into UTF-8, data converted to UTF-8 might not
be imported correctly because it no longer fits into the database columns. To avoid this
problem, expand the sizes of the affected form fields.
In UTF-16, each Unicode character occupies 1 or 2 code units (each code unit is a 16-bit quantity).
Each ASCII and European character occupies 1 code unit; each Chinese, Korean, and Japanese
character, which might be 2 bytes in its language-specific encoding, also occupies 1 code unit.
These expansions are valid for the characters of Unicode's Basic Multilingual Plane (BMP) — the
original set of 65,536 characters presented in Unicode 1.0 and modified in Unicode 2.0. Since
version 3.0, Unicode provides a mechanism to define up to about 1 million supplemental
characters. Supplemental characters are defined for Chinese and also for some specialized
usages in mathematics, musical typesetting, and information processing. Each supplemental
character occupies 4 bytes in UTF-8, and 2 code units in UTF-16.
The server encodes and decodes these strings using the Application-Parse-Qual and Application-
Format-Qual actions performed by filters and active links. The ARDecodeARQualifierStruct and
ARDecodeARAssignStruct C API calls (and Encode variants of those functions) also process
serialized strings.
This issue does not affect most serialized strings because they contain only ASCII characters. In
every character encoding supported by BMC Remedy AR system, each ASCII character occupies
exactly 1 byte. The lengths of non-ASCII characters depend on the character encoding in use. For
example, a qualifier such as 'Submitter' LIKE "%à%" produces a serialized string that counts
the à as 1 byte in the standard Windows "Code Page 1252" encoding, but 2 bytes in UTF-8. Clients
and servers generate errors if presented with strings that have incorrect lengths.
UTF-8 — The client must communicate with the API in the UTF-8 character encoding of
Unicode.
"" (empty) — The client must determine the client request codeset from the system
environment.
The API detects a change to the codeset and immediately applies it. This enables an API program
to change its codeset between API calls.
Note
When you export data using BMC Remedy AR System 7.0.00 or later, it includes the
correct code for the character set in the output file.
If you do not specify a character set, the AR System server assumes the data is in the same
character set the AR System server uses. If the character sets do not match, your data is imported
but corrupted.
Important
Note the differences in syntax between the .ARX and .DEF files. Using the wrong syntax
can cause unexpected results from your import.
The following table contains character set encoding names you should use when you edit your .
ARX or .DEF file.
Western European languages, such as English, French, German, Italian, Spanish, and so on. windows-1252
Central European languages, such as Polish, Czech, Hungarian, and so on. windows-1250
Cyrillic: Eastern European - Russian, Ukrainian, Belarusian, Bulgarian, Serbian, and Macedonian, and so windows-1251
on.
Japanese euc-jpshift_jis
Korean euc-kr
The following topics describe how to configure BMC Remedy SNMP Agent if you did not configure
it during installation:
SNMP introduction
Simple Network Management Protocol (SNMP) is a protocol that network administrators use to
manage complex networks through SNMP-compliant management consoles to monitor network
devices.
You must configure BMC Remedy SNMP Agent before you can run it. To configure SNMP or
change your existing configuration, use the instructions in this section or visit http://www.net-snmp.
org. Check with your network administrator about specific configuration settings to use.
Network administrators and BMC Remedy AR System administrators can use BMC Remedy
SNMP Agent to monitor AR System server and BMC Remedy Distributed Server Option (DSO)
processes and change process states.
The BMC Remedy SNMP Agent supports the following versions of SNMP:
Version 1 (community-based)
Version 2c (community-based)
Version 3 (user-based)
BMC Remedy SNMP Agent was developed using the net-snmp software toolkit, version 5.0.7. (For
more information about the net-snmp toolkit, see http://www.net-snmp.org/.) The agent runs as a
separate process on the same system as the AR System server, and supports the following basic
SNMP operations:
get
set
get-next
get-bulk (supported in SNMP v2c and v3)
trap
notification (SNMP v2c, SNMP v3)
BMC Remedy SNMP Agent is compatible with all platforms that BMC Remedy supports. For a list
of the compatible web application servers, see Compatibility matrix in the BMC Remedy ITSM
Deployment online documentation.
Community-based access (described in Querying or viewing SNMP data (see page )) must be
configured for SNMP clients that communicate with BMC Remedy SNMP Agent using either the
SNMP v1 or v2c protocol.
User-based access (described in Defining users by access level (see page )) must be
configured for SNMP clients that communicate with BMC Remedy SNMP Agent using the SNMP
v3 protocol.
During the installation process, you can configure community-based or user-based authentication,
but not both.
The following topics provide more information about SNMP access control:
Read-only communities — Have permission to query an SNMP agent for any data that is
defined as having read permission. Communities with read-only permission cannot perform
SNMP set operations that result in a change to the value of a managed object.
Read-write communities — Can view data from an SNMP agent and can change the value
of that data (if the OID is defined as having read-write permission) through an SNMP set
action.
When a client needs to gather information from an SNMP agent that supports community-based
authentication, it must supply a plain-text password known as a community string.
Note
The community string must not include spaces and must not exceed 30 characters in
length.
For example:
rwcommunity privatecommunity
rocommunity publiccommunity
In the previous example, if a client needed to set the value of arsState (an action permitted only by
those with write permission), it would need to provide the value for the rwcommunity directive as
part of the SNMP request (privatecommunity in this case).
— Uses authentication, and privacy is required to supply a password. In addition, the SNMP
packet containing the request must be encrypted. BMC Remedy SNMP Agent must have
access to the password used by the client to encrypt the packet. It uses this password to
decrypt the packet and then verifies that the user name and password are correct.
You define users in the arsnmpd file with rouser and rwuser directives, as follows:
To create a read-only user account, you must include the following directive:
The optional argument specifies the expected level of encryption to be used by this user.
The authentication noauth corresponds to noAuthNoPriv, auth to authNoPriv, and priv to
authPriv.
In the following example, rouser directive defines a user account with read-only permission.
This account does not require any form of authentication (that is, the user is authenticated in
the same way as a user providing a community-string password).
To create a read-write user account, you must include the following directive:
The following example rwuser directive defines a user account with read-write permissions.
This user must supply a password, but their SNMP requests are not encrypted:
You can repeat the rouser and rwuser directives to create multiple user accounts with
varying levels of authentication.
The user name supplied to the rouser or the rwuser directive must not include spaces and
must not exceed 30 characters in length.
If the optional argument is not supplied, BMC Remedy SNMP Agent defaults to auth level of
authentication.
Important
The previous directives are not sufficient to properly define a user account. See
snmpd configuration file purpose (see page ) for additional configuration
requirements.
BMC Remedy SNMP Agent can send several standard SNMP traps. Trap messages are formatted
using version 1 or version 2 of the SNMP protocol. Using the trap configuration directives, you
instruct BMC Remedy SNMP Agent to send a trap to a system that is listening for them on a
specific port number.
To send a trap formatted to the SNMP v1 standard, add the following directive to the arsnmpd
configuration file:
To send a trap formatted to the SNMP v2c standard, add the following directive:
You can repeat the trap directives to configure additional systems to receive trap messages.
For example:
The preceding directive instructs BMC Remedy SNMP Agent to send trap messages formatted
using SNMP v1 to the system traplistener, which is listening for trap messages on port number
8162, using community string public.
BMC Remedy SNMP Agent can also be configured to send trap messages known as
authentication failure traps. These trap messages are sent to all locations specified by the trapsink /
trap2sink directives whenever a client attempts to make an SNMP request using an incorrect
community string.
authtrapenable <1|2>
Setting authtrapenable to 1 instructs BMC Remedy SNMP Agent to send authentication failure
traps. Setting the argument to 2 disables this feature.
#arsmonitorfile <absolutePathToarmonitorFile>
Note
Ensure that the argument represents the correct path to your armonitor file for your
environment.
BMC Remedy SNMP Agent can also be configured to monitor AR System server statistics, AR
System state, and select MIB-II data.
The managed object arsState is also writable, so the value of arsState can be changed by an
SNMP set operation (provided the proper user name or community string is supplied). Changing
the value of arsState from 1 to 2 instructs BMC Remedy SNMP Agent to stop AR System.
Changing the value of arsState from 2 to 1 instructs the agent to start AR System.
BMC Remedy SNMP Agent can monitor the following BMC Remedy AR System processes:
If any of these process changes its state (for example, if a process becomes inactive), the agent
sends a trap (or a notification) to a trap receiver.
Monitoring MIB-II
BMC Remedy AR System supports the following objects in MIB-II:
To query other objects, such as IP traffic or TCP traffic, use the SNMP agent included with your
operating system. Managed objects in these sections of MIB-II are not supported by BMC Remedy
SNMP Agent.
The Remedy-ARS-MIB.txt file currently defines only BMC Remedy AR System controls, statistics,
and traps. However, as it is designed for extensibility, other branches in the Remedy-ARS-MIB.txt
file are reserved for future use.
The name of the process that changes state (for example, AR System plug-in server)
The name of the AR System server associated with the process
The state of the process (active =1, inactive =2)
When a monitored AR System process changes state from running to down, the trap
contains a value of 2 for arsState. When the process resumes, the trap contains a value of 1
for arsState.
Note
BMC Remedy SNMP Agent continues to run even if the processes it monitors are
not running.
For more information about configuring traps in the arsnmpd configuration file, see Sending
messages when unexpected events occur (see page ).
Note
For information about configuring BMC Remedy SNMP Agent during installation, see
Installing and Upgrading in BMC Remedy ITSM Deployment online documentation.
BMC Remedy SNMP Agent was built using the Net-SNMP toolkit (version 5.0.7). This section
describes a subset of the more user-friendly and commonly used configuration options provided by
the Net-SNMP toolkit (version 5.0.7). For information about additional configuration directives and
options, see the Net-SNMP website at http://www.net-snmp.org.
(Windows) (Windows) Stores system information, access control information, and trap settings.
arsnmpd.cfg ARSystemServerInstallDir
\conf
(UNIX) arsnmpd.
conf (UNIX)
/usr/ar/ARSystemName
/conf
(Windows) snmpd. (Windows) Stores engine ID, number of BMC Remedy SNMP Agent reboots, and SNMP
conf ARSystemServerInstallDir v3 user account information.
\conf
(UNIX) snmpd.conf
(UNIX)
/usr/ar/ARSystemName
/conf
(Windows) (Windows) Enables BMC Remedy SNMP Agent to monitor BMC Remedy AR System and
armonitor.cfg ARSystemServerInstallDir to be started by armonitor.
\conf
(UNIX) armonitor.
conf (UNIX)
/etc/arsystem/
serverName
BMC Remedy SNMP Agent uses the information in the arsnmpd and snmpd configuration files to
initialize when the agent starts; therefore, you must restart BMC Remedy SNMP Agent after you
make changes to the configuration files. In addition, you must restart BMC Remedy AR System if
you make changes to the armonitor configuration file.
Note
System information (see System information arsnmpd file (see page 561))
Access control information, which includes community strings and users (see SNMP access
control introduction (see page ))
Trap configuration, which identifies the systems to which trap messages are sent (see
Sending messages when unexpected events occur (see page ))
Location of the armonitor configuration file (see Enabling SNMP to interact with BMC
Remedy AR System (see page ))
To configure any of these items, apply a configuration directive and related arguments. You can
also add comments to any configuration file by beginning any comment line with a hash [#]
character. The standard syntax is as follows:
Each directive must occupy its own line in the configuration file.
Directives can be included in any order.
Only one instance of a directive is permitted in a configuration file unless otherwise
indicated.
Directives are considered optional unless otherwise specified.
If you configured SNMP during the installation process, many of the configuration options are
represented in this arsnmpd configuration file. If you did not configure SNMP during installation, a
sample arsnmpd.conf file with comment lines and sample directives is installed. In this case, you
need to remove the hash (#) characters, and provide valid arguments to the various directives. You
can also add configuration directives where appropriate.
Directive Description
syslocation A string representing the location of the system running BMC Remedy SNMP Agent.
syscontact A string representing contact information for AR System, BMC Remedy SNMP Agent, or both.
syslocation <systemLocation>
syscontact <systemContactInformation>
The argument to syslocation or syscontact can include spaces. However, all the information must
be on the same line and no longer than 255 characters.
For example:
You can access information defined by these directives from BMC Remedy SNMP Agent by
querying the related MIB-II system group OIDs:
Directive Description
engineBoots
engineID
If an snmpd configuration file does not exist, you must create one in the CONF directory of your AR
System installation. In this case, engineBoots and engineID is added to the snmpd file when BMC
Remedy SNMP Agent starts.
In the snmpd file, you enter the configuration directives required to fully define a user account.
When adding information to this file, do not alter the lines corresponding to engineBoots and
engineID (if they are present).
For each user account defined in the arsnmpd file (see rwuser and rouser directive information in
Defining users by access level (see page )), you must include a corresponding createUser
directive to this file as follows:
createUser <userName>
MD5 <authenticationPassword>
DES <privatePassword>
Note
Using this directive, you can define the authentication password and privacy password used by the
user account (userName).
Note
In SNMP v3, the authentication password that the user supplies to BMC Remedy SNMP
Agent must be encrypted.
If you defined a user in the arsnmpd file as having read-write permissions and using
authentication and no privacy:
If you defined a user in the arsnmpd file as using no authentication and no privacy:
createUser user1
If you configured BMC Remedy SNMP Agent during installation, no modification to this file is
necessary. If you did not configure BMC Remedy SNMP Agent during installation, you must edit
the armonitor.cfg (armonitor.conf) file to enable armonitor to start and interact with BMC Remedy
SNMP Agent.
SNMP-agent-enabled: T
In addition, remove the comment marker (#) from the command line corresponding to the arsnmpd
process. (This enables armonitor to start BMC Remedy SNMP Agent.)
You might need to change the default port number from 161 because an SNMP agent might
already be running on the default port 161. To do this, change the value of udp:161 on the line
corresponding to the arsnmpd process to a new port number that is not currently in use by another
process, for example udp:8161.
Using armonitor
If you configured SNMP during installation, armonitor with start the SNMP agent
automatically after installation is complete.
If the SNMP agent process is terminated, armonitor restarts the SNMP agent.
Using a command line with the following syntax:
arsnmpd -c <pathToarsnmpdConfigurationFile>
udp: <portNumber>
Ensure that:
The argument to the -c option is the path to the arsnmpd configuration file, not the
snmpd file.
The argument to udp is a port number not currently in use by another SNMP agent or
any other process.
For example (UNIX):
Invoking the agent during BMC Remedy AR System startup, using the Services panel (on
Windows) or the arsystem shell script (on UNIX).
On UNIX, use the arsystem shell script to stop BMC Remedy AR System, which stops all BMC
Remedy AR System processes, including BMC Remedy SNMP Agent.
If you use BMC Remedy SNMP Agent to stop BMC Remedy AR System, BMC Remedy SNMP
Agent exists as an independent process that is not under the control of the armonitor, the BMC
Remedy AR System service (Windows), or the arsystem shell script (UNIX). You must manually
stop and restart BMC Remedy SNMP Agent by using specific operating system methods (for
example, by using Task Manager on Windows or by using a kill command on UNIX).
To stop BMC Remedy SNMP Agent without affecting other BMC Remedy AR System processes,
use standard operating system approaches to stopping individual processes. (Often this can be
accomplished on either a Windows or UNIX system by issuing a kill command from a command
prompt.) If BMC Remedy SNMP Agent is still a child process of armonitor, however, armonitor
attempts to restart the agent.
For more information about stopping individual processes, see your system administrator.
You must configure the SNMP Agent using the AR System Administration SNMP Configuration
form if you select the Install option to install SNMP Agent.
Note
If you select the Upgrade option to upgrade an existing version of SNMP Agent, you do
not need to re-configure the SNMP Agent.
For more information about configuring the SNMP Agent, see BMC Remedy SNMP Agent
configuration (see page 551).
Note
If you click Enable, the System Receiving Traps, SNMP Trap Community, and SNMP Trap
Port Number fields are enabled.
System Receiving Traps Enter the system name that is receiving the Traps.
Note
Note
Note
You must restart the BMC Remedy AR System server for the changes made to this form
to take effect.
For information about BMC Remedy AR System server management, see the Administering (see
page 1047)and Troubleshooting (see page 4141) sections.
A BMC Remedy AR System server can be associated with only one Distributed Server Option
(DSO) server (ardsoj versionNumber _buildNumber.jar on Windows or UNIX). To the DSO server,
that BMC Remedy AR System server is the local or source BMC Remedy AR System server. All
other servers, whether they reside on the same host as the DSO server or on a different host, are
considered remote servers.
Each DSO server can transfer data from a form on its local server to
Note
Starting from BMC Remedy AR System 9.1, on initialization, the BMC Remedy DSO
reads the configuration settings from the centralized configuration form. BMC Remedy
DSO does not reads the initialization configurations from the ar.cfg file. However ar.cfg
file is used only for the parameters (like Server-Name, Server-Connect-Name) required
for BMC Remedy AR System server connection.
For more information on BMC Remedy DSO centralized configuration settings, see
Configuration settings C-D (see page 1166).
Setting up DSO
To set up distributed operations, follow this process:
Important
You must perform this procedure on all BMC Remedy AR System servers that participate
in distributed operations.
To enable DSO on a BMC Remedy AR System server, follow the given procedure:
Warning
You can transfer entries in the Distributed Mapping and Distributed Pool forms
to their counterparts on remote servers. See Setting up broadcast distributed
transfers (see page 1791).
Related topics
Configuring DSO for a server group (see page 384)
The Distributed Server user has controlled permissions and a locked name. It does not require
additional licensing.
To enable this user to communicate with its local BMC Remedy AR System server, you must
configure a password for it as follows.
Important
On BMC Remedy AR System 7.0.00 or later, DSO passwords are mandatory for all BMC
Remedy AR System servers involved in distributed operations, whether the server is the
source server or the target server.
1. Open the AR System Administration: Server Information form for the local BMC Remedy AR
System server.
2. Click the Connection Settings tab.
3. On the Connection Settings tab, click the DSO Server tab.
4. In the DSO Local Password field, enter a password for the local DSO user, and click OK.
Note
5.
BMC Remedy Action Request System 9.1 Page 570 of 4703
BMC Software Confidential. BladeLogic Confidential.
5. To make the change take effect, restart the BMC Remedy AR System server.
The DSO server uses the assigned RPC program number for all communication with the
associated BMC Remedy AR System server. You must allocate at least one thread to the server
queue associated with the RPC program number.
If you do not assign a dedicated RPC program number to DSO, the fast and list queues process all
distributed operations.
For more information about threads and queues, see AR System server multithread architecture
(see page 182).
To assign an RPC program number to DSO on the local BMC Remedy AR System
server
1. Open the AR System Administration: Server Information form for the appropriate BMC
Remedy AR System server.
2. Click the Ports and Queues tab.
3. Verify that the RPC program number that you want to assign to DSO is listed in the Server
Queue table.
If the number is not listed, add it. (See the Setting ports and RPC numbers (see page 303))
4. Click the Connection Settings tab.
5. On the Connection Settings tab, click the DSO Server tab.
6. In the DSO Local RPC Program Number field, enter the appropriate RPC program number,
and click OK.
7. To make the change take effect, restart the BMC Remedy AR System server.
Note
If you reassign the RPC program number while running DSO and then restart the
BMC Remedy AR System server, you do not lose any items in the distributed
pending queue.
Note
6.
BMC Remedy Action Request System 9.1 Page 572 of 4703
BMC Software Confidential. BladeLogic Confidential.
6. Click OK.
7. Restart the local BMC Remedy AR System server to make these settings take effect.
8. Repeat this procedure for each remote BMC Remedy AR System server that the local DSO
server must communicate with.
For information about configuring a firewall for an BMC Remedy AR System server, see
Configuring firewalls with AR System servers (see page 288).
BMC Remedy AR System server A is the DSO source BMC Remedy AR System server
behind the firewall.
BMC Remedy AR System server B is outside the firewall.
1.
BMC Remedy Action Request System 9.1 Page 573 of 4703
BMC Software Confidential. BladeLogic Confidential.
1. On server A, open the AR System Administration: Server Information form, then click the
DSO tab.
2. Select Placeholder Mode, then click OK.
This disables the DSO server that was automatically installed with server A. That DSO
server can no longer process distributed operations.
The corresponding entry in the AR System Configuration Generic UI form is DSO-
Placeholder-Mode.
3. To make this change take effect, restart server A.
4. On server B, open the AR System Administration: Server Information form, then click the
DSO tab.
5. In the Source Server field, enter the name of server A.
The corresponding entry in the AR System Configuration Generic UI form is DSO-Source-
Server.
6. In the Backup Polling Interval field, enter an appropriate number of seconds (see Setting a
custom backup polling interval in BMC Remedy ITSM Deployment documentation), then
click Apply.
This instructs the DSO server on Host B to check the distributed pending queue on server A
every x seconds. This is necessary because the DSO server on Host B cannot receive real-
time signals from workflow on server A.
The corresponding entry in the AR System Configuration Generic UI form is DSO-Polling-
Interval.
Note
Setting this field does not make the DSO server on Host B a polling server. For
information about polling servers (DSO-Main-Thread-Polling-Interval), see Setting
a polling interval for the DSO server in BMC Remedy ITSM Deployment
documentation.
7. Click the Connection Settings tab, then click the DSO Server tab on the Connection Settings
tab.
8. In the DSO Local Password field, enter the password that the active DSO server outside the
firewall uses to communicate with server A. See Configuring a password for the DSO user
(see page ).
9. (Optional) In the DSO Local RPC Program Number field, enter a dedicated RPC program
that the active DSO server outside the firewall uses to communicate with server A. See
Assigning an RPC program number to DSO (see page ).
10. In the left table, enter the name and TCP/IP port of server A, then click OK.
See Assigning TCP port numbers to AR System servers (see page 303).
11. To make these changes take effect, restart server B.
Server A is now the source BMC Remedy AR System server for the active DSO server that
was installed with server B.
Note
The default server name is specified in the Server-Name entry in the BMC Remedy AR
System server configuration file.
Thus, if necessary, you can configure BMC Remedy AR System to use a fully qualified domain
name (FQDN) or "long name" for distributed operations. DSO automatically puts the DSO-Host-
Name value in the From Server field whenever that field is on a form involved in a distributed
operation.
Warning
The From Server Name field on distributed mappings is limited to 64 characters. If the
server name exceeds that limit, it is truncated, and the distributed operation fails. This is
most likely to occur when you select the Allow Any Server in Server Group option in a
distributed mapping (see Allow Any Server in Server Group (see page 1757)). In that case,
the From Server Name field must contain the server name alias, which is specified in the
Server-Name option of the BMC Remedy AR System server configuration file.
1. Stop the BMC Remedy Action Request System Server serverName service.
2. On the AR System Configuration Generic UI form, enter the host name in the following
format:
DSO-Host-Name:<hostName>.<domainName>
In this format, hostName is the short name of the From server, such as sanfrancisco, and
domainName is the domain name of the From server, such as acme.com.
See Updating configuration settings by using the AR System Configuration Generic UI form
(see page 1233).
3. Save the configuration form.
4. Restart the BMC Remedy Action Request System Server serverName service.
1. Open the AR System Administration: Server Information form for the appropriate BMC
Remedy AR System server.
2. Click the DSO tab.
3. In the API Timeout Normal field, enter the number of seconds before a timeout occurs.
The timeout value must be an integer between 60 (1 minute) and 21600 (6 hours).
4. Click OK.
In addition, server groups provide increased scalability and reliability and enable several servers to
be managed as a unit. If you use server groups, no further AR System configuration is required to
implement load balancing. See Configuring server groups (see page ).
For more information about how to use a hardware load balancer, see Configuring a hardware load
balancer with BMC Remedy AR System (see page 524).
Related topics
Configuring DSO for a server group (see page 384)
Field Description
Source Specifies the BMC Remedy AR System server for a DSO server to support when that BMC Remedy AR System
Server server is different from the one installed with the DSO server.
Field Description
Use this when setting up a DSO server outside a firewall to support an BMC Remedy AR System server running
behind the firewall. The corresponding BMC Remedy AR System server configuration file entry is DSO-Source-
Server. See Configuring DSO for firewalls.
Polling Specifies the interval at which the DSO server queries the distributed pending queue for pending distributed items.
Interval
Enter any integer from 0 (no polling) to 3600 seconds (1 hour). The corresponding BMC Remedy AR System
server configuration file entry is DSO-Main-Thread-Polling-Interval. When a polling interval is specified, the DSO
server does not receive real-time signals from workflow. See Setting a polling interval for the DSO server.
Backup Specifies the interval (in seconds) at which the DSO server checks the distributed pending queue for pending
Polling distributed items.
Interval
This is used only as a backup in case an issue causes the DSO server to receive no signals from workflow. Unless
an issue occurs, the DSO server continues receiving real-time signals from workflow when this option is enabled.
The server does not become a polling server. The value can be any integer between 15 and 7200. By default, the
backup polling interval is disabled. The corresponding BMC Remedy AR System server configuration file entry is
DSO-Polling-Interval. See Setting a custom backup polling interval.
API Specifies the timeout (in seconds) that the DSO server applies during communication with the BMC Remedy AR
Timeout System server.
Normal
Enter an integer between 60 (1 minute) and 21600 (6 hours). If you enter a value out of range, the closest in-range
value is used. If you do not enter a value, the system uses the default timeout (120 seconds). The corresponding
BMC Remedy AR System configuration file entry is DSO-Timeout-Normal. See Configuring the RPC timeout setting
.
By default, this option is set to 1800 seconds (30 minutes). The maximum value is 43200 seconds (12 hours). The
corresponding BMC Remedy AR System server configuration file entry is DSO-Cache-Check-Interval. See Setting
the distributed mapping cache refresh interval.
The corresponding BMC Remedy AR System server configuration file entry is DSO-Error-Retry-Option.
Max Specifies the maximum number of records in the Distributed Pending form that DSO reads in a single database
Pending query.
Records
Valid values are
Per Query
Minimum number: 1
Maximum number: Unlimited
If no value is specified, the default is 1000. The corresponding BMC Remedy AR System server configuration file
entry is DSO-Max-Pending-Records-Per-Query
Specifies whether to set the status of items in the DSO distributed pending queue to Retry after an attempt to
perform the associated operation fails.
Field Description
Mark (The failure must be due to a recoverable error. Items that fail due to nonrecoverable errors are removed from the
Pending queue.) Valid values are
Retry
T — (Default) Does not set the status to Retry. Instead, the status remains set to New. Depending on the
number of pending items that the DSO server processes, this setting might improve the server's
performance.
F — Sets the status to Retry. Use this to differentiate items in the queue that have never been processed (
status = New) from items that were processed but failed due to recoverable errors (status = Retry).
Note
Regardless of this option's value, the pending item is still retried based on its retry configuration (see
How errors affect pending items).
The corresponding BMC Remedy AR System server configuration file entry is DSO-Mark-Pending-Retry-Flag.
Placeholder When selected, disables the DSO server that was installed on the same host as the BMC Remedy AR System
Mode server. Use this when setting up a DSO server outside a firewall to support an BMC Remedy AR System server
running behind a firewall. The corresponding BMC Remedy AR System server configuration file entry is DSO-
Placeholder-Mode. See Configuring DSO for firewalls.
Log Errors Specifies whether to log failed pending distributed operations to the Distributed Pending Errors form.
to DSO
The corresponding BMC Remedy AR System server configuration file entry is Log-DSO-Errors-To-Form. See
Pending
Errors Form Logging failed pending items.
Suppress Specifies whether to log BMC Remedy AR System server error 302 (entry does not exist in database) in the
No Such arerror.log file when performing distributed delete operations.
Entry Error
for When this option is selected, ARERR 302 is never logged during distributed deletes.
Distributed (Default) When this option is not selected, ARERR 302 is always logged during distributed deletes except
Delete when the Error Retry Option is set to 2 (retry after every error).
Note
When this option is selected, errors caused by valid problems might also be omitted from the log.
The corresponding BMC Remedy AR System server configuration file entry is DSO-Supress-No-Such-Entry-For-
Delete. See Logging the ARERR 302 error during distributed deletes.
Providing a shortcut for specifying expanded FTS qualifications (see page 590)
Configuring FTS for localization (see page 591)
Advanced FTS configuration files (see page 592)
Adding FTS licenses (see page 594)
Related topic
Configuring full text search for a server group (see page 382)
Note
To view the FTS tab on the AR System Administration: Server Information form, you
should have the BMC Remedy Full Text Search license configured.
Disable Full Controls whether the server uses the full text search engine for searching. When disabled, the server uses the
Text search capability of the underlying database. This setting does not apply to multi-form searching.
Searching
FTS The location in the file system where search engine index files are stored.
Collection
Note: If you change the directory in this field, update the pluginsvr_config.xml file with the correct directory path.
Directory
This file is in <ARSystemInstallDir>\pluginsvr\fts.
FTS The location in the file system where search engine configuration files are stored.
Configuration
Directory
Full Text The maximum number of search results returned from the search engine. The default value is 10,000. To limit
Search the number of search results (because of constraints on the computer where the search engine is running),
Threshold reduce the threshold.
Indexing Defines the number of minutes the server waits between periodic attempts to index entries that failed to index for
Failure an unexpected reason in a prior attempt. The default value is 60 minutes.
Recovery
Interval
Temporary During the processing of search results, the server creates a temporary table if the number of FTS matches
Table reaches this value. If the number of FTS matches is less than this value, the server uses the SQL IN operator for
Threshold a query on an existing table. The default value is 200.
Complex During the processing of search results, the server combines results from subqueries to arrive at the final result
Search set. If the number of rows created during processing exceeds this value, the server returns an error message
Threshold indicating that the search is too complex. The default value is 1,000,000.
Indexer Number of seconds before a signal is sent to the server that owns the full text indexing operation (if no signal is
Server pending). When a server is not the owner of the full text indexing operation and generates indexing work, that
Group Signal server signals the server that is the owner of indexing. To reduce the frequency of signals sent, the signaling is
Delay conducted on a delayed basis. When indexing is generated, the server checks whether a signal is pending. If so,
the server does not need to take any action. If a signal is not pending, the server creates a pending signal to be
sent in the specified amount of time. If the full text signal delay configuration value is changed, the duration of
any pending delay interval does not change. The change takes effect the next time a delay interval is started.
Values are
Default--10 seconds
Minimum--1 second
Maximum--None
Case Defines whether full text searching is case sensitive or insensitive. This setting affects all fields indexed for full
text search and affects how the indexes are built. Therefore, changes to this setting trigger an automatic re-index.
The default setting is case insensitive.
Search Defines how the server modifies qualifications received from the client. The choices are
Options
Force Leading & Trailing Wildcards
Ignore Leading & Force Trailing Wildcards
Ignore Leading Wildcards
Remove Leading & Trailing Wildcards
Query Unchanged (default)
Reindex Initiates the re-indexing of all fields selected for full text indexing. This check box is disabled if a re-index is in
progress. The dialog box must be redisplayed for the check box to become active following completion of the re-
indexing.
Disable Full Controls whether the server processes pending indexing tasks. When disabled, indexing tasks are still recorded
Text Indexer for processing at a later time when indexing is enabled.
Use FTS in Controls whether the server uses full text searches when executing queries during workflow that have full text
Workflow indexed fields in the qualification. By default, this option is selected. If you clear this check box, the server uses
the search capability of the database.
Title Field Defines the relevancy weight for the Title field of a form in a multiple-form search. (See Configuring forms for
Weight multiple-form FTS (see page ).) A value of 1 is the baseline and provides a slight boost to the relevancy
weight. If you leave the field empty, the weight is 1. To increase the weight, enter a positive number greater than
1 and less than or equal to 18450000000000000000. To decrease the weight, enter any number from 0.9 to 0.1.
To see a significant difference in the relevancy score, the weight will need to be changed by increments of 100 or
more.
Environment Defines the relevancy weight for the Environment field of a form in a multiple-form search. (See Configuring
Field Weight forms for multiple-form FTS (see page ).) A value of 1 is the baseline and provides a slight boost to the
relevancy weight. If you leave the field empty, the weight is 1. To increase the weight, enter a positive number
greater than 1 and less than or equal to 18450000000000000000. To decrease the weight, enter any number
from 0.9 to 0.1. To see a significant difference in the relevancy score, the weight will need to be changed by
increments of 100 or more.
Keywords Defines the relevancy weight for the Keywords field of a form in a multiple-form search. (See Configuring forms
Field Weight for multiple-form FTS (see page ).) A value of 1 is the baseline and provides a slight boost to the relevancy
weight. If you leave the field empty, the weight is 1. To increase the weight, enter a positive number greater than
1 and less than or equal to 18450000000000000000. To decrease the weight, enter any number from 0.9 to 0.1.
To see a significant difference in the relevancy score, the weight will need to be changed by increments of 100 or
more.
Note: You must re-index data so that any changes to the relevancy weights are applied to the existing data.
BMC Remedy AR System does not support Full Text Search if you have read-only database. For
more information on using read-only database, see Using read-only database (see page 308).
For example, if you create a form and then index a field on that form, each FTS indexing server
indexes that field. Because you can have multiple FTS servers, each with its own current copy of
the FTS data, you can fail over to a second server.
An AR System server is designated as a primary FTS indexing server by having a ranking record
for FTS in the AR System Server Group Operation Ranking form. Each FTS server defined in the
ranking form acts as an indexing server and provides FTS search services to other servers in the
server group. Each defined FTS server will always index, regardless of its ranking order. However,
the server that is ranked 2 contains redundant FTS data and must be used for failover. This server
is not intended to be a user-facing server.
Servers in the server group that are not ranked for FTS are search-only servers. The search-only
servers are user facing servers and they connect to one of the FTS indexing servers to search the
FTS data.
Note
The servers that are not designated as indexing server should not be listed in the AR
System Server Group Operation Ranking form.
The following figure shows the FTS plug-ins and FTS high-availability architecture in a server
group.
BMC Remedy Full Text Search (FTS) plug-in and high-availability architecture
Primary FTS indexing servers always connect to their own local indexes. The other servers in the
group can connect to any of the indexing servers. BMC recommends that all non-Primary FTS
servers initially connect to the Primary FTS server which is ranked 1. The Server-Plugin-Alias
parameter in the ar.cfg [or ar.conf] files of the servers specify the initial connection. This initial
connection is known as the home connection.
While servicing an FTS request, if an FTS indexing server experiences a connection error, the
request attempts to connect to another FTS indexing server (as specified in the AR System Server
Group Operation Ranking form) until a server is found or there are no more to try.
For example, consider a scenario where you have two primary FTS indexing servers that are
ranked 1 and 2 in the AR System Server Group Operation Ranking form. Your Server-Plugin-Alias
parameter points to the server that is ranked 1. If this server experiences a connection error, the
connection request goes to the server that is ranked 2. If for some reason even the server that is
ranked 2 is down, the request then is returned as an error since no primary FTS indexing servers
are available.
Note
In some cases, the indexes on the indexer servers can become out of sync. This
can happen when you create a form and index a field on that form between
scheduled indexing scans. If one of the indexer servers is down at the time of the
scheduled indexing scan, the indexes on that server will be out of sync until the
next scheduled indexing scan.
A slight load on the database can occur if you are performing re-indexing and your
database is running on a low memory.
Avoid performing a full re-index at the same time on two FTS index servers
running in your production environment, as failover will occur if the FTS indexing
server is busy while performing a re-index.
A slight latency in displaying the search results can occur when the failover
happens as it is required to establish a connection to the next ranked server for
FTS.
BMC Remedy AR System does not support Full Text Search if you have read-only database. For
more information on using read-only database, see Using read-only database (see page 308).
Related topics
Configuring full text search for a server group (see page 382)
FTS Configuration form in the AR System Administration Console (see page 584)
Enabling FTS high availability (see page 1437)
You must configure FTS manually using the AR System Administration FTS Configuration form in
the following scenarios:
If you select the Upgrade option to upgrade an existing version of FTS to version 9.1.00.
Note
After completing the changes to this form, continue with the FTS configuration.
See Configuring full text search (see page 578).
FTS Agent Use the FTS Agent check box to enable or disable the FTS plug-in processes in the armonitor.cfg/conf file.
If you select this check box, the FTS plug-in processes are automatically uncommented in the armonitor file. If
you clear this check box and save the changes, the FTS processes are automatically commented in the
armonitor file.
Using the FTS Agent check box does not require manual intervention to uncomment the FTS plug-in processes
in the armonitor file.
You must restart the AR System server for the changes to take effect.
Server Select any one of the options and perform the following:
Configuration
Single Server — (Not a server group)
Enter values in the FTS Port and Max JVM Memory fields.
If you select this option, the fields under Reader are unavailable because on a single server only
one FTS instance serves as both reader and writer.
Server Group-Indexer
Enter values in the FTS Port and Max JVM Memory fields.
If you select the Server Group-Indexer option, the Indexer Server Name field under Reader is
unavailable because indexer server name is not required for configuring FTS on the indexer
server.
Server Group-Searcher
Enter values in the Indexer Server Name and FTS Port fields.
If you select the Server Group-Searcher option, the Max JVM Memory field under Reader is
unavailable because from the searcher server you must connect only to the reader instance
running on the indexer server.
Note
Only the server acting as an indexing server should have the ranking for Full Text Operation in the AR
System Server Group Operation Ranking form.
For more information, see Configuring full text search for a server group (see page ).
FTS Port Enter the FTS port for indexer server. The recommended port range is 9977 - 9998.
During installation, the installer picks the available port from the port range starting from the lower port number.
For more information about port numbers, see Understanding port numbers in BMC Remedy ITSM
Deployment documentation.
Max JVM Enter the JVM heap size (in megabytes) for indexer server.
Memory
FTS Collection Enter the full path of the FTS Collection directory.
Directory
Notes
You must log on to each server and perform FTS configuration on each server
using the FTS Configuration form.
You must restart the AR System server for the changes made to this form to take
effect.
Ensure that the Collection and Configuration directories are available on a local
drive of each indexing server.
Log on to each server and ensure that the paths of the Collection and Configuration
directories are identical on all the servers in the server group. For example, if the
indexing servers in a server group are running on Windows and the paths of these
directories are C:\data1\BMCData\BMCARSystem\FTS\Collection and C:
\data1\BMCData\BMCARSystem\FTS\Configuration respectively, ensure that all
reader servers have the same path set in their ar.cfg conf (see page 1059) file with
respect to the location of the Collection directory on the indexing servers. The fail-
over fails if the directory paths are different. All indexing servers and reader
servers in a server group refer to this path in the ar.cfg conf (see page 1059) file.
The indexing servers also refer to this path for the FTS plug-ins in the AR System
Administration: Plugin Server Configuration form.
BMC Remedy AR System does not support Full Text Search if you have read-only database. For
more information on using read-only database, see Using read-only database (see page 308).
1. Update the FTS Collection Directory field on the FTS tab of the AR System Administration:
Server Information form.
See FTS tab configuration options (see page 579).
Alternatively, you can update the Full-Text-Collection-Directory option of the AR
System Administration: AR System Configuration Generic UI form. See Configuration
settings E-M (see page 1197).
2. Update the pluginsvr_config.xml file with the correct directory path.
The pluginsvr_config.xml file is in <ARSystemInstallDir>pluginsvr\fts.
BMC Remedy AR System does not support Full Text Search if you have read-only database. For
more information on using read-only database, see Using read-only database (see page 308).
For join forms, the server can detect which fields on the join form represent last-modified
timestamps on base forms. Using those timestamps, the server scans for updates at the
scheduled times.
For vendor and view forms that contain a core field with field ID 6 (equivalent of a last-
modified timestamp), the server scans for updates at the scheduled times.
If the form does not contain a field with ID 6 (vendor or view forms) or any last-modified
timestamps (join forms), the form cannot be scanned for updates only, and the server re-
indexes all indexed fields on the form each time the form is scheduled to perform a scan.
Deleted entries (or entries that disappear because join key fields are changed in base
forms) are not detected, and the entries are represented in the index until you complete a
field re-index. For more information, see Re-indexing considerations (see page ).
Use caution when scheduling scan intervals. Do not overload the system with a large number of
form scans at small intervals, especially those that perform a complete reindex because of the
unavailability of last modified timestamps.
Note
If using the BMC Remedy AR System interface is the only way your organization updates
the database table associated to a view form, you do not need to schedule scanning for
that view form.
BMC Remedy AR System does not support Full Text Search if you have read-only database. For
more information on using read-only database, see Using read-only database (see page 308).
Note
You must re-index the data for the changes to the Ignore Words List to take effect.
Accrue searches that contain words from the Ignore Words List do not find any matching BMC
Remedy AR System requests for those words. However, the accrue search retrieves requests for
the other search terms. For restrictions on FTS, see Limitations of FTS (see page ).
Note
You can use the arsftsnostem.stp file to avoid the stemming of words before their usage
as stop words in the BMC Remedy AR System server.
For example:
If the arsftsnostem.stp file contains the word already then only the word already is used
as a stop word.
Note
For information about adding words to the Ignore Words List, see FTS tab configuration options
(see page ).
BMC Remedy AR System does not support Full Text Search if you have read-only database. For
more information on using read-only database, see Using read-only database (see page 308).
1. In BMC Remedy Developer Studio, open the form for which you want to define the results
list format.
2. Select the Definitions tab.
3. Expand the Other Definitions panel and then the Result List Fields panel.
4. Click Add.
5. In the Field Selector dialog box, select WEIGHT, and click OK.
The WEIGHT field displays the weighted value of retrieved BMC Remedy AR System
requests when you create a results list in the browser. If sorted by descending weight, the
requests are listed in order, based on a relevance factor calculated by the search engine.
6.
BMC Remedy Action Request System 9.1 Page 589 of 4703
BMC Software Confidential. BladeLogic Confidential.
BMC Remedy AR System does not support Full Text Search if you have read-only database. For
more information on using read-only database, see Using read-only database (see page 308).
On a form where a single attachment field is the only field indexed for FTS, you can use this
feature to provide a QBE search for the attachment field. Otherwise, only the advanced search bar
method is available for searching attachments.
Important
Use caution when labeling the form search field so that users do not get the impression
that using this field searches all fields on the form. The feature searches only fields
indexed for FTS.
Note
This feature is available only from version 7.0.00 or later clients. For environments with
pre-7.0.00 clients, hide this field for those clients by using client-side workflow when
$VERSION$ < " 7" (the space in front of the 7 is intentional). If the field is visible and
used in pre-7.0.00 clients, the qualification is not sent to the server (unbeknownst to
users), potentially resulting in an unqualified query. Also, if users on a system without a
full text search server license enter a qualification in the form search field, the AR System
server returns an error.
BMC Remedy AR System does not support Full Text Search if you have read-only database. For
more information on using read-only database, see Using read-only database (see page 308).
Configuration Description
file
stopwords_ Specifies stop words used for eliminating common words. Each stop word is a separate line item in the text file.
<locale>.txt You create a file for each locale or language. You can update this file through the Ignore Words List field on the
AR System Administration: Server Information form.
rootwords_ Lists words and their corresponding root word. You create a file for each locale or language. By default, FTS
<locale>.txt uses stemmers particular to the installed locale. A stemmer takes words (such as fast, faster, fastest) and
converts them to stem words at indexing time so that using a word, such as fast, finds all references to it, such as
faster and fastest.
The rootwords_<locale>.txt file overrides how the FTS or third-party stemmers define root words. If a word is
found in the root words list, then the root word is used, and the stemmer is not run on the original word. (For
information about using a third-party stemmer, see Advanced FTS configuration files (see page ).)
Each line in the rootwords_<locale>.txt file contains space-separated words with the first word being the root
word and the others being words that map to the root word, for example:
thesaurus_ Contains synonyms used to perform thesaurus expansion during indexing. You create a file for each locale or
<locale>.txt language. If the thesaurus.txt file is present, any terms it finds in the thesaurus are expanded within the index to
contain its synonym values at the same word location.
Each line in the text file contains space-separated words that are synonyms. For example:
Note
If you modify any of the FTS configuration files, you must restart the server for the
changes to take effect.
<config>
<locale locale="en">
<stopwordfile>enStopword.txt</stopwordfile>
<rootwordfile>enRootword.txt</rootwordfile>
<thesaurusfile>enThesaurus.txt</thesaurusfile>
<indexAnalyzer> </indexAnalyzer>
<searchAnalyzer> </searchAnalyzer>
<stemmer>English</stemmer>
</locale>
<locale locale="de">
.
.
.
You can include as many "locale" elements as you need in the FTSLocaleConfig.xml file. By
default, AR System is installed with two-letter locales defined, but you can also include country
codes (for example, <locale locale="en_US"> ).
If any element is blank or missing in any locale section of the FTSLocaleConfig.xml file, FTS does
not use that item in the analysis process.
For advanced configuration, you can enter the name of an index analyzer, search analyzer, or
stemmer file in the FTSLocaleConfig.xml file. For more information, see Advanced FTS
configuration files (see page ).
BMC Remedy AR System does not support Full Text Search if you have read-only database. For
more information on using read-only database, see Using read-only database (see page 308).
File Description
indexAnalyzer Enables you to define external Lucene analyzers for the indexing process. For more information, see
http://lucene.apache.org/java/docs/index.html.
searchAnalyzer Enables you to define external Lucene analyzers for the searching process. For more information, see
http://lucene.apache.org/java/docs/index.html.
stemmer The FTSAnalyzer uses the Snowball stemmers from the Snowball project for performing stemming functionality.
This configuration enables you to define which stemmer to use for a particular language, or it enables you to
define a custom stemmer with the Snowball project tools. For information about the Snowball project, see
http://snowball.tartarus.org/.
If the default FTS functionality is not producing the results you expect, you can reference third-
party index analyzers, search analyzers, and stemmers.
You might want to process the data differently when indexing versus searching.
An index analyzer expands all words in the database. For example, if a user is searching for
a word like computer, other words like system and machine are included in the search.
A search analyzer does not expand the words being searched, which improves the
performance. If a user is searching for computer, only that word is searched for.
<indexAnalyzer>org.myorg.lucene.analysis.EsparantoAnalyzer</indexAnalyzer>
<searchAnalyzer>org.myorg.lucene.analysis.EsparantoAnalyzer</searchAnalyzer>
<stemmer>Esparanto</stemmer>
3. Make sure that the Java can find the jar file that you created in step 1 (see page 593):
a. Place the jar file in the fts plug-in directory (by default, C:\Program Files\BMC
Software\ARSystem\pluginsvr\fts ).
b. To add the jar to the class path, edit the pathelement option of the pluginsvr_config.
xml file in the fts directory. For example:
<pluginsvr_config>
<port>9998</port>
.
.
.
<plugins>
plugin>
<name>ARSYS.ARF.FTS</name>
<pathelement type="location">C:/Program Files/BMC Software/ARSystem
/pluginsvr/fts/ftsplugin _VerNum_.jar</pathelement>
<pathelement type="location">C:/Program Files/BMC Software/ARSystem
/pluginsvr/fts/tika\-0.3\-standalone.jar</pathelement>
<pathelement type="location">C:/Program Files/BMC Software/ARSystem
/pluginsvr/fts/ *customAnalyzer.jar*
</pathelement>
.
.
.
</plugin>
</plugins>
</pluginsvr_config>
BMC Remedy AR System does not support Full Text Search if you have read-only database. For
more information on using read-only database, see Using read-only database (see page 308).
BMC Remedy AR System does not support Full Text Search if you have read-only database. For
more information on using read-only database, see Using read-only database (see page 308).
Configuring reporting
The following topics provide information about how to configure reports:
Modifying the config.properties file for limiting report entries (see page 594)
Limiting entries using a published report (see page 595)
Configuring web and BMC Remedy AR System reports (see page 596)
Using Crystal reports with BMC Remedy AR System (see page 613)
Managing localized Crystal and Web reports (see page 622)
Parameter Description
arsystem.nativereport. Determines the maximum number of records that can be rendered on the screen in an AR
onscreen_max_entries System report. The default value is 2000; only the first 2,000 records are exported.
Note: If the parameter is not set in the config.properties file, reports use the default value. If the
value is set to 0 (zero), all the records are exported.
arsystem. Determines the maximum number of records that can be exported (as CSV, ARX, and so forth) in
FileExport_max_entries an AR System report. The default value is 2000; only the first 2,000 records are exported.
Note: If the parameter is not set in the config.properties file, reports use the default value. If the
value is set to 0 (zero), all the records are exported.
Parameter Description
arsystem.webreport. Determines the maximum number of records that can be rendered on the screen and the
onscreen_max_entries maximum number records that can be exported in a web report. The default value is 2000; only
the first 2,000 records are exported.
Note: If the parameter is not set in the config.properties file, the reports use the default value. If
the value is set to 0 (zero), all the records are exported.
Tip
BMC recommends that you publish a report if you estimate that the report would contain
more than 5000 entries.
1. Open the BMC Remedy AR System Administration Console, and click System > General >
Plugin Server Configuration.
2. On the AR System Administration:Plugin Server Configuration form, select the appropriate
Plugin Server instance and the Plugin set.
3. From the Plugin Configuration tab, select the ARSYS.ARF.PUBLISHREPORT plugin from
the Plugin Name list and click Modify.
4. In the Modify Existing Plugin form, modify the setting value for ARSYS.ARF.
PUBLISHREPORT from the User Defined Elements panel.
The default value is 2000.
5. Click OK.
The new value for ARSYS.ARF.PUBLISHREPORT is displayed on the Plugin Server
Configuration form.
Note
When you change the limit of the entries value to 5000 or more, you must also increase
the heap size to more than 1 GB as per your requirement, for example, Xmx1024m or
Xmx2048m. The default value is Xmx512m. You can modify the heap size in the
armonitor.cfg file at the following location:
For more information about what parameters to add to the configuration file for limiting the number
of entries in a BMC Remedy Action Request System (AR System) report, see Modifying the config.
properties file for limiting report entries (see page 594).
For instructions on attaching active links to a workflow trigger, such as a button field, see Attaching
an Open Window active link to a form with a button field (see page ).
For information about backward compatibility related to localization, see Backward compatibility for
reports (see page ).
For information about the AR System Message Catalog entry required for localized reports
embedded in an active link, see Localizing message components of a form view (see page 3072).
AR System
Crystal
Web
You can create report type entries, but they should follow the syntax described in the Run
Command URL keywords and descriptions (see page 598) table. Only administrators can submit or
modify entries to the ReportType form.
The recommended entries for AR System and Crystal report types are loaded automatically during
BMC Remedy AR System installation. Open the ReportType form in Search mode to see these
entries.
The following topics provide information about how to define a new report type and
recommendations for the different report types:
ReportType form
(Click the image to expand it.)
2. In the Report Type field, enter a name for the supporting report engine.
BMC Remedy AR System uses the following names. Do not use them as it would violate a
unique index that has already been defined.
AR System
Crystal
Web
3. In the Query Converter Class field, enter the name of the Java class that converts a BMC
Remedy AR System query string into a query string format recognized in the web reporting
interface.
BMC Remedy AR System uses the com.remedy.arsys.reporting.CrystalQueryConverter to
implement the ReportQueryConverter interface that converts queries to the Crystal report
engine. Use this interface when writing your own query converter for other web-based report
engines. You can find the CrystalQueryConverter and queryConverter_ReadMe.txt file in the
midTierInstallDir\samples directory. The queryConverter_ReadMe.txt file provides a guide
for creating your own query converter class.
4. In the Query Override Capability field, select Yes or No.
The Yes option gives this report type permission to override a query stored in a report. The
No option denies this permission.
This field also is displayed on the ReportSelection form, with the selected value.
5. In the Run Command field, enter the URL that is used to connect a report to the report
engine.
The Run command begins the processing of the selected report.
The recommended Run Command is a single-line entry with no spaces. The keyword
portion of the URL corresponds to parameters that are passed to the web reporting
environment. The following table lists allowable URL keywords that can be used to build the
Run command. These keywords listed are for reporting purposes only. They are not BMC
Remedy AR System keywords.
Run Command URL keywords and descriptions
Keyword Description
Keyword Description
$CRTLOC$ Location of any version of Crystal Reports. This path is stored on the Report Settings page
of the BMC Remedy Mid Tier Configuration Tool.
$CRTXILOC$ Location of BusinessObjects Enterprise XI. This path is stored on the Report Settings page
of the BMC Remedy Mid Tier Configuration Tool.
$RPTLOC$ Report location relative to the base directory for reports as indicated in the BMC Remedy
Mid Tier Configuration Tool.
$RPTFILE$ The report on the web server. An absolute pointer to where the report file is found.
$CRTSVR$ Crystal Web server. This is usually the same as the BMC Remedy Mid Tier server web host.
$LOC$ Locale used for generating locale-specific prompts, labels, and formatting data.
$TIMEZONE$ Time zone to use for generating date and time strings; for example, PST.
$UPRPTSVR$ AR System server that is specified in the user preferences as the Report Server.
$RPTDEST$ The selected destination for the report; for example, File or Screen.
Note
Recommended entries for BMC Remedy AR System and Crystal report types
The following entries are recommended for the AR System and Crystal report types. The
recommended entries for AR System and Crystal report types are loaded automatically during
BMC Remedy AR System installation.
The $RPTLOC$ parameter refers to a report file location relative to the directory
specified as the Reporting Working Directory in the Mid Tier Configuration Tool. See
BMC Remedy Mid Tier configuration (see page 426) for information about
configuration tool options. If the directory specified in the Mid Tier Configuration Tool
is not the web server's document root, you must include the web server's path to the
configured directory before the $RPTLOC$. In this example, arreports is a virtual
directory configured on the web server to point to the parent of $RPTLOC$.
Note
If you are using Business Objects XI and your context path is not arsys,
ensure that you enter the context path in the BMC Remedy Mid Tier
Configuration Tool as described in Configuring the Report Settings page
(see page ). Otherwise, your reports will fail.
To appear in the Report Console or in the ReportSelection form, a report must have an entry in the
Report form. This occurs automatically when you create and save a new Web or BMC Remedy AR
System report. For many reports, no further action is required. You should only make modifications
directly in the Report form when you need to take one of the following actions:
Change the group permissions for a report, or change the availability of the report.
Modify the base qualification or control query override settings.
Configure a localized copy of an existing report.
Register report definition designed outside of BMC Remedy AR System, such as a Crystal
report, that you want to make available to BMC Remedy AR System users.
The Report form stores report definitions for all report types, including Web reports, BMC Remedy
AR System reports, and Crystal reports. It also stores metadata about the report, including the
following information:
The following sections provide information about how to work with reports:
There are several settings you can change to control whether other users can see a report:
Mark the report private — For Web reports, select the Private check box in the Report
Designer. This removes all groups from the Assignee Groups field in the Report form when
the report is saved. In this case, only the report creator and Administrator can see the
report. This is the default setting when a new report is created.
Set report permissions — Add or remove groups in the Assignee Groups field in the Report
form.
Mark the report invisible — To prevent a report from appearing in the Report Console or the
ReportSelection form, but still allow workflow to run the report, set the Visible in Console
field in the Report form to No.
Set status to inactive or pending — To prevent a report from appearing in the Report
Console or ReportSelection forms, and prevent workflow from running the report, set the
Status field to Inactive or Pending. You can use the Pending status to let reviewers know
that the report is ready for review.
Note
Overrides do not affect a base qualification. Users can override a query built into the
report definition, but if there is a base qualification defined in the Report form, the base
qualification is always included when the report runs, whether or not Override is selected.
Override Query in Report? — This field sets the default value of the Override option in the
Report Console. If this is set to Yes, the Override check box is selected, and if it is set to No,
the Override check box is blank. This field is automatically set to Yes for BMC Remedy AR
System reports and to No for Web reports.
Lock Override Option — This field determines whether the Override check box is read-only
in the Report Console. If this is set to Yes, the Override option is read-only and the user
cannot select whether an added query will override the report query. If this is set to No, the
user can change the Override option before running a report. The default value for this
setting is No for both BMC Remedy AR System and Web reports.
Tip
By setting Override Query in Report? to No and Lock Override Option to Yes, you lock in
the query in the report definition, so that the user can only further refine the query, and
cannot broaden it.
Query contained in the report definition — This is any query in the report definition, for
example, when you create an ad hoc report in the Report Console.
Base qualification — The administrator can enter a base qualification using standard BMC
Remedy AR System syntax in the Base Qualification field of the Report form. This allows the
administrator to add a query to an existing report, without modifying the report definition
itself.
In a base qualification, you must use the database field name and not the field label on the
form.
Runtime qualification — The user running the report can add additional qualifications to the
query at runtime.
Active link query — An active link that runs a report can include a qualification.
In any case where the Override option is not selected and the report includes more than one of
these qualifications at runtime, the different queries are joined with an AND operator. Base
qualifications are never overridden and are always joined to other qualifications with an AND
operator.
Therefore, the effect of combining qualifications is to narrow the report to include only those entries
that match all conditions of the combined queries.
Category fields — These cause reports to be filtered by the Category menu in the Report
Console. They form a hierarchy with three levels. All three, or none, should be set. You can
create your own categories by using these fields if you need to.
Date range fields — These are used by BMC Remedy application reports only.
Report set name — This field used by BMC Remedy application reports only. The
combination of the report set name and locale must be unique.
Select the report in the Report Console, and then click Delete.
Search the Report form for the report, and then select the entry in the results list, and click
Delete.
Note
To make a report unavailable without deleting it, select Inactive or Pending in the Status
field of the Report form, or set Visible in Console to No.
If your server is a Unicode server, you cannot create a record in the Report form by attaching an .
arr file created in a browser. Instead, use the ReportCreator form to create reports on a Unicode
server.
The following topics provide information about how to monitor reports using flashboards:
Note
For information about how to create and run Web and BMC Remedy AR System reports
in the Report Console, see Running reports in the Report Console (see page 957). For
information about configuring BMC Remedy AR System to use Crystal reports, see Using
Crystal reports with BMC Remedy AR System (see page ).
The Report Console provides a central location for all reporting tasks. Users can create and run ad
hoc reports based on user-specified criteria, and run existing reports that are defined by others or
installed with BMC applications.
Using the Web report type, browser users can create nicely formatted reports and save them in
common formats such as Adobe PDF. The necessary components to support Web reports are
automatically installed with the mid tier and do not require you to purchase or install any additional
third-party components. The Web report type is added to the existing BMC Remedy AR System
and Crystal report types.
For an overview of each report type, see Report types. (see page 956)
The following topics provide information about reporting in BMC Remedy AR System:
The Report Console is based on the AR System Report Console form and uses other supporting
forms such as the AR System Report Designer form, the Report form, and the ReportType form.
The Report Console opens when you click the AR System Report Console link in the Quick Links
section of the home page, or when you click the Report button that appears with search results in a
browser.
When you create or edit a report, the AR System Report Designer form opens as part of the Report
Console. This form allows you to design, modify, and save reports. When you click Back on this
screen, you return to the main Report Console.
Designing a report
Report form — Stores the report definition and metadata about the report. Administrators
use this form to manage certain report settings. See Managing reports with the Report form
(see page ).
ReportType form — Stores the available report types. The Web, BMC Remedy AR System,
and Crystal report types are installed with BMC Remedy AR System. Administrators can
define additional report types.
Note
Two legacy reporting forms, ReportCreator and ReportSelection, are also installed with
BMC Remedy AR System. The ReportCreator form is used to edit the BMC Remedy AR
System report type. The ReportSelection form is used to display available reports in a
browser. For information about creating BMC Remedy AR System type reports, see
Defining BMC Remedy AR System reports (see page 976).
Using the report schedule option on the Report Console, an administrator can specify the time and
date to run and publish a web report. The administrator can assign the Job Scheduler role to
groups so that members can use the report schedule option. For more information about role-
based permissions, see Role-based access overview (see page 131).
Note
The report publish and schedule options are enabled for Web reports only, not for BMC
Remedy AR System reports.
For an example about modifying a qualification when scheduling a report, see Publishing reports
(see page 982).
AR System Job — Stores the parameters of a report that a user has scheduled to be run
and published at a specified interval. It also stores the parameters related to multiple reports
such as, email IDs, export options. The Parameters field in the form, which also stores query
and qualification data, is applicable for all the job items linked by the job ID.
AR System Job Item — Stores a unique job ID and the parameters of the report that is
scheduled to be run and published at a specified interval.
AR System Pending Job Queue — Stores the parameters of the jobs that are ready for
execution. It is an intermediary queue.
Note
Only administrators have permission to delete scheduled reports from the Pending
Job Queue form.
AR System Publish Report — Stores the parameters for filtering and publishing report
results. It stores the external qualification, in encoded format, that users enter when
searching a form.
Note
If the administrator disables unqualified search in the AR System Server Information form,
then a 1=1 qualification does not work when running reports. The user receives an error
when attempting to run a report for an unqualified search.
1. Every report that is either published immediately or scheduled for publishing at a later time
is associated with a unique job ID that it obtains from the Job Item form. Any report
parameters that are passed from the Report Console are also stored in the Job Item form.
2. The unique job ID and report parameters from the Job Item form are pushed to a Job form,
along with any schedule parameters that are passed from the Report Console. The
schedule parameters are used as the basis for computing the next collection time that a
report is run.
3. The Job form for a report is pushed to the Pending Job Queue form on an hourly basis.
Based on the next collection time specified in the Job form, a report is run and published
immediately, or on a recurring schedule (daily, weekly, monthly). The Job Type parameter in
the Job form determines how a report will be published (such as email distribution).
4. At the next collection time, the data, report parameters, and job parameters for a report are
pushed from the Pending Job Queue to the Publish Report form. The report is run and the
results published to the specified recipient or list of recipients. If there is an error, an error
message is sent by email to the user who published the report, or a specified list of
recipients.
Related topics
Publishing reports (see page 982)
Web reports do not support output directly to .arx, .csv, or BMC Remedy AR System XML
format. To generate output directly to these formats, you must use an BMC Remedy AR
System report.
Tip
To generate .csv output based on a Web report, save the report to Microsoft Excel
format. Then open the report output in your spreadsheet application, remove the
rows at the top and bottom of the report that do not contain field data, and then
save it in .csv format.
Web reports do not support diary fields, attachments fields, or attachment pools. Web
reports do not support currency value or currency type, but do support currency fields.
You must perform the following steps to print Web reports in HTML format.
1.
BMC Remedy Action Request System 9.1 Page 609 of 4703
BMC Software Confidential. BladeLogic Confidential.
Note
When you print the report in PDF format, some of the columns might
truncate. So, you must reduce the number of columns in the report to fit the
screen size.
When the user clicks the Report button on a table field or results list, or runs a report from the My
Reports list, the Report Console only lists reports that are associated with the current form. In
addition, if the user selected records in the table or results list before clicking Report, the IDs for
the selected records are passed to the Report Console, and only those records are used when the
report is run. If the Report Console opens as a result of the user selecting a report from the My
Reports list, then there is a pre-defined qualification that is passed to the Report Console.
In these cases, the Report Console is opened by an Open Window active link action as a dialog
window, dedicated to reporting on that form. The On Dialog Open Action field in the active link is
populated to set the context form name and to pass that information, along with any selected
records, into the Report Console.
You can change the label of the Report button by editing the value of the Report Button field
property for the table field or results list field. If you set a blank label, the Report button does not
appear on the table or results list field. For information about setting table properties, see Actions
that trigger cache events (see page ).
user clicks the workflow trigger where the active link is attached, a new browser window opens to
display the report.
The following procedures outline methods of creating an Open Window active link:
Creating an Open Window active link for web reporting (see page 611)
Attaching an Open Window active link to a form with a button field (see page 612)
For general information about creating active links and related properties, see Creating active links.
(see page 2636)
Window Report
Type
Target New Selecting New causes a new window to open for each report generated. If
Location you select Current, the active link uses the existing open window from where
the active link is initiated.
Data SERVER
Source
Report The type of report The menu's data is read from the ReportType form on the AR System server
Type being used for the Open Window action.
Qualification
A query string that If you want to use a string from a local field, use the EXTERNAL keyword, for
determines which entries example, EXTERNAL($QueryStringField$). If this string and the Entry IDs
from the form to include string are both left empty, all entries of the form being reported on are
in the report included in the report.
4. Click Show Advanced, and complete the fields as described in the following table.
Advanced fields
Field Selection More information
Entry IDs A comma- Only these entries are displayed in the report. If this string is filled and contains
separated list of fewer than 256 entry IDs, it overrides the Qualification String. Otherwise, the
entry IDs from the Qualification String takes precedence. If both are left empty, all entries in the form
form being reported are included in the report.
on
Query Yes or No Some report engines allow the Qualification String (or Entry IDs) to override a query
Override that might be stored as part of the report definition. This value specifies whether the
report engine should do so.
Report Create — If you select Crystal Report in the Report Type field, then Edit and Create are not
Operation Used to valid options for the Operation field.
create a new
report
definition file
Edit — Used
to edit an
existing
report
definition file
Run — Used
to run a
report
Character The character set to Select Use Server to apply the same character set encoding used by the server.
Encoding be used for the
report
1. In BMC Remedy Developer Studio, select a view of a form and create a new button field.
2. Attach the active link to the button field. See Creating active links. (see page 2636)
3. Save the form.
To limit the number of forms and saved report sequences cached for faster user access, edit the
arsystem.myreport.report_cache_limit property in the config.properties file. This property indicates
the number of "My Reports" definitions to cache per form. For example, if you set the property to
20 (the default), a maximum of 20 "My Reports" definitions are saved in the cache for a given form.
The cached definitions allow faster report generation but take up mid-tier memory for caching.
To view Crystal reports designed for BMC Remedy AR System on the Web, you must install one of
the following products on a Windows computer:
"Managed" reports are cached with their data by the BusinessObjects Central Management Server
(CMS). This allows you to take advantage of BusinessObjects server functionality such as
scheduling reports. "Unmanaged" reports are generated on demand (at run time) and are then
discarded.
For a list of the compatible web application servers, see Compatibility matrix in the BMC Remedy
ITSM Deployment online documentation.
Note
You can also create formatted reports for the web by using the BMC Remedy AR System
Report Console. See Reporting on BMC Remedy AR System data (see page 954) and
(for administrators) Configuring reporting (see page 594).
The following topics provide information about how to use crystal reports:
Mid tier installation options for Crystal reports (see page 614)
Configuring the Crystal reports integration (see page 614)
Report definitions for Crystal reports (see page 617)
Recommendations for Crystal Reports for the Web (see page 618)
Important
In the BMC Remedy AR System installer, the AR Web ReportViewer is called the AR
Crystal Web Application.
The AR Crystal Web Application is installed by default only when installing BMC Remedy AR
System on Windows, and only when the installer detects registry settings indicating that a
supported version of BusinessObjects Enterprise or Crystal Reports Server is already installed.
The AR Web ReportViewer and BMC Remedy AR System ODBC Driver are also installed with the
AR Crystal Web Application
With the AR Crystal Web Application, the BMC Remedy AR System ODBC Driver (arodbc VerNum.
dll) is also installed as a system DSN (Data Source Name). This allows the CMS to retrieve BMC
Remedy AR System data for the report.
Note
When file names are mentioned in the documentation, the placeholder VerNum
represents the version number of the release as it appears in the file name. In some
cases, this includes a build number. For example, in release 9.0.00, the BMC Remedy
AR System ODBC driver is named arapi90.dll or arapi90_build xxx.dll.
The installer prompts you for information about Crystal reports settings. You can provide these
settings at installation time or after installation. See Configuring the Crystal reports integration (see
page ) and Configuring the Report Settings page (see page ).
Configuring BMC Remedy AR System settings for Crystal reports (see page 615)
Configuring BusinessObjects Enterprise (see page 615)
Configuring Crystal Reports Server (see page 616)
Which tool you use depends upon where you have installed the mid tier and AR Web
ReportViewer:
If the mid tier and AR Web ReportViewer are installed together on the same computer as
the BusinessObjects or Crystal Reports server, you use the BMC Remedy Mid Tier
Configuration tool to set the report settings.
If the mid tier is installed on a different computer, then you use the AR Web ReportViewer
Configuration tool to configure the AR Web ReportViewer, and the BMC Remedy Mid Tier
Configuration tool to configure the report settings for the mid tier.
To ensure that BusinessObjects Enterprise is properly configured to work with BMC Remedy AR
System:
(Optional) By default, the CMS is configured to limit the number of records returned when
previewing or refreshing a report to 20,000. If you run large reports and see errors indicating
you have hit this limit, you can change the setting in the BusinessObjects Central
Management Console. This setting is a property of the CMS ReportApplicationServer
service.
To ensure that Crystal Reports Server is properly configured to work with BMC Remedy AR
System:
Set the -ipport and -reportdirectory parameters in the properties of the Report
Application Server service, as described in this section.
Enable the Guest account, as described in this section.
Configure Crystal Reports Server with sufficient concurrent licenses. Consult the
BusinessObjects Enterprise documentation for information about SAP licensing
requirements.
Make sure that the necessary services are running and enabled in the Central Configuration
Manager, Servers tab. This includes at least the Central Management Server (the CMS) in
the Servers List section, and the Report Application Server in the Service Categories
section.
Make sure that the C:/WINNT/Temp folder has permissions for the user that the web server
runs as, because reports are copied to this folder before they are published to the CMS.
2. Open the Servers tab and locate the Report Application Server service in the Service
Categories section.
3. Right-click the service and open the Properties dialog box.
4. In the Command Line Parameters field, add the following settings to the end of the existing
command line:
-ipport 1566 -reportdirectory " <ARInstallDir>\midtier\reports "
The value of the -reportdirectory parameter must match the path in the Reporting
Working Directory, set in the Mid Tier Configuration Tool or AR Web ReportViewer
Configuration Tool. See Configuring the Report Settings page (see page ).
5. Click Save & Close.
6. Restart the Report Application Server service.
For specific information about designing Crystal Reports for BMC Remedy AR System, see
Integrating Crystal Reports with BMC Remedy AR System (see page 875).
Important
To prevent user names and passwords from being embedded in data from Crystal
reports, modify your System DSNs to remove the user name and password. For more
information, see Establishing a system DSN for Crystal reports (see page 618) and
Configuring the ODBC driver for Crystal reports (see page ). Additionally, when
saving, select the Save Without Data option and clear the Report Refresh on Open option
to prevent the original data from being displayed each time a report is displayed.
If form fields are modified, especially fields on which a Crystal report is reporting, then you must
update the Crystal report; otherwise, you will receive the following error message: Error detected
by database DLL. [On Report Server: serverName].
If you have report definition files created with Crystal Report Designer application, create entries for
the files in the Report form to make them available for web reporting.
BMC Remedy AR System and BusinessObjects display integration (see page 618)
Establishing a system DSN for Crystal reports (see page 618)
Configuring the ODBC driver for Crystal reports (see page 619)
Restricting the number of records retrieved (see page 621)
Setting up optimal formatting for all environments (see page 621)
Saving a Crystal report (see page 622)
If the Crystal Report Designer application is installed on a different system from the Crystal Web
Component server, then the administrator must make sure that the System DSN on the Crystal
Web Component server has the same name as the SystemDSN embedded in the report design.
For example, if an application developer who is developing on Computer A has created a system
DSN called myServer_DSN, and the Crystal Web Component server is on Computer B, then
Computer B will also need to have a system DSN named myServer_DSN.
Important
Crystal Designer and Crystal Reports use the user name and password in the System
DSN to log on to AR System. When you create reports in Crystal Designer, you use a
System DSN complete with a user name and a password. If Crystal Designer requests
user information, do not provide it. The information in the System DSN should be
sufficient. If not, provide the required information in the System DSN, not in Crystal
Designer. Do not use a User DSN when you create or run Crystal Reports. Before you
run any reports, however, modify your System DSN to remove the user name and
password. This causes Crystal Reports to use the user name and password of the user
currently logged in. Failure to remove the user name and password from the System DSN
might give you unexpected results when you run your report.
For more information about using ODBC with Crystal Reports, see Integrating Crystal Reports with
BMC Remedy AR System (see page 875).
Important
Be sure to click the System DSN tab, not the User DSN tab. Never use the User
registered version of the ODBC driver to create reports.
4.
BMC Remedy Action Request System 9.1 Page 619 of 4703
BMC Software Confidential. BladeLogic Confidential.
6. Specify the server name and user name to connect to the database.
You do not need to fill in the password.
7. Select the Use Underscore check box in the ODBC dialog box.
This will confirm that the ODBC driver translates special characters such as colons, spaces,
and so on, into underscores.
8. Select the Use Labels check box to use field labels based on the locale you specify in the
Report Locale field.
Note
It is recommended that you deselect the Verify On First Refresh report option in
Crystal Reports. Then, you do not need to match the Use Labels option for the
report to run correctly. If the Verify On First Refresh option is selected, you must
match the Use Labels option when you create the report and at runtime. For
example, if you select the Use Labels option when you create the report, you must
also select it when you run the report. Conversely, if you unselect the Use Labels
option when you create the report, you must also unselect it when you run the
report
9. In the Report Locale field, enter the locale for the language in which you want to see the
report.
Note
If you have installed two localized views (for example, German and French), and
you are using the German localized view and the report locale setting is set to the
French locale, the data returned will be in French, though the static report text will
be in German.
1. Right-click inside the designer and make sure the Snap to Grid option is not selected.
2. Select Show guide lines in design and Show guide lines in preview options from this menu.
3. Click on the top and left page margins to make vertical or horizontal lines appear in the
designer.
4. Move the fields next to the guide lines to attach them to the guide lines. This way the column
headings and the column content can be left aligned as well as top aligned.
Note
Guide lines are displayed only in the design mode and not when the report is
actually viewed.
Some Web reports installed with BMC Remedy applications are localized, and you can also add
localized Crystal reports to BMC Remedy AR System. In this case, entries in the Report form and
Report Definition form (for Web reports) manage the localized report definitions.
Warning
This section contains advanced details about the reporting infrastructure in BMC Remedy
AR System. You should not make changes as described in this section unless you have
an in-depth understanding of advanced reporting using Web or Crystal reports.
The following topics provide information about how to manage the localized Crystal reports and
web reports:
Setting the Report form for localized Crystal reports (see page 622)
Localized Web reports (see page 623)
Using exported data with BMC Remedy Data Import (see page 625)
Report Definition File — Attach the localized report definition file in this attachment field.
Locale — Enter the locale code, for example, FR for French.
Report Set Name — Use the same report set name for localized versions of the same
report. The combination of the report set name and locale must be unique.
To localize a Web report created outside of BMC Remedy AR System with the BIRT report tools,
you can either localize separate copies of the report definition file, or use a single report definition
file and localize the related properties files.
Report Definition File ---Attach the localized report definition file in this attachment field.
Locale — Enter the locale code, for example, fr for French.
Report Set Name — Use the same report set name for localized versions of the same
report. The combination of the report set name and locale must be unique.
When you save the entry, workflow stores the attachment in a new entry in the Report Definition
form, and populates the Instance ID field (Report form) and Report Definition GUID field (Report
Definition form) with a matching GUID. The matching GUID links different localized versions of the
same report.
1. Use the BIRT report tools and your localization tools to create a report library and localized
property files for Web reports.
The library file structure must adhere to the following guidelines:
Use a resource directory and make sure it has a unique name. For example, use the
report name in the directory name.
Give the properties files unique names. For example, use the report name in the
properties file names as well.
Make the names of the locale-specific properties files match the main properties file.
For example, if the primary property file is named messages.properties, then the
locale specific ones must be named messages_ language.properties, for example,
messages_de.properties, messages_fr.properties, and so on.
2. Add the library and property files to a .zip file. The .rptlibrary must be at the top level of the
zip file, with the with the subdirectories containing properties files directly below it. For
example: mylib.rptlibrary mylib_resources/ mymessages.properties mymessages_de.
properties mymessages_fr.properties
3. In the AR System Report Definitions form, create a new entry and attach the .zip file to it.
Set the type to BIRT Library
Leave the locale field blank
4. In the Report form, create and save an entry that contains the report definition file as an
attachment.
When you save this entry, workflow creates a corresponding entry in the Report Definition
file and generates a GUID.
5. Create additional Report form entries for each locale. In particular, set the following fields:
Use the same Report Set Name value as in the main Report form entry.
Enter a unique value in the locale field to identify the locale.
Copy the GUID from the Report Definition file entry that is associated with the main
Report form entry.
If the locale of the computer you are using to create the report is set to English, the value in
the Locale field is $NULL$.
If the locale of the computer you are using to create the report is set to any language other
than English, then the appropriate language code is set in the Locale field of the Report form
entry, for example, fr for French.
Users can only see those Web reports for which the Locale field in the Report form entry matches
the locale set on the user's computer. ($NULL$ is interpreted as English.) This means that to share
an ad hoc report with a user in another locale, you must make a copy of the report for the other
locale.
1. In the Report Console, open the original report for editing. See Defining BMC Remedy AR
System reports (see page 976).
2. Click Save As, and give the report a different name, such as My Report-Spanish.
3. Open the Report form, and then locate and open the record for the copied report.
4. In the Locale field, enter the two-character or four-character abbreviation for the locale
where you want to share the report, such as es for all Spanish locales or pt_BR for Brazilian
Portuguese.
5. Save the entry.
Users in the designated locale can now see the copy of the report that was configured for their
locale. After you have set the locale for the copy of the report, the copy no longer appears in the list
of reports in your Report Console.
Note
The steps in this procedure do not cause the report headings and other metadata to be
translated; the report definition remains in the original language. To create translated
copies of ad hoc reports, you must create the report on a computer configured for the
desired locale.
AR Export .arx
AR XML .xml
ASCII .asc
The following topics provide information to configure the BMC Remedy Approval Server:
Related topics
Configuring approvals with BMC Change Management
Approvals in business process (see page 105)
To access the AP:Administration form, you must be a approval server process administrator or an
AR System administrator.
AP:Administration form
(Click the image to expand it.)
This section only describes how to use the following items on the AP:Administration form:
Administrator tab — This tab enables you to create and configure process administrators.
See Configuring process administrator capabilities (see page 628).
Server settings link — This link enables you to configure approval server logging, and
customize other settings.
For information about using other tabs and links on the AP:Administration form, see:
The process administrator is a more powerful authority than the signature authorities (approvers)
who actually sign approval requests. A process administrator has the following responsibilities:
Designing the approval process to generate approval signature data when BMC Remedy
AR System workflow needs to be authorized
Connecting approval server forms to workflow to accomplish the designed approval process
This includes configuring routing, and creating the list of authorized approvers. See also
Adding approvals to an application (see page 2892).
Overriding a process, or parts of a process, when circumstances arise that must be handled
outside of established workflow.
See Performing overrides (see page 1033).
Creating and deleting other process administrators as needed
Other process administrators can have full or limited authority. A process administrator with
limited authority can perform the following activities:
Acting as an administrator to manage only specific processes that are assigned by a
process administrator with full authority
Acting as an override-only administrator to approve or reject requests regardless of
the approver list for the assigned processes
Full Admin authority — Grants the ability to configure and modify processes, as well as to
approve or reject requests regardless of the normal process.
Override Only Admin authority — Grants the ability to approve or reject requests regardless
of the normal process, but not create or modify processes.
In this topic:
The first process administrator must be created with Full Admin authority by an AR System
administrator. Subsequent process administrators can be created by any process administrator
with the Full Admin authority. To designate a user as a process administrator, the user must exist
in BMC Remedy AR System, and must be a member of the AR System Approval Admin group. If
the user ID for a process administrator does not exist, an AR System administrator must create it
and assign the user to the Approval Admin group. See the Adding and modifying user information
(see page 1246).
This section describes how to assign process administrator authority to an existing AR System
user who is a member of the Approval Admin group.
1. Open the AP:Administration form as described in Working with the AP:Administration form
(see page 626).
2. Open the Administrator tab, and click Create to open the AP:Process Administrator form.
3. On the Process Administrator tab, specify appropriate values in the various fields.
For the description of the fields, see AP-Process Administrator form (see page 1688).
4. Click Save.
Note
The suite installer defines the RPC port and sets the same in the approval Plugin
Loopback RPC Socket automatically. Confirm that these settings exist, and define
them if they do not.
Note
You must have Flash version 9.x or later installed on the machine.
7. The flowchart view is compatible with BMC Remedy Mid Tier 7.1.00 and 7.0.01. You can
use BMC Remedy Mid Tier to display the flowchart view for an approval request.
Note
The Data Visualization Field cannot be seen if you are using Mozilla Firefox
2.0.0.11 on Apple MacOS 10.4.11; this is an issue with the browser.
(For UNIX)
Note
The entry for the separate plug-in server exists in the armonitor.conf file, but
is commented by default.
This change allows Approval Server to start through a separate plug-in server
instance and avoid any conflict with the default plug-in server instance.
c. Save and close the armonitor.conf file.
4. Open the pluginsvr_config.xml file in the ARSystemInstallDir/pluginsvr directory and modify
as follows:
a. Remove the following entries for the ARSYS.ARDBC.PREVIEW plug-in:
<!-- Class which puts the Signal Masking in place for Plugin Server-->
<plugin>
<name>ARSYS.ARDBC.PREVIEW</name>
<pathelement type="location">C:/Program Files/BMC Software/ARSystem
/approval/bin/arasj90_build001.jar</pathelement>
<classname>com.bmc.arsys.approval.main.ApprovalPlugin</classname>
<pathelement type="location">C:/Program Files/BMC Software/ARSystem
/arserver/api/lib/arcmnapp90_build001.jar</pathelement>
<pathelement type="location">C:/Program Files/BMC Software/ARSystem
/arserver/api/lib/arutil90_build001.jar</pathelement>
</plugin>
The armonitor executable uses the armonitor.cfg (Windows) or armonitor.conf (UNIX) file to
determine which services to start. Starting the plug-in server is controlled by the following line:
Windows
UNIX
When the plug-in server starts, it checks the BMC Remedy AR System configuration file (ar.cfg or
ar.conf ) for a list of plug-ins to load. The installation script adds one of the following entries for the
Approval Server plug-in to the BMC Remedy AR System configuration file:
To stop and start the Approval inside the default Java plug-in server
<!--<plugin>z
<name>ARSYS.ARDBC.PREVIEW</name>
<pathelement type="location">C:/Program Files/BMC Software
/ARSystem/approval/bin/arasj80_build002.jar</pathelement>
<classname>com.bmc.arsys.approval.main.ApprovalPlugin</classname>
2. To start the Approval Server, remove the comment markers from the files discussed in steps
1a and 1b.
b. Comment the Approval Server Entry in the armonitor.cfg file. For example:
2. To start the Approval Server, remove the comment markers from the files discussed in steps
1a and 1b.
The Email Engine creates and sends messages based on the configuration options that you
specify in the AR System Email Mailbox Configuration form. Outgoing messages can include
results from actions specified in incoming messages, such as query or workflow results.
You can also link outgoing mailboxes to incoming mailboxes, to send the results of any actions
from a specific incoming mailbox to a specific outgoing mailbox.
Note
To use notifications with email, you must designate one mailbox as your default
notification mailbox. For more information, see Sending notifications (see page 1447).
The following topics provide detailed information about how to configure the basic and advanced
properties of outgoing mailboxes:
You can specify only one default template of each type for a mailbox. The AR System Email
Templates form must already contain the templates.
Note
Review the information about advanced configuration settings in Creating and using email
templates (see page 1524).
1. In the Advanced Configuration tab of the AR System Email Mailbox Configuration form,
enter the following information in the fields above the tabs:
Associated Mailbox Name — Enter the name the existing mailbox that will receive
instructions from this outgoing mailbox.
Default Outgoing Mailbox — Select Yes to make this outgoing mailbox route all
emails that do not have a specified outgoing mailbox associated with them.
Display Name — Enter a descriptive name that appears in the From: line of outgoing
emails.
This option is not used with MAPI.
Email Address — Enter the email address of the server user that you created during
the product installation.
For example, if you entered a display name of ARSystem and an email address of
arsystem@bmc.com, the From: line would be:
From: ARSystem [arsystem@bmc.com]
This option is not used with MAPI.
Reply To Address — Specify an email address where replies to your outgoing emails
will be sent, or accept the default server user email address already in this field.
This option is not used with MAPI.
Organization — If your email client displays your organization's name, enter the
name of the organization or company.
Delete Outgoing Notification Messages — To have workflow-generated notification
messages deleted from the AR System Email Messages form after they have been
sent from this mailbox, select Yes.
To save workflow-generated messages in the AR System Email Messages form, or if
you are going to use email templates to modify records, select No.
System administrators or other users with the appropriate permissions must delete
manual messages.
2. Specify Default Addressing for notifications and escalations:
Default To — Enter all email addresses that should receive outgoing messages from
this mailbox if no other email address is specified in the message.
Default CC — Enter all email addresses that should receive copies of outgoing
messages from this mailbox if no other email address is specified in the message.
Default BCC — Enter all email addresses that should receive blind copies of outgoing
messages from this mailbox if no other email address is specified in the message.
3. Specify Default Templates for notifications and escalations:
Header Template — Enter the name of the template to use for the message header if
no other header template is specified.
Footer Template — Enter name of the template to use for the message footer if no
other footer template is specified.
Status Template — Enter name of the template to use for the status if no other status
template is specified.
Result Template — Enter the name of the template to use for the result if no other
result template is specified.
4. Click Save.
For more information about notifications and escalations, see Defining a workflow to send email
notifications (see page 1449).
For specific troubleshooting issues, see Troubleshooting Email Engine (see page 4523).
For information about the email engine properties in the centralized configuration forms, see
Configuration settings C-D (see page 1166).
Note
When you modify entries in the AR System Configuration Generic UI form, the changes
are effective in 30 seconds (the default value for the com.bmc.arsys.emaildaemon.
configurationcheckinterval setting). You can modify the value for this setting from the
EmailDaemon.properties (see page 641) file.
The following topics provide information about the various settings for Email Engine:
Related topics
EmailDaemon.properties file
Tip
The term email daemon is frequently used when discussing the internal components of
the Email Engine. For example, "email daemon" is used to describe background
processes launched at start-time, email "handlers," the use of various threads to carry out
different tasks like sending and mails, parsing instructions, and so on. In UNIX, these
background processes are usually called "daemons," whereas for Windows they are
called "services." Following the UNIX convention, the file you use to set parameters for
the Email Engine is called EmailDaemon.properties. For the most part, the Email Engine
as synonymous with the email daemon.
When the Email Engine is installed, the EmailDaemon.properties file is created in the Email Engine
installation directory and is populated with the name of your organization's email server, user
name, and password. The main purpose of the EmailDaemon.properties file is to identify the AR
System server your Email Engine communicates with.
Note
BMC recommends that you use the AR System Configuration Generic UI form to
modify the centralized configuration settings. Do not use the EmailDaemon.
properties file to modify the configuration settings on the AR System Configuration
Generic UI form. For more information on the email engine centralized
configuration settings, see Configuration settings C-D (see page 1166).
For the settings which are not centralized, you should use the EmailDaemon.
properties file to modify these settings.
To use the EmailDaemon.properties file, see Settings in the EmailDaemon.properties file (see
page 641).
To update the value of one property at a time, open a command prompt, navigate to the
Email Engine installation directory, and execute the following command:
For Windows:
For UNIX:
Note
To use this command, you must properly set the library path for all UNIX platforms.
Parameter Description
-s Server where the email forms (and the configuration information) are located.
-u User name
-p AR System Application Service password. The Email Engine requires the same password that is supplied on the
Connection Settings tab of the AR System Administration: Server Information form. To avoid authentication failures,
the application password must not exceed 20 characters.
-t TCP port for the server to which the Email Engine should connect.
-r RPC number of the server to which the Email Engine should be connected. Use this parameter to connect to a
private server. This can enhance performance if you expect a high volume of mail.
-a Authentication
-d Directory where the EmailDaemon.properties file is located. If this parameter is not supplied, the system assumes
that this file is stored in the same directory as the emaildaemon.jar file.
-i Time interval (in minutes) to use when checking the server for configuration updates (modifications to records in the
Email Mailbox Configuration form). The default is 30 minutes.
-e Encrypts the given string and returns the value to the command line.
-m Monitor module interval (in minutes) to wait before trying to start the Email Engine again. The default is 30 minutes.
When the AR System server is not available, it tries to restart the system for every 30 minutes by default.
-o (For 32-bit JVM only) MAPI sent folder where sent mail should be stored.
Note
Changing property values does not affect the current instance of the email engine. To use
the updated property values, you must restart the email engine service manually. When
using EmailStart.bat or emaild.sh to restart the service, make sure to remove all the
parameters you used to update the property values.
The following table lists the properties and their permissible values that you can specify in
EmailDaemon.properties to adjust the performance of the email engine. After adding or altering
these settings, you must stop and restart the email engine for the changes to take effect.
For specific troubleshooting issues, see Troubleshooting BMC Remedy Email Engine (see page
4523) and its subtopics.
Note
BMC recommends that you use the AR System Configuration Generic UI form to
modify the centralized configuration settings. Do not use the EmailDaemon.
properties file to modify the configuration settings on the AR System Configuration
Generic UI form. For more information on the email engine centralized
configuration settings, see Configuration settings C-D (see page 1166).
For the settings which are not centralized, you should use the EmailDaemon.
properties file to modify these settings.
Performance and configuration settings for the BMC Remedy Email Engine
com.bmc.arsys.emaildaemon. Yes Specifies the date and time format Incoming All
ARDATE that the BMC Remedy Email Supported
Engine uses for parsing date and
time strings given in the incoming
mails. MMMMM dd, yyyy HH:mm:
ss z is equivalent to December 21,
2009 12:08:56 PDT.
Yes Incoming
com.bmc.arsys.emaildaemon. Yes This setting lets you specify the Incoming All
ARTIMEONLY time format used by BMC Remedy Supported
Email Engine for parsing time
strings given in incoming mails.
HH:mm:ss z is equivalent to 12:08:
56 PDT.
com.bmc.arsys.emaildaemon. Yes Specifies the log level for email Incoming All
ARSystemHandler.level engine based on which the logs and Supported
are saved in the AR System Email Outgoing
Error Logs form.
Valid values:
Off (Default)
Severe
Warning
Info
Config
Fine
Finer
Finest
com.bmc.arsys.emaildaemon. Yes Specifies the number of entries to Default value: 100 Outgoing All
ChunkSize return when the BMC Remedy Supported
Note: The maximum
Email Engine makes a call to the
value is also 100.
AR System server.
com.bmc.arsys.emaildaemon. Yes Specifies the amount of time in Default value: 1 Incoming All
Exchange-Wait-Time milliseconds for which the BMC supported
Remedy Email Engine waits
before processing the next
incoming message, when there
are more messages residing on
the Exchange Server.
com.bmc.arsys.emaildaemon. Yes Specifies the default number of Default value: 100 Incoming All
IncomingConnectionRecycleSize email messages the email engine Supported
receives before the connection is
closed and reopened. In the 5.1
and 5.1.1 releases of the email
engine, the connection with the
mail server was closed only after
reading all incoming messages.
Consequently, if the email engine
crashed or hung before the
connection was closed, it was
com.bmc.arsys.emaildaemon. Yes Specifies the message queue size Default value: 100 Incoming All
IncomingMessagesQueueSize (number of emails). The Receiver Supported
module writes messages to the
queue, and the Execution module
reads messages from this queue
to parse and execute. The
Receiver module still writes
messages to the server in AR
System Email Messages form, but
the Execution module reads the
message from the message
queue instead of from the server.
This reduces the traffic to the AR
System server and improves the
performance.
com.bmc.arsys.emaildaemon. Yes Specifies the log level for email Incoming All
level engine based on which the logs and Supported
are generated in the email.log file. Outgoing
Valid values:
Off
Severe (Default)
Warning
Info
Config
Fine
Finer
Finest
Yes
MaxAttachSizeFileExtensions.
Email messages with attachments
that exceed this limit are logged to
the AR System Email Error Logs
form. Optionally, you can create
workflow for this form to process
such messages separately.
com.bmc.arsys.emaildaemon. Yes Specifies the interval in minutes Default value: 30 Incoming All
Monitor between checks to see if all the minutes and Supported
threads are functioning properly. Outgoing
com.bmc.arsys.emaildaemon. Yes Specifies the number of sender Permissible range Outgoing All
NumberOfSenderThreads threads that the email daemon of values: 1 through Supported
uses for each outgoing mailbox. 20 Default value: 4
The optimum number of threads
depends on many factors
including the number of
mailboxes, the hardware
configuration, and so on.
com.bmc.arsys.emaildaemon. No Specifies the size of the queue Default value: 100 Outgoing All
OutgoingMessagesQueueSize that the email daemon maintains Supported
for outgoing messages. The
optimum number of message
queue size to be specified
depends on the load on the email
daemon.
com.bmc.arsys.emaildaemon. No Specifies the port number for Default value: 1100 Incoming All
RMIPORT = 1100 remote method invocation (RMI). and Supported
This feature is used with the Outgoing
EmailAdminAgent.jar file to stop,
suspend, resume, or change
logging level of the email engine
at runtime.
com.bmc.arsys.emaildaemon. Yes Specifies the number of security Default value: 20 Incoming All
securityCacheSize keys to be stored in the cache. If and Supported
the value of this property is set to Outgoing
15, the cache already contains 15
security keys, and another key is
to be added, then the oldest key is
removed to accommodate the
newest one.
com.bmc.arsys.emaildaemon. Yes Specifies the number of outgoing Default value: 100 Outgoing All
SendEmailSetSize emails to query at a time. Supported
40000 messages — 30
seconds
70000 messages — 60
seconds
100000 messages — 90
seconds
These settings can work
correctly with the maximum
permissible number (20) of
Sender threads. However,
BMC recommends using a
value that is optimum for
your configuration.
Note:SMTPTimeoutPeriod is
dependent on SMTPTimeout ; it
works only when SMTPTimeout is
set to true.
40000 messages — 30
seconds
70000 messages — 60
seconds
100000 messages — 90
seconds
These settings can work
correctly with the maximum
permissible number (20) of
Sender threads. However,
BMC recommends using a
value that is optimum for
your configuration.
com.bmc.arsys.emaildaemon. Yes Specifies the number of email Default value: 20 Incoming All
templateCacheSize templates to be stored in the Supported
cache to improve the
performance. If the value of this
property is set to 15, the cache
already contains 15 templates,
and another template is to be
added, then the oldest template is
removed to accommodate the
newest one.
com.bmc.arsys.emaildaemon. Yes Specifies the number of users Default value: 5000 Outgoing All
UserChunkSize (records from the User form) to Supported
retrieve from the AR System
server at one time. This setting
can be used to tune the email
engine's performance.
com.bmc.arsys.emaildaemon. Yes Specifies the email address of the Default value is set Incoming All
AdminAddresses administrator. If a database to the administrator Supported
transaction fails while storing an address specified
incoming message, the email during installation.
engine forwards the original mail
to this email address, so that it is
retained. An example of a
transaction failure could be when
the database is full and cannot
save anymore incoming email
messages. You can specify
multiple addresses separated by
commas.
MODIFY_KEY by allowing If
configuration of special characters ModifyKeyCharacter
to @@ by using not configured then
ModifyKeyCharacter parameter. default value is ##.
In EmailDaemon.properties, set
the value of com.bmc.arsys.
emaildaemon.
ModifyKeyCharacter=@@.
Related topic
Debugging options for the BMC Remedy Email Engine (see page 4212)
To send and receive email, you must create and configure outgoing and incoming mailboxes. You
can configure them during or after the product installation.
To set up advanced mailbox options (such as default values, parsing, and mailbox security), you
can update the configuration as discussed in this section.
Configuration information is stored in forms on the AR System database. For more information
about Email Engine forms, see Email Engine forms. (see page 1565)
You can also link outgoing mailboxes to incoming mailboxes, to send the results of any actions
from a specific incoming mailbox to a specific outgoing mailbox.
Note
To use notifications with email, you must designate one mailbox as your default
notification mailbox. For more information, see Sending notifications (see page 1447).
ARSystemServer is the name of the AR System server associated with the Email Engine.
folderName is the name of the folder that stores the outgoing notification emails. For
example, enter Sent Items to save messages to your Sent Items folder in Microsoft Outlook.
Note
Changes to the Status field are not reflected automatically. If you have changed the value
of this field, you must restart the email engine for the change to take effect.
To shorten the default time interval in the EmailDaemon.properties file, set the polling parameter.
For example, shorten the time to 5 minutes: ServerName.Interval = 5.
For more information about this property or the EmailDaemon.properties file, see Settings in the
EmailDaemon.properties file (see page 641).
Note
If your Email Engine requires a security key to authenticate incoming email, skip this
section and see Securing incoming and outgoing email. (see page 689)
Use the following procedures to verify that you can send email from your outgoing mailbox and
receive email in your incoming mailbox . If you complete the steps successfully, your outgoing and
incoming mailboxes are configured correctly. If you are unable to complete the steps, see
Before you perform the test, obtain the correct email address for your email account or profile from
your email server administrator.
1. In the Basic Configuration tab of the outgoing mailbox you are testing, set the Polling Interval
to one minute, to view the test results promptly.
2. In a browser, open the AR System Email Messages form in New mode.
3. Create a message as follows, and click Send:
a. Mailbox Name — Select the name of the outgoing mailbox to test.
b. Message Type — Select Outgoing.
c. Message Tab — Enter email addresses for the From: and Reply To: fields, a subject
line, and the body content.
Note
Select an email address that you can access with a third-party utility, such
as Microsoft Outlook.
1. In the Basic Configuration tab of the incoming mailbox you are testing, set the Polling Interval
to one minute, to view the test results promptly.
2.
BMC Remedy Action Request System 9.1 Page 656 of 4703
BMC Software Confidential. BladeLogic Confidential.
Incoming mailboxes support the MAPI, POP3, IMAP4, and MBOX mail protocols.
The following topics provide information about how to configure the basic and advanced properties
of incoming mailboxes:
Note
Review the information about advanced configuration settings in Creating and using email
templates (see page 1524).
1. In the Advanced Configuration tab of the AR System Email Mailbox Configuration form,
select an outgoing mailbox from the Associated Mailbox Name list to reply to incoming
emails that require responses, such as queries.
2. In the Action Configuration section, specify:
Email Action — To enable the Email Engine to detect and process instructions
included in an incoming email message, select Parse. If you use templates to perform
Submit, Modify, or Query actions, you must select Parse.
For more information about templates and parsing, see Using label-value pairs in
templates (see page 1530) and Types of email templates (see page 1525).
Use Original Template Format
(enabled for upgrades from BMC Remedy Mail Server) — To enable original parsing
system processing, select Yes.
Original parsing ignores special HTML fields, XML formats, and data entered in an
invalid format, such as a character string in a number field. If you use this option, the
Email Engine displays an error message when it encounters these types of fields or
formats. To use normal parsing, select No.
Note
If you select No, make sure that multiple lines in emails are encapsulated
with the [$$ and $$] multiple-line delimiters.
Reply with Result — To enable the Email Engine to return the results of an action in
an email, select Yes.
This option allows the email sender to know if the incoming email succeeded or
failed. For more information, see Sharing a database without using a server group
(see page ).
Reply with Entry — To return the complete entry of a submit or modify action, select
Yes.
Enable Modify Actions — To enable the Email Engine to modify existing entries,
select Yes.
Default Workflow Form — Enter the name of the default form on which the Email
Engine executes instructions such as queries, form-entry modifications, and form
submittals, from the incoming email message.
Note
If you define a default workflow form, incoming templates do not require the
Form (or Schema) label. For more information, see Form label (see page
1531).
Force Default Workflow Form — To confine all instructions from the incoming email
message to the form that you specified in the Default Workflow Form field, select Yes
.
Note
3. In the Incoming Security Configuration section, specify the level of security to be applied to
email messages to this mailbox. This information is used to determine which AR System
user information to apply when executing instructions parsed from an incoming email.
Depending on the level of security that you want, apply one of the following security options:
Use Security Key — Select Yes to enable a security key for incoming email.
The information is added to the Email Security form, so you do not have to supply the
user name and password in the incoming email. If you use this option, you must
create and configure the security key. See Configuring incoming mailbox security
(see page ).
If you select No, the security key will be disabled for incoming email containing the
modify action. In case of multiple recipients, the outgoing email message for this
modify action will not be sent.
Use Supplied User Information — To use AR System server login information from
the incoming email message to execute instructions in the incoming message, such
as instructions to modify requests or submit queries, select Yes.
For more information about login syntax, see Login, Password, and TCP Port labels
(see page 1532).
Use Email From Address — To use the sender's email address as a form of
authentication, select Yes.
The Email Engine displays an error message if the sender's email address is different
from the email address stored in the AR System User form.
Note
4. Click Save.
To start and stop the Email Engine manually on Windows from the Services window (see
page 661)
To start and stop the Email Engine manually on Windows from the command line (see page
662)
To start and stop the Email Engine manually on UNIX (see page 662)
To start and stop the Email Engine manually on Windows from the Services
window
If the Email Engine fails to start automatically after you start the server, use the instructions given
below to start it manually.
1. Go to Start > Settings > Control Panel > Administrative Tools > Services to open the
Services window.
2. Select the BMC Remedy Email Engine service.
3. Right-click the service and select Start or Stop. The email service will start or stop
immediately.
To start and stop the Email Engine manually on Windows from the command line
1. Enter the following command to change directories to the Email Engine installation directory:
cd <emailEngineInstallDirectory>
Note
MAPI mailbox users only: If you did not configure your MAPI mailbox during
installation, change the Email Engine login information in the Services window to
your Windows user account.
1. Enter the following command to change directories to the Email Engine installation directory:
cd <emailEngineInstallDirectory>
After you enter this command, the AR Monitor stops the Email Engine service and
immediately restarts it automatically.
If the emaild.sh command fails to stop the Email Engine, comment out the following line in
the armonitor.conf file, then reissue the emaild.sh command:
/opt/bmc/ARSystem/AREmail/emaild.sh start
com.bmc.arsys.emaildaemon.companionservername
com.bmc.arsys.emaildaemon.RMIPORT
companionServerName:RMIPort
where,
RMIPort specifies the port number for remote method invocation (RMI)
1. Enter the following URL to open the BMC Remedy Mid Tier Configuration Tool:
http://<webServerThatSupportsFlashboards>/arsys/shared/config/config.jsp
Note
To configure BMC Remedy AR System to view flashboards using the default URL
path
1. In a browser, from the server that contains the flashboard, open the BMC Remedy AR
System Administration Console, and click System > General > Server Information.
The BMC Remedy AR System Administration: Server Information form appears.
2. Click the Advanced tab.
3.
BMC Remedy Action Request System 9.1 Page 664 of 4703
BMC Software Confidential. BladeLogic Confidential.
3. In the Default Web Path field, change the default URL path to:
http://<hostName>:port/arsys
where hostName is the location where you installed the BMC Remedy Mid Tier and port is
the port number. The port number is optional.
For example, if your host name is abc, and your port number is 230 (optional), your default
URL path would be: http://abc:230/arsys
Note
Refresh your flashboard to view the most recent historical, summary, and real-time
data.
server.sh start
or
server.sh stop
If you are running two Flashboards servers on the same computer and you enter the server.
sh stop command, both servers will stop. To stop only one Flashboards server, include the
port number in the command as given below:
To make sure that flashboards work from a headless UNIX environment, you must set Java VM
options on the servlet engine that controls BMC Remedy Mid Tier.
1. In the catalina.sh file, add the following options for JAVA_OPTS near the top of the file:
-Djava.awt.headless=true
-Dsun.java2d.fontpath= sdkInstallDirectory/jre/lib/fonts
Example
JAVA_OPTS="-Djava.awt.headless=true -Dsun.java2d.fontpath=/usr/jdk1.5.0_10
/jre/lib/fonts"
Use a similar procedure to add VM options to other servlet engines. See your respective server
vendor's documentation for information about configuring Java options.
BMC Remedy Flashboards uses Adobe Flash technology. In leveraging the Adobe Flash
technology, the new BMC Remedy Flashboards product provides:
Note
Because of the new client-side interactions, certain workflows (such as chart, color, and
legend changes) no longer require the mid tier to process them as is required for the
older image-based flashboard. Therefore, if you change a flashboard's definition on the
BMC Remedy AR System server (for example, to use the Adobe Flash technology), and
the user interaction with the BMC Remedy Flashboards does not require the mid tier to
perform any processing, the user will not see the new flashboard definition changes
immediately. When the user performs an action that requires mid-tier processing (such as
a browser refresh), the new Flashboard definition is applied, and the user will see the
changes.
The following topics provide more information about configuring flashboard properties:
Default format — The out-of-the-box format that uses Adobe Flash technology that enable
users to interact with the flashboard by performing actions such as zooming, viewing in full
screen mode, changing the chart type, changing labels.
New look and feel with 7.1.00 and 7.0.01 color scheme — Displays the flashboard with
interactive features, but uses the previous version's color scheme. (To use this format, set
the flashdisplay parameter to 0 as described in Parameters for display in prior version (see
page 2607).)
Color and format for 7.1.00 and 7.0.01 ("image-based") — Uses the previous version's color
scheme and look and feel. (To use this format, set the flashdisplay and defaultlookandfeel
parameters to 0 as described in Parameters for display in prior version (see page 2607).)
The "Formats for flashboards" (see page 667) figure shows the different formats.
Note
The following table lists the available properties under the Properties tab and the flashboard format
supported for each property.
Flashboard properties
Parameter Powered by Adobe Flash Image-based
Axis
Show X Axis + + +
Show Y Axis + + +
Wall 3D Color +
X 3D Offset +
Y 3D Offset +
Chart
Customizable Parameters +
Display 3D +
Display Table + + +
Foreground Color + +
Foreground Transparency + +
Graph Background + +
Transparency
Outline Color + +
Show Values + +
Time Format + + +
Title Alignment +
Title Color + +
Title Font + +
Title Placement +
Legend
Background Color + + +
Item Color + +
Item Font + +
Outline Color + +
Outline Width + +
Title Alignment + +
Title Color + +
Title Font + +
Meter
Alert Color + + +
Needle Color + + +
Normal Color + + +
Type + + +
Warning Color + + +
Note
If you have flashboards created before version 7.0.01, you can use the old
color palette to keep your old color. To keep the old palette, change the
Advanced Color Palette value to 0.
On/off properties — 0 indicates that the property is turned off, and 1 indicates that the
property is turned on. For example, if the Show X Axis property is set to 1, the X axis will
appear in the flashboard.
Offset properties — The number of pixels that the image is offset.
Property Description
Show X Option to display the X axis line. If the value is set to 0, the axis line is invisible. If the value is set to 1, the axis line is
Axis line visible. By default, the value is set to 0.
Show Y Option to display the Y axis line If the value is set to 0, the axis line is invisible. If the value is set to 1, the axis line is
Axis line visible. By default, the value is set to 0.
Show Option to display labels above each horizontal bar of the capacity flashboard. If the value is set to 0, the vertical axis
Label labels are displayed outside chart at the default position. If the value is set to 1, the vertical axis labels are displayed
Inside inside the chart above each bar.
Note
This property is applicable for horizontal capacity flashboard only and it is ignored for other flashboards.
Note
The properties mentioned in the table are available for any flashboard type.
Show Legend
Full Screen
Options
Embedded Flashboard
However, you can right-click on the embedded flashboard to open a context menu and view these
options.
Note
Embedded flashboards do not support zoom functionality. When you view the embedded
flashboard using BMC Remedy Mid Tier 7.6 or earlier, it appears like a regular flashboard
with borders and controls.
To enable the Embedded property for flashboard, in BMC Remedy Developer Studio Properties
window, under the Chart section, set the flashboard property Embedded to 1. By default, the value
is set to 0.
Setting Description
flashboards. Defines which default format to use when displaying flashboards. The options are:
showgraphinflash=[0 or 1]
0 — Use image-based format.
1 — Use Adobe Flash format.
flashboards. The minimum flashboard width below which a flashboard is rendered by using image-based
min_flex_width=260 technology. The default is 260.
flashboards. The minimum flashboard height below which a flashboard is rendered by using image-based
min_flex_height=200 technology. The default is 200.
Example
flashboards.maxDataPoints=4000
Note
The server.config file allows you to configure only the Flashboards server name, port, and
password. To configure the Flashboards service startup properties, the refresh interval
properties, the logging options, and other properties, you must use the Flashboards
Configuration form.
The following table describes the fields in the Flashboard Configuration form:
Field Description
Field Description
Wait for The interval (in seconds) for which the BMC Remedy Flashboard server waits for the BMC Remedy AR System
Server to server to start up. The default value is 300 seconds.
Start
Server The number of times the Flashboards server tries to connect to the BMC Remedy AR System server. The
Reconnect Flashboards server waits for the BMC Remedy AR System server to start up and tries to connect. If the connection
Attempts fails, the Flashboards server continues trying based on number of attempts value. The default value is 10.
Intervals
Flashboard The interval (in seconds) after which the BMC Remedy Flashboard server checks the changes to Flashboards
Definition definitions. The default value is 1,800 seconds.
Refresh
Interval
Config The interval (in seconds) after which the BMC Remedy Flashboard server checks for the changes to the server.conf
File Check file. The default value is 60 seconds.
Interval
Logging Properties
Log File Specifies the log file name. The default value is arfbserver.log.
Name
Maximum The maximum size (in kilobytes) for the log file. The default value is 100 KB.
File Size
Maximum The maximum number of backup (.bak) log files to be allowed when the log file reaches the Maximum File Size
Backups value and a new log file is created. The default value is 10.
Log Format The log output is generated using Java log4j pattern layout.
The default value is <%t> <%c> <%d> <%l> <%m> %n. For more information about the log4j pattern layout, see
Pattern layout.
Others
Field Description
RMI Specifies the value of the Remote Method Invocation (RMI) port for the selected BMC Remedy Flashboards
Registry server.
Port
For example, you might want to run multiple BMC Remedy Flashboards servers if you run multiple
BMC Remedy AR System instances when each instance is connected to a different database that
uses a different language.
1. Change the value of the Remote Method Invocation (RMI) port using the Flashboard Server
Configuration form to any port that is not in use. See AR System Administration -
Flashboard Server Configuration (see page 673).
Example
RMIRegistryPort=2099
The port numbers must correspond to unused ports. See AR System Administration -
Flashboard Server Configuration (see page 673).
Note
If you add a removed server back to the servers list later, the definitions are
retrieved the first time you log on to the server.
After you log on to BMC Remedy Migrator and open the Accounts dialog box, either a check mark
or an X appears next to each server name.
The following steps show how to manage your server accounts as an administrator.
1. Select Tools > Accounts to open the Account dialog box, which shows the servers that have
been added.
If the Accounts menu selection is unavailable, you must provide login information before
proceeding.
Accounts dialog box
(Click the image to expand it.)
2. In the Account dialog box, perform any of the tasks outlined in the following table:
Adding and modifying server information
To Do this
Add or modify the Click User Manager. Click Add to add a new user, or select a name in the Users list and click
Users list Modify to modify the user account.
Note
For each user to have their own server list, you must include a specific home directory
for that user in the directory path.
View port columns Select Advanced Server Properties. Select a server and click a column and type a port number
for firewall support or private server number:
AR TCP Port represents the port number of the AR System server.
AR RPC # represents the program number of the specified AR System server. This
number allows you to connect to a private server behind the firewall.
Warning
You can set different TCP ports for each server, but if the ARTCPPORT
environment variable is defined, BMC Remedy Migrator uses the port defined by
the variable for all servers while ignoring the settings in the Accounts dialog box.
3. Click OK.
The new login information is not applied to your current session. You must log on again
before your changes take effect, or proceed to one of the following actions:
If the server you added needs a license, or does not yet exist in the Server Licenses
dialog box, see License overview (see page 123) for licensing information.
If the server you added has already been licensed, and has been added to the Server
Licenses dialog box, continue to Removing an AR System server and its BMC
Remedy Migrator license from view (see page 676).
One AR System server license is issued for each AR System server you want to work with using
BMC Remedy Migrator. There is no limit to the number of clients on which you can install BMC
Remedy Migrator.
1. In BMC Remedy Migrator, select Tools > Licenses to open the Server Licenses dialog box.
Server Licenses dialog box in BMC Remedy Migrator
(Click the image to expand it.)
2. Click Add.
3.
BMC Remedy Action Request System 9.1 Page 678 of 4703
BMC Software Confidential. BladeLogic Confidential.
For information about removing, importing, purging, or viewing the license, see Adding or
transferring BMC Remedy Migrator license to an AR System server (see page ).
Each AR System server must have its own BMC Remedy Migrator license. Information about
server licenses is stored in the AR System Licenses form, which can be accessed from BMC
Remedy Mid Tier.
If you transfer an AR System server license from one server to another, you must remove the BMC
Remedy Migrator license from view in the old server, and add it to the new server.
For information about removing a deleted AR System server from view in BMC Remedy Migrator,
see Removing an AR System server and its BMC Remedy Migrator license from view (see page
). For information about adding a licensed server in BMC Remedy Migrator, see When you
have logged into BMC Remedy Migrator, you can add a licensed AR System server (see page 678)
.
1. If you created a shortcut on your desktop during installation, double-click the BMC Remedy
Migrator icon. Or, select BMC Remedy Migrator from the Start menu.
2. Obtain a license from BMC Customer Support.
You need a license for the AR System server if you do not already have one. For
information about contacting BMC Customer Support, see Support information (see page
4621).
Note
If you need to add a server or a license, the Login dialog box appears for the first session.
After the first session, if BMC Remedy Migrator finds the correct user information, the
Select Server dialog box appears instead of the Login dialog box.
Note
You must obtain a separate BMC Remedy Migrator license key for each AR
System server that you want to access with BMC Remedy Migrator. BMC
Remedy Migrator does not function on a server that is not licensed. Also,
you must enable or add BMC Remedy Migrator on a licensed AR System
server to use the server. For information about licensing AR System
servers, see License overview (see page 123).
Important
The Max Back-up Index value defines the maximum number of backup (.bak) log
files that can be created when the log file reaches the Max Log File Size value and
a new log file is created.
If you modify the Number of Threads value, you must restart the server to
apply changes.
AE-RPC-Socket setting is now obsolete and cannot be modified using the ar.cfg
file or AR System Configuration Generic UI form.
You cannot modify the Assignment Engine logging settings using the ar.cfg file.
The following Assignment Engine settings are modified by using the AR System Configuration
Generic UI form. Do not use the ar.cfg file to modify the following configuration settings:
AE-Trace
AE-Trace-File
AE-Log
AE-Log-File
AE-Worker-Thread
For more information, see Assignment Engine logs (see page 4186).
To check whether the Assignment Engine logging is enabled, verify the value of the com.bmc.
arsys.assignment setting. For more information, see Configuration settings A-B (see page 1142).
1. After the first level of authentication, the user's browser sends a re-authentication request to
BMC Remedy Mid Tier URL.
2. BMC Remedy Single Sign-On (BMC Remedy SSO) agent redirects the user to BMC
Remedy SSO server URL for reauthentication. For SAML authentication, BMC Remedy
SSO redirects the user to the SAML IdP for reauthentication. If the SAML IdP supports the
ForceAuthn feature on an authentication request, the IdP requests the user for
reauthentication.
Note
3. For BMC Remedy AR System authentication, the BMC Remedy SSO server prompts the
user to confirm the password. For SAML authentication, the IdP prompts the user for both
username and password. If the authentication is successful, the IdP redirects the user back
to the BMC Remedy SSO server with a SAML response. The BMC Remedy SSO server
checks if the user in the SAML response is the same user who is currently logged in to BMC
Remedy SSO. If they are not the same users, the reauthentication fails.
4. If the reauthentication process is successful, the BMC Remedy SSO server generates a
reauthentication token and redirects the user to the BMC Remedy Mid Tier URL. Note that
the reauthentication token is valid only for a short period and is specific only to the
reauthentication process. It cannot be used for the usual authentication process.
5. The BMC Remedy SSO agent retrieves the reauthentication token and passes it on to BMC
Remedy Mid Tier servlet.
6. BMC Remedy Mid Tier servlet retrieves the reauthentication token and passes it on to the
BMC Remedy AR System as an authentication string.
7. BMC Remedy AR System verifies the user's credential, user name and reauthentication
token, through BMC Remedy SSO AREA plugin.
8. The BMC Remedy SSO AREA plugin verifies the reauthentication token through an API call
to the BMC Remedy SSO server.
Note
b.
BMC Remedy Action Request System 9.1 Page 684 of 4703
BMC Software Confidential. BladeLogic Confidential.
b. In the email client, open the Properties dialog for your IMAP account and select the
new cert to use for signing and encrypting email messages.
Two users who have properly configured the certs on their mail client must then
exchange certificates so that their communications can be secured.
c. Send email messages that are signed, but not encrypted, between the two users.
A signed email message
(Click the image to expand it.)
Outlook Express provides the facility to sign and encrypt messages. The email client
should automatically notice the signed message and store the certificate so that it can
be used to encrypt further messages exchanged between the users.
1. In Microsoft Exchange System Manager, expand Servers > serverName > Protocols >
IMAP4, and select Default IMAP4 Virtual Console.
The same procedure applies to POP3 and SMTP.
2. On the Default IMAP4 Virtual Server Properties dialog, open the Access tab, and click
Certificate.
3. On the Web Server Certificate Wizard:
a. On the first page, click Next.
b. On the Server Certificate page, select Create a new certificate if you have not yet
created an SSL certificate for your web server, and click Next.
If you already have an SSL certificate for your web server, select Assign an existing
certificate, and click Next. A list of the existing SSL certificates installed on your web
server appears; select the appropriate certificate and generate a CA from the CSR.
c. On the Name and Security Settings page, enter a unique name for the certificate,
select 1024 as the bit length, and click Next.
If you plan to install the trial certificate from VeriSign, do not select the Server Gated
Cryptography (SGC) certificate check box. For more information about SGC, see
your CA documentation on SSL algorithms.
d. On the Organization Information page, select an Organization and the Organizational
unit, and click Next.
e.
BMC Remedy Action Request System 9.1 Page 685 of 4703
BMC Software Confidential. BladeLogic Confidential.
e. On the Your Site's Common Name page, enter the common name for your site.
You can access the Microsoft Exchange server with this common name. This name
will also be used to configure SSL on Outlook Express.
Do not enter an IP address as the common name, otherwise the CA would create the
SSL certificate successfully.
f. On the Geographical Information page, select the appropriate Country/Region, State
/province, and City/locality, and click Next.
g. One the Certificate Request File Name page, enter the absolute path and file name
for the CSR (for example, certreq.txt ), and click Next.
Make sure that you provide a location that is easy to remember and access.
h. On the Request File Summary page, verify the information you provided so far, and
click Next if the information is accurate.
Otherwise, click Back to navigate to the appropriate pages and change the necessary
values.
i. On the final page, click Finish to complete the process and close the wizard.
Ensure that you do not select blank lines or spaces before Begin Certificate and after
End Certificate.
6. Save the file with the .cer extension, for example, web.cer.
1. In Microsoft Exchange System Manager, expand Servers > serverName > Protocols >
IMAP4, and select Default IMAP4 Virtual Console.
2. On Default IMAP4 Virtual Server Properties dialog, open the Access tab, and click the
Certificate.
3. On the Web Server Certificate Wizard:
a. On the first page, click Next.
b. On the Pending Certificate Request page, select Process the pending request and
install the certificate, and click Next.
c.
BMC Remedy Action Request System 9.1 Page 686 of 4703
3.
c. On the Process a Pending Request page, enter the absolute path and file name that
you provided when creating the CSR, and click Next.
1. In Microsoft Exchange System Manager, expand Servers > serverName > Protocols >
IMAP4, and select Default IMAP4 Virtual Console.
2. On the Default IMAP4 Virtual Server Properties dialog, open the Access tab, and click
Communication.
3. On the Security dialog, select Require secure channel, and click OK.
If you plan to install the trial certificate from VeriSign, do not select Require 128-bit
encryption.
1. To use IMAPS (IMAP over SSL) for Outlook Express, open a browser and navigate to
http://www.verisign.com/products-services/security-services/ssl/buy-ssl-certificates/free-trial
/test-root-ca/trialcainstall.html.
Follow the prompts on the screen and install the test root CA on the computer where you
want to configure Outlook Express.
When prompted to enter the IMAP server address, you must provide the "common name"
you entered while creating the CSR. If you provide any other value or an IP address, the
"CN does not match with passed value" warning appears.
2. To configure Email Engine to use SSL, import the test root CA certificate in keystore by
using following command:
Note
Find the appropriate keystore path before entering the command. Email Engine uses the
location where Oracle Java Runtime Environment (Oracle JRE) is installed as the
keystore path.
Note
1. From the UNIX command line or the Windows Command Prompt, change to the
Flashboards installation directory.
2. Enter the following commands:
For Microsoft Windows:
For UNIX:
Note
The Windows command uses semicolons, and the UNIX command uses colons.
For validation, incoming email messages use security keys, the user's login and password,
or the user's email address. As long as the email has one of these security mechanisms,
BMC Remedy Email Engine executes the appropriate action. You can configure BMC
Remedy Email Engine to use all three methods; however, if the email message requests a
modify action, only a security key can validate the user's request.
Outgoing email messages, which can include the results of query actions, use BMC
Remedy AR System access control for forms and fields. If a user does not have access to
the field or form being queried, the field and its contents are not included in the outgoing
email message.
The following topics provide instructions for creating security keys for incoming email, describe how
security is handled for outgoing email, and provide instructions for configuring BMC Remedy Email
Engine to allow modify actions:
Configuring BMC Remedy Email Engine for modify actions (see page 689)
Configuring BMC Remedy Email Engine for replying with results (see page 691)
Configuring incoming mailbox security (see page 691)
Configuring outgoing mailbox security (see page 692)
Note
The same mailbox name is not being used at two places. For example,
helpdesk@onbmc.com is being referred to from two different AR System servers.
1. In a browser, open the AR System Email Mailbox Configuration form in Search mode.
2.
BMC Remedy Action Request System 9.1 Page 689 of 4703
BMC Software Confidential. BladeLogic Confidential.
2. Search for and open the records for your incoming and outgoing mailboxes.
3. Make sure that you have an incoming mailbox and an outgoing mailbox associated with
each other.
4. Click the Advanced Configuration tab of the incoming mailbox to which you want the modify
instruction sent.
5. Set the Email Action field to Parse.
6. Set the Enable Modify Actions field to Yes.
7. Set the Use Security Key field according to your requirements. For more information, see
the Use Security Key information in Configuring advanced incoming mailbox properties (see
page ).
Note
If the Use Security Key value is set to Yes, you must provide a security key for
every user who sends modify instructions to BMC Remedy Email Engine.
Note
A user making modifications must have a write license unless that user is
the submitter or the Submitter Mode is set to Locked.
1. In a browser, open the AR System Email Mailbox Configuration form in Search mode.
2. Search for and open the records for your incoming and outgoing mailboxes.
3. Make sure that you have an incoming mailbox and an outgoing mailbox associated with
each other.
4. Click the Advanced Configuration tab of the outgoing mailbox.
5. (Recommended for testing purposes) Set the Delete Outgoing Notification Messages field to
No.
6. Save your changes.
7. Click the Advanced Configuration tab of the incoming mailbox from which you want the
modify instruction sent.
8. Set the following fields as indicated:
Email Action: Parse
Use Original Template Format: No
Reply With Result: Yes
Reply With Entry: Yes
Enable Modify Actions: No
Force Default Workflow Form: No
9. Set one of the following fields to Yes:
Use Security Key
Use Supplied User Information
Use Email From Address
10. Save your changes.
When mail arrives, BMC Remedy Email Engine validates the security key included in the incoming
email message against the stored information. If the key is valid, the Email Engine validates the
mailbox owner name in the form.
The email server uses the following criteria to define security for outgoing emails that contain query
results:
An email sent to only one user can contain only data that the user has permission to view in
the browser.
An email sent to more than one user can contain only data that the user with the most
restricted permissions can view in the browser.
For example, if an email is sent to both an administrator with full access permissions and to
a user with only Public access, only data allowed by Public access are included in the email.
If the system locks a record by using the row-level access feature, the record are included
only if all email recipients have access to it.
If an email that includes query results is sent to a non-registered BMC Remedy AR System
user, the form and fields queried must have Public access, and the AR System server must
be configured to allow guest users.
To view and modify your AR System server's encryption configuration, use the Encryption tab in
the AR System Administration: Server Information form:
Note
Encryption tab
Note
The following topics provide detailed information about configuring encryption security:
DES 56-bit Data Encryption Standard (DES) using Cipher Block Chaining (CBC)
mode. Encrypt-Data-
Encryption-
Algorithm: 1
Encrypt-Data-
Encryption-
Algorithm: 8
Encrypt-Data-
Encryption-
Algorithm: 9
Note
The available algorithms depend on the type of encryption installed and the setting
of the FIPS Enabled option.
6.
BMC Remedy Action Request System 9.1 Page 695 of 4703
BMC Software Confidential. BladeLogic Confidential.
6. (Optional) In the Key Expire Interval field, specify a different life span for the key in seconds.
The default is 2700 seconds (45 minutes). At the end of the specified time, the key expires,
and a new key exchange occurs.
Note
Generating keys more frequently provides higher security at some marginal impact
to performance.
Encrypt-Symmetric-Data-Key-Expire: 2700
7. Click Apply.
8. Restart the server.
9. Relog on to any clients that are connected to the server.
If the server's security policy is changed while a client is running, the client connections using the
old policy automatically perform a key exchange to create keys that correspond to the new policy.
RSA 1024 1024-bit RSA key. Default for BMC Remedy Encryption Performance
Security. Encrypt-Public-Key-
Algorithm: 5
RSA 2048 2048-bit RSA key. Default for BMC Remedy Encryption Premium
Security. Encrypt-Public-Key-
Algorithm: 6
Note
The available algorithms depend on the type of encryption installed and the setting
of the FIPS Enabled option.
6. (Optional) In the Key Expire Interval field, specify a different life span for the key in seconds.
The default is 86400 seconds (24 hours). At the end of the specified time, the key expires,
and the server generates a new key.
Note
Generating keys more frequently provides higher security at some marginal impact
to performance.
*Encrypt-Public-Key-Expire: 86400*
7. Click Apply.
8. Restart the server.
9. Relog on to any clients that are connected to the server.
Activating encryption
The Security Policy value in the Encryption tab (see Encryption tab (see page 693)) determines
whether encryption is required to communicate with the server.
Activated Optional This is the default for BMC Remedy Encryption Performance Security and Encrypt-
BMC Remedy Encryption Premium Security FIPS noncompliance. Security-
Clients with and without encryption installed can communicate with the server. Policy: 0
Network traffic is encrypted only if the client supports the server encryption
configuration.
Otherwise, network traffic is exchanged in plain text.
Activated Required This is the default for BMC Remedy Encryption Performance Security and Encrypt-
BMC Remedy Encryption Premium Security FIPS compliance. Security-
Only clients with encryption installed can communicate with the server. Policy: 1
Note: The encryption level installed on the client (standard, BMC Remedy
Encryption Performance Encryption, or BMC Remedy Encryption Premium
Encryption) must be compatible with the encryption algorithms used by the
server.
Note
See Security policy impact on client-server communication for Security policy planning
information.
6. (Optional) In the Data Key Details area, change the defaults. See Configuring the data key
(see page 694).
7. (Optional) In the Public Key Details area, change the defaults. See Configuring the public
key (see page 696).
8. (Optional) Activate FIPS compliance. See Configuring the data key (see page 694).
9. Click Apply.
10. Restart the server.
11. Relog on to any clients that are connected to the server.
Deactivating encryption
To deactivate encryption, select the deactivation options according to the procedure in To activate
or deactivate encryption (see page 697).
Selected Disabled No Clients communicating with the server cannot communicate with
FIPS-compliant servers.
Cleared Optional, Required, No Clients communicating with the server cannot communicate with
or Disabled FIPS-compliant servers.
For an overview of FIPS, see FIPS encryption options in BMC Remedy ITSM Deployment
documentation.
Note
For Java-based clients such as BMC Remedy Developer Studio and the mid tier, the first
server that a client connects to determines whether the client is restricted to interacting
with FIPS-compliant or noncompliant servers. Logging out of the client does not terminate
the FIPS restriction. Instead, the client must be restarted.
Transition tips
If you are in the process of converting to a FIPS-compliant environment, consider these tips:
Do not select the FIPS Enabled option for a server until all clients that must communicate
with that server have the appropriate BMC Remedy Encryption Performance Security or
BMC Remedy Encryption Premium Security 8.0.00 or later installed.
During the transition phase, set the Security Policy to Optional on all servers that have BMC
Remedy Encryption Performance Security or BMC Remedy Encryption Premium Security
8.0.00 or later installed so that they can communicate with clients that have not yet been
upgraded to 8.0.00 or later.
Be aware that when a server's Security Policy is set to Optional and a client cannot support
the encryption algorithm (such as AES) required by the server, communication between the
server and client is unencrypted.
1. Ensure that one of these products is installed on the appropriate BMC Remedy AR System
server and on any clients that will communicate with the server:
BMC Remedy Encryption Performance Security 8.0.00 or later
BMC Remedy Encryption Premium Security 8.0.00 or later
Note
You can also activate FIPS compliance while installing these products. See
Installing BMC Remedy Encryption Security in BMC Remedy ITSM
Deployment documentation.
Note
a.
BMC Remedy Action Request System 9.1 Page 700 of 4703
13.
Note
BMC supports only BMC Remedy Single Sign-On with BMC Remedy Action Request
System 9.1. Note that BMC Atrium Single Sign-On is not supported with BMC Remedy
Action Request System 9.1.
User credentials and authentication tokens are security sensitive data. Hence, you must configure
HTTPS to protect such data.
For standalone installations, configure HTTPS on the Tomcat server and for High Availability
installations configure HTTPS on the load balancer.
The following video provides information about configuring BMC Remedy Single Sign-On for
authentication.
Related topics
Integrating BMC Remedy Single Sign-On with other products (see page 833)
Configuring server settings for BMC Remedy SSO (see page 702)
BMC Remedy Single Sign-On agent supporting multiple servers (see page 121)
BMC Remedy Single Sign-On authentication (see page 112)
Basic parameters
Field Description
Cookie
Cookie The default cookie domain value is the network domain of the computer on which you are installing the server. The
Domain default cookie domain specifies the most restrictive access. This value is used to control cookie visibility between
servers within the domain.
This cookie domain must be the same for both BMC Remedy Single Sign-On server and its integrated application
server.
Session Settings
Max Time after which your session is logged out, even when you are active. When this value is selected, time constraints
Session are automatically enforced. The default is 24 hours.
Time The value for maximum session time is usually 4, 8, or 12 hours.
Log
Server Select the level of log details to be displayed from the drop-down list.
Log
For SAML authentication, if the Sign Request option is selected, the BMC Remedy SSO logs show WARN message
Level
with stack trace, otherwise the logs show DEBUG message and show stacktrace at TRACE level.
Cookie
Cookie The cookie name is automatically created at installation and is based on the timestamp. Timestamp is the time
Name the database is created during BMC Remedy Single Sign-On installation.
Back Channel
Field Description
Keystore The keystore file path along with the file name. If you are using PKCS12 keystores file, the file extension must be .
File p12.
If the keystore file is placed at <TOMCAT>/rsso/webapp/WEB-INF/classes folder, the value of this field can be the
name of the keystore file. Otherwise, use the absolute file path.
Keystore The keystore file password. The keypair and keystore passwords must be the same.
Password
Signing Key The alias name of the signing key in the keystore file.
Alias
Advanced parameters
Field Description
Cookie
Cookie The cookie name is automatically created at installation and is based on the timestamp. Timestamp is the time
Name the database is created during BMC Remedy Single Sign-On installation.
Signing The certificate used to sign a SAML request if Sign Request is selected.
Certificate
Related topics
Configuring BMC Remedy SSO for BMC Remedy AR System authentication (see page 705)
Configuring BMC Remedy SSO for SAMLv2 authentication (see page 706)
Configuring BMC Remedy SSO for LDAP authentication (see page 714)
Configuring BMC Remedy SSO for certificate-based authentication (see page 717)
Configuring BMC Remedy SSO for Kerberos authentication (see page 720)
Note
The BMC Remedy AR System user store provides read-only access to the user
information stored in the AR System server and read-only access to user and group lists
and memberships.
Performed the server configuration. For more information on server configuration, see
Configuring server settings for BMC Remedy SSO (see page 702).
Obtained the following information from the BMC Remedy AR System admin:
Host name of the server where BMC Remedy AR System is installed.
Port number of BMC Remedy AR System.
Procedure
6.
BMC Remedy Action Request System 9.1 Page 705 of 4703
BMC Software Confidential. BladeLogic Confidential.
Related topics
Integrating BMC Remedy Single Sign-On with BMC Remedy AR System (see page 834)
Configuring server settings for BMC Remedy SSO (see page 702)
BMC Remedy Single Sign-On authentication (see page 112)
Troubleshooting authentication issues (see page 4634)
SAML V2.0 is implemented by grouping a collection of entities to form a Circle of Trust. The Circle
of Trust is composed of a Service Provider (SP) and an IdP. The IdP authenticates users and
provides details of the authentication information to the SP. The SP hosts services that the user
accesses.
In a Circle of Trust, BMC Remedy Single Sign-On is normally configured as an SP for BMC
products. The Circle of Trust is then completed with an IdP to provide authentication for the
federated single sign-on.
Performed the server configuration. For more information on server configuration, see
Configuring server settings for BMC Remedy SSO (see page 702).
Obtained the following information from the IdP admin:
IdP entity ID
Login URL of the IdP
Procedure
IdP Entity ID IdP entity ID that is obtained from an external IdP provider such as ADFS or Okta.
Examples: http://adfs.local/adfs/services/trust, http://www.okta.com/exk4mi22tbfhiAnIn0h7
Login URL Login URL of the IdP that is obtained from an external IdP provider such as ADFS or Okta.
Examples: https://adfs.local/adfs/ls, https://dev-726770.oktapreview.com/app/bmcdev726770_oktaidp_1
/exk4mi22tbfhiAnIn0h7/sso/saml
Sign Request The option to select if the IdP requires authentication request to be signed.
User ID The user ID attribute that is used to retrieve the user id from the specified attribute in the SAML response. If it is
Attribute not specified, the NameID will be used as the user id.
NameID Defines the name identifier formats supported by the service provider. Name identifiers are a way for providers
Format to communicate with each other regarding a user.
The Name ID format list is an ordered list, the first Name ID has the highest priority in determining the Name ID
format to use. If the user does not specify a Name ID to use when initiating single sign-on, the first one in this
list is chosen and supported by the remote Identity Provider.
A persistent identifier is saved to a particular user's data store entry as the value of two attributes. A transient
identifier is temporary and no data will be written to the user's persistent data store.
Note: For linking user accounts from SP and IdP (Remote Identity Provider) together, after logging in, the
persistent nameID format must be on the top of the list.
Auth Context Select an option (exact, minimum, maximum, better) from the drop-down list.
Compare
Auth Context Authentication context that maps the SAMLv2-defined authentication context classes to the authentication level
set for the user session for the service provider.
Auth Issuer Issuer details that is used by SAML authentication request XML to inform the IdP about the entity ID of the
service provider for this request.
If the value is not specified, by default SP entity ID of current realm will be used as Issuer in SAML
authentication request.
Field Description
Service To view data, click View Metadata. If any required parameter is not entered, the system shows an error
Provider message for that parameter.
Template
Authentication Request Template - Select Default or Custom to edit the template used for SAML
authentication request.
SP Metadata Template - Select Default or Custom to edit the service provider metadata template. This
metadata is generated when you click View Metadata in the Service Provider field.
IdP Entity ID IdP entity ID that is obtained from an external IdP provider such as ADFS or Okta.
Examples: http://adfs.local/adfs/services/trust, http://www.okta.com/exk4mi22tbfhiAnIn0h7
Login URL Login URL of the IdP that is obtained from an external IdP provider such as ADFS or Okta.
Examples: https://adfs.local/adfs/ls, https://dev-726770.oktapreview.com/app/bmcdev726770_oktaidp_1
/exk4mi22tbfhiAnIn0h7/sso/saml
Sign Request Specifies whether the IdP requires authentication request to be signed.
Sign Specifies whether BMC Remedy SSO requires a signed response from the IdP.
Response
BMC Remedy SSO validates the signature from the authentication response.
Compress Specifies whether to compress the SAML message to save space in the URL.
Request
User ID User ID attribute that is used to retrieve the user id from the specified attribute in the SAML response. If it is not
Attribute specified, the NameID will be used as the user id.
NameID Defines the name identifier formats supported by the service provider. Name identifiers are a way for providers
Format to communicate with each other regarding a user.
The Name ID format list is an ordered list, the first Name ID has the highest priority in determining the Name ID
format to use. If the user does not specify a Name ID to use when initiating single sign-on, the first one in this
list is chosen and supported by the remote Identity Provider.
Field Description
A persistent identifier is saved to a particular user's data store entry as the value of two attributes. A transient
identifier is temporary and no data will be written to the user's persistent data store.
Note: For linking user accounts from SP and IdP (Remote Identity Provider) together, after logging in, the
persistent nameID format must be on the top of the list.
Auth Context Select an option (exact, minimum, maximum, better) from the drop-down list.
Compare
Auth Context Authentication context that maps the SAMLv2-defined authentication context classes to the authentication level
set for the user session for the service provider.
Auth Issuer Issuer details that is used by SAML authentication request XML to inform the IdP about the entity ID of the
service provider for this request.
If the value is not specified, by default SP entity ID of current realm will be used as Issuer in SAML
authentication request.
Service To view data, click View Metadata. If any required parameter is not entered, the system shows an error
Provider message for that parameter.
Template
Authentication Request Template - Select Default or Custom to edit the template used for SAML
authentication request.
SP Metadata Template - Select Default or Custom to edit the service provider metadata template. This
metadata is generated when you click View Metadata in the Service Provider field.
Importing certificates
Perform the following steps to import certificates:
a.
BMC Remedy Action Request System 9.1 Page 710 of 4703
2.
a. From the Run dialog box, type mmc to open Microsoft Management Console (MMC).
b. Open the File menu and click Add/Remove Snap-in…
c. Select Certificates from the list of available snap-ins and click Add.
The Certificates snap-in dialog box is displayed.
d. Select My User Account, and click Finish and OK.
e. Open Personal>Certificates from the explorer panel.
f. On the Action menu, point to All Tasks, and then click Import to start the Certificate
Import Wizard.
g. Import the SSL certificate of the Tomcat on which the BMC Remedy Single Sign-On
is deployed and the Signing certificate.
h. Open Trusted Root Certification Authorities>Certificates from the explorer panel.
i. Import the SSL certificate of the Tomcat on which the BMC Remedy Single Sign-On
is deployed.
SSL certificate of the Tomcat on which the BMC Remedy Single Sign-On is deployed.
Click here to expand to read the steps to export the certificate.
a. When you open the BMC Remedy Single Sign-On URL, click on the padlock
symbol in the address line of the browser.
b. In the Certificate window, click on the Details tab.
c. Click Copy to File.
d. In the Certificate Export Wizard, click Next.
e. In the displayed page, select "DER encoded binary X.509 (.CER)".
f. Click Next.
g. Provide a name for the file and include the path in the file name.
Note
The Common Name (CN) attribute of this certificate must be the same as
the FQDN of the BMC Remedy Single Sign-On server.
b.
BMC Remedy Action Request System 9.1 Page 711 of 4703
4.
BMC Software Confidential. BladeLogic Confidential.
b. Copy the metadata web link that you received from the BMC Remedy Single Sign-
On. For example, https://rssoexample.bmc.com:8443/rsso/getmetadata.jsp?
tenantName=<name of the corresponding tenant>.
Note
If you see a warning, you can ignore it. However, if you are unable to
proceed with the configuration, the certificates were not exchanged
correctly. Contact the BMC Remedy Single Sign-On administrator for more
information.
In case of specific network settings when ADFS and BMC Remedy Single
Sign-On servers are not able to connect using SSL protocol, this error
message may be normal and can be ignored. In this case, you can import
the SP metadata into ADFS offline using an XML file.
c. Click Next.
d. Type rsso-sp for the display name, and click Next.
e. Select ADFS 2.0 profile, and click Next.
f. Select Permit all users to access this relying party, and click Next.
g. Clear the Open the Claims when this finishes check box.
h. Click Close.
After closing the Add Relying Party Trust Wizard window, sp appears in the Relying Party Trusts
list.
1. On ADFS 2.0, select rsso-sp, and click Edit Claim Rules from the Actions menu.
2. To add the claim rule, click Add Rule.
a. Select the claim-rule template Send Claims Using Custom Rule.
b. Enter the claim-rule name Send Claims Using UPN. In this case, use the following
script:
Note
c:[Type == "http://schemas.microsoft.com/ws/2008/06/identity/claims/windowsaccountname"]
=> issue(Type =
"http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameidentifier",
Issuer = c.Issuer,
OriginalIssuer = c.OriginalIssuer,
Value = c.Value,
ValueType = c.ValueType,
Properties["http://schemas.xmlsoap.org/ws/2005/05/identity/claimproperties/format"]
= "urn:oasis:names:tc:SAML:2.0:nameid-format:transient",
Properties["http://schemas.xmlsoap.org/ws/2005/05/identity/claimproperties
/namequalifier"]
= "http://vm-w28-rds123.sso.com/adfs/services/trust",
Properties["http://schemas.xmlsoap.org/ws/2005/05/identity/claimproperties
/spnamequalifier"]
= "rsso-sp");
a.
BMC Remedy Action Request System 9.1 Page 713 of 4703
3.
Related topics
Configuring server settings for BMC Remedy SSO (see page 702)
BMC Remedy Single Sign-On authentication (see page 112)
Troubleshooting authentication issues (see page 4634)
Performed the server configuration. For more information on server configuration, see
Configuring server settings for BMC Remedy SSO (see page 702).
Obtained the following information from the LDAP admin:
Host name of the LDAP server
Port number of the LDAP server
Distinguished name of the LDAP user
Password of the LDAP user
Starting location within the LDAP directory for performing user and group searches
User attribute on which search is performed
Procedure
2.
BMC Remedy Action Request System 9.1 Page 714 of 4703
BMC Software Confidential. BladeLogic Confidential.
2. Click the Realm tab and add a new realm or edit an existing realm. For more information
about adding or editing a new realm, see Managing realms in BMC Remedy Single Sign-On
(see page 1734).
3. In the left navigation panel, click Authentication.
4. In the Authentication Type field, click LDAP.
5. Select the Enable AR authentication for bypass check box to enable bypass URL to
authenticate against BMC Remedy AR System. For more information about enabling BMC
Remedy AR System authentication for bypass, see Enabling AR System authentication for
bypass (see page 725).
6. Enter the LDAP details. For more information on parameters, see LDAP authentication
parameters (see page 715).
7. Click Test to verify that the connections are working.
8. In the left navigation panel, click Branding if you want to configure branding settings. For
more information about branding, see Configuring branding settings (see page 1735).
9. Click Add.
Server Host Enter the host's Fully Qualified Domain Name (FQDN) for the LDAP server.
Server Port Specify the port number for the LDAP server. For example, 389.
Use TLS Select this check box to use TLS to connect to the LDAP server.
connection
Bind DN Type the distinguished name (DN) of an LDAP user. For example, CN=Administrator,CN=Users,DC=004331dc,
DC=local.
This is the administrator bind distinguished name for querying LDAP and hence this user must have privileges
to search the directory.
Bind Password Enter the password for LDAP user with the administrator bind distinguished name.
Base DN for Starting location within the LDAP directory for performing user and group searches. The search DNs should be
user search as specific as possible for performance reasons. The depth of the search that is performed can be configured.
If an object search is specified, then the Base DN should be the DN of the node containing the users.
Identity Add the user attribute names on which to perform the search to the attribute list.
Attributes For example, cn.
Search Scope Select one of the options (Object, One Level, Subtree) to provide the scope for search.
Field Description
ToLowerCase: Returns userId after converting it to lower case. For example, UserID is transformed to
userid.
ToUpperCase: Returns userId after converting it to upper case. For example, userid is transformed to
USERID.
custom: Returns more transformation options if custom transformation plug-ins are provided.
In addition, LDAP v3 uses SASL for pluggable authentication. Pluggable authentication allows
selection of an authentication mechanism that enables strong bind from a list of authentication
mechanisms. For example, a mechanism such as External with SSL and client certificate
establishes a strong bind. The mechanism gets the client certificate from the client (browser), and
passes it to BMC Remedy Single Sign-On server. The client certificate is then used to create SSL
connection to the LDAP server.
Note
If you select SASL, the Admin console displays only the SASL related fields. The
other fields, such as Bind DN and Bind Password are not displayed.
If you select DIGEST-MD5, which is not a strong bind, you can select one of the
following options for SASL Quality of Protection.
Authentication only.
Authentication with integration protection.
Authentication with integrity and privacy protection.
If you select GSSAPI, which is a strong bind, select or enter the following details.
Select a SASL Quality of Protection option.
Enter details of the KDC Host.
Enter details of the Kerberos Realm.
11. Click Save.
Related topics
Configuring server settings for BMC Remedy SSO (see page 702)
BMC Remedy Single Sign-On authentication (see page 112)
Troubleshooting authentication issues (see page 4634)
Configuring the Tomcat server to ask clients for certificates (see page 718)
Configuring the certificate-based authentication settings (see page 718)
Importing CA certificates to a truststore (see page 720)
Related topic (see page 720)
1. Stop the Apache Tomcat server that is being used for BMC Remedy Single Sign-On.
2. Open the <TomcatInstallationDirectory>/BMC Software/BMC Remedy SSO/tomcat/conf
/server.xml file and modify the <Connector> tag.
3. Set the clientAuth attribute to want as follows.
Important
Do not set the clientAuth attribute to true, because it becomes mandatory for
the client to provide a trusted certificate to the server that might break certain
communication between BMC Remedy Single Sign-On and an agent.
Performed the server configuration. For more information on server configuration, see
Configuring server settings for BMC Remedy SSO (see page 702).
Obtained the following information:
The required digital certificate filed name to get the user ID from the client certificate.
Custom responder URI if you want to enable OCSP validation.
Custom CRL DP URI if you want to enable CRL validation.
Procedure
2.
BMC Remedy Action Request System 9.1 Page 718 of 4703
BMC Software Confidential. BladeLogic Confidential.
2. Click the Realm tab and add a new realm or edit an existing realm. For more information
about adding or editing a new realm, see Managing realms in BMC Remedy Single Sign-On
(see page 1734).
3. In the left navigation panel, click Authentication.
4. In the Authentication Type field, click CERT.
5. Select the Enable AR authentication for bypass check box to enable bypass URL to
authenticate against AR. For more information about enabling AR System authentication for
bypass, see Enabling AR System authentication for bypass (see page 725).
6. Enter the certificate-based authentication details. For more information about the certificate-
based authentication parameters, see Certificate-based authentication parameters (see
page 719).
7. In the left navigation panel, click Branding if you want to configure branding settings. For
more information about branding, see Configuring branding settings (see page 1735).
8. Click Add.
User ID Field that is used to get the user ID from the client certificate. If you select Custom Attribute, you must save the
information and edit the realm again to provide the name or OID of the attribute.
Forwarded The HTTP header names to construct the certificate chain. Select this option if the client certificate chain is
Certificate passed through HTTP headers and when the load balancer or reverse proxy is used in front of Tomcat servers
and SSL termination is done on the load balancer or the reverse proxy.
If you select this option, you must enter the HTTP header names in the HTTP Header Name field. Header
Names is a comma separated header names following the same order as client certificate chain from the end-
entity certificate to the root CA certificate.
Enable Enables certificate validation. If you select this option, you can select from the following validation options:
Validation
Trusted Certificates
OSCP
CRL
OCSP/CRL Check On End-Entity Only
Client certificate chain is validated against the configured truststore when this option is selected.
Field Description
Truststore File Name or path of the truststore file. This field is available only when you select the Custom option in the Trusted
Certificates field.
Truststore Password for the truststore file. This field is available only when you select the Custom option in the Trusted
Password Certificates field.
Enable OCSP Enables OCSP check. If you select this option, you must enter the custom OCSP responder URI in the OCSP
Responder URL field.
If you do not provide any OCSP responder URI, the system uses the OCSP responder URL that is specified in
the certificate.
Enable CRL Enable CRL check. If you select this option, you must enter the custom CRL DP URI in the CRL DP URL field.
You can provide a HTTP URI.
OCSP/CRL Enables the OCSP and CRL validation to be carried out only for end-entity certificate.
Check On End-
Entity Only
Truststore of the the Tomcat server or the load balancer: Used for certificate-based
authentication that enables the Tomcat server or the load balancer to send an appropriate
information to the client so that the client returns only the trusted certificate.
Truststore used by BMC Remedy SSO for certificate validation: Used if you want BMC
Remedy SSO to perform an extra validation on the client certificate, such as OCSP or CRL
check. Certificate validation including OCSP or CRL check might be supported on the
Tomcat server or the load balancer. If all the necessary validations are already enabled on
the Tomcat server or the load balancer, you might skip the validation at BMC Remedy SSO
level.
Related topic
Configuring server settings for BMC Remedy SSO (see page 702)
BMC Remedy Single Sign-On authentication (see page 112)
Troubleshooting authentication issues (see page 4634)
1. Go to Active Directory.
2. Right-click Users->New->User.
3. Enter the user name and the user logon name in the First name and User logon name fields.
4. Click Next.
5. Enter user password in the Password and Confirm password fields.
6. Select the User cannot change password and Password never expires check boxes.
7. Click Next.
8. Click Finish.
Procedure
To generate a keytab file, run the ktpass command on the command line interface in an
appropriate directory. The command automatically assigns HTTP/<host> SPN to the user.
ktpass /out <file> /mapuser <user> /princ HTTP/<host>@<DOMAIN> /pass <password> /ptype
KRB5_NT_PRINCIPAL /Target <DOMAIN>/kvno 0
For more information about the ktpass command parameters, see the following list:
For example,
Procedure
To add more SPNs for a service account, run the setspn command.
For more information about the setspn command parameters, see the following list:
<machine_name >: The fully qualified domain name of the host on which BMC Remedy
SSO server runs including the internet domain.
For example,
Warning
A Kerberos authentication issue can arise if the keytab file was generated with
incompatible key version number (KVNO) number. For more information, refer the section
"Invalid keytab index number for Kerberos authentication" in the Troubleshooting
authentication issues (see page 4634) topic.
Performed the server configuration. For more information on server configuration, see
Configuring server settings for BMC Remedy SSO (see page 702).
Obtained the following information:
Machine name of the Key Distribution Center.
Kerberos realm created for BMC Remedy SSO on Key Distribution Center.
Service account name for BMC Remedy SSO.
Service account password, in case SPN credential type is to be used.
Name of the keytab file in case keytab credential type is to be used .
Procedure
8.
BMC Remedy Action Request System 9.1 Page 723 of 4703
BMC Software Confidential. BladeLogic Confidential.
8. In the left navigation panel, click Branding if you want to configure branding settings. For
more information about branding, see Configuring branding settings (see page 1735).
9. Click Add.
KDC Server Name of the machine where Key Distribution Center is hosted . For example, name of the machine where
domain controller, such as Active Directory, runs .
Example: ker.114kdc.local
Kerberos Realm Kerberos realm created on Key Distribution Center . You must enter the realm in upper case.
Example: KERBEROS.DOMAIN
Service Principal Service account name for BMC Remedy SSO that is created in Key Distribution Center .
Name (SPN)
Example: REMEDYSSOSERVICE
Credential Type Credential type to be used by BMC Remedy SSO to log on to Key Distribution Center . Select one of the
following:
SPN Password
Keytab File
SPN Password SPN password to be used If SPN Password is selected as the Credential type, enter a password for the
BMC Remedy Single Sign-On server SPN.
Keytab File If SPN Password is selected as the Credential type, enter the path to the keytab file used to connect BMC
Remedy Single Sign-On to Key Distribution Center (KDC).
In a BMC Remedy Single Sign-On server cluster environment, each BMC Remedy Single Sign-On server
node must contain the same keytab file path.
Related Topics
Configuring server settings for BMC Remedy SSO (see page 702)
BMC Remedy Single Sign-On authentication (see page 112)
Troubleshooting authentication issues (see page 4634)
Ensure that you have obtained the following information from the BMC Remedy AR System admin:
Procedure
2.
BMC Remedy Action Request System 9.1 Page 725 of 4703
BMC Software Confidential. BladeLogic Confidential.
In-row option — Stores the LOB column in the row (inline) with other columns in the same
data block if the length of the LOB is less than 4000 bytes. (This is the default option.)
Out-row option — Stores the LOB column out of the row in a separate LOB segment.
If the length is greater than 4000 bytes, the LOB value is stored out of the row in the LOB segment
no matter which storage option is specified.
To specify the storage option at the Oracle database level, use the ENABLE|DISABLE STORAGE
IN ROW clause of the CREATE TABLE statement.
To control Oracle character large object (CLOB) storage at the system level, use the AR System
server configuration file Oracle-Clob-Storage-In-Row option.
A CLOB can hold more than 4000 characters. To create a CLOB in BMC Remedy AR System, use
one of the following fields:
Setting CLOB fields to be stored in-row can save storage space and improve performance for
values that have fewer than 4000 characters. When values have more than 4000 characters, the in-
row option is similar to the out-row option with respect to storage and performance. Although the
in‑row option saves space and improves performance in many cases, BMC recommends that you
conduct similar benchmark tests with your data to determine which option is best for your
environment.
For details about the CLOB data type and different storage options, see your Oracle
documentation.
Note
In BMC Remedy AR System, the attachment field creates a BLOB column. BLOBs are
stored in separate tables as part of the BMC Remedy AR System schema design. By
default, BLOBs are stored in-row and are not affected by the Oracle-Clob-Storage-In-Row
server configuration option.
Related topic
Oracle CLOB storage
CHUNKSIZE, which is a parameter that you can specify when creating the large object
(LOB). The minimum for this parameter is the block size of the tablespace on which the LOB
resides. The chunk size can also be a multiple of the block size.
Assuming that the default Oracle 8 kilobyte (KB) block size is used, the in-row option uses less
storage space than the out-row option when the following criteria are met (because the LOB value
is stored in the table):
A simple test that populated a BMC Remedy AR System diary field with 3500 characters showed
that the in-row option uses significantly less storage than the out-row option. This test consisted of
10,500 rows. The other required field values remained constant.
The following SQL statement was issued to find the storage size of the table and its LOB segment.
A LOB segment is created regardless of the LOB storage properties.
The total bytes from the table and LOB segment were added to give the total storage space. The
following table shows that the in-row option saves 50,266,112 bytes of storage when LOB value
sizes are less than 4000 bytes.
Out-row storage has the following characteristics, which result in the large use of storage space:
If the table is created with the out-row property and the LOB holds any data, a minimum of
one chunk of out-of-line storage space is used, even when the size of the LOB is less than
the CHUNKSIZE.
When the size of the LOB is greater than 4000 bytes, regardless of the LOB storage
properties for the column, it is stored as out-row in another segment outside the table.
However, the LOB locators are always stored in the row.
Another test with 10,000 characters in the diary field showed that for both in-row and out-row
options, the storage sizes were equivalent. This test consisted of 10,500 rows. The other required
field values remained constant.
This result shows that if the in-row option is used as the default, storage space is reduced when
the LOB value is less than 4000 bytes. Storage space is not impacted when the LOB value is
greater than 4000 bytes because this is equivalent to using the out-row option. This situation is
also true for BMC Remedy AR System attachment fields (BLOBs). By default, attachment fields
use the in‑row option and cannot be changed.
Finally, a similar test was conducted by populating 50 characters in the diary field for the in-row
and out-row storage options for 10,500 rows.
In this case, the out-row space usage is significantly higher than the in-row space usage. The out-
row option uses more space for small data sizes.
Performance impact
When values are greater than 4000 characters, in-row and out-row storage space usage is
equivalent. However, response time performance might be better when the in-row option is used.
The BMC Incident Management application contains a few character large object (CLOB) fields.
One such visible field is the detailed description field in the Incident form. A small load test of 60
users was run with each user creating an incident ticket repeatedly for one half hour. The average
mid-tier response time was recorded when the database was configured for out‑row and in-row
storage. The following table shows that the mid tier performs better with the in‑row option, whether
the number of characters is greater than or less than 4000.
Additional tests with the BMC Service Request Management application show that using the in-row
option significantly improves performance. A test of 400 users executing various actions for an
hour was run, and the average mid-tier response time was recorded when the database was using
out-row and in-row options. The following figure shows that the in-row option improves response
time by at least 50%. The search keyword, the create service request, and the add work
information actions all touch the CLOB fields.
When a BMC Remedy AR System entry is requested, all column values are obtained, including
0‑length fields. Because of this, performance can be slightly faster when the in-row option is used
because values that have fewer than 4000 characters are stored in the row.
1. From SQL*Plus or other tools, connect to the Oracle database server as the ARAdmin user.
2. Create the following PL/SQL p_change_LOB_storage procedure:
-- check p_generate_SQL_only
IF upper(p_generate_SQL_only) not in ('YES','NO') then
raise_application_error(-20001,'The parameter p_generate_SQL_only must be Yes
or No.');
END IF;
-- three cases:
select case when upper(p_in_row) in ('YES' ,'Y') then 'YES' else 'NO' end
chg_to_inrow,
case when upper(p_in_row) in ('NO' ,'N') then 'YES' else 'NO' end chg_to_outrow,
case when p_in_row is NULL then 'YES' else 'NO' end no_inrow_outrow_chg
into lv_chg_to_inrow,
lv_chg_to_outrow ,
lv_no_inrow_outrow_chg
from dual;
lv_in_row_clause :='';
select case when lv_chg_to_inrow='YES' then 'enable storage in row'
when lv_chg_to_outrow ='YES' then 'disable storage in row'
when lv_no_inrow_outrow_chg='YES' then ''
else 'error:unknown cases'
end in_row_clause
into lv_in_row_clause
from dual;
end if;
end if;
--
IF upper(p_generate_SQL_only) ='YES' THEN
FOR r1 IN (
select 'Alter index '||index_name ||' rebuild nologging' sqlCmd,
case when ind.logging='YES' then
'Alter index '||ind.index_name||' logging'
else null
end alt_logging_cmd
from user_indexes ind where table_name = r.table_name and index_type <>'L
OB'
)
LOOP
dbms_output.put_line (r1.sqlCmd);
if r1.alt_logging_cmd is not null then
dbms_output.put_line (r1.alt_logging_cmd);
end if;
END LOOP;
END IF;
END LOOP;
END IF;
END LOOP;
END;
/
Change all LOBs from out-row to in-row, and keep them exec p_change_LOB_storage(p_in_row =>'Yes',
in tablespace ARSYSTEM. p_dest_tablespace =>'ARSYSTEM');
Change all LOBs from out-row to in-row, and move them exec p_change_LOB_storage(p_in_row =>'Yes',
to tablespace AR_LOB. p_dest_tablespace =>'AR_LOB');
Move LOBs to tablespace AR_LOB without changing the exec p_change_LOB_storage(p_in_row =>Null,
storage option. p_dest_tablespace =>'AR_LOB');
Change all LOBs from in-row to out-row, and keep them exec p_change_LOB_storage(p_in_row =>'No',
in tablespace ARSYSTEM. p_dest_tablespace =>'ARSYSTEM');
Change the LOBs in table T1866 from out-row to in- exec p_change_LOB_storage(p_in_row =>'Yes',
row, and keep them in tablespace ARSYSTEM. p_dest_tablespace =>'ARSYSTEM', p_table_name
=>'T1866');
Change the LOBs in table T1866 from out-row to in- exec p_change_LOB_storage(p_in_row =>'Yes',
row, and move them to tablespace AR_LOB. p_dest_tablespace =>'AR_LOB', p_table_name
=>'T1866');
Change LOBs in table T1866 from in-row to out-row, exec p_change_LOB_storage(p_in_row =>'No',
and keep them in tablespace ARSYSTEM. p_dest_tablespace =>'ARSYSTEM', p_table_name
=>'T1866');
Display the SQL statements that the stored procedure will Set serveroutput on
execute to change the LOBs in table T1866 from out-row to exec p_change_LOB_storage(p_in_row =>'Yes',
in-row. p_dest_tablespace =>'ARSYSTEM', p_table_name
=>'T1866', p_generate_SQL_only='Yes');
Display the SQL statements that the stored procedure will Set serveroutput on
execute to change all LOBs from out-row to in-row and exec p_change_LOB_storage(p_in_row =>'Yes',
move them to tablespace AR_LOB. p_dest_tablespace =>'AR_LOB',
p_generate_SQL_only='Yes');
The default value being 0 seconds, the AR System API Statistics form is updated
immediately after the fields are configured.
Number of API calls by client type (for example, mid tier or BMC Remedy Developer Studio)
Total amount of data sent to the client as a result of the API calls
Total amount of data sent by the client to the server as a request
Number of successful API calls
Number of failed API calls
IP address of the client from where the call was initiated
IP address of the server that responded to the request
Client type Type of client that initiated an API call (see the following table (see page 736))
End client IP Address IP address of the client using the mid tier or the web service
Data In Total number of bytes sent as a request from the source IP address
Data Out Total number of bytes sent out as a response to the API call
Start Timestamp Time when the API call monitoring started, specified in hours. The monitoring time frame is 1 hours.
End Timestamp End time of API call monitoring. For example, if the start time is 03:00, the end time will be 04:00.
The following table lists the supported client types and the value associated with each client type.
Client types
Unknown 0
AR Web Server 8
Palm Pilot 10
arreload 14
arcache 15
ardist 16
runmacro 17
armail 18
Debugger 24
Normalization Engine 35
AR Migrator 39
AR UDM Adapter 40
Driver 4000
Dispatcher 4001
arhelp 4002
arjanitor 4003
armenu 4004
arstruct 4005
artext 4006
arsqled 4007
archgsel 4008
archgid 4009
arlabel 4010
Upgrading
Note
BMC supports only BMC Remedy Single Sign-On with BMC Remedy Action Request
System 9.1. Note that BMC Atrium Single Sign-On is not supported.
For the latest installation information, see BMC Remedy ITSM 9.1 Deployment online
documentation .
The following table describes the contents of the different branches in this online documentation.
Branch Description
Planning the This section describes the deployment scenarios for the following new components:
deployment
Click here for a list of topics in this section
Preparing This section provides information about the preparation you must do before installing or upgrading any
component of the BMC Remedy ITSM Suite.
Installing This section provides information about the steps for performing a fresh installation.
Branch Description
Upgrading This section provides information about the steps for performing an upgrade.
Troubleshooting This section provides information about troubleshooting the issues specific to install or upgrade.
Integrating
This section is written for developers and administrators who are responsible for creating,
customizing, and maintaining integrations between BMC Remedy AR System and external
systems.
Before applying any instructions in this section, you should have a strong working
knowledge of BMC Remedy AR System and BMC Remedy Developer Studio. Also, working
knowledge of the external systems that you are considering for integration with BMC
Remedy AR System is helpful.
Goal Instructions
Configuring and using the ARDBC and AREA LDAP plug-ins to Integrating with a
integrate BMC Remedy AR System with a directory service directory service (see
page 812)
Using plug-ins and the AREA API to integrate BMC Remedy AR AR System external
System with external user authentication services authentication (see
page 850)
Viewing and processing external data, accessing external Data and database
relational database tables, reading data from the AR System integrations (see
database with a third-party application, and providing read-only page 860)
access to data in BMC Remedy AR System forms
Creating custom plug-ins for BMC Remedy Developer Studio Extending BMC
Remedy Developer
Studio (see page 882)
Automatically specifying the person responsible for handling a Integrating the BMC
request in an application Remedy Assignment
Engine into an
application (see page
902)
Integration considerations
Special mechanisms can be used to integrate BMC Remedy AR System with another application.
This section discusses the issues to consider when planning an integration.
In this topic:
BMC Remedy AR System to third-party application — Integration with the BMC Remedy AR
System client typically involves taking data from a form and passing it to another application
where the user can then perform some additional function. Integration can also simply
consist of launching another application that reads data from the BMC Remedy AR System
database. In general, client integration assumes that the user will access the other
application to some extent. Most instances are real-time, where a user is involved right now.
Third-Party application to BMC Remedy AR System — Often, a third-party application
launches a mid tier and directs it to display specific data. For example, a network
management system might have a graphical map of the network devices. Selecting a device
on the map and choosing a "List Open Tickets" from a menu could cause the mid tier to be
triggered with the ID of the selected device passed as a parameter, and generate a results
list of all of the open trouble tickets for the device. This way, a network technician can
quickly see all of the outstanding problems for a device, but does not need to know the
details of starting BMC Remedy AR System and issuing queries.
The first two modes, which involve reading databases, are relatively straightforward. Any
application that can issue SQL commands and which has the appropriate permissions can read the
data in the AR System tables. In a similar manner, AR System workflow actions can execute SQL
read commands and scripts that query external database tables and retrieve information. For more
information, see the Integrating section.
The third mode, having BMC Remedy AR System write data to an external database table, can be
accomplished using Direct SQL. Another method is to create AR System workflow that executes an
SQL command script, passing any AR System data as parameters to the script.
In addition, View and Vendor forms are available to provide access to external databases in BMC
Remedy AR System forms.
Having a third-party application write data to an AR System table is not supported. The AR System
server maintains the relationships among the tables in the AR System database. If a third-party
application attempts to add data and does not maintain these relationships, the entire database
can become corrupted.
Multiplatform issues
A major consideration for every integration implementation is the range of platforms that are
involved.
BMC Remedy AR System clients are available for Windows and on all major platforms through the
Web using the mid tier. In some cases, integration at the client level is unique for the different
platforms.
The BMC Remedy AR System workflow qualifications include functions to test for the different
platforms.
Multiple workflow definitions can be triggered in parallel, and the one appropriate for the platform is
executed. In some cases, you can avoid the client functionality issue by running a process on the
server from client workflow. Because the application executes on the AR System server's platform
and operating system, it does not matter which client platform triggered the workflow.
How "robust" does the integration need to be? How heavy will the usage be, and are there
any data throughput requirements?
For an integration that will be used infrequently, some of the methods are simple to
implement. If the integration involves moving a large amount of information, other methods
might require more effort but produce better results.
Integration technologies
A basic design philosophy of BMC Remedy AR System is that it is almost always used in
conjunction with other tools and products to create an integrated solution. BMC Remedy AR
System is designed to have many integration points, making it easy to combine with your other
solutions.
This table lists the technologies available for integrating with BMC Remedy AR System:
REST API The API is a web service that conforms to the architectural principles of BMC Remedy AR
Representational State Transfer (REST). The REST API is a simple stateless System REST API
architecture that runs over the HTTP. overview (see page 3379)
.
C API The AR System API on the server is the most technically complex method. It BMC Remedy AR
(Application requires knowledge of C programming and building executables. However, it System C API overview
Programming provides access to all AR System server functionality for tightly linked, high- (see page 3425)
Interface) performance integration.
Java API The AR System Java API is a collection of Java classes that provide AR System C BMC Remedy AR
API functionality in a Java development environment. Using this abstraction layer System Java API
allows developers to quickly build enhanced applications for the web. overview (see page 4127)
Web Services This integration technology (XML, WSDL, UDDI, and SOAP) allows you to build Publishing the BMC
distributed applications without programming: Remedy AR System
functionality as a web
Use the Set Fields workflow action and a Web Services object to "consume" service (see page 3288)
third-party web services in AR System applications.
Use BMC Remedy AR System to create and "publish" a Web Services object.
BMC Remedy AR System clients perform data operations on external systems through the AR Enabling plug-ins (see
AR System System server, plug-in service, and plug-in related APIs. The plug-in service page 747)
Plug-Ins extends the AR System server to integrate with external data sources. The AR
System server connects to the plug-in service, which activates the proper plug-in
when a transaction is made.
Data The data visualization field provides a framework and services for mid tier-based Data visualization fields
Visualization graphing solutions. It provides an efficient way to add graphical elements (such as (see page 2524)
Field BMC Remedy Flashboards) to AR System forms.
AREA Plug- BMC Remedy provides a special API that allows user logins to be validated from a AREA plug-ins
Ins (BMC data source outside the AR System database. This API is called the AR System introduction (see page
Remedy AR External Authentication (AREA) API. ) and Installing
System sample AREA
External implementations (see
Authentication) page )
Filter API The filter API enables you to use filters to permit other applications to make calls Integration
Plug-Ins back into BMC Remedy AR System. considerations (see
page )
System AR System Database Connectivity enables you to access and manipulate data that
Database is not stored in BMC Remedy AR System.
Connectivity) Using the ARDBC API, you can create plug-ins used by AR System server to
manage data. These plug-ins are loaded at run time and implement calls that are
analogous to the set, get, create, delete, and get-list API calls for entries in a form.
Vendor Forms Vendor forms allow BMC Remedy AR System to present data from external sources Vendor forms
as entries in an AR System form. Vendor forms require you to have an ARDBC plug- introduction (see page
in installed and configured. 860)
View Forms View forms allow direct read-and-write access to data in database tables that are View forms introduction
not owned by BMC Remedy AR System. This allows direct access to these tables, (see page 863)
as if they were owned by BMC Remedy AR System, without programming, database
replication, or synchronization.
SQL Third-party tools with appropriate permissions can access any information in the AR SQL database access
Database System database. In addition, AR System workflow can query other databases. (see page 869)
Access
ODBC Access ODBC (Open DataBase Connectivity) is a standard database access method ODBC database access
developed by Microsoft. Using the ODBC driver, any client capable of accessing introduction (see page
ODBC can have read-only access to AR System forms. Reporting is a common use 871)
of ODBC.
BMC Atrium The BMC Atrium Integration Engine mediates between the AR System server and Integration
Integration vendor applications such as SAP, Oracle, and other applications and databases for considerations (see
Engine (AIE) which adapters are developed. Adapters can come from BMC Remedy, from page )
partners, or from customers.
Command A Command Line Interface (CLI) is available with most AR System clients. This Integration
Line Interface enables a client to be started and passed a set of parameters so that either it is in a considerations (see
(CLI) specific state and displays information or it completes a process and exits with no page )
user interface displayed.
XML Import BMC Remedy AR System can export and import object definitions in XML. Importing object
and Export AR System clients can convert AR System objects to XML and vice versa without definitions (see page 3272
making calls to the AR System server. ) and Exporting objects
When the server exports the file in XML format, it adds a header required to make it and data to XML format
a valid XML document. This same header is required for the server to import an (see page 1920)
XML file correctly. Otherwise, the file is assumed to be in the standard AR System
definition format.
Running One of the actions available in AR System workflow is the Run Process action. BMC Running external
External Remedy AR System can use the command line interfaces of other applications to processes introduction
Applications start those applications and pass them initial data. (see page 895)
(Run Process) In some cases, the third-party application is simply started, while in others BMC
Remedy AR System waits for a response.
SNMP You can use SNMP to manage complex networks through SNMP-compliant BMC Remedy SNMP
management consoles and monitor network devices. Agent configuration (see
page 551)
Licensing Authorized integration system vendors (ISVs) can make their applications licensable Making applications
Applications at the application and user levels. licensable for integration
system vendors (see
page 3282)
Enabling plug-ins
BMC Remedy AR System plug-ins enable you to extend AR System server functionality to external
data (data not contained in the AR System database). This section describes each type of AR
System plug-in and provides general information about plug-ins.
Note
To extend client functionality, you use the AR System C API or Java API. See Integration
considerations (see page ), Creating and executing BMC Remedy AR System C API
programs (see page 3965) and BMC Remedy AR System Java API overview (see page
4127).
For information on BMC Remedy ITSM Process Designer , Issues with the ARID plug-in and
BMC Remedy ITSM Social Plug-in refer to the topics in BMC Remedy IT Service Management
Suite documentation.
A plug-in is defined by using one of the plug-in APIs to write code to handle the integration with the
external program. Plug-in API functions provide the main routine, threading control, and
communication with the AR System server. The plug-in application that you write provides the logic
for one or more callback routines, defined by the API, that perform operations against the external
program or environment.
When a plug-in function is invoked, the AR System server makes a call to the plug-in server,
requesting a specific plug-in to perform an operation with a set of parameters. The plug-in server
passes the parameters to the appropriate callback routine in the external application and awaits the
response. When the response is received, it is returned to BMC Remedy AR System and
processing continues.
Notes
If you have users with fixed licenses or users who use BMC Remedy
applications, you must maintain user authentication data in AR System
directories because users must exist in the User form for the license
tracking feature and for the applications.
See AREA plug-ins introduction (see page ). A ready-to-use Atrium SSO
plug-in is available for the purpose of single sign-on. This plug-in is used for
integrating the AR System server and the Atrium SSO server and
authenticates the user against the Atrium SSO server by calling the Atrium
SSO APIs. For more information, see Configuring BMC Atrium Single Sign-
On for AR System integration.
Note
Installed plug-in components (see page 793) shows how the AR System server calls the
plug-in server that calls the plug-in.
Note
The arrows in this figure identify the directions in which each program or process
can initiate API function calls. Data can flow in any direction.
You use Developer Studio to create AR Filter Set Field actions in filters and escalations.
At run time, the AR System server sends AR Filter API requests to the plug-in, which directs the
requests to the appropriate plug-in. The plug-in processes the input arguments and can return
values that can be used in the Set Fields action.
When you enter AR Filter API requests in the Create Filter form, the AR System server sends the
requests to the plug-in, which sends them to AR Filter. AR Filter either processes the data or
request itself or retrieves output data from the external data source and returns it in the opposite
direction.
Unlike AREA plug-ins, multiple AR Filter API plug-ins can be loaded simultaneously by the plug-in
server.
The following figure shows the flow of requests and information for AR Filter API plug-ins.
The AR Filter API plug-in function is a blocking call, so the AR System server thread that makes
the call waits for the plug-in to respond. For best performance, the plug-in should return quickly.
Tell your plug-in installers about the expected latency, and have them set their
AR_SERVER_INFO_FILTER_TIMEOUT value accordingly.
The following example files, which can be used to create an AR Filter API DLL or shared library,
are located in the ARSystemServerInstallDir/Arserver/Api/arfilterapi/example directory:
arfilterapisamp.c
arfilterapisamp.dep
arfilterapisamp.vcproj
arfilterapisamp.mak
The configuration information for the AR Filter API plug-ins is available in the following
configuration forms:
The following topics describe the configuration information of the AR Filter API plug-ins.
Related topics
AR Filter API plug-ins introduction (see page 750)
Troubleshooting issues with AR System Filter API plug-ins (see page 4575)
Plug-in type
Configuration information
The configuration information of the AR Registry plug-ins is available in the AR System
Administration: Plugin Server Configuration form.
The AR System Administration: AR System Configuration Generic UI form includes the Server-
Plugin-Alias setting that points to the correct plug-in server alias:
Server-Plugin-Alias: ARSYS.ARF.REGISTRY ARSYS.ARF.REGISTRY HOST:9999
Server-Plugin-Alias: ARSYS.ARDBC.REGISTRY ARSYS.ARDBC.REGISTRY HOST:9999
See Updating configuration settings by using the AR System Configuration Generic UI form (see
page 1233), Configuring java plug-in servers (see page 390) and Setting plugin server configuration
options (see page 394).
Related topics
Troubleshooting AR Registry plug-in issues (see page 4576)
For more information, see the Integrating BMC Service Request Management with Third-Party
Applications white paper.
Plug-in type
CAI is a Java-based Filter API plug-in.
Configuration information
The CAI plug-in receives its configuration information from the following locations:
CAI Application Registry form that defines the integrating applications, interface forms, logon
information, and the plug-in location: local or remote
CAI Plug-in Registry that enables you to define a private server queue to be used for CAI
AR System server API calls
AR System Administration: AR System Configuration Generic UI form that has the
configuration to reference the private server queue defined in the CAI Plug-in Registry
The configuration information of the CAI plug-in is available in the AR System Administration:
Plugin Server Configuration form.
The AR System Administration: AR System Configuration Generic UI form includes the Server-
Plugin-Alias setting that points to the correct plug-in server alias:
Server-Plugin-Alias: REMEDY.ARF.CAI REMEDY.ARF.CAI myServer:9999
See Updating configuration settings by using the AR System Configuration Generic UI form (see
page 1233), Configuring java plug-in servers (see page 390) and Setting plugin server configuration
options (see page 394).
Related topic
Troubleshooting CAI plug-in issues (see page 4577)
Plug-in type
CAI RESTful is a Java-based Filter API plug-in.
Configuration information
The configuration information of the CAI RESTful plug-in is available in the AR System
Administration: Plugin Server Configuration form.
The AR System Administration: AR System Configuration Generic UI form includes the Server-
Plugin-Alias setting that points to the correct plug-in server alias. For example:
Server-Plugin-Alias: RMDY.CAI.RESTFUL.CLIENT.FILTER.PLUGIN RMDY.CAI.
RESTFUL.CLIENT.FILTER.PLUGIN myServer:9999
See Updating configuration settings by using the AR System Configuration Generic UI form (see
page 1233), Configuring java plug-in servers (see page 390) and Setting plugin server configuration
options (see page 394).
Related topic
Troubleshooting CAI RESTful plug-in issues (see page 4578)
BMC Asset Management also uses the charge-back functionality in the Cost module. Charge-
backs are roll-ups of costs that are incurred over a period and involved in the various cost centers
in a company. The charge-back component of the Cost module generates charge-back entries,
enables the financial manager to make appropriate adjustments to the costs, and generates
invoices to be sent to the individual cost centers.
Plug-in type
Charge-back is a Java-based Filter API plug-in.
Configuration information
The configuration information of the Charge-back plug-in is available in the AR System
Administration: Plugin Server Configuration form.
The AR System Administration: AR System Configuration Generic UI form includes the Server-
Plugin-Alias setting that points to the correct plug-in server alias. For example:
Server-Plugin-Alias: REMEDY.ARF.CBDATA REMEDY.ARF.CBDATA myServer:9999
See Updating configuration settings by using the AR System Configuration Generic UI form (see
page 1233), Configuring java plug-in servers (see page 390) and Setting plugin server configuration
options (see page 394).
Related topic
Troubleshooting Charge-back plug-in issues (see page 4579)
Plug-in type
Docs Migration is a Java-based Filter API plug-in.
Configuration information
When the Docs Migration plug-in is running, you must copy the data folder from the old RKM
system to the AR System server and provide the absolute folder path during conversion.
The configuration information of the Docs Migration plug-in is available in the AR System
Administration: Plugin Server Configuration form.
The AR System Administration: AR System Configuration Generic UI form includes the Server-
Plugin-Alias setting that points to the correct plug-in server alias:
Server-Plugin-Alias: RMDY.ITSM.RKM.DOCSMIGRATION RMDY.ITSM.RKM.
DOCSMIGRATION myServer:9999
See Updating configuration settings by using the AR System Configuration Generic UI form (see
page 1233), Configuring java plug-in servers (see page 390) and Setting plugin server configuration
options (see page 394).
The log4j_pluginsvr.xml file contains the plug-in log level information. For example:
Related topic
Troubleshooting Docs Migration plug-in issues (see page 4580)
Plug-in type
File System Sync is a Java-based Filter API plug-in.
Configuration information
The configuration information of the File System Sync plug-in is available in the AR System
Administration: Plugin Server Configuration form.
The AR System Administration: AR System Configuration Generic UI form includes the Server-
Plugin-Alias setting that points to the correct plug-in server alias:
Server-Plugin-Alias: RMDY.ITSM.RKM.FS.KAM.SYNC RMDY.ITSM.RKM.FS.KAM.SYNC
myServer:9999
See Updating configuration settings by using the AR System Configuration Generic UI form (see
page 1233), Configuring java plug-in servers (see page 390) and Setting plugin server configuration
options (see page 394).
Related topic
Troubleshooting File System Sync plug-in issues (see page 4582)
Plug-in type
Form Permissions is a Java-based Filter API plug-in.
Configuration information
The configuration information of the Form Permissions plug-in is available in the AR System
Administration: Plugin Server Configuration form.
The AR System Administration: AR System Configuration Generic UI form includes the Server-
Plugin-Alias setting that points to the correct plug-in server alias:
Server-Plugin-Alias: RMDY.ITSM.RKM.FORMPERMISSIONS RMDY.ITSM.RKM.
FORMPERMISSIONS myServer:9999
See Updating configuration settings by using the AR System Configuration Generic UI form (see
page 1233), Configuring java plug-in servers (see page 390) and Setting plugin server configuration
options (see page 394).
Related topic
Troubleshooting Form Permissions plug-in issues (see page 4583)
The FTS plug-in supports the multiform search used by applications such as BMC Remedy
Knowledge Management (RKM). The multiform search uses a vendor form that displays an
interface through which an application customizes the search to suit its requirements. The search
can contain a request to return a specific list of fields, how the filters are returned, or terms that
may or may not be available in the document, and so on. It also permits you to specify the forms to
search. You can also tailor the search to target just the indexed data rather than all data.
Plug-in type
FTS is a Java-based Filter API plug-in.
Configuration information
The configuration information of the FTS plug-in is available in the AR System Administration:
Plugin Server Configuration form.
The AR System Administration: AR System Configuration Generic UI form includes the Server-
Plugin-Alias setting that points to the correct plug-in server alias:
Server-Plugin-Alias: ARSYS.ARF.FTS ARSYS.ARF.FTS myServer:9998
See Updating configuration settings by using the AR System Configuration Generic UI form (see
page 1233), Configuring java plug-in servers (see page 390) and Setting plugin server configuration
options (see page 394).
Related topic
Troubleshooting FTS plug-in issues (see page 4584)
Plug-in type
ITSM Util is a Java-based Filter API plug-in.
Configuration information
The configuration information of the ITSM Util plug-in is available in the AR System Administration:
Plugin Server Configuration form.
The AR System Administration: AR System Configuration Generic UI form includes the Server-
Plugin-Alias setting that points to the correct plug-in server alias. For example:
Server-Plugin-Alias: REMEDY.ARF.ITSMUtil REMEDY.ARF.ITSMUtil myServer:
9999
See Updating configuration settings by using the AR System Configuration Generic UI form (see
page 1233), Configuring java plug-in servers (see page 390) and Setting plugin server configuration
options (see page 394).
Related topic
Troubleshooting ITSM Util plug-in issues (see page 4586)
Plug-in type
Log Level Change is a Java-based Filter API plug-in.
Configuration information
The configuration information of the Log Level Change plug-in is available in the AR System
Administration: Plugin Server Configuration form.
The AR System Administration: AR System Configuration Generic UI form includes the Server-
Plugin-Alias setting that points to the correct plug-in server alias:
Server-Plugin-Alias: RMDY.ITSM.RKM.LOGLEVEL.CHANGE RMDY.ITSM.RKM.
LOGLEVEL.CHANGE myServer:9999
See Updating configuration settings by using the AR System Configuration Generic UI form (see
page 1233), Configuring java plug-in servers (see page 390) and Setting plugin server configuration
options (see page 394).
Related topic
Troubleshooting Log Level Change plug-in issues (see page 4587)
Plug-in type
NextId is a Java-based Filter API plug-in.
Configuration information
The configuration information of the NextID plug-in is available in the AR System Administration:
Plugin Server Configuration form.
The AR System Administration: AR System Configuration Generic UI form includes the Server-
Plugin-Alias setting that points to the correct plug-in server alias. For example:
Server-Plugin-Alias: NextId NextId myServer:9999
See Updating configuration settings by using the AR System Configuration Generic UI form (see
page 1233), Configuring java plug-in servers (see page 390) and Setting plugin server configuration
options (see page 394).
Related topic
Troubleshooting NextId plug-in issues (see page 4588)
Searchable Item — Register AR forms as knowledge sources that are searchable only. No
metadata or life cycle is saved or managed.
Knowledge Base Item — Register external files or AR forms. Metadata is saved and
managed. Life cycle management is optional for AR forms.
Plug-in type
Registration is a Java-based Filter API plug-in.
Configuration information
The configuration information of the Registration plug-in is available in the AR System
Administration: Plugin Server Configuration form.
The AR System Administration: AR System Configuration Generic UI form includes the Server-
Plugin-Alias setting that points to the correct plug-in server alias.
Server-Plugin-Alias: RMDY.ITSM.RKM.REGISTRATION RMDY.ITSM.RKM.
REGISTRATION myServer:9999
See Updating configuration settings by using the AR System Configuration Generic UI form (see
page 1233), Configuring java plug-in servers (see page 390) and Setting plugin server configuration
options (see page 394).
Related topic
Troubleshooting Registration plug-in issues (see page 4595)
Plug-in type
Rule Engine is a Java-based Filter API plug-in.
Configuration information
The configuration information of the Rule Engine plug-in is available in the AR System
Administration: Plugin Server Configuration form.
See Updating configuration settings by using the AR System Configuration Generic UI form (see
page 1233), Configuring java plug-in servers (see page 390) and Setting plugin server configuration
options (see page 394).
Related topic
Troubleshooting Rule Engine plug-in issues (see page 4600)
Plug-in type
SDG is a Java-based Filter API plug-in.
The AR System Administration: AR System Configuration Generic UI form includes the Server-
Plugin-Alias setting that points to the correct plug-in server alias.
Server-Plugin-Alias: ARSYS.ARF.SDG ARSYS.ARF.SDG myServer:9999
See Updating configuration settings by using the AR System Configuration Generic UI form (see
page 1233), Configuring java plug-in servers (see page 390) and Setting plugin server configuration
options (see page 394).
DMT:SpreadsheetColumnSelections
DMT:Spreadsheet
Related topic
Troubleshooting SDG plug-in issues (see page 4601)
BMC Remedy AR System permits you to send an alert notification to a valid Twitter account that is
registered with a given user. If an AR System user has already registered with a valid Twitter
Access Key and Token Secret and has set up Twitter as part of his alert notifications, this plug-in
helps send a tweet to the registered Twitter account when an Alert Notify action in a filter is called.
The following BMC Remedy AR System components are important in sending alert notifications:
AR System Alert Delivery Registration form — Ensure that this form contains an entry for
Twitter with the plug-in name ARSYS.ALRT.TWITTER.
AR System Alert Twitter User Authorization form — Use this form to map an AR System
user to a valid Twitter account. For more information about the registration process, see
Twitter User Registration plug-in configuration (see page 771).
An AR Filter with Notify action to this AR System user invokes this plug-in to send a tweet.
Plug-in type
Twitter Alert Notification is a Java-based Filter API plug-in.
Configuration information
The configuration information of the Twitter Alert Notification plug-in is available in the AR System
Administration: Plugin Server Configuration form.
The AR System Administration: AR System Configuration Generic UI form includes the Server-
Plugin-Alias setting, which points to the correct plug-in server alias:
Server-Plugin-Alias: ARSYS.ALRT.TWITTER ARSYS.ALRT.TWITTER HOST:9999
See Updating configuration settings by using the AR System Configuration Generic UI form (see
page 1233), Configuring java plug-in servers (see page 390) and Setting plugin server configuration
options (see page 394).
Related topic
Troubleshooting Twitter plug-in issues (see page 4602)
BMC Remedy AR System permits you to send an alert notification to a valid Twitter account that is
registered with a given AR System user. A filter with Notify action can send only the given text as a
"tweet" to the specified user, if the AR user is authenticated in Twitter and is registered with Twitter
generated Access Key and Token Secret. This plug-in helps create the registration by means of a
form similar to AR System Alert Twitter User Authorization form. Use this form to:
Select an AR System user to register — A browser asks you to provide valid Twitter
credentials. After authenticating the user, Twitter generates a unique PIN.
Enter the generated PIN and save this user so as to generate unique Access Key and
Token Secret. This entry is stored on the AR System Alert User Registration form.
Plug-in type
Twitter User Registration is a Java-based Filter API plug-in.
The Twitter user registration plug-in (aralerttwitterVerNum.jar — VerNum represents the version
number of the release) is installed in the <ARInstallationFolder>\pluginsvr folder.
Configuration information
The configuration information of the Alert User Registration plug-in is available in the AR System
Administration: Plugin Server Configuration form.
The AR System Administration: AR System Configuration Generic UI form includes the Server-
Plugin-Alias setting, which points to the correct plug-in server alias.
Server-Plugin-Alias: ARSYS.ARF.TWITTER ARSYS.ARF.TWITTER HOST:9999
See Updating configuration settings by using the AR System Configuration Generic UI form (see
page 1233), Configuring java plug-in servers (see page 390) and Setting plugin server configuration
options (see page 394).
Related topic
Troubleshooting Twitter plug-in issues (see page 4602)
Plug-in type
Update KAM Mapping is a Java-based Filter API plug-in.
Configuration information
The configuration information of the Update KAM Mapping plug-in is available in the AR System
Administration: Plugin Server Configuration form.
The AR System Administration: AR System Configuration Generic UI form includes the Server-
Plugin-Alias setting that points to the correct plug-in server alias:
Server-Plugin-Alias: RMDY.ITSM.RKM.UPDATEKAMMAPPINGS RMDY.ITSM.RKM.
UPDATEKAMMAPPINGS myServer:9999
See Updating configuration settings by using the AR System Configuration Generic UI form (see
page 1233), Configuring java plug-in servers (see page 390) and Setting plugin server configuration
options (see page 394).
Related topic
Troubleshooting Update KAM Mapping plug-in issues (see page 4604)
Plug-in type
ARSYS.ARF.ARMIGRATE is a Java-based AR Filter API plug-in.
Configuration information
The configuration information of the AR Migrate plug-in is available in the AR System
Administration: Plugin Server Configuration form.
The AR System Administration: AR System Configuration Generic UI form includes the Server-
Plugin-Alias setting that points to the correct plug-in server alias:
See Updating configuration settings by using the AR System Configuration Generic UI form (see
page 1233), Configuring java plug-in servers (see page 390) and Setting plugin server configuration
options (see page 394).
When users first log on to BMC Remedy AR System through a client or when a client issues an
API call to BMC Remedy AR System, the AR System server verifies the user name and password.
If the server verifies that the user name and password are in the User form, it authenticates the
information and processes the login or API call.
If the user information is not in the User form or if the user password is blank in the User form, the
AR System server sends an authentication request to the plug-in server. The request passes from
the plug-in server through the AREA plug-in instance to the external authentication source. The
external authentication source sends authentication information back through the same path to the
AR System server.
Note
For the AR System server to use an AREA plug-in to authorize logins, the corresponding
entries in the User form must have blank passwords.
If the authentication source verifies that the user information is valid, the AR System server
processes the API call or allows the user to log in.
When the authentication information is not verified (that is, the information is incorrect, incomplete,
or cannot be found in the external data source), the AR System server returns an error message to
the client.
The plug-in can load only one AREA plug-in instance at a time. An AREA plug-in can be configured
to access one or more data sources.
AREA plug-ins can selectively override field values entered in the User form.
Note
The plug-in behavior depends on how you configure the plug-in, such as whether you
enable the Cross Reference Blank Password and the Authenticate Unregistered users
options.
AREAFreeCallback
AREANeedToSyncCallback
AREAVerifyLoginCallback
For more information, see the BMC Remedy AR System C API functions (see page 3521).
You must create a custom plug-in to integrate BMC Remedy AR System with external
authentication services such as Kerberos. See Creating Java plug-ins (see page 803) and AREA
plug-in Java API methods (see page 777) for details.
When users enter requests in the vendor form, the AR System server sends the requests to the
plug-in server, which sends the requests to the ARDBC plug-in instance. The plug-in retrieves the
data (if any) from the external data source and returns it in the opposite direction. The AR System
server maps the external data to fields in the vendor form, and the form displays the data. See
Integration considerations (see page ).
Unlike AREA plug-ins, multiple ARDBC plug-ins can be loaded simultaneously by the plug-in
server.
The following figure shows the flow of requests and information for an ARDBC plug-in.
When a plug-in call is made, AR System server creates a globally unique ID (GUID) to identify the
user instance calling the plug-in. The plug-in provides callback routines to fetch the user name,
authentication string, and GUID. Subsequently, when a plug-in makes an API call, it uses those
callback routines to fetch the information it needs to authenticate itself as the user that made the
original call to the plug-in.
The calling plug-in uses the following API calls to set the callback routines for the API to fetch the
user name, authentication string, and authenticating GUID:
ARSetUserNameSource
ARSetAuthStringSource
ARSetNativeAuthenticationSource
Pointers to the callback routines are made available to the plug-ins as members of a properties list (
ARPropList) passed as an argument to ARDBCPluginSetProperties (if implemented by the
plug-in) when the plug-in is loaded. The plug-in must save these pointers and use them later as
arguments to API calls. These API calls must be made immediately after the
ARIntitialization call before any other API calls.
Note
When using the GUID authentication feature from a plug-in, internal users (such as
ESCALATOR and ARCHIVE) encounter errors. The errors occur because these users
are not valid users for making API calls.
For more information, see AR System plug-in API functions (see page 3984).
A Java ARDBC plug-in can make AR System Java API calls to the AR System server. Use the
ARPluginContext object to create a ARServerUser object. See the Java plug-in server API
online documentation located at ARSystemServerInstallDir\ARserver\api\javaplugins\arpluginsdoc
VerNum.jar.
Implement calls on an external data source that are analogous to set entry, get entry, create
entry, delete entry, and get list C API calls.
Use external data to implement Push Field and Set Field filter, escalation, and active link
actions.
Create, modify, and search for external data through API clients.
Construct query-style character menus.
Present forms, views, and active links on external data in the same manner as internal data.
The data source is transparent to the user.
When you create an ARDBC plug-in, be sure to completely document the capabilities of your plug-
in. For example, you might create a read-only plug-in, which does not allow a user to create, set, or
delete entries.
If the data source with which you integrate does not support a particular functionality, do not
implement that function. Instead, let the default behavior occur. For example, if your data source
does not support transactions, do not define ARDBCCommitTransaction and
ARDBCRollbackTransaction functions.
ARDBCCommitTransaction
ARDBCCreateEntry
ARDBCDeleteEntry
ARDBCGetEntry
ARDBCGetEntryBLOB
ARDBCGetEntryStatistics
ARDBCGetListEntryWithFields
ARDBCGetListSchemas
ARDBCGetMultipleFields
ARDBCRollbackTransaction
ARDBCSetEntry
For more information, see ARDBC plug-in API functions (see page 3994).
Note
Creating a vendor form for an ARDBC LDAP plug-in is a special case. See Creating a
vendor form to represent a collection of LDAP objects (see page ).
The plug-in can load more than one ARDBC plug-in at a time.
Full Text Search (FTS) operations are not available on vendor form fields.
You can add only those Required and Optional fields that correspond to actual columns in
the data source. In addition, you can add a Display Only field only when the column name
does not correspond to a column in the data source.
For more information about vendor forms, see Creating vendor forms (see page 860).
The configuration information for the ARDBC plug-ins is available in the following configuration
forms:
The following topics describe the configuration information of the ARDBC plug-ins.
Related topic
ARDBC plug-ins introduction (see page 778)
Plug-in type
AppQuery is a Java-based ARDBC plug-in.
Configuration information
The configuration information of the AppQuery plug-in is available in the AR System
Administration: Plugin Server Configuration form.
The AR System Administration: AR System Configuration Generic UI form includes the Server-
Plugin-Alias setting that points to the correct plug-in server alias as follows:
Server-Plugin-Alias: REMEDY.ARDBC.APPQUERY REMEDY.ARDBC.APPQUERY
myServer:9999
See Updating configuration settings by using the AR System Configuration Generic UI form (see
page 1233), Configuring java plug-in servers (see page 390) and Setting plugin server configuration
options (see page 394).
Related topic
Troubleshooting AppQuery plug-in issues (see page 4561)
The approval server includes built-in contingency handling, which ensures that approvals are
completed quickly within the system. When a BMC Remedy AR System application triggers an
approval process, the approval server routes a request to collect signatures within a defined
approval process, handling all notifications and requests for more information as it collects each
response (approval or rejection). The approval server then reactivates the original application and
reports the result of the approval process.
You can run multiple instances of the approval server with multiple instances of AR System server
on one computer.
Plug-in type
Approval Server is a Java-based ARDBC plug-in that runs as a part of Java plug-in server.
Configuration information
The Approval Server plug-in receives its configuration information from the AR System
Administration: AR System Configuration Generic UI form, which contains information about the log
file, related notifications, and their states (active or inactive).
The AR System Administration: AR System Configuration Generic UI form also has an entry for the
Alternate-Approval-Reg configuration setting. This setting indicates whether the approval server is
notified by the dispatcher regarding commands or picks them on its own from the Application
Pending form. The default value of the Alternate-Approval-Reg setting is T (True), which ensures
that the approval server receives the signals sent by the dispatcher. Change the value to F (False)
only when the application dispatcher is not working; this provides an alternative method to receive
signals from the AR System server. The AR System server installation creates this entry and sets
the value to T. To change the setting, see Updating configuration settings by using the AR System
Configuration Generic UI form (see page 1233).
The configuration information of the Approval Server plug-in is available in the AR System
Administration: Plugin Server Configuration form.
The AR System Administration: AR System Configuration Generic UI form includes the Server-
Plugin-Alias setting that points to the correct plug-in server alias as follows:
Server-Plugin-Alias: ARSYS.ARDBC.PREVIEW ARSYS.ARDBC.PREVIEW myServer:
9999
See Updating configuration settings by using the AR System Configuration Generic UI form (see
page 1233), Configuring java plug-in servers (see page 390) and Setting plugin server configuration
options (see page 394).
Related topic
Troubleshooting Approval Server plug-in issues (see page 4563)
Configuring BMC Remedy Approval Server with a separate plug-in server instance (see page 630)
Plug-in type
DSO Filter Configuration is a Java-based ARDBC plug-in.
Configuration information
The configuration information of the DSO Filter Configuration plug-in is available in the AR System
Administration: Plugin Server Configuration form.
The DSO.FILTERCONFIGURATION.userDefined.filter_configuration_form_name
setting contains the name of the form that has fields for filter name and mapping name.
The DSO.FILTERCONFIGURATION.userDefined.filter_name_field_id and DSO.
FILTERCONFIGURATION.userDefined.mapping_name_field_id settings contain IDs of
the fields that contain the filter name and the mapping name, respectively.
The AR System Administration: AR System Configuration Generic UI form includes the Server-
Plugin-Alias setting that points to the correct plug-in server alias:
Server-Plugin-Alias: DSO.FILTERCONFIGURATION DSO.FILTERCONFIGURATION
myServer:9999
See Updating configuration settings by using the AR System Configuration Generic UI form (see
page 1233), Configuring java plug-in servers (see page 390) and Setting plugin server configuration
options (see page 394).
Related topic
Troubleshooting DSO Filter Configuration plug-in issues (see page 4567)
Simple qualification, such as the file extension (for example, .doc or .pdf file extensions)
Open qualification for a file name written by using a regular-expression syntax
For more information, see http://docs.oracle.com/javase/tutorial/essential/regex/intro.html.
The File System plug-in returns the file name, file path, the file, and the date of modification as
output. In addition, the plug-in returns document author, title, subject, and keywords as output
values for .doc and .pdf files.
Plug-in type
File System is a Java-based ARDBC plug-in.
Configuration information
The configuration information of the File System plug-in is available in the AR System
Administration: Plugin Server Configuration form.
The AR System Administration: AR System Configuration Generic UI form includes the Server-
Plugin-Alias setting that points to the correct plug-in server alias as follows:
Server-Plugin-Alias: RMDY.ITSM.RKM.FILESYSTEM RMDY.ITSM.RKM.FILESYSTEM
myServer:9999
See Updating configuration settings by using the AR System Configuration Generic UI form (see
page 1233), Configuring java plug-in servers (see page 390) and Setting plugin server configuration
options (see page 394).
Related topic
Troubleshooting File System plug-in issues (see page 4562)
Plug-in type
Pentaho is a Java-based ARDBC plug-in.
Configuration information
The configuration information of the Pentaho plug-in is available in the AR System Administration:
Plugin Server Configuration form.
The AR System Administration: AR System Configuration Generic UI form includes the Server-
Plugin-Alias setting that points to the correct plug-in server alias as follows:
Server-Plugin-Alias: ARSYS.ARDBC.PENTAHO ARSYS.ARDBC.PENTAHO myServer:
9999
See Updating configuration settings by using the AR System Configuration Generic UI form (see
page 1233), Configuring java plug-in servers (see page 390) and Setting plugin server configuration
options (see page 394).
Related topic
Troubleshooting Pentaho plug-in issues (see page 4574)
Plug-in type
RKM Group is a Java-based ARDBC plug-in.
Configuration information
The configuration information of the RKM Group plug-in is available in the AR System
Administration: Plugin Server Configuration form.
The AR System Administration: AR System Configuration Generic UI form includes the Server-
Plugin-Alias setting that points to the correct plug-in server alias as follows:
Server-Plugin-Alias: RMDY.ITSM.RKM.GROUP RMDY.ITSM.RKM.GROUP myServer:
9999
See Updating configuration settings by using the AR System Configuration Generic UI form (see
page 1233), Configuring java plug-in servers (see page 390) and Setting plugin server configuration
options (see page 394).
Related topic
Troubleshooting RKM Group plug-in issues (see page 4565)
Plug-in type
Rule Engine Configuration is a Java-based ARDBC plug-in.
Configuration information
The configuration information of the Rule Engine Configuration plug-in is available in the AR
System Administration: Plugin Server Configuration form.
The AR System Administration: AR System Configuration Generic UI form includes the Server-
Plugin-Alias setting that points to the correct plug-in server alias:
Server-Plugin-Alias: RMDY.ITSM.RLECONFIG RMDY.ITSM.RLECONFIG myServer:
9999
See Updating configuration settings by using the AR System Configuration Generic UI form (see
page 1233), Configuring java plug-in servers (see page 390) and Setting plugin server configuration
options (see page 394).
<root>
<logger additivity= "false" name= "com.bmc.itsm.rleconfig" >
<level value= "warn" />
<appender-ref ref= "SWLMLog" />
</logger>
Related topic
Troubleshooting Rule Engine Configuration plug-in issues (see page 4566)
Plug-in type
Software Usage is a Java-based ARDBC plug-in.
Configuration information
The configuration information of the Software Usage plug-in is available in the AR System
Administration: Plugin Server Configuration form.
The AR System Administration: AR System Configuration Generic UI form includes the Server-
Plugin-Alias setting that points to the correct plug-in server alias.
Server-Plugin-Alias: RMDY.ITSM.ASSET.SOFTWAREUSAGE RMDY.ITSM.ASSET.
SOFTWAREUSAGE myServer:9999
See Updating configuration settings by using the AR System Configuration Generic UI form (see
page 1233), Configuring java plug-in servers (see page 390) and Setting plugin server configuration
options (see page 394).
Related topic
Troubleshooting Software Usage plug-in issues (see page 4560)
Note
In addition to the BMC Remedy AR System 8.1 Java plug-in server and its API, the C
plug-in server, arplugin, and its API are installed.
UNIX — /usr/ar/<serverName>/pluginsvr
Windows — C:\Program Files\AR System\<serverName>\pluginsvr
Component Description
arapiVerNum.jar* Includes the AR System Java API, Java utilities, and AR System server communications
This file is called by Java plug-ins.
The arplugin.h file is installed with the other C API include files in the include subdirectory.
Creating C plug-ins
You must create a separate plug-in for each of the three types of plug-ins. For example, you
cannot create one plug-in that supports both AREA and ARDBC.
Note
On Windows platforms, plug-ins created for pre-7.0 servers must be recompiled with
Microsoft Visual Studio .NET 2003 to be used successfully in the BMC Remedy AR
System 7.0 environment.
To create a C plug-in
Code to implement the calls. Use sample Microsoft Developer Studio projects
(Windows) or makefiles (UNIX), which you install with BMC Remedy AR System, to
build your program into your DLL or shared object library.
For examples and templates for C plug-ins, see the ardbc, area, and arfilterapi
subdirectories of the Api directory in your BMC Remedy AR System server
installation.
C plug-in call sequence (see page 810) shows the general structure of a plug-in
program.
2. Compile and link your plug-in as follows:
On Windows platforms, compile your plug-in using Microsoft Visual Studio .NET
2003.
On Linux, you must use the -malign-double option when compiling plug-ins to make
sure that your plug-in library is correctly aligned for the plug-in server. If you do not,
the plug-in might produce unexpected results.
If you compile and link your plug-in on HP-UX using aCC and enable exception
handling, your plug-in will have dependencies on libraries that are not standard C
/C++ libraries, for example libCsup_v2 and libstd_v2. If your plug-in has
dependencies on any libraries like these, you must explicitly link to them and make
sure they are available at run time in the shared library path for the plug-in server to
find them.
3. Put your plug-in DLL or shared library file in the directory that contains the BMC Remedy AR
System server and plug-in server executable files or any other directory listed in you PATH
environment variable.
4. Add an entry for the plug-in to the plug-in server configuration file. See Configuring the Java
plug-in server (see page ).
At run time, the plug-in server reads the configuration file and loads the specified plug-ins.
Managing memory
Do not free memory that the plug-in passes to your functions as arguments or that you return to the
plug-in. Plug-ins can allocate and deallocate memory associated with the object argument for each
call. The plug-in does not deallocate this memory.
If the AR System server returns AR_RETURN_WARN or AR_RETURN_OK to the arplugin log file
after a call is issued, the plug-in considers that call successful. The plug-in considers the call
If you do not implement a call, the plug-in performs a default action. The default action might be to
proceed or to return an error message.
At run time, the plug-in server reads the configuration file and creates the plug-ins that the file
specifies. After the plug-in server creates the plug-ins, they remain active until a system failure or
until you modify the plug-in configuration information and restart the plug-in server. For information
about restarting the plug-in server, see Restarting the plug-in server using the Set Server Info
command (see page ).
In BMC Remedy AR System 7.5.00, the file encoding of the pluginsvr_config.xml file was changed
from ISO 8859-1 to UTF-8. This change enables you to use localized plug-in names in the
configuration file. If you modify the pluginsvr_config.xml file, save it as a Unicode file. Some text
editors, such as Windows Notepad, save files as single-byte ANSI (ASCII) by default.
Tip
Install critical plug-ins, such as an LDAP plug-in that performs LDAP authentication, in
separate plug-in servers. If multiple plug-ins are installed on a single server, problems
with one plug-in might affect the use of the other plug-ins.
See the Configuring java plug-in servers (see page 390), for descriptions, valid values, and default
values for the Java plug-in server configuration options.
Note
See the Configuring after installation (see page 271) section for configuration of the C-
based plug-in server, arplugin.
To improve performance, the Java plug-in server now uses a configurable pool of worker threads
to handle RPC calls. The pool and its associated plug-in instances are created at startup, rather
than as RPC calls are received. If a connection fails, the plug-in instances associated with the
thread remain instantiated and can still process calls from other connections.
Note
Do not send any requests to the Java plug-in server before the plug-ins are loaded and
instantiated. (If the plug-in log level is Warn or higher, a message is recorded in the log
file when the plug-in server is ready to receive RPC calls.)
When an RPC call is received from the AR Server, a selector thread adds the call to the worker
thread task queue. By default, the system uses two selector threads. To prevent bottlenecks, you
can increase the number of selector threads by using the Number Of Selector Threads field on the
AR System Administration:Plugin Server Configuration form.
Whenever a worker thread is free, it starts processing the next request in the task queue. By
default, the pool contains five worker threads. To prevent bottlenecks, you can increase the
number of worker threads by using the Number Of Core Threads field on the AR System
Administration:Plugin Server Configuration form.
An unlimited number of tasks can be added to the worker thread task queue. To be notified when
too many tasks accumulate in the queue, you can specify a task threshold. When the threshold is
exceeded, a message is logged in the arjavaplugin.log file. This enables you to avoid potential
queue bottlenecks by creating more worker threads in a timely fashion.
To specify the task threshold, use the Work Queue Task Threshold field on the AR System
Administration:Plugin Server Configuration form.
To specify how frequently the system checks to see whether the task threshold has been
exceeded, use the Work Queue Monitor Log Interval field on the AR System Administration:Plugin
Server Configuration form.
See Setting global plug-in server options (see page 392) and Setting plugin server configuration
options (see page 394).
To enable dynamic plug-in loading, you must specify a reload delay before starting the plug-in
server (use the Reload Delay configuration option in the AR System Administration: Plugin Server
Configuration form). For more information on AR System Administration: Plugin Server
Configuration form, see Setting plugin server configuration options (see page 394).
When a delay is specified, the system automatically loads plug-ins and initiates them for all worker
threads after the delay period without requiring a plug-in server restart. During the delay period,
you can modify the new plug-in configuration if necessary. (If you modify it after the delay, you
must restart the plug-in server to make your changes take effect.) For information about restarting
the plug-in server, see Restarting the plug-in server using the Set Server Info command (see page
).
The following example provides the steps to configure the Atrium SSO plug-in using only the Java
plug-in server.
To configure the Atrium SSO plug-in using only the Java plug-in server
Plugin Name
AREA
Plugin Class
com.bmc.arsys.plugins.sso.AtriumSSOPlugin
name
Path Elements
C:/Program Files/BMC Software/ARSystem/pluginsvr
/arssoplugin91_build001.jar
For more information on creating, modifying, and deleting plug-ins and their configurations, see
Working with Java plug-ins (see page 398) and Configuring java plug-in servers (see page 390).
Note
For more information about Atrium SSO integration, see Configuring BMC Atrium SSO
integration in BMC Atrium Single Sign-On 9.0 documentation.
See the plug-in server configuration file (ar.cfg or ar.conf (see page 1059)).
Note
If you enter the ssi command without entering the gsi command first, the old
plug-in entries are overwritten and only the new entries are recorded.
companyName.pluginType.uniquePluginIdentifierName
For example, if your company name is ACME , the type of plug-in is ARDBC , and the unique plug-
in identifier is pluginexample1, your plug-in name could be this:
ACME.ARDBC.pluginexample1
Restarting the plug-in server using the Set Server Info command
When any changes such as C plug-in or Java plug-in-related changes, binary updates that take
place during installation, plug-in related updates to the ar.conf file, or changes to the AR System
Administration:Plugin Server Configuration form are done to the C plug-in file or Java plug-in form,
you are able to restart only the plug-in server instead of restarting the AR System server.
To restart the plug-in server using the Set Server Info command
1. Double-click the driver.exe file. The file is located in the following path:
(Windows) <ARInstallationFolder>\Arserver\api\driver
(UNIX) <ARInstallationFolder>/bin
Note
3.
BMC Remedy Action Request System 9.1 Page 801 of 4703
BMC Software Confidential. BladeLogic Confidential.
3. To log on, enter the log command and provide details such as user name, password, and
server name. For more information about the driver.exe commands, see Using the driver
program from the command line (see page 3980).
4. If you are not using the port mapper, enter the ssp (Set Server Port) command and then
enter the server port number.
5. Enter 0 or a blank for Using private socket.
6. Enter the ver command to verify the login information.
7. Enter the ssi(Set Server Info) command and perform the following:
a. Enter 1 for the Number of server info operations that you want to perform.
b. Enter 348 as the Operation number to forcefully shut down the plug-in server.
c. Enter 2 for integer as the Datatype.
d. Enter 0 or 1 as the Integer Value.
When the AR monitor detects that the plug-in server is down, it checks if any changes are made to
the ar.cfg file. If the changes are detected, the recent ar.cfg is loaded before the stopped plug-in
server is automatically restarted.
<override_ar_server_host></override_ar_server_host>
<override_ar_server_port></override_ar_server_port>
<override_ar_system_user></override_ar_system_user>
<override_ar_system_password></override_ar_system_password>
For example, you might want the plug-in server to use MachineA on port 3814 and log in as
JoeUser with a password of pword123. Change the options as follows:
<override_ar_server_host>MachineA</override_ar_server_host>
<override_ar_server_port>3814</override_ar_server_port>
<override_ar_system_user>JoeUser</override_ar_system_user>
<override_ar_system_password>pword123</override_ar_system_password>
You might need only the host name and port numbers. (The user name and password
options are not always required.)
Interface Extends
ARDBCPluggable ARPluggable
AREAPluggable ARPluggable
ARFilterAPIPluggable ARPluggable
The interfaces and classes are described in detail in the Javadoc-generated online documentation
in the arpluginsdoc.jar file. This file is located in the javaplugins subdirectory of the Api (or api )
directory in your AR System server installation directory. To access the Java plug-in API
documentation, unzip the contents of the file. (To unzip a JAR file, use a zip utility or the Java jar
executable, which is in the bin directory of the Java JRE is installation. For example, jar -xvf
arpluginsdoc.jar.) Then, navigate to the javadoc folder, and open the index.html file to see an
overview of the entire AR System Java plug-in API documentation.
Each time the AR System server makes a connection to the Java plug-in server, a selector thread
adds the request associated with the connection to a task queue. As soon as a worker thread is
free, it processes the next request in the task queue.
Different instances of a class can share data in the static class variables. To be thread safe,
however, the class implementation must protect this static data.
The class can use instance variables to store data that is not shared. Because each thread has a
separate instance, this data is thread safe.
To access one C or Java plug-in server with no password running on the same computer as the
AR System server, only the Plugin-Port option in the AR System Administration: AR System
Configuration Generic UI form is required. To specify a password for a plug-in server, an entry on
the Connection Setting tab of the AR System Administration: Server Information form is required.
To access two or more plug-in servers, for example, to access both the C and Java plug-in servers
or to access plug-in servers on two or more computers, define aliases for all plug-ins other than
those loaded by the primary plug-in server that is set up as described in the previous paragraph.
For more information on using AR System Administration: Server Information form, see Updating
configuration settings by using the AR System Configuration Generic UI form (see page 1233).
Parameter Description
aliasName Name referenced in BMC Remedy AR System applications. AR Filter API calls and vendor forms reference this
alias name. This is an arbitrary string, but it cannot include semicolons or blank-space characters, such as spaces,
tabs, or new lines.
realName Actual name that the plug-in exposes to the plug-in server.
hostName Name of the host the AR System server accesses to find the associated plug-in server.
portNumber Port number the AR System server connects with when accessing the associated plug-in server. This is optional. If
you do not specify a port number, the Plugin-Port is used.
For more information on using AR System Administration: Server Information form, see Updating
configuration settings by using the AR System Configuration Generic UI form (see page 1233).
In this topic:
Vendor form accessing the ARDBC plug-in scenario (see page 806)
Workflow accessing the ARF plug-in scenario (see page 807)
Vendor form accessing the ARDBC plug-in scenario (see page 807)
AR System server accessing the AREA plug-in scenario (see page 807)
A vendor form that accesses the ARDBC plug-in named RMDY.ARDBC.XML is redirected to the
plug-in by the same name on the plug-in server running on myhost.
Workflow that accesses the ARF plug-in named RMDY.ARF.PERL.myhost is redirected to the
RMDY.ARF.PERL plug-in on the plug-in server running on myhost.
When the AR System server accesses the AREA plug-in, it connects to the plug-in on the plug-in
server that is running on myhost. Only one AREA plug-in can exist, so use the reserved name
AREA for the alias.
To start the plug-in server manually, run the pluginsvrstartup command in the pluginsvr directory.
This command file (pluginsvrstartup.sh for UNIX or pluginsvrstartup.bat for Windows) is customized
for your installation. To change command-line options, see Configuring the Java plug-in server
(see page 796).
In this topic:
Argument Description
AR_PLUGIN_LOG_OFF (10000) — No plug-in messages are logged. (Some plug-ins may ignore this setting.)
AR_PLUGIN_LOG_SEVERE (1000) — Messages that report fundamental problems that prevent a plug-in
from working (for example, the inability to open a required resource during plug-in initialization).
AR_PLUGIN_LOG_WARNING (900) — Messages that might be precursors to severe problems or identify
incorrect configuration settings (for example, for a bad configuration setting, a plug-in might log a warning and
reverts to a default value).
AR_PLUGIN_LOG_INFO (800) — Messages that identify intermittent milestones or events that do not have
negative repercussions. This should not be used for information that is likely to occur frequently.
AR_PLUGIN_LOG_CONFIG (700) — Messages that describe the current configuration settings of the plug-in.
AR_PLUGIN_LOG_FINE (600) — Messages that identify the result of every decision made throughout
processing. This level, along with the FINER and FINEST log levels, is primarily used while resolving
problems.
AR_PLUGIN_LOG_FINER (500) — Supporting data that supplements FINE messages.
AR_PLUGIN_LOG_FINEST (400) — Messages that contain information to help users who have plug-in source
code in front of them. At this level, messages can reference internal function names or structures. (All
messages logged at higher levels should have meaning for users who might not have access to the source
code.)
AR_PLUGIN_LOG_ALL (100) — All plug-in messages are logged.
You can specify a log level for each situation. This enables the plug-in to write different information to the log
file depending on the log level configured for the plug-in server The information is not written to the log file
unless the plug-in server log level is equal to or lower than the value of logLevel.
text The message that is written to the plug-in server log file.
Set the log level for the C-based plug-in server using the Plugin_Log_Level option on the Log Files
tab of the AR System Administration: Server Information form. For more information, see Setting
log files options (see page 298).
Java plug-ins can log messages using the logMessage method of their ARPluginContext object.
See the Java plug-in API online documentation located at
The Java plug-in server uses the log4j utility. Set the log level and other logging configuration in the
log4j_pluginsvr.xml file. Comments in the sample file describe the log configuration options.
In addition, when a run-time exception occurs, users receive Error 8753: Error in plugin:
pluginName.
When an ARException occurs, users receive the usual message associated with the exception.
Note
When you restart the AR System server, the arjavaplugin.log might log warnings that look
similar to this:
You can safely ignore these messages. If you want to use the Registry, then enter the
Registry location in the AR System Administration Console. For more information, see
Registering a web service (see page 3308).
Warning
Plug-in operations run synchronously; that is, BMC Remedy AR System waits for a plug-
in to complete its processing before the server continues its processing. Thus, a badly
written plug-in can adversely impact BMC Remedy AR System performance and stability.
Plug-in developers must:
ARPluginCreateInstance
ARPluginDeleteInstance
ARPluginEvent
ARPluginIdentify
ARPluginInitialization
ARPluginSetProperties
ARPluginTermination
In general, these functions use the same structure as other AR System C API functions. The plug-
in server calls the functions and provides the necessary input data. The plug-in accepts the data,
processes it, and returns the appropriate response data to the plug-in server.
The following figure shows a typical sequence of calls that the plug-in server makes on a C plug-in.
For more information, see AR System plug-in API functions (see page 3984).
1. Select AR System Administrator Console > Application Administration Console > Custom
Configuration > Knowledge Management > Knowledge Management Configuration >
System Configuration.
2. Click Open. The System Configuration form appears.
Related topic
Enabling LDAP plug-ins for SSL connections post-upgrade
Vendor forms are BMC Remedy AR System objects that present external data as entries in an AR
System form. Using vendor forms and the ARDBC LDAP plug-in, you can view and manipulate
external LDAP data as if it were stored in the AR System database. See Integration considerations
(see page ).
The ARDBC LDAP plug-in uses the LDAP v3 protocol to issue requests to directory
services.
Attributes of directory service objects consist of either character data, integer data, or time
stamps. Attachments are not supported.
By default, all attributes have one value. Multivalued attributes are supported by a special
notation. See Specifying multivalued attributes (see page 820).
LDAP does not support transactions. Consequently, when an object is created, modified, or
deleted, the change does not roll back if subsequent workflow in the AR System server
detects an error condition.
The distinguished name and password specified in the ARDBC LDAP configuration are
used to connect to any directory service referenced in LDAP search URLs.
Only server-based certificates are supported.
1. In the AR System Administration Console, click System > LDAP > ARDBC Configuration.
The ARDBC LDAP Configuration form opens in New mode.
2. In the Host Name field, enter one or more host names of the directory service from which
you want information for the vendor form. You can specify a space-separated list of host
names up to 255 characters long. Starting with the first host name in the list, BMC Remedy
AR System tries to connect to each server until it is successful.
If you use Secure Socket Layer (SSL), this host name should match the name for which the
server's certificate was issued.
3. In the Port Number field, enter a port number for this directory service. The default port
number is 389. (For an SSL connection, the default is 636.)
4. In the Bind User field, enter the distinguished name of the user account that the ARDBC
LDAP plug-in uses to log in to the directory service. The administrator who set up the LDAP
service designated this name. With the vendor form, some LDAP servers allow you to make
an anonymous connection. If you plan to use an anonymous connection, leave the Bind User
and Bind Password fields blank.
Otherwise, use a standard distinguished name such as cn=manager, dc=remedy, dc=com.
5. In the Bind Password field, enter the password for the user account. (For security, asterisks
replace the characters you enter for the password.)
If you leave the Bind Name and Password fields blank, you are connected anonymously.
6. To use a Secure Socket Layer (SSL) connection, select Yes in the Using Secure Socket
Layer field; otherwise, accept the default value No. If you select Yes, the Certificate
Database field becomes active, and you can enter a certificate database as described in
step 7 (see page 814). Because SSL requires additional setup in this form and outside BMC
Remedy AR System, you might first want to experiment without SSL and then add this
option later.
7. In the Certificate Database field, enter the path to the directory containing the certificate
database file. Do not include the file name in the path.
To create a certificate database, see Enabling LDAP plug-ins to establish SSL connections
with LDAP servers.
8. In the LDAP Date-Time Format field, select the format to use to represent date and time to
LDAP servers.
Format Value Description Example: 6 a.m.
Sept. 28, 2001
1 20010928060000.0Z
UTC Time 2 YYMMDDHHMMSSZ This is a historical format and does not indicate 010928060000Z
the century. It is not recommended.
For more information, see Configuring after installation (see page 271).
9. In the Failover Timeout field, specify the number of seconds in which the directory service
must respond to the plug-in server before an error is returned. The minimum value is 0
(which means the connection must be made immediately). The failover time-out cannot be
set higher than the value of the Server-Plugin-Default-Timeout parameter.
10. In the Directory Page Size field, enter the number of entries to return in a single page to the
client from the external directory server when a search request is processed.
Tip
The default Directory Page Size is 10000. However setting Directory Page Size to
a lower value, such as 1000, might help to improve your system's performance
while you design and create vendor forms.
Note
Directory Page Size value should be less than or equal to the maximum page
size setting on the LDAP server. For more information on ARDBC-LDAP-Page-
Size, see Configuration settings A-B (see page 1142).
11. In the Base DN For Discovery field, enter a base distinguished name to use instead of the
root distinguished name as the basis for obtaining the list of vendor tables.
Tip
Specifying a value in the Base DN For Discovery field can help improve your
system's performance while you design and create vendor forms.
12. In the ARDBC Plugin Cache box, specify this ARDBC plug-in caching information:
a. In the Enable field, select Yes to enable ARDBC plug-in caching.
b. In the Time To Live field, specify how long data should be kept in the ARDBC plug-in
cache.
c.
BMC Remedy Action Request System 9.1 Page 815 of 4703
12.
c. In the Maximum Size field, specify the maximum size of the cache.
Tip
Enabling the ARDBC plug-in cache can help improve your system's
performance at runtime.
For more information, see Configuring after installation (see page 271).
A directory service organizes data as a collection of objects. Each object is characterized by one or
more object classes that define the values, or attributes, that the object defines. In addition, objects
might be grouped into organizational units.
ldap://orangina/o=remedy.com??sub?(objectclass=inetorgperson)
Note
Define the search URL to retrieve objects that inherit from a particular object class. Do not
mix unrelated objects (for example, people and computers). They might have different
sets of attributes, making the search difficult to manage and administer.
Note
The LDAP URL standard enables you to specify a list of attributes to be returned by the
search. This attribute list would ordinarily fall between the base name and search scope
in the URL. In the previous example, no attributes are listed because the LDAP plug-in
ignores the attribute list. Instead, you identify attributes in the field properties. See
Alternative method of adding a field to represent the uid attribute (see page 831).
Each object selected by the LDAP search can be represented as an entry in a vendor form. You
use Developer Studio to create a vendor form and add fields to which you attach LDAP data.
By default, the AR System server returns the Short Description field (field ID 8) in a results list.
Because vendor forms do not have a Short Description field, so you must define the fields that will
appear in the results list. Include the vendor form's key field in the results list so that each record is
uniquely identified. For more information, see Defining search results (see page 2328).
For general information about creating vendor forms, see Creating vendor forms (see page 860).
For an example of how to create a vendor form for LDAP data, see ARDBC LDAP example -
Accessing inetorgperson data (see page 828).
Objects in a directory service have an attribute called the distinguished name (dn), which uniquely
identifies each object. An object's distinguished name often consists of one attribute or multiple
concatenated attributes. For example:
uid=abarnes,ou=People,o=remedy.com
BMC Remedy AR System Request IDs are 15 bytes maximum in length and are assigned by AR
System when the entry is created. Distinguished names, on the other hand, are often longer than
15 bytes. However, you can map distinguished names longer than 15 bytes to AR System Request
IDs.
When designing an BMC Remedy AR System form to access data stored in a directory service,
you must determine what attribute to use to distinguish one object from another.
Note
If you specify an attribute for the Request ID that resolves to an empty value for an object
in the directory service, you receive an ARERR (100) Entry ID list is empty message, and
no records are displayed in the client. If more than one record has the same value, you
retrieve data only for the first matching entry.
For example, in a typical system the dn attribute uniquely identifies objects defined by the
inetorgperson object class. You would create a field for User ID and associate both the Request ID
field and the User ID field with the dn attribute.
Note
This is the only case where you should associate one attribute with more than one BMC
Remedy AR System field. Associating an attribute with more than one field might lead to
run-time errors or incorrect behavior.
In this topic:
To support the creation of objects by using the ARDBC LDAP plug-in, you must perform the
following tasks:
Create an BMC Remedy AR System field that is associated with the objectclass attribute.
The objectclass attribute is a multivalue attribute.
Create a field (other than Request ID) associated with dn, and define workflow that assigns
a value to it. Although entries in AR System are uniquely identified by the Request ID,
objects in a directory service are uniquely identified by the dn (distinguished name) attribute.
Add any attributes that are required to your AR System form. Many object classes require
that you specify values for certain attributes. These are similar to required fields in AR
System.
When you create an object, you must specify all the object classes from which the object inherits.
You must add a character field to your form, attach this field to the objectclass attribute, and use
the multivalue attribute notation (see Specifying multivalued attributes (see page 820)).
Because all objects associated with an AR System form belong to the same object classes, you
can easily set the default value of the field to the object class list. For example, the default value for
the object class field associated with an inetorgperson object class is this:
top,person,organizationalperson,inetorgperson
The inetorgperson class inherits from the top, person, and organizationalperson classes.
Because the value does not change for this field, you should make this field Read Only. You might
also want to make the field Hidden.
This differs from typical database applications and AR System, in which a column or field stores
only one value. To store two phone numbers in such applications, you must add a new column or
field to accommodate the additional data.
To resolve this difference between the two data models, use a special notation when specifying the
attribute name in the Field Properties window:
attributeName[*separatorString]
Values associated with attributeName are concatenated into a single value in AR System but
separated with separatorString. For example, to concatenate all values associated with the
telephoneNumber attribute and separate each value with a comma you would enter the following
as the attribute name in the Form Properties window:
telephoneNumber[*,]
You could then define workflow to extract, add, or modify values in the comma-separated list of
telephone numbers.
This is done using a filter that executes on a submit operation. You define the filter to perform a Set
Fields operation. For more information about creating filters, see the Developing section.
BMC Remedy AR System retrieves modifyTimestamp and whenChanged attributes from the
directory service. When creating a vendor form, add one of these fields to store a time stamp. In
the Advanced Search Bar, enter a query for records that meet your time-stamp criteria. For
example, use modifyTimeStamp >= "8/9/2007 4:00:00 PM" to consider only records
modified after 4:00 PM on 8/9/07.
This query is evaluated by the plug-in, which uses it to query the directory server so that it returns
only records modified after a specified time.
Using caching
The ARDBC LDAP plug-in uses client-side caching. Before a search request is sent to the directory
server, BMC Remedy AR System checks the cache to determine whether the same request was
made before. If an earlier request was cached, the search results are retrieved from the cache to
avoid running a new search on the server.
Use the ARDBC LDAP Configuration form to enable caching and to control caching by specifying
the maximum size of the cache and the maximum amount of time to keep an item in the cache.
Any field (except display-only fields) on the vendor form must reference an LDAP attribute
that exists in the specified context. For example, if you use MS Active Directories, the uid
attribute does not exist by default and should not be referenced in your vendor form. If you
specify invalid attributes, you might receive unexpected results on your searches.
If data is not being returned correctly, create a vendor form with only a Request ID and one
other field (referring to valid LDAP attributes). Test a search. If it works, continue adding
fields until you identify the one that does not work.
If any values are NULL, you receive ARERR (100) Entry ID list is empty, and no
records are displayed in the client.
If more than one record has the same value, you retrieve data only for the first
matching entry.
For most LDAP servers, dn is the attribute of choice for the Request ID. For MS
Active Directories, sAMAccountName is usually a good choice.
For optimal performance, set the Directory Page Size field to 1000.
If you configure the Base DN For Discovery field, the plug-in searches from this Base DN
rather than from the root DN. This offers better performance.
After you configure your AR System server, you configure AR System to use external
authentication processing. See Configuring authentication processing (see page ).
Before configuring the AREA LDAP plug-in, set up user and group information in an LDAP
directory service. Then, use the following procedure to enter the settings into the AREA LDAP
Configuration form.
1. In the AR System Administration Console, click System > LDAP > AREA Configuration. The
AREA LDAP Configuration form appears.
If any AREA LDAP server configurations are configured for your AR System server, they
are displayed in the Configuration List at the top of the form. When BMC Remedy AR
System attempts to authenticate a user, it searches each LDAP server configuration in the
list.
2. In the Configuration List, perform one of these actions:
To create a configuration, click Clear Fields. All fields in the form are cleared.
To modify a configuration, select it in the list. The fields in the form are populated with
data from that configuration.
3. In the Directory Service Information section, fill in (for new configuration) or change (for
modified configuration) the values in these fields:
Host Name — Name of one or more servers on which the directory service is hosted.
You can specify a space-separated list of host names up to 255 characters long.
Starting with the first host name in the list, BMC Remedy AR System tries to connect
to each server until it is successful.
Port Number — Number of the port on which the directory service is listening.
Bind User
— Distinguished name for this configuration. The distinguished name is the name for
a user account that has read permissions and can search the directory service for
user objects.
Bind Password — Password for the distinguished name specified for the Bind user.
Use Secure Socket Layer? — Yes/No toggle field. To specify an SSL connection to
the directory service, select Yes to enable the Certificate Database field.
Certificate Database — The absolute path to the certificate datastore and the name
of the .jks file. For example: C:\certificate\certdb.jks.
Failover Timeout — Number of seconds in which the directory service must respond
to the plug-in server before an error is returned. Minimum value is 0 (connection must
be made immediately). This value cannot be higher than the value of the External-
Authenticaion-RPC-Timeout parameter.
Chase Referral — Yes/No toggle field. When the AREA LDAP plug-in sends a
request to a directory server, the server might return a referral to the plug-in if some
or all of the requested information is stored in another server. Attempting to chase the
referral by connecting to the other server can cause authentication problems. By
default, referrals are not chased. Yes enables automatic referral chasing by the LDAP
client. No prevents referral chasing.
Note
This option is only for Microsoft Active Directory servers. Select No for all
other directory servers.
Important
BMC Remedy AR System does not support referrals that use a domain
name rather than a host name as a reference. When Active Directory
automatically configures referrals (such as when a trust or parent/child
domain relationship is created), it uses a domain name in the referral.
Therefore, such referrals do not work in BMC Remedy AR System even
when Chase Referral is set to Yes.
4. In the User and Group Information section, fill in or change the values in these fields:
User Base — Base name of the search for users in the directory service (for
example, o=remedy.com ).
User Search Filter — Search criteria for locating user authentication information. You
can enter the following keywords in this field. At run time, the keywords are replaced
by the values they represent. $\USER$ — Name of the user logging in (for example,
uid=$\USER$ ). $\DN$ — Distinguished name of the user logging in.
$\AUTHSTRING$ — Value users enter in the Authentication String field when they
log in. $\NETWORKADDR$ — IP address of the AR System client accessing the AR
System server.
Group Membership — If this user belongs to a group, select Group Container;
otherwise, select None. When None is selected, the Group Base, Group Search
Filter, and Default Group(s) fields are disabled.
Group Base — Base name of the search for groups in the directory service that
includes the user who is logging in (for example, ou=Groups ).
BMC Remedy AR System performs a subtree search within the group you specify.
Group Search Filter — Search criteria for locating the groups to which the user
belongs. For the user's distinguished name, enter the keyword $\DN$ (for example,
uniqueMember=$\DN$ ). At run time, $\DN$ is replaced with the distinguished name.
Default Group(s) — If the search finds no matching groups, the group specified in this
field is used.
5. In the Defaults and Mapping Attributes to User Information section, perform these actions:
a. In the LDAP Attribute Name column, enter the corresponding LDAP attribute names
for the following AR System fields.
b. In the Default Value If Not Found In LDAP column, select or enter a default value for
each field if no value is found in the directory service.
License Mask— Number for the license mask. The license mask specifies
whether the AREA plug-in overrides existing information from the User form for
write and reserved licenses. It also specifies which license types are
overridden by the value returned by the plug-in. Use a number from the
following table. An X in a license type column means that the value returned
from the plug-in overrides that license in the User form for the specified user.
License mark number Overridden license types
0 - - - -
1 - - - X
2 - X - -
3 - X - X
4 - - X -
5 - - X X
6 - X X -
7 - X X X
8 X - - -
9 X - - X
10 X X - -
11 X X - X
12 X - X -
13 X - X X
14 X X X -
15 X X X X
Note
1. In the AR System Administration Console, click System > LDAP > AREA Configuration. The
AREA LDAP Configuration form appears.
2. In the Configuration List, select the configuration to delete.
3. Click Delete Configuration. The system removes the corresponding parameters from the AR
System configuration settings.
Note
Note
For maximum benefit, map LDAP groups to AR System groups and ignore excess LDAP
groups (see Ignoring excess LDAP groups (see page 827)).
1. Open the AR System Administration: Server Information form, and click the EA tab.
2.
BMC Remedy Action Request System 9.1 Page 826 of 4703
BMC Software Confidential. BladeLogic Confidential.
2. Click in the Group Mapping table to add a row, and enter the names of the LDAP and BMC
Remedy AR System groups to map. Enter only one group name in each column.
Note
You can map many LDAP groups to a single AR System group. If you map a
single LDAP group to many AR System groups, BMC Remedy AR System uses
only the first mapping.
Note
For maximum benefit, ignore excess LDAP groups and map LDAP groups to AR System
groups (see Mapping LDAP groups to AR System groups (see page 826)).
1. Open the AR System Administration: Server Information form, and click the EA tab.
2. In the Group Mapping box, select the Ignore Excess Groups check box.
3. Click Apply and OK.
For more information, see Configuring authentication processing (see page 851).
After you configuring your AREA LDAP plug-in and your AR System server, you configure AR
System to use external authentication processing. See Configuring authentication processing (see
page ).
Note
You must install and configure your ARDBC plug-in before you can create a vendor to
use the plug-in. See Creating C plug-ins (see page ) and Configuring the ARDBC
LDAP plug-in (see page ).
form. The data that corresponds to your new object class should contain the following attributes: uid
, sn, dn, cn, ou, and objectclass. Instructions about how and when to change the objectclass file
are presented later in this section. The form and workflow are provided with the LDAP plug-in
software distribution in the inetorgperson.def file, typically found in the
<ARSystemServerInstallDir>\Plugins\ARDBC folder.
Note
The inetorgperson vendor form, that is installed by default, is a sample vendor form with
default vendor information. The vendor information needs to be configured for a specific
environment before the form can be used. The default data is just a placeholder and will
not work.
Note
If you are using Microsoft Active Directory, then the URL for inetorgperson is:
ldap://LDAPDirectoryServiceHost:3268/DC=ad,DC=internal??sub?
(objectclass=user).
If your LDAP server does not contain the inetorgperson object class, select a
comparable objectclass, such as person.
To delete a field from the vendor form, click a field and select Edit > Delete. Deleted
fields are returned to the Add Fields list for later access, if needed. This only deletes
the AR System field. It does not remove the column from the database table.
You can also define an attribute to support more that one value. For more information on
multivalued attributes, see Specifying multivalued attributes (see page ).
The following procedure shows how to create an AR System filter to assemble the distinguished
name using the inetorgperson example.
To define an AR System filter to construct the distinguished name using the inetorgperson
scenario
Distinguished Entry Mode: Optional Read/Write Default Value: none Vendor Information Column: dn
Name
Object Class Entry Mode: Required Read Only Default Value: top, person, organizationalPerson, inetorgperson Vendor
Information Column: objectclass[,]*
Last Name Entry Mode: Required Read/Write Default Value: none Vendor Information Column: sn
Common Entry Mode: Required Read/Write Default Value: none Vendor Information Column: cn
Name
Organization Entry Mode: Required Read/Write Default Value: People Vendor Information Column: ou[,]*
Unit
In this scenario, the form looks like the form in the following figure.
Important
The BMC Remedy Single Sign-On installer does not perform unintegration. If the user
wants to integrate BMC Remedy Single Sign-On with a supported BMC application which
is already integrated with BMC Atrium Single Sign-On, the previous integration has to be
removed manually.
The following topics provide information and instructions for integrating BMC products with BMC
Atrium Single Sign-On:
Integrating BMC Remedy Single Sign-On with BMC Remedy AR System (see page 834)
Integrating BMC Remedy Single Sign-On with BMC Remedy Mid Tier (see page 837)
Integrating BMC Remedy Single Sign-On with BMC Remedy with Smart IT or BMC MyIT
(see page 839)
Integrating BMC Remedy Single Sign-On integration with BMC Analytics for BSM (see page
843)
Migrating from BMC Atrium Single Sign-On to BMC Remedy Single Sign-On (see page 848)
Note
BMC supports only BMC Remedy Single Sign-On with BMC Remedy Action Request
System 9.1. Note that BMC Atrium Single Sign-On is not supported.
Related topics
Orientation (see page 94)
Configuring BMC Remedy Single Sign-On for authentication (see page 701)
Troubleshooting BMC Remedy Single Sign-On integration issues
Important
The BMC Remedy Single Sign-On installer does not perform unintegration. If the user
wants to integrate BMC Remedy Single Sign-On with a supported BMC application which
is already integrated with BMC Atrium Single Sign-On, the previous integration has to be
removed manually.
To integrate BMC Remedy Action Request System (BMC Remedy AR System) with the BMC
Remedy Single Sign-On, you must run the BMC Remedy Single Sign-On installer on the computer
on which the BMC Remedy AR System server is installed. You must have the BMC Remedy Single
Sign-On server and the BMC Remedy AR System server running before performing the integration.
For more information, see Installing BMC Remedy AR System and Installing BMC Remedy
Single Sign-On .
Note
BMC supports only BMC Remedy Single Sign-On with BMC Remedy Action Request
System 9.1. Note that BMC Atrium Single Sign-On is not supported.
To run BMC Remedy Single Sign-On on the BMC Remedy AR System server
Note
The URL must be the Fully Qualified Domain Name (FQDN) only and not IP
addresses or short aliases as they do not preserve cookie domain and prevent
functioning of BMC Remedy Single Sign-On.
Even when you access applications, use FQDN. For example, remedy.bmc.com.
9. Check the installation preview and then click Install to complete the integration.
Note
After the BMC Remedy AR System integration is completed, the installer restarts
the AR System server. If you receive a warning message that the AR System
server restart has failed, check the status of the server. If the server is not running,
restart the server manually.
(optional) Silent integration of BMC Remedy Single Sign-On with BMC Remedy
AR System
You may integrate BMC Remedy Single Sign-On with BMC Remedy AR System using the silent
mode.
To integrate BMC Remedy Single Sign-On with BMC Remedy AR System using the silent
mode
Run the installer with the -i silent option:
-A productRemedySSO
-J AR_TYPE=true
-J AR_HOME=<path_to_AR_server_home>
-J INT_URL=<internal_RSSO_url>
Related topics
Important
The BMC Remedy Single Sign-On installer does not perform unintegration. If the user
wants to integrate BMC Remedy Single Sign-On with a supported BMC application which
is already integrated with BMC Atrium Single Sign-On, the previous integration has to be
removed manually.
To integrate BMC Remedy Mid Tier with BMC Remedy Single Sign-On, you must run the BMC
Remedy Single Sign-On installer on the computer on which BMC Remedy Mid Tier is installed.
For more information, see Installing BMC Remedy AR System and Installing BMC Remedy
Single Sign-On .
Important
After successful integration, the server hosting BMC Remedy Mid Tier will be
restarted.
7. Enter the directory path where BMC Remedy Mid Tier is installed.
8. Enter the URL to redirect unauthenticated user requests to BMC Remedy Single Sign-On for
authentication.
9. Enter the URL for communication between BMC Remedy Single Sign-On and agent.
Note
The URL must be the Fully Qualified Domain Name (FQDN) only and not IP
addresses or short aliases as they do not preserve cookie domain and prevent
functioning of BMC Remedy Single Sign-On.
Even when you access applications, use FQDN. For example, remedy.bmc.com.
10. Check the installation preview and then click Install to complete the integration.
(optional) Silent integration of BMC Remedy Single Sign-On with BMC Remedy
Mid Tier
You may integrate BMC Remedy Single Sign-On with BMC Remedy Mid Tier using the silent
mode.
To integrate BMC Remedy Single Sign-On with BMC Remedy Mid Tier using the silent mode
Run the installer with the -i silent option:
-A productRemedySSO
-J MT_TYPE=true
-J MT_HOME=<path_to_Midtier_home>
-J MT_PATH=<path_to_Midtier_server_home>
-J INT_URL=<internal_RSSO_url>
-J EXT_URL=<external_RSSO_url>
Related topics
Important
The BMC Remedy Single Sign-On installer does not perform unintegration. If the user
wants to integrate BMC Remedy Single Sign-On with a supported BMC application which
is already integrated with BMC Atrium Single Sign-On, the previous integration has to be
removed manually.
This topic describes how to integrate BMC Remedy Single Sign-On with Smart IT (Smart IT) or
BMC MyIT.
Install BMC Remedy Single Sign-On and configure realms to support the needed
authentication methods.
Install BMC MyIT 2.1 or later.
Verify that access to the BMC MyIT and BMC Remedy Single Sign-On servers occurs
through the same domain. Otherwise, deploying the BMC Remedy Single Sign-On agent will
not work.
Important
After successful integration, the server hosting BMC Remedy with Smart IT or
BMC MyIT will be restarted.
10. Enter the URL to redirect unauthenticated user requests to BMC Remedy Single Sign-On for
authentication.
11. Enter the URL for communication between BMC Remedy Single Sign-On and agent.
Note
The URL must be the Fully Qualified Domain Name (FQDN) only and not IP
addresses or short aliases as they do not preserve cookie domain and prevent
functioning of BMC Remedy Single Sign-On.
Even when you access applications, use FQDN. For example, remedy.bmc.com.
12. Check the installation preview and then click Install to complete the integration.
(optional) Silent integration of BMC Remedy Single Sign-On with BMC MyIT
You may integrate BMC Remedy Single Sign-On with BMC MyIT using the silent mode.
To integrate BMC Remedy Single Sign-On with BMC MyIT using the silent mode
Run the installer with the -i silent option:
-A productRemedySSO
-J MI_TYPE=true
-J MI_HOME=<path_to_Midtier_home>
-J MI_WEBSERVER_PATH=<path_to_Midtier_server_home>
-J INT_URL=<internal_RSSO_url>
-J EXT_URL=<external_RSSO_url>
-J MI_USER=<MyIT_user_name>
-J MI_USER_PASSWD=password
-J MI_USER_PASSWD_CNFRM=password
Related topics
Prerequisites for Integrating BMC Remedy Single Sign-On with BMC Analytics for BSM (see
page 843)
Perform BMC Remedy Single Sign-On integration with BMC Analytics for BSM (see page
845)
Prerequisites for Integrating BMC Remedy Single Sign-On with BMC Analytics for
BSM
This topics provides prerequisites for integrating BMC Remedy Single Sign-On with BMC Analytics
for BSM.
Software requirement
The Tomcat for SAP BI (Business Intelligence) must use Java 1.7 or a higher version.
Note
Pre-integration procedures
Take a backup of the following file and then delete it:
<tomcat>/webapps/BI/WEB-INF/webagent.jar
If BMC Analytics for BSM does not use BMC Atrium Single Sign-On for authentication, perform the
following steps:
i.
BMC Remedy Action Request System 9.1 Page 844 of 4703
2.
a. BMC Software Confidential. BladeLogic Confidential.
Perform BMC Remedy Single Sign-On integration with BMC Analytics for BSM (see page
845)
Perform BMC Remedy Single Sign-On integration with BMC Analytics for BSM
Important
The BMC Remedy Single Sign-On installer does not perform unintegration. If the user
wants to integrate BMC Remedy Single Sign-On with a supported BMC application which
is already integrated with BMC Atrium Single Sign-On, the previous integration has to be
removed manually.
If you plan to use BMC Remedy Single Sign-On for authentication, you must install and configure
the BMC Remedy Sign-On server before installing BMC Analytics for Business Service
Management (BMC Analytics for BSM).
Install and configure the BMC Remedy Sign-On server first and then install BMC Analytics
for BSM.
BMC Analytics for BSM is compatible with Apache Tomcat or Microsoft IIS. If you are using
BMC Single Sign-On with BMC Analytics for BSM, only Apache Tomcat is supported.
Ensure that all the prerequisites mentioned in Prerequisites for Integrating BMC Remedy
Single Sign-On with BMC Analytics for BSM (see page 843) are met.
Ensure that the DNS domain or subdomain of your SAP BusinessObjects BI Platform host is
consistent with the 'Cookie Domain' configuration of the BMC Remedy Single Sign-On
server.
To integrate BMC Remedy Single Sign-On with BMC Analytics for BSM
Important
After successful integration, the server hosting BMC Analytics for BSM will be
restarted.
7. Enter the directory path where BMC Analytics for BSM is installed.
8. Enter the URL to redirect unauthenticated user requests to BMC Remedy Single Sign-On for
authentication.
9. Enter the URL for communication between BMC Remedy Single Sign-On and agent.
Note
The URL must be the Fully Qualified Domain Name (FQDN) only and not IP
addresses or short aliases as they do not preserve cookie domain and prevent
functioning of BMC Remedy Single Sign-On.
Even when you access applications, use FQDN. For example, remedy.bmc.com.
10. Check the installation preview and then click Install to complete the integration.
(optional) Silent integration of BMC Remedy Single Sign-On with BMC Analytics for BSM
You may integrate BMC Remedy Single Sign-On with BMC Analytics for BSM using the silent
mode.
To integrate BMC Remedy Single Sign-On with BMC Analytics for BSM using the silent mode
Run the installer with the -i silent option:
-A productRemedySSO
-J AL_TYPE=true
-J ANALYTICS_HOME=<path_to_Analytics_home>
-J ANALYTICS_WEBSERVER_PATH=<path_to_Analytics_server_home>
-J INT_URL=<internal_RSSO_url>
-J EXT_URL=<external_RSSO_url>
Related topics
1. Install BMC Remedy Single Sign-On BMC Remedy Single Sign-On installer does the following:
2. Configuring BMC Remedy Single Sign-On BMC Remedy Single Sign-On can be configured to process end user's
for authentication (see page 701) authentication against AR, SAML v2, and LDAP user stores,
3. Integrate BMC Remedy AR System with Perform the following steps to integrate BMC Remedy AR System with
BMC Remedy Single Sign-On BMC Remedy Single Sign-On
File Modifications
File Modifications
atsso-sdk.jar
atsso-common.jar
bcprov-jdk15-145.jar
simple-xml-2.5.3.jar
stax-1.2.0.jar
stax-api-1.0.1.jar
4. Integrate BMC Remedy Mid Tier with BMC Perform the following steps to integrate BMC Remedy Mid Tier with BMC
Remedy Single Sign-On Remedy Single Sign-On
1. Unintegrate BMC Remedy Mid Tier from BMC Atrium Single Sign-
On.
a. Stop BMC Remedy Mid Tier.
b. Take a backup of the “atssoAgents” folder under apache
/tomcat.. and then delete it.
c. Modify and save the following files.
File Modifications
(Midtier/WEB- arsystem.authenticator
INF/classes/)
File Modifications
<dispatcher>REQUEST</dispatcher>
<dispatcher>INCLUDE</dispatcher>
<dispatcher>FORWARD</dispatcher>
<dispatcher>ERROR</dispatcher>
</filter-mapping>-->
atsso-common.jar
atsso-sdk.jar
bcprov-jdk15-145.jar
json.jar
simple-xml-*.jar
stax-1.2.0.jar
stax-api-1.0.1.jar
webagent.jar
2. Integrate BMC Remedy Mid Tier with BMC Remedy Single Sign-On (see
page 837).
Related topics
1. Create a library (.dll or .so) to handle AREA API calls. See these sections:
Creating C plug-ins (see page )
Common plug-in C functions and Java methods (see page )
AREA plug-in C API functions (see page )
2. Link to the AREA library.
3. Install the AREA library on the computer or computers that contain the AR System server.
4. Configure the AR System server to use external authentication. See Configuring
authentication processing (see page ).
For information about configuring the plug-in, see Configuring the AREA LDAP plug-in (see page
).
To use external authentication, select one of the following options in the EA tab in the AR System
Administration: Server Information form:
Authenticate Unregistered Users — If a user is not in the User form, BMC Remedy AR
System tries external authentication. See Authenticating unregistered users (see page ).
Note
Cross Reference Blank Password — If a user does not provide a password, BMC Remedy
AR System tries to cross-reference the user with an external source. See Cross-referencing
blank passwords (see page ).
Important
To use external authentication, you must set the External Authentication Server RPC
Program Number field to 390695.
Note
You cannot get admin group permissions from the user's group list if the user is returned
through external authentication. You can get admin group permissions only from the User
form.
1. Open the AR System Administration: Server Information form, and click the EA tab.
2. In the External Authentication Server RPC Program Number field, enter 390695.
3. Select the Authenticate Unregistered Users check box.
4. Click Apply and OK.
1. Open the AR System Administration: Server Information form, and click the EA tab.
2. In the External Authentication Server RPC Program Number field, enter 390695. For
information about authentication behavior for 390695 RPC program number, see AREA
behavior when the RPC program number is 390695 (see page 855).
3. Select the Cross Reference Blank Password check box.
4. Click Apply and OK.
When Authentication Chaining is enabled, all authentication methods in the chain are attempted in
the specified order until either authentication succeeds or all the methods in the chain fail.
1. Open the AR System Administration: Server Information form, and click the EA tab.
2. In the External Authentication Server RPC Program Number field, enter 390695.
3. Select Authenticate Unregistered Users, Cross Reference Blank Password, or both.
4. From the Authentication Chaining Mode list, select one of these values:
Mode Description
ARS - AREA BMC Remedy AR System attempts to authenticate the user by using the User form and then the AREA
plug-in.
AREA - ARS BMC Remedy AR System attempts to authenticate the user by using the AREA plug-in and then the
User form.
Mode Description
ARS - OS - BMC Remedy AR System attempts to authenticate the user by using the User form, then Windows or
AREA UNIX authentication, and then the AREA plug-in.
ARS - AREA BMC Remedy AR System attempts to authenticate the user by using the User form, then the AREA plug-
- OS in, and then Windows or UNIX authentication.
Note
Note
Note
If you use the AREA hub, the authentication chaining mode treats it like a single
plug-in, and plug-ins installed in the AREA hub are considered in sequence until a
valid response is returned. See Setting up the AREA hub (see page ).
The following sections describe BMC Remedy AR System authentication behavior for given
configurations.
AREA behavior when the RPC program number is 390695 (see page 855)
AREA behavior when the RPC program number is 0 (see page 857)
Off
Authentication is performed using AREA LDAP. User information is retrieved from AREA LDAP.
ARS - AREA
Authentication is not performed using BMC Remedy AR System because the user does not exist in the
User form.
Authentication is performed using AREA LDAP. If successful, user information is retrieved from AREA
LDAP.
AREA - ARS
Authentication is performed using AREA LDAP. If successful user information is retrieved from AREA
LDAP.
Authentication is not performed using BMC Remedy AR System because the user does not exist in the
User form.
ARS - OS -
AREA Authentication is not performed using BMC Remedy AR System because the user does not exist in the
User form.
Authentication is performed using OS authentication. If successful, user information is retrieved from
the OS.
If OS authentication fails, user authentication is performed using AREA LDAP. If AREA LDAP
authentication is successful, user information is retrieved from AREA LDAP.
ARS - AREA -
OS Authentication is not performed using BMC Remedy AR System because the user does not exist in the
User form.
Authentication is performed using AREA LDAP. If successful, user information is retrieved from AREA
LDAP.
If AREA LDAP authentication fails, the user is authenticated using OS authentication. If OS
authentication is successful, user information is retrieved from the OS.
Off
Authentication is performed using AREA LDAP password. User information is retrieved from the User
form.
ARS - AREA
Authentication is performed using AREA LDAP password. User information is retrieved from User form.
Authentication process stops when it fails using AREA LDAP.
AREA - ARS
Authentication is performed using AREA LDAP. If successful, user information is retrieved from AREA
LDAP. If AREA LDAP configuration does not contain all the information in the form, missing information is
retrieved from the User_Cache.
If AREA LDAP authentication fails, authentication processing stops.
ARS - OS -
AREA User authentication is performed using AREA LDAP. If successful, user information is retrieved from
BMC Remedy AR System.
If AREA LDAP authentication fails, the user is authenticated using OS authentication. If OS authentication
is successful, user information is retrieved from BMC Remedy AR System.
The user is never authenticated using User form.
ARS - AREA -
OS User authentication is performed using AREA LDAP. If successful, user information is retrieved from
BMC Remedy AR System.
If AREA LDAP authentication fails, the user is authenticated using OS authentication. If OS authentication
is successful, user information is retrieved from BMC Remedy AR System.
The user is never authenticated using User form.
Off
Authentication is performed using the AR System User Form. If successful, user information is retrieved
from the User form.
If User form authentication fails, authentication is not attempted using AREA LDAP.
ARS - AREA
Authentication is performed using the AR System User form. If successful, user information is retrieved
from the User form.
If User form authentication fails, AREA LDAP authentication is attempted. If AREA LDAP authentication
is successful, user information is retrieved from AREA LDAP.
AREA - ARS
Authentication is performed using AREA LDAP. If successful, user information is retrieved from AREA
LDAP.
If AREA LDAP authentication fails, authentication is attempted using User form. If User form
authentication is successful, user information is retrieved from the User form.
ARS - OS -
AREA Authentication is performed using the AR System User form. If successful, user information is retrieved
from the User form.
ARS - AREA -
OS Authentication is performed using the AR System User form. If successful, user information is retrieved
from the User form.
If BMC Remedy AR System authentication fails, AREA LDAP authentication is attempted. If AREA
LDAP authentication is successful, user information is retrieved from AREA LDAP.
If AREA LDAP authentication fails, OS authentication is attempted. If OS authentication is successful,
user information is retrieved from the OS.
Off
Authentication is performed using the AR System User form. If successful, user information is retrieved
from the User form.
If BMC Remedy AR System authentication fails, authentication processing stops.
ARS - AREA
Authentication is performed using the AR System User form. If successful, user information is retrieved
from the User form.
If BMC Remedy AR System authentication fails, OS authentication is attempted. If OS authentication is
successful, user information is retrieved from the OS.
AREA - ARS
Authentication is performed using OS authentication. If successful, user information is retrieved from
the OS.
If OS authentication fails, User form authentication is attempted. If BMC Remedy AR System
authentication is successful, user information is retrieved from the User form.
ARS - OS -
AREA Authentication is performed using the AR System User form. If successful, user information is retrieved
from the User form.
If BMC Remedy AR System authentication fails, OS authentication is attempted. If OS authentication is
successful, user information is retrieved from the OS.
ARS - AREA -
OS Authentication is performed using the AR System User form. If successful, user information is retrieved
from the User form.
If BMC Remedy AR System authentication fails, OS authentication is attempted. If OS authentication is
successful, user information is retrieved from the OS.
The AREA Hub loads the Hub-plug-ins in the order in which they appear in the ar.cfg or ar.conf file.
That is, the first entry the AREA Hub finds in the ar.cfg file is the first plug-in loaded, the second
entry the second, and so on.
Notes
You do not need to configure the AREA Hub manually to use multiple AREA LDAP
plug-ins. See Configuring the AREA LDAP plug-in (see page ).
The AREA hub works only with DLLs. Java plug-in server has an inbuilt capability
to chain across multiple Java AREA plug-ins. So, you do not need AREA hub for
Java. You can configure multiple AREA Java plug-ins in pluginsvr_config.xml
1. Create the following entry for the AREA hub in the ar.cfg file:
Plugin: areahub.dll
Note
Make sure this is the only entry for an AREA plug-in in your ar.cfg file.
AREA-Hub-Plugin: my_area_plug-in.dll
AREA-Hub-Plugin: my_area_plug-in_1.dll
AREA-Hub-Plugin: my_area_plug-in_2.dll
AREA-Hub-Plugin: my_area_plug-in_3.dll
Note
For information about restarting the plug-in server, see Restarting the plug-in
server using the Set Server Info command (see page ).
1. In a text editor, open the armonitor.cfg file (Windows) or the armonitor.conf file (UNIX).
Windows: ARSystemServerInstallDir\Conf\armonitor.cfg
UNIX: /etc/arsystem/serverName/armonitor.conf
2. Update the following line
D:\Program Files\Java\jre6\bin\java"
-Datsso.sdk.in.fips140.mode=true -Xmx512m -classpath
"D:\ARSystem\pluginsvr;D:\ARSystem\pluginsvr\arpluginsvr81_build
002.jar" com.bmc.arsys.pluginsvr.ARPluginServerMain -x iBMC-66R37BS -i
"D:\ARSystem" -m
You can now proceed with the integration of BMC Atrium SSO and BMC Remedy AR System. For
steps of integration, see Running the SSOARIntegration utility on the AR System server in BMC
Atrium Single Sign-On online documentation.
Vendor forms allow AR System to present data from external sources as entries in an AR System
form. When you create a vendor form, you can request a list of candidate forms or fields (preferred
method) or you can enter the information yourself.
Vendor forms require you to have an ARDBC plug-in installed and configured. The ARDBC plug-in
and the plug-in server handle data exchange between BMC Remedy AR System and the external
data source. The AR System server maps the external data to fields in the vendor form, and the
form displays the data. See ARDBC plug-ins introduction (see page ).
You can create a vendor form after you have built and installed your ARDBC plug-in, and
configured your server to recognize it. For information about configuring your server to recognize a
plug-in, see the Configuring after installation section.
Note
Creating a vendor form for an ARDBC LDAP plug-in is a special case. See Creating a
vendor form to represent a collection of LDAP objects (see page ).
The vendor form can be manipulated as a regular form type with the following exceptions:
You can add only Required and Optional fields that correspond to actual columns in the data
source. In addition, you can add a Display Only field only when the column name does not
correspond to a column in the data source.
1. In BMC Remedy Developer Studio, choose File > New > Vendor Form.
The New Vendor Form Wizard appears.
2. Select the server on which you want to create the vendor form, and click Next.
3. Select the ARDBC plug-in to use in the list of Available Vendor Names, and click Next.
4. Choose a table from the list of Available Vendor Tables and click Next.
Alternatively, type a table name in the Table field, click Validate, then click Next.
5. (optional) On the Field Selection page, choose a key column in the Key Field list box.
The key column uniquely identifies the entries in your vendor form. Key values are mapped
to the Request ID field on the Vendor Form.
6. In the Available Columns list on the Field Selection page, select columns to access in BMC
Remedy AR System. Use the arrow buttons to move them to the Selected Columns list.
Note
For information on creating a join form using a vendor form, see Requirements for
creating a join form using a vendor form (see page 2312).
BMC Remedy AR System does not support Vendor form search if you have read-only database.
For more information on using read-only database, see Using read-only database (see page 308).
View forms
View forms enable BMC Remedy AR System to point to and access data in relational database
tables outside BMC Remedy AR System. The table can be located on the same database instance
or in any other database accessible from the current AR System database.
Because view forms access data outside of BMC Remedy AR System, the developer must
understand the database data types and must have access to the external database table
containing the data. This section describes the requirements for using view forms and the data
types supported for each database.
In this topic:
The following procedure explains how to create a view form to connect to a database table.
1. If the database is remote, set it up as described in Setting up a remote database for view
forms (see page ).
2. In Developer Studio, choose File > New > View Form.
3. In the New View Form wizard, select the server on which you want to create the view form,
and click Next.
4. Enter the name of an existing database table to be associated with the view form (see the
following figure).
The formats for table names are as follows. Where two formats are given, the first is for a
table in the local database and the second for a table in a remote database:
Oracle — TABLENAME or OWNER.TABLENAME
Oracle defaults to all capital letters for data in its system tables. If the table name
uses lower case, make sure that the capitalization for the name is entered correctly.
Microsoft SQL Server — TABLENAME or LINKNAME.DATABASENAME.OWNER.
TABLENAME
5.
BMC Remedy Action Request System 9.1 Page 863 of 4703
BMC Software Confidential. BladeLogic Confidential.
5. Click Load.
The Available Columns list box is populated with the database column names and default
AR System field type mappings for the supported data types.
New View Form wizard, View Form Properties page
6. In the Key Field list box, choose a column to designate as the key field.
You must choose either a character column with a name that contains 6 through 15
characters, or an integer column.
Warning
7.
BMC Remedy Action Request System 9.1 Page 864 of 4703
BMC Software Confidential. BladeLogic Confidential.
7. In the Available Columns list, select the columns to appear on the AR System form, and use
the arrow buttons to move them to the Selected Columns list.
This method maps the default AR System field type to the database data type. To use a
different AR System field type for a database column, do not select the column from the list
as described in this step. Instead, follow the steps in Mapping an alternative AR System field
type below.
8. Click Finish.
9. Use Developer Studio to make any additional changes to the new form, and then click File >
Save.
1. Create the view form as described in To create a view form (see page 863), but in step 7
(see page 864), do not select the column to which you want to map an alternate field type.
2. After saving the form, add a field of the appropriate type to the form.
3. In the field properties tab, expand the View Information properties.
4. Click the Columnproperty and type the database column name.
Warning
Do not create a form with multiple fields referring to a single column. Such a form
will produce adverse results and may generate SQL errors.
To add a new field to a view form using the default field type
1. Choose Form > Add Fields From externalDBName from the menu.
2. Select the field to add from the Add Field dialog box, and click OK.
In this topic:
SQL Server data type mappings for view forms (see page 866)
Oracle data type mappings for view forms (see page 867)
Beginning with release 7.6.02, view forms support additional data types. This includes blobs
(Oracle) and images (Microsoft SQL Server), which map to an attachment field, and several date
and time data types, which map to the Date, Time, or Date/Time field types as shown in this
section. (For view forms created in previous releases of AR System, Date/Time fields that were
mapped to an integer column are still supported.)
In some cases, you can map a different field type to a column type if appropriate for the data. See
Mapping an alternative AR System field type (see page 865).
Note
When the data types nchar, nvarchar, or ntext are supported, they are used on Unicode
servers, and the char, varchar, and text data types are used on non-Unicode servers.
For information about the database column types used for AR System fields in regular forms, see
Database column types used for AR System fields (see page 1983).
decimal Decimal
number Integer
float Real
number Decimal
Before creating a view form, identify the database table to use and verify that the following
requirements are met:
The database table must reside on, or be accessible to, the database that AR System is
using.
The ARAdmin user must have read and write access privileges on the database table.
The database table must have a column (field) that enforces non-null and unique values.
This column acts as the Request ID. If the administrator chooses a column that is not unique
or that allows nulls, data corruption might occur. The Request ID field must be an integer or
character field with 6-15 characters. Otherwise, the Key Field list is empty, and you cannot
create the view form. If the administrator chooses a character column for the Request ID,
then the field length must be the same as the column length.
You can use a view form to access BLOBs on a remote database, but not CLOBs.
Long columns (that is, text or clob ) must allow null values.
There are additional configuration requirements if the table to be used with the view form is on a
remote database. See Setting up a remote database for view forms (see page ).
You can add only Required and Optional fields that correspond to actual columns in the data
source. You can add a Display Only field only when the column name does not correspond
to a column in the data source.
After you attach an AR System field to a column in the database table, you cannot reattach
the field to a different column, but you can change other field properties.
Status history, diary, currency, and attachment fields are not supported on view forms.
You cannot change the type of a text field or change the length of any field after initial
creation.
BCE dates are not supported in date fields in a view form.
Oracle — Set up a link between the AR System database and the Oracle database. Create
a view in the database user's schema which accesses this link (the user is ARADMIN by
default).
For example:
CREATE VIEW view_name AS (SELECT * FROM ownername.tablename@link)
Create the View Form on the view created above.
To enable the support of multiple remote Oracle databases with different character sets, you
must add the Oracle-Dblink-Character-Set parameter to your ar.cfg (ar.conf ) file. For more
information, see the Configuring after installation section.
Microsoft SQL Server — Complete the following tasks:
Create a link to the remote database and either give the user ARAdmin an account
on the remote database or use the proper login credentials.
Turn on the Distributed Transaction Coordinator for both the local and the remote
databases.
Specify the following server configuration setting in the ar.conf (ar.cfg ) file:
SQL-Server-Set-ANSI-Defaults: T
This setting enables the DB-Library connection that AR System uses to use ANSI-
NULLs and ANSI warnings. There should be no impact on the performance of the
database. For more information about the ar.conf (ar.cfg ) file, see the Configuring
after installation section.
The format for the table name is:
LINKNAME.DATABASENAME.OWNER.TABLENAME
For more information about the AR System database, see Understanding the AR System database
(see page 1957).
You need not use every value that is returned from the SQL command, but you must use at
least one.
You can use the same value in more than one field.
You can issue only one SQL command per action. You cannot enter two commands
separated by a semicolon and have both commands run. To run a set of commands, create
separate actions, or create a stored procedure and run that. (Stored procedures do not
return values.)
Turn on AR System server SQL logging to resolve problems with the SQL syntax if it returns
unexpected values or results. A good strategy is to start an SQL interpreter (for example,
SQL*Plus for Oracle, Query Analyzer for Microsoft SQL Server) and to enter the same SQL
command directly into the database to verify its validity.
Because there is no error checking on the SQL statement, run the SQL statement directly
against the database (as a test) before you enter it into the SQL Command field. You can
then copy and paste the tested SQL command directly into the SQL Command field.
If the SQL operation fails, an AR System error message and the underlying database error
message appear.
For more information, see Set Fields action and structures (see page 3492).
The AR System server typically has full administrator access to the database for reading
and writing any data. AR System users have permissions to read and write specific data
using an AR System client, and these permissions are managed by the AR System server. If
users access the database directly through a database client, they are bypassing the AR
System security model.
BMC Remedy AR System stores some data in the database in formats that can cause third-
party applications to become confused. For example, AR System date/time fields store
values as timeticks, which are the number of seconds from 1 January 1970 at midnight until
the current time. These numbers are stored as integer numbers, and typically need to be
converted by the third-party application.
All SQL commands are sent to the database server that holds the AR System database. To
access databases that are external to this DB server, you must have the appropriate conduit
installed and issue the SQL commands needed to use the conduit for your SELECT
statement.
The interface provided by the ODBC driver (arodbc70.dll) is similar to that provided by the AR
System API. Like the API, the driver does not provide access to the underlying relational database.
Instead, as shown in the following figure, the driver communicates with the AR System server,
which in turn communicates with the database server. When using the ODBC driver, the AR
System access control model (user and group permissions) is maintained, and server-side
workflow is still triggered.
ODBC integration
Many ODBC clients are available. The AR System ODBC driver provides extended functionality
with BusinessObjects Crystal Reports. In addition, the driver provides basic functionality with
Microsoft Access, Microsoft Excel, and other ODBC clients. See Compatibility matrix in the BMC
Remedy ITSM Deployment online documentation for additional information about supported ODBC
clients.
This section contains information about:
The BMC Remedy AR System ODBC driver is read-only. ODBC clients that create, modify,
or delete entries or tables do not function correctly with the AR System driver.
The BMC Remedy AR System ODBC presents BMC Remedy AR System join forms as a
single table, enabling you to search AR System join forms easily. However, in third-party
ODBC clients, such as Crystal Reports, you cannot run an SQL search that performs a join
directly through the SQL statement.
If you cannot create a BMC Remedy AR System join form for the data you need, it is
possible to create multiple BMC Remedy AR System data sources, connect to one AR
System table per data source, and then perform the join in your ODBC client.
Hidden form permissions are not enforced in the ODBC driver. Forms that are hidden from
the Mid Tier Object List are accessible for reporting to other tools using the BMC Remedy
ODBC driver.
If you use the BMC Remedy AR System ODBC Driver in MS Access to link tables, you
might encounter the following error: Cannot define field more than once. As a workaround,
select the Use Underscores during the DSN configuration. This option makes form and field
names adhere to SQL standards by removing spaces and other nonstandard characters.
To determine which fields are in conflict, you can enable ODBC Tracing and look through
the logs, or you can navigate through the Fields list in Developer Studio to see if there are
fields that meet the preceding conditions.
When the ODBC driver accesses a currency field, it generates four or more column names
for the field by adding suffixes to the field name. The suffixes are:
_Date
_Type
_Value
_functional_currency_code
The driver creates one column for each functional currency code defined for the field.
If the form contains a field with a name that is the same as one of the generated
names, the ODBC driver will report "Cannot define field more than once" and fail to
get the data.
To prevent this problem, do not use field names that conflict with the column names
generated by the ODBC driver for currency fields.
For additional information about supported ODBC clients, see the Release Notes in BMC
SOLUTION AND PRODUCT AVAILABILITY AND COMPATIBILITY UTILITY (SPAC) for BMC
Remedy AR System server.
Note
Microsoft Excel has a date system that begins January 1, 1900. If your date field
contains a BC date, Microsoft Excel does not support it.
For example, to run Crystal Reports with a browser, you must have the BMC Remedy AR System
ODBC driver on your machine. You could create a data source called Report User to access BMC
Remedy AR System through Crystal Reports. When you create this data source, you might specify
Joe User as the AR System user and supply Joe's password. When you use the Report User data
source to access BMC Remedy AR System through Crystal Reports, the BMC Remedy AR System
permissions are granted to Joe User. This enables you to set up data sources with multiple levels
of permissions.
2.
BMC Remedy Action Request System 9.1 Page 873 of 4703
BMC Software Confidential. BladeLogic Confidential.
2. On the System DSN tab, select AR System ODBC Data Source, and click Add.
The Create New Data Source dialog box appears.
3. Select AR System ODBC Driver, and click Finish.
The AR System ODBC Setup dialog box appears.
AR System ODBC Setup dialog box
4. In the Data Source Name field, enter a unique name for the data source.
5. In the AR Server field, enter the name of the AR System server to access with this data
source.
6. Enter a user name whose permissions will be used to access the report data.
7. Enter the user's password.
8. Select the Descending Diary Fields check box to designate reverse calendar order.
9. (Mid tier only) If the field or form names in your reports contain special characters, such as a
dot (.), hyphen (-), plus sign , and semicolon (;) , select the Use Underscores check box
to replace the special characters with underscores.
Note
If you use Microsoft Access, spaces and hyphens are not allowed in object names.
10. To use field labels based on the locale you specify in the Report Locale field, select the Use
Labels check box. See Using field labels or database names in Crystal Reports (see page
).
Note
If the Verify On First Refresh option in Crystal Reports is selected, you must match
the state of the Use Labels option when you create the report and at run time. For
example, if you select the Use Labels option when you create the report, you must
select it when you run the report. If you clear the Use Labels option when you
create the report, you must clear it when you run the report. To avoid problems
caused by mismatched Use Labels options, it is recommended that you clear the
Verify On First Refresh report option in Crystal Reports.
11. (Mid tier only) In the Report Locale field, enter the locale for the language in which to display
the report.
Note
If you install two localized views (for example, German and French) and you use
the German localized view and the report locale setting is set to the French locale,
the data is returned in French, though the static report text is in German.
12. (Mid tier only) In the VUI Type field, enter 3 to specify that a web view should be used to
display reports for this data source.
13. Click OK.
Note
To modify an existing data source, select it in the ODBC Data Source Administrator
dialog box, and click Configure. The dialog box in the following figure is displayed.
Note
Before you start creating reports based on BMC Remedy AR System forms, make sure
that you follow the SQL standard for naming objects such as forms. For example, start
the form name with an alphabetic or underscore character. You should especially avoid
using a number (such as 2) for the name of a form. Otherwise you might see an error
message, such as ODBC error: Unexpected extra token: formName.
Using field labels or database names in Crystal Reports (see page 879)
Verifying fields defined in a Crystal Report (see page 880)
Changing the AR System ODBC configuration (see page 880)
Selecting report fields in Crystal Reports (see page 880)
Generating tables from multiple tables (see page 881)
Crystal Reports considerations (see page 881)
Note
Field labels are based on the locale specified in the Report Locale field.
10. Select the form to include in your report, and click Next.
11. Click Next.
The wizard lists all fields in the underlying form.
Note
The content of the list of fields depends on whether you selected Use Labels in the
AR System ODBC Setup or AR System ODBC Login dialog box. See Using field
labels or database names in Crystal Reports (see page ).
When you select report fields, some fields might not be listed that are in your form. This
occurs when the field's database name is different from its display label. For example, a field
called Last Name in your form is not shown in the Database Fields list box in Crystal
Reports (the Database Fields list box appears in the following figure). Instead, the field
name Surname might appear. Each field in a form is identified by a unique database name,
not by the display label that appears in the form.
To identify a field's database name, open the form in Developer Studio, and open the Field
Properties dialog box for the field. The Name field of the Database tab in the Field Properties
dialog box shows the field's database name.
12. Optionally, select the fields to display in the report, and click Next.
The wizard now lets you specify how to group the information to display on your report.
13.
BMC Remedy Action Request System 9.1 Page 878 of 4703
BMC Software Confidential. BladeLogic Confidential.
Set up the AR System ODBC as a data source for your report. See To create additional
ODBC data sources (see page 873).
Important
BMC recommends that you use the same setting for setting up your AR System
ODBC and for creating your Crystal Report.
Create a report in Crystal Reports. See To create a report by logging in to AR System from
Crystal Reports (see page 876).
Warning
If you report on two AR System fields that have the same label or two fields where
one field's database name matches another field's label, your report might contain
incorrect data.
If you specify using field labels, the list of fields in Crystal Report Designer displays field labels, if
any exist. If a field does not have a label, the list displays the database name for that field.
If you do not specify using field labels, the list of fields in Crystal Report Designer displays
database names for the fields.
Tip
To identify a field's database name, open the form in Developer Studio, and then open
the Field Properties dialog box for the field. The Name field of the Database tab in the
FieldProperties dialog box shows the field's database name.
Suppose, for example, a field in your form called Last Name is not shown in the Database Fields
list box in Crystal Reports. Instead, the field name Surname might appear. Each field in a form is
identified by a unique database name, not by the display label that appears in the form.
Tip
To identify a field's database name, open the form in Developer Studio. Select the field,
then expand the Database category on the Properties tab. The Name property displays
the database name.
1. In the Create Report Expert dialog box, click the Fields tab.
2. From the Database Fields list, select the fields to include in your report, and click Add.
Alternatively, you can click Add All to include all the fields. To remove a field or all fields,
click Remove or Remove All, respectively.
3. Click Preview Report to view your report.
For information about designing reports, see your Crystal Reports documentation.
If you add two fields that have the same database name (such as Submitter) to a join form, one
field's database name appears as a field ID in Crystal Reports.
Converting Date/Time Strings to Date Strings — In Crystal Reports, you can specify how
Date/Time strings are handled in your report. If you select the Convert to Date option in the
Reporting tab of the File Options dialog box, Date/Time strings from BMC Remedy AR
System are converted to Date strings in Crystal Reports.
However, if you set this option to convert Date/Time strings to Date strings, you cannot use
the select condition is equal (in the Select tab of the Create Report Expert dialog box in
Crystal Reports). The AR System Date/Time field works only with the Convert to String or
Keep Date-Time Type options.
List Sorting — Selection fields from BMC Remedy AR System are treated as character
types. List sorting in Crystal Reports is based on display values (New, Assigned, Closed),
rather than numeric values (0, 1, 2) associated with an enumerated field. This occurs
because selection fields with AR_DATA_TYPE_ENUM data types are mapped to
SQL_CHAR data types when the BMC Remedy AR System ODBC driver is used. ODBC
does not have an equivalent data type.
Browsing Data — The Browse Data button in the Fields tab of the Create Report Expert
dialog box in Crystal Reports does not display the Request ID (or other data) for all the
requests. (Do not select the Select Expert option because it attempts to perform an
unqualified search for all values in a field.)
Date — Crystal Reports follows the calendar type from your operating system, typically the
Gregorian calendar starting from October 15, 1582. If the date field contains a BC date,
Crystal Reports does not support it.
Avoid using special characters (such as brackets, decimal points, hyphens, and spaces)
when naming tables and columns.
When you set up an ODBC driver for use with Microsoft Access, select the Use
Underscores check box. This check box is shown in AR System ODBC Setup dialog box
(see page 874).
Table names that are nearly identical, such as My.Table and My Table (names that include
decimal points, hyphens, and spaces), are not differentiated by the driver.
Searching for data in these tables might produce unexpected results. Rename table and
field names that are nearly identical.
Maximum size of an entry or data set in Microsoft Access is 2K.
If you encounter the errors Record too large when using the Import Table option or This
form or report is based on a query that exceeds the limit for data in a single record when
using the Link Table option, you must exclude unnecessary fields from the search or report.
See your Microsoft Access documentation for additional information about excluding fields.
Your Microsoft Access authorized signature and your AR System user name and password
might conflict.
If you notice that the tables or fields disappear (although you have access permissions)
when you work on reports, it is caused by a login identification conflict. To resolve this
problem:
Select the same user name and password that you use to log in to AR System.
Turn off the following flag in the Registry and set the value to 0:
HKEY_LOCAL_MACHINE\Software\Microsoft\Jet\3.5\Engines\ ODBC\TryJetAuth
When using Microsoft Access to link tables from an AR System ODBC data source, you
enter information into several dialog boxes. Do not select any options from the Select
Unique Record Identifier dialog box. Click OK to close that dialog box.
Important
To create plug-ins for Developer Studio, you must be familiar with Eclipse plug-in
development (see http://www.eclipse.org) and Java (see http://www.oracle.com
/technetwork/java/index.html). Although BMC Customer Support is available to answer
questions about BMC plug-ins and APIs, it cannot provide help with general Eclipse and
Java issues that you encounter while developing custom plug-ins.
This section contains information about adding custom functionality to BMC Remedy Developer
Studio:
Creating plug-ins to extend BMC Remedy Developer Studio (see page 883)
Note
This feature does not apply to BMC Remedy AR System release 7.5.00 or earlier.
Add custom server object types to the All Objects list in AR System Navigator and to object
lists in the Object List tab. For example, the following figure shows an All Objects list that
contains a custom Hamburgers server object at the bottom of the list.
Customized All Objects list in AR System Navigator
(Click the image to expand it.)
When users double-click the custom object type, an object list for that type opens and
displays a list of objects supplied by the custom plug-in (see the following figure).
Customized object type in the Object List tab
(Click the image to expand it.)
To edit the custom objects, create a custom editor configured by the custom plug-in. In
Eclipse, register the editor for the custom object type.
Add custom items to context menus for servers in the AR System Navigator.
Customized server context menu in AR System Navigator
(Click the image to expand it.)
Add custom items to context menus for object lists. The items can appear on menus for a
specific object type or for all object types. For example, the following figure shows a context
menu for active links that contains the following custom actions: Enable Workflow, Disable
Workflow, and Set Execution Order.
Customized context menu for the Active Link object type
(Click the image to expand it.)
For example, if your top-level Eclipse directory is C:\eclipse, extract the contents into C:\eclipse.
Plug-in Description
com.bmc.arsys. Registers new server object types with the AR System Navigator. Examples of server object types are
studio.model. active links, filters, and forms.
modeltype
com.bmc.arsys. Registers providers for new object types. For example, list providers supply a list of objects and object
studio.model. providers supply actual objects for editing. The providers can supply items to both the AR System
modelprovider Navigator and the Object List tab.
com.bmc.arsys. Adds actions to context menus in the Object List tab for a single object type. For example, see Customized
studio. context menu for the Active Link object type (see page 884).
commonui.
typeaction
Adds actions to context menus in the Object List tab. The actions can appear on menus for one or more
object types.
Plug-in Description
com.bmc.arsys.
studio.
commonui.
genericaction
com.bmc.arsys. Registers new server object types with the user interface to add the types to the AR System Navigator (see
studio. Customized All Objects list in AR System Navigator (see page 883)) and the Object List tab (see
commonui. Customized object type in the Object List tab (see page 883)). It also provides the name of the object type
typeinformation to display in the AR System Navigator.
These calls are described in the Developer Studio Java API online documentation, which is in the
DevStudioInstallDir\files\DevStudioAPIdoc.zip file.
To access the documentation, unzip the file, and open the index.html file.
The following video (4:00 min) provides step-by-step procedure to integrate BMC Remedy AR
System with BMC Atrium Orchestrator.
https://youtu.be/MfpWzNMg0u0
This section describes how to configure BMC Remedy AR System for integration with Atrium
Orchestrator. To use the information in this chapter, you should be familiar with creating forms and
workflow in BMC Remedy AR System, and you should understand how to use the Set Fields action
in a filter or escalation. You must also be familiar with Atrium Orchestrator processes and
operations.
Note
To integrate BMC Remedy AR System with Atrium Orchestrator, you must use BMC
Atrium Orchestrator 7.5 or later. For a list of the compatible web application servers, see
Compatibility matrix in the BMC Remedy ITSM Deployment online documentation. For
more information about Atrium Orchestrator processes and operations, see your Atrium
Orchestrator documentation.
Application developers can integrate AR System applications with Atrium Orchestrator. This
integration requires the AR System Web Services plug-in, which uses the Java plug-in server, to
be installed with the AR System server. BMC Remedy AR System acts as a consumer of the
Atrium Orchestrator web service.
Note
The AR System API files arutil-7.5.00.08.jar and arapi-7.5.00.08.jar bundled with the BMC
Remedy AR System adapters does not work with the BMC Remedy AR System version
9.0, and causes the integration between BMC Atrium Orchestrator and BMC Remedy AR
System to fail. For more information, see Troubleshooting the BMC Remedy AR System
adapter in the BMC Atrium Orchestrator online documentation.
To integrate an AR System application with an Atrium Orchestrator web service, you must
complete these two main tasks:
Create an entry in the AR System Orchestrator Configuration form. Each entry in this form
defines the configuration for a specific Atrium Orchestrator web service.
Create workflow to integrate the application with Atrium Orchestrator, including:
A form containing the fields that will hold input and output values for data exchanged
with Atrium Orchestrator.
A filter or escalation associated with this form. The filter or escalation must include
one or more Set Fields actions that use the BMC ATRIUM OCHESTRATOR data
source.
Note
The tools you use to create AR System workflow and applications and to
create and customize Atrium Orchestrator processes have very similar
names. This section describes using Developer Studio to create AR System
workflow that integrates with Atrium Orchestrator. Atrium Orchestrator
includes the workflow modeling tool Atrium Orchestrator Development
Studio (Development Studio). For information about using Developer Studio
with BMC Remedy AR System, see Developing an application (see page
2185). For information about using Development Studio with Atrium
Orchestrator processes, see the Atrium Orchestrator documentation.
The configuration settings that you enter in this form are used when you design the associated filter
or escalation. All information required at run time is stored in the filter or escalation.
To define the Atrium Orchestrator web service for BMC Remedy AR System
1. Log in to BMC Remedy AR System as a user with administrator privileges, using the mid tier
interface.
2. On the home page, select AR System Administration Console > System > General >
Orchestrator Configuration.
3. In the AR System Orchestrator Configuration form, complete the following fields:
Configuration Name — A unique name that identifies this entry. This is a required
field. The name must be unique, and BMC Remedy AR System assigns a GUID to
the field.
When you create the associated filter or escalation, Developer Studio uses this field
to display a list of all the entries in this form.
Grid name — The grid name for the web service. This is a required field.
When you create the associated filter or escalation, Developer Studio uses the value
in this field along with the service URL to obtain the list of Atrium Orchestrator
processes. Developer Studio stores the grid name within the workflow action for use
when the service is consumed.
If you change the information for a configuration entry after associating workflow to the
configuration, Developer Studio prompts you to confirm whether you want to override the
information stored in the filter with the new information from the configuration form.
As shown in the Overwrite from configuration form dialog box, the active fields are those that have
different values in the configuration form entry from those stored in the workflow. To override these
values in the workflow object with the values from the configuration form, select the appropriate
check boxes. (If the check box is inactive, that value has not changed.) When you save the filter or
escalation, the new values are saved with it.
Note
If you export the Atrium Orchestrator workflow and import it to another AR System server,
you should also export and import the associated entry in the AR System Orchestrator
Configuration form. This entry is needed if the filter or escalations that use it are to be
edited on the other server. If you do not export the configuration form entry, you can still
run the workflow on the other server.
In the AR System filter or escalation, you select the BMC Atrium Orchestrator processes and the
operation to perform. The workflow can be designed to carry out either synchronous or
asynchronous BMC Atrium Orchestrator operations. With synchronous execution, BMC Remedy
AR System waits for the operation to complete before returning a result to the workflow action.
With asynchronous execution, the operation returns a job ID. In this case, you use the job ID in
subsequent workflow actions to determine the status of the operation, or to cancel it.
Note
You must use a separate Set Fields action for each BMC Atrium Orchestrator process.
1. Create a regular form, and add the appropriate fields to hold the input and output data for
the Set Fields action.
The input and output fields on the form depend on the operation and process type. You can
create one form that will hold the data for all process integrations, or separate forms for
each process.
2. Save the form and assign a form name.
Note
If you override the values in the Service URL, Grid Name, Username, or
Password field, Developer Studio stores the overriding values in the filter or
escalation. In this case, whenever the Set Fields action is opened in the
future, Developer Studio warns you that the values in the filter do not match
the values in the configuration form. At that time you can select which
values to replace with those from the form, if necessary.
c.
BMC Remedy Action Request System 9.1 Page 891 of 4703
BMC Software Confidential. BladeLogic Confidential.
Note
Note
The Username and Password from the configuration form are stored in
these elements as the default attribute, and will be used if the mapped fields
are NULL at run time. If you want to prevent this, delete them from the Field
/Value column before you map the fields. Also, Developer Studio
automatically sets the attributes arUsername: true and arPassword: true in
these elements. This causes the filter or escalation to use the current user
name and password at run time, if no other value is available. You cannot
change these attributes.
10. In the Output Mapping table, map each BMC Atrium Orchestrator data element to a field on
the associated form.
Note
Output parameters returned to BMC Remedy AR System consist of the value only.
XML tags generated by BMC Atrium Orchestrator are stripped from the returned
value.
READY
PENDING
ASSIGNED
IN_PROGRESS
PAUSED
COMPLETED
COMPENSATED
CANCELLED
PENDING_REASSIGNMENT
FAILED
ABORTED
Note
The reverse case, where another application executes an AR System client, is also valid. See
Integration considerations (see page ).
Beyond simply starting the external application, BMC Remedy AR System provides process-control
functionality for these types of integration:
Data passing and retrieving — When BMC Remedy AR System executes external
applications (either manually or automatically), information from any form in the AR System
database can be extracted and passed as run-time arguments. You can also retrieve data
by using a Run Process command and place it in a field.
Client and server execution — External applications can be executed locally on the AR
System client, or remotely on the AR System server.
Synchronously and Asynchronously — Run Process on a filter and escalation is
asynchronous. All other Run Process commands (including $PROCESS$ in a Set Fields
action) run synchronously.
Executing an external process is done using the Run Process workflow action, available for filters,
active links, and escalations, or in a Set Fields action with the $PROCESS$ keyword.
For additional information, see Run Process action (see page 2757).
All three workflow components can run processes to provide centralized integration on the server.
In addition, active link processes can provide local integration on the clients.
For example, a paging program can be called whenever a record marked Urgent is entered into the
database (a filter action), or when such a record has not been accessed for two days (an
escalation action). When the application is started, data from the current form can be passed as
run-time arguments to the application.
The Run Process action simply executes an independent process; it does not return a value to the
calling program.
Unlike active links, which run with the access control permissions of the user, filters and
escalations run with the permissions of the administrator and thus have access to all form fields.
Consider this when you define filter or escalation actions because they can have security
implications.
On a Windows server, a filter or escalation can run only processes that run in a console (like a .bat
script) or that create their own windows.
The processes that an active link launches can run on the local client machine or the server. They
are often triggered by actions taken by the user. For example, an external email program could be
started whenever the user clicks a button on an AR System form, or a problem resolution tool can
be invoked when a problem description is entered into a field.
An example of a Run Process action definition for an active link is shown in the following figure.
When the active link is triggered, the system executes the command specified in the Command
Line field, which launches a related process. To make sure that the executable is correctly
executed on the client machine, specify its full path name. When the application is started, data
from the current form can be passed as run-time arguments to the application.
When designing an active link that uses a Run Process action on the client, always consider the
variety of client platforms that users will use. Keywords can be used in the Run If expression for the
active link to verify that the client is on an appropriate platform. For more detail about the possible
values for $CLIENT-TYPE$, see the AR_CLIENT_TYPE constants defined in
ARSystemServerInstallDir\api\include\ar.h. If the active link is to be supported on multiple
platforms, each platform might require its own active link with an appropriate qualification.
You would use the following command for the Run Process filter:
It calls the TelAlert application. It uses the telalertc executable, which is the standard
TelAlert client, instead of the telalert executable, which is the client plus the administration
function.
The -c parameter tells TelAlert to use the PageMart configuration information in the telalert.
ini file.
The -PIN parameter takes the value of the field Pager Access Number and passes it to
PageMart to identify the specific pager that should receive the message.
The -m parameter specifies the message that is to be sent to the pager. The value of the
Call ID field is substituted into the message text.
These data sources include fixed values, values read from other forms (possibly in other
databases), values from arithmetic operations or functions, and values returned by external
applications. Using the $PROCESS$ keyword of the Set Fields action, BMC Remedy AR System
can execute an application and set the output of the application in various data fields. You can run
only a process that behaves as follows:
Runs in a console (such as a .bat script or runmacro.exe ), but not in a GUI application.
Returns 0 if successful. (In this case, stdout is pushed to the field.) If the process returns
anything other than 0, stdout displays an error message.
Whether you use an active link, filter, or escalation depends on the purpose of the external
application. Active links can execute locally on the client machines or on the server. Filters and
escalations execute only on the server.
When an external application is run on the server, BMC Remedy AR System waits for the process
to terminate so that it can capture and interpret the output of the process. To avoid situations
where BMC Remedy AR System waits indefinitely for a process that fails to terminate, a process
time-out is built into BMC Remedy AR System. This time-out can be configured for between 1 and
60 seconds, using the AR System Administration: Server Information form.
In a Set Fields definition, the keyword $PROCESS$ indicates that all following text is a command.
Use the full path name to the executable. AR System data field values can be passed as
parameters. When using active links, remember that they run with the access control of the user,
so access to form fields might be limited.
When workflow that performs a Set Fields action is fired, the process starts, and the web client
waits for it to complete. (In UNIX, the process runs in a Bourne shell.) All returned data is read by
the web client and processed according to the return status of the process:
If the return status is zero, the data is used as the new value for the field.
If the process returns with a status other than zero, the web client assumes the process
failed and does not update the field contents. Instead, the output from the process is used
as an error message and displayed to the user.
When designing an active link that uses a $PROCESS$ Set Fields action on the client, always
consider the variety of client platforms that users will use. The keywords $HARDWARE$ and $OS$
can be used in the Run If expression for the active link to verify that the client is on an appropriate
platform. If the active link is supported on multiple platforms, each platform requires its own active
link with an appropriate qualification.
Note
You can run a process on a server by inserting @ serverName: before the process name
in an active link. For example, $PROCESS$ @ServerA: C:/temp/process.exe If it is the
current server, you can use @@ instead of @ serverName.
An example of a Set Fields action for a filter is shown in the following figure. In this example, the
action sets the values of two fields by executing a separate utility program for each one, passing
values of existing fields as parameters. If the programs execute correctly (that is, return with an exit
code of zero), their outputs are assigned to the respective fields.
You can use keywords and field references in the JavaScript, for example:
In several BMC Remedy applications, the user is shown a table of related tickets along with the
primary ticket. These related tickets can be from different forms. A special form is maintained,
which records relationships between tickets. The related tickets table field shows this special form.
When the user double-clicks on any of the related tickets, instead of showing the special form to
the user, an open window action opens the form that has the ticket data.
JavaScript considerations
All the Run Process JavaScript actions are grouped together and executed at the end of the
active link. For example, if you have a Run Process action followed by a Set Fields action,
the Set Fields action is executed before the Run Process action.
Some JavaScript code is asynchronous. For example, openModifyForm starts the process
of opening the form, but does not wait for the action to complete. So it is not possible to
have another Run Process action that clicks a button on the newly opened form.
Any special characters in JavaScript must be properly escaped. For example, if the action
has JavaScript alert("Short Description is $8$") and the Short Description value contains a
double quote or a backslash or a new line, a JavaScript error occurs.
If the word javascript is not at the beginning of a run process action, it says "The following
specific error(s) occurred when executing 'xx', " but it does not say what the error is.
Active links that run a process on the client should have qualifications that limit usage to an
appropriate client platform. The keyword $HARDWARE$ can be used to check for the client
platform. On UNIX machines, $HARDWARE$ returns the value of the command uname -m.
On the Windows clients, it returns the value PC.
On UNIX machines, processes run under the Bourne shell.
When passing data fields as parameters to external programs, enclose the arguments with
double quotation marks if the value might contain spaces or special characters.
The $PROCESS$ feature of the Set Fields action is effective for dynamically pulling or
loading small amounts of data on the AR System client or server. For large amounts of data,
use the API.
The Run Process string can have a maximum length of 4096 bytes. To execute large
scripts, use field references to build the script's data.
For information about special Run Process commands, see the Developing an application
(see page 2185) section.
Tip
For simple applications, you could use the User form to hold this information.
2. In the request form to which you want to assign users, create the fields that the Assignment
Engine sets on assignment. See Preparing for the auto-assignment process (see page ).
3.
BMC Remedy Action Request System 9.1 Page 902 of 4703
BMC Software Confidential. BladeLogic Confidential.
3. Create or add the assignee and request forms to the Assignment Engine. See Adding
assignee and request forms (see page ).
4. Create rules for assignments. See Adding assignment rules (see page ).
5. Create processes for assignments. See Adding assignment processes (see page ).
Assignee form — Contains data about people or groups to whom you want to assign
requests. This form is the source form that holds information for the request form.
A single process can have multiple assignee forms.
Request form — Is used to assign a request. An example might be a Help Desk form to
which Support representatives are assigned tickets. This is the target form that receives
information from the assignee form.
Tip
You can also use the User form that is installed with BMC Remedy AR System.
2. On the assignee form, create the fields listed in Adding fields to the assignee form (see
page 904).
Hide the fields that you do not want users to see.
3. On the request form, create the fields listed in Adding fields to the request form (see page
904).
Hide the fields that you do not want users to see.
Assignee Unique ID
— A field containing a unique identifier that distinguishes one assignee from another. This
can be a GUID field. See the Using character fields to generate GUIDs (see page 2503).
Instead of creating this field, you can use the Request ID field (ID 1) as the unique identifier.
Then, you can add the following optionalfields to this form:
Assignee Group Unique ID — The unique instance ID for the assignee group.
Assignee Name/Login — The name of the assignee.
Assignee Delivery Method — A field used to store the method to notify the assignee
of the assignment.
Number Assigned — An integer field used to obtain and set the current number of assigned
issues for each possible assignee.
If you use the Load Balance by Number or the Load Balance by Capacity auto-assignment
method, this field is required.
Capacity Rating — A decimal field used to obtain the capacity rating for each possible
assignee.
This field is required for the Load Balance by Capacity auto-assignment method.
Last Assigned Time — A decimal field used to obtain the last time an issue was assigned to
each possible assignee and to set the last assigned time for the successful assignee.
This field is required for the Round Robin auto-assignment method.
Last Assign Time (Display) — A date/time field used to obtain the last date and time an
issue was assigned to each possible assignee and to set the last assigned time for the
successful assignee. This is an optional field.
Assignee Unique ID — Character field that stores the selected assignee's unique ID.
Return Code Description — Stores the successful Assignment Rule ID and the Assignment
Qualification ID if the assignment was successful, or an error code if the assignment failed.
This field can be used for debugging purposes.
Reason Code Field — Stores the GUID of the executed rule.
Note
9. In the Assignee Group Permissions field, select the group to give access to.
10. On the Common Fieldstab, complete the following fields:
Assignee Unique ID — The unique identifier for the assignee (an individual user). For
example, you might select Request ID or Assignee ID.
Optional fields:
Assignee Group Unique ID — Unique instance ID for the assignee group.
Assignee Name/Login — Login name or full name of the assignee.
Assignee Delivery Method — Field in the assignee form used to store the method to
notify the assignee of the assignment.
11.
BMC Remedy Action Request System 9.1 Page 905 of 4703
BMC Software Confidential. BladeLogic Confidential.
11. Click the Assignee Form Fields tab and map the fields from the form you selected.
For more information, see Adding fields to the assignee and request forms (see page 903).
8.
BMC Remedy Action Request System 9.1 Page 906 of 4703
BMC Software Confidential. BladeLogic Confidential.
Note
If the Localize Server option (on the Advanced tab of the AR System
Administration:Server Information form) is not selected, all records appear,
regardless of the client's locale. If the option is selected, some rules apply. See
Setting performance and security options (see page 314) and Setting the Localize
Server option (see page 3078).
9. In the Assignee Group Permissions field, select the group to give access to.
10. On the Common Fieldstab, complete the following fields, which are mapped from the
assignee form:
Assignee Unique ID — The unique identifier for the assignee (an individual user). For
example, you might select Assignee ID.
Optional fields:
Assignee Group Unique ID — The unique instance ID for the assignee group.
Assignee Name/Login — Login name or full name of the assignee.
Assignee Delivery Method — Method to notify the assignee of the assignment.
11. Click the Request Form Fields tab, and map the fields from the form you selected.
For more information, see Adding fields to the request form (see page 904).
Because assignment processes can share rules, modifying a rule affects all assignment processes
associated with it.
Note
Unrelating a rule from a process removes its relationship with that process but retains the
rule for other assignment processes.
3.
BMC Remedy Action Request System 9.1 Page 908 of 4703
BMC Software Confidential. BladeLogic Confidential.
3. Click Create.
The Assignment Rule dialog box appears.
4. Enter information in the required fields:
a. In the Rule Name field, enter a rule name.
b. From the Assignee Form list, select an assignee form.
c. From the Request Form list, select a request form.
The Request Form field contains the form references in the Process Definition form.
The rules that you define fill in the assignment-related fields on the request and
assignee forms. These request and assignee forms are external to the Assignment
Engine and part of a separate application. The only requirement for these forms is
that they have the necessary fields on them to be read and written from the
Assignment Engine software. The requirements for these fields vary depending on
which Assignment Engine rule methods are used.
d. Make sure that Status is set to Active.
e. In the Assignment method field, select an assignment method. See Integrating the
Assignment Engine into an application (see page ).
5. Enter a qualification for the assignment rule.
A qualification string is a specified set of conditions used to make the automatic assignment.
The Assignment Engine applies the qualification defined here to try to assign a request to an
assignee.
The easiest way to build a qualification string is to select the keywords and form fields
directly from the bar and lists. When you do that, the correct syntax is automatically entered.
Assignee form fields use single quotation marks, and Request form fields use dollar signs.
For example:
6. Click Save.
If no rules are defined for the process, click Create to create rules (see Adding
assignment rules (see page )). Select the rule to reorder.
5. Use the arrow keys to order the rules in the sequence in which you want the Assignment
Engine to use them.
6. Click Save and Close.
Note
4. In the Request Form field, select a form that creates the requests to which you want to
assign users.
5. (Optional) Enter a description of the process.
6. Click Create to create a rule.
See Adding assignment rules (see page ).
7. Specify a sequence for the rules.
The rules apply according to the order in which they appear. See Setting sequencing for
rules (see page ).
Note
The order of the rules is important. The most specific rules should be at the top of
your list because the Assignment Engine processes the rules from top to bottom
and makes an assignment when it finds a match.
For information about the Application-Command AE-ASSIGN DoAssign Run Process command,
see Process commands (see page 2764).
For information about creating workflow, see Defining workflow to automate processes (see page
2620).
Typically, DSO is used across two environments running BMC Remedy Incident Management. The
environments might be widely separated, and Support personnel might create a high volume of
incident tickets at each site, but for business reasons, both user communities often need to be
aware of all the tickets created, whether they originate at their local site or not. In such situations,
DSO is used to replicate tickets after they are created. Typically, a prefix is added to replicated
ticket IDs to differentiate them from other tickets in the system. Additionally, ownership of replicated
tickets can be altered so that a ticket worked on during normal business hours at one site can then
be reassigned to a remote site and worked on during its business hours (a “follow-the-sun”
scenario).
BMC Atrium Configuration Management Database (CMDB) is a core component in any BMC
Remedy IT Service Management (ITSM) environment and adds substantial value to a simple
Incident Management environment. Specifically, it makes incident management more efficient by
providing support staff and IT management an up-to-date image of their production IT environment.
Given this synergy between DSO and BMC Atrium CMDB, using DSO as a replication engine is
clearly useful for a global environment with these characteristics:
Note
The primary value of DSO is its ability to copy data through workflow and hence to
replicate data and execute business logic.
After these tasks are performed, every time data is written to a local form to which the filters are
attached, a transfer corresponding to the mapping is entered in the Distributed Pending form. This
form maintains a queue of all send operations that need to be performed, and various access
methods for this queue can be configured. For example, push requests can be executed as quickly
as possible after they arrive in the queue, or they can be run at a later time, such as during a night-
time batch window.
DSO can transfer data in one direction or bi-directionally between two environments. For
bidirectional transfers, you must set both sites up identically so that each is a source and a
destination for DSO transfers. For information about setting up and using DSO, see Configuring
BMC Remedy Distributed Server Option (see page 567) and Setting up DSO to synchronize data
across multiple AR System servers (see page 1737).
To ensure integrity of the data, CMDB creates corresponding entries in the respective base forms
and form hierarchy based on the read or write operations performed on the join forms.
BMC Atrium CMDB provides another level of data abstraction on top of the AR System server
forms: an object-oriented class hierarchy in which each class is designed to hold data associated
with typical IT environment components and relationships. This set of classes is called the BMC
Atrium CMDB Common Data Model (CDM).
The CDM is implemented as a series of join forms; each subclass can break down into a join of
multiple base forms, each of which is associated with a parent class of the subclass. Hence, the
most effective way to use DSO to transfer data between two CMDBs is to create mappings and
filters on the join forms corresponding to the CMDB classes.
The join forms have the same names as the associated CMDB class. For example,
BMC_DiskDrive is the join form associated with the BMC_DiskDrive class. If you know exactly
which CDM classes you plan to use, you can create mappings and filters on just those classes. A
safer approach, however, is to create mappings and filters for the entire CDM. Then, if a discovery
product populates a class that was not expected to be used, the data is still successfully
transferred to the remote site.
Note
BMC recommends that you should avoid writing to the production dataset directly. If you
are sure that there is no harm in writing directly, you might proceed with the operation.
By default, the only authorized writer to the production dataset is the CMDB Reconciliation Engine.
Any other data source should be written to a staging dataset and then reconciled to update the
production dataset. This protects the production image of an IT environment, a business-critical
asset. To use DSO to replicate the CMDB at a remote site, however, you must break this rule
based on your knowledge that the data you are inserting into the production dataset has been
successfully reconciled on the other site.
A mechanism enables an authorized user (who is not the Reconciliation Engine) to write to the
CMDB production dataset. Each CMDB base form contains a hidden field named
zCMDBEngOverrideCmd. The validation workflow that checks a user’s write permission first looks
at this value.
Data integrity is further protected by existing DSO functionality. Specifically, any failed transfer from
the local Distributed Pending form to the remote server is noted, and if the failure is due to a
connectivity issue, the data is retained until the transfer is confirmed as successful. However, if a
functional failure occurs, the data is not retained.
When you configure the DSO for bidirectional data transfer, you should be aware of the looping
issue that might occur. Use the following approach to avoid infinite loops.
Use the LastUpdatedDatasetId attribute defined in the top level classes in the CDM
hierarchy (BMC.CORE:BMC_BaseElement and BMC.CORE:BMC_BaseRelationship) to
avoid infinite loops.
Note
If you are using versions earlier than BMC Atrium 7.6.04, you need to add the
LastUpdatedDatasetId attribute explicitly. Where???? In the top level class definition????
Please confirm.
In the Distributed Mapping form, set the value of the LastUpdatedDatasetID attribute to the
name of the dataset ID of the target server.
Under the Transfer to Target area, set the mapping type as Custom.
In the DSO filter form, check whether the value of the LastUpdatedDatasetID attribute is set
to NULL.
Whenever an instance is DSOed from source to target, the LastUpdatedDatasetID attribute is set
with the name of the dataset ID of the target server, so that the DSO filter is not qualified for
execution. Similarly, when the instance gets updated the value of the LastUpdatedDatasetID
attribute is set to NULL thereby qualifying the DSO filter for execution. Use this approach to avoid
the looping issue when you are not using DSO to write directly to the production dataset.
Note
If you are using DSO to write directly to the production dataset, see Avoiding infinite loops
(see page 1787) to avoid the looping issue.
After the system goes live, the CMDB is periodically updated to include new or changed CIs that
are identified in the IT environment by discovery sources. The number of CIs involved in the
incremental updates is typically much smaller than the total number of CIs in the CMDB. For
example, a site whose CMDB contains roughly one million CIs might have daily updates that
involve 0.1% to 1% of those CIs, which means 1,000 to 10,000 CIs need to be transferred by DSO.
Larger daily updates are possible, particularly if software distribution and patching are done
automatically across the enterprise, but they are much less common.
Timing of the DSO transfers should be considered within the context of overall operational planning
for the CMDB. Specifically:
Discovery scans are scheduled as the source for new and changed CIs.
Reconciliation jobs are scheduled to synchronize the production dataset with new discovery
data.
As the production dataset is updated, the DSO Distribution Pending queue accumulates
pending push operations.
For fastest updates of the CMDB, configure DSO to consume the queue as soon as possible. This
is the recommended setting, assuming that reconciliation is scheduled to impact online users as
little as possible (for example, it is scheduled during a batch window at night). A modest overhead
of CPU consumption is expected during DSO usage. So, if the system is heavily used or if
concurrent users might be impacted, configure DSO so that it consumes the pending queue in
another scheduled batch window.
Often, each site locally discovers its own IT assets, and a bidirectional DSO then shares the data
so that both sites can see information for the entire enterprise. You can implement this as a simple
bidirectional DSO transfer by performing the setup tasks described in Setting up DSO (see page
568) on both servers. No asset, however, should be discovered by both sites. Because data is
transferred after it has been reconciled, if both sites try to write to the same CI, the CI might be
updated with different values by each site. The two sites will most likely discover identical
information about the CI.
Therefore, as a best practice, BMC recommends that multiple sites should conduct local discovery
in nonoverlapping domains.
Performance considerations
By default, DSO runs as a single-threaded process writing to remote AR System forms. Excluding
network latency and bandwidth constraints, such an operation has throughput similar to other such
write operations (approximately for 10 DSO pools, 21 CIs per second in BMC Atrium CMDB 8.0
with BMC Remedy AR System server 8.0).
To achieve higher throughput, you must use DSO pools, which are essentially independent sets of
DSO activity that can be processed in parallel. For CMDB data, however, both component CIs and
relationship CIs (sometimes called relationship items or RIs) must be transferred, and a
relationship CI cannot exist until its endpoints are created. Therefore, in DSO pools, make sure that
all relationship CIs are created after their associated component CIs . This is best achieved by
making sure that all data from a computer system is in one DSO pool (data from a computer
system should not span multiple DSO pools). However, this might not work if the DSO pool that
handles the endpoint has more load than the DSO pool that handles the relationship instances,
thereby creating a racing condition.
The racing condition can be handled in this way — when the DSO filter for the relationship instance
is triggered, DSO checks whether any endpoint CI is pending for transfer in the pending queue of
the Distributed Pending form. If an endpoint is found in the pending queue, the transfer of the
relationship instance is deferred. The deferred relationship instances are then taken care of by an
AR escalation, which executes at regular intervals and checks all the deferred relationship
instances and performs the same check on endpoint too. During the endpoint check, if the AR
escalation finds that there are no pending endpoints, it triggers the DSO of that relationship
instance and clears the deferred flag. However, if there are pending endpoints, the DSO of the
relationship instance is handled when the next escalation is triggered.
Because each DSO pool represents another thread of activity, the computational overhead of DSO
scales roughly linearly as a function of the number of DSO pools. Usually, each DSO pool
consumes about 5–10% of the CPU space on a two-CPU Intel server or equivalent for both the AR
System server tier and the database tier. In a lightly used system, the impact on online users
should be small. In a system that heavily consumes CPU space, the impact on response time or
overall system throughput might be more substantial.
Using
Meant for the end users, this section contains information about how to use the BMC Remedy
AR System product.
Goal Instructions
Using the AR System Object List and Approval Central Navigating the BMC Remedy AR
to navigate through the BMC Remedy AR System System interface (see page 918)
interface
http://<hostName>/arsys/forms (hostName is the name of the web server where BMC Remedy Mid
Tier is running).
For information about how to make the AR System Object List available in a browser, see Enabling
the AR System Object List (see page 2866).
If the AR System Object List is enabled, you can use it to access forms and applications in your
browser.
Note
Searching for forms or applications in the Object List (see page 919)
Choosing how forms and applications are displayed (see page 919)
Creating requests (see page 920)
Editing fields with rich text formatting (see page 920)
Modifying requests (see page 935)
How the back button behaves (see page 936)
Opening a form in a new window (see page 936)
Keyboard shortcuts (see page 936)
To find objects in a specific server, enter all or part of the server name in the Server field
and click Search.
To find an application, enter all or part of the application name in the Application field, and
click Search.
To find a form, enter all or part of the form name in the Name field and click Search.
To restore the full list of forms and applications, clear the Server, Application, and Name
fields, and click Search.
To find an application or form by keyword, enter a word or a phrase from the name and click
Search. The search is conducted only on the Name column. Use the following criteria:
The name of a form or any sequence of letters contained in the form or application
name. For example, if the form name is Purchase Requisition and you enter requ, the
form is found.
Multiple, non-sequential words or search operators are not valid as keywords. You
can also arrange items in the list by name, server, or type by clicking the appropriate
column headings.
You can arrange the list of forms and applications by Name, Server, or Type by clicking on the
appropriate column heading.
The Show Hidden check box is available only to administrators. When selected, it displays hidden
objects.
Creating requests
A request is a record related to a specific task. For example, a request could be a description of a
software problem or a purchase order from a customer.
When you create a request, you enter each piece of information about the request in a field. When
you save the request, it is added to the database.
If you have permissions, you can open requests and modify them. Only administrators and sub-
administrators can delete requests.
If a field has a rich-text-formatting (RTF) icon ( ) next to it, you can format the text in the field.
RTF allows extensive formatting options, including font color and size. You can also create lists,
align text, and use special characters. For example, you might want to make text bold or italic, or
you might want to center the text.
Note
The UI features and the font attributes such as, color, size, and style might vary in edit
mode for RTF fields and Rich Text in Place fields, when you compare them with non-edit
mode fields.
Click the button to open a dialog box that contains more RTF functions.
If RTF within the field is enabled, a reduced set of RTF functions appear when you click in the field.
Here are some tips for working in the RTF dialog box:
Note
The RTF options provide a way for you to apply some basic styling of text and to include
images with their text. The options do not provide the level of functionality of a desktop-
based word processor such as Microsoft Word. Functionality will vary among browsers.
Apple Safari browsers support the fewest number of features.
To enable the buttons in the dialog box, type some text or select existing text. Then, you can
format the selected text.
To undo all of the text you entered and formatted in the RTF dialog box, click Cancel or
press the ESC key.
To view text or images in the RTF field without the scroll bars, set the Custom CSS display
property of the RTF field as RTFPanel. Scroll bars appear on the panel that holds the RTF
fields. If the content size exceeds the maximum limits as specified in the display property of
the RTF field, scroll bars appear on the RTF field itself. See Creating and managing fields
(see page 2470) in the Developing the application interface (see page 2305) section.
Note
In the RTF editor, when you select any of the following formatting options and start
typing, the formatting automatically gets applied (without selecting the text.):
Font Name
Font Size
Fore Color
Background Color
To continue with the same formatting on the next line, press SHIFT+ENTER.
When you select a font from the Font Name option, it is not displayed as the
selected item in the drop down immediately, but gets applied.
When you select a font from the Font Name option, though the font gets applied to
the text, the font name is not displayed as selected.
In an unordered (bulleted) list or an ordered (numbered) list, you cannot apply
formatting to a single point in the list. The formatting must be applied to the entire
list.
The ordered or unordered list does not support the indentation option.
The RTF editor supports only one level of indentation.
The following topics provide information about working with RTF fields:
RTF functions
The RTF functions toolbar contains the following buttons:
Font and Size Select the font type and point size from the list. Applying RTF character
formats (see page )
Bold, italic, Make the selected text bolded, italicized, or underlined. Applying RTF character
and underline formats (see page )
Select from the character options Subscript, Superscript, and Strike through. Applying RTF character
formats (see page )
Subscript,
Superscript,
and Strike
through
Text Color Select the text color from the list. Applying RTF character
formats (see page )
Text Select the text background color from the list. The options are Red, Blue, Green, Applying RTF character
Background Black, Yellow, and White. formats (see page )
Color
Remove Remove all formatting from the selected text. Applying RTF character
Formatting formats (see page )
Show/Hide Select to show or hide the hidden elements.Note: You can use this option only Applying RTF character
Hidden with formatted text. However, if you format the text using Subscript, Superscript, or formats (see page )
Elements Strike through, this option does not work.
Alignment Set the paragraph so that it aligns evenly on the left, center, or right. Applying RTF character
formats (see page )
Paragraph Set the paragraph formatting style, including heading tags. Applying RTF character
formats (see page )
Indent Increase or decrease the selected text's distance from the left margin. Applying RTF character
formats (see page )
Bulleted and Create a list formatted with bullets or numbers. Applying RTF character
Numbered list formats (see page )
Create Insert a link to a Bookmark or another website or URL. Inserting and removing
hyperlink URL links in the RTF
fields (see page 926)
Insert image Insert an image into the RTF field. Configuring an image for
a character field (see
page )
Insert Special Use special formatting features, such as a horizontal rule, expandable section, Using other formatting
Items and special characters. options (see page )
Spell Check Runs the spell checker. Using the spell checker in
the RTF (see page )
Undo and Redo Removes the last 30 changes made in the RTF editor or reverses the undo action.
Cut, copy, and Remove, copy, and paste selected text to and from the clipboard. Applying RTF character
paste formats (see page )
Note: These buttons work only in Microsoft Internet Explorer browsers. For any
other browser, use the shortcut keys listed in the "General RTF shortcuts" (see
page 924) table.
Insert table Insert a table into the RTF field. Adding a table to a
character field (see page
).
Shortcut Description
CTRL+V Paste
CTRL+Z Undo
CTRL+Y Redo
Shortcut Description
SHIFT+CTRL+B Bold
SHIFT+CTRL+I Italic
SHIFT+CTRL+U Underline
CTRL+C Copy
CTRL+X Cut
1. Click the RTF icon ( ) next to the character field, and select the text to format.
2. Apply the appropriate formatting.
3.
BMC Remedy Action Request System 9.1 Page 924 of 4703
BMC Software Confidential. BladeLogic Confidential.
3. To clear the formatting you applied, click Cancel or press the ESC key.
4. Click Save.
Note
You can modify RTF properties for the character fields at run time by using a
workflow. For more information, see Change Field action (see page 2716).
Use the Table icon ( ) to insert a table in an RTF field or to modify the properties of a
selected table. Table properties include:
Use the Cell Properties icon ( ) to edit the properties of a cell in a table. Cell properties
include:
Cell border
Horizontal and vertical alignment
Cell background color
You can change the format of one cell at a time (not multiple cells).
After you create a table, you cannot insert or delete rows or columns, so be sure to include
enough rows and columns when you create the initial table.
If you select a table that is larger than the RTF field, the bounding box anchors will appear
outside of the field. This is an HTML limitation.
If you change the size of a table or image by dragging the bounding box, the OK button in
the RTF editor (or the Save button when an RTF field is modified) is not enabled. To enable
it, modify the text in the RTF field. Then, click OK (or save the form).
RTF icon ( ).
Image URL URL to the image. If a browse button (...) appears, you can select an image file from your local computer.
See Using the browse button to add an image to a character field (see page 926).
Note: Do not enter a local file path, such as C:\Documents and Settings\user1\My
Documents\companylogo.jpg. If you do enter a local path, the link will break on the computer.
Border The type of border around the image. You can select the width, line type, and color.
Description The text that appears when the mouse hovers over the image.
Link URL The URL that is opened when you click the image in the character field.
Open in a If this check box is selected (the default), when a user clicks the image, a new browser or browser tab
new opens the URL. If the check box is not selected, the URL's web page opens on the same browser.
window
4. Click OK.
1. In the Image Options pop-up box, click the browse button (...) if it is available.
2. In the Add Attachment dialog box, click Browse and search for an image to add.
3. Click OK.
Note
To link to a location in the same RTF field or link to a different RTF field on the same
form, you must first create a bookmark by performing the steps provided in the Creating
or updating bookmarks (see page 929) section.
1. Click the RTF icon next to the character field to open the RTF Editor.
2. Select the text to add a link to the bookmark.
Note
If you do not select the text, the HTML Link option will not be enabled to perform
Step 3 (see page 927).
3. Click the HTML Link option ( ) to create a link to the bookmark on the RTF field or link
to an external URL. This opens the Link Options dialog box.
4. Perform one of the following to link to a bookmark:
Note
If you enter a link or a bookmark that does not exists, you see the following
warning message or note. Note: This link points to a missing bookmark and may
do nothing.
a. Select a bookmark from the list below the Link URLfield to link to a specific
bookmark.
Note
The list displays all the names of all bookmarks present on the form. You
can link to a bookmark present on the same RTF field or link to a bookmark
on an another RTF field on the same form. If the form does not contain any
bookmarks created, the list is disabled for selection and displays No
bookmarks....
Note
c. If you have defined a workflow mapped to the RTF field to open an external link or a
dynamic link, the ellipses option ( ) appears next to the Link URL field. Click this
option to trigger the workflow, which generates an external URL or dynamic URL in
the Link URL field. For more details, see Generating a URL in an RTF field using a
workflow (see page 2504).
5. (Optional) Select the Open in a new windowoption to open an external URL on a new
window.
Note
The Open in a new window option is available for use only for external and
dynamic links. If you have selected a bookmark from the list in Step 4 (see page
927), this option is disabled.
6. Enter a description for the URL in the Description field. The updated text appears when you
hover the mouse on the link in the display mode. If you do not specify a description, BMC
Remedy Mid Tier displays undefined as the tool tip.
7. Close the Link Options dialog box.
8. Click OK.
When you view the RTF field in display mode, the linked text appears in Blue with the underline
formatting. For the bookmark text with an external URL link, the hand cursor appears when you
move the mouse pointer on the text.
Note
RTF fields generate an href tag when the links are created from the RTF Editor. Due to
security reasons, Firefox does not allow opening local or network links in the href tag. For
more information, see http://kb.mozillazine.org/Firefox_:_Issues_:
_Links_to_Local_Pages_Don%27t_Work.
To allow Firefox to open links in the href tag, add the following settings and their values in
the about:config page of Firefox and restart the browser.
1. Click the RTF icon next to the character field to open the RTF Editor.
This highlights all bookmarks in the RTF field.
2. Place the cursor on the bookmark within the highlighted area.
3. Double-click the text or click to open the Link Options dialog box.
4. Click Remove link from text.
5. Close the Link Options dialog box.
6. Close the RTF Editor.
7. Save the form.
The bookmark is an identifier placed in a document so that it can be referenced through a URL
from a different location. Adding bookmark eliminates the need to scroll through the document to
locate the required information or type a URL address to navigate to a specific page.
You can add bookmarks to a character field, if the field has a rich-text-formatting (RTF) icon (
) next to it.
Creating a bookmark
To link a specific text in a RTF field or link to a different RTF field on the same form, you must
create a bookmark to mark the location or destination. After you create a bookmark, you can link
the bookmark from any RTF field on the form using the URL design.
Note
If you want a link to an external URL, you do not have to create a bookmark. Perform the
steps provided in the Inserting and removing URL links in the RTF fields (see page 926)
section.
To create a bookmark
1. Click the RTF icon next to the character field to open the RTF Editor.
2. Select the text to which you want to create a bookmark.
Note
Note
If you enter a duplicate name that already exists on the form, you see the following
warning message or note on the highlighted bookmark text. Note: A Bookmark with
the same name already exists.
5. The bookmark text is highlighted with a yellow backgroun d and blue-dashed border in the
RTF Editor. In display mode, the bookmark text appears as a regular text. However, for
bookmark text with the external URL links the hand cursor appears when you move the
mouse pointer on the text.
Note
1. Click the RTF icon next to the character field to open the RTF Editor.
This displays highlighted text for all bookmarks in the RTF field.
2. Place the cursor on the bookmark that you want to modify within the highlighted area.
Note
This enables the Insert or Change Bookmark option. If you move the cursor away
from the bookmark or do not select any text in the RTF Editor, the button will be
disabled.
Deleting a bookmark
1. Click the RTF icon next to the character field to open the RTF Editor.
This highlights all bookmarks in the RTF field.
2. Select the bookmark that you want to delete.
3. Double-click the bookmark or click to open the Bookmarks Options dialog box.
4. Click Remove link from text.
5. Close the Bookmarks Options dialog box.
6. Close the RTF Editor.
7.
BMC Remedy Action Request System 9.1 Page 931 of 4703
BMC Software Confidential. BladeLogic Confidential.
Related topics
Inserting and removing URL links in the RTF fields (see page 926)
1. Click in the RTF field, where you want to insert the horizontal line.
2. From the RTF functions toolbar, click Insert Special Items, and select Line Rule - HR.
3. Click Save.
Note
1. Click in RTF field, where you want to insert the expandable section.
2. From the RTF functions toolbar, click Insert Special Items, and select Expand Section.
3. Replace the bolded Information Header with text describing the section.
4. Replace the expanded text with text to display when the user expands the section.
5. Click Save.
Note
Even if the RTF field is disabled or read-only, you can still expand or contract the
expandable sections.
1. Click in the RTF field, where you want to insert the special character.
2. From the RTF functions toolbar, click Insert Special Items, and select the character from the
list.
3. Click Save.
To check for spelling errors in the RTF field, launch the spell checker from within the RTF field.
2. Correct misspelled words by selecting the new word from the Suggestions box. Other
options in the spell checker window are as follows:
Change Once: Click to change the selected occurrence of the word with the spell
checker suggestion.
Change All: Click to change all the occurrences of the word with the spell checker
suggestion.
Ignore Once: Click to ignore the spell checker suggestions.
Ignore All: Click to ignore every occurrence of the word.
One-Click Change Once: Select to replace the first occurrence of the misspelled
word.
Note
Using this check box eliminates the need to use the Change Once button.
One-Click Change All: Select to replace all occurrences of the misspelled word.
Note
Using this check box eliminates the need to use the Change All button.
3. When the spell check is complete, the spell checker window closes automatically.
The dictionary and index use a group of files that are stored in the <midTierInstallationDir>
/SpellChecker directory.
Dictionary - Location of all the text files that are a part of the spell check dictionary.
Default - Location of the default files when there is no support for a specified locale.
Locale folders - A set of folders that represent specific locales, such as en_US, en_UK
. Each folder contains the dictionary text files for that locale. If a folder with a specific
locale name does not exist, then the default folder is used.
Index - Location of all the index files. These files are generated and updated by BMC
Remedy Mid Tier based on the associated dictionary text files.
Default - Location of the default files when there is no support for a specified locale.
Locale folders - A set of folders that represent specific locales, such as en_US, en_UK
. Each folder contains the index files for that locale. If a folder with a specific locale
name does not exist, then the default folder is used.
Warning
BMC Remedy Mid Tier uses the index files when you launch the spell
checker. BMC recommends that you do not modify these files.
For example, the newWords.txt file contains a list of new words for the dictionary. To add these
words to the dictionary, copy the newWords.txt file into the appropriate locale folder within the
dictionary folder. If the words in newWords.txt are for the UK locale, then copy the file in the en_UK
folder, or the default folder.
Modifying requests
If you have permissions, you can modify requests.
You can modify individual requests or a group of requests. If you change several requests at once,
fill in only the fields that you want updated on every request that you have selected.
Changes made to the Status field are recorded in the request's status history. You can view a list
of these changes in the Status History window (select View > Status History).
The dialog box displays the default name of the field (Status), which can be changed by the
administrator.
1. Open the form containing the request that you want to change.
2. If the form is not in Search mode, click New Search.
3. Search for the request.
For more information, see Running searches.
4. The Results pane lists the requests that match the search criteria. The first request appears
in the Details pane, which is in Modify mode. Click the request that you want to change so
that it appears in the Details pane.
5. Make the necessary modifications to the fields in the form.
6. Click Save.
1. Open the form containing the request that you want to change.
2. If the form is not in Search mode, click New Search.
3. Search for the requests.
The Results pane lists the requests that match the search criteria.
4. Select the requests that you want to change.
Use the CTRL or SHIFT key to select more than one request.
5. Click Modify all.
The Details pane changes to Modify All mode, and a blank form is displayed.
6.
BMC Remedy Action Request System 9.1 Page 935 of 4703
BMC Software Confidential. BladeLogic Confidential.
Warning
Note
Depending on the browser, the form opens on a new window or a new tab.
Keyboard shortcuts
This topic provides information about the following BMC Remedy AR System keyboard shortcut
keys:
The term focus refers to keyboard focus, not to virtual cursor positions defined by certain assistive
technologies.
Key Description
LEFT ARROW If the focus is on a tab selector (an anchor link), sets focus to the next or previous tab selector without
RIGHT ARROW displaying it. Press ENTER to display the selector.
For more information, see Making your application accessible - Section 508 compatibility (see page
3107).
Key Description
UP or DOWN Moves focus through the menu items. Press ENTER to fill the field with the menu selection.
ARROW
RIGHT ARROW If the selected item is a submenu, opens and sets focus to the submenu.
LEFT ARROW Dismisses the submenu and sets focus to the upper level menu. If focus is at the top level, no action
occurs.
Key Description
CTRL+ALT+ENTER In New or Modify mode, saves the changes. In Search mode, performs the search.
Note
To open Approval Central from the BMC Remedy AR System home page
If you have configured BMC Remedy Approval Server, the BMC Remedy AR System home page
form will contain an Approval Central link. Click this link to open Approval Central.
1. In Search mode, open the form for which you want to find requests.
2.
BMC Remedy Action Request System 9.1 Page 938 of 4703
BMC Software Confidential. BladeLogic Confidential.
2. In the appropriate fields, specify the search criteria that the requests must match.
You cannot specify search criteria for attachment fields. You can enter values for more than
one field, creating a logical AND for the search criteria. The more fields that you fill in, the
more specific your search becomes.
3. Click Search.
You can modify the requests, or you can run a report. For more information, see Running
and saving searches (see page ).
The following topics provide information about how to find a request by example:
Note
Equal and Leading searches are faster than Anywhere searches because Anywhere
searches compare each character in the field while Equal and Leading searches do not.
For example, you can use an equal sign (=) to search for an exact match even if the field has a
search style of Anywhere. Thus, if you enter =Bob Jones in the Created By field of a form, the
search will find all the requests created by Bob Jones. The search will not find requests created by
Bob Joneson.
You can also use the advanced search bar to override a field's search style. For example, to
override the Created By field in the previous example with a Leading search, you would specify the
following criteria in the advanced search bar:
'Created By' LIKE "Bob Jones%"
You can use the following relational operators as leading characters in fields in a form and in the
advanced search bar.
Relational operators
Operator Action
<= Matches contents that are less than or equal to the value.
>= Matches contents that are greater than or equal to the value.
For example, to search for all requests created after a certain date, use the greater than (>)
relational operator and specify a date and time format. For example, > "July 5, 2008" in the Create
Date field finds all requests created after July 5, 2008. (Leaving out the time defaults the search
criteria to 0:00:00, the start of the day.)
Note
Square brackets and the symbols associated with them do not work with Oracle
databases.
Wildcard Function
% J%son
_ B_b
[] [a-f][abcf]
[^] [^a-f][^abcf]
Use the percent symbol (%) to include leading or trailing characters in your search. For example, to
find all requests submitted by Jill Bobbington, Bobby Fenton, and Bob Comptonson with an
Anywhere search, enter *Bob%ton* in the Submitter field. The search returns all requests for which
the Submitter field contains the strings "Bob" and "ton" in that order with any number of characters
leading, trailing, and in between.
When used in a form, the percent sign (%), underscore (_), and open bracket ([) symbols always
function as wildcard symbols except as follows, where they function as explicit characters:
Note
You can override a field's search style by using a leading percent sign. For example, if
the field's search style is Equal and you enter %Rob into the Submitter field, your search
finds Robert Smith and Jim Robertson (not only equal matches to %Rob). However, if you
use a leading percent sign, you lose any faster search times that would result from using
the Equal or Leading search styles. See Search styles in character fields (see page ).
To search for the percent sign (%), underscore (_), or open bracket ([) as an explicit character,
enclose the character in square brackets. For example, if you enter the percent sign in square
brackets ([%]), the system searches for instances of the percent sign instead of using it as a
wildcard character.
The close bracket (]) functions as a wildcard only when it is accompanied by an open bracket ([).
The hyphen (-) functions as a wildcard character only when preceded by an open bracket ([) or an
open bracket with a caret ([^).
Searches menu
(Click the image to expand it.)
Search results
(Click the image to expand it.)
Saving searches
The following procedure details how to save and run searches from a form that you created viewed
in a browser.
Note
The new and refined search will now be available in the list of saved searches.
2. In the Manage Search dialog box, select the search you want to enable or disable, and click
the Enable or Disable button.
If a search is not yet selected in the Manage Search dialog box, the default button label of
Disable is displayed.
The state of the search changes to either Enabled or Disabled, depending on your action. If
the search is disabled, it no longer appears in the search menu on the toolbar, but the
search data is still stored in the AR System Searches Preference form.
3. Click Save to save your changes.
Deleting a search
Running searches
You can save searches in a browser and run them at any time by selecting Searches from a
toolbar menu in a form. You can also make recent searches and defined searches available in a
browser. You can load each type of search criteria into a form, and update the search criteria
before you execute a search. You can run all searches across multiple sessions.
You can run a search using any combination of the following methods:
Finding a request by example — The easiest way to specify search criteria is to fill in fields
and select choices and option buttons to match the requests that you want to find. You can
specify values for more than one field. The more fields that you fill in, the more specific your
search becomes. The system searches for requests that meet all the criteria and displays
them in the Results pane.
For more information, see Finding a request by example (see page ).
Advanced search bar — You can use the advanced search bar to define a more complex
set of search criteria. For example, you can search for all requests with two different values
in the same field. You can use the search bar together with fields in a form to specify search
criteria.
The advanced search bar appears at the bottom of the browser window when you click the
Advanced Search button on the toolbar.
For more information, see Using the advanced search bar (see page ).
Parameters — Enter a parameter enclosed in dollar signs ($) in the field. For example, so
that you can specify the submitter each time that you run the saved report, enter the prompt
text $Enter User Name$ instead of a specific name in the Submitter field. When you click
Search, you are prompted to enter a sample value for this parameter. A parameterized
search works best when it is saved. Saving the search enables you to enter different values
each time a search is performed.
To run a search
2.
BMC Remedy Action Request System 9.1 Page 944 of 4703
BMC Software Confidential. BladeLogic Confidential.
2. Enter the search criteria in the form fields, in the advanced search bar, or a combination of
both.
3. Click Search.
Types of searches
The following types of searches are available on the Web:
Saved searches - Searches that you can create and save for a form.
Recent searches - Searches that you have executed recently.
Defined searches - Searches defined by your administrator.
When you specify search criteria in the advanced search bar, you can use the same operators as
in the form, and several more. See Using relational operators in the advanced search bar (see
page ).
The easiest way to build your search in the advanced search bar is to select the fields, status
history fields, keywords, values, currency codes, currency field sub-values, and selection field
values directly from the Fields menu to the right of the bar. When you select items directly from this
menu, the correct syntax is automatically entered.
You can also type the information directly into the advanced search bar. If you select this option,
observe the conventions listed in the following sections.
For more information, see Examples of advanced search bar statements (see page ).
Note
If you enter search criteria in the advanced search bar and then hide the advanced
search bar, the criteria is still used to find matching requests. If you have entered criteria
in the advanced search bar and then decide not to use it, you must clear the advanced
search bar before you hide it.
The following topics provide information about how to work with the advanced search bar:
'Short Description'
If a field name contains a single quotation mark (such as an apostrophe), add another single
quotation mark next to it. For example, if the field is named Submitter's Phone Number, enter it as
'Submitter''s Phone Number'.
To search on a field that does not have a label, see your administrator for the field ID. Use this ID
instead of the name enclosed in single quotation marks.
Note
Instead of entering the field label and the quotation marks into the advanced search bar,
click the field's label in the form, or select the field from the Field List dialog box. The field
name is automatically added, with the correct syntax, to the search statement.
See the following sections for more information about using fields in the advanced search bar:
You can use the $NULL$ keyword to search for requests that have no value in a field. For
example, to search for requests that have not been assigned (requests with no value in the
Assigned to field), enter 'Assigned to' = $NULL$.
The most commonly used keywords are: $DATE$, $NULL$, $TIME$, $TIMESTAMP$, $USER$,
and $WEEKDAY$.
Note
Keywords are case-sensitive. Use only UPPERCASE, as shown in the following table.
Keywords
$APPLICATION$ The application name if the application is running; $NULL$ when no application is running.
$BROWSER$ The browser (Internet Explorer or Netscape) being used in the current session. If the browser is
anything other than Internet Explorer or Netscape, Netscape is returned.
$CLIENT-TYPE$ The client type of the API program. AR System administrators use this keyword.
$CURRENTWINID$ The window ID that uniquely identifies the current window in the client environment. AR System
administrators use this keyword.
$DATABASE$ The name of the database on which the current form's data is stored.
$DATE$ In a character field, the current date is displayed. In a date/time field, the time defaults to midnight
(00:00:00).
$DEFAULT$ The default value for the associated field (used only when assigning a value to a field).
$ERRNO$ When an error is encountered, the number of the error that just occurred.
$ERRAPPENDMSG$ The appended message, if any, for the error that just occurred.
$EVENTSRCWINID$ The window ID that uniquely identifies the event source window in the client environment. AR
System administrators use this keyword.
$EVENTDATA$ The value that identifies the data of the event. AR System administrators use this keyword.
$EVENTTYPE$ The value that identifies the type of the event. AR System administrators use this keyword.
$FIELDHELP$ The field help text for the currently selected field.
$FIELDID$ The ID of the field that is currently selected. If the field is not selected, it returns NULL.
$FIELDLABEL$ The label of the field that is currently selected, If the field is not selected, it returns NULL.
$FIELDNAME$ The name of the field that is currently selected. If the field is not selected, it returns NULL.
$GROUPIDS$ The group IDs of which the current user is a member. If there are no groups, the keyword returns a
value of NULL.
$GUIDE$ The guide name if the guide is running; NULL if the guide is not running.
$HOMEURL$ The URL of the current page. This option is only valid on web pages. AR System administrators use
this keyword.
$INBULKTRANSACTION$ Indicates whether you are in a bulk transaction. This keyword is not supported and is reserved for
future use.
$LASTOPENEDWINID$ The Send Event keyword that resolves to the ID of the window that was last opened. AR System
administrators use this keyword.
$LOCALE$ The language and country code for the specified locale, in the format language_COUNTRYCODE,
for example, en_US.
$OPERATION$ The current mode or operation being performed. One of the following values is returned:
$OS$ The operating system under which the current process is running.
$ROLES$
For a deployable application, returns the list of roles that map to groups to which the current user
belongs.
$ROWCHANGED$ Evaluates whether a row in a table field has changed in a table loop guide.
0 = Not changed
1 = Changed
$ROWSELECTED$ Evaluates whether a row in a table field is selected in a table loop guide.
0 = Not selected.
1 = Highlighted as the secondary selection.
2 = Highlighted as the primary selection.
$SERVERTIMESTAMP$ The current date, time, or both on the AR System server. The keyword is used with the following
fields:
Date/Time
Time
Date
$TCPPORT$ The TCP/IP port of the local AR System server. AR System administrators use this keyword.
$TIME$ In a character field, the current time is displayed. In a date/time field, the date defaults to the current
date.
$VERSION$ The version of AR System server. If the version includes a patch, it is also included.
'Status'="Open"
or
'Status'= 0
If you do not specify a currency code, the primary allowable currency type is assumed.
You can use the following relational operators only in the advanced search bar. You cannot use
them in a form. See Using relational operators in a search (see page ).
Operators
Operator Action
() Use parentheses to control the order in which the expression is carried out. Operations found within parentheses are
executed together as a unit. For example, in the operation 'Gross Income' ñ ('Unemployment Insurance' + 'Pension
Plan Contributions' + 'Income Tax') , the items within the parentheses are added before they are subtracted from
Gross Income.
AND && Logical AND of the result of two conditions. The result is true only if both conditions are true. For example, 'Status'="
New" AND 'Assigned to'="Andy" finds all new requests assigned to Andy. You can use two ampersands (&& ) instead
of the word AND.
OR || Logical OR of the result of two conditions. The result is true if either condition is true. For example, 'Status'="New" OR
'Assigned to'="Andy" finds all new requests (regardless of who they are assigned to) and all requests assigned to
Andy (no matter what their status). You can use two vertical lines (|| ) instead of the word OR.
NOT ! Negates the condition that follows. If the condition is false, the result is true. For example, NOT 'Status'="New" finds
all requests that are not new. You can use an exclamation point (!) instead of the word NOT.
LIKE
Operator Action
Performs a pattern search. For example, 'Submitter' LIKE "Bob%ton" finds all requests with a submitter name that
begins with the letters Bob and ends with the letters ton--such as Bob Compton and Bobby Fenton. The LIKE
operator is useful only with character and diary fields. Use square brackets and the LIKE operator for Sybase
databases. Square brackets when used along with the LIKE operator do not work with Oracle databases. See Using
relational databases with BMC Remedy AR System (see page 1966) and the Operators (see page 2680).
+
Adds two numerical values (integer, real values, or decimal).
Adds an integer interval to a date/time value.
Adds two character strings.
For example, 'Create date' > $DATE$ + (8*60*60) finds all requests that were created after 8:00 a.m. today.
(*8*60*60* is the number of seconds in 8 hours.)
-
Subtracts two numerical values (integer, real values, or decimal).
Subtracts two date/time values (resulting in an integer). Subtracts an integer interval from a date/time value.
For example, 'Create date' > $TIMESTAMP$ - (7*24*60*60) finds all requests that were created within the past week.
(*7*24*60*60* is the number of seconds in one week.) This is useful to include in a custom report of all requests
created in that week.
* Multiplies two numeric values. For example, 'Quantity' * 'Price' > 50 finds all requests where the contents of the
Quantity field multiplied by the contents of the Price field is over 50.
/ Divides two numeric values. For example, 'Total Expenses' / 'Total Income' = 2 finds all requests where the total
amount spent for expenses is twice the total amount of income.
% Modulo of two integer values (the remainder of a division of the values). Because a percent sign is also a valid
wildcard symbol, the context determines how it is interpreted. When used as part of a search statement, it is
interpreted as a wildcard symbol; when used in the expression where an operator is expected, it is interpreted as
modulo.Note: Use the modulo operator only with fields whose data type is integer. If you use this operator with fields
that have other data types, such as Date/Time, an error occurs.
< Matches contents that are less than the value. For example, 'Create date' < ($TIMESTAMP$ - 24*60*60) finds all
requests created more than 24 hours ago. (24*60*60 or 86400, is the number of seconds in 24 hours.)
> Matches contents that are greater than the value. For example, 'Create date' > "09/24/07 00:00:00" finds all requests
with Create dates that are newer than midnight September 24, 2007.
!= Matches contents that are not equal to the value. For example, 'Status' != "Closed" finds all requests that are not
closed.
<= Matches contents that are less than or equal to the value. For example, 'Salary' <= 30000 finds all requests where the
contents of the Salary field are less than or equal to 30000.
>= Matches contents that are greater than or equal to the value. For example, 'Create date' >= "09/30/07" finds all
requests with Create dates equal to or more recent than September 30, 2007.
= Matches contents that are exactly equal to the value. For example, 'Status' = 0 finds all requests with a status value
equal to the first selection value.
1. ( )
2. NOT (!) - (unary minus)
3.
BMC Remedy Action Request System 9.1 Page 951 of 4703
BMC Software Confidential. BladeLogic Confidential.
3. ** / %*
4. + -
5. < <= > >= = != LIKE
6. AND (&&)
7. OR (||)
If the qualification contains multiple operators of the same precedence value, they are executed in
the order that they occur (from left to right). For example, in the expression A + (B*C), the
multiplication takes first precedence because it occurs within parentheses, which are of a higher
precedence than addition.
Wildcards
% (Percent) Matches any string of 0 or more characters. For example: J%son matches Jackson, Johnson, Jason, and
Json.
_ (Underscore) Matches any single character. For example: B_b matches Bab, Bob, and Bub.
[ ] (Square Matches any single character within a specified range or set. For example, [a-f] matches the range of
brackets) characters a through f, and [abcf] matches the set of characters a, b, c, or f.
[^] (Square Matches any single character not within a specified range or set. For example, [^a-f] matches all characters
brackets with except the range a through f, and [^abcf] matches all characters except a, b, c, or f.
caret)
In the advanced search bar, wildcard symbols are interpreted as wildcards only when used with the
LIKE operator; otherwise, they are interpreted as explicit characters. You must use the percent
symbol (%) when you want to include leading or trailing characters in your search. For example, if
you want to find all requests submitted by Jill Bobbington, Bobby Fenton, and Bob Comptonson,
enter the following text in the advanced search bar:
Note
Square brackets and the symbols associated with them do not work with Oracle
databases.
Finding all requests that were created by someone other than the current user
Enter
'Submitter' != $USER$
This example uses the not equal to operator (!= ) to find instances where the value in the Submitter
field is not equal to the user who is currently logged in. Notice the use of the $USER$ keyword.
Finding all requests that were created after 10:00 a.m. on the current day
Enter
'Create date' > "10:00:00"
The example uses the greater than operator (> ) to find requests where the value of the Create
date field is greater than the current day at 10:00 a.m.
Finding all requests that have been created for any problem that involves printing
Enter
'Submitted Problem Type' LIKE "%print%"
The example uses the LIKE operator to perform a pattern search that finds requests with the word
print anywhere in the Submitted Problem Type field.
Notice the spaces after the word Status in the field specification. The spaces exist in the field label
on the form being used. If you use the Field List dialog box by selecting the Fields button on the
advanced search bar, the spaces (and single quotation marks) are added automatically.
Note
A search statement that includes a not equal to operator (!= ) might return unexpected
results because the advanced search bar complies with ANSI SQL standards. One of
these standards distinguishes between fields that contain data and fields that have never
contained data.
For example, the following statement does not return requests where CharacterField is empty:
'CharacterField' != "one"
To include requests where CharacterField is empty, enter the search statement like this:
'CharacterField' != "one" OR 'CharacterField' = $NULL$
To open the Report Console, click the BMC Remedy AR System Report Console link in the Quick
Links area of the home page, or click the Report button after running a form search in a browser.
You can also open the Report Console by entering the correct URL to the AR System Report
Console form. BMC Remedy applications provide additional links that open the Report Console.
The links in the upper right part of the report list screen have the following functions:
Link name Description
Close Close the Report Console and return to the previous browser window.
Publish/Schedule Create or modify a schedule to run and publish a report at a specified interval.
For information about using the remaining options in the report list screen to work with reports, see
The report designer screen includes the Report Definition area, where you define the report
content, and the Filter By area, where you define an optional search query to select the records to
be included in the report.
The buttons in the upper right of the report designer screen have the following functions:
Button name Description
For information about using the options in the report designer screen, see
Report types
The options available for creating, running, and saving reports vary based on the report type. BMC
Remedy AR System includes these report types:
Web reports — The Web report type provides browser users the ability to create nicely
formatted reports. Results can be returned in the form of a list, many styles of charts, or a
list and chart together. Web reports can contain links that allow you to drill down from the
report to open BMC Remedy AR System records and view the data upon which the report is
based. Web reports can be saved in several standard formats, including Adobe PDF and
Postscript, and Microsoft Word, Excel, and PowerPoint formats.
Web reports are suitable to use in presentations, documents, email, and printing, and can
transfer data directly to spreadsheet format. Also, because each row in the report output
contains a link to the underlying data in the form, you can use Web reports to work
interactively with BMC Remedy AR System data.
BMC Remedy AR System reports — You can use BMC Remedy AR System reports to
generate output in several standard formats, including XML, .arx, and comma-separated
value (.csv). BMC Remedy AR System reports are typically used to export data in the
specified format for use in another application, for importing data into another BMC Remedy
AR System server, and to generate statistics based on the report data.
Crystal reports — Some installations of BMC Remedy AR System are integrated with the
SAP BusinessObjects or Crystal Reports reporting tools. If your administrator has installed
one of these products and has designed Crystal reports for use with BMC Remedy AR
System, you can run Crystal reports from the Report Console.
For information about creating reports, see Creating reports (see page ).
Finding reports
When you open the Report Console from the home page, all reports to which you have permission
appear in the list. You can narrow the list to show only those reports you have created, or only
reports belonging to a certain category, such as Incident Management.
When you click the Report button after running a search, the Report Console lists only those
reports that are based on the form you searched. In this case, when you run the report, only the
data you selected from the search results is included, and you cannot add to or override the report
query.
Use any of the following methods to locate reports in the Report Console list:
In the Show field, select Created by Me to list only reports you have created.
If report categories are defined, select a category from the Category field menu to see only
the reports assigned to that category.
Sort the list by clicking any of the column headings. For example, click the Form Name
column heading to sort the list by the associated forms.
Use the expand and collapse buttons located below the list to see a longer or shorter view of
the list, or to hide the list.
Running reports
You can run BMC Remedy AR System, Web, and Crystal reports from the Report Console. The
available output formats and how you select them vary by the report type. (The type of report is
listed in the Report Type column.)
In some cases, you can add an additional qualification to the report query at runtime, or override
the built-in query with a new qualification.
Note
In order to run a report, you must have permissions to the form and to the fields included
in the report. If you do not have permission to the form, the report does not appear in the
list of available reports. If you have permission to the form but do not have permission to
a field included in the report, that column is blank when you run the report.
You can run the report of all types as-is, or if the report definition allows, you can change the report
results by adding to or overriding the built-in query.
1. Locate the report you want to run in the Report Console list.
2. (Optional) To narrow the report results by adding a query, click Show Additional Filter, and
then follow the steps described in Adding a qualification at runtime (see page ).
Warning
If the report includes a primary and secondary form, the filter shows only fields that
are included in the primary form.
3. (Optional) To override a built-in report query, click Override. See Adding to or overriding a
report query at runtime (see page ).
4. For BMC Remedy AR System reports only, select the output format before running the
report. See Exporting BMC Remedy AR System reports (see page ).
Web reports run in HTML and you select the output format after running the report. See
Exporting Web reports (see page ).
5. Use one of these methods to run the report:
Select the report and click Run ( ). In this case, the report appears in a viewing
area below the list of reports.
Double-click the report entry in the list. In this case, the report appears in a separate
window. This can be helpful if you need to compare two or more reports at a time.
6. If the Parameter dialog appears, enter the requested information to narrow the report
results, and then click OK.
Note
You might see the Out Of Memory error messages when you run a BMC Remedy AR
System report without providing any qualification. To resolve this issue:
You can set the Allow Unqualified Search option on the Server Information form for
reports. (If the administrator configured the AR System server to disallow
unqualified search, reports without a qualification will return an error message.)
Tip
Although you cannot save a Web report directly to .csv format, you can still use this
format to transfer the data from a Web report to another application. To do so, export the
Web report to Microsoft Excel, and then use Excel functions to save the data in .csv
format.
Note
If the mid tier is running on UNIX, you might face issues while exporting reports in
various formats such as Excel or Word. Add the (-Djava.awt.headless=true) Java
option in the /bin/startup.sh file along with other Java options before starting
Tomcat (or any other web server that you might be using).
For example, add the Java options on Linux as follows:
3. In the Export Report dialog box, select the format for the exported report.
4. (Optional) Select which pages of the report to export. By default, all pages are selected.
5. (Optional) For PDF, PostScript, and PowerPoint formats, select Auto, Actual Size, or Fit to
Page.
These options help control how large reports are paginated in the selected output file type.
6. Click OK.
7. In the File Download dialog box, select whether you want to open or save the file.
Open — The report opens in the selected application, such as Excel. (You must have
the application installed to use this option.)
Save — The Save As dialog box appears. Navigate to the appropriate location, enter
a file name, and then click Save.
If you select Open, you can then use menu options in the associated application to
print, email, and search the report results.
The links to the underlying records in a list report remain active when you export the
report. This means that other users with access to the BMC Remedy AR System
server where the report was run can use the links in the report to drill down to the
underlying records. However, if a user without access to the BMC Remedy AR
System server clicks on the link in the exported report, the user will see a browser
"page not found" error.
Note
4. Click OK.
Tip
You can also export the report, and then print the report from the selected application.
In a list report, each row represents a single request and contains a link to that request. The link
appears in the Request ID column if it is included in the report. If the Request ID field is not
included, the link is created on the Short Description field, if included, or on the first field in the
report (the left-most column). When you click the link, the request underlying that row of the list
opens.
In a chart report, elements of the chart reflect a group of one or more underlying records. For
example, the bars in a bar chart might represent the number of students enrolled in each class in
the Sample applications. Clicking on a bar in the chart opens the form, and the records
summarized in that bar of the chart are listed in the results list.
The following are restrictions on using the drill-down feature of Web reports:
The form must allow drilling down from a report. If the administrator has turned off the "Allow
Drill Down from Web Report" form property, reports on that form do not allow you to drill
down to the underlying requests.
If the form is a vendor form, the associated plug-in must include the fields used in the report
query. If not, the following error message appears:
"Illegal field encountered in the qualifier. (ARERR 3355)."
In a chart report, you cannot drill down in the following situations:
The report was run from a search results list or table field by selecting records and
then clicking Report. In this case, the chart drill-down links are not available, because
the records represented in the chart are already available in the search results.
The selected field is a field type that contains group IDs, including the Group List field
on the User form, the Assignee Group field, or a dynamic field (field ID in the range
60000 - 69999). In this case, BMC Remedy AR System reports "No matching
requests (or no permission to requests) for qualification
criteria. (ARWARN 9296)."
The field used for the Category axis contains records with a null value. In this case,
BMC Remedy AR System reports "No matching requests (or no
permission to requests) for qualification criteria. (ARWARN
9296)."
The Category axis is based on a group field. This includes the Group List field in the
User form (field 104), the Assignee Group field in any form (field 112), or any
dynamic group field (field ID in range 60000 - 69999).
The chart is in an exported report.
All of these formats can be used to import data to an BMC Remedy AR System form with BMC
Remedy Data Import. CSV files can also be imported to other applications, such as Microsoft Excel.
For more information about the BMC Remedy AR System report file types, see Saving or exporting
BMC Remedy AR System reports (see page ).
If the edit icon ( ) appears next to a report entry in the Report Console, you can open the report
definition to examine the built-in query.
The Adding or modifying a qualification at runtime (see page 963) topic explains how to use these
two options, describes example situations to illustrate their use, and explains why they are
sometimes unavailable or might produce unexpected search results.
Note
You can also add a qualification at runtime when publishing a report. For more
information, see Publishing reports (see page 982).
To add or modify a qualification at runtime using Show Additional Filter and Override
1. Open the Report Console and select the report to run from the list of reports.
2. Click Show Additional Filter.
Warning
If the report includes a primary and secondary form, the filter shows only fields that
are included in the primary form.
3. Build the additional qualification, using either the Simple Query Builder or the Advanced
Query Builder, as described in Using a query in a Web report (see page ).
4. (Optional) Select Override to replace the report's built-in query with the added qualification.
If the Override check box is not available, overrides are disabled for this report. In that case
you can only add your qualification to the report and cannot override the built-in query.
5. Click Run to run the report with the added qualification.
If you search a form and then use the Report button in the search results list to create a
report, the records that you selected in the search results are passed to the Report Console
as a predefined query. In this case, the Show Additional Filter and Override options are not
available.
Override does not override the "base qualification" used in BMC Remedy AR System
reports. A base qualification is defined by the administrator and is outside of the report
definition. If the report contains a base qualification, your qualification is added to the base
qualification. Base qualifications are not visible in the report designer screen.
Note
Out-of- the-box Web reports provided with BMC Remedy IT Service Management
cannot be modified, even if the user is an application administrator, because the
reports are not created using the BMC Remedy Action Request System Report
Console. However, an application administrator can delete these reports.
The administrator can disable unqualified searches for reports. In other words, "1=1"
qualifications are not allowed for reports. In this case, attempts to run a report for an
unqualified search result in an error.
Peter could use the Class Registration report and add a qualification before running the report,
such as "Instructor is equal to Peter Thomas" or "Instructor is myself". His additional qualification is
added to the built-in query, and the resulting report shows only those courses for which he is the
instructor and at least one student is enrolled. In other words, he narrows the report results from all
classes with enrolled students to only those he teaches that have enrolled students.
You can also use the Override and Show Additional Filter options together to replace any built-in
query in the report. For example, to see a list of all classes in Madrid with or without students
enrolled, the training program manager could use the Class Registration report, add the query
"Location is LIKE Madrid%", and click Override. The additional query narrows the report to include
only classes in Madrid, and the override causes the report to include classes with no enrollees as
well as those with students enrolled.
When you run a search on an BMC Remedy AR System form or view a table in a browser, the
Report button appears below the search results or in the table (assuming the form or table field is
not configured to prevent this). The Report button allows you to generate a report based on the
search results or table field contents.
The Report Console opens, listing only those reports that are associated with the form you
searched.
You can also create a new report definition based on this search. In this case the report is
automatically associated with the current form. If you select the Add default fields and sort
order option, the results list fields are automatically included in the report.
The records that are selected in the search results at the time you click Report, along with
the sort order, are passed to the Report Console as a predefined query.
When you search a form, the first record in the search results is automatically selected. If
you click Report without changing this selection, only the first record is included in the
report. Use any of the following methods to select the records you want to include in the
report:
Select All — Selects all entries in the table.
SHIFT-click — To select a range of entries, click an entry and hold down the SHIFT
key. Click another entry above or below the original selection, and then release the
SHIFT key.
CTRL-click — To report on multiple entries, click an entry and then hold down the
CTRL key. Continue to click the entries you want to include in the report while holding
down the CTRL key. When you have finished selecting table entries, release the
CTRL key.
Deselect All — Clears all selections in the table.
If no entries in the table are selected when you click Report, the report includes all
the entries in the search results.
1. Open the form associated with the report that you saved.
2. Select My Reports > Run > reportName.
1. Open the form associated with the report that you saved.
2. Select My Reports > Manage.
The saved reports appear in a dialog box.
3. Delete, disable, or enable reports as needed.
4. Click Save.
Creating reports
This section describes how to define a new Web or BMC Remedy AR System report. (Crystal
reports are pre-designed and must be installed by the administrator.)
Web reports are suitable for preparing formatted list reports, which are presented in a table, and
chart reports, which allow you to select from various types of charts to illustrate the data. By using
the preview feature, you can use Web reports to work interactively with the data in the form.
BMC Remedy AR System reports are often used to export data in XML, .arx, or .csv format for use
in another application or on another BMC Remedy AR System server. In addition, you can use
BMC Remedy AR System reports to generate statistical values based on the data. BMC Remedy
AR System reports can be run on the Web.
Depending on the type of report you are creating, BMC Remedy AR System then opens either the
report design screen of the Report Console (for Web reports) or the ReportCreator form (for BMC
Remedy AR System reports).
1. In a browser, click the BMC Remedy AR System Report Console link on the home page to
open the Report Console.
2. Click New .
3. In the Type field of the New Report window, select the Web or BMC Remedy AR System
report type. This field is required.
4.
BMC Remedy Action Request System 9.1 Page 967 of 4703
BMC Software Confidential. BladeLogic Confidential.
4. In the Form field, enter the name of the form to use for the report. This field is required.
(Optional) To limit the list of forms to those that are already used in other reports,
select the Forms Used in Existing Reports check box. This can speed up retrieval of
the list of forms, but any form that is not already used in some report does appear on
the list.
To find the form quickly, type the first few letters of the form name into the field. For
example, type "Sample" to select from the list of forms related to the Sample
application.
5. Select or clear the Add default fields and sort order check box:
Selected — Fields that appear in the form's results list after a search are
automatically added to the report definition, along with the default sort order. You can
remove or change these fields and sort order later if necessary.
Cleared — No fields are added to the report definition automatically.
6. In the Name field, type a name for the report. This field is required.
The report name must be unique. The maximum length is 128 characters. Also, you cannot
change the name of the report after you exit this screen, so use care in assigning a report
name.
Note
Each report must have a unique Name/Locale combination. For example, two
reports can both be name "Monday", if the locale for each report is different.
7. Click OK.
If you selected the Web report type, the Report Console report designer screen appears. Build the
Web report definition using the following procedures:
If you selected the BMC Remedy AR System report type, the ReportCreator form opens instead.
See Defining BMC Remedy AR System reports (see page ).
For example, a partial report based on the Sample:Classes form might list all class records in the
form, showing the class title, location, instructor and number enrolled.
A link to the underlying data appears in the report results, assuming the form properties allow this.
The link is created on the Request ID if it is included in the report. If the Request ID field is not
included, the link is created on the Short Description field, if included, or on the first field in the
report (the left-most column).
1. Follow the steps described in Starting a new report (see page 967).
2. (Optional) In the Report Definition area, add a brief description of the report in the
Description field.
This description appears in the list of reports in the Report Console. If you do not enter a
description, it is identified as a "Web Report."
3. In the Content field, select List or Chart + List.
List — The report is presented as a table.
Chart + List — The report is presented as a chart, followed by a table. Use this
procedure to define the list section of the report. To define the chart, see Creating a
Web chart report (see page ).
4. (Optional) To share this report with other users who share at least one permission group in
common with you, clear the Private check box.
Other users must also have permission to the form in order to run the report, and they must
have permission to the fields included in the report in order to see the data in the report.
5. In the Columns tab, select fields from the Available Fields list to include in the report, and
then click Add, double-click, or drag them to the Column list.
You must add at least one field to the Column list to be able to save the report.
If you selected "Add default fields and sort order" when creating the report, the
defined results list fields for the form are already in the Column list.
You can select multiple fields at a time from the Available Fields list. To add all fields
to the report, click Add All.
You can include any field type except Diary fields in the report.
To remove a field from the report, select it in the Column list and then click Remove,
double-click the field, or drag it from the Column list back to the Available Fields list.
To remove all fields from the report definition, click Remove All.
Note
The available fields come from the standard view of the form or from the
view defined as the Master View for the locale. If the fields that appear do
not match the fields you see on the form, there might be a Web - Alternate
view defined. Fields in a Web - Alternate view do not appear in the Available
Fields list.
6. Use the Up and Down buttons next to the Column list to change the order of the columns in
the report.
7. (Optional) In the Sorting and Grouping tab, select one or more fields on which to sort the
report, and then click Add, or drag the selected field to the sorting list area.
If you selected "Add default fields and sort order" when creating the report, the
default sort order for the form is already added to the report definition.
To change the sort order between ascending and descending, click the arrow in the
Dir column for each field.
To group repeated values, select the Group check box.
8. (Optional) Define a qualification to identify the records that appear in the report. See Using a
query in a Web report (see page ).
9. (Optional) To preview the report before you save it, click Preview.
A sample report runs and appears in a separate browser window. The Preview feature
allows you to check and modify the report design until you are satisfied with the results.
You can also use the Preview feature in cases where you want a quick view of the data in a
form. You can print the report or export data from the preview screen.
Note
When you preview a Report that has a base qualification, the base qualification is
ignored. In this case, the report preview might include more records than when you
run the report from the Report Console list.
You can generate various types of charts and graphs to illustrate the report data. You can also
generate a chart or graph together with a list report that shows the supporting data.
For example, a tube chart could give a quick visual summary of the number of students enrolled in
each class in the Sample application, using the Sum aggregation type to calculate the total enrolled
In ad hoc reports, you can click in the data area of the chart to open the form with a results list
containing the underlying requests. This drill-down function allows you to work interactively with the
data at the time you run or preview the report.
For example, to see more information about the students enrolled in the class "Managing Within
the Law" in the Sample application-, the instructor can run this example report and then click the
column labelled "Managing Within the Law" in the chart. The Sample:Classes form then opens with
a results list containing the records for each student enrolled.
Chart Description
Pie Pie charts are most often used to display a few components that are easily distinguishable. Typically, each slice of a
pie chart displays statistics from one variable as a slice of the pie.
Bar Bar charts are most often used for direct comparison of magnitude between categories. Bar charts can also be used to
show time dependent data when the time interval is small.
Line Line charts are most often used to display trends. Line charts display values along a common baseline, which allows
quick and accurate comparisons.
Area Area charts are used to display a limited number of related, continuous variables.
Meter Meter charts measure the most recent variable value from the variable associated with that meter. Meters can be
configured to show increasing levels of severity.
Scatter Scatter charts are used to analyze the relationship between two variables. One variable is plotted on the horizontal axis
and the other is plotted on the vertical axis.
Tube Tube charts are used to display a comparison of the quantity of each variable.
Cone Cone charts are used to for direct comparisons of magnitude between categories in a cone shape.
Chart Description
Pyramid Pyramid Charts display variables in a way that reveals hierarchical structure.
1. Create a new report as described in Starting a new report (see page 967).
2. In the Content field, select Chart or Chart + List.
Chart — The report is presented as a chart or graph of the type you select.
Chart + List — The report is presented as a chart, followed by a table. Use this
procedure to define the chart section of the report. To define the list, see Defining a
Web list report (see page ).
3. In the Chart Options tab, select the chart options:
Type — The type of chart you want to produce, such as a pie chart or a bar chart.
Category Field — Select the field to supply the category data for the chart.
In a pie chart, the values in the category field become the "slices" of the pie. In
graphs, such as a bar chart, the values in the category field are plotted on the X-axis.
Warning
Make sure that the category you selected includes values. A null value can
inhibit the interactive drill-down functionality of the report.
Category Label — Supply a label to appear on the chart that describes the category
data.
Aggregation — Select an aggregation method that makes sense for the data in the
report.
Count — Reports the number of existing records for each unique value in the
category field.
Sum — Adds the values in the series field for each unique value in the
category field.
Average — Calculates an average of the values in the series field for each
unique value in the category field.
Minimum — Shows the minimum of the values in the series field for each
unique value in the category field.
Maximum — Shows the maximum of the values in the series field for each
unique value in the category field.
Series Field — Select the field to supply the category data for the chart.
In a pie chart, the values in the series field are used to created each "slice" of the pie.
In graphs, the values in the series field are plotted on the Y-axis.
Series Label — Supply a label to appear on the chart that describes the series data.
For example, to produce a chart report based on the Sample:Classes form that
shows number of students enrolled in each class, select the following chart options:
Type — Tube Chart
Category
Field — Class Title
Label — Class title
Series
Aggregation — Sum
Field — Number Enrolled
Label — Total enrolled
4. (Optional) To preview the report before you save it, click Preview.
A sample report runs and appears in a separate browser window.
5. To save the report for future use, click Save.
6. Click Back to return to the Report Console report list.
You can use the simple query builder, the advanced query builder, or both. The simple query
builder joins all query statements with the AND operator. Alternatively, advanced users can build
the query using BMC Remedy AR System query syntax with the advanced query builder. To use
the operator types OR or NOT, you must use the advanced query builder.
1. In the Filter By area of the report designer screen, select a field from the Available Fields
list.
2. Drag the field to the query area, or click Add Field.
3. Select the query operator:
Is equal to — Selects records in which the value in the chosen field matches exactly
the value entered in the query.
Is not equal to — Selects records in which the value in the chosen field does not
match the value entered in the query.
Is empty — Selects records in which the chosen field is empty.
Is not empty — Selects records in which the chosen field contains some data.
Is myself — Selects records in which the value in the chosen field matches the
current user's login ID.
Is not myself — Selects records in which the value in the chosen field does not match
the current user's login ID.
Is LIKE — Selects records in which the value in the chosen field matches the string
defined in the query.
The LIKE operator requires that you use the percent (%) wildcard, which matches
any string of 0 or more characters. For example, to get a report of classes for which
Teresa Logan is the instructor, use one of the following search strings:
Teresa% matches all entries that begin with "Teresa"
%Logan matches all entries that end with "Logan"
T%eresa% would find entries that start with "Teresa" or "Theresa"
4. Type the value to search for in the blank field.
For example, to find Teresa Logan's classes that have students enrolled, you could use the simple
query builder to construct the following query:
To use the advanced query builder to find the same records (Teresa Logan's classes that have
students enrolled), expand the advanced query builder and then add the following qualification:
To add fields, you can drag them from the Available Fields list, or select the field and then click Add
Field. To cause the query builder buttons to appear, you must add a field or click in the query area.
It is possible to enter queries in both the simple and advanced query builders for the same report. If
you do, these queries are linked with an AND operator when the report runs. If the advanced query
builder is closed, but contains a query, the beginning of the query appears along with the
Advanced expansion button:
Tip
You cannot add elements in the middle of an existing query in the advanced query
builder. If you need to modify an advanced query, you must add the modification on to the
end of the existing query, or revise the entire query.
For more information about building BMC Remedy AR System qualifications, see Running and
saving searches (see page ).
You can also use these query builders to add a query to an existing report at runtime. See Adding
to or overriding a report query at runtime (see page ).
1. In the Filter By area, select the first field that you want to use in the query from the Available
Fields list.
2. Click Add or drag the field to add it to the simple query builder.
3. In the simple query builder, click the down-arrow and select from the list of operations.
4. Enter the value to search for.
For example, to find classes for which Teresa Logan is the instructor, select the Instructor
field and the is equal to operation, and then type in Teresa Logan.
5. To add another item to the qualification, select the appropriate field from the Available Fields
list, and then click Add or drag the field to the simple query builder.
The second search criterion is added to the simple query builder with an AND search. In
other words, a record must match both conditions in order to appear in the report.
For example to find Teresa's classes that have at least one person enrolled, select Number
enrolled and is greater than, and then type in 0.
6. Click Save.
For example, a Priority field in which the user selects High, Medium, or Low might have the
database values High=0, Medium=1, Low=2. In this case, the query "Priority is greater than or
equal to Medium" will return records with priority set to Medium or Low, because in database terms
qualification is seeking values greater than or equal to 1.
If this occurs, try revising the query to use the opposite operation, for example "Priority is less than
or equal to Medium," and then re-run the search.
ReportCreator
(Click the image to expand it.)
3. In the Report Name field, enter a unique, locale-specific name for the report; for example,
MyReport-en.
4. From the Report Format drop-down list, select one of the following options for the format of
the report:
Record — Displays each field of the request on a separate line.
Column — Displays each field as a column heading, and displays information from
each request in a separate row.
Compressed — Compresses the information with commas, white space, or any other
specified character between the columns. In a browser, the compressed format is
viewed in a column format.
5.
BMC Remedy Action Request System 9.1 Page 976 of 4703
BMC Software Confidential. BladeLogic Confidential.
5. (For administrators) In the Locale field, enter the locale of the report in the format
language_Country, for example pt_BR.
The country portion of the locale code is optional, depending on whether you want to allow
all country variations of a language to use the report. If you enter only the language portion,
all country variations of a language can use the report. For example, an entry of pt would
include all country variations of Portuguese, but pt_BR designates only Brazilian Portuguese.
For a list of standard choices for this field, check the Locale view property on any form in
BMC Remedy Developer Studio.
6. In the Report Set field, enter a locale-independent description for the report.
The Report Set field is used to identify locale variants of the same report. The combination
of Report Set and Locale must be unique.
7. Update each tab in the form as described in the following sections.
Entries that are specific to Windows reports are identified in each of the tabs. Those settings
are ignored for Web reports.
8. Save the report.
1. In the Field field, click the menu button to select which fields on the specified form will be
displayed on the report.
2. In the Label field, enter the field name as you want it displayed on the report.
3. In the Field to Add Before/After field, select a field to use as a reference when clicking the
Add After or Add Before buttons.
4. Click Add Before or Add After to set the positioning of fields in a report, with reference to the
Field to Add Before/After field.
You can click Remove to remove a selected field or click Remove All to remove all
selections from the field list.
5. Click Modify to update the selected field label or width specification.
1. From the first Field Name list, select the field on which you want to sort.
2. Select Ascending or Descending Sort Order for the selected field.
3. To group by a field, select the Group check box for the selected field.
4. Repeat steps 1 through 3 for the other fields on which you want to sort.
Note
For reports to run properly in a browser, you must add a backslash to the
keyword in the Expression field, for example, $\TIMESTAMP$.
Numbers
You can type numbers directly into the Expression field, for example, 5.25, 33, and so
on.
\n Return
\t Tab
\ Backslash
1. Enter the name of the report in the Title field. The report title appears at the top of the report.
2. Enter text in the Header field. The header appears at the top of every page.
3. Enter text in the Footer field. The footer appears at the bottom of every page.
To use keywords for the Title, Header, and Footer fields, click the menu list and select the
appropriate keyword. The data in the Title, Header, and Footer fields must be a single line.
Embedded carriage returns are not allowed.
If the server is configured to allow multiple groups in the Assignee Group field, then this field will
allow multiple groups to be specified, separating each group with a single space. If the server is not
configured to allow multiple groups, then only one group can be specified in this field.
Leaving the Assignee Groups field blank allows only the submitter to view the report. Specifying
Public allows anyone to view the report.
1. In the Submitter field, enter the name of the user creating the report.
2. In the Status field, select one of the following options:
Active — Makes the report available in the Report Console.
Inactive — Indicates a report that is no longer active.
Pending — Indicates a report that is being reviewed.
If Inactive or Pending is selected, the report does not appear the Report Console list.
You can also create a copy of a report by using the Save As button to save the report with a new
name. In that case, you are the creator of the new report and can edit it.
Note
Out-of- the-box Web reports provided with BMC Remedy IT Service Management cannot
be modified, even if the user is an application administrator, because the reports are not
created by the BMC Remedy Action Request System Report Console. However, an
application administrator can delete these reports.
Scheduling reports
An administrator can assign the Job Scheduler role to groups so that members can create or
modify a schedule that specifies when a report listed in the Report Console is run and published
(called report scheduling).
Note
1. On the BMC Remedy AR System Administration Console, open the Roles form and search
for Role name as Job Scheduler.
2. In the Production field, select the Reporting User group.
3. Open the User form and assign the Reporting User to the Group List field.
4.
BMC Remedy Action Request System 9.1 Page 981 of 4703
BMC Software Confidential. BladeLogic Confidential.
4. Login to BMC Remedy AR System and verify if the user has the permission to publish
/schedule Web reports.
For more information on scheduling reports, see the following section.
To schedule reports
1. In the Report Console list, locate the report that you want to publish.
2. Select the report and click Schedule.
3. If a schedule has not been defined for the report, click New to create a schedule for
publishing a report.
4. (optional) To modify an existing schedule that is defined for a selected report, click Edit.
5. Select the date and time to publish the report.
6. In the Recurrence section, select one of the following:
Options Descriptions
Daily to run and publish the report every day, or in a regular interval of less than a week.
Perform the following:
a. In the Every field, specify the interval to publish the report. For example,
Enter 1 to publish every day.
Enter 2 to publish every alternate days.
Enter 3 to publish after every three days.
b. Select the date and time to stop the report publishing.
Weekly to run and publish the report on a particular day or days of every week or regular week interval.
Perform the following:
a. Enter a number to specify the week interval.
b. Select the day or days you want the report to publish.
c. Select the date and time to stop the report publishing.
Monthly to run and publish the report on a particular day of every month or regular month interval.
Perform the following:
a. Specify or select the day and month interval.
b. Select the date and time to stop the report publishing.
7. Click Next.
8. Specify the details for report publishing. For more details, see Publishing reports (see page
).
Publishing reports
A user who is authorized to run a report listed in the Report Console can also distribute that report
to a specified recipient or list of recipients (called report publishing). For details about running a
report, see Running reports (see page ).
1. In the Report Console list, locate the report that you want to publish.
2. Select the report and click Publish.
Note
If the report was created from a Results List or has been combined with a Saved
Search to create "My Reports," those qualifications will not be used when running
the scheduled report. Therefore, make sure that the report selected contains
appropriate qualifications within the report itself. If no qualifications are defined
within the report, the report will run as an unqualified query and might return more
results than anticipated.
3. In the AR System Report Schedule UI dialog box, select the file type for the report from the
Export options list. For example, PDF, Word, HTML, PowerPoint.
Note
If you use the HTML option, images and charts in a report are not rendered.
4. In the Send report to field, enter the email ID, login ID, login name, or email address of the
recipients to distribute the report.
Note
In the Send status to field, enter the email ID, login ID, login name, or email address of the
recipients to provide information about the report status or errors that might occur while
publishing the report.
5. In the Qualification to Usefield, use or modify the external qualification that was entered
when searching the form data. If you modify the qualification, by copying it from the Report
Console or the advanced search bar, it overrides the qualification from the initial qualified
search. If this field is empty, the embedded report qualification is used.
Note
The Qualification to Use field does not appear when publishing or scheduling a
report from the Report Console instead of performing a form search. It also does
not appear after an unqualified form search or after editing an existing schedule
with a pre-saved empty qualification.
6. Click Finish.
The file formats that you select for exporting depend on the original data source and how you will
use the data. File formats for BMC Remedy AR System reports are explained in the following
sections.
The following topics provide information about how to save or export BMC Remedy AR System
reports:
Note
When an attachment is exported in AR Export format from a browser, a .zip file is created
that includes the .arx file and the attachments.
Conversely, you can export AR XML data, parse it with any tool that parses documents that
conform to the XForm specification, and use the data outside AR System. For information about
XForms, see the W3C website.
Attachments are handled in the same manner as in the .arx file type.
Note
When you export AR System data from Crystal Reports to HTML 3.2, HTML 4.0, or XML,
your default export directory depends on whether your computer is connected to a
network. If your computer is connected to a network, and your login profile has a
temporary directory setting under Windows, your default export directory will be %
USERPROFILE%\LocalSettings\Temp. If your computer is not connected to a network
your export will default to whatever temporary directory is set in your Windows
environment settings, for example, C:\Temp or C:\Windows\Temp.
Note
You cannot export the content of an attachment with a .csv file. If you export a .csv file
with an attachment, only the file name of the attachment is exported.
Also, the compressed format is not supported in a browser. If you select Compressed as the report
format, the report is displayed in Column format instead.
Using Web reports and the BIRT Report Designer, you can:
Create reports based on BMC Remedy AR System data in the BIRT Report Designer, and
then deploy those reports to the AR System server using the Report form.
Modify out-of-the-box Web reports in the BIRT Report Designer, and deploy those reports to
the AR System server using the Report form.
This section is intended for administrators with expertise using BMC Remedy AR System
Web reports and the BIRT Report Designer. This section is intended to document only
what is specific or different to modify reports for BMC Remedy AR System.
The procedures in this branch describe how to install and use the BIRT designer. BMC
uses this system; however, BMC does not support issues related to creating new reports
with BIRT or after modifying reports shipped with BMC Remedy AR System. For non-
BMC-related questions about BIRT, go to http://www.eclipse.org/birt or visit the Eclipse
Community Forum for BIRT at http://www.eclipse.org/forums.
For information and tutorials about using the BIRT Report Designer, choose Help > Help
Contents in the BIRT Report Designer..
For information about Web reports, see Configuring reporting (see page 594).
Installing the BIRT Report Designer to work with AR System Web reports (see page 986)
Enabling BIRT to access your BMC Remedy AR System data by setting BIRT preferences
(see page 987)
Creating a new report with the BIRT Report Designer (see page 989)
Modifying an out-of-the-box Web report with the BIRT Report Designer (see page 992)
Importing a Web report to a different AR System server (see page 994)
Deploying BIRT reports to the AR System server using the Report form (see page 995)
Examples for modifying reports with the BIRT Report Designer (see page 996)
Installing the BIRT Report Designer to work with AR System Web reports
Before you can modify or create reports using the BIRT Report Designer, you must perform the
following high-level steps:
For information about system requirements for the BIRT Report Designer, see the Eclipse
documentation.
Creating a new report with the BIRT Report Designer (see page 989)
Enabling BIRT to access your BMC Remedy AR System data by setting BIRT
preferences
Before you can create new BIRT reports or export and import .rptdesign files, you must first
download and extract resource and template zip files from the AR System Resource Definitions
form, and then configure resource and template preferences in the BIRT Report Designer. The
Resource library files contain resource files for localized labels that you use for new labels to add
to a report. The BIRT library files contain the BIRT library (for example, stylesheets) and out-of-the-
box templates that you can use as you modify out-of-the-box reports or when you create new BIRT
reports.
To specify the BIRT library and template location in the BIRT Report Designer
1. To open the AR System Resource Definitions form, type the following URL into your
browser:
http://midTierServer /arsys/forms/ARSystemServer/AR System Resource Definitions
2.
BMC Remedy Action Request System 9.1 Page 987 of 4703
BMC Software Confidential. BladeLogic Confidential.
2. In the Type field, select BIRT Library, and then click Search.
Creating a new report with the BIRT Report Designer (see page 989)
Modifying an out-of-the-box Web report with the BIRT Report Designer (see page 992)
To create a new report with the BIRT Report Designer (see page 989)
To enable data access for a BIRT report by creating a data source (see page 989)
To define the data available in a report by creating a data set (see page 990)
To preview and save a new BIRT report (see page 992)
1. In the BIRT Report Designer, choose File > New > New Report.
2. Enter a file name.
Use the default file location or browse to a different file location.
3. If you want to use a blank report template, click Finish.
4. If you want to select a report template, click Next, select a report template, then click Finish.
The new report appears in the Layout editor pane of the BIRT Report Designer.
1. In the BIRT Report Designer, go to the Data Explorer tab, right-click Data Sources, and
select New Data Source.
2. If the Data Explorer tab is not open, choose Window > Show View > Data Explorer.
3.
BMC Remedy Action Request System 9.1 Page 989 of 4703
BMC Software Confidential. BladeLogic Confidential.
3. In the New Data Source dialog box, make sure Create from a data source type in the follow
list (default) and BMC Remedy AR System ODA Data Source (default) are selected, and
then click Next.
If BMC Remedy AR System ODA Data Source does not appear as a selection in
the New Data Source box, make sure the correct BMC Remedy AR System plug-in
files were copied to the BIRT install directory. See To copy BMC Remedy AR
System plug-ins for use with BIRT (see page ).
4. In the New BMC Remedy AR System Designtime Data Source Profile dialog box, enter the
User Name and Server for the AR System server data source.
You must create a BIRT data source before you build a data set. For details, see To
enable data access for a BIRT report by creating a data source (see page 989).
1.
BMC Remedy Action Request System 9.1 Page 990 of 4703
BMC Software Confidential. BladeLogic Confidential.
1. In the BIRT Report Designer, click the Data Explorer tab, right-click Data Sets, and select
New Data Set.
2. Configure the New Data Set dialog box:
a. Enter the Data Set Name, for example, Incident Data Set.
b. Under the Data Source node, select the data source, and then click Next.
For example, select a data source previously created for this report.
Query box
(Click the image to expand it.)
b. Click Add.
The Available Fields dialog box displays all fields in the selected form.
c. Select the fields you want to include in the report, and then click OK.
d. In the Qualification field, enter the criteria to be used for the query, click Verify, and
then click Finish.
Enter the qualification using this format:
For example, for the incidents that are not closed, enter:
'Status' != "Closed"
e. Click Finish.
BMC recommends using query for a data set instead of filters. Data set
filters are applied to the entire result set, and can impair performance. Use
the qualification in the query configuration to filter data.
4. If you want to change a column label in a report, configure the Output Columns dialog box.
For example, you can change the Short Description column heading to Description.
a. Select the output column you want to edit.
b. Click Edit.
c. In the Display Name field, change the column label.
d. Click OK.
For a description of the parameters that can be configured in the Data Set editor, see
the BIRT online help.
1. In the Edit Data Set dialog box, preview the data for the new report by clicking Preview
Results in the left navigation area, and then click OK.
The data that fills in the criteria of the data set appears in the right pane of the Edit Data Set
box.
2. To save the new BIRT report, choose File > Save As, and then enter a meaningful file name
in the File Name field.
3. Click Finish.
Note
Before modifying an out-of-the-box Web report with BIRT, BMC recommends saving a
copy of the report definition file (.rptdesign file) and its corresponding record in the Report
form.
To make sure that future upgrades do not overwrite your modified Web report, set Status
to Pending or Inactive.
You can also import your original exported Web report (.rptdesign file) to a different AR System
server. See Importing a Web report to a different AR System server (see page 994).
To export a .rptdesign file from the Report form to the BIRT Report Designer
1. To open the Report form, type the following URL into your browser:
http:// midTierServer/arsys/forms/ARSystemServer/Report
2. Search for an out-of-the-box Web report that you want to edit, and select the report from the
search results.
3. In the Instance ID field, copy the Instance ID value of the report you want to edit.
4. Open the Report Definition form, paste the Instance ID you copied in the previous step from
the Report form into the Report Definition GUID field, and then click Search.
5. In the search result, right-click the attached .rptdesign file, and then click Save.
6. Save the .rptdesign file to a folder where you store reports.
Note
Make sure the Report Definition GUID does not change during editing. If the GUID of the
report definition changes, the GUID will not be associated with the correct report.
1. In the BIRT report tool, choose File > Open File, and open the .rptdesign file you exported
from the Report form.
2. Edit the report using the BIRT Report Designer, and then save the edited file.
Note
For details about modifying reports with the BIRT Report Designer, such as adding a row
or column, see the BIRT Report Designer help.
Modifying reports with BIRT Report Designer is discussed further in Examples for
modifying reports with the BIRT Report Designer (see page 996).
To import the .rptdesign file from the BIRT Report Designer to the Report form
1. In the Report Console, open the Report form, and search for a Web report.
2. In the Report Definition File area, right-click the .rptdesign file, and click Add.
3. In the Confirm Save Request dialog box, click Yes.
4. In the Add Attachment dialog box, click Choose File, then browse and select the .rptdesign
file you edited in the BIRT Report Designer, and click OK.
1. Follow the same procedure as To modify an imported report in the BIRT Report Designer
(see page 993), with the following exceptions:
a. When you search for an out-of-the-box report in the Report form, select the Print
Incident report.
b. In the BIRT Report Designer, open the Print Incident report.
c. Right-click the data set, choose Edit > Query > Add, and select Work Detail in the
Available Fields dialog box.
d. Import the report back into an AR System server.
BMC recommends the process in this section instead of the one detailed in Modifying an
out-of-the-box Web report with the BIRT Report Designer (see page 992).
1. In the Report form, select the Web report that you want to export.
2. Export the Web report to an .arx file.
The report attachment will be part of this .arx file.
3. Import the .arx file to the target AR System server using the BMC Remedy Data Import Tool.
To make sure that duplicate report entries are not created in the target AR System, import
the report file using the following fields as key fields: Report Set Name, Locale, and Report
Type. This is a concern when a report has been modified and a fixed report is being moved.
Deploying BIRT reports to the AR System server using the Report form
The reports you create or modify in the BIRT Report Designer must have a record in the Report
form in order to be available in the Report Console. Creating a record for your report in the Report
form includes:
Before you start, determine where in the Category menu hierarchy you want the report to appear.
As shown the following figure, this affects how you complete the Category 1 (for example,
Incident), Category 2 (for example, Open Incidents), and Category 3 (for example, Count by
Assignee Group) fields. You can complete up to three Category fields, or you can create your own
categories, using the Category fields.
1. To open the Report form, type the following URL into your browser:
http://midTierServer/arsys/forms/ARSystemServer/Report
2. In the Report form, click New Request to create a record for the report.
3. Complete the required fields of the form and the Category fields.
Enter unique, meaningful names for the Report Name and Report Set Name.
4. Attach the report definition file for the report to the request by doing the following:
a. Click Add.
b. Attach the .rptdesign file for the report.
c. Click OK.
5. Click Save, and then search for the report you just saved.
6. Copy the Instance ID of the report.
7. To open the Report Definition form, type the following URL into your browser:
http://midTierServer/arsys/forms/ARSystemServer/Report Definition
8. In the Report Definition form, paste the Instance ID you copied for the report in the Report
form into the Report Definition GUID field.
9.
BMC Remedy Action Request System 9.1 Page 995 of 4703
BMC Software Confidential. BladeLogic Confidential.
9. Click Search.
The search results show the report design file for the report you are deploying to the AR
System server using the Report form.
10. Go to the Report Console, and refresh the browser.
11. In the Category menu, locate the report you deployed.
12. Click the report to open it, and run the report.
1. To open the file of a report in the BIRT Report Designer, choose File > Open File, and then
select the file.
The report opens in the Layout tab of the layout editor.
2. In the Data Explorer tab, right-click a data set under the Data Sets node, and drag and drop
it into the layout editor.
Data set element dragged into layout editor in the BIRT Report Designer
(Click the image to expand it.)
After you drop the data set into the layout editor, the table is automatically created with the
fields you selected for the data set.
3. In the bottom left corner of the table, click the Table icon.
The icons for other parts of table appear on the left, such as Table-Header, Table-Detail,
and Table-Footer.
4. Right-click the icon of the report element to which you want to apply a style, and choose
Style > Apply Style, and select a style appropriate for the report element.
For example, apply the bmcReportTheme:TableHeader theme to the Table-Header.
Selecting a style
1. In the Layout tab of the layout editor, right-click the report header and choose Edit.
Layout editor
(Click the image to expand it.)
Using the parameters used in the previous example, this example sorts the results in the far left
column by Status.
1. With the report open in the Layout tab of the layout editor, go to the Data Explorer tab and
double-click a data set under the Data Sets node.
2. In the Edit Data Set dialog box, click the Sorting tab.
3. Click Add to open the Available Fields dialog box.
4. Select the fields you want to sort by in the report, and then click OK.
For example, select the Status and Assignee Groups fields.
5. Preview the report to make sure the report is sorted by the parameter you added to the
Sorting tab.
a. Save the report.
b. Run the report.
c. Close the report after reviewing its content.
6. If the report is not sorted as expected, review step 2 through step 4.
1. Go to the Layout tab of the layout editor, select the Table icon of the table, right-click the
table header row, and select Insert Group.
2. In the New Group dialog box, in the Group On list, select the parameter with which you want
to group the results, and then click OK.
3. Preview the report to make sure the results are grouped by the parameter you configured in
the New Group box.
In the following figure, the report is grouped and sorted by the Status parameter. The first
Assigned row has no data, then the next Assigned rows contain records. Then the first In
Progress row has no data, then the following In Progress rows contain records.
4. To apply a style to the group header, go back to the report file in the Layout tab, and right-
click the group header row.
5. Choose Style > Apply Style > bmcReportTheme:GroupHeader1.
6. Preview the report (save, run, and close the report) to check the group header style.
This example shows you how to configure a report that counts the number of incidents.
1. In the Layout tab of the layout editor, select the Table icon, right-click a cell in a Table Group-
Header row, and choose Insert > Aggregation.
Inserting an aggregation
(Click the image to expand it.)
2. In the Aggregation Builder dialog box, configure a report row by doing the following tasks:
a. In the Function list, select COUNT.
b. In the Expression list, select Incident Number.
c. Click OK.
3. Preview the report (save, run, and close the report).
This report groups results by the parameter you configured in the New Group box in, and
displays the number of incidents in the Table Group Header row for incidents with Assigned
and In Progress.
To add a column
To add a parameter
Note
Select one of the following options because the Default Value field can be
edited only if you do not edit the Linked to Report Parameter field.
b. In the Linked To Report Parameter field, select the name of the new parameter you
created.
c. In the Default Value field, edit the qualification query of the data set based on the
report parameter that you linked to.
For example, enter the following in the Expression Builder:
where dsLicenseType is the data set parameter which refers to the report
parameter.
11. Preview the report (save, run, and close the report).
The Parameter box of the report appears and specifies a fixed License type parameter. The
report shows People records having a fixed License type.
When you run most out-of-the-box reports in BMC Remedy AR System or BMC Remedy IT Service
Management Suite, the Parameter box appears and requests information to narrow the report
results. For example, the Parameter box can request the Start Date and End Date for reports with
a date range.
Parameter box
(Click the images to expand it.)
1. Search for an out-of-the-box Web report that contains date-related fields that you want to
edit, and save its .rptdesign file to a folder where you store reports.
For details, see Modifying an out-of-the-box Web report with the BIRT Report Designer (see
page 992).
a. In the Report form, search for a report with the words Date and Range in its title by
entering % Date Range in the Report Name field.
b. Select a report.
For example, the Expiring Contracts by Date Range report.
2. In the BIRT Report Designer, choose File > Open File, and open the .rptdesign file you
exported from the Report form.
3. Go to the Data Explorer tab, click the Report Parameters node.
4. To edit a report parameter, right-click the report parameter you want to edit, and select Edit
from the submenu.
For example, if you want to edit the Start Date field, right-click Start Date.
For details on editing parameters, see the BIRT Report Designer online help.
5. If you want to see how a parameter is filtered for a data set, go to the Data Explorer tab,
right-click the data set you want to examine, click Edit, then click Filters.
For details on editing a filter condition, see the BIRT Report Designer online help.
If a customer listing provides a customer ID, that customer ID can be input into a subreport
that displays details about each customer. An ID value is often the common data between
two data sets.
If a parent report displays only the amount spent (or other customer data), a subreport can
provide customer details (such as address). A subreport can show a combined parent report
and subreport.
Testing each subreport before building the next subreport can help minimize difficulties that can
arise with subreports.
The example in this section provides high-level instructions. Subreports are discussed in detail in
the BIRT Report Designer online help.
To create a subreport
8. Insert a second table element inside the new detail row of table.
The child table must have the child record data set associated to it.
13. Preview the report (save, run, and close the report).
Note
Drill down reports are summary reports which can be drilled through to get related detail data in
other reports at a granular level. The first report presented in a series of drill down reports provides
only required or necessary data, and then the user decides whether they want further details. By
adding hyperlinks, you make drill down reports interactive for your user.
For example, a report first might show only a pie chart, which summarizes the report results. When
a user clicks a slice of the pie chart, a detailed report opens for that particular slice of data.
The following scenarios looks at the report development of the “All incidents by Status and
assigned Group” drill down report in ITSM.
1. Gather and analyze data to decide how to divide information into multiple stages.
For example, the example report has a high number of incidents based on their status. The
incidents have a particular status and are assigned to groups. There are also records for the
incidents. A particular record in an incident form can provide details of that incident.
Therefore, the design of this drill down report needs the following levels:
In this example:
A pie chart shows Incident Count categories based on Status
A bar chart shows the Incident Count by Assigned Group for the Status slice selected
in the pie chart
A detailed incident report based on the Assigned Group bar selected in the bar chart
2. Create a data source and data set required for a report (for example, HPD: Help Desk).
3. Insert a table in the report layout area.
4. Bind the data set property of the table.
5. Insert the required fields in the details section (for example, Incident Number, Assignee,
Customer Name, and so on).
6. Insert groups in the table by right-clicking in the detail row of the table and selecting Insert
Group.
Insert the first group based on Status, and the second group based on Assigned Group.
7. Insert a chart in the table by right-clicking in a table header and choosing Insert > Chart.
Insert a pie chart showing the number of Incidents categorized based on Incident Status.
8. In the Status group header (header of first group) of the table, insert a bar chart that will
show the number of Incidents categorized based on Assigned Group.
9. In the second group header, choose Insert > Grid to display details of Incident Count,
Assigned Group, and Status.
10. In the first group header, right-click and select Properties, select Bookmark in the Property
Editor, then enter the following in the Bookmark box:
row["Status"]
1. To add a new report parameter, select Hidden in the New Parameter dialog box box, and
click OK.
This new parameter will be used in script to fetch the mid tier URL.
2. Select a data set.
In this example, select the HPD:Help Desk data set.
3. Go to the Script tab of the report, and select the BeforeOpen event in the Script list.
The script fetches the MidTier URL at runtime and sets it to the hidden parameter created in
step 1. The script is as follows:
if (request != null ) {
if (session != null ) {
if (urlValue != null ) {
} else {
4. Go to Layout tab of the report, and select Incident Number, which was inserted in the table
details section in step 5.
5.
BMC Remedy Action Request System 9.1 Page 1006 of 4703
BMC Software Confidential. BladeLogic Confidential.
The Open Data Access (ODA) framework in BIRT converts the Currency Field in BMC Remedy AR
System to the following fields:
<Field Name>.OBJECT
<Field Name>.VALUE
<Field Name>.TYPE
OBJECT is of type String and has currency value as well as currency type.
1. With a report open in the Layout tab of the layout editor, click the Data Explorer tab, and
double-click a data set under the Data Sets node.
2. In the Edit Data Set dialog box, click Computed Columns.
3. Click New.
4. In the Column Name field, type a name for the computed column.
5. In the Data Type field, select Decimal.
6. In the Expression field, type the expression, for example:
if (row["Associated Cost.OBJECT"].toFunctionalValue(params["CurrencyType"].value)
The first report shown in step 13 of this example shows the results grouped by their Assigned
Group (for example, A SupGrp) and then grouped by their Status (for example, Assigned, In
Progress, and Pending).
The second report shown in step 20 shows a deeper level of grouping, with the results grouped by
their Assigned Group, then grouped by each Assignee within each Assigned Group, and then
grouped by their Status.
4. Add another column for the Submit Date to the right of the Incident Number column.
5. Save and run the report to preview it.
The report shows columns for the Assigned Groups, Incident Number, and Submit Date.
Report preview after adding two columns
(Click the image to expand it.)
6. In the Layout pane, right-click in the Table Group Header row, and choose Insert Group >
Below.
7. In the New Group dialog box, select Status in the Group On list, then click OK.
The Status group is added to the table.
8. Right-click the Status group, and select a Group Header style for it.
Selecting a style for the Status group
9. Apply a style to the other group headers and other rows in the table.
10. For formatting, merge the Status table group header cells and add a label to the left of the
data set field.
Merging and labeling the Status table group header
(Click the image to expand it.)
11. Right-click in the Status group header row, and choose Insert > Grid.
12. In the Insert Grid dialog box, set the grid size as 2 columns and 1 row.
13. Save and run the report to preview it.
The report shows the results grouped by their Assigned Group (for example, A Test
Support, ABC Group) and then grouped by their Status (for example, Assigned and In
Progress).
Report preview showing grouping by Assigned Group and then Status
(Click the image to expand it.)
To take the grouping to another level, this example adds the Assignee group within the
Assigned Group group.
14. Right-click in the Status table group header, and choose Insert Group > Above.
15. In the New Group dialog box, set the grid size as 2 columns and 1 row.
16. Select Assignee in the Group On list, then click OK.
The Assignee group is added to the table.
Assignee group added in Layout pane
(Click the image to expand it.)
17. For formatting, merge the Assigned table group header cells and add a label to the left of
the data set field.
Merging and labeling the Assigned table group header
(Click the image to expand it.)
18. Right-click in the Assigned group header row, and choose Insert > Grid.
19.
BMC Remedy Action Request System 9.1 Page 1009 of 4703
BMC Software Confidential. BladeLogic Confidential.
19. In the Insert Grid dialog box, set the grid size as 2 columns and 1 row.
20. Save and run the report to preview it.
The report shows the results grouped by their Assigned Group (for example, A SupGrp),
then grouped by Assignee (for example, A1 User), and then grouped by their Status (for
example, Assigned and In Progress).
Report preview showing grouping by Assigned Group, then grouped by Assignee, and then
Status
(Click the image to expand it.)
b. Under In the Value (Y) Series, configure at least two series of data for Status using
the Expression Builder.
Optionally, configure the Aggregate Expression field to Count.
c. Under In the Value (X) Series, configure a series of data for Assignee Groups using
the Expression Builder.
6.
BMC Remedy Action Request System 9.1 Page 1010 of 4703
BMC Software Confidential. BladeLogic Confidential.
Approving requests
The following topics provide information about how to approve requests:
Approve, Reject, and Hold create an appropriate reply email that contains details about the request
entry in the AP:Detail-Signature form. You can verify the information and send this reply email to
BMC Remedy Approval Server to complete the action. The reply email message contains
comments about what must be changed before sending the message.
Note
Joe, the sales department manager, received an email notification in Microsoft Outlook on
his laptop. The request was from one of his sales representatives for a new Blackberry
phone. The message contained the standard options: Approve, Reject, Hold, and Go to
Approval Central. Because the sales representative had talked to Joe about this request,
Joe was fully aware of all the details. After verifying the price of the Blackberry phone, Joe
clicked Approve, and a reply email was created. Joe clicked Send to send the reply email to
BMC Remedy Approval Server. The following actions then took place:
Upon receiving the reply from Joe, BMC Remedy Email Engine parsed it, located the
approval signature record, and updated the record with the Approved action.
The workflow set the How Signed field on the signature line to Email.
If BMC Remedy Approval Server had been customized to do so, it sent an email
message back to Joe, informing him that the request was successfully approved.
If there are more approvers configured, BMC Remedy Approval Server sent an email
notification to the next approver in the approval chain.
If BMC Remedy Approval Server had been customized to do so, it sent an email
message back to the requestor, the sales representative, informing him that his
request was successfully approved. If not configured, the requestor can track the
request through Approval Central.
Sandy, the Finance Manager, received an email notification with the standard options in her
email inbox, asking her approval for a Blackberry phone for one of the sales representatives.
Sandy needed more information about this request, so she clicked Go to Approval Central.
In Approval Central, she reviewed the request details and approved the request.
To configure email
Follow the steps in the Configuring BMC Remedy Email Engine for modify actions (see page 689)
section.
Important
Set the Use Security Key field value to No instead of Yes in step 7 of that section.
Note
The customization of the templates is optional. However, BMC recommends that you
customize the templates as per your requirements.
Note
Do not change the template names or any other field values on the AR
System Email Templates form.
a. In the Configurable Section, add the fields that are required by the approver to take
the appropriate action for the approval requests from the application's three-way join
form.
Important
Make sure that the fields that you are adding have appropriate permissions.
Note
BMC recommends that the Encoding value must be set to UTF-8, while
saving the file.
4. In the table, right-click the Template attachment row and click Delete to remove the old file.
5. Right-click the Template attachment row and click Add.
6. In the Add Attachment window, select the template saved in step 3 (see page 1013) and click
OK.
7. Click Save to save the form.
Defining notifications
Application
Also add the fields from the Configurable Section of the saved HTML
templates. For more information, see step 3 (see page 1013) in Customizing the
template (see page 1013).
g. To include field values in the message text, use the Message drop-down list.
5. Click the Email tab and enter the following values:
a. Select Yes as a value for the Use Email based Approval template field.
The appropriate template name appears in the Content field.
The other fields in the Email tab are the same as those used when you create an
Email or User Default notify mechanism in a Notify filter action.
The menus in the Fields columns on this tab contain fields from the three-way join
form. You can select from the Fields and Keywords menus to use variables in all the
fields on this tab.
b. In the Mailbox Name field, enter the name of an outgoing mailbox that is configured in
the AR System Email Mailbox Configuration form. This field is not required if you use
the default outgoing mailbox.
You can use a field or a keyword to get the mailbox name. The mailbox name must
correspond to an outgoing mailbox configured in the AR System Email Mailbox
Configuration form.
c. Enter the appropriate information in the From and Reply To fields.
Note
Make sure you use the same name for the From and Reply To fields.
Note
If you set the CC and BCC fields while sending the notification, BMC
Remedy Email Engine displays an error, because the security key is
disabled and more that one recipients are mentioned.
e.
BMC Remedy Action Request System 9.1 Page 1015 of 4703
BMC Software Confidential. BladeLogic Confidential.
e. In the Header, Content, and Footer fields specify the names of the email templates to
use for the header, content, and footer of the email notification.
6. (Optional) Click the Administrative Information tab and enter Help Text that describes this
notification.
7. Click Save.
1. Log on to an AR System server, and click the Approval Administration Console link on the
home page.
2. On the Administration form, click the Form tab.
3. Perform one of the following to open the AP:Form form.
a. Click Create on the AP:Form, select the approval request form for your application
from the Form Name list.
b. Select a record from the table and click View to modify configurations for an existing
request form.
4. On the Basic tab of the AP:Form form, select one of the following options to configure the
Request ID link on Approval Central:
Application Request Form — To open the application form for the current request
Approval - Application 3-Way Join Form — To open the three-way join form between
the approval server and the application for the current request
Customize — To open a custom form
a. On the AP:Customize-SourceID dialog box, specify the following values:
Display mode in which to open the form
Custom form to be opened
Form view to be displayed
Lookup field or the field mappings (depending on the selected Display mode)
b. Click OK.
For more information, see AP-Customize-SourceID form (see page 1671).
5. Select a view for the selected form.
If you do not select a view, the form opens in the default view.
6. Save the AP:Form form.
To allow users to preview approval responses, you must perform the following configuration
actions:
Configure the BMC Remedy AR System server and the BMC Remedy Approval Server to
use a Plug-in Loopback RPC socket. See Configuring server settings for BMC Remedy
Approval Server logging and loopback calls (see page 4204).
Configure the approval process to generate a preview at the required time. See Creating a
process (see page 1613).
Design a form that queries the AP:PreviewInfo form. See Adding previews to your approval
application (see page 2912).
Create workflow that uses the Add-PGNA-Values command to gather signatures. See
Defining Parameterized Get Next Approver rules (see page 1641).
The following topics provide information about how approvers use Approval Central to process
approval requests, how approvers and process administrators specify alternate approvers, and
how process administrators carry out approval overrides:
Approval Central is designed for process administrators and approvers, and is used to perform the
following activities:
Process administrators use Approval Central to override approvers when necessary. Approvers
also use Approval Central when acting as alternates for other approvers.
The examples in this section are from the Get Agreement and Lunch Scheduler sample
applications, which are installed with BMC Remedy Approval Server. For more information about
the sample applications, see Using the Get Agreement sample application (see page ) and
Using the Lunch Scheduler sample application (see page 1656).
If the request appears unacceptable, you can reject it. Rejection usually ends the
process for this request, unless rules are in place that require further processing. See
Get Authority rules (see page 1632), Signature Accumulator rules (see page 1646), and
Statistical Override rules (see page 1648) .
If you are not the appropriate person to approve the request, you can reassign it.
Acting As = MySelf
User = yourARSystemUserID
Approval Status = Pending or Approval Status = More Information or Approval Status = Hold
Using this query, BMC Remedy AR System searches for requests that are awaiting your action. If
any requests are found, they appear in the Pending Approvals table.
You can also use the Quick Search and Advanced Search functionality on Approval Central.
Specify your search criteria in this section, and click the Search icon to display a set of requests in
the Approval Search Result table.
For example, you can retrieve a list of only those requests pertaining to a particular application,
requests made by a specific requester, requests that are already approved or rejected, or requests
directed to another approver for whom you are designated as an alternate. For more information,
see Approval Search (see page 1712).
The following procedure is an example of how to retrieve a list of requests that pertain to a
particular application.
1. Open Approval Central using one of the methods described in Opening Approval Central
(see page ).
2. In the right pane, click Advanced Search to open the Approval Search section.
3. Select AP-Sample2:Get Agreement in the Application field, and select ( clear) in the Status
field.
4. Leave the default values in the remaining fields, and click Search.
The Approval Search Result table then displays all requests that belong to the AP-Sample2:
Get Agreement sample application for the current user.
For information about adding an application to the Application field, see Integrating Approval
Server with an application (see page 2893).
1. Open Approval Central using one of the methods described in Opening Approval Central
(see page ).
2. In the Pending Approvals table, use the check boxes to select the pending requests that you
want to act upon.
3. Click Approve Selected, Reject Selected, or Hold Selected.
If the related approval processes require approvers to enter a password, the AP:Password
dialog box appears. If necessary, enter your password when prompted, and click Submit.
Note
When you click Approve Selected, Reject Selected, or Hold Selected, the status of
the selected requests changes. These modified requests continue to appear in the
Pending Approvals table until the table is refreshed, or until you navigate to
another page or link. No undo option exists when you respond to a request so
there is no opportunity to change your mind.
1. Open Approval Central using one of the methods described in Opening Approval Central
(see page ).
2. In the Pending Approvals table, select the pending request that you want to act upon.
3. Click Approve, Reject, Hold, Reassign, Approval Details, or View Questions and Responses.
For more information about the various icons, see Working with pending approval requests
(see page 1018).
The justification is stored as a note in the Approval Activity Log, and sent to:
Currently, this feature is associated only with the Reject action. If an approver enters a justification
and clicks any other action button, the request status changes as appropriate, but the text is not
stored at any location.
The mandate for providing a justification is configurable at the process level. Process
administrators can use the Rejection Justification area on the Configuration tab of the AP:Process
Definition form to specify:
If justification is required, but the approver does not enter any text in the Justification For Action
field on Approval Central before clicking Reject, the AP:Rejection Justification dialog box appears.
The following events could occur:
Applications can also enable approvers to provide rejection justification on the three-way join form.
To make this possible, application developers must:
Add a Character field of unrestricted length (to accept more than 255 characters) on the
three-way join form for an approver to enter the comment.
Provide the workflow to push the comment onto the AP:Signature form after the approver
clicks Reject.
If the process mandates a rejection justification, and the approver sets Approval Status to Rejected
and saves the request without providing a justification, the Reject action fails. The following error is
written to the approval log:
The processName process requires a rejection justification, which the approver failed to provide.
See Creating the join forms (see page 2894) and Approval forms (see page 1663).
For general information about join forms, see Join forms (see page 2306).
The Approval Details icon on Approval Central opens the AP:Show-Detail form, which enables you
to see more details about a request. You can also approve, reject, or hold an approval request,
add ad hoc approvers, reassign a request to another approver, and create or respond to More
Information requests using this form.
On Approval Central, the Request ID link that appears in the Request Details section for a request
opens the relevant application form. Click the Show Signatures button on the application form (if
implemented) to open the three-way join form associated with the application request. This
document also refers to this view as the "detail view." The following procedures use this detail view
to perform various actions on an approval request.
After viewing the details of an approval request, you can approve or reject the request by changing
the Approval Status in the detail view.
1. Open Approval Central by using one of the methods described in Opening Approval Central
(see page ).
2. In the Pending Approvals table, select the pending request you want to work with, and click
its link in the Request Details section.
The appropriate request form opens (for example, AP-Sample2:Get Agreement).
3. Click the Show Signatures button.
The appropriate three-way join form opens (for example, AP-Sample2:Issue Detail Signal).
Setting the Approval Status field
(Click the image to expand it.)
4. Click the drop-down arrow on the Approval Status field, and select Approve.
To ask for more information about the request, see Processing More Information requests
(see page ).
5. If the Password field is present, enter your password. Otherwise, proceed to the next step.
If a password is required and you do not enter your password, or if you enter the wrong
password, the product returns the following error message:
Authentication failed. Please enter your valid AR System password.
(ARERR 45490)
Note
The BMC Remedy AR System administrator must configure the Password field to
appear on the three-way join form when it is required. See Displaying the
password field in the detail view (see page 2911).
6. Click Save.
You can use the same procedure to reject or hold a request by setting the Approval Status
to Rejected or Hold.
For information about how to configure an approval process to require a password, see
Creating a process (see page 1613).
When you return to Approval Central and refresh the search, this request is removed from
the table of pending requests.
Warning
After you respond to a request, you cannot undo or change your response.
Perform the following procedure if you must specify the next approver instead of automatically
routing the request. With some processes, such as an Ad Hoc process, approvers can or must
specify additional approvers. The process administrator can also configure Parent-Child, Level,
and Rule-Based processes to allow users to add the next approver with the Allow Ad Hoc Next
Approver field. See Creating a process (see page 1613).
You must specify the additional approvers before or at the same time as you approve or reject the
approval request. After you have approved or rejected the request, you no longer have access to
the Next Approvers field.
Note
If the approval process includes rules that specify the next approver, the process rules
supersede any changes you make in the detail-signature view.
Specifying the next approver is not the same as reassigning an approval request. The option to
specify the next approver also requires you to approve or reject the request. For information about
reassigning requests, see Reassigning approval requests (see page 1025).
1. Open Approval Central by using one of the methods described in Opening Approval Central
(see page ).
2. In the Pending Approvals table, select the pending request you want to work with, and click
its link in the Request Details section.
The relevant request form appears.
3. Click the Show Signatures button.
The appropriate three-way join form is displayed.
Adding multiple approvers
(Click the image to expand it.)
4. In the Next Approver field, enter the names of the next approvers.
You must enter one or more BMC Remedy AR System login IDs. To specify multiple
approvers, separate each name with a semicolon (;) .
5.
BMC Remedy Action Request System 9.1 Page 1024 of 4703
BMC Software Confidential. BladeLogic Confidential.
5. If you specify multiple approvers, determine the appropriate option for the If Multiple
Approvers field.
One Must Sign — A single signature entry is created for all approvers. Only one of
those approvers needs to take action.
All Must Sign — Separate signature entries are created for all approvers. Each
approver must take action for the request to proceed further.
Note
To reassign an approval request to a different approver, perform the following procedure. The
Reassign To field appears when the process allows you to reassign approval requests.
1. Open Approval Central by using one of the methods described in Opening Approval Central
(see page ).
2. In the Pending Approvals table, select the pending request you want to work with, and click
its link in the Request Details section.
3. In the request form, Click the Show Signatures button.
4. In the Reassign To field on the three-way join form, enter the name of the approver to whom
you want to reassign the request.
You can enter only one person's BMC Remedy AR System login ID.
5. Click Save.
BMC Remedy Approval Server routes the request to the reassigned approver.
When you create a More Information request, BMC Remedy Approval Server links it to the original
approval request and changes the status of the approval request to More Information. Thus, others
can see that the request is paused until the More Information request is answered.
Your response to the original approval is independent from the More Information request's routing.
In other words, you do not have to wait for the More Information response before approving or
rejecting the approval request. However, if you do approve or reject the original approval request,
BMC Remedy Approval Server immediately closes any related outstanding More Information
requests.
The procedures in the following topics describe the basic steps for requesting more information
and responding to More Information requests:
The Questions and Comments features that make it easier to work with More Information
Requests. For more information, see AP-Show-Detail form (see page 1724).
Use the following procedure to request more information before approving a request.
1. Open Approval Central by using one of the methods described in Opening Approval Central
(see page ).
2. In the Pending Approvals table, select the pending request you want to work with, and click
its link in the Request Details section.
3. On the application request form that appears, click the Show Signatures button.
4. On the relevant detail form that appears, click Manage More Information.
Note
The Manage More Information control is not provided out-of-the-box with BMC
Remedy Approval Server; it is only included in the sample applications. To use this
control with a customized application, you must add it to the relevant three-way
join form.
a.
BMC Remedy Action Request System 9.1 Page 1026 of 4703
6. BMC Software Confidential. BladeLogic Confidential.
a. In the To field, enter the name of the person from whom you want more information.
This can be the original requester or any other person, but it must be that person's
exact BMC Remedy AR System login ID.
b. In the Question field, enter a description of the information you need.
c. Click Save.
The More Information form closes, and the pending More Information request
appears temporarily in the More Information Requests table on the AP:Dtl-Sig-
MoreInfoDialog form.
d. Click Close.
BMC Remedy AR System forwards the request to the person from whom you requested more
information. The original approval request is updated with More Information status and is retained
in the list of pending approval requests until the recipient has responded to the More Information
request. However, the approver can approve or reject the request even though the request is in
More Information state.
Use the following procedure to display and respond to the More Information requests directed to
you for your approval.
1. Open Approval Central by using one of the methods described in Opening Approval Central
(see page ).
By default, the Pending Approvals table displays requests with the Pending, Hold, and More
Information, status.
2. To view requests with the More Information status only, in the Summary section, click Needs
Attention.
3. The Needs Attention Approvals table displays the list of More Information requests that are
awaiting your attention; select a request to view its details.
4. In the Request Details section, click Response.
The AP:More Information form opens in Modify mode, and More Information requests
directed to you are listed in the results table included on the form.
5.
BMC Remedy Action Request System 9.1 Page 1027 of 4703
BMC Software Confidential. BladeLogic Confidential.
5. Select the request you want to respond to from the results list.
The details area of the form changes to show details of the selected More Information
request.
6. Type your answer in the Response field, and click Save.
The status of the More Information request automatically changes to Completed. The
request no longer appears in the More Information Requests table after the search is
refreshed. BMC Remedy Approval Server routes the response back to the More Information
requester.
Note
By default, the Public group does not have change permission to the Response
field of the AP:More Information form. The BMC Remedy AR System administrator
must set the correct permissions on this field to allow the appropriate groups to
respond to More Information requests.
1. Open Approval Central by using one of the methods described in Opening Approval Central
(see page ).
2. Select the appropriate request from the Pending Approvals table, and click Approval Details.
3. On the AP:Show-Detail form, open the Activity Log tab.
4. Click the row pertaining to your Question or Comment.
The response is visible in the appropriate field of the Activity Log Details section.
You can access More Information requests that you have submitted by finding the related
approval request in Approval Central, and clicking Manage More Information in the details
view to access the related More Information request.
Note
The Manage More Information control is not provided out-of-the-box with BMC
Remedy Approval Server; it is only included in the sample applications. To use this
control with a customized application, you must add it to the relevant three-way
join form.
1. Open Approval Central by using one of the methods described in Opening Approval Central
(see page ).
By default, the Pending Approvals table displays a predefined number of requests, including
those in the Pending, More Information, and Hold states.
2. To view More Information requests only, click the Needs Attention link in the Summary panel.
This action also displays only a predefined number of requests at a time.
3. To view the complete list of More Information requests awaiting your attention, select More
Information in the Status field in the Quick search section. The Approval Search Result table
displays the requests for which the status is More Information.
4. In the Approval Search Result table, select a request and click Approval Details.
5. On the AP:Show-Detail form, open the Activity Log tab.
6. Click the row pertaining to your Question or Comment.
The Activity Log Details section displays the corresponding details.
You can search the AP:More Information form to find and view all the More Information requests
that you have sent, regardless of the request status.
The following topics provide information about how to use alternate approvers:
Designating alternate approvers for yourself or other approvers (see page 1030)
Viewing and modifying alternate approver definitions (see page 1032)
Viewing requests for which you are an alternate approver (see page 1032)
If you want multiple alternates, repeat this procedure for each alternate.
Note
If your alternate designates an alternate, authority to sign your approvals is not passed
on. Only the specific person you designate can act as your alternate.
1. Open Approval Central by using one of the methods described in Opening Approval Central
(see page ).
2. In the Actions section, click My Alternate Approvers.
The AP:Alternate form opens in New mode.
3. In the Alternate field, enter the BMC Remedy AR System login name of the person to
designate as your alternate.
4. Use the Start Date and End Date fields to specify the time frame in which you want the
alternate to act on your behalf.
5. In the Coveringfield, select either of the following options:
All — To authorize the alternate to approve all processes for which you have
signature authority.
Specific — To authorize the alternate to approve a specific process. Then select a
process from the Process list.
6. In the Notify Alternate field, select Yes to send notifications to the alternate for each new
approval, or No to prevent notifications to the alternate.
7. Click Save.
Note
A time lapse of up to 60 minutes past the defined End Date might occur before an
alternate loses the alternate privileges. For performance reasons, this interval is
set to 60 minutes in BMC Remedy Approval Server.
1. Open Approval Central by using one of the methods described in Opening Approval Central
(see page ).
2. In the Actions section, click My Alternate Approvers.
The AP:Alternate form opens in New mode.
3. Click New Search to change to Search mode, and click Search.
The results list appears, containing a list of your past, current, and cancelled alternates.
4. To see details, select the record you want to view; the record details appear in the details
pane.
5. Modify the fields you want to change.
6. If you want to cancel this approver, select Cancelled from the Status field.
7. Click Save to save your changes, or Close to close the record without any changes.
Note
Your administrator might need to modify the permissions on the fields in the AP:
Alternate form to allow submitters to make changes to requests in the form.
By default, Approval Central displays requests assigned to other approvers for whom you are
designated as an alternate approver. You can identify such requests by looking at the Acting As
column in the Approval Requests table. The requests for which there is no value in the Acting As
column, are directly assigned to you.
Approval Central displays only a predefined number of requests at a time. To view all requests on
which you can act as an alternate approver, perform a search as described in the following
procedure.
1. Open Approval Central by using one of the methods described in Opening Approval Central
(see page ).
2.
BMC Remedy Action Request System 9.1 Page 1032 of 4703
BMC Software Confidential. BladeLogic Confidential.
Performing overrides
The override capability of BMC Remedy Approval Server allows a process administrator to move
an approval process forward when the normal approver has not responded. An override is useful in
an unexpected situation, such as when the normal approver is unavailable but did not designate an
alternate.
A global override closes all open signatures, stops routing the request, and terminates the approval
process for that request. The global override is useful for unusual situations, such as ending an
approval process for a request that is no longer necessary.
A process administrator can assign override-only authority to any user without granting other
approval process administrator privileges. For more information, see Configuring process
administrator capabilities. (see page 628)
1. Log on to the product as the process administrator for the process you need to override
(such as the process administrator or BMC Remedy AR System administrator).
2. Open Approval Central by using one of the methods described in Opening Approval Central
(see page ).
3.
BMC Remedy Action Request System 9.1 Page 1033 of 4703
BMC Software Confidential. BladeLogic Confidential.
1. Log on to BMC Remedy AR System as the process administrator for the process you need
to override (such as the process administrator or BMC Remedy AR System administrator).
2. Open Approval Central by using one of the methods described in Opening Approval Central
(see page ).
3. In the Actions section, click Search My Approvals.
4. In the Approval Searchsection:
a. In the Acting As field, select Global Override.
b. In the Application field, select the appropriate application if necessary.
c. Click Search.
The Approval Search Result table displays all pending requests for the application
selected. You can now approve or reject these requests with override authority.
The following topics provide information about the Get Agreement sample agreement:
Responding to and viewing responses to More Information requests (see page 1039)
Checking status of requests (see page 1040)
The procedures in this section use a set of sample users: Frank Williams, Jack Miller, Larry
Goldstein, Violet Anderson, and Sue Smith. To follow the sample application procedures using
these names, the BMC Remedy AR System administrator must create the BMC Remedy AR
System user names, and they must be issued either floating or fixed write licenses. Because this is
an Ad Hoc process, you can also substitute licensed user names that already exist on your system
when you try these procedures.
In the sample procedures, Frank Williams (the requester) requests a new computer. The approvers
use Approval Central to approve or reject the approval request, and to reassign an approval
request to another approver. The sample users also send and respond to More Information
requests.
The sample application demonstrates the use of Approval Central, an application request form (in
this case, AP-Sample2:Get Agreement), and related forms, such as the three-way join form (AP-
Sample2:Issue Detail Signat) and AP:More Information forms. It also demonstrates how to display
the status of an approval request and how to identify the actions taken by each approver.
Note
The Questions, Comments with attachments, Notes, and Multi-process preview features
are available out-of-the-box with this sample application. For more information, see AP-
Show-Detail form (see page 1724).
In this section, use the sample application to start the approval process by creating a new approval
request.
1. Log on to the appropriate BMC Remedy AR System server as the sample user Frank
Williams.
2. In a browser, open AP-Sample2:Get Agreement in New mode using the URL:
http://<hostName>/arsys/forms/<serverName>/AP-Sample2:Get Agreement
hostName is the name of the web server where BMC Remedy Mid Tier is running, and
serverName is the name of the BMC Remedy AR System server where BMC Remedy
Approval Server is running.
Note
In this sample application, the Get Agreement form is the application request form.
1. Log on to BMC Remedy AR System as the sample user Jack Miller and open Approval
Central.
By default, the Pending Approvals table shows requests with the Pending, Hold, or More
Information status for the current user. Because Jack Miller was included in the list of
approvers, the "I need a new computer" request appears in the table.
2. In the Pending Approvals table, select the appropriate request.
3. Click the Approve icon.
Even after approving, Frank's request continues to appear in the list of pending approvals
for Jack Miller until the table is refreshed, or until you navigate to another page or link.
Note
1. Log on to BMC Remedy AR System as the sample user Violet Anderson, and open
Approval Central.
2. From the Pending Approvals table, select the I need a new computer request, and click the
Reassign icon.
3. If prompted, enter your BMC Remedy AR System password.
4. In the AP:Reassign dialog box, type Sue Smith, and click OK.
Enter the login name and not the first name and last name. In this case, Sue Smith
is a login name.
To request more information about an approval request, you can create a separate More
Information request. The AP:More Information stores the More Information request, and allows
approvers to ask questions and have them answered before acting on an approval request.
1. Log on to BMC Remedy AR System as the sample user Larry Goldstein and open Approval
Central.
2. Select the I need a new computer request from the Approval Requests table, and click the
Approval Details icon.
3. On the AP:Show-Detail form, open the Activity Log tab and click Add.
4. In the Activity Log Details panel, perform the following steps:
a. In the Type field, select Question.
b. In the Question To field, specify the login name of the person from whom you need
more information.
c. In the Question field, enter appropriate text.
d. Click Save.
An entry is added to the Activity Log table.
5. Click Close.
Note
Larry could approve or reject the approval request without waiting for Violet's response to
the More Information request. If he does so, Larry's More Information request is closed
when Frank's approval request is complete (all approvers have responded), regardless of
whether Violet has responded to the More Information request.
1. Log on to BMC Remedy AR System as the sample user Violet Anderson, and open
Approval Central.
2. In the Summary panel, click the Needs Attention link.
3. Select the "I need a new computer" request, and click Response.
4. In the AP:More Information form, enter the appropriate text in the Response field, and click
Save.
The AP:More Information form closes. The More Information request is no longer visible to
Violet after she responds to it, and the Approval Status of the request changes back to
Pending.
Note
To save an entry in the Response field of the AP:More Information form, the user
must be a member of a group with Change permission to the field. The BMC
Remedy AR System administrator might need to set the appropriate group-based
permissions on the Response field. For information about changing field
permissions, see Field permissions (see page 1279).
1. Log on to BMC Remedy AR System as the sample user Larry Goldstein, and open Approval
Central.
2. Select the approval request for which you sent a More Information request, and click the
Approval Details icon.
Note
Until the recipient responds to the More Information request, the Approval Status
of the associated approval request is More Information, rather than Pending. If you
do not see the approval request you are looking for in the approval requests table
on Approval Central, click the Search My Approvals link in the Actions panel and
search for More Information requests.
Tip
Optionally, to see the response in the AP:More Information form, click Needs
Attention on Approval Central, select the appropriate request, and click View.
This section shows how to verify the status of an approval request that you created. It requires that
you have followed Creating new approval requests (see page ).
Before trying you check the status of Frank Williams' request, perform the following procedures
(see Approving approval requests (see page )):
1. Log on to BMC Remedy AR System as Larry Goldstein, and approve the "I need a new
computer" request.
2.
BMC Remedy Action Request System 9.1 Page 1040 of 4703
BMC Software Confidential. BladeLogic Confidential.
2. Log on to BMC Remedy AR System as Jack Miller, and approve the "I need a new
computer" request.
4. To determine which approver is associated with each status, select an entry from the results
list.
The approver's name appears in the Approvers field, in the detail area of the window. In the
example shown in above figure, Frank can see that this request is Pending for Violet
Anderson.
For information about configuring and using the flashboards provided with the BMC Remedy ITSM
implementation, see Configuring flashboards and Using flashboards.
Viewing flashboards
After you add the flashboard to the form and configure the mid tier and BMC Remedy AR System,
you can view your flashboard by opening the form that contains the Data Visualization field with the
flashboard in a web browser.
Note
To view Unicode characters in a flashboards field on the BMC Remedy Mid Tier, you
must have the appropriate language packages installed on the system on which the mid
tier is running.
Sorting flashboards
In versions earlier than 8.1, you could sort BMC Remedy Flashboards based on the labels that
were specified for the charts. In version 8.1, you can sort flashboards based on the values
specified for each data point in ascending or descending order, and display the resulting data.
Note
Single Group by — The X axis does not have multiple categories. Every data point falls into
one category on the X axis. The sorting is done inside that category.
Double Group by — The X axis has multiple categories and each category has multiple
bars. The sorting is done over each category according to length of corresponding bars.
In this topic:
1. Select All Objects > Flashboard Variables and click the Operations tab.
2. On the Group By tab, select the primary and secondary values.
3. In the Sortfield, select one of the following values:
No Sort
By Value
By Attribute
For more information, see the description of the Sort variable in Fields used to create
a flashboard variable table.
4. Specify the sort order by selecting either Ascending or Descending.
5. If you selected the By Attribute value in step 3 (see page ), type the required value in the
Sort Attribute field.
6. Click Save.
1. In a web browser, display the flashboard created during design time. For more information,
see Setting up flashboard update intervals.
2. Create a Set Field action for using any of the following parameters and its values defined
during run time:
sortType
sortOrder
sortAttribute
sortIsAttributeEnum
For more information, see Display parameters for charts.
Note
The parameters and the values set during run time, overwrite the
parameters and values set during design time.
Types of sorting
This section explains the types of sorting and provides examples.
Sort by numbers
Use the Sort by numbers option to arrange the primary categories by the cumulative values
(heights of the bars). For this type of sorting, both, Single Group by and Double Group by variable
grouping is supported.
The example in the following figure uses the Single Group by option to show the population in each
age group in a city. When you sort the data in ascending order, the result shows the total number
of people in each category, with the children being the smallest category and middle-aged people
being the largest category.
The example in the following figure uses the Double Group by option to show the total population
and the population of each age group for different cities. The sorting is in ascending order based
on the age group in each city.
Note
Only Double Group by variable grouping supports the Sort by specific value of attribute
option.
The example in the following figure uses the Sort by specific value of attribute option. The sorting is
in ascending order according to the number of middle-aged people (purple).
Refreshing flashboards
To enable users to refresh a BMC Remedy Flashboard, you can implement one of several
methods:
The user can refresh a flashboard by closing and re-opening the form that contains the
flashboard.
You can create a Refresh button that activates a Set Fields active link that resets the
flashboards field.
You can create a Refresh button that activates a Set Fields active link that resets the
flashboards field. Simply set the field to itself for the Set Fields action to refresh the field.
You can create a Set Fields active link at a specified interval to refresh a flashboard.
For more information, see Set Fields action and structures (see page 3492).
Displaying tooltips
When you hover your mouse over a flashboard, is shows the corresponding values of the
underlying data.
Displaying a tooltip
Flashboard controls
Button or Description
field
ESC
ZoomShow Legend
ZoomShow Legend
Zooms in on specific parts of the flashboard. Click the button, and move the cursor to the flashboard. Click and drag
the area you want to zoom in on.
Allows you to change the flashboard to another type of chart. The options are:
Line Chart
Column Chart
Stacked Bar
Area Chart
Stacked Area
Pie Chart
Mouse over a grouping, and a tooltip displays the statistics for that grouping.
Click a grouping, and a tooltip displays more statistical information (such as the x and y
values).
To view the information about line, area, and stacked area charts, mouse over or click the end
point of the group.
Administering
BMC Remedy AR System administrators and security administrators use the information in this
section to set up user accounts and to manage and maintain the system after it is installed and
configured. For information about additional initial configuration, see Configuring after
installation (see page 271).
Goal Instructions
Configuring servers and applications in the console Navigating the BMC Remedy AR
interface System Administration console
interface (see page 1048)
Setting options in configuration files that are read upon BMC Remedy AR System
startup of BMC Remedy AR System components configuration files (see page 1057)
Managing passwords, access control, and other Security administration (see page
security matters 1243)
Setting options for user and administration preferences Setting user preferences (see
in the BMC Remedy AR System User Preference form page 1333)
or the BMC Remedy Mid Tier
Goal Instructions
Managing time periods to define business schedules Defining business schedules using
by using BMC Remedy AR System commands Business Time (see page 1359)
Configuring the server to allow workflow to notify users Enabling alert notifications (see
page 1394)
Automatically specifying the person responsible for Assigning requests with the
handling a request Assignment Engine (see page 1402)
Allowing search within attached documents and Enabling and disabling full text
increasing search speed in long text fields search (see page 1405)
Managing processes and rules for approval requests Setting up the approval process
(see page 1584)
Managing the capture of server-related activities, and Capturing server events for
notifying other servers or clients of these changes workflow or API calls (see page
1799)
Auditing, archiving, importing, and exporting data, Managing data (see page 1817)
including other BMC Remedy AR System database
matters
Automatically transferring objects and data between Migrating applications and data
AR System servers with workflows between AR System servers (see
page 1987)
Configuring Twitter, RSS feeds, and chat for end users Enabling Social Collaboration in
and receiving BMC Remedy ITSM Suite Twitter alerts BMC Remedy AR System (see
page 2147)
In this topic:
The following sections describe the categories available in the AR System Administration Console.
System category
General— Provides the following links that enable you to configure your server and view
server information:
Server Information — Used to configure your server. See Configuring AR System
servers (see page 285).
FTS Configuration — Used to configure FTS. See FTS Configuration form in the AR
System Administration Console (see page 584).
SNMP Configuration — Used to configure the SNMP Agent. See SNMP
Configuration form in the AR System Administration Console (see page 565).
Review Statistics — Used to view statistics about the server.
Review Server Events — Used to capture server-related activities and use them in
workflow and API programs. See Capturing server events for workflow or API calls
(see page 1799).
Add or Remove Licenses — Used to configure license information. See Working with
BMC Remedy AR System licenses (see page 274).
Password Management Configuration — User to force password changes. See
Enforcing a password policy introduction (see page 1303).
Orchestrator Configuration — Used to define the Atrium Orchestrator web service for
BMC Remedy AR System. See Defining BMC Atrium Orchestrator web services (see
page 888).
Web Services Registry — Used to register a web service. See Registering,
modifying, and de-registering web services (see page 3311).
Web Services Registry Query — Used to register the ServiceContext web service for
a BMC application. See Registering the Service Context web service for BMC
applications.
Distributed Server Option (DSO) — Provides the following links that enable you to configure
DSO. See How BMC Remedy Distributed Server Option manages distributed business
requests (see page 104).
Distributed Mappings — See Distributed mapping (see page 1744).
Distributed Pools — See Distributed pools (see page 1749).
Pending DSO Operations — Managing pending distributed operations (see page 1769)
.
Distributed Logical Mappings — See Enabling logical mappings (see page 1767).
LDAP — Provides the following links that enable you to configure LDAP. See LDAP plug-ins
in BMC Remedy AR System (see page 812).
ARDBC Configuration — Used to configure the ARDBC plug-in. See Configuring the
ARDBC LDAP plug-in (see page 813).
AREA Configuration — Used to configure the AREA plug-in. See Configuring the
AREA LDAP plug-in (see page 822).
Email — Provides the following links that enable you to configure Email Engine. See
Controlling BMC Remedy AR System through email (see page 1440).
Mailbox Configuration — Used to configure outgoing and incoming mailboxes. See
Configuring outgoing mailboxes (see page 634) and Configuring incoming mailboxes
(see page 657).
Email Templates — Used to create templates for outgoing or incoming email. See
Creating and using email templates (see page 1524).
Email Security — Used to configure outgoing and incoming mailbox security. See
Securing incoming and outgoing email (see page 689).
Email Error Logs — Used to store the logs of errors that have occurred during email
transmissions. See Email error and system status logs (see page 4248).
Application category
Users/Groups/Roles— Used to configure users, groups, and roles. See these topics:
Users — Used to configure users. See Adding and modifying user information (see
page 1246).
Groups — Used to configure groups. See Creating and managing groups (see page
1251).
Roles — Used to configure roles. See Creating and mapping roles (see page 1262).
License Review — Used to view the current user information. See Viewing user
license information (see page 1326).
Business Time — Used to configure business time. See Defining business schedules using
Business Time (see page 1359).
Reports — Used to configure reports. See Configuring reporting (see page 594).
Report Creator — See Defining BMC Remedy AR System reports (see page 976).
Report Type — See Defining a report type (see page 598).
Currency— Used to configure currency fields. See Currency fields (see page 2485) and
Setting currency types (see page 309).
Currency Codes — See Localizing currency codes (see page 3076).
Currency Label Catalog — See Localizing currency codes (see page 3076).
Currency Localized Labels — See Localizing currency codes (see page 3076).
Currency Ratios — See Currency exchange ratios (see page 2490)
Other— Used to view Message Catalog entries and application state information.
Message Catalog — See Localizing BMC Remedy AR System applications (see
page 3062).
Application States — See Working with deployable application states (see page 2289)
for more information about application states.
My Admin
Search Admin
My User Preferences
My Central Files
Search User Preferences
Best practices
Best practice Details
Keep minimum traffic High amount of traffic between a client and a server, especially in WAN environment, can lead
between client and to decrease performance in a browser. Here are some common checks that will help you reduce traffic
server between client and server:
Evaluate all the traffic that flows between client and server on window open, window loaded, and
on major operations and combine to a single service call operation.
Identify the redundant operations and remove the operations when you modify the features.
Identify the redundant operations that can be executed once and save the output of these
operations in global variables.
See Examples for keeping minimum traffic between client and server (see page ).
If possible, defer
operations Defer operations for the data that you do not need immediately.
If any information is not visible for the user, do not retrieve this information till the user needs the
information or requests for the information.
Deferring operations provides better responsiveness. A series of small delays is better response
than one long delay, so divide long delays in series of small delays.
Note: There are some optimizations that occur automatically in the mid tier, like postponing all UI updates
and refreshing table fields at the end of processing.
Develop or move Business logic is a workflow that drives or validates a business process, which should be run by
business logic to run filters. Client or server interactions performed at the server, reduce the number of active links on the
from the server form, which improves the performance on the client.
Avoid fiddling with Avoiding unnecessary fiddling on the web form makes the web form more responsive. You should avoid
web forms unnecessary screen fiddling, if it provides minimal value to the end user.
Remove obsolete
fields Delete fields and trim fields that are defined on the form but are not present in any view.
Check the field cross-reference. If the field is obsolete, delete the field or remove the field from the
view. You can use the BMC Remedy Developer Studio Analyzer to find the unused fields and
other application objects.
See Using Analyzer to find problems in your applications (see page 3148).
Note:
To get data, a window loaded active link needs to issue four round-trip calls to the server.
Data can be consolidated to one service call, which is managed and returned from the server
side. When you use the service call, the window loaded active link makes one round trip service
call to the server, and on the server side filters related to that service gets data from the different
areas.
Note
You must run the filter as an end user and not as an administrator.
The table fields in a form retrieve data from the server, based on the table qualification. If you need
additional information based on the retrieved records, for other workflow, you should include that
information in the table fields as hidden columns.
Store the data that is used for multiple forms in a global variable. This eliminates the need
to retrieve the data multiple times in standard form variables on each form that requires the data.
Evaluate the workflows that are executed multiple times and reduce the redundant workflows. You
can use active link logging and analyzer to find the redundant workflows.
Turning off automatic table refreshes prevents round-trip communication to server when you scroll
through incident tickets.
Make active links smart enough to refresh only when a tab is selected.
ar
The ar file contains the list of BMC Remedy AR System servers to which the client tools (BMC
Remedy Developer Studio) connect if no servers are specified on startup. The ARGetListServer
function uses this file to return a list of available servers.
Entries in this file contain the following fields separated by a space or tab:
serverName serverInformationList
serverName is the name of the server computer. The name is resolved to a network address
by using the name resolution strategy of the local computer.
serverInformationList identifies the server as a BMC Remedy AR System server (AR) and
specifies the TCP port and RPC program numbers if applicable.
Lines with a pound sign (#) in column 1 are treated as comments and are ignored.
ar synopsis
UNIX — ARSystemServerInstallDir/conf/ar
Windows — ARSystemHomeDir\ar
ar environment
ARCONFIGDIR
(UNIX only) Specifies the directory where the ar.conf file and other BMC Remedy AR System
configuration files are stored. The arsystem script sets ARCONFIGDIR to
ARSystemServerInstallDir/conf, and you should not need to change this value. However,
arsystem does not modify ARCONFIGDIR if a preset value is found.
ar scenarios
The following ar file entries register two server computers as BMC Remedy AR System servers:
server2 AR;;3030;;390600
The TCP port and RPC program numbers are specified for server2.
ar.cfg or ar.conf
The ar.cfg (Windows) or ar.conf (UNIX) file contains AR System server configuration changes and
is dynamically created when you install AR System server.
When you make a server configuration change in the AR System Administration:Server Information
form, the configuration parameters and their new values appear in this file.
Any process can use the ARGetServerInfo function to retrieve configuration information from this
file. You can use the ARSetServerInfo function to modify the information. Such modifications take
effect immediately.
Manual modifications do not take effect until the BMC Remedy AR System server process is
restarted or signaled to reread the configuration file with arsignal -c.
Synopsis
UNIX — ARSystemServerInstallDir/conf/ar.conf
Windows — ARSystemServerInstallDir\Conf\ar.cfg
Options
For ar.conf options, see:
Environment
ARCONFIGDIR
(UNIX only) Specifies the directory where the ar.conf file and other BMC Remedy AR System
configuration files are stored. The arsystem script sets ARCONFIGDIR to
ARSystemServerInstallDir/conf, and you should not need to change this value. However, arsystem
does not modify ARCONFIGDIR if a preset value is found.
Scenarios
The following configuration file identifies two directory locations:
<parameter>: <value>
Each parameter represents a particular configuration option. The available configuration options
and their settings are described in the following table. Lines that do not begin with one of these
options are ignored.
The associated value represents the current setting for the option. All numeric values are in a base
10 system.
Default behavior occurs either when an option is set to the default value or when the option is not
in the file.
1. Options you can view (but not set) using the AR System Administration: Server Information form.
2. Options you cannot set or view using the AR System Administration: Server Information form.
Lines with a pound sign (# ) in column 1 are treated as comments and ignored.
Note
BMC recommends to use the AR System Configuration Generic UI form to modify the
configuration settings. You should not use the ar.cfg file to modify the configuration
settings available on the AR System Configuration Generic UI form. See Configuration
Settings A-B (see page 1142).
The following tables lists the options available for the ar.cfg (ar.conf) file. Unless otherwise denoted
by the table's footnotes, you can also set these options in the AR System Administration: Server
Information form.
This section of the table includes the options for the ar.cfg (ar.conf) file that begin with the letters A
and B.
Note
All options in this file can be manually modified. Entries are case- and space-sensitive, so
be careful when editing this file.
Tips
Press F to view the table in full screen mode. Press Esc to exit full screen mode.
To easily search for a specific parameter in the below table, select the parameter
from the Option list. Alternatively, type the name of the parameter in the Option
text box.
For example, to search for the Admin-Only-Mode parameter, select it from the
Option list, or type the parameter name in the Option text box.
To search for all parameters having a specific text string in the name, type the text
string in the Option text box.
For example, to search for all API parameters, type API in the Option text box.
To search for the parameters which have a specific text string in the description,
type the string in the Description text box.
For example, to search for the parameters which have $\USER$ in the description,
type $\USER$ in the Description text box.
Active-Link-Dir
Directory in which active link server run processes are stored. Only commands in the The Security
specified directory can be run. This is a security feature that ensures clients or API area on the
programs use only a safe set of server processes. Advanced tab
of the AR
System
Administration:
Server
Information
form. (See
Setting
performance
and security
options.)
Active-Link-Shell (UNIX only) Parent shell of any active link server process. This parameter causes the The Security
server to start the shell with the specified process as a parameter. This is a security area on the
feature. The specified shell might be a security shell that verifies a path or runs with a Advanced tab
user ID other than the one the server uses. For example, if the server runs as root of the AR
and an administrator specifies a shell that runs as a lower user privilege, an active System
link invokes the shell that runs as a user instead of as root. Because the AR System Administration:
server passes the shell command to the Active-Link-Shell as a single string without Server
any other command-line arguments, the command parameters can often get Information
interpreted incorrectly. The AR System server does not know which custom shell is form. (See
supposed to be used for active link processing, so it does not know how to supply all Setting
of the necessary arguments. In order to avoid this and use the Active-Link-Shell performance
Feature correctly, follow the steps listed below: and security
options.)
1. Determine what your desired shell is, and how to invoke it passing a single
command line. If the desired shell is /bin/csh, the correct way to invoke with a
single command line is
2. Write a /bin/sh script that invokes your custom shell in the required manner, as
shown below:
#!/bin/sh
# Usage:
# /path/to/arsystem-csh-helper process-command
# Pass process-command as a command line to /bin/csh.
#
# use "$*" preserve argument as a single string
exec /bin/csh -c "$*"
3. Put the script in a location where the AR System server will be able to call it.
For example, local utilities are often installed in a directory named /usr/local or
/usr/local/bin. Another good location might be the AR System server
installation directory. Be sure to mark the new program executable:
# cp arsystem-csh-helper /usr/local/arsystem-csh-helper
# chmod 755 /usr/local/arsystem-csh-helper
Admin-Only-Mode Flag indicating whether only administrators and subadministrators can access the The
server. Values are Administrator-
Only Mode
T — Admin-only mode is on. field on the
F — (Default) Admin-only mode is off. Configuration
tab of the AR
System
Administration:
Server
Information
form. (See
Setting
administrative
options.)
Allow-Backquote-In- Option that enables the server to run a process with a backquote in the process
Process-String name or in its arguments. Values are T and F (default).
Allow-Guest-Users Flag indicating whether the BMC Remedy AR System server accepts guest users The Allow
(users not registered with BMC Remedy AR System in a User form). Values are Guest Users
field on the
T — (Default) Allow guest users. Unregistered users have no permissions but Configuration
can perform some basic operations. For example, they can submit requests to tab of the AR
forms to which the Public group has access and whose fields allow any user System
to submit values. Administration:
F — Do not allow guest users. Unregistered users have no access to the Server
system. Information
form. (See
Setting
administrative
options.)
Allow-Unqual-Queries Flag indicating whether unqualified searches can be performed on the BMC Remedy The Allow
AR System server. Unqualified searches are ARGetListEntry or Unqualified
ARGetListEntryWithFields calls in which the qualifier parameter is NULL or has an Searches field
operation value of 0 (AR_COND_OP_NONE ). Such searches can cause on the
performance problems because they return all requests for a form. This is especially Configuration
problematic for large forms. Values are tab of the AR
System
T — (Default) Allow unqualified searches. Administration:
F — Do not allow unqualified searches. Server
Information
form. (See
Setting
administrative
options.)
Alternate-Approval- Flag indicating how applications such as Approval Server or Reconciliation Engine
Reg 2 listen for the BMC Remedy AR System server's signal. Values are
API-Log-File Full path name of the file to use if API logging is on (See Debug-mode). The API Log
field on the Log
Files tab of the
AR System
Administration:
Server
Information
form. (See
Setting log files
options.)
API-SQL-Stats-Max- Maximum number of longest API and SQL operations saved in memory. The default
Saved-Long- is 20 of each type. The highest value allowed is 100.
Operations
API-SQL-Stats-Flush- Time, in minutes, between flushing the longest operations from memory to the forms.
To-DB-Interval A value of 0 (the default) means that there is no automatic flushing.
API-SQL-Stats- Minimum elapsed time an operation must have to qualify for recording. The default is
Minimum-Elapsed- 5000 milliseconds (or 5 seconds).
Time
Approval-Defn-Check- Interval (in seconds) at which Approval Server checks for changed or updated data in
Interval 2 the data definition forms.
Approval-Debug-Type Type that specifies the logging level for the approval logs of the Approval server. The Logging
Settings area
Values are on the Basic
tab of the AP:
NORMAL— Use this value to set the minimum logging level for approval logs.
Admin-
Note: When Approval-Debug-Type is set to NORMAL, only severe issues are
ServerSettings
written to the logs.
form. (See
ALL— Use this value to set the maximum logging level for the approval logs.
Configuring
Default value: Normal server settings
for BMC
Remedy
Approval
Server logging
and loopback
calls (see page
4204).)
Approval-Due-Soon1 Specifies the Due-Soon Interval in hours or days for the approval requests that are
displayed when an approver logs in to Approval Central.
Approval-Notify 2 Flag indicating whether approval notifications are configured from the Server Settings
dialog box. An Approval-Notify entry exists for each ID. The syntax is Approval-Notify:
ID value Do not change this option in the ar.cfg (ar.conf ) file. Instead, from the AP:
Administration form, click the Server Settings link to open a dialog box with
configuration settings for the Approval Server.
Approval-Polling- Interval at which the Approval Server polls the AR System server for pending work.
Interval This setting is intended as a backup method, not the primary contact method. Under
normal circumstances, the AR System server or the Application Dispatcher
(depending on the configuration) contacts the Approval Server when work is pending.
When this option is specified, the Approval Server polls the AR System server only if
it does not receive a signal from the AR System server in the specified time.
If the interval value is not specified, the default value ( 1800 seconds or 30 minutes)
is considered.
Approval-Recent- Specifies the Recent History Interval in hours or days for the approval requests that
History1 are displayed in the My Approval History section of Approval Central for an approver.
Approval-RPC-Socket RPC Program Number that Approval Server uses when contacting BMC Remedy AR
2 System. This enables you to specify a private BMC Remedy AR System server for
Approval Server.
AppSignal logging Flag indicating whether logging for the appsignal library is enabled or disabled. By
default, logging is disabled. To enable logging, add the following entry in the ar.cfg(ar.
conf ) file:
AppSignal logging : T
Note: If this entry is missing from the file, the default value ( AppSignal logging: F) is
considered.
When you enable logging, the following log files are created in the db directory (
installationDirectory/db for UNIX and installationDirectory\Arserver\db for Windows):
AR-Max-Attach-Size 2 Maximum size (in bytes) of compressed attachments that can be sent to the AR
System database from the AR System server. By preventing large attachments from
being sent to the database, you can prevent excessive memory growth and reduce
transmission time. This limit does not apply to attachments retrieved from the
database by the AR System server. This option applies to all databases.
Note: To limit the size of compressed attachments that the server can retrieve from
Oracle databases, use Db-Max-Attach-Size.
ARDBC-LDAP-Base- Base distinguished name (DN) to use instead of the root DN as the starting point for The Base DN
DN discovering vendor tables when you design vendor forms. For example: ARBDC- For Discovery
LDAP-Base-DN: CN=Users, DC=ldapesslab, DC=com field on the
ARDBC LDAP
Configuration
form. (See
Configuring the
ARDBC LDAP
plug-in.)
ARDBC-LDAP-Cache- Size limit (in bytes) for the cache. For no size limit, set this to 0. The default is 32768 The Maximum
MaxSize bytes. Size field in the
ARDBC Plugin
Cache box on
the ARDBC
LDAP
Configuration
form. (See
Configuring the
ARDBC LDAP
plug-in.)
ARDBC-LDAP-Cache- Time limit (in seconds) that data remains cached. For no time limit, set this to 0. The The Time To
TTL default is 60 seconds. Live field in the
ARDBC Plugin
Cache box on
the ARDBC
LDAP
Configuration
form. (See
Configuring the
ARDBC LDAP
plug-in.)
ARDBC-LDAP-Cert- Directory name of the certificate database. The cert8.db or cert7.db and key3.db The Certificate
DB certificate database files are in this directory. If the directory is not specified, the Database field
LDAP plug-in looks in the BMC Remedy AR System installation directory for these on the ARDBC
files. The path in this option is used only when ARDBC-LDAP-UsingSSL is set toT. LDAP
Configuration
form. (See
Configuring the
ARDBC LDAP
plug-in.)
ARDBC-LDAP-Chase- Flag that enables automatic referral chasing by LDAP clients. Values are
Referrals 2
T — Referrals are chased.
F — (Default) Referrals are not chased.
ARDBC-LDAP-
Connect-Timeout 2
Number of seconds that the plug-in waits for a response from the directory service
before it fails. The minimum value is 0, in which case the connection must be
immediate. The maximum value is the External-Authentication-RPC-Timeout setting.
If a value is not specified, this option is set to the value of the External-Authentication-
RPC-Timeout option (by default, 40 seconds).
ARDBC-LDAP-DN- Number of seconds that the plug-in retains the base distinguished name (DN) used
Timeout 2 to access an LDAP ARDBC vendor form after the user becomes inactive. The default
is 3600 seconds.
ARDBC-LDAP- Host name of the system on which the directory service runs. If the host name is not The Host Name
Hostname specified, the ARDBC LDAP plug-in uses localhost as the host name. For example: field on the
ARDBC-LDAP-Hostname: server1.eng.remedy.com ARDBC LDAP
Configuration
form. (See
Configuring the
ARDBC LDAP
plug-in.)
ARDBC-LDAP-Page- Page size in the pagedResultsControl of the ARDBC LDAP plug-in search request.
Size 2 This specifies the number of entries to return per page from the external directory
server to the client when processing a search request containing the
pagedResultsControl. The maximum value is 100,000. The minimum value is 100.
The default value is 10,000. (See Using the ARDBC LDAP plug-in.)
ARDBC-LDAP-Port Port number on which the directory service listens for clients. The Port
Number field
on the ARDBC
LDAP
Configuration
form. (See
Configuring the
ARDBC LDAP
plug-in.)
This historical format does not indicate the century. It is not recommended.
ARDBC-LDAP-Use- Flag that enables caching of search requests. Values are T and F. After caching is
Cache 2 enabled, search requests issued via the ARDBC plug-in are cached. Subsequent
matching search requests are satisfied from the cache.
ARDBC-LDAP-User- Distinguished name (DN) of the user account that the ARDBC LDAP plug-in uses to The Bind User
DN search and modify the contents of the directory service. For example: ARDBC-LDAP- field on the
User-DN: server1\admin ARDBC LDAP
Configuration
form. (See
Configuring the
ARDBC LDAP
plug-in.)
ARDBC-LDAP- Flag indicating whether to establish a secure socket layer (SSL) connection to the The Using
UsingSSL directory service. Values are T and F. If you use LDAP over SSL, you must also Secure Socket
specify the file name of the certificate database used to establish the connection. Layer field on
the ARDBC
LDAP
Configuration
form. (See
Configuring the
ARDBC LDAP
plug-in.)
AREA-LDAP-Bind- Password of the user account that the AREA LDAP plug-in uses to find the user The Bind
Password object when using the User Search filter. If the distinguished name (DN) is not Password field
specified, the AREA LDAP plug-in uses an anonymous login to find the user object. If on the AREA
the target directory service does not allow anonymous access, you must specify a LDAP
DN and password; otherwise, the plug-in cannot determine the DN of the user. Configuration
form. (See
Configuring the
AREA LDAP
plug-in.)
AREA-LDAP-Bind- Distinguished name (DN) of the user account that the AREA LDAP plug-in uses to The Bind User
User find the user object when using the User Search filter. If the DN is not specified, the field on the
AREA LDAP plug-in uses an anonymous login to find the user object. If the target AREA LDAP
directory service does not allow anonymous access, you must specify a DN and Configuration
password; otherwise, the plug-in cannot determine the DN of the user. For example: form. (See
AREA-LDAP-Bind-User: ldapesslab\admin Configuring the
AREA LDAP
plug-in.)
AREA-LDAP-Cert-DB Directory name of the certificate database. The cert8.db or cert7.db and key3.db The Certificate
certificate database files are in this directory. If the directory is not specified, the Database field
LDAP plug-in looks in the BMC Remedy AR System installation directory for these in the Directory
files. This path is used only when ARDBC-LDAP-UsingSSL is set to T. Service
Information
area on the
AREA LDAP
Configuration
form. (See
Configuring the
AREA LDAP
plug-in.)
AREA-LDAP-Chase- Flag that specifies whether referral chasing is performed by the AD server or the The Chase
Referral 2 AREA LDAP plug-in. Values are Referral field in
the Directory
T — Referral chasing is performed by the AD server. Service
Information
F — (Default) Referral chasing is performed by the AREA LDAP plug-in (via area on the
the third-party LDAP library). AREA LDAP
Configuration
This option is for Microsoft Active Directories only. form. (See
Configuring the
Note: To force referral chasing logic to be disabled, you must also specify the AREA-
AREA LDAP
LDAP-Disable-Referral option. (See ar.cfg or ar.conf options A-B.)
plug-in.)
AREA-LDAP-Connect- Number of seconds that the plug-in waits to establish a connection with the directory The Failover
Timeout service. The minimum value is 0, in which case the connection must be immediate. Timeout field in
The maximum value is the External-Authentication-RPC-Timeout setting. If a value is the Directory
not specified, this option is set to the value of the External-Authentication-RPC- Service
Timeout option (by default, 40 seconds). Information
area on the
AREA LDAP
Configuration
form. (See
Configuring the
AREA LDAP
plug-in.)
AREA-LDAP-Disable- Flag that disables all referral processes by the AREALDAP plug-in. Values are
Referral 2
T— Referrals are disabled.
Note: This overrides the AREA-LDAP-Chase-Referral setting.
AREA-LDAP-Email 2 Name of the attribute that specifies the email address of the user. This attribute
corresponds to the Email Address field in the BMC Remedy AR System User form. If
the attribute is not specified, the specified default or a system default is applied.
AREA-LDAP-Email- Value that the AREA LDAP plug-in uses if the AREA-LDAP-Email parameter is not
2 specified or has no value for the user.
Default
AREA-LDAP-Group- Base of the LDAP directory to search groups from. To determine the option's values The Group
Base at runtime, use these keywords: Base field in
the User and
Note: The backslash (\) is required. Group
Information
$\USER$ — User's login name.
area on the
$\DN$ — User's distinguished name. This applies only to the Group Base
AREA LDAP
Name and Group Search Filter. It does not apply to the User Base name and
Configuration
User Search filter.
form. (See
$\AUTHSTRING$ — Value that users enter into the Authentication String field
Configuring the
when they log in.
AREA LDAP
$\NETWORKADDR$ — IP address of the AR System client accessing the AR
plug-in.)
System server.
AREA-LDAP-Group- Default groups to which the user belongs if no group information is available from the
2 directory service. If the user belongs to multiple groups, use a semicolon to separate
Default
them.
AREA-LDAP-Group- LDAP search filter used to locate the groups to which the user belongs. To determine The Group
Filter the option's values at runtime, use these keywords: Search Filter
field in the
Note: The backslash (\) is required. User and
Group
$\USER$ — User's login name.
Information
$\DN$--- User's distinguished name. This only applies to the Group Base
area on the
Name and Group Search Filter. It does not apply to the User Base Name and
AREA LDAP
User Search Filter.
Configuration
$\AUTHSTRING$ — Value that users enter into the Authentication String field
form. (See
when they log in.
Configuring the
$\NETWORKADDR$ — IP address of the AR System client accessing the AR
AREA LDAP
System server.
plug-in.)
AREA-LDAP- Host name of the system on which the directory service runs. If no value is specified, The Host Name
Hostname the AREA LDAP plug-in uses localhost as the host name. field in the
Directory
Service
Information
area on the
AREA LDAP
Configuration
form. (See
Configuring the
AREA LDAP
plug-in.)
AREA-LDAP-Lic 2 Name of the attribute that identifies the type of write license issued. This attribute
corresponds to the License Type field in the BMC Remedy AR System User form. If
the attribute is not specified, the specified default or a system default is applied.
AREA-LDAP-Lic- Value that the AREA LDAP plug-in uses if the AREA-LDAP-Lic attribute is not
Default 2 specified or has no value for the user.
AREA-LDAP-LicApp 2 Name of the attribute that identifies the type of application license issued. If the
attribute is not specified, the specified default or a system default is applied.
AREA-LDAP-LicApp- Value that the AREA LDAP plug-in uses if the AREA-LDAP-LicApp attribute is not
2 specified or has no value for the user.
Default
AREA-LDAP-LicMask Attribute that specifies how to mask the license information returned from the AREA The License
LDAP plug-in. Values are Mask field in
the Defaults
0--No licenses returned from the AREA LDAP plug-in are used. and Mapping
1--Write license from the plug-in is used. Attributes to
4--Reserved license from the plug-in is used. User
5--Reserved license and Write license from the plug-in are used. Information
8--Application license from the plug-in is used. area on the
9--Application and Write licenses from the plug-in are used. AREA LDAP
12--Application and Reserved licenses from the plug-in are used. Configuration
13--All licenses from the plug-in are used. form. (See
Configuring the
If the license is not used from the plug-in, the license information in the user's User
AREA LDAP
entry is used.
plug-in.)
AREA-LDAP-LicMask- Value that the AREA LDAP plug-in uses if the AREA-LDAP-LicMask attribute is not
Default 2 specified or has no value for the user.
AREA-LDAP-LicRes1 2 Name of the attribute that specifies the type of reserved license issued. If the
attribute is not specified, the specified default or a system default is applied.
AREA-LDAP-LicRes1- Value that the AREA LDAP plug-in uses if the AREA-LDAP-LicRes1 attribute is not
2 specified or has no value for the user.
Default
AREA-LDAP-Notify- Name of the attribute that specifies the default notification mechanism for the user.
2 This attribute corresponds to the Default Notification Mechanism field in the AR
Meth
System User form. If the attribute is not specified, the specified default or a system
default is applied.
AREA-LDAP-Notify- Value that the AREA LDAP plug-in uses if the AREA-LDAP-Notify-Meth attribute is
Meth-Default 2 not specified or has no value for the user.
AREA-LDAP-Port Port number on which the directory service listens for clients. The Port
Number field in
the Directory
Service
Information
area on the
AREA LDAP
Configuration
form. (See
Configuring the
AREA LDAP
plug-in.)
AREA-LDAP-SSL- Flag indicating how the secure connection is established. By default, AREA-LDAP-
2 SSL-AUTH-OPTION is set to true and will continue to authenticate the server
AUTH-OPTION
certificate when opening the secure connection. If you set AREA-LDAP-SSL-AUTH-
OPTION to false, the server certificate is not authenticated and multiple secure
server connections can be established concurrently.
AREA-LDAP-Use- Flag indicating whether to retrieve group information from the LDAP server. If this The Group
Groups parameter is not set, group information from the AR System Group form is used. Membership
field in the
User and
Group
Information
area on the
AREA LDAP
Configuration
form. (See
Configuring the
AREA LDAP
plug-in.)
AREA-LDAP-User- User base in the LDAP directory to search for the user. To determine the option's The User Base
Base values at runtime, use these keywords: field in the
User and
Note: The backslash (\) is required. Group
Information
$\USER$ — User's login name.
area on the
$\DN$ — User's distinguished name. This only applies to the Group Base
AREA LDAP
Name and Group Search Filter. It does not apply to the User Base Name and
Configuration
User Search Filter.
$\AUTHSTRING$ — Value that users enter into the Authentication String field
when they log in.
AREA-LDAP-User- LDAP search filter used to locate the user in the directory from the base that the The User
Filter AREA-LDAP-User-Base option specifies. To determine the option's values at Search Filter
runtime, use these keywords: field in the
User and
Note: The backslash (\) is required.
Group
Information
$\USER$ — User's login name.
area on the
$\DN$ — User's distinguished name. This only applies to the Group Base
AREA LDAP
Name and Group Search Filter. It does not apply to the User Base Name and
Configuration
User Search Filter.
form. (See
$\AUTHSTRING$ — Value that users enter into the Authentication String field
Configuring the
when they log in.
AREA LDAP
$\NETWORKADDR$ — IP address of the AR System client accessing the AR
plug-in.)
System server.
AREA-LDAP-UseSSL Flag indicating whether to establish a secure socket layer (SSL) connection to the The Use
directory service. Values are T and F. If you use LDAP over SSL, you must also Secure Socket
specify the file name of the certificate database used to establish the connection. Layer? field in
the Directory
Service
Information
area on the
AREA LDAP
Configuration
form. (See
Configuring the
AREA LDAP
plug-in.)
Arerror-Exception-List List of errors that trigger a dump of the current stack in the arerror.log file. Separate
2 each error number with a semicolon (for example, 123;345;).
ARF-Java-Class-Path
2
Obsolete as of release 7.5.00.
ARF-Java-VM-Options Java command options for a virtual machine (VM). The options are documented in
2 the online AR System Java API documentation.
ASJ-Thread-Count Specifies the total number of worker threads that process various approval requests.
Note: If the specified value is not within the maximum and minimum value, the
default value is applied. If a value is not specified, this option is set to the default
value.
Attachment-Exception- Parameter which allows you to override the Attachment Security functionality
List implemented in the AR System Administration: Server Information form. To override
the attachment restrictions, you can specify the Form name with Field ID and upload
attachments only for that field ID.
Note: Field ID is the numeric value of the field that contains an attachment on the
form. You can get the value for a Field ID from the Developer Studio.
For example,
If attachments of the type PDF have been disabled in the AR System Administration:
Server Information > Attachment Security > Attachment criteria, it should still be
possible for PDF based reports to be scheduled and published. To solve such a
problem, in the AR System Administration: Server Information > Attachment Security
> Attachment exception list, enter form name and field ID combination, such as AR
System Publish Report(90104), to override the attachment security setting. The PDF
attachments will now be allowed for field ID 90104 on the AR System Publish Report
form, even if PDF attachments are disallowed globally. Similar entry can be made for
other forms like the AR System Resource Definitions form, and for the field ID 41103
as AR System Resource Definitions(41103).
For multiple form and field ID entries, enter a comma separated list like AR System
Publish Report (90104), AR System Resource Definitions(41103) in the Attachment
exception list field.
Authentication- Mode that enables the administrator to use more than one type of authentication on See Specifying
Chaining-Mode the same system. Values are authentication
chaining mode
0 (Off)--Use the default behavior. Users are authenticated based on the (see page 853)
settings of Crossref-Blank-Password and Authenticate-Unregistered Users. .
1 (ARS - AREA) — Use internal authentication as the primary method; use
external authentication via the AREA plug-in as the secondary method.
2 (AREA - ARS) — Use external authentication via the AREA plug-in as the
primary method; use internal authentication as the secondary method.
3 (ARS - OS- AREA) — If authentication fails in AR System (internal
authentication), use the operating system authentication (for example, NT
domain authentication). If the operating system fails, try external
authentication (AREA).
4 (ARS - AREA - OS) — If authentication fails in AR System, try AREA. If
AREA fails, try the operating system authentication.
Values 3 and 4 provide greater flexibility. For example, your external users might be
authenticated with an AREA plug-in, and internal users might be authenticated by the
NT domain.
Auth-Token-Signature- Defines the encryption key to be used for authentication token. Usually not to be
Salt1 changed unless invalid tokens are being received.
ARSYS.ARF. Name of a plugin used by the BMC Remedy AR System server to confirm the user
ATSSOCONFIRMPWD password information from the BMC Atrium Single Sign-On server.
1. Options you can view (but not set) using the AR System Administration: Server Information form.
2. Options you cannot set or view using the AR System Administration: Server Information form.
BMC recommends to use the AR System Configuration Generic UI form to modify the
configuration settings. You should not use the ar.cfg file to modify the configuration
settings available on the AR System Configuration Generic UI form. See Configuration
Settings C-D (see page 1166).
This table contains the options for the ar.cfg (ar.conf) file that begin with the letters C and D.
Tips
Press F to view the table in full screen mode. Press Esc to exit full screen mode.
To easily search for a specific parameter in the below table, select the parameter
from the Option list. Alternatively, type the name of the parameter in the Option
text box. For example, to search for the Cache-Mode parameter, select it from the
Option list, or type the parameter name in the Option text box.
To search for all parameters having a specific text string in the name, type the text
string in the Option text box. For example, to search for all Cache parameters, type
Cache in the Option text box.
To search for the parameters which have a specific text string in the description,
type the string in the Description text box.
For example, to search for the parameters which have ARCreateEntry() in the
description, type ARCreateEntry() in the Description text box.
Cache- The way that the server caches form display properties. The form display property is the
Display- background image of the form view and the display property of each form field. Valid values:
Properties 2
T — (Default) Cache all form-display properties.
F — Cache only server-display properties. (This can negatively impact the
performance of the server if a form is changed, but it reduces the amount of memory
used in the server cache.)
Cache-Mode The valid value for Cache-Mode is 0 — (Default). In this mode administrative operations The
cause the server to create an administrative copy of its cache so that other users can Development
continue using the shared cache while administrative operations are performed. Cache Mode
field on the
Note: You should always set the value for Cache-Mode to 0. Ensure that you always use the Configuration
default value (Production cache mode) to perform your server operations. The users should tab of the AR
not switch to Development Cache Mode. System
Administration:
Server
Information
form. (See
Setting
administrative
options (see
page 321).)
Cancel- Flag indicating whether the cancel query functionality in a browser is enabled. Valid values:
Query-Option
2 0 — Inactive
1 — (Default) Active
Changed-By- Flag indicating whether the system checks whether another user changed an entry after you
Another- retrieved the entry. If you try to save modifications to an entry, you receive a warning and
Check must confirm the save. Valid values:
Client- Maximum time (in seconds) to hold a transaction before a timeout occurs. The default is 60 The Transaction
Managed- seconds, and there is no maximum. If a timeout occurs, the server automatically rolls the Timeout
Transaction- transaction back, and the client receives an error on the next operation that uses the (seconds) field
Timeout transaction handle. in the
Transaction
Control area on
the Advanced
tab of the AR
System
Administration:
Server
Information
form. (See
Setting
performance
and security
options (see
page 314).)
Clustered- Flag indicating whether indexes for the database are clustered. Valid values:
Index
T — (Default) Use a clustered index.
F — Do not use a clustered index.
You must set this option before you start the BMC Remedy AR System server.
CMDB- Specifies the time interval in milliseconds after which the CMDB refreshes its cache in the
Cache- background. Default value: 900000
Refresh- Note: If the value defined for this parameter is less than 60000 milliseconds (60 seconds),
Initial-Delay1 the default value is taken.
Frequency, in seconds, at which the BMC Atrium CMDB cache is refreshed. The default
value is 300 seconds (5 minutes). For more information about the cache refresh interval, see
Setting the cache refresh interval.
CMDB-
Cache-
Refresh-
Interval 2
CMDB- Specifies the time interval in milliseconds after which the data will be treated as orphaned
ChunkedItem- and the memory can be reclaimed by server.
Allowed- Default value: 3600000
Period-In-
Note: The value for this parameter should be greater than 60000 milliseconds (60 seconds),
Cache1
if it is not then the default value is taken.
CMDB- Specifies the time interval in milliseconds to start checking for the orphan data after CMDB
ChunkedItem- server has started. Default value: 900000
Cleanup- Note: The value for this parameter should be greater than 60000 milliseconds (60 seconds),
Initial-Delay1 if it is not then the default value is taken.
CMDB- Specifies the time interval in milliseconds at which the CMDB server should perform the
ChunkedItem- orphan data checks. To disable this parameter set a value to minus -. For example, -1.
Cleanup-
Default value: 300000
Interval1
Note: The value for this parameter should be greater than 60000 milliseconds (60 seconds),
if it is not then the default value is taken.
CMDB- Sets the limit for number of levels of recursion for CMDB graph query.
GQRecursion-
Limit1
CMDB-Hard- Specifies that all the CIs that are Marked As Delete (MAD) are to be deleted.
Delete-Only-
If-Marked-
For-Delete1
CMDB- Specifies the default weight attached to impact relationship. This value is used in Atrium
Impact- Impact Simulation.
Weight-
Default1
CMDB-Log- Specifies the path on the server where the log file is saved.
File-Location1
CMDB-Max- Specifies the maximum number of results that are returned per query. If this value is 0 it
Results-Per- means that the maximum results per query are unlimited.
Query1
Configure- Indicates whether log4j package should be configured from the external properties file log4j.
Log4j1 properties.
Configuration- Defines the name of the component. AR System server uses this option to identify the active
Name1 component in the database.
Create-Entry- Number of times to retry the ARCreateEntry() function during deadlock situations. Value is
DeadLock- an integer.
Retries 2
Default value - 3 (3 retries)
Create-Entry- Delay, in seconds, between each retry of a deadlocked ARCreateEntry() function. Value is
DeadLock- an integer.
Retries-Delay
2 Default value - 0 (Retries happen immediately, without a delay)
Crossref- Flag indicating how the system responds when a user's logon name is not assigned a
Blank- password in the User form. Valid values:
Password
T — The system tries to validate the password in the Windows server domain (or
through the External Authentication API if external authentication is on) or against the
UNIX server /etc/passwd file.
F — (Default) Blank passwords are not cross-referenced.
This option enables you to manage group membership and other support information
with AR System while managing passwords with the /etc/passwd file (UNIX) or the
server domain security model (Windows).
Currency- Number of minutes between each refresh of currency conversion ratios on the client.
Ratio-Client-
Refresh-
Interval 2
Db-Case- Flag indicating whether to perform case-insensitive queries on Run If qualifications for active
Insensitive 1 links, filters, and escalations. (For Oracle databases, ensure that this option matches the
behavior of your Oracle database so that all queries are consistent.) Valid values:
To learn how to enable case-insensitive search for fixed-length text fields in BMC Remedy
AR System version 9.1 on Oracle, see the BMC Knowledge Base article KA406947.
Db-Character- Option that initializes an internal variable that the server uses for various purposes, such as
Set 2 informing the ARGetServerInfo function's AR_SERVER_INFO_DB_CHAR_SET server option
request or adjusting the database short column size so that the number of characters in a
datum does not exceed the number of bytes in the database field. Valid values:
Db- Number of times the BMC Remedy AR System server tries to reestablish a lost connection to
Connection- the database. The default is 100. The server retries the connection once every 15 seconds
2 up to the specified number of times. For example, when this option is set to 100, the server
Retries
retries the connection once every 15 seconds for a duration of 25 minutes.
Db-
Option to change the AR System server's default behavior for index creation. To change the
Functional-
1 AR System server's default behavior for index creation, set the Db-Functional-Index
Index
parameter to T. Then, when a new index is added to a form, the AR System server creates a
functional index for the form. This parameter helps to avoid performance degradation that
can result from not using database indexes. The Db-Functional-Index parameter is ignored if
Db-Case-Insensitive is set to F or if it is absent from the ar.cfg file. The Db-Case-Insensitive
and Db-Functional-Index parameters handle new indexes. In the database (outside of the AR
System server), you must manually convert any existing indexes to functional indexes. BMC
provides an unsupported OracleFunctionalIndexHelper.bat utility to manage these existing
indexes and to convert them from regular to functional indexes. You can find this
unsupported utility in the ARServerInstallDirectory\Arserver\api\lib folder. Due to known issue
with Oracle, set cursor sharing to EXACT so that the query optimizer can use functional
indexes for LIKE queries. For help, see your database administrator.
Note: While running the OracleFunctionalIndexHelper.bat utility for existing forms, you might
see the following error: Error message ERROR (552): The SQL database operation failed.;
ORA-00942: table or view does not exist. This occurs because indexes are not applicable on
vendor, view, display-only, and join forms.
For optimal performance when using database indexes for case-insensitive searches on
Oracle, ensure that:
The database administrator sets cursor sharing to EXACT for the functional indexes
that Oracle Optimizer will use (otherwise, performance can be severely degraded due
to full table scans).
Note: Depending on the volume of data, creating functional indexes may take a long time.
Db-Max- Maximum size (in bytes) of compressed attachments that the AR System server can retrieve
2 from Oracle databases. The default value is 2 GB. This value is limited by your server
Attach-Size
operating system and configuration.
Note: To limit the size of compressed attachments that can be sent to the database server
from AR System server, see AR-Max-Attach-Size.
Db-Max-Text- (Oracle and Microsoft SQL Server) Maximum size for long character text data in databases.
2 For Oracle databases, this value is also used for memory allocation during the processing of
Size
long text data; therefore, use it conservatively. The default for an Oracle database is
4,194,308 bytes. For SQL Server, the default is 2,147,483,647 bytes. The maximum value
for either database is 2,147,483,647 bytes.
Db-name 1 For Oracle, the name of the tablespace that the AR System server uses. For all other
supported databases, the name of the underlying SQL database. The default value is
ARSystem.
Db-password
(Microsoft SQL Server and Oracle) Database password associated with the ARSystem
database and table space. The password can be modified by using the ARSetServerInfo
function and is stored in encrypted form. If you change the password manually, specify this
option by using clear text, and change the password by using the AR System Administration:
Server Information form to encrypt it.
Db-Type1 Defines the type of database the AR System server is connecting to.
Valid values:
sqlserver
oracle
Db-user 1 (Microsoft SQL Server and Oracle) User name that AR System uses to access the
underlying database. The default is ARAdmin.
Debug- Name of the group to which a user must belong to use logging options such as API,
GroupId database, and filter logging in BMC Remedy AR System clients. Logging options are
disabled for users who are not members of the specified group. The group name can be
Public, Administrator, Sub Administrator, or Browser. You can also set this option in the
Client-Side Logging Group field on the Log Files tab.
Debug-mode Bitmask indicating the server logging modes. To activate one bit, set this option to its value
(see the following list). To activate two or more bits, add their values, and set this option to
the total. For example, to activate bits 1 and 3, set this option to 5 because bit 1 has a value
of 1 and bit 3 has a value of 4. To deactivate a bit, subtract its value from the value of this
option. Unless otherwise specified in the following list, this option turns on logging for the
arserverd process. Default log files are in the directory specified by the Server-directory
option.
Bit 1 (value = 1 ) — (SQL databases only) Turns on SQL logging in the default arsql.
log file. To specify a different file, use the SQL-Log-File option.
Bit 2 (value = 2 ) — Turns on filter logging in the default arfilter.log file. To specify a
different file, use the Filter-Log-File option.
Bit 3 (value = 4 ) — Turns on user logging in the default aruser.log file. To specify a
different file, use the User-Log-File option.
Bit 4 (value = 8 ) — Turns on escalation logging in the default arescl.log file. To
specify a different file, use the Escalation-Log-File option.
Bit 5 (value = 16 ) — Turns on API logging in the default arapi.log file. To specify a
different file, use the API-Log-File option.
Bit 6 (value = 32 ) — Turns on thread logging in the default arthread.log file. To
specify a different file, use the Thread-Log-File option.
Bit 7 (value = 64 ) — Turns on alert logging in the default aralert.log file. To specify a
different file, use the Alert-Log-File option.
Bit 9 (value = 256 ) — Turns on server group logging in the default arsrvgrp.log file.
To specify a different file, use the Server-Group-Log-File option.
Bit 10 (value = 512 ) — Turns on logging for full text indexing in the default arftindx.log
file. To specify a different file, use the Full-Text-Indexer-Log-File option.
Bit 16 (value = 32768 ) — Turns on DSO server logging in the default ardist.log file.
To specify a different file, use the Distrib-Log-File option.
Bit 17 (value = 65536 ) — Turns on Approval Server logging. To specify the location
for the arapprov.log file, use the Approval Menu > Server Settings > AP: Admin-
Server Settings form.
Bit 18 (value = 131072 ) — Turns on plug-in logging in the default arplugin.log file. To
specify a different file, use the Plugin-Log-File option.
Default- Specifies port for JMS (Java Messaging Service) used by Java server for asynchronous
messaging- communication within server or server group. Default value is 61617.
port
Default-Order- Flag indicating whether to apply the default sort order to search results. Valid values:
By 2
T — (Default) Use the default sort order, which is to sort by request ID.
F — No default sort order exists, and no order by clause is added to the command if a
sort order is not specified.
Default-Web- URL to the directory path for the default web server pointing to the BMC Remedy AR System The Default
Path server. Web Path field
on the Advanced
tab of the AR
System
Administration:
Server
Information
form. (See
Setting
performance
and security
options (see
page 314).)
Delay- Number of seconds before the latest cache is made available to all threads. Valid values: 0 The Recache
Recache- to 3600 seconds. If this option is set to 0, every API call gets the latest cache (that is, the Delay field on
Time cache is copied for every administrator call). Setting the option to 0 causes slower the
performance for cache operations. Configuration
tab of the AR
The default value is 5 seconds. The recommended value is 300 (5 minutes). System
Administration:
Server
Information
form. (See
Setting
administrative
options (see
page 321).)
Disable- Flag indicating whether administrative operations are allowed on the server. Valid values: The Disable
Admin-Ops Admin
F — (Default) Disabled Operations field
T — Enabled on the
If the Server Groups check box is selected, this option is ignored. Server groups can Configuration
be configured in the BMC Remedy AR System Server Group Operation Ranking form tab of the AR
to make sure that only one server performs the operation. See Configuring server System
groups (see page 375). Administration:
Server
Information
form. (See
Setting
administrative
options (see
page 321).)
Disable-Alerts Flag indicating whether alerts are sent when alert events are created. Valid values: The Disable
Alerts field on
T — No threads are started in the alert queue, and no alerts are sent. the
F — (Default) Alerts are enabled. Configuration
tab of the AR
Changes to this setting do not take effect until the server is restarted. System
Administration:
Server
Information
form. (See
Setting
administrative
options (see
page 321).)
Disable- Switch that disables (T ) or enables (F ) the archive when the server starts. The Disable
Archive Archive field on
If the Server Groups check box is selected, this option is ignored. Server groups can be the
configured in the BMC Remedy AR System Server Group Operation Ranking form to make Configuration
sure that only one server performs the operation. See Configuring server groups (see page tab of the AR
375). System
Administration:
Server
Information
form. (See
Setting
administrative
options (see
page 321).)
Disable- Flag indicating whether automatic signals triggered by changes to the following data on a The Disable
ARSignals server group's administrative server are disabled: ARSignals field
on the
Archive definitions Configuration
Escalation definitions tab of the AR
Group information from the database System
Administration:
The signals can be generated by arsignald or the database. Signals triggered by Server
changes to user, licensing, and computed group information are not disabled. Valid Information
values: form. (See
Disable-Audit- Flag indicating whether to audit all records (T ), or to audit only those records whose field The Disable
Only- values have changed (F, the default). Audit Only
Changed- Changed Fields
Fields field on the
Configuration
tab of the AR
System
Administration:
Server
Information
form. (See
Setting
administrative
options (see
page 321).)
Disable- Option that restricts time-consuming operations (such as reporting) during busy times,
Client- improving overall performance. The syntax is
Operation 2
Disable-Client-Operation: <tagNumberToDisable> [[<startTime>]-[<stopTime>]]
[<groupIDList>]
The tag number identifies the client whose operations are restricted. It is defined in
the ar.h file. See the list at the end of this description.
(Optional) To specify start and stop times for the restriction, enter them in 24-hour
format (hh:mm ). The times are include times. For example, 00:00-13:59 disables the
operations from midnight until 1:59 P.M.
If you do not specify a start or stop time, the syntax looks like this: Disable-Client-
Operation: 2 18:00- 10
To disable operations from midnight until 6:00 A.M., enter this: Disable-Client-
Operation: 2 -6:00 10
If no start and stop times are specified, the operations are disabled all the time.
(Optional) The groupIDList is a list of groups whose users can run the operations
during the specified time period. For example, you can allow only the administrator to
run reports during busy hours. Enter none, one, or multiple group IDs delimited by
spaces. For example, to exempt group 10, enter this: Disable-Client-Operation: 1 13:
00-17:59 10
If no groups are specified, all users are barred from running the operations during the
specified time period. You can enter multiple Disable-Client-Operation lines. For more
information on the list of Client types, see List of Client Type ID (see page 2690).
Disable- Flag indicating whether escalations are allowed on the server. The Disable
Escalations Escalations field
Valid values: T and F (default). on the
Configuration
tab of the AR
System
Administration:
If the Server Group Member check box is selected, this option is ignored. Server groups can Server
be configured in the BMC Remedy AR System Server Group Operation Ranking form to Information
make sure that only one server performs the operation. (See Configuring server groups (see form. (See
page 375).) Setting
administrative
options (see
page 321).)
Disable-Non- Flag indicating whether Unicode servers can refuse requests from non-Unicode clients (for The Disallow
Unicode- example, not Mid Tier 7.0.00). This option does not affect non-Unicode servers. Valid values: Non Unicode
Clients Clients field on
T — Unicode servers refuse requests from non-Unicode clients. the
F — (Default) Unicode and non-Unicode clients can contact Unicode servers. Configuration
tab of the AR
System
Administration:
Server
Information
form. (See
Setting
administrative
options (see
page 321).)
Disable-User- Flag that prevents unauthorized users from using User Cache commands. Valid values:
Cache-
Utilities T — The arreload and arcache utilities are disabled for the AR System server.
F — (Default) Cache utilities are enabled.
Dispatch-Log- Flag that indicates whether the dispatcher logging is enabled. Valid value is location to the
File log file.
1. In a browser, open the BMC Remedy AR System Administration Console, and click
System > General > Centralized Configuration.
2. In the AR System Configuration Generic UI form, from the Component Name list,
select com.bmc.arsys.server > <servername>.
3. Click Add.
4. Enter the name of the setting that you want to add and its value.
For example, Dispatch-Log-File and the location to the log file.
5. Click Apply and Close.
6. To invoke this setting, restart arserver, or stop the dispatcher process.
The armonitor restarts the dispatcher logging and locates the log file on the specified
location.
Display- Flag indicating whether to display a message when user authentication fails. Valid values:
General-Auth-
T— (Default) A generic message is displayed for user name and password errors:
Message2
ARERR 623 Authentication failed
ARERR 9388 Authentication failed
F— Each authentication error displays a different message:
ARERR 624 User account locked out due to too many bad
password attempts
ARERR 9381 No such user is registered with this server
This parameter can be used in conjunction with Max-Password-Attempts. (See ar.cfg or ar.
conf options E-M (see page 1086).)
Distrib-Log- Full path name of the file to use if DSO server logging is on (See Debug-mode (see page
File )).
Distributed- The BMC Remedy AR System server to use for the DSO server. By default, the DSO server
RPC-Socket runs in queues like any other user.
Obsolete. (See Assigning an RPC program number to DSO (see page 571).)
Domain- New domain name portion of the fully qualified server name. By default, a server determines
Name 2 the domain name from the network interface. In rare cases, this method does not produce
the desired result because of unexpected network card configurations. In those cases, you
can use this option to override the domain name derived from the network interface.
By default, this option is set to 1800 seconds (30 minutes). The maximum value is
43200 seconds (12 hours).
DSO-Host- Name to use for the From (source) server in distributed mappings. This setting enables you
2 to use an alias for the From server in distributed operations.
Name
DSO-Local- RPC program number that DSO uses. This setting is optional. The DSO Local
RPC-Socket RPC Program
Number field in
the DSO Server
area on the
Configuration
tab of the AR
System
Administration:
Server
Information
form. (See
Setting server
passwords, RPC
options, and
plug-in timeouts
(see page 318).)
DSO-Log- Level of logging for all DSO logs (ardist.log, ardist.log.default, ardist. poolName.log, and
Level ardist.log. poolName ):
(See BMC Remedy Distributed Server Option logging (see page 4243) and Setting log files
options (see page 298).)
DSO-Log- Number of indexed backup files saved for each DSO Java log file. If you do not specify a
Max-Backup- value for this option, 5 indexed backups are saved for each DSO Java log file.
Index 2
DSO-Main- Interval at which the DSO server queries the distributed pending queue for pending
Thread- distributed items. Enter any integer from 0(no polling) to 3600 seconds (1 hour).
Polling-
Interval
DSO-Mark- Flag indicating whether to set the status of items in the DSO distributed pending queue to
Pending- Retry after an attempt to perform the associated operation fails. (Failure must be due to a
Retry-Flag recoverable error. Items that fail because of nonrecoverable errors are removed from the
queue.) Valid values:
T — (Default) Does not set the status to Retry. Instead, the status remains set to New.
Depending on the number of pending items that the DSO server processes, this
setting might improve the server's performance.
F — Sets the status to Retry. Use this to differentiate items in the queue that have
never been processed (status = New) from items that were processed but failed
because of recoverable errors (status = Retry).
Note: Regardless of this option's value, the pending item is retried based on its retry
configuration.
DSO-Max- Maximum number of records in the Distributed Pending form that DSO reads in a single
Pending- database query. Minimum value is 1. Maximum value is unlimited. If no value is specified,
Records-Per- the default is 1000.
Query
DSO-Merge- The way the DSO server behaves when it finds a duplicate request ID on the target server.
DupID- Valid values:
Overwrite 2
T — Updates mapped fields and sets unmapped fields to NULL.
F — (Default) Updates only the mapped fields on the target request.
DSO- Mode that disables the DSO server installed on the same host as the AR System server. Use
Placeholder- this when setting up a DSO server outside a firewall to support an AR System server running
Mode behind a firewall.
DSO-Polling- Interval (in seconds) at which the DSO server checks the distributed pending queue for
Interval pending distributed items. This is used as a backup when no signals are received from
workflow. The value can be any integer between 15 and 7200. By default, the backup polling
interval is disabled.
DSO-Source- The AR System server for a DSO server to support when that AR System server is different
Server from the one installed with the DSO server. Use this when setting up a DSO server outside a
firewall to support an AR System server running behind a firewall.
DSO- Flag indicating whether to log AR System server error 302 (entry does not exist in database)
Supress-No- in the*arerror.log* file when performing distributed delete operations. Valid values:
Such-Entry-
For-Delete T — Do not log ARERR 302 during distributed deletes.
F — (Default) Log ARERR 302 during distributed deletes except when the DSO-Error-
Retry-Option is set to 2 (retry after every error).
Note: When this option is set to T, errors caused by valid problems might also be
omitted from the log.
DSO-Target- Information for the target BMC Remedy AR System server. Use this format:DSO-Target- The Target
Connection Connection:serverName:RPCNumber portNumber connection
settings tables
field in the DSO
Server area on
the
Configuration
tab of the AR
System
Administration:
Server
Information
form. (See
Setting server
passwords, RPC
options, and
plug-in timeouts
(see page 318).)
DSO-Target- Password used to access the target BMC Remedy AR System server through the DSO
Password server. Use this format:DSO-Target-Password: serverName:encryptedPassword
DSO- Timeout (in seconds) that the DSO server applies during communication with the AR System
Timeout- server. Enter an integer between60 (1 minute) and 21600 (6 hours). If no value is specified,
Normal the system uses the default timeout (120 seconds).
1. Options you can view (but not set) using the AR System Administration: Server Information form. 2. Options you cannot set or
view using the AR System Administration: Server Information form.
Note
BMC recommends to use the AR System Configuration Generic UI form to modify the
configuration settings. You should not use the ar.cfg file to modify the configuration
settings available on the AR System Configuration Generic UI form. See Configuration
Settings E-M (see page 1197).
This section of the table includes the options for the ar.cfg (ar.conf) file that begin with the letters E
through M.
Tips
Press F to view the table in full screen mode. Press Esc to exit full screen mode.
To easily search for a specific parameter in the below table, select the parameter
from the Option list. Alternatively, type the name of the parameter in the Option
text box.
For example, to search for the Escalation-Log-File parameter, select it from the
Option list, or type the parameter name in the Option text box.
To search for all parameters having a specific text string in the name, type the text
string in the Option text box.
For example, to search for all Email parameters, type Email in the Option text box.
To search for the parameters which have a specific text string in the description,
type the string in the Description text box.
For example, to search for the parameters which have Security in the description,
type Security in the Description text box.
Email-Notify- Sender name to use for filter-generated email notifications in which no subject is
2 specified. The value is limited to 29 characters.
From
Enable- Flag indicating whether log files display complete lines into log files or not. Values are:
Unlimited-Log-
Line-Length T — AR System server logs complete lines into log files without truncation.
F — (Default) AR System server logs only 4093 characters per line, including
the header information.
Encrypt-Data- Integer indicating the encryption algorithm of the data key. Use the following values.
Encryption-
Standard Security
Algorithm
Performance Security
Premium Security
Encrypt- Integer indicating the encryption algorithm of the public key. Values are
Public-Key-
Algorithm 4 — 512-bit RSA key (default for Standard Security)
5 — 1024-bit RSA key (default for Performance Security)
6 — 2048-bit RSA key (default for Premium Security)
Encrypt- Integer specifying the life span (in seconds) of the public key. At the end of the
Public-Key- specified time, the key expires, and the server generates a new key. The default is
Expire 86400 seconds (24 hours).
Encrypt- Size of the hash table that holds the encrypted session information. The default is
Session-Hash- 509; there is no maximum.
Entries 2
Encrypt- Integer specifying the life span (in seconds) of the data key. At the end of the
Symmetric- specified time, the key expires, and a new key exchange occurs. The default is 2700
Data-Key- seconds (45 minutes).
Expire
Escalation- Full path name of the file to use if escalation logging is on (See Debug-mode).
Log-File
Event- Enables the subscriber to receive the event as soon as a CI is created, updated, or
Channel- modified.
Enabled1
Exception- Integer value controlling the diagnostic output when the server crashes. Values are
Diagnostic-
Option 2
External- Mapping of LDAP groups to BMC Remedy AR System groups for external
Authentication- authentication. The value of this option consists of one or more pairs of group names
Group- separated by semicolons. For example:"LDAP-1" "ARS-1";"LDAP-2" "ARS-2";"LDAP-
Mapping 2 3" "ARS-3" Use mapping as an alternative to creating an BMC Remedy AR System
group corresponding to each LDAP group. You can map each LDAP group to an
BMC Remedy AR System group (as in the example) or multiple LDAP groups to a
single BMC Remedy AR System group. If you try to map a single LDAP group to
multiple BMC Remedy AR System groups, only the first mapping expression is valid.
This option can be used with the External-Authentication-Ignore-Excess-Groups
option.
External- Bit mask that specifies the return data capabilities for the current AREA plug-in. This
Authentication- option does not control the AREA plug-in; it merely describes the behavior of the plug-
Return-Data- in, enabling server optimization. Values are
Capabilities 2
0 — (Default) The server tries to retrieve this information from AREA.
Bit 1 (value = 1 ) — No email address is provided.
Bit 2 (value = 2 ) — No notify mechanism is provided.
Bit 3 (value = 4 ) — No group identifiers are provided.
7--The server potentially can reduce the number of AREA related calls during
notification processing.
Bit 4 (value = 8 ) — No license information is provided.
Bit 5 (value = 16 ) — No notification user validation should occur. This enables
the server to avoid using AREA for notification user validation and information
retrieval. Use this setting for sites using a form of AREA that applies user
names as email addresses and where accessing an authentication database
provides no benefit.
External- RPC socket number on which an external authentication server awaits requests for
Authentication- authentication. The default value is 0 (external authentication is not used). The RPC
RPC-Socket program number for the plug-in server is 390695.
External- RPC timeout (in seconds) used when calling the authentication (AREA) server. The
Authentication- default value is 40 seconds.
RPC-Timeout
External-
Authentication-
Sync-Timeout
Internal timeout (in seconds) that the BMC Remedy AR System server uses to invoke
the external authentication server's AREANeedToSyncCallback() function
periodically. This function instructs the BMC Remedy AR System server to renew its
internally stored user information in case the source used to authenticate users is
changed. A value of 0 means that the BMC Remedy AR System server does not
invoke the call to the AREA server. The default value is 300 seconds.
Filter-Api- Time limit (in seconds) for the Filter API RPC to respond to the server's request
Timeout before an error is returned. The minimum value is 1. The maximum is 300. The
default is 40.
Filter-Log-File Full path name of the file to use if filter logging is on (See Debug-mode).
Filter-Max- Maximum number of recursion levels allowed for an operation. The data modification The Maximum Stack of
Stack performed by an AR_FILTER_ACTION_FIELDP filter action might trigger a second Filters field in the
set, or level, of filters, one of which might trigger a third level of filters and so on. This Filters area on the
option limits the number of times such recursion can happen, preventing the server Advanced tab of the
crash that would occur if the recursion continued indefinitely. The default value is 25. AR System
Administration: Server
Information form. (See
Setting performance
and security options)
Filter-Max- Maximum number of filters that the server executes for a given operation. The default The Maximum Filters
Total value is 10000. for an Operation field
in the Filters area on
the Advanced tab of
the AR System
Administration: Server
Information form. (See
Setting performance
and security options)
Flush-Log- Flag indicating whether logged lines are buffered or written directly to disc. Values
Lines are:
Full-Text- Flag indicating whether full text searching is case sensitive or case insensitive. This The Case field in the
Case-Option setting affects all fields indexed for full text search and affects how the indexes are Filters area on the FTS
built. Therefore, changes to this setting trigger an automatic re-index. Values are tab of the AR System
Administration: Server
0 — Full text search is case sensitive Information form. (See
1 — (Default) Full text search is case insensitive FTS tab configuration
options)
Full-Text- Location in the file system where search engine index files are stored. The FTS Collection
Collection- Directory field on the
Directory 1 AR System
Administration FTS
Configuration form and
on the FTS tab of the
AR System
Administration: Server
Information form. (See
FTS tab configuration
Full-Text- Location in the file system where search engine configuration files are stored. The FTS Configuration
Configuration- Directory field on the
Directory Note: If you change the directory in this option, update the pluginsvr_config.xml file AR System
with the correct directory path. This file is in ARSystemInstallDir\pluginsvr\fts.
Administration FTS
Configuration form and
on the FTS tab of the
AR System
Administration: Server
Information form. (See
FTS tab configuration
options and FTS
Configuration form in
the AR System
Administration Console
.)
Full-Text- Flag indicating whether the server processes pending indexing tasks. Values are The Disable Full Text
Disable- Indexer field on the
Indexing T — Disable indexing. Pending indexing tasks are recorded for processing FTS tab of the AR
later when indexing is enabled. System Administration:
F — (Default) Do not disable indexing. Server Information
form. (See FTS tab
configuration options.)
Full-Text- Flag indicating whether the server uses the full text search engine for searching. The Disable Full Text
Disable- Values are Searching field on the
Searching FTS tab of the AR
T — Disable the full text search engine. The server uses the search capability System Administration:
of the underlying database whether or not a user has a full text license. Server Information
F — (Default) Use the full text search engine. form. (See FTS tab
configuration options.)
Full-Text- Space separated list of attachment file extensions which must be excluded from FTS
Exclude-List indexing.
For example, if the value to this parameter is set to .xla, .xls, .xlsm, .xlsx, .xlt and if
you have enabled FTS or MFS for the attachment field, all the attachments with these
extensions are ignored while creating FTS index.
If there are other fields that have enabled FTS or MFS index, the entry still gets
indexed.
If you change this option, you must restart the BMC Remedy AR System server for
the change to take effect.
Full-Text- Time, in milliseconds, used by the FTS Lucene index commit thread to decide the
Index-Commit- interval after which an index for an entry is committed in Lucene collections folder.
Interval
Default value is 60000 milliseconds (or 1 minute).
For example, consider Lucene commit thread runs at 10:45:23 AM. If the first entry is
created at 10:45:24 AM, the second entry is created at 10:45:45 AM and the third
entry is created at 10:46:21 AM. Then all the three entries are committed to Lucene
collections folder at 10:45:23 AM; that is 1 minute after the last entry is created.
Full-Text- Full path name of the file to use if full text indexer logging is on (See Debug-mode).
Indexer-Log-
File
Full-Text- Delay in milliseconds before the scheduler provides a wakeup signal to the FTS
Index- controller to check for pending FTS entries that should be processed. For more
Scheduler- information, see How FTS indexing works (see page 1420).
Interval
Default value: 120000 milliseconds (120 seconds)
Full-Text- Number of minutes that the server waits between periodic attempts to index entries The Indexing Failure
Indexer- that failed to index for an unexpected reason in a prior attempt. The default value is Recovery Interval field
Recovery- 60 minutes. on the FTS tab of the
Interval AR System
Administration: Server
Information form. (See
FTS tab configuration
options.)
Full-Text- The way the server modifies qualifications from the client. Values are The Search Options
Match-Option field on the FTS tab of
0 — Force leading and trailing wildcards. the AR System
1 — Ignore leading and force trailing wildcards. Administration: Server
2 — Ignore leading wildcards. Information form. (See
3 — Remove leading and trailing wildcards. FTS tab configuration
4 — (Default) Leave query unchanged. options.)
Full-Text- The maximum number of search results returned from the search engine. The default The Full Text Search
Search- value is 10,000. To limit the number of search results (because of constraints on the Threshold field on the
Threshold computer where the search engine is running), reduce the threshold. If you change FTS tab of the AR
this option, you must restart the BMC Remedy AR System server for the change to System Administration:
take effect. Server Information
form. (See FTS tab
configuration options.)
Full-Text- During the processing of search results, the server combines results from subqueries The Complex Search
Search- to arrive at the final result set. If the number of rows created during processing Threshold field on the
Threshold- exceeds this value, the server returns an error message indicating the search is too FTS tab of the AR
High complex. The default value is 1,000,000. System Administration:
Server Information
form. (See FTS tab
configuration options.)
Full-Text- While processing search results, the server creates a temporary table if the number of The Temporary Table
Search- FTS matches reaches this value. If the number of FTS matches is under this value, Threshold field on the
Threshold-Low the server uses the SQL IN operator for a query on an existing table. The default FTS tab of the AR
value is 200. System Administration:
Server Information
form. (See FTS tab
configuration options.)
Full-Text- (Server groups only) Number of seconds before a signal is sent to the server that The Indexer Server
Signal-Delay owns the full text indexing operation (if no signal is pending). When a server is not the Group Signal Delay
owner of the full text indexing operation and generates indexing work, that server field on the FTS tab of
signals the server that is the owner of indexing. To reduce the frequency of signals the AR System
sent, the signaling is conducted on a delayed basis. When indexing is generated, the Administration: Server
server checks whether a signal is pending. If a signal is pending, the server does not Information form. (See
need to take any action. If a signal is not pending, the server creates a pending signal FTS tab configuration
to be sent in the specified amount of time. If the full text signal delay configuration options.)
value is changed, the duration of any pending delay interval does not change. The
change takes effect the next time a delay interval is started. The default number of
seconds for Full-Text-Indexer-Signal-Delay is 10 seconds. The minimum is 1 second;
there is no maximum.
GetListEntry- Flag indicating where to format the GetListEntry date. This option is used mainly for
Server-Date- backward compatibility purposes. Values are
Format 2
T — Format date on server.
F — (Default) Format date on client.
Guest- Flag indicating whether guest users receive a restricted read license when they log in The Give Guest Users
Restricted- to BMC Remedy AR System. Values are Restricted Read field
Read on the Configuration
T tab of the AR System
F Administration: Server
Information form. (See
If this option is not specified, guest users receive a read license.
Setting administrative
options.)
GUID-Prefix 2 Character string used as a prefix for GUID strings generated by filters.
Homepage- Path to the systemwide default home page. This home page is used only if The Default Home
Form Form field on the
The current server is designated as the server for the home page in the BMC Configuration tab of
Remedy AR System User Preference form. the AR System
Administration: Server
Or
Information form. (See
The current server is designated as the home page server on the General Setting administrative
Settings page in Mid Tier Configuration Tool (See Configuring the General options.)
Settings page.)
And
Note: If the home page is deleted, this option is cleared, and the default home page
must be reentered.
Informix- (Informix databases only) Name of the server where the underlying database is
DBServer- located.
Name 1
Informix- (Informix databases only) Environment setting for the path for the Informix relay
Relay-Module module.
1
Informix- (Informix databases only) Name of the configuration file for the underlying database.
1 The default name is onconfig.
TBConfig
Internal-User- Number of shared, linked lists that hold all user-related information. This number must
Info-Hash- be a power of 2. The default setting is 128. The minimum number is 2. There is no
Lists2 maximum.
Note: BMC Remedy AR System does not verify that this number is a power of 2. If the
number is not a power of 2, the AR System server might behave in unexpected ways.
Internal-User- Time, in minutes, that the AR System server waits before removing inactive user
Instance- instances from its internal memory cache. Use this option in an LDAP environment to
Timeout 2 reduce the frequency of checks against an outside authenticator (if a user's record is
in server memory, the server does not need to check the user's password outside the
system). The default is 2 hours (120 minutes), and the minimum is 30 minutes.
Note: This value must be greater than or equal to the value of the Floating License
Timeout on the AR System Administration: Server Information form's Timeouts tab
(by default, 2 hours). If you specify a value that is less than the Floating License
Timeout, you will not receive an error. Inactive user instances, however, will not be
removed in less than the time specified by the Floating License Timeout. If you do not
set this option, the persistence of inactive user instances is controlled by the Floating
License Timeout.
IP-Name Option used to specify that a server has multiple names. This option can appear in
the configuration file more than once. When checking workflow and connections
against itself, the server compares its server name, host name, IP aliases, and any
names specified by this option to the name passed to it. If the name matches any of
those names, the server concludes that the workflow or connection is for itself. This
option can be used for servers with variable length domains or for servers on
computers with multiple internet addresses. For example, to connect to a computer
named tix as tix,tix.company.com, or tix.eng.company.com, an administrator would
create three IP-Name entries, one for each connection name. To connect to a
computer with multiple internet addresses such as tix.company.com, tix.
biggercompany.com, and tix.evenbigger.com, an administrator would create an IP-
Name entry for each of those addresses.
Jmx-port1 Defines the JMX port number that enables administrators to connect to JVM by using
Java Messaging Extensions (JMX).
License- Number of hours the BMC Remedy AR System server waits before disconnecting
Timeout inactive users. If a user is holding a floating license, the system also frees the license.
The default value is two hours.
de — German
en — English
es — Spanish
fr — French
it — Italian
ja — Japanese
ko — Korean
pt_br — Brazilian Portuguese
ru — Russian
zh_cn — Simplified Chinese
Localized- A semicolon-separated list of message numbers used to modify the server's default
Messages-To- caching behavior for localized system messages.
Cache
To cache all localized system messages the first time they are retrieved from the AR
System Message Catalog form (the default), do not use this option in the
configuration file.
To not cache any localized system messages, use this option without any message
numbers, for example:
Localized-Messages-To-Cache:
Localized-Messages-To-Cache: 66;72;302;314
Localized- Flag indicating whether the server is running in localized support mode. Values are The Localize Server
Server field on the Advanced
T — Run in localized support mode, and use localized messages if available. tab of the AR System
F — (Default) The server does not search for or use localized strings. Administration: Server
Information form. (See
Setting performance
and security options.)
Locked- Mode that causes the server to record locked workflow actions in workflow logs.
Workflow-Log- These actions are written as encrypted strings.
Mode 2
Log-DSO- Flag indicating whether to log failed pending distributed operations to the Distributed
Errors-To- Pending Errors form. Values are
Form
T — Log errors to the form.
F — Do not log errors to the form.
Log-DSO- Flag indicating whether to include a list of source entry field/value pairs for errors and
Field-Values 2 warnings in the DSO log files when the DSO log level is set to Error or Warning.
Values are
Log-File- Flag indicating whether to create a separate *.bak file or to append to the existing log
Append file. Values are
Log-Form- Bitmask indicating the type of information to log in the common log form (AR System
Selected Log:ALL). To activate one bit, set this option to its value (values are listed under the
Debug-mode option). To activate two or more bits, add their values, and set this
option to the total. For example, to activate bits 1 and 3, set this option to 5 because
bit 1 has a value of 1 and bit 3 has a value of 4. To deactivate a bit, subtract its value
from the value of this option. This option does not apply to the following bits because
information about their corresponding applications is not logged to a form:
Log-To-Form Bitmask indicating the information to log in predefined forms (for example, AR System
Log: API and AR System Log: Filter). To activate one bit, set this option to its value
(values are listed under theDebug-mode option). To activate two or more bits, add
their values, and set this option to the total. For example, to activate bits 1 and 3, set
this option to 5 because bit 1 has a value of 1 and bit 3 has a value of 4. To
deactivate a bit, subtract its value from the value of this option. This option does not
apply to the following bits because no log form is created for their corresponding
applications:
Long-Running- The minimum number of seconds to complete an escalation before a line is added to
Escalation- the thread log to detail how long the escalation ran. See Using logs to identify long-
Logging- running escalations (see page 4225).
Threshold
Map-IP- IP address mappings that enable alerts to work through firewalls when Network
2 Address Translation (NAT) is on. You must set up a mapping for each client computer
Address
that has access through the firewall where the client IP address is translated from an
internal address to a valid external address. In addition, a mapping is required for the
AR System server IP address if the host where the server resides is also translated.
Here is a multiple line example:
Max-Entries- Maximum number of requests returned by a search. Because users can also specify The Max Entries
Per-Query the maximum number of requests returned through Search Preferences in the BMC Returned by GetList
Remedy AR System User Preference form, the actual maximum is the lower of these field on the
values. The default value is no server-defined maximum. Configuration tab of
the AR System
Administration: Server
Max-Log-File- Maximum size in bytes for system log files. If the maximum is reached, the logging
Size cycle restarts at the beginning of the file, overwriting existing information. The default
value is 0 (no limit). This option does not apply to the Arfork-Log-File.
Max-Log- Maximum number of backup (.bak) log files to be allowed when the log file reaches
History the Max-Log-File-Size value and a new log file is created. By default, the number of
backup log files allowed is 1 and the maximum number of backup log files allowed is
999.
Max- Maximum number of consecutive bad password retries a user can make. If this option The Max Number of
Password- is set to 3, the user has 3 chances to log in. If all 3 attempts have bad passwords, the Password Attempts
Attempts user account is markedINVALID. Values are 0 (which turns this feature off) and all field on the
positive integers. Configuration tab of
the AR System
This parameter can be used in conjunction with Display-General-Auth-Message. (See Administration: Server
ar.cfg or ar.conf options C-D. See also the description for error 624.) Information form. (See
Setting administrative
options.)
Max- For forms that contain hierarchical data, such as manager and employee The Maximum Depth
Recursion- relationships, the maximum number of levels in the hierarchy that a recursive query for Hierarchical Query
Level retrieves. Values are any integer greater than 0. The default is 25. (See field on the Advanced
ARGetListEntryWithMultiSchemaFields.) tab of the AR System
Administration: Server
Information form. (See
Setting performance
and security options.)
Max-Vendor- Maximum number of temporary tables that can exist on an AR System server for a The Maximum Vendor
Temp-Tables single vendor form. The ARGetListEntryWithMultiSchemaFields function stores data Temp Tables field on
from vendor data sources in these tables. By default, only one temporary table can the Advanced tab of
exist for each vendor form. This setting applies to all vendor forms on the server. It is the AR System
overridden by the value of an individual vendor form's Maximum Vendor Temp Tables Administration: Server
property. Enter any integer greater than 0. (See Information form. (See
ARGetListEntryWithMultiSchemaFields.) Setting performance
and security options.)
Max-Log- Allows you to create maximum eight backup log files. Each log file will be of the size
History defined in the Max-Log-File-Size parameter.
Default value:8
Maximum-
Concurrent-
Client-
Managed-
Transactions
Mid-Tier- Password that administrators use to access the mid tier. The Mid-Tier
Service- Administrator Password
Password field on the Connection
Settings tab of the AR
System Administration:
Server Information
form. (See Setting
server passwords,
RPC options, and plug-
in timeouts.)
Minimum-API- Oldest API version with which the server communicates. The default value is 0, which Maps to: The Minimum
Version means that the server communicates with all API versions. If the client's API version API Version field on
is less than the specified value, the server refuses to talk with the client, and the client the Configuration tab
receives a decode error. (A AR System client is any program that accesses the AR of the AR System
System server through API calls, for example, BMC Remedy Developer Studio, plug- Administration: Server
ins loaded by the plug-in server, and so on.) Information form. (See
Setting administrative
options.)
Minimum- Oldest CMDB API version with which the server communicates. The default value is
CMDB-API- 3. If the version of a CMDB call is less than the specified value, the server refuses the
Version call. This option is independent of the Minimum-API-Version option.
Multiple- Flag indicating whether other AR System servers can run on this server's host
ARSystem- computer. Values are
Servers
T — (Default) Other servers can run on this server's host computer.
F — Other servers cannot run on this server's host computer.
To run multiple servers on the same host computer, this option must be set to T in the
configuration file of each server.
Multiple- Flag indicating whether multiple assignee groups can be stored in row-level security The Enable Multiple
Assign-Groups field ID 112. This enables users from multiple groups to access the same request. In Assign Groups field on
the past, only one group could be stored in Field 112. Values are the Configuration tab
of the AR System
T — (Default) Allow multiple groups in field ID 112. Administration: Server
F — Do not allow multiple groups in field ID 112. Information form. (See
Setting administrative
options.)
is-ZDT You need to add this parameter to perform zero downtime upgrade of the platform
components.
1. Options you can view (but not set) using the AR System Administration: Server Information form.
2. Options you cannot set or view using the AR System Administration: Server Information form
Note
BMC recommends to use the AR System Configuration Generic UI form to modify the
configuration settings. You should not use the ar.cfg file to modify the configuration
settings available on the AR System Configuration Generic UI form. See Configuration
Settings N-R (see page 1213).
This section of the table includes the options for the ar.cfg (ar.conf) file that begin with the letters N
through R.
Tips
Press F to view the table in full screen mode. Press Esc to exit full screen mode.
To easily search for a specific parameter in the below table, select the parameter
from the Option list. Alternatively, type the name of the parameter in the Option
text box.
For example, to search for the Next-ID-Block-Size parameter, select it from the
Option list, or type the parameter name in the Option text box.
To search for all parameters having a specific text string in the name, type the text
string in the Option text box.
For example, to search for all ID parameters, type ID in the Option text box.
To search for the parameters which have a specific text string in the description,
type the string in the Description text box.
For example, to search for the parameters which have Configuration in the
description, type Configuration in the Description text box.
Next-ID- Flag indicating whether to perform a new commit transaction when the system
Commit 2 generates the next ID for a record in the database. Values are
Next-ID- Option that allocates next IDs in blocks instead of one at a time. Allocating in blocks The Next Request ID
Block-Size increases performance during create operations. Values are any positive number up Block Size field on the
to 1000. The default value is 25. (A value of 1 disables the feature.) You can also Configuration tab of the
disable it by removing it from the configuration file. You do not need to restart the AR System
server for the change to take effect. Administration: Server
This setting is always disabled on the Distributed Pending form so that DSO can Information form. (See
operate correctly. Setting administrative
options.)
Warning: The use of this option might result in unpredictably large Next-ID sequence
gaps. The likelihood of this occurring increases with the use of multiple servers that
share a database. The BMC Remedy AR System server will not malfunction
because of this gap, and it should not be considered a defect.
Notification- Base URL that appears in email notifications. If this option is not used, the Default-
Web-Path Web-Path option is used. (Notification-Web-Path is available because the Default-
Web-Path is specified for other applications such as Flashboards, and it might be
different from the mid tier web path for opening requests in a notification.)
Num- Total number of preload segments loaded by the preload threads when preload The Number of Preload
Preload- threads are configured. SeeSetting the Preload Tables Configuration option. Segments field on the
Schema- Advanced tab of the AR
Segments System Administration:
Server Information form.
(See Setting performance
and security options.)
Num- Number of preload threads to use when preload threads are configured. A value of 0 The Number of Preload
Preload- indicates that preload threads are not used. The maximum value is 30 or twice the Threads field on the
Threads number of preload segments, whichever is lower. See Setting the Preload Tables Advanced tab of the AR
Configuration option. System Administration:
Server Information form.
(See Setting performance
and security options.)
Num- Defines the number of threads that can be used to monitor all the live client socket
selector- connections for IO activity. When the thread detects any activity, it forwards the call
threads1 to the appropriate queue.
Default value: 1
Oracle-Bulk- Number of data rows simultaneously fetched from the result set when an Oracle
Fetch-Count database is queried. The minimum is 1, the maximum is 100, and the default is 50.
2 The higher the value, the more memory is used during data retrieval.
Oracle-Clob- (Oracle databases only) Flag controlling Oracle CLOB storage. Values are
Storage-In-
Row T — CLOBs are created "in row." In-row CLOBs can degrade CPU
performance.
F — (Default) CLOBs are created "out row." Out-row CLOBs can cause the
database to grow rapidly.
Oracle- Database setting that matches the setting in the Oracle initialization file ( initARS.ora
Cursor- if the BMC Remedy AR System database SID is ARS). Value is
Sharing 2
EXACT — Use this value, if your Oracle database is set to perform case
insensitive search or case sensitive search. This is the recommended value
for BMC AR System 9.0 and later.
Oracle- Option that enables BMC Remedy AR System to support remote databases with
Dblink- different character sets. You can enter this option multiple times in the configuration
Character- file for multiple view forms on different remote databases with different link names.
Set2 The syntax is Oracle-Dblink-Character-Set: linkName charset
Oracle- (Oracle databases only) Service Name for the underlying database.
Service
Overlay- Specifies the default overlay group for the server. Clients that use the default overlay
mode2 group (all clients other than Developer Studio) will retrieve and use objects from the
default group.
0 — Clients will only retrieve and operate on origin objects. Custom objects
and overlays of origin objects will not be visible to clients, and the server will
execute only origin filters and escalations. In this mode, customizations are
ignored.
1 — Clients will retrieve non-overlaid origin objects, overlays, and custom
objects. All customizations will be visible, and the server will execute non-
overlaid escalations, overlays of escalations, and custom escalations.
Peer-listener- Defines the port number where all the cache instances from different servers
port1 communicate with each other.
Default value: 40001
Per-Thread- Flag indicating whether to create per-thread log files. Values are
Logging
T — Create per-thread log files.
F — (Default) Do not create per-thread log files.
Plugin 2 File name of one or more plug-ins that the plug-in server loads. The file name of the
DLL or shared object is provided. The file name might be an absolute file name or
might be relative to the BMC Remedy AR System installation directory. Add as many
entries for this option to the server configuration file as needed, but specify only one
file name in each option.
Note: This parameter is for the running C plugins in the C plugin server.
Plugin- Number of threads dedicated to handling ARDBC requests from the BMC Remedy
ARDBC- AR System server. You must specify a minimum number. Optionally, you can also
Threads 2 specify a maximum number (the plug-in server increases the number of threads for
a plug-in as needed up to the specified maximum). The syntax is
Plugin-ARDBC-Threads: <minimumNumberOfThreads>[<maximumNumberOfThreads>]
Plugin- Number of threads dedicated to handling AREA requests from the BMC Remedy AR
AREA- System server. You must specify a minimum number. Optionally, you can also
Threads 2 specify a maximum number (the plug-in server increases the number of threads for
a plug-in as needed up to the specified maximum). The syntax is
Plugin- Flag indicating whether the plug-in server accepts calls from remote servers. Values
Disable- are
Remote 2
T — The plug-in server accepts calls only from an BMC Remedy AR System
server running on the local computer.
F — (Default) The plug-in server accepts call from remote servers.
Plugin-Filter- Number of threads dedicated to handling BMC Remedy AR System Filter API
API-Threads requests from the BMC Remedy AR System server. You must specify a minimum
2 number. Optionally, you can also specify a maximum number (the plug-in server
increases the number of threads for a plug-in as needed up to the specified
maximum). The syntax is
Plugin-Filter-API-Threads: <minimumNumberOfThreads>
[maximumNumberOfThreads>]
Plugin-Log- Full path name of the file to use if plug-in logging is on (see Debug-mode).
File
Note: This parameter is for C plugin server. For more information on Java plugin
logging, see Setting plug-in server options (see page 394).
Plugin-Log- Option that specifies the type of information printed to plug-in log files. Values are
Level
10000 — No information (ARPLUGIN_OFF ).
1000 — (Default) Only severe messages (ARPLUGIN_SEVERE ).
900 — Severe and warning messages (ARPLUGIN_WARNING ).
800 — Status, severe, and warning messages (ARPLUGIN_INFO ).
700 — Configuration, status, severe, and warning messages (
ARPLUGIN_CONFIG ).
600 — Internal exceptions (ARPLUGIN_FINE ).
500 — Trace logs that log tasks as they are executed (ARPLUGIN_FINER ).
400 — Code-level information (ARPLUGIN_FINEST ).
100 — All log information (ARPLUGIN_ALL ).
Note: This parameter is for C plugin server. For more information on Java plugin
logging, see Setting plug-in server options (see page 394).
Plugin- RPC socket number for the private server queue to which loopback plug-in API calls The Plugin Loopback
Loopback- should be directed. Values are in the following ranges: RPC Program Number
RPC-Socket field on the Ports and
390621-390634 Queues tab of the AR
390636-390669 System Administration:
390680-390694 Server Information form.
Loopback plug-ins (such as the Report Creator plug-in) that call back into BMC
Remedy AR System use this number to determine the queue to request. By default,
plug-in API calls are directed to a queue that corresponds to the call type. To be
effective, the server must be configured to have a designated private queue for this
option.
Plugin- Plug-in password. If this option is specified, the plug-in server accepts connections
Password only from BMC Remedy AR System servers whose Server-Plugin-Target-Password
option is set to the same password. If this option is not specified, the plug-in server
accepts connections from BMC Remedy AR System servers that are not configured
to use a plug-in password.
Plugin-Path 2 Search path used to load a plug-in. The path is appended to the current value of
LD_LIBRARY_PATH (AIX, Linux, Oracle Solaris), SHLIB_PATH (HPUX), or PATH
(WINNT). Multiple paths can be specified for this option; each path is appended in
the order it appears in the configuration file. The syntax is
Insert no spaces between the delimeter and the path. For example: UNIX
Plugin-Path: /usr/ar/bin:/usr/ar/common/xyz
Windows
Note: This parameter is for C plugin server. For more information on Java plugin
logging, see Setting plug-in server options (see page 394).
Plugin-Port 2 The port number on which the plug-in server waits for incoming requests.
Note: This parameter is for C plugin server. For more information on Java plugin
logging, see Setting plug-in server options (see page 394).
Preference- Option that specifies whether users must use centralized preferences. Values are The Preference Server
Server- Option field on the
Option 1 — Users can choose to use a preference server if one is available. Advanced tab of the AR
2 — Users must use the specified preference server. System Administration:
3 — Users must use a preference server, but they cannot use this server as a Server Information form.
preference server. If users choose a server that is not a preference server, a (See Setting performance
warning is returned. and security options.)
Preload-At- Flag indicating when preload threads (if configured) are used. Values are The Preload Tables At
Init-Only Init Only field on the
T — Preload threads are used only during server startup. Advanced tab of the AR
F — (Default) Preload threads are used whenever the cache is loaded from System Administration:
the database. Server Information form.
(See Setting performance
For information about how to determine whether to use preload threads, see Setting
and security options.)
the Preload Tables Configuration option.
Private-RPC- RPC program number that determines the type of queue to which requests are The Server Queue field
Socket routed and the number of threads running on that queue. on the Ports and Queues
tab of the AR System
Administration: Server
Information form. (See
Setting ports and RPC
numbers.)
Private-RPC- Option that designates debug queues. A debug queue is a type of private queue
Socket (for used by the BMC Remedy AR System Workflow Debugger. To make any private
debug queue a debug queue, use this syntax:Private-RPC-Socket: rpcNumberDebug For
queue) example: Private-RPC-Socket: 390666 Debug Alternatively, you can make a private
queue a debug queue by selecting its Debug check box in the list of queues in the
Ports and Queues tab of the Administration Console.
Record- Flag indicating whether the BMC Remedy AR System server records the The Record Object
Object- relationships between workflow objects. Relationships field on the
Relationships Configuration tab of the
AR System
Administration: Server
Information form. (See
Setting administrative
options.)
Note: If using a server group, all servers within the same server group must have the
same setting for this option. If they do not, the servers in the group inconsistently
populate and un-populate the object relationship database should they be the
highest ranked server for the Administration operation when they are restarted. Only
the highest ranked server for the Administration operation in the server group will
perform the required object relationship actions when restarted.
Values are
When you set this option to T, the server records the relationships of all server
objects before it accepts connections from clients. Therefore, the first time you set
the value to T, you cannot connect to the server by using any client temporarily. The
more the number of objects defined on the server, the more time it takes to connect
to the server. With a large number of objects, such as with an ITSM application
installed, and depending on the performance of the database, this could take up to
an hour. When you can reconnect to the server, the recording of object relationship
data is complete.
When you set this option to F or clear it, all the recorded relationships are deleted
from the database.
Note: BMC recommends that you set this option by using the Record Object
Relationships option on the Configuration tab of the BMC Remedy AR System
Administration: Server Information form instead of setting it manually in the
configuration file. (See Viewing and sorting related objects.)
Record- Server events to log in the Server Events form, which makes server-related changes
Server- available to workflow and API programs. Enter the following values, separated by
Events semicolons, for the events to record.
1 — Form
2 — Field
3 — Menu
4 — Filter
5 — Import
6 — Active link
7 — Escalation
8 — View
9 — Container
10 — User
11 — Group
12 — Server setting
14 — Archive
15 — Server group actions
Register- Flag that prevents the BMC Remedy AR System server from registering with a The Register with
With- portmapper. Use this feature in conjunction with setting specific ports to enable you Portmapper field on the
Portmapper to run servers on computers that do not have a portmapper. Values are Configuration tab of the
Registry- Password of the BMC Atrium Web Services Registry admin user. Used by workflow
Admin- for the BMC Remedy AR System Web Services Registry form.
Password
Registry- User name of the BMC Atrium Web Services Registry admin user. Used by workflow
Admin-User for the BMC Remedy AR System Web Services Registry form.
Registry- URL of the BMC Atrium Web Services Registry. Used by workflow for the BMC
Location Remedy AR System Web Services Registry form.
Rejected-By- Specifies the interval in months or days for which a user wants to see all the
Others- requests rejected by others.
Interval1
Remedy- Encrypted password that AR System application services such as Approval Server The Application Service
App-Service- use to access the BMC Remedy AR System server. Password field on the
Password Connection Settings tab
of the AR System
Administration: Server
Information form. (See
Setting server passwords,
RPC options, and plug-in
timeouts.)
Required- Character to add to the label of a field whose entry mode is Required. The default is The Required Field
Field- an asterisk. Identifier field on the
Identifier Configuration tab of the
AR System
Administration: Server
Information form. (See
Setting administrative
options.)
Required- Position to add the character that identifies a Required field. Values are The Required Field
Field- Identifier field on the
Identifier- 0 — Add the character to the beginning of the field label. Configuration tab of the
Location 1 — (Default) Add the character to the end of the field label. AR System
Administration: Server
Information form. (See
Setting administrative
options.)
Restrict-Log- A list of semicolon-separated client types (or IDs if the client type is not known).
Client-Type Restricts logging only for specified client types.
Restrict-Log- Restrictions are applied to the API, SQL, and Filter logs only for specified RPC
RPC-Queue Queues.
Restrict-Log- A list of semicolon-separated user names. Restricts the logging only for specified
Users users.
Restrict- Controls which type of logging restriction is enabled. The value of the Restrict-
Logging Logging parameter depends on the combination of logging restrictions that you
select.. Possible values of the restriction parameters are as follows:
Users — 1
Client Type — 2
RPC Queues — 8
You can have combinations of Users, Client Type and RPC Queues restrictions. For
example, if you select Users and Client Type restrictions, the value of the Restrict-
Logging parameter is set to 9 (1+8).
Notes:
RPC-Non- Flag that enables BMC Remedy AR System on compliant systems to receive remote
Blocking-IO 2 procedure calls in a nonblocking mode. The mode prevents
To make value changes take effect, restart your AR System server. Windows and
Linux operating systems do not support this feature. Important: To enable your
system to use this feature, you must install the following patches. If these patches
are not installed, you see an error message or most of your RPC calls are blocked.
HP
Solaris
IBM Does not specify a patch number. Multiple file sets might be required. (If you do
not obtain an IBM® patch, your server might crash.)
Fix for Authorized Problem Analysis Report (APAR) IY61602 - AIX 5.3 or later
Fix for APAR IY61409 - AIX 5.2 or later
Fix for APAR IY61598 - AIX 5.1 or later
Fix for APAR IY71557 - AIX 5.2 or later
Fix for APAR IY71632 - AIX 5.3 or later
1. Options you can view (but not set) using the AR System Administration: Server Information form.
2. Options you cannot set or view using the AR System Administration: Server Information form.
Note
BMC recommends to use the AR System Configuration Generic UI form to modify the
configuration settings. You should not use the ar.cfg file to modify the configuration
settings available on the AR System Configuration Generic UI form. See Configuration
Settings S-Z (see page 1224).
This section of the table includes the options for the ar.cfg (ar.conf ) file that begin with the letters S
and Z.
Tips
Press F to view the table in full screen mode. Press Esc to exit full screen mode.
To easily search for a specific parameter in the below table, select the parameter
from the Option list. Alternatively, type the name of the parameter in the Option
text box.
For example, to search for the SCC-Enabled parameter, select it from the Option
list, or type the parameter name in the Option text box.
To search for all parameters having a specific text string in the name, type the text
string in the Option text box.
For example, to search for all SCC parameters, type SCC in the Option text box.
To search for the parameters which have a specific text string in the description,
type the string in the Description text box.
For example, to search for the parameters which have NOLOCK in the description,
type NOLOCK in the Description text box.
Save-Login Flag indicating whether users must log in to client tools. This option enables users to save a
previous login of their choice. Values are
SQL-Server- To enable the multi-subnet failover parameter for Microsoft SQL server database failover
Always-On
T- Set the multi-subnet failover parameter.
F- Disabled (Default)
SCC- Flag indicating whether a source code control integration requires you to enter a comment at
Comment- checkin. Values are
Checkin
0 — (Default) No comment is required.
1 — A comment is required.
SCC- Flag indicating whether a source code control integration requires you to enter a comment at
Comment- checkout. Values are
Checkout
0 — (Default) No comment is required.
1 — A comment is required.
SCC-Enabled Flag indicating whether a source code control system is being used with BMC Remedy AR
System. Values are
SCC- Flag indicating the level of source code control integration. Values are
Integration-
Mode 0 — (Default) Advisory level.
1 — Enforced level.
SCC-Provider- Name of the source code control provider. For example: Visual Source Safe.
Name
SCC-Target- Character string for the source code control system target directory. If none is present, this
Dir value is NULL. This string is limited to 255 characters.
Select-Query- Text to use in a query hint in the WITH clause of a SELECT statement when queries are
Hint 2 supplied to Microsoft SQL Server databases. This option works only for queries triggered by
GLE,GLEWF, and GME API calls. If this option is an empty string or is not present, no WITH
clause is generated. To determine the appropriateness of using this feature in your
environment, consult your SQL Server documentation. This option is commonly used with a
NOLOCK setting for allowing queries to execute without being blocked by simultaneous
updates, thereby improving performance. For example, to allow SQL Server to read data
being updated and avoid blocking, use this syntax:Select-Query-Hint: NOLOCK
Server- Name of the computer where the AR System server is installed. By default, a server in a
Connect-Name server group uses a fully qualified server name with domain to identify itself. Others servers
2 in the group use this name to communicate. To change the server name, add this option to
the configuration file:
Server-Connect-Name: <myComputerName.
Server-Connect-Name: <myComputerName.domain.com>
This name must be resolvable by DNS and is used exactly as specified. (See Configuring
server groups.)
Server- Full path name of the AR System data directory. This directory contains support and log files
directory1 for the AR System server.
Server-Group- Port number (RMIPort ) for email administration in Email Engine. If RMIPort is different from
Email-Admin- the default (1100 ), set this option to the new, port number to enable the server to
Port 2 communicate email administration information to Email Engine during server group
processing. For example, in a single Email Engine configuration, use this syntax:
Server-Group-Email-Admin-Port: 2020
If multiple Email Engines are configured for the server, each engine must have a unique
RMIPort. For a multiple Email Engine configuration, use semicolons to separate the RMIPort
numbers. For example:
Server-Group-Email-Admin-Port: 2020;2030;2040
Server-Group- Port number (RMIRegistryPort ) for Flashboards administration in the Flashboards server. If
Flashboards- the default Flashboards port number is changed, set this option to the new port number to
Admin-Port 2 enable the server to communicate Flashboards administration information to the
Flashboards server during server group processing. For example:
Server-Group-Flashboards-Admin-Port: 2021
Server-Group- Name and location of the server group trace log file. The default name is arsrvgrp.log. For
Log-File example: Server-Group-Log-File: c:\temp\servgroup.log
Server-Group- Flag indicating whether the server is a member of a server group. Values are T and F The Server
Member (default). Group Member
field on the
Configuration
tab of the AR
System
Administration:
Server
Information
form. (See
Setting
administrative
options.)
Server-Group- Method that a server in a server group uses to notify other members of the group about
2 object definition cache changes. Values are
Signal-Option
T — The server uses arsignald to notify other members about all object definition
cache changes.
The combined signaling and database posting method reduces server activity but does not
notify other servers as quickly as the all-arsignald method. (See Configuring the server
group signaling option.)
Server-Name An alias that is always interpreted as the current server. This option is used in multiple server
installations to differentiate servers. In a server group, Server-Name refers to the load
balancer name.
If you specify a value for this option, enter the value after the -h option when you use the
arreload command-line utility. Otherwise, arreload uses the default server name rather than
the name specified by this option. Do not specify a fully qualified name for this option. For
example, use alpha instead of alpha.remedy.com.
Note: If this server belongs to a server group and you use a common server alias, you must
also specify the Server-Connect-Name option. (See Server-Connect-Name.)
Server-Plugin- Alias of a plug-in server. When the BMC Remedy AR System server calls a plug-in server, it
2 must determine whether the plug-in server name is an alias. Aliases can direct the BMC
Alias
Remedy AR System server to access a plug-in server running on a different host or listening
at a specified port number. The syntax is
Workflow (that is, references to AR Filter API and ARDBC plug-ins) references a plug-in
name. This name can be an alias. This enables you to run a plug-in on a remote host or to
run more than one instance of a plug-in on a host. For example, to run the RMDY.ARDBC.
XML plug-in on the remote host foo at port number 12345, add the following entry to the AR
System server configuration file: Server-Plugin-Alias: RMDY.ARDBC.XML RMDY.ARDBC.
XML foo:12345The alias and real plug-in names can be identical if you run the plug-in on a
remote host. To run more than one instance of the plug-in on the same or different hosts,
create different aliases that reference the same plug-in on its respective hosts.
Server-Plugin- Number of seconds in which the plug-in server must respond to a call before an error is
Default- returned. The minimum value is 0. The maximum is 600. The default is 60.
Timeout
Server-Plugin- Encrypted password used to call a plug-in server. The BMC Remedy AR System server uses
Target- this password whenever it communicates with a plug-in server running on the specified host
Password and port. The syntax is {{Server-Plugin-Target-Password: <hostName>:<portNumber>:
<encryptedPassword>
Server-Side- For server-side table fields, the number of requests (or size of the chunk) that the server The Server
Table-Chunk- retrieves at one time from the database and stores in memory to process during filter or filter Table Field
Size guide actions. The server then retrieves, stores, and processes the next chunk until all Chunk Size
requests are processed. The value 0 causes the server to retrieve an unlimited number of field on the
requests. The default is 1000 requests. Specifying a lower value causes the server to Configuration
process smaller chunks, which reduces server memory use but results in slower processing tab of the AR
because the server must access the database many times, especially for large tables. System
Specifying a higher value causes the server to retrieve and process large chunks of data and Administration:
access the database fewer times. This results in improved performance at the cost of Server
increased memory use. Information
form. (See
Setting
administrative
options.)
Server-Stats- Interval (in seconds) at which the server records server statistics. The default is 60 seconds. The Recording
Rec-Interval Interval field on
the Server
Statistics tab of
the AR System
Administration:
Server
Information
form.
Server-Stats- Server statistics recording mode. This option determines what information is recorded in the The Server
Rec-Mode server statistics form. Values are Recording
Mode field on
0 — (Default) Recording is off. the Server
1 — The server records only cumulative queue statistics (the sum of all the individual Statistics tab of
queue statistics). the AR System
2 — The server records both cumulative and individual queue statistics. One entry is Administration:
written for the cumulative statistics and a separate entry is written for each queue. Server
Information
To see the statistics, open the Server Statistics form. (See Server statistics for baseline data
form.
.)
Set-Process- Number of seconds the BMC Remedy AR System server waits before ending a Set Fields
Timeout process that did not finish. Values are 1 through 60. The default value is 5.
SQL-Log-File Full path name of the file to use if SQL logging is on (See Debug-mode).
SQL-Secure- (Microsoft SQL Server only) Flag indicating the type of authentication to use to connect BMC
Connection Remedy AR System to a Microsoft SQL Server database. Values are
T — Windows Authentication
F — SQL Authentication
SQL-Server- Option that causes the server to issue a SET ANSI_NULLS ON command.
Set-ANSI-
Defaults 2
Submitter- Flag indicating whether the Submitter field can be changed and whether the submitter of a
Mode request must have a write license to modify it. Values are
Suppress- A series of zero or more message numbers (separated by spaces) that identify informational
warnings 2 or warning messages that the system should suppress. Only server warnings and notes can
be suppressed.
Sybase- (Sybase databases only) Alternative character set to use for communications between BMC
Character-Set Remedy AR System and the underlying database.
1
Sybase- (Sybase and Microsoft SQL Server only) Logical server name of the underlying database.
Server-Name 1 The default value is SYBASE.
System- Bitmask that sets logging options for the operating system. Values are
Logging-
0 — (Default) Use normal operating system logging.
Options 2
Bit 1 (value = 1 ) — Suppress logging to the operating system log file.
System- Flag to specify whether system messages appear in the prompt bar or a pop-up box. Values
Messages- are
Displayed
0 — (Default) Notes and warnings appear in the prompt bar, but errors will appear in
a pop-up box.
1 — All system messages willl appear in the prompt bar.
2 — No messages will appear in a prompt bar. All messages will appear in a pop-up
box.
Alternatively, you can specify how system messages appear by changing the value in the
Use Prompt Bar For field on the Configuration tab of the Server Information form.
TCD-Specific- TCP port for the arserver process. If this option is not set, the dispatcher is randomly The Server TCP
Port assigned to an available port. (TCD stands for transaction control daemon.) /IP Port field on
the Ports and
Queues tab of
the AR System
Administration:
Server
Information
form. (See
Setting ports
and RPC
numbers.)
Thread-Log- Full path name of the file to use if thread logging is on (See Debug-mode).
File
Track-Admin- Flag indicating whether the BMC Remedy AR System server populates progress information
Op-Progress 2 (if any) during long-running administrative operations, such as definition imports.
T — Track progress.
F — (Default) Do not track progress.
To retrieve the progress information, clients can use the GetServerInfo function with the
AR_SERVER_INFO_ADMIN_OP_PROGRESS request tag.
Two-Digit- Integer that specifies the cutoff year for interpreting a two-digit year as a four-digit year. For
Year-Cutoff 2 example, if the two-digit cutoff year is 2040:
If a two-digit year cutoff is not specified, a rolling two-digit year is used: Two-digit years are
the years between the current year plus 29 years and the current year minus 70 years. For
example, if the current year is 2002, two-digit years are the years between 1922 and 2031.
Use-FTS-In- Controls whether the server will use full text searches when executing queries during The Use FTS in
Workflow workflow that have full text indexed fields in the qualification. If this option is not used, the Workflow field
server will use the search capability of the database. The options are T (use FTS in on the FTS tab
workflow) and F (do not use FTS in workflow). of the AR
System
Administration:
Server
Information
form. (See FTS
tab
configuration
options.)
Use-Password- Validation mechanism for unregistered AR System users. To set this value, use the
File Authenticate Unregistered Users check box in the EA tab of the AR System Administration:
Server Information form. Windows Indicates whether the Windows domain service is used to
validate users not registered with BMC Remedy AR System. Values are
T — Use domain service. Users in the Windows domain are considered valid users of
BMC Remedy AR System and are assigned to the Public group.
F — (Default) Do not use domain service.
UNIX and Linux Indicates whether the /etc/passwd file is used to validate users not
registered with BMC Remedy AR System. Values are
T — (Default) Use password file. Users in /etc/passwd are considered valid users of
BMC Remedy AR System and are assigned to a group identified by the UNIX group
ID.
F — Do not use password file.
Use-Server- Flag indicating whether the server name specified by the Server-Connect-Name option is
Connect- used as the value for the Server Name field when Server Statistics form entries are created.
Name-In-Stats Values are
2
T — Use the Server-Connect-Name. This provides server-specific statistics when the
server runs in a server group because the server enters a unique server name into
the Server Statistics form.
F — (Default) Use the host name (or server alias if configured) with the domain name
appended.
When a common server alias is specified for all servers in a server group, the same server
name is used for the servers, effectively combining the statistics for all servers in the group.
User-Log-File Full path name of the file to use if user logging is on (See Debug-mode).
VersionControl- Option indicating whether the object modification log is enabled or disabled. When the log is The Object
Object- enabled, it records every change to AR System objects in your system (See Version control Modification
Modification- in BMC Remedy AR System). Values are Log field on the
Log-Mode Version Control
0 — (Default) Disabled tab in the AR
10 — Enabled System
Administration:
Server
Information
form. (See
Setting version
control options
.)
VersionControl- Option indicating whether the AR System server writes a definition file each time an object is The Save
Object- created or changed (See Version control in BMC Remedy AR System). This option is Definition Files
Modification- effective only when the object modification log is enabled. Values are field on the
Log-Save- Version Control
Definition-Files 0 — (Default) Yes, a definition file is created. tab in the AR
10 — No, a definition file is not created. System
Administration:
Server
Information
form. (See
Setting version
control options
.)
VersionControl- Option indicating whether object reservation is enforced or disabled. When object The Object
Object- reservation is enforced, users can reserve server objects, and BMC Remedy AR System Reservation
Reservation- prevents other users from modifying the reserved objects (See Version control in BMC field on the
Mode Remedy AR System). Values are Version Control
tab in the AR
0 — (Default) Disabled System
10 — Enforced Administration:
Server
Information
form. (See
Setting version
control options
.)
Workflow- BMC Remedy Developer Studio provides the ENCRYPT and DECRYPT functions to encrypt
Encryption- and decrypt data in filters and escalations, securing the operations. By default, only the 56-
Algorithm bit DES algorithm is used for encryption, but you can specify the 256-bit AES algorithm for
better security. To enable the 256-bit AES algorithm, add this parameter with the value that
identifies the algorithm:
This algorithm is applied only when you use ENCRYPT function in BMC Remedy Developer
Studio.
Note: BMC recommends that you use the 256-bit AES algorithm for better security.
XML-VUI- Flag indicating whether to export localized views when forms are exported in XML definition
Export-Default- format.
Is-Localized
Values are T and F.
Default value: F
1. Options you can view (but not set) using the AR System Administration: Server Information form.
2. Options you cannot set or view using the AR System Administration: Server Information form.
ardb.cfg or ardb.conf
The ardb.cfg (ardb.conf) file contains SQL clauses that administrators can append to SQL
statements issued by BMC Remedy AR System when a form, field, or index is created or modified.
When you create a form, field, or index, BMC Remedy AR System references the ardb
configuration file for clauses to append to the SQL statement. If it finds no matching information,
BMC Remedy AR System creates the form, field, or index as it normally would. If it finds matching
information, it appends the specified clause to the SQL statement that creates the form, field, or
index.
Warning
BMC Remedy AR System does not verify that the SQL clauses in your ardb configuration
file are correct or safe. BMC Remedy AR System merely attaches a SQL clause to the
statement used when a form or index is created. Because you can append any valid SQL
clause to the CREATE statement for a form, field, or index, use this feature wisely.
1. Enter a line in the file for the name of the form and a line for the clause you want added to
the CREATE statement:
Form: formName
Clause: clause
Note
When you use BMC Remedy Developer Studio to change the name of a form, the
ardb configuration file is automatically updated to match the new name.
Field {
Id: fieldID
c. Add a line for the SQL clause:
Clause: clause
The clause must be on one line because no new-line characters are allowed.
d. Place the closing brace in its own line below the SQL clause line.
3. Include index clause information:
a. Add an index line with an open brace:
Index {
Id: indexID
If an index contains multiple fields, add several field ID lines before the clause for that
index.
c. Add a line for the SQL clause:
Clause: clause
The clause must be on one line because no new-line characters are allowed.
Clauses that you specify for the tables of a form are not automatically attached to any
index you create for that form. You must specify the clause in the index clause. For
example, if you specify that a form is to reside in a specific part of your database and
you want an index for that form to reside in the same space, you must specify the
clause for both the form and index.
d.
BMC Remedy Action Request System 9.1 Page 1117 of 4703
BMC Software Confidential. BladeLogic Confidential.
d. Place the closing brace in its own line below the index clause line.
The file looks something like this:
Form: formName
Clause: clause
Field {
Id: fieldID
Clause: clause
}
Index {
Id: index_ID
Id: index_ID
Clause: clause
}
Leading spaces in the ardb configuration file are ignored, so you might want to add
them to keep your file organized.
When you create or update the ardb.cfg (ardb.conf) file, the changes do not occur
immediately. They occur when the table (or index) is restructured.
Synopsis
Windows: ARSystemServerInstallDir\Conf\ardb.cfg
UNIX: ARSystemServerInstallDir/conf/ardb.conf
Scenarios
The following example shows ardb configuration file information for the HD-Answer form on an
Oracle database. The tables for the HD-Answer form are built on segment two. The indexes
include the Submitter (ID 2), Status (ID 7), and Assigned To (ID 4) fields. The clauses for the
indexes instruct the database to leave 70 percent of each index free for updates and insertions.
Form:HD-Answer
Clause:TABLESPACE seg2
Field {
Id:536870913
Clause: NOT FOR REPLICATION
}
Index {
Id:2
Id:7
Clause:PCTFREE 70
}
Index {
Id:4
Clause:PCTFREE 70
}
The following examples show how you can use the ardb.cfg (ardb.conf) file to create indexes using
the Oracle UPPER function:
To specify that all indexes created for a form should be functional indexes, use this syntax:
Form: formName
Index {
Oracle-All-Upper-Index
}
To create a single functional index on a specific field, use this syntax:
Form: formName
Index{
Id: fieldID
Oracle-Upper-Index
}
To create a functional composite index, use this syntax:
Form: formName
Index {
Id: field_ID
Id: field_ID
Oracle-Upper-Index
}
armonitor.conf or armonitor.cfg
The Java-based armonitor.conf (armonitor.cfg) file is read by the armonitor (armonitor.exe) binary,
which runs the commands listed in the configuration file.
Note
Each file name is listed by its UNIX name. If a Windows equivalent exists, it appears in
parentheses after the UNIX name.
(Windows) ARSystemServerInstallDir\Conf\armonitor.cfg
(UNIX) /etc/arsystem/serverName/armonitor.conf
Note
Lines with a (#) sign in armonitor file are treated as comments and ignored.
Option Description
Environment- Defines environment values established for armonitor. You can include multiple instances of this option in the file.
variable Before initiating any processes, armonitor sets any values specified through this option in its environment. Then,
all processes that armonitor initiates inherit these values. This is a platform-independent way of defining
environment variables. With this option, you can overwrite the existing value of an environment variable.
Syntax: EnvVariableName=value
Example: ARDATEONLY=MM/dd/yyyy
Monitor- Specifies the armonitor directory. Initially, the installer enters the location for the directory. This location to the
directory Monitor-directory is same as the location where BMC Remedy AR System is installed.
The arcarte server hostname defined in armonitor.cfg for arcarte plugin should be the AR
host name and not the server alias name. As an example, you can see the below details
pertaining to a server in the AR Server Group environment. The highlighted text specifies
the server name.
Note: Remedy OnDemand users should not use OnBMC-S as this is an alias name. Use the exact
host name to be able to connect with the host.
Enable all the diserver or carte plugin in all the servers existing in your server group
environment. When a primary server fails, the jobs can run on the secondary server if the
diserver or carte plugin is enabled for the secondary server.
Every AR server in the server group environment should point to local host name and not to
the Primary AR server.
Related topic
armonitor (see page 1121)
armonitor
The Java based armonitor starts the BMC Remedy AR System server, BMC Remedy AR System
plug-in server, Distributed Server Option (DSO) server, and processes specified in the armonitor.
conf (armonitor.cfg) file. The armonitor provides capability to:
stop a process
start a process that was stopped earlier by using the stop signal or that failed to start
restart a process
monitor the armonitor.conf file for changes made to individual processes
On Windows, armonitor automatically runs as a service called BMC Remedy Action Request
System Server.
On UNIX, the arsystem script usually controls armonitor. For more information, see arsystem (see
page 1128).
Note
Each file name is listed by its UNIX name. If a Windows equivalent exists, it appears in
parentheses after the UNIX name.
If a process terminates, armonitor restarts the process. But if the process terminates for more than
four times in 30 seconds, armonitor does not restart that process.
The armonitor process maintains the following lists for the processes specified in the armonitor.
conf (armonitor.cfg) file.
List Description
STOPPED_PROCESSES_LIST Lists the processes stopped by the user by using the stopprocess
<processname> (For more information see, armonitor.conf or armonitor.cfg (see
page 1119)).
Starting from BMC Remedy AR System 9.1, following enhancements are provided to armonitor file:
ARMonitor.properties file
The ARMonitor.properties file consists of following properties to manage the BMC Remedy AR
System processes:
com.bmc.arsys.armonitor. The RMI Port is used by the ARMonitor_Admin to give instructions to armonitor. The
RMIPort property is configured by the ARMonitor.properties file, when the process is started or
restarted.
com.bmc.arsys.armonitor. Allows the armonitor process to detect the changes made to the armonitor.conf (armonitor.
filewatchenabled cfg) file without affecting other BMC Remedy AR System processes.
This property can be set to true or false through the ARMonitor_Admin functions -
enablefilemonitor & disablefilemonitor
com.bmc.arsys.armonitor. Determines the maximum number of attempts that are made to enable the file-monitor
filewatchretrylimit
com.bmc.arsys.armonitor. Timeout value in seconds, for which armonitor will wait for receiving the startup signal from
server. server.
logintimeoutinseconds
If no signal received from server during this time, the server will not be considered as
started and the server process, if running, will be stopped.
com.bmc.arsys.armonitor. Determines the maximum number of attempts until a server is started before terminating
server.startupretrylimit the process.
com.bmc.arsys.armonitor. Determines the maximum number of attempts until a non-server process is started before
process.startupretrylimit terminating the process.
ARMonitor_Admin.sh or ARMonitor_Admin.bat
The ARMonitor_Admin.sh (ARMonitor_Admin.bat) is an interface to communicate with the armonitor
file using the following arguments:
Note
Before you use the ARMonitor_Admin.sh (ARMonitor_Admin.bat) file, ensure that the
value of JAVA_HOME is set correctly.
Arguments Description
stoparmonitor Stops all the processes specified in the armonitor.conf (armonitor.cfg) file and stops armonitor.conf (
armonitor.cfg) file
allprocessesstatus Lists all processes sorted according to whether the process is successfully started, whether it failed
to start, or whether the user has stopped the process with ARMONITOR_ADMIN calls
restartprocess Restarts a process using the process name assigned to the process
<processname>
refreshprocess Refreshes the process with a new process definition read from the armonitor.conf (armonitor.cfg) file
<processname>
allprocessesdetails Provides the process details for all the processes specified in the armonitor.conf (armonitor.cfg) file
isfilemonitorenabled Returns TRUE or FALSE based on whether the FILE_MONITOR option is enabled or disabled
enablefilemonitor
Arguments Description
Enables the FILE_MONITOR feature for armonitor and also updates the com.bmc.arsys.
armonitor.filewatchenabled property in the ARMonitor.properties file to True.
disablefilemonitor Disables the FILE_MONITOR feature for armonitor and also updates the com.bmc.arsys.
armonitor.filewatchenabled property in the ARMonitor.properties file to False.
File Monitor
Starting from BMC Remedy AR System 9.1 a new FILE_MONITOR feature is added to armonitor
to monitor the armonitor.conf (armonitor.cfg) file for changes. The enablefilemonitor and
disablefilemonitor arguments are used to enable or disable the FILE_MONITOR feature.
The FILE_MONITOR provides following features when you modify the armonitor.conf (armonitor.
cfg) file:
If a new process is modified, the process is started automatically without affecting other
processes running in the armonitor.conf (armonitor.cfg) file.
If any numeric parameters of a process are modified, the same process is restarted by the
armonitor with the new parameter values.
Note
If you add a new parameter to an already running process, the armonitor considers this
as a new process and starts the process again. This creates two instances of the same
process running in armonitor which results in to an error. Ensure that you stop the running
process by using stopprocess argument before editing the process.
Related topic
armonitor.conf or armonitor.cfg (see page 1119)
arplugin.exe or arplugin
In this topic:
Description
The arplugin process executes the C plug-in server, which implements and deploys several server-
side APIs. The armonitor process initiates arplugin.
The C plug-in server supports only C plug-ins. See also Java plug-in server (see page ).
Synopsis
arplugin [-i ARSystemServerInstallDir] [-m] [-s serverName]
Options
You can specify the following options on the command line:
-i — Specifies the directory in which the BMC Remedy AR System server was installed.
-m — (Windows only) Runs the process in manual mode, not as a Windows service. If you run the
process in a command window, you must use this option.
Environment
ARCONFIGDIR
(UNIX only) Specifies the directory in which the ar.conf file and other BMC Remedy AR System
configuration files are stored. The -i option takes precedence over this environment variable.
The arsystem script sets ARCONFIGDIR to ARSystemServerInstallDir/conf, and you should not
need to change this value. However, arsystem does not modify ARCONFIGDIR if a preset value is
found.
arserver
In this topic:
Description
The arserver.jar executable is the main component of BMC Remedy AR System. It handles all
interactions between clients and the database, making all access to the system dependent on it.
On UNIX, the arsystem script usually controls arserver.jar through armonitor. Normally, you should
use arsystem to start the arserver process (see arsystem (see page 1128)).
On UNIX systems, the arsignal command causes arserver to load or reload information (see
arsignal.exe or arsignal (see page 1135)). Generally, these signals are sent after a manual repair or
restore operation is performed. However, they do not cause damage or adversely affect users
accessing BMC Remedy AR System.
Synopsis
c:\progfm\java\jdk\bin\java.exe[Java path ] -jar arserver.jar [-s
serverName] [-i ARSystemServerInstallDir] [-l licenseDirectory] [-m] [-t]
[-checkdb [logFileNameWithAbsolutePath]]
Note
The -checkdb option is a standalone option. When you use this option, the process
checks the consistency of the BMC Remedy AR System server database, reports the
results in the checkdb log file, and then quits. Therefore, do not include the -checkdb
option with arserver.jar in the armonitor.conf file.
Options
You can specify the following options in any order on the command line:
-i — pecifies the directory in which the BMC Remedy AR System server was installed.
-l — Specifies the directory in which BMC Remedy AR System license files are stored.
-m — (Windows only) Runs the process in manual mode, not as a Windows service. If you run the
process in a command window, you must use this option.
-s — Specifies the name of the server that you specified during the installation of BMC Remedy AR
System. When multiple monitors are running on the same host, this option can be used to identify a
monitor process.
-t — Logs all startup and initialization activities and writes the information to the arstartup _number.
log file. This file is in
(UNIX) ARSystemServerInstallDir/bin
(Windows) ARSystemServerInstallDir
-checkdb — Runs the server instance in the database consistency checker mode. See Checking
the database tables (see page 4159).
Note
Running arserver.jar with the checkdb option starts only the database consistency
checker, not the main AR System server.
Environment
ARCONFIGDIR
(UNIX only) Directory in which the ar.conf file is stored. The arsystem script sets ARCONFIGDIR to
ARSystemServerInstallDir/conf, and you should not need to change this value. However,
arsystem does not modify ARCONFIGDIR if a preset value is found.
ARDATE
(Windows only) This value consists of a string of operators defined by Regional Settings. If you do
not set this variable, the system uses the date format specified in the Regional Settings of the user
account that runs the service.
(UNIX only) This value consists of a string of operators defined by the strftime library call. Some
combinations are successfully displayed but cannot be translated for input. If you do not set
ARDATE, the system uses the date format for the language specified by the LANG variable.
ARDATEONLY
(Windows only) This value consists of a string of operators defined by Regional Settings. If you do
not set this variable, the system uses the date format specified in the Regional Settings of the user
account that runs the service.
(UNIX only) This value consists of a string of operators defined by the strftime library call. Some
combinations are successfully displayed but cannot be translated for input. If you do not set
ARDATEONLY, the system uses the date format for the language specified by the LANG variable.
ARTIMEONLY
(Windows only) This value consists of a string of operators defined by Regional Settings. If you do
not set ARTIMEONLY, the system uses the date format specified in the Regional Settings of the
user account that runs the service.
(UNIX only) This value consists of a string of operators defined by the strftime library call. Some
combinations are successfully displayed but cannot be translated for input. If you do not set
ARTIMEONLY, the system uses the time format for the language specified by the LANG variable.
LANG
(UNIX only) This value establishes the locale for BMC Remedy AR System, based on information
obtained during installation. Normally, this setting is managed by the arsystem script.
LC_ALL
(UNIX only) This value establishes the locale for BMC Remedy AR System, based on information
obtained during installation. Normally, this setting is managed by the arsystem script.
Files
Windows
ARSystemServerInstallDir\Conf\ar.cfg
WindowsSystemDir\drivers\etc\services
UNIX
ARSystemServerInstallDir/conf/ar/
ARSystemServerInstallDir/conf/ar.conf
/etc/services
arsystem
This topic describes the arsystem script, which is specific to UNIX environments only.
Description
The arsystem script starts the BMC Remedy AR System server and sets the system environment
appropriately. The script launches the armonitor process which, in turn, launches the arserverd
process. Normally, you do not need to start armonitor or arserverd manually.
Using the arsystem script ensures that the server starts with the correct environment variables,
such as those representing library search path and locale.
Synopsis
arsystem
{start | stop | restart | env [ <ARSystemCommandAndOptions> ] | setenv [
<ARSystemCommandAndOptions> ]}
Options
You can specify one of the following options on the command line:
start — Starts the BMC Remedy AR System server and sets the environment accordingly.
stop — Stops the BMC Remedy AR System server.
restart — Stops the BMC Remedy AR System server, and then starts it and resets the environment.
env — Calls the UNIX env command, and runs the specified BMC Remedy AR System command
in a subshell. The env option can be used to invoke
BMC Remedy AR System commands, including arserverd, arsignal, and produse, as follows:
To display environment settings that pertain to the BMC Remedy AR System server, use the
following syntax:
arsystem env
setenv
Equivalent to the env option.
Environment
ARCONFIGDIR
Specifies the directory in which the ar.conf file is stored. The arsystem script sets ARCONFIGDIR
to ARSystemServerInstallDir/conf, and you should not need to change this value. However,
arsystem does not modify ARCONFIGDIR if a preset value is found.
LD_LIBRARY_PATH
(Solaris and Linux only) Specifies the location of one or more shared libraries. API libraries,
database client libraries, and other third-party libraries are included. Normally, this variable is
managed by the arsystem script.
LIBPATH
(IBM AIX only) Specifies the location of one or more shared libraries. API libraries, database client
libraries, and other third-party libraries are included. Normally, this variable is managed by the
arsystem script.
SHLIB_PATH
(HP-UX only) Specifies the location of one or more shared libraries. API libraries, database client
libraries, and other third-party libraries are included. Normally, this variable is managed by the
arsystem script.
Note
If users try to use the Java plug-in server to load C plug-ins, they receive this error
message: Java plug-in server does not support C plug-ins. Contact Customer Support for
details.
These configuration files must be in the class path. For descriptions of the configuration options,
see the sample log4j_pluginsvr.xml and pluginsvr_config.xml.
For information about locating the log4j_pluginsvr.xml and pluginsvr_config.xml files, see Installed
plug-in components (see page 793).
External utilities
This section describes some BMC Remedy AR System server external utilities. Each item is listed
by its UNIX name. If a Windows equivalent exists, it appears in parentheses after the UNIX name.
arcache.exe or arcache
In this topic:
Description
The arcache utility executes the AR System interface that lets you update an entry in the access
control cache for a user or group, and lets you distribute your change to the specified AR System
servers. This program is generally used in a multiple server environment with centralized access
control. The program is also used for error recovery in a single server environment.
Filters that execute on submit and modify to the User and Group forms are typically used to run this
program. Changes to those forms update the local cache automatically. The filters make sure that
all changes to user or group information are distributed across the system.
If the server is running on a specific port and arcache cannot obtain the port information from the
portmapper, you must set the ARTCPPORT variable. For example, if the port number is 2020, type
the following command at a command prompt:
set ARTCPPORT=2020
Synopsis
Options
You can specify the following options in any order on the command line:
Option Description
-e Specifies the Request ID associated with the user or group in the access control cache (required). If you are adding a
user or group, you can specify any value that does not already exist in the cache.
-g Specifies the set of groups to which the user belongs (applicable for adding or updating users only). Group membership
defines the permissions the user has in the system. Use the group ID to identify each group (separated by semicolons).
Special group IDs are 1 (Administrator), 2 (Customize), and 5 (Subadministrator). For example, if the group ID for the
Technical Support group is 43, and you want to assign the user to the Customize and Technical Support groups, specify
this option as -g "2;43;".
-G Specifies the type of group cache operation. Valid values for this option are a (add or update group) and d (delete
group). The -G and -U options are mutually exclusive.
-c Specifies the group category. Valid values for this option are 0 (regular group), 1 (dynamic group), or 2 (computed
group). The default value is 0.
-q Specifies the qualification for a computed group only. Specify this option as "\"A\" OR 121 ", "121 OR 'Demo' ".
-t Specifies the group type (applicable for adding or updating groups only). Valid values for this option are 0 (none), 1
(view only), or 2 (view/change). The default value is 0.
-lw Specifies the type of write license to assign (applicable for adding or updating users only). Valid values for this option
are 0 (read), 1 (fixed), or 2 (floating). The default value is 0.
-m Specifies the default email address for sending messages (applicable for adding or updating users only).
-n Specifies the name of the user or group (required for add operations, recommended for delete operations).
-p Specifies the password to assign (applicable for adding or updating users only).
-U Specifies the type of user cache operation. Valid values for this option are a (add or update user) or d (delete user). The
-U and -G options are mutually exclusive.
-x Specifies the default alert mechanism to use (applicable for adding or updating users only). Valid values for this option
are 0 (none), 1 (notifier), or 2 (email). The default value is 1.
-d Runs the program in debug mode. Messages that detail the progress of each operation being performed are printed to a
log. Use this mode to diagnose problems with the arcache process only.
-r Specifies the authentication string of the authentication alias. See Setting up an authentication alias (see page 1318) for
more information about authentication aliases.
Option Description
-H Specifies the parent group for the group being created (applicable in hierarchical group permissions). If not specified,
the value is 0 (new group has no parent).
-V Specifies the overlay group property for the group being created. Valid values for this options are 0 (group gives
permissions only to base mode objects) or 1 (group gives permissions only to overlay and custom objects). If not
specified, the value is NULL (new group does not restrict access to base or overlay mode objects).
Environment
ARCONFIGDIR
(UNIX only) Specifies the directory where the ar.conf file and other AR System configuration files
are stored. The arsystem script sets ARCONFIGDIR to ARSystemServerInstallDir/conf,
and you should not need to change this value. However, arsystem does not modify
ARCONFIGDIR if a preset value is found.
Scenarios
Add a user, Sam Johnson, to the access control cache of all AR System servers. Use
000000000000104 as the Request ID, samj@bmc.com as the default email address, and
notifier as the default alert mechanism. The syntax is as follows:
To add a group ID, group type, and specify a computed group with a qualification, the syntax is as
follows:
Note
You can disable arcache with a setting in the AR System Administration: AR System
Configuration Generic UI form. When the setting is active you can still run arcache, but it
has no effect on the server, and the cache does not get flushed. For more information,
see Disable-User-Cache-Utilities at Configuration settings C-D (see page 1166).
arreload.exe or arreload
In this topic:
arreload description
The arreload utility executes the BMC Remedy AR System interface that enables you to empty
the access control cache on one or more BMC Remedy AR System servers and reload it from a
particular User or Group form.
If you experience problems with permissions or behaviors in the Group or User form, the cache
might need to be emptied and reloaded. Run arreload to reload the cache.
This process must run on the BMC Remedy AR System server that contains the source form (the
source computer). It deletes cached requests on the specified target computers and reloads the
cache from the form on the source computer, synchronizing the cache with the available users and
groups defined in the User and Group forms.
Synopsis
Options
You can specify the following options in any order on the command line. Enclose attributes in
double quotation marks:
Options Description
-f Deletes all user or group requests from the cache on the specified target computers before reloading from the source
computer. This option is useful for clearing out obsolete definitions that are no longer recognized as related to the local
server and that would otherwise not be removed. This helps prevent duplicate records that can corrupt the cache.
-g Specifies the name of the source form for reloading group requests (required if you do not specify the -u option).
-h Specifies the name of the server if a Server-Name value is set in the AR System server configuration file. If Server-
Name has a value and you use arreload without the -h option, arreload uses the default server name rather than
the name specified by Server-Name.
Options Description
-p Specifies the password for the user specified by the -a option (required if a password is defined for that user).
-u Specifies the name of the source form for reloading user requests (required if you do not specify the -g option).
-d Runs the program in debug mode. Messages are printed to stdout and detail the progress of each operation being
performed. Use this mode to diagnose problems with the arreload process only.
Environment
ARCONFIGDIR
UNIX only — Specifies the directory where the ar.cfg (ar.conf) file and other BMC Remedy AR
System configuration files are stored. The arsystem script sets ARCONFIGDIR to
ARSystemServerInstallDir/conf, and you should not need to change this value. However,
arsystem does not modify ARCONFIGDIR if a preset value is found.
arreload scenarios
Connect as Admin (using the password fun4me) and delete all user requests from the access
control cache of all AR System servers. Reload the cache on all computers from the User form on
the current computer. In this example, the attributes are enclosed in double quotation marks:
Reload the cache on all computers from the Group form and the User form on the current
computer. In this example, the attributes are enclosed in double quotation marks:
Note
You can disable arreload with the setting in the ar.cfg (ar.conf) file. (See Disable-Client-
Operation on ar.cfg or ar.conf options C-D (see page 1074).) When the setting is active,
you can still run arreload, but it has no effect on the server, and the cache does not get
flushed.
arsignal.exe or arsignal
In this topic:
Description
The arsignal utility forces an AR System server to load or reload information. The process can
be run on any computer.
Synopsis
The server name identifies the server that is to reload information. If a TCP port is to be specified
as well (needed if the server does not register with AR System Portmapper), it is appended to the
server name, separated by a colon. The string sigArgument is applicable when using the -a, -d,
-p, or -u options.
Options
You can specify one of the following options:
Option Description
-a Causes the server to update internal Alert user information based on the details provided in sigArgument. See
Configuring a hardware load balancer with BMC Remedy AR System. (see page 524)
-c Causes the server to reload information from its ar.cfg (ar.conf) file.
-g Causes the server to reload group and data dictionary information from the database.
ImageExtractor.jar (ImageExtractor.bat)
In this topic:
Description
The ImageExtractor is a Java utility that enables you to convert individually stored images
contained in existing field display properties to BMC Remedy AR System shared images. Shared
images are server objects that you can manage in BMC Remedy Developer Studio.
Note
Before BMC Remedy AR System 7.5.00, a separate copy of each image was stored in
the database for every field with which it is associated. By converting multiple copies of
each image to a single image retrieved by reference, this utility reduces database storage
space and cache requirements.
The utility can convert all images associated with a specified set of forms, or all images in the
database, to shared images and image references. The utility uses an image checksum to identify
images already present in the server. If an image is found, that reference is used. Otherwise, a
shared image object is created.
The ImageExtractor.jar utility is installed with the AR System server. On Windows, a batch
file (ImageExtractor.bat) is provided to ensure the correct environment settings are configured
when you run the utility. Both files are in the ARServerInstallDir\api\lib directory. On
UNIX, ImageExtractor.java is in the ARServerInstallDir/api/JavaDriver/ directory.
Synopsis
Options
The utility prompts you for the following input:
Input Description
Server port If not using the AR System portmapper, enter the TCP port for the AR System server. If using a
portmapper, press ENTER to leave this option blank.
User name Enter the AR System user name of a user who is a member of the Administrator group.
Image file Enter the name of the text file, if any, that lists the form names for which to convert images (see the
containing the Environment information). To convert all images on the AR System server, leave this option blank.
form names
Environment
You must have a supported Oracle Java runtime environment (JRE) installed and available in the
server environment.
To convert images for a specified list of forms, create a text file that contains one form name per
line. For example, the ImageExtractor utility would use the following text file to convert all images in
the Sample application forms listed:
Sample:Cities
Sample:ClassCentral
Sample:Classes
Sample:DialogYesNo
Sample:Enrollments
Sample:GetWeather
Files
ImageExtractor.jar
Centralized configuration
Configuration data is stored in the centralized configuration forms and reflected in the ar.cfg
configuration file (for backward compatibility). Centralized configuration not only simplifies the
management of configuration data, but also simplifies the sharing of configuration settings across
servers. Also, because configuration data is stored directly in the database, the data is more
secure.
Notes
You can continue to change the configuration settings for the following
components by using the listed form or tool:
BMC Remedy AR System server — AR System Administration:Server
Information form (see page 285)
BMC Remedy Approval Server — AP-Admin-ServerSettings form (see page
1667)
BMC Remedy Mid Tier — Mid Tier Configuration Tool (see page 426)
BMC Remedy Distributed Server Option — AR System Administration:
Server Information form (see page 576)
BMC Remedy Flashboards server — AR System Administration:
Flashboard Server Configuration form (see page 673)
BMC Remedy Assignment Engine — AR System Assignment Engine:
Server Settings form (see page 680)
You can use the AR System Administration:Plugin Server Information form (see
page 796) form to change the configuration settings for Java plug-in server.
You can use the AR System Configuration Generic UI form (see page 1233) form
for BMC Remedy Email Engine configuration settings and any other configuration
settings that are not available in the preceding forms.
You can use the AR System Administration:Plugin Server Information form (see
page 796) form to change the configuration settings for ARDBC LDAP and AREA
LDAP plug-in.
Note
The backup functionality copies all the centralized configuration data. You cannot create
a component-specific or setting-specific backup.
To create a backup
1. In a browser, open the BMC Remedy AR System Administration Console, and click System
> General > Centralized Configuration Backups.
2. In the AR System Configuration Backup Management form, in the Backup Name field, enter
a name for the backup.
3. Click Backup.
Note
When you create a backup, the data is backed up in the following forms:
1. In a browser, open the BMC Remedy AR System Administration Console, and click System
> General > Centralized Configuration Backups.
2. In the AR System Configuration Backup Management form, from the Available Backups
section, select the required backup, and click Restore Selected Backup.
When you restore a selected backup, it replaces all the current configuration settings with
the settings from the backup.
1. In a browser, open the BMC Remedy AR System Administration Console, and click System
> General > Centralized Configuration Backups.
2. In the AR System Configuration Backup Management form, from the Available Backups
section, select the required backup, and click Delete Selected Backup.
AR System Configuration Component form — Defines the name of the component (for
example, the server name) and the type of component. Examples of components are an AR
System server, a mid tier, Email Engine, and so on. The convention for naming component
types is similar to that of Java, for example, com.bmc.arsys.server.
AR System Configuration Setting form — Defines the configuration parameters for the
server.
Configuration settings
The centralized configuration forms contain the configuration settings or options for the following
components:
When you change a configuration setting in the AR System Administration:Server Information form
(see page 285) (AR System server), the AP:Admin-ServerSettings form (see page 1667) (Approval
Server), or the AR System Administration: Plugin Server Information form (see page 390) (BMC
Remedy Java plug-in server), the configuration settings and their new values appear in the
centralized configuration forms. You can also change the configuration settings using the AR
System Configuration Generic UI form (see page 1233).
Notes
Changes to the ar.cfg (ar.conf) file for some settings are reflected in the centralized
configuration forms for backward compatibility, and changes to those settings in
the centralized configuration forms are reflected in the ar.cfg (ar.conf) file .
BMC recommends that you update the configuration settings by using the UI
where possible.
For information about configuring mid tier properties, see Settings in the config.
properties file (see page 499).
Note
While upgrading the BMC Remedy AR System server, the value of the Configuration-
Name setting is mapped to the Server-Connect-Name setting. If the Server-Connect-
Name setting is not present, then the value is mapped to the Server-name setting.
Note
BMC recommends that you use the AR System Configuration Generic UI form to modify
the configuration settings. Do not use the ar.cfg file to modify the configuration settings on
the AR System Configuration Generic UI form.
The following table lists the settings available for centralized configuration.
Tip
If you cannot view all the columns, click Full screen in the upper-right corner
of the page to open it in full screen mode. Alternatively, use the scroll bar at the
bottom of the table.
Press F to view the table in full screen mode. Press Esc to exit full screen mode.
To easily search for a specific parameter in the table, select the parameter from
the Setting list. Alternatively, type the name of the parameter in the Setting text box.
For example, to search for the Next-ID-Block-Size parameter, select it from the
Setting list, or type the parameter name in the Setting text box.
To search for the parameters which have a specific text string in the description,
type the string in the Description text box.
For example, to search for the parameters which have Configuration in the
description, type Configuration in the Description text box.
Active-Link-Dir Directory in which active link server run processes are No AR System
stored. Only commands in the specified directory can be Administration
run. This is a security feature that ensures clients or API Console >
programs use only a safe set of server processes. System >
General >
Server
Information >
Advanced >
Security
section >
Active Link
Run Process
Directory.
(See Setting
performance
and security
options.)
Active-Link-Shell (UNIX only) Parent shell of any active link server No AR System
process. This parameter causes the server to start the Administration
shell with the specified process as a parameter. This is Console >
a security feature. The specified shell might be a System >
security shell that verifies a path or runs with a user ID General >
other than the one the server uses. For example, if the Server
server runs as root and an administrator specifies a Information >
shell that runs as a lower user privilege, an active link Advanced >
invokes the shell that runs as a user instead of as root. Security
Because the AR System server passes the shell section >
command to the Active-Link-Shell as a single string Active Link
without any other command-line arguments, the Run Process
command parameters can often be interpreted Shell.(See
incorrectly. As AR System server does not know which Setting
custom shell must be used for active link processing, it performance
cannot supply all of the necessary arguments. To avoid and security
this and use the Active-Link-Shell Feature correctly, options.)
follow the steps listed below:
1.
BMC Software Confidential. BladeLogic Confidential.
#!/bin/sh
# Usage:
# /path/to/arsystem-csh-helper process-
command
# Pass process-command as a command line
to /bin/csh.
#
# use "$*" preserve argument as a single
string
exec /bin/csh -c "$*"
# cp arsystem-csh-helper /usr/local
/arsystem-csh-helper
# chmod 755 /usr/local/arsystem-csh-helper
(See Setting
administrative
options.)
AE-Log-Enabled No
(Component name: com.bmc.arsys. Flag indicating whether the Assignment Engine logging Assignment
assignment) is enabled. Engine
Administration
Valid values: Console >
Sever
1 — (Default) Assignment Engine logging is
Settings >
disabled.
Enable
0 — Assignment Engine logging is enabled.
Assignment
Engine Logs.
(See
Configuring
the
Assignment
Engine server
settings (see
page 680) ).
AE-Max-Log-File-Size Indicates the maximum size (in megabytes) for the log No Assignment
file. Engine
(Component name: com.bmc.arsys. Administration
assignment) Default value: 10 MB Console >
Sever
Settings >
Max Log File
Size.
AE-Worker-Threads No
(Component name: com.bmc.arsys. Indicates the total number of worker threads that Assignment
assignment) process various assignment requests. Engine
Administration
Default value: 3 Console >
Sever
Settings >
Number of
Threads.
(See
Configuring
the
Assignment
Engine server
settings (see
page 680) ).
Allow-Backquote-In-Process-String Option that enables the server to run a process with a No AR System
backquote in the process name or in its arguments. Configuration
Generic UI
Valid values:
form.
Searches.
(See Setting
administrative
options.)
Note:
AlwaysOn-Log-History Number of Always On log file backups that you need to Yes AR System
store. Administration
Console >
Default value: 2 System >
General >
Server
Information >
Always On
Logging >
Maximum
Backups.
(See Setting
Always On
logging (see
page 371).)
API-Log-File Full path name of the file to use if API logging is on (see No AR System
Debug-mode (see page 1183)). Administration
Console >
System >
General >
Server
Information >
Log Files >
API Log.
(See Setting
log files
options.)
API-Recording-Client-Type Indicates the client types for which you want to monitor No AR System
the API calls. By default, this field does not have any Configuration
value set which means that the calls from all client types Generic UI
are monitored. form.
Use this format:
<clientType>;<ipAddressExpression>;
<clientType>;<ipAddressExpression>
API-Recording-Enable Specifies whether you want to enable the system for No AR System
monitoring API calls. Configuration
Generic UI
Valid values: form.
Approval-Debug-Type2 (see page 1166) This setting specifies the log level for approval server. No
Values are:
(Component name: com.bmc.arsys. 0 — (Default) The minimum logging level for AR System
approval) BMC Remedy Approval Server is NORMAL (or Configuration
INFO). Generic UI
1 — The highest logging level for BMC Remedy form.
Approval Server is ALL (or DEBUG).
Approval-Defn-Check-Interval 2 (see Interval (in seconds) at which Approval Server checks No AR System
page 1166) for changed or updated data in the data definition forms. Configuration
Generic UI
(Component name: com.bmc.arsys. form.
server)
Approval-Due-Soon2 (see page 1166) The duration after which the approval requests that are No AR System
due for action are highlighted on Approval Central. Configuration
(Component name: com.bmc.arsys. Generic UI
approval) form.
Approval-Log-File 2 (see page 1166) Full path of the Approval Server log file. No AR System
Configuration
(Component name: com.bmc.arsys. Generic UI
server) form.
Approval-Notify 2 (see page 1166) Flag indicating whether approval notifications are No AR System
(Component name: com.bmc.arsys. configured from the Server Settings dialog box. An Configuration
approval) Approval-Notify entry exists for each ID. Generic UI
form.
Warning : Do not change this option in the AR System
Configuration Component Setting form . Instead, from
the AP:Administration form, click the Server Settings link
to open a dialog box with configuration settings for the
Approval Server.
Approval-Polling-Interval 2 (see page Interval at which the Approval Server polls the AR No AR System
1166) System server for pending work. This setting is intended Configuration
as a backup method, not the primary contact method. Generic UI
(Component name: com.bmc.arsys. Under normal circumstances, the AR System server or form.
approval) the Application Dispatcher (depending on the
configuration) contacts the Approval Server when work
is pending. When this option is specified, the Approval
Server polls the AR System server only if it does not
receive a signal from the AR System server in the
specified time. Specify the interval in seconds. Minimum
is 30 seconds. Maximum is 3600 seconds (one hour).
Approval-Recent-History2 (see page The duration within which a user can see in the recent No AR System
1166) history an approval request that was submitted or acted Configuration
upon. Generic UI
(Component name: com.bmc.arsys. form.
approval)
Approval-RPC-Socket 2 (see page 1166) RPC Program Number that Approval Server uses when No AR System
contacting BMC Remedy AR System. This enables you Configuration
(Component name: com.bmc.arsys. to specify a private BMC Remedy AR System server for Generic UI
server) Approval Server. form.
AR-Max-Attach-Size 2 (see page 1166) Maximum size (in bytes) of compressed attachments No AR System
that can be sent to the AR System database from the Configuration
(Component name: com.bmc.arsys. AR System server. By preventing large attachments Generic UI
server) from being sent to the database, you can prevent form.
excessive memory growth and reduce transmission
time. This limit does not apply to attachments retrieved
from the database by the AR System server. This option
applies to all databases.
ARDBC-LDAP-Base-DN Base distinguished name (DN) to use instead of the root No AR System
DN as the starting point for discovering vendor tables Administration
(Component name: com.bmc.arsys. when you design vendor forms. For example: ARBDC- Console >
ldap.ardbc)
LDAP-Base-DN: CN=Users, DC=ldapesslab, DC=com. System >
LDAP >
ARDBC
Configuration
> Base DN
For Discovery.
(See
Configuring
the ARDBC
LDAP plug-in
.)
ARDBC-LDAP-Cache-MaxSize Size limit (in bytes) for the cache. For no size limit, set No AR System
this to 0. Administration
(Component name: com.bmc.arsys. Console >
ldap.ardbc) Default value: 32768 bytes System >
LDAP >
ARDBC
Configuration
> ARDBC
Plugin Cache
section >
Maximum
Size.
(See
Configuring
the ARDBC
LDAP plug-in
.)
ARDBC-LDAP-Cache-TTL Time limit (in seconds) that data remains cached. For no No AR System
time limit, set this to 0. Administration
(Component name: com.bmc.arsys.
Console >
ldap.ardbc) Default value: 60 seconds System >
LDAP >
ARDBC
Configuration
> ARDBC
Plugin Cache
section >
Time To Live.
(See
Configuring
the ARDBC
LDAP plug-in
.)
(See
Configuring
the ARDBC
LDAP plug-in
.)
ARDBC-LDAP-Connect-Timeout 2 Number of seconds that the plug-in waits for a response No AR System
from the directory service before it fails. The minimum Configuration
(Component name: com.bmc.arsys. value is 0, in which case the connection must be Generic UI
ldap.ardbc) immediate. The maximum value is the External- form.
Authentication-RPC-Timeout setting. If a value is not
specified, this option is set to the value of the External-
Authentication-RPC-Timeout option (by default, 40
seconds).
ARDBC-LDAP-DN-Timeout 2 Number of seconds that the plug-in retains the base No AR System
distinguished name (DN) used to access an LDAP Configuration
(Component name: com.bmc.arsys. ARDBC vendor form after the user becomes inactive. Generic UI
ldap.ardbc) form.
Default: 3600 seconds
ARDBC-LDAP-Hostname Host name of the system on which the directory service No AR System
runs. If the host name is not specified, the ARDBC Administration
(Component name: com.bmc.arsys. LDAP plug-in uses localhost as the host name. For Console >
ldap.ardbc)
example:ARDBC-LDAP-Hostname: server1.eng.remedy. System >
com LDAP >
ARDBC
Configuration
> Host Name.
(See
Configuring
the ARDBC
LDAP plug-in
.)
ARDBC-LDAP-Port Port number on which the directory service listens for No AR System
clients. Administration
(Component name: com.bmc.arsys. Console >
ldap.ardbc)
System >
LDAP >
ARDBC
Configuration
> Port
Number.
(See
Configuring
the ARDBC
LDAP plug-in
.)
ARDBC-LDAP-User-DN Distinguished name (DN) of the user account that the No AR System
ARDBC LDAP plug-in uses to search and modify the Administration
(Component name: com.bmc.arsys.
contents of the directory service. For example: ARDBC- Console >
ldap.ardbc) LDAP-User-DN: server1\admin System >
LDAP >
ARDBC
Configuration
> Bind User.
(See
Configuring
the ARDBC
LDAP plug-in
.)
(See
Configuring
the ARDBC
LDAP plug-in
.)
AREA-LDAP-Bind-Password Password of the user account that the AREA LDAP plug- No AR System
in uses to find the user object when using the User Administration
(Component name: com.bmc.arsys. Search filter. If the distinguished name (DN) is not Console >
ldap.ardbc) specified, the AREA LDAP plug-in uses an anonymous System >
login to find the user object. If the target directory LDAP >
(See
Configuring
the AREA
LDAP plug-in
.)
AREA-LDAP-Bind-User Distinguished name (DN) of the user account that the No AR System
AREA LDAP plug-in uses to find the user object when Administration
(Component name: com.bmc.arsys. using the User Search filter. If the DN is not specified, Console >
ldap.area)
the AREA LDAP plug-in uses an anonymous login to System >
find the user object. If the target directory service does LDAP >
not allow anonymous access, you must specify a DN AREA
and password; otherwise, the plug-in cannot determine Configuration
the DN of the user. For example: AREA-LDAP-Bind- > Bind User.
User: ldapesslab\admin
(See
Configuring
the AREA
LDAP plug-in
.)
(See
Configuring
the AREA
LDAP plug-in
.)
(See
Configuring
the AREA
LDAP plug-in
.)
AREA-LDAP-Disable-Referral 2 Flag that disables all referral processes by the AREA No AR System
LDAP plug-in. Configuration
(Component name: com.bmc.arsys. Generic UI
ldap.area) Valid values: form.
AREA-LDAP-Email 2 Name of the attribute that specifies the email address of No AR System
the user. This attribute corresponds to the Email Configuration
(Component name: com.bmc.arsys. Address field in the BMC Remedy AR System User Generic UI
ldap.area) form. If the attribute is not specified, the specified form.
default or a system default is applied.
AREA-LDAP-Email-Default 2 No
(Component name: com.bmc.arsys. Value that the AREA LDAP plug-in uses if the AREA- AR System
ldap.area) LDAP-Email parameter is not specified or has no value Configuration
for the user. Generic UI
form.
AREA-LDAP-Group-Filter LDAP search filter used to locate the groups to which No AR System
the user belongs. To determine the option's values at Administration
(Component name: com.bmc.arsys.
runtime, use these keywords: Console >
ldap.area) System >
Note: The backslash (\) is required.
LDAP >
AREA
$\USER$ — User's login name.
Configuration
$\DN$--- User's distinguished name. This only
> User and
applies to the Group Base Name and Group
Group
Search Filter. It does not apply to the User Base
Information
Name and User Search Filter.
section >
$\AUTHSTRING$ — Value that users enter into
Group Search
the Authentication String field when they log in.
Filter.
$\NETWORKADDR$ — IP address of the AR
System client accessing the AR System server. (See
Configuring
the AREA
LDAP plug-in
.)
AREA-LDAP-Hostname Host name of the system on which the directory service No AR System
runs. If no value is specified, the AREA LDAP plug-in Administration
(Component name: com.bmc.arsys. uses localhost as the host name. Console >
ldap.area) System >
LDAP >
AREA
Configuration
> Directory
Service
Information
section >
Host Name.
(See
Configuring
the AREA
LDAP plug-in
.)
AREA-LDAP-Lic 2 Name of the attribute that identifies the type of write No AR System
license issued. This attribute corresponds to the License Configuration
(Component name: com.bmc.arsys. Type field in the BMC Remedy AR System User form. If Generic UI
ldap.area) the attribute is not specified, the specified default or a form.
system default is applied.
AREA-LDAP-Lic-Default 2 Value that the AREA LDAP plug-in uses if the AREA- No AR System
LDAP-Lic attribute is not specified or has no value for Configuration
(Component name: com.bmc.arsys. the user. Generic UI
ldap.area) form.
AREA-LDAP-LicApp-Default 2 Value that the AREA LDAP plug-in uses if the AREA- No AR System
LDAP-LicApp attribute is not specified or has no value Configuration
(Component name: com.bmc.arsys. for the user. Generic UI
ldap.area) form.
AREA-LDAP-LicFTS Name of the attribute that identifies the type of FTS No AR System
license assigned to the user. If the attribute is not Administration
(Component name: com.bmc.arsys.
specified, the specified default or a system default is Console >
ldap.area) applied. System >
LDAP >
AREA
Configuration
> Defaults
and Mapping
Attributes to
User
Information
section > Full
Text Search
License.
(See
Configuring
the AREA
LDAP plug-in
.)
AREA-LDAP-LicFTS-Default Value that the AREA LDAP plug-in uses if the AREA- No AR System
LDAP-LicFTS attribute is not specified or has no value Configuration
(Component name: com.bmc.arsys. for the user. Generic UI
ldap.area) form.
AREA-LDAP-LicMask-Default 2 Value that the AREA LDAP plug-in uses if the AREA- No AR System
LDAP-LicMask attribute is not specified or has no value Configuration
(Component name: com.bmc.arsys. for the user. Generic UI
ldap.area) form.
AREA-LDAP-LicRes1 2 Name of the attribute that specifies the type of reserved No AR System
license issued. If the attribute is not specified, the Configuration
(Component name: com.bmc.arsys. specified default or a system default is applied. Generic UI
ldap.area) form.
AREA-LDAP-LicRes1-Default 2 Value that the AREA LDAP plug-in uses if the AREA- No AR System
LDAP-LicRes1 attribute is not specified or has no value Configuration
(Component name: com.bmc.arsys. for the user. Generic UI
ldap.area) form.
AREA-LDAP-Notify-Meth-Default 2 Value that the AREA LDAP plug-in uses if the AREA- No AR System
LDAP-Notify-Meth attribute is not specified or has no Configuration
(Component name: com.bmc.arsys. value for the user. Generic UI
ldap.area) form.
AREA-LDAP-Port Port number on which the directory service listens for AR System
clients. Administration
Console >
System >
(Component name: com.bmc.arsys. LDAP >
ldap.area) AREA
Configuration
> Directory
Service
Information
section > Port
Number.
(See
Configuring
the AREA
LDAP plug-in
.)
(See
Configuring
the AREA
LDAP plug-in
.)
AREA-LDAP-User-Base User base in the LDAP directory to search for the user. No AR System
To determine the option's values at runtime, use these Administration
(Component name: com.bmc.arsys.
keywords: Console >
ldap.area) System >
Note: The backslash (\) is required.
LDAP >
AREA
$\USER$ — User's login name.
Configuration
> User and
AREA-LDAP-User-Filter LDAP search filter used to locate the user in the No AR System
directory from the base that the AREA-LDAP-User-Base Administration
(Component name: com.bmc.arsys. option specifies. To determine the option's values at Console >
ldap.area)
runtime, use these keywords: System >
LDAP >
Note: The backslash (\) is required.
AREA
Configuration
$\USER$ — User's login name.
> User and
$\DN$ — User's distinguished name. This only
Group
applies to the Group Base Name and Group
Information
Search Filter. It does not apply to the User Base
section >
Name and User Search Filter.
User Search
$\AUTHSTRING$ — Value that users enter into
Filter.
the Authentication String field when they log in.
$\NETWORKADDR$ — IP address of the AR (See
System client accessing the AR System server. Configuring
the AREA
LDAP plug-in
.)
(See
Configuring
the AREA
LDAP plug-in
.)
Arerror-Exception-List 2 (see page 1166) List of errors that trigger a dump of the current stack in No AR System
the arerror.log file. Separate each error number with a Configuration
semicolon (for example, 123;345;). Generic UI
form.
ARF-Java-VM-Options 2 (see page 1166) Java command options for a virtual machine (VM). The No AR System
options are documented in the online AR System Java Configuration
API documentation. Generic UI
form.
Archive-Interval Specifies the number of hours scheduled to run the Yes AR System
global archive for all forms. Administration
Console >
In a server group environment: System >
General >
1. This configuration setting is shared among all the
Server
servers.
Information >
2. If you set this parameter on any of the server, it
Configuration
will be applicable for all the servers.
> Archive
For information about setting, archive interval, see Interval.
Setting global archive interval for forms (see page 1843).
(See Setting
global archive
interval for
forms (see
page 1843).)
arsystem.authentication_server Server that the BMC Remedy Mid Tier uses to No Mid Tier
authenticate a user. If an authentication server is Configuration
specified, the mid tier authenticates with the specified Tool >
server. The authentication server must already be in the General
list of mid tier servers on the AR Server Settings page. Settings >
Preference
Servers.
(See
Configuring
the General
Settings page
(see page 464
).)
arsystem.enableSkins Flag that indicates whether skins are enabled on the No Mid Tier
BMC Remedy Mid Tier. Configuration
Tool > AR
Valid values: Server
Settings >
true (Default)
Edit AR
false
Server >
Enable Skins.
arsystem.homepage_server BMC Remedy AR System server that contains the home No Mid Tier
page that you want to open when the user logs on. The Configuration
home page URL is: http://midTierServer/contextPath Tool >
/home The home page server must be added to the list General
of mid tier servers in the AR Server Settings page. The Settings >
mid tier searches the designated server for the home Homepage
page. If you have not selected a home page server in Server.
the AR System User Preference form, the home page
server specified in the AR Server Settings page is used
arsystem.licenserelease_timeout Number of seconds before BMC Remedy Mid Tier No Mid Tier
releases an AR System license for a user, if the user Configuration
does not log out of mid tier correctly. Tool >
General
Note: To log out correctly, the user must close the last
Settings >
browser window associated with the current HTTP License
session or navigate away from the mid tier.
Release
Timeout.
Default value: 60 seconds
(See
Configuring
the General
Settings page
(see page 464
).)
arsystem.log_backups Maximum number of BMC Remedy Mid Tier backup log No Mid Tier
files that the system will generate when the log file size Configuration
exceeds the limit specified in the Maximum Log File Size Tool > Log
(arsystem.log_filesize). Settings >
Default value: 100 Maximum
Number of
Log Files.
arsystem.log_category Type of information that should be stored in the BMC No Mid Tier
Remedy Mid Tier log file. Configuration
Tool > Log
Valid values: Settings >
Log
Reporting — Messages related to reporting
Categories.
Cache — Messages related to definitions, such
as forms and active links in the cache
Session Management — Messages related to
user session construction and expiration, such as
logon, logout, or timeout
Configuration — Messages related to the config.
properties file, such as when it is loaded and
changed
Flashboards — Messages related to Flashboards
Web Services — Messages related to web
services
Field — Messages related to fields
Workflow — Messages related to compilation of
workflow (primarily active link actions), such as
invalid active links
Performance — Messages related to
performance, including duration of operations
arsystem.log_filesize Maximum size (in kilobytes) a BMC Remedy Mid Tier No Mid Tier
log file can reach before a backup copy is automatically Configuration
made. When the log file reaches this limit, a backup Tool > Log
copy is made with the same file name and an Settings >
incremental number (for example, armidtierN.log). Maximum Log
File Size.
Default value: 10240 KB
arsystem.log_format BMC Remedy Mid Tier log output, which is generated No Mid Tier
using the standard Java 1.5 logging API, including Configuration
Simple and XML formatting. Tool > Log
Settings >
Valid values: Log Format.
arsystem.log_filepath Directory in which the BMC Remedy Mid Tier log files No Mid Tier
are stored. To change the log directory, enter the Configuration
absolute (complete) path for the new directory. Tool > Log
Settings >
Note: You cannot change the log file name. Log Directory.
Default value: C:\Program Files\BMC
Software\ARSystem\midtier\logs
arsystem.log_level log settings Level of detail for logging information for BMC Remedy No Mid Tier
Mid Tier. Configuration
Tool > Log
Valid values: Settings >
Log Level.
Fine — The highest level of detail, including the
client's IP address
Note: You can see the pre-load start and end timestamp
when you set the log level to Info or Warning.
Irrespective of the logging level, mid tier logs the pre-
load start and end time.
arsystem.log_viewer log settings Method by which you want to view the BMC Remedy No Mid Tier
Mid Tier log files. Configuration
Tool > Log
Valid values: Settings >
Log Viewer.
Console — The log entries are directed to the
stderr (System.err) of your servlet engine.
File — (Default) Data is saved to a file in the
specified log directory.
arsystem.objectlist Flag that indicates whether the object list is enabled on No Mid Tier
BMC Remedy Mid Tier. Configuration
Tool >
Valid values: General
Settings >
true (Default)
Enable object
false
list.
Note: When set to true, ensure that the corresponding
form to display object the list is imported on the AR
System server.
arsystem.preference_servers_list Indication that preloading of the forms has been No Mid Tier
enabled for this AR System server. Configuration
Tool >
Valid values: General
Settings >
true
Preference
false (Default)
Servers.
(See
Configuring
the General
Settings page
(see page 464
).)
Connection
Pool Settings
> Maximum
Connections
per Server.
arsystem.session_timeout Number of minutes for which the current logon session No Mid Tier
remains inactive. When the time exceeds the arsystem. Configuration
session_timeout value without any activity in an Tool >
application on the BMC Remedy Mid Tier, you must log General
on again. Settings >
Default value: 90 minutes Session
Timeout.
(See
Configuring
the General
Settings page
(see page 464
).)
arsystem.log_user User name for which statements are logged. No Mid Tier
After you enter the user name and save changes, a new Configuration
log file is started. For log messages displayed on the Tool > Log
screen, the filter applies only to new entries. Older Settings >
entries that existed before the user name was changed Filter Log by
will still be displayed on the screen, up to the limit set in User Name.
the View Logs setting.
If the field is left blank, all logs related to the current
session are stored, regardless of who is logged in. You
can enter only enter one name in this field.
ASJ-Thread-Count 2 (see page 1166) Specifies the total number of worker threads that No AR System
(Component name: com.bmc.arsys. process various approval requests. Configuration
approval) Generic UI
form.
Authentication-Chaining-Mode Mode that enables the administrator to use more than No AR System
one type of authentication on the same system. Configuration
Generic UI
Valid values: form.
Auth-Token-Signature-Salt1 Name of a plugin used by the BMC Remedy AR System Yes AR System
server to confirm the user password information from Configuration
the BMC Atrium Single Sign-On server. Generic UI
form.
1. Options you can view (but not set) using the AR System Administration:Server Information form.
2. Options you cannot set or view using the AR System Administration:Server Information form.
Note
BMC recommends that you use the AR System Configuration Generic UI form to modify
the configuration settings. Do not use the ar.cfg file to modify the configuration settings on
the AR System Configuration Generic UI form.
The following table lists the settings available for centralized configuration.
Tip
If you cannot view all the columns, click Full screen in the upper-right corner
of the page to open it in full screen mode. Alternatively, use the scroll bar at the
bottom of the table.
Press F to view the table in full screen mode. Press Esc to exit full screen mode.
To easily search for a specific parameter in the table, select the parameter from
the Setting list. Alternatively, type the name of the parameter in the Setting text box.
For example, to search for the Next-ID-Block-Size parameter, select it from the
Setting list, or type the parameter name in the Setting text box.
To search for the parameters which have a specific text string in the description,
type the string in the Description text box.
For example, to search for the parameters which have Configuration in the
description, type Configuration in the Description text box.
configuration
(See Setting
administrative
options (see
page 321).)
configuration
Cancel-Query-Option 2 (see page Flag indicating whether the cancel query functionality in a No AR System
1166) browser is enabled. Configuration
Generic UI
Valid values: form.
0 — Inactive
1 — (Default) Active
Changed-By-Another-Check Flag indicating whether the system checks whether another No AR System
user changed an entry after you retrieved the entry. If you Configuration
try to save modifications to an entry, you receive a warning Generic UI
and must confirm the save. form
Valid values:
(See Setting
performance
and security
options (see
page 314).)
Clustered-Index Flag indicating whether indexes for the database are No AR System
clustered. Configuration
Generic UI
Valid values:
form
You must set this option before you start the BMC
Remedy AR System server.
com.bmc.arsys.emaildaemon. Specifies the log level for email engine based on which the No AR System
level 2 (see page 1166) logs are generated in the email.log file Configuration
Generic UI
Valid values: form
configuration
Off
(Component name: com.bmc. Severe (Default)
arsys.emaildaemon) Warning
Info
Config
Fine
Finer
Finest
com.bmc.arsys.emaildaemon. Specifies the log level for email engine based on which the No AR System
ARSystemHandler.level 2 (see logs are saved in the AR System Email Error Logs form Configuration
page 1166) Generic UI
Valid values: form
(Component name: com.bmc.
Off (Default)
arsys.emaildaemon)
Severe
Warning
Info
Config
Fine
Finer
Finest
com.bmc.arsys.emaildaemon. Specifies the maximum size of the log file in bytes No AR System
logfilesize Configuration
If the file size exceeds this limit, a new file is created. Generic UI
(Component name: com.bmc. form
Default value: Unlimited
arsys.emaildaemon)
No
configuration
com.bmc.arsys.emaildaemon. Specifies the date and time format that the BMC Remedy AR System
2 (see page 1166) Email Engine uses for parsing date and time strings given in Configuration
ARDATE
the incoming mails. MMMMM dd, yyyy HH:mm:ss z is Generic UI
(Component name: com.bmc. equivalent to December 21, 2009 12:08:56 PDT. form
arsys.emaildaemon)
Related functionality: Incoming
com.bmc.arsys.emaildaemon. Specifies the date format that BMC Remedy Email Engine No AR System
ARDATEONLY 2 (see page 1166) uses for parsing date strings given in incoming mails. Configuration
MMMMM dd, yyyy is equivalent to December 21, 2009. Generic UI
(Component name: com.bmc. form
arsys.emaildaemon) Default value: X-Loop-Detect
com.bmc.arsys.emaildaemon. This setting lets you specify the time format used by BMC No AR System
ARTIMEONLY 2 (see page 1166) Remedy Email Engine Configuration
for parsing time strings given in incoming mails. HH:mm:ss z Generic UI
(Component name: com.bmc. is equivalent to 12:08:56 PDT. form
arsys.emaildaemon)
Default value: X-Loop-Detect
com.bmc.arsys.emaildaemon. This setting indicates whether to send the charset property No AR System
ContentTypeWithCharset 2 (see in the Content-Type header of an outgoing message. If you Configuration
page 1166) do not want the charset string to be present in the Content- Generic UI
Type header, set this property to False. form
(Component name: com.bmc.
arsys.emaildaemon) Valid values:
True (Default)
False
com.bmc.arsys.emaildaemon. Specifies the number of entries to return when the BMC No AR System
ChunkSize 2 (see page 1166) Remedy Email Engine makes a call to the AR System Configuration
server. Generic UI
(Component name: com.bmc. form
arsys.emaildaemon) Default value: 100
configuration
(Component name: com.bmc. protocol). For example, if names are stored on the mail
arsys.emaildaemon) server as:
Smith, John and
Cho, Rick
You would need to use semicolons to separate the
addresses:
Smith, John; Cho, Rick
Valid values:
True (Default)
False
com.bmc.arsys.emaildaemon. Specifies the amount of time in milliseconds for which the No AR System
Exchange-Wait-Time 2 (see page BMC Remedy Email Engine waits before processing the Configuration
1166) nextincomingmessage,when there are more messages Generic UI
residing on the Exchange Server. form
(Component name: com.bmc.
arsys.emaildaemon) Default value: 1
com.bmc.arsys.emaildaemon. Specifies whether to fetch the user and group information No AR System
FetchUserGroupInfoOnDemand about demand as opposed to loading all users and groups Configuration
2 (see page 1166) at startup. If there are many users or groups, you might Generic UI
want to set this property to true to reduce the startup time form
(Component name: com.bmc. for email.
arsys.emaildaemon)
Valid values:
True
False (Default)
configuration
Valid values:
True (Default)
False
Valid values:
True
False (Default)
com.bmc.arsys.emaildaemon. Specifies the default number of email messages the email No AR System
IncomingConnectionRecycleSize engine receives before the connection is closed and Configuration
2 (see page 1166) reopened. In the 5.1 and 5.1.1 releases of the email engine, Generic UI
the connection with the mail server was closed only after form
(Component name: com.bmc. reading all incoming messages. Consequently, if the email
arsys.emaildaemon)
configuration
com.bmc.arsys.emaildaemon. Specifies the message queue size (number of emails). The No AR System
IncomingMessagesQueueSize 2 Receiver module Configuration
(see page 1166) writes messages to the queue, and the Execution module Generic UI
reads messages from this queue to parse and execute. The form
(Component name: com.bmc. Receiver module still writes messages to the server in AR
arsys.emaildaemon) System EmailMessagesform, but the Execution module
reads the message from the message queue instead of from
the server. This reduces the traffic to the AR System server
and improves the performance.
Default value: 20
com.bmc.arsys.emaildaemon. If you run multiple instances of the email engine on a single No AR System
Mailboxes 2 (see page 1166) server, this property specifies which mailboxes should the Configuration
email engine process. The value of this property should Generic UI
(Component name: com.bmc. contain comma-separated mailbox names; the email engine form
arsys.emaildaemon) only processes these mailboxes. If you do not specify a
value, the email engine processes all of the mailboxes
configured for the server.
No
configuration
Valid values:
True (Default)
False
com.bmc.arsys.emaildaemon. Specifies the attachment types that you want to permit in an No AR System
MaxAttachSize and com.bmc. email message and the maximum size of each attachment. Configuration
arsys. emaildaemon. MaxAttachSize specifies the maximum size limit for Generic UI
MaxAttachSizeFileExtensions 2 attachments, whereas MaxAttachSizeFileExtensions form
(see page 1166) specifies the file types by
using comma-separated extensions. These properties must
(Component name: com.bmc. be used together to impose limits on email attachments of
arsys.emaildaemon) specific file types. For example, to set the maximum size of .
doc, .pdf, and .xls attachments to 1000000 bytes (1 MB),
use the following syntax: com.bmc.arsys.emaildaemon.
MaxAttachSize=1000000 com.bmc.arsys.emaildaemon.
MaxAttachSizeFileExtensions=doc,pdf,xls The size limit is
not imposed on files whose extensions are not specified by
using MaxAttachSizeFileExtensions. Email messages with
attachments that exceed this limit are logged to the AR
System Email Error Logs form. Optionally, you
cancreateworkflow for this form to process such messages
separately.
Valid values:
True
False (Default)
com.bmc.arsys.emaildaemon. The email engine interprets the value of this property as No AR System
MBOXFromLineWith-At-The- follows: Configuration
Rate-Sign 2 (see page 1166) Generic UI
true — BMC Remedy Email Engine fetches only form
(Component name: com.bmc. those messages that contain the @ sign in the "from
arsys.emaildaemon) line" (from address).
false — BMC Remedy Email Engine fetches all the
messages.
Valid values:
configuration
True
False (Default)
com.bmc.arsys.emaildaemon. Specifies the interval in minutes between checks to see if all No AR System
Monitor 2 (see page 1166) the threads are functioning properly. Configuration
Generic UI
(Component name: com.bmc. Note: If the monitoring system detects that a thread has
form
arsys.emaildaemon) failed, it restarts the thread.
com.bmc.arsys.emaildaemon. Specifies the number of sender threads that the email No AR System
NumberOfSenderThreads 2 (see daemon uses for each outgoing mailbox. The optimum Configuration
page 1166) number of threads depends on many factors including the Generic UI
number of mailboxes, the hardware configuration, and so form
(Component name: com.bmc. on.
arsys.emaildaemon)
Valid values: 1 through 20
Default value: 4
Valid values:
True
False (Default)
configuration
True (Default)
False
Default value: 20
Valid values:
True
False (Default)
configuration
Valid values:
True
False (Default)
configuration
(Component name: com.bmc. False (Default) — The bulk API logging mode is
arsys.emaildaemon) used.
Default value: 20
com.bmc.arsys.emaildaemon. Specifies whether an <a href> tag is placed around a URL in No AR System
2 (see page 1166) an HTML message. If the setting is true, the <a href> tag is Configuration
URLWithHrefTag
used. If the setting is false, the URL is not enclosed in an <a Generic UI
(Component name: com.bmc. href> tag. form
arsys.emaildaemon)
Valid values:
True (Default)
False
com.bmc.arsys.emaildaemon. Specifies whether to retain display names that do not have No AR System
UseNameIfNoEmailAddress 2 email addresses associated with them in the To, CC, or BCC Configuration
(see page 1166) fields. If the setting is true, the display names are not Generic UI
removed from the To, CC, or BCC fields. If the setting is form
(Component name: com.bmc. false, the display names are removed from the To, CC, or
arsys.emaildaemon) BCC fields.
Valid values:
configuration
True (Default)
False
com.bmc.arsys.emaildaemon. Specifies the number of users (records from the User form) No AR System
UserChunkSize 2 (see page 1166) to retrieve Configuration
from the AR System server at one time. This setting can be Generic UI
(Component name: com.bmc. used to tune the form
arsys.emaildaemon) email engine's performance.
ConfigFileCheckInterval Interval (in seconds) after which the BMC Remedy No AR System
Flashboard server checks for the changes to the server.conf Administration
(Component name: com.bmc. file. Console >
arsys.flashboardServer ) System >
Default value: 60 seconds General >
Flashboard
Server
Configuration
> Config File
Check Interval
.
(See AR
System
Administration
- Flashboard
configuration
Server
Configuration
(see page 673
).)
Db-Case-Insensitive 1 (see page Flag indicating whether to perform case-insensitive queries No AR System
1197) on Run If qualifications for active links, filters, and Configuration
escalations. (For Oracle databases, ensure that this option Generic UI
matches the behavior of your Oracle database so that all form
queries are consistent.)
Valid values:
configuration
configuration
Db-Character-Set 2 (see page 1166) Option that initializes an internal variable that the server No AR System
uses for various purposes, such as informing the Configuration
(Component name: com.bmc. ARGetServerInfo function's Generic UI
arsys.server) AR_SERVER_INFO_DB_CHAR_SET server option request form
or adjusting the database short column size so that the
number of characters in a datum does not exceed the
number of bytes in the database field. Valid values:
Db-Connection-Retries 2 (see Number of times the BMC Remedy AR System server tries No AR System
page 1166) to reestablish a lost connection to the database. The default Configuration
is 100. The server retries the connection once every 15 Generic UI
seconds up to the specified number of times. For example, form
when this option is set to 100, the server retries the
connection once every 15 seconds for a duration of 25
minutes.
Db-Max-Attach-Size 2 (see page Maximum size (in bytes) of compressed attachments that No AR System
1166) the AR System server can retrieve from Oracle databases. Configuration
The default value is 2 GB. This value is limited by your Generic UI
server operating system and configuration. form
Db-Max-Text-Size (Oracle, Microsoft SQL Server) Maximum size for long No AR System
character text data in databases. For Oracle databases, this Configuration
2 (see page 1166)
value is also used for memory allocation during the Generic UI
processing of long text data; therefore, use it conservatively. form
The default for an Oracle database is 4,194,308 bytes. For
SQL Server, the default is 2,147,483,647 bytes. The
maximum value for either database is 2,147,483,647 bytes.
Db-name 1 (see page 1197) For Oracle, the name of the tablespace that the AR System No AR System
server uses. For all other supported databases, the name of Configuration
(Component name: com.bmc. the underlying SQL database. The default value is Generic UI
arsys.server) ARSystem. form
configuration
Db-Type 1 (see page 1197) The type of database the AR System server is connecting No AR System
to. Configuration
(Component name: com.bmc. Generic UI
arsys.server) Valid values:
form
Db-user 1 (see page 1197) (Microsoft SQL Server, Oracle) User namethatAR System No AR System
uses to access the underlying database. The default is Configuration
(Component name: com.bmc. ARAdmin. Generic UI
arsys.server) form
Debug-GroupId Name of the group to which a user must belong to use No AR System
logging options such as API, database, and filter logging in Configuration
BMC Remedy AR System clients. Logging options are Generic UI
disabled for users who are not members of the specified form
group. The group name can be Public, Administrator,Sub
Administrator, or Browser. You can also set this option in
the Client-Side Logging Group field on the Log Files tab.
configuration
Default-messaging-port Specifies port for JMS (Java Messaging Service) used by No System >
Java server for asynchronous communication within server General >
or server group. Server
Information >
Default value: 61617 Ports and
Queues >
Message
Broker Port.
(See Setting
ports and
RPC numbers
(see page 303
).)
Default-Order-By 2 (see page 1166) Flag indicating whether to apply the default sort order to No AR System
search results. Configuration
Generic UI
Valid values: form
configuration
Default-Web-Path URL to the directory path for the default web server pointing No AR System
to the BMC Remedy AR System server. Administration
Console >
System >
General >
Server
Information >
Advanced >
Default Web
Path.
(See Setting
performance
and security
options (see
page 314).)
(See Setting
administrative
options (see
page 321).)
Dev-Studio-Development-Mode Indicates whether you can use BMC Remedy Developer No AR System
Studio in the Best Practice Mode, Base Mode or both. Configuration
Generic UI
Valid values: form
configuration
If the Server Groups check box is selected, this option is Information >
ignored. Configuration
Server groups can be configured in the BMC Remedy AR > Disable
System Server Group Operation Ranking form to make sure Admin
that only one server performs the operation. See Operations.
Configuring server groups (see page 375).
(See Setting
administrative
options (see
page 321).)
F — Enabled (Default)
T — Disabled
Disable-Alerts Flag indicating whether alerts are sent when alert events No AR System
are created. Administration
Console >
Valid values: System >
General >
T — No threads are started in the alert queue, and no
Server
alerts are sent.
Information >
F — (Default) Alerts are enabled.
Configuration
> Disable
Changes to this setting do not take effect until the
Alerts.
server is restarted.
configuration
(See Setting
administrative
options (see
page 321).)
Disable-Archive-Global Switch that disables (T ) or enables (F - default) the archive Yes AR System
when the server starts. Configuration
Generic UI
In a server group environment: form
configuration
(See Setting
administrative
options (see
page 321).)
configuration
configuration
Information >
If the Server Group Member check box is selected, this Configuration
option is ignored. Server groups can be configured in the > Disable
BMC Remedy AR System Server Group Operation Ranking Escalations.
form to make sure that only one server performs the
operation. See Configuring server groups (see page 375). (See Setting
administrative
options (see
page 321).)
Disable-Hierarchical-Groups This parameter controls whether the hierarchical group Yes AR System
computation is performed or not. For more information see, Configuration
Controlling access to requests for hierarchical groups (see Generic UI
page 1292). form
Valid values:
Disable-New-RLS- This parameter improves the performance of SQL queries Yes AR System
Implementation for applying row level security. Configuration
Generic UI
Valid values: form
configuration
configuration
Distrib-Log-File Full path name of the file to use if DSO server logging is on No AR System
(see Debug-mode (see page 1183)). Configuration
Generic UI
form
Domain-Name 2 (see page 1166) New domain name portion of the fully qualified server name. No AR System
By default, a server determines the domain name from the Configuration
network interface. In rare cases, this method does not Generic UI
produce the desired result because of unexpected network form
card configurations. In those cases, you can use this option
to override the domain name derived from the network
interface.
(See AR
System
Administration
- Server
Information
form - DSO
tab (see page
576).)
configuration
(See AR
System
Administration
- Server
Information
form - DSO
tab (see page
576).)
DSO-Host-Name 2 Name to use for the From (source) server in distributed No AR System
mappings. This setting enables you to use an alias for the Configuration
(Component name: com.bmc. From server in distributed operations. Generic UI
arsys.server) form
DSO-Local-RPC-Socket RPC program number that DSO uses. This setting is No AR System
optional. Administration
(Component name: com.bmc. Console >
arsys.server) System >
General >
Server
Information >
DSO > DSO
Local RPC
Program
Number.
(See Setting
server
passwords,
RPC options,
and plug-in
timeouts (see
page 318).)
DSO-Log-Level Level of logging for all DSO logs (ardist.log, ardist.log.default No AR System
, ardist. poolName.log, and ardist.log. poolName ): Configuration
(Component name: com.bmc. Generic UI
arsys.server) 0 — Logs only errors. Includes contextual form
information.
1 — Logs errors and warnings. Includes contextual
information.
2 — Logs errors, warnings, and other information to
provide a step-by-step record of DSO activities.
DSO-Log-Max-Backup-Index 2 Number of indexed backup files saved for each DSO Java No AR System
log file. If you do not specify a value for this option, 5 Configuration
(Component name: com.bmc. indexed backups are saved for each DSO Java log file. Generic UI
arsys.server) form
configuration
DSO-Main-Thread-Polling- Interval at which the DSO server queries the distributed No AR System
Interval pending queue for pending distributed items. Enter any Administration
integer from 0 (no polling) to 3600 seconds (1 hour). Console >
(Component name: com.bmc. System >
arsys.server) General >
Server
Information >
DSO > Polling
Interval.
(See AR
System
Administration
- Server
Information
form - DSO
tab (see page
576).)
DSO-Mark-Pending-Retry-Flag Flag indicating whether to set the status of items in the DSO No AR System
distributed pending queue to Retry after an attempt to Administration
(Component name: com.bmc.
perform the associated operation fails. (Failure must be due Console >
arsys.server) to a recoverable error. Items that fail because of System >
nonrecoverable errors are removed from the queue.) General >
Server
Valid values:
Information >
DSO > Mark
T — (Default) Does not set the status to Retry.
Pending Retry
Instead, the status remains set to New. Depending
.
on the number of pending items that the DSO server
processes, this setting might improve the server's (See AR
performance. System
F — Sets the status to Retry. Use this to differentiate Administration
items in the queue that have never been processed - Server
(status = New) from items that were processed but Information
failed because of recoverable errors (status = Retry). form - DSO
tab (see page
Note: Regardless of this option's value, the pending 576).)
item is retried based on its retry configuration.
(See AR
System
Administration
configuration
- Server
Information
form - DSO
tab (see page
576).)
DSO-Merge-DupID-Overwrite 2 The way the DSO server behaves when it finds a duplicate No AR System
(see page 1166) request ID on the target server. Valid values: Configuration
Generic UI
(Component name: com.bmc. T — Updates mapped fields and sets unmapped form
arsys.server) fields to NULL.
F — (Default) Updates only the mapped fields on the
target request.
DSO-Placeholder-Mode Mode that disables the DSO server installed on the same No AR System
host as the AR System server. Use this when setting up a Administration
(Component name: com.bmc. DSO server outside a firewall to support an AR System Console >
arsys.server) server running behind a firewall. Server
Information
form > DSO
tab >
Placeholder
Mode.
(See AR
System
Administration
- Server
Information
form - DSO
tab (see page
576).)
DSO-Polling-Interval Interval (in seconds) at which the DSO server checks the No AR System
distributed pending queue for pending distributed items. Administration
(Component name: com.bmc. This is used as a backup when no signals are received from Console >
arsys.server) workflow. The value can be any integer between 15 and System >
7200. By default, the backup polling interval is disabled. General >
Server
Information >
DSO > Polling
Interval.
(See AR
System
Administration
- Server
Information
form - DSO
tab (see page
576).)
DSO-Source-Server The AR System server for a DSO server to support when No AR System
that AR System server is different from the one installed Administration
with the DSO server. Use this when setting up a DSO server Console >
configuration
(See AR
System
Administration
- Server
Information
form - DSO
tab (see page
576).)
DSO-Supress-No-Such-Entry- Flag indicating whether to log AR System server error 302 No AR System
For-Delete (entry does not exist in database) in the arerror.log file when Administration
performing distributed delete operations. Console >
(Component name: com.bmc. System >
arsys.server) Valid values:
General >
Server
T — Do not log ARERR 302 during distributed
Information >
deletes.
DSO >
F — (Default) Log ARERR 302 during distributed
Suppress No
deletes except when the DSO-Error-Retry-Option is
Such Entry
set to 2 (retry after every error).
Error for
Distributed
Note: When this option is set to T, errors caused by
Delete.
valid problems might also be omitted from the log.
(See AR
System
Administration
- Server
Information
form - DSO
tab (see page
576).)
DSO-Target-Connection Information for the target BMC Remedy AR System server. No AR System
Use this format:DSO-Target-Connection:serverName: Administration
(Component name: com.bmc. RPCNumber portNumber Console >
arsys.server) System >
General >
Server
Information >
Connection
Settings >
DSO Server >
Target
connection
settings tables
.
configuration
(See Setting
server
passwords,
RPC options,
and plug-in
timeouts.)
DSO-Timeout-Normal Timeout (in seconds) that the DSO server applies during No AR System
communication with the AR System server. Enter an integer Configuration
(Component name: com.bmc. between 60 (1 minute) and 21600 (6 hours). If no value is Generic UI
arsys.server) specified, the system uses the default timeout (120 form
seconds).
1. Options you can view (but not set) using the AR System Administration: Server Information form.
2. Options you cannot set or view using the AR System Administration: Server Information form.
Note
BMC recommends that you use the AR System Configuration Generic UI form to modify
the configuration settings. Do not use the ar.cfg file to modify the configuration settings on
the AR System Configuration Generic UI form.
The following table lists the settings available for centralized configuration.
Tip
If you cannot view all the columns, click Full screen in the upper-right corner
of the page to open it in full screen mode. Alternatively, use the scroll bar at the
bottom of the table.
Press F to view the table in full screen mode. Press Esc to exit full screen mode.
To easily search for a specific parameter in the table, select the parameter from
the Setting list. Alternatively, type the name of the parameter in the Setting text
box. For example, to search for the Next-ID-Block-Size parameter, select it from
the Setting list, or type the parameter name in the Setting text box.
To search for the parameters which have a specific text string in the description,
type the string in the Description text box. For example, to search for the
parameters which have Configuration in the description, type Configuration in the
Description text box.
Email-Notify-From Sender name to use for filter-generated email notifications in which no No AR System
2 (see page 1213) subject is specified. The value is limited to 29 characters. Configuration
Generic UI
Check out a video on using CCS for Email Engine here - https://youtu.be form
/EX1IuC1Wr6g
Email-Timeout 2 Maximum time that arserverd waits for a return value from sendmail. This No AR System
(see page 1213) option was valid in AR System versions 4.5.1 through 5.0.1 but became Configuration
obsolete when the Email Engine was introduced in version 5.1.0. Generic UI
form
Enable-Unlimited- Flag indicating whether log files display complete lines into log files or not. No AR System
Log-Line-Length Values are: Configuration
Generic UI
T — AR System server logs complete lines into log files without form
truncation.
F — (Default) AR System server logs only 255 characters per line.
Encrypt-Data- Integer indicating the encryption algorithm of the data key. Use the No AR System
Encryption- following values.Standard Security Configuration
Algorithm Generic UI
1 — 56-bit DES using CBC mode (default) form
Performance Security
2 — 128-bit RC4 key (default)
6 — 128-bit AES CBC key (FIPS noncompliant)
8 — 128-bit AES CBC key (FIPS compliant)
Premium Security
Encrypt-Public- Integer indicating the encryption algorithm of the public key. Values are No AR System
Key-Algorithm Configuration
4 — 512-bit RSA key (default for Standard Security) Generic UI
5 — 1024-bit RSA key (default for Performance Security) form
6 — 2048-bit RSA key (default for Premium Security)
Encrypt-Public- Integer specifying the life span (in seconds) of the public key. At the end No AR System
Key-Expire of the specified time, the key expires, and the server generates a new Configuration
key. The default is 86400 seconds (24 hours). Generic UI
form
Encrypt-Session- Size of the hash table that holds the encrypted session information. The No AR System
2 (see default is 509; there is no maximum. Configuration
Hash-Entries
page 1213) Generic UI
form
Encrypt-Symmetric- Integer specifying the life span (in seconds) of the data key. At the end of No AR System
Data-Key-Expire the specified time, the key expires, and a new key exchange occurs. The Configuration
default is 2700 seconds (45 minutes). Generic UI
form
Errors-Triggering- The error codes separated by semicolon, which will automatically dump Yes AR System
AlwaysOnLog- the Always On Logging buffer, if the specified error codes occur during Administration
Dump the execution. Console >
System >
General >
Server
Information >
Always On
Logging >
Errors
Triggering Log
. (See Setting
Always On
logging (see
page 371).)
Escalation-Log-File Full path name of the file to use if escalation logging is on (see Debug- No AR System
mode (see page 1183)). Configuration
Generic UI
form
Exception- Integer value controlling the diagnostic output when the server crashes. No AR System
Diagnostic-Option 2 Values are Configuration
(see page 1213) Generic UI
0 — AR_EXCEPTION_DIAG_ALL ; includes all diagnostic output form
when an exception occurs.
1 — AR_EXCEPTION_EXCLUDE_STACK ; excludes the stack
trace in the diagnostic output when an exception occurs.
External- Mapping of LDAP groups to BMC Remedy AR System groups for external No AR System
Authentication- authentication. The value of this option consists of one or more pairs of Configuration
Group-Mapping 2 group names separated by semicolons. For example:"LDAP-1" "ARS-1";" Generic UI
(see page 1213) LDAP-2" "ARS-2";"LDAP-3" "ARS-3" Use mapping as an alternative to form
creating an BMC Remedy AR System group corresponding to each LDAP
group. You can map each LDAP group to an BMC Remedy AR System
group (as in the example) or multiple LDAP groups to a single BMC
Remedy AR System group. If you try to map a single LDAP group to
multiple BMC Remedy AR System groups, only the first mapping
expression is valid. This option can be used with the External-
Authentication-Ignore-Excess-Groups option.
External- Flag used by AR System during external authentication. Values are No AR System
Authentication- Configuration
Ignore-Excess- 0 — (Default) Users are authenticated when a match exists Generic UI
between every LDAP group to which a user belongs and a
Groups 2 (see page form
1213) corresponding group in AR System.
1 — Users are authenticated when any single LDAP group to which
a user belongs matches a group in BMC Remedy AR System.
Excess LDAP groups are ignored.
External- Bit mask that specifies the return data capabilities for the current AREA No AR System
Authentication- plug-in. This option does not control the AREA plug-in; it merely describes Configuration
Return-Data- the behavior of the plug-in, enabling server optimization. Values are Generic UI
Capabilities 2 (see form
page 1213) 0 — (Default) The server tries to retrieve this information from
AREA.
Bit 1 (value = 1 ) — No email address is provided.
Bit 2 (value = 2 ) — No notify mechanism is provided.
Bit 3 (value = 4 ) — No group identifiers are provided.
7--The server potentially can reduce the number of AREA related
calls during notification processing.
Bit 4 (value = 8 ) — No license information is provided.
Bit 5 (value = 16 ) — No notification user validation should occur.
This enables the server to avoid using AREA for notification user
validation and information retrieval. Use this setting for sites using
a form of AREA that applies user names as email addresses and
where accessing an authentication database provides no benefit.
External- RPC socket number on which an external authentication server awaits No AR System
Authentication- requests for authentication. The default value is 0 (external authentication Configuration
RPC-Socket is not used). The RPC program number for the plug-in server is 390695. Generic UI
form
External- RPC timeout (in seconds) used when calling the authentication (AREA) No AR System
Authentication- server. The default value is 40 seconds. Configuration
RPC-Timeout Generic UI
form
External- Internal timeout (in seconds) that the BMC Remedy AR System server No AR System
Authentication- uses to invoke the external authentication server's Configuration
Sync-Timeout AREANeedToSyncCallback() function periodically. This function instructs Generic UI
the BMC Remedy AR System server to renew its internally stored user form
information in case the source used to authenticate users is changed. A
value of 0 means that the BMC Remedy AR System server does not
invoke the call to the AREA server. The default value is 300 seconds.
Filter-Api-Timeout Time limit (in seconds) for the Filter API RPC to respond to the server's No AR System
request before an error is returned. The minimum value is 1. The Configuration
maximum is 300. The default is 40. Generic UI
form
Filter-Log-File Full path name of the file to use if filter logging is on (see Debug-mode No AR System
(see page 1183)). Configuration
Generic UI
form
Filter-Max-Stack Maximum number of recursion levels allowed for an operation. The data No AR System
modification performed by an AR_FILTER_ACTION_FIELDP filter action Configuration
might trigger a second set, or level, of filters, one of which might trigger a Generic UI
third level of filters and so on. This option limits the number of times such form
recursion can happen, preventing the server crash that would occur if the
recursion continued indefinitely. The default value is 25.
Filter-Max-Total Maximum number of filters that the server executes for a given operation. No AR System
The default value is 10000. Configuration
Generic UI
form
Flush-Log-Lines Flag indicating whether logged lines are buffered or written directly to disc. No AR System
Values are: Configuration
Generic UI
T — (Default) Logged lines are written to disc. form
F — Logged lines are buffered.
Full-Text-Case- Flag indicating whether full text searching is case sensitive or case No AR System
Option insensitive. This setting affects all fields indexed for full text search and Configuration
affects how the indexes are built. Therefore, changes to this setting trigger Generic UI
an automatic re-index. Values are form
Full-Text- Location in the file system where search engine index files are stored. No AR System
Collection-Directory Configuration
1 (see page 1213) Generic UI
form
(Component
name: com.bmc.
arsys.server)
Full-Text- Location in the file system where search engine configuration files are No AR System
Configuration- stored. Configuration
Directory Generic UI
Note: If you change the directory in this option, update the form
(Component pluginsvr_config.xml file with the correct directory path. This file is in
name: com.bmc. ARSystemInstallDir\pluginsvr\fts.
arsys.server)
Full-Text-Disable- Flag indicating whether the server processes pending indexing tasks. No AR System
Indexing Values are Configuration
Generic UI
T — Disable indexing. Pending indexing tasks are recorded for form
processing later when indexing is enabled.
F — (Default) Do not disable indexing.
Full-Text-Disable- Flag indicating whether the server uses the full text search engine for No AR System
Searching searching. Values are Configuration
Generic UI
T — Disable the full text search engine. The server uses the form
search capability of the underlying database whether or not a user
has a full text license.
F — (Default) Use the full text search engine.
Full-Text-Indexer- Full path name of the file to use if full text indexer logging is on (see No AR System
Log-File Debug-mode (see page 1183)). Configuration
Generic UI
form
Full-Text-Indexer- Number of minutes that the server waits between periodic attempts to No AR System
Recovery-Interval index entries that failed to index for an unexpected reason in a prior Configuration
attempt. The default value is 60 minutes. Generic UI
form
Full-Text-Match- The way the server modifies qualifications from the client. Values are No AR System
Option Configuration
0 — Force leading and trailing wildcards. Generic UI
1 — Ignore leading and force trailing wildcards. form
2 — Ignore leading wildcards.
3 — Remove leading and trailing wildcards.
4 — (Default) Leave query unchanged.
Full-Text-Search- The maximum number of search results returned from the search engine. No AR System
Threshold The default value is 10,000. To limit the number of search results Configuration
(because of constraints on the computer where the search engine is Generic UI
running), reduce the threshold. If you change this option, you must restart form
the BMC Remedy AR System server for the change to take effect.
Full-Text-Search- During the processing of search results, the server combines results from No AR System
Threshold-High subqueries to arrive at the final result set. If the number of rows created Configuration
during processing exceeds this value, the server returns an error Generic UI
message indicating the search is too complex. The default value is form
1,000,000.
Full-Text-Search- While processing search results, the server creates a temporary table if No AR System
Threshold-Low the number of FTS matches reaches this value. If the number of FTS Configuration
matches is under this value, the server uses the SQL IN operator for a Generic UI
query on an existing table. The default value is 200. form
GetListEntry- Flag indicating where to format the GetListEntry date. This option is used No AR System
Server-Date- mainly for backward compatibility purposes. Values are Configuration
Format 2 (see page Generic UI
1213) T — Format date on server. form
F — (Default) Format date on client.
Guest-Restricted- Flag indicating whether guest users receive a restricted read license when No AR System
Read they log in to BMC Remedy AR System. Values are Configuration
Generic UI
T form
F
GUID-Prefix 2 (see Character string used as a prefix for GUID strings generated by filters. No AR System
page 1213) Configuration
Generic UI
form
Hierarchical- This parameter specifies the number of records processed during the bulk Yes AR System
Groups-Chunk- computation of Hierarchial groups. You cannot set value less than 1000. Configuration
Size Generic UI
Default value: 1000 form
(Component
name: com.bmc.
arsys.server.
shared)
Allows you to configure compute delay (in seconds) for hierarchical Yes AR System
Hierarchical- groups. Configuration
Groups-Interval Generic UI
Default value: 300 seconds form
(Component
name: com.bmc. For details on
arsys.server. hierarchical
shared) groups
parameters,
see
Controlling
access to
requests for
hierarchical
groups (see
page 1292).
Hierarchical- Allows you to configure the number of threads that will be used for Yes AR System
Groups-Threads computation of hierarchical groups. Configuration
Generic UI
(Component Default value: 3 form
name: com.bmc.
arsys.server. For details on
shared) hierarchical
groups
parameters,
see
Controlling
access to
requests for
hierarchical
groups (see
page 1292).
Homepage-Form Path to the system wide default home page. This home page is used only No AR System
if Configuration
(Component Generic UI
name: com.bmc. The current server is designated as the server for the home page in form
arsys.server) the BMC Remedy AR System User Preference form.
Or
And
Internal-User-Info- Number of shared, linked lists that hold all user-related information. This No AR System
Hash-Lists 2 (see number must be a power of 2. The default setting is 128. The minimum Configuration
page 1213) number is 2. There is no maximum. Generic UI
form
Note: BMC Remedy AR System does not verify that this number is a
power of 2. If the number is not a power of 2, the AR System server might
behave in unexpected ways.
Internal-User- Time, in minutes, that the AR System server waits before removing No AR System
2 inactive user instances from its internal memory cache. Use this option in Configuration
Instance-Timeout
(see page 1213) an LDAP environment to reduce the frequency of checks against an Generic UI
outside authenticator (if a user's record is in server memory, the server form
does not need to check the user's password outside the system). The
default is 2 hours (120 minutes), and the minimum is 30 minutes.
Note: This value must be greater than or equal to the value of the Floating
License Timeout on the AR System Administration: Server Information
form's Timeouts tab (by default, 2 hours). If you specify a value that is less
than the Floating License Timeout, you will not receive an error. Inactive
user instances, however, will not be removed in less than the time
specified by the Floating License Timeout. If you do not set this option,
the persistence of inactive user instances is controlled by the Floating
License Timeout.
IP-Name Option used to specify that a server has multiple names. This option can No AR System
appear in the configuration file more than once. When checking workflow Configuration
and connections against itself, the server compares its server name, host Generic UI
name, IP aliases, and any names specified by this option to the name form
passed to it. If the name matches any of those names, the server
concludes that the workflow or connection is for itself. This option can be
used for servers with variable length domains or for servers on computers
with multiple internet addresses. For example, to connect to a computer
named tix as tix, tix.company.com, or tix.eng.company.com, an
administrator would create three IP-Name entries, one for each
connection name. To connect to a computer with multiple internet
addresses such as tix.company.com, tix.biggercompany.com, and tix.
evenbigger.com, an administrator would create an IP-Name entry for each
of those addresses.
Jmx-port1 Defines the JMX port number that enables administrators to connect to No System >
JVM by using Java Messaging Extensions (JMX). General >
Server
Default value: 61500 Information >
Ports and
Queues >
JMX Port.
(See Setting
ports and
RPC numbers
(see page 303
).)
License-Timeout Number of hours the BMC Remedy AR System server waits before No AR System
disconnecting inactive users. If a user is holding a floating license, the Configuration
system also frees the license. The default value is two hours. Generic UI
form
Locale-List The installed language packs. Some sample values are No AR System
Configuration
(Component en — English Generic UI
name: com.bmc. fr — French form
arsys.server) it — Italian
ja — Japanese
ko — Korean
pt_br — Brazilian Portuguese
zh_cn — Simplified Chinese
To not cache any localized system messages, use this option without any
message numbers, for example:
Localized-Messages-To-Cache:
Localized-Messages-To-Cache: 66;72;302;314
Localized-Server Flag indicating whether the server is running in localized support mode. No AR System
Values are Configuration
(Component Generic UI
name: com.bmc. T — Run in localized support mode, and use localized messages if form
arsys.server) available.
F — (Default) The server does not search for or use localized
strings.
Locked-Workflow- Mode that causes the server to record locked workflow actions in workflow No AR System
Log-Mode 2 (see logs. These actions are written as encrypted strings. Configuration
page 1213) Generic UI
form
log_backups Maximum number of backup (.bak) log files for the BMC Remedy No AR System
Flashboards server to be allowed, when the log file reaches the Maximum Administration
(Component File Size value and a new log file is created. Console >
name: com.bmc. System >
arsys. Default value: 10 General >
flashboardServer ) Flashboard
Server
Configuration
> Maximum
Backups.
(See AR
System
Administration
- Flashboard
Server
Configuration
(see page 673
).)
log_category Type of information to be stored in the BMC Remedy Flashboards server No AR System
log file. Administration
(Component Console >
name: com.bmc. Values are: System >
arsys. General >
flashboardServer ) Alarm — Alarm related logging is stored in the log file.
Flashboard
Flashboard Server — Flashboard server calls logging is stored in
Server
the log file.
Configuration
Flash Util — Flashboard server classes logging is stored in the log
> Log
file.
Category.
log_default_format Format for the BMC Remedy Flashboards sever log output when log_level No AR System
parameter for BMC Remedy Flashboards server is set to BASIC or INFO. Administration
(Component name:
The log output is generated using Java log4j pattern layout. Console >
com.bmc.arsys. Default value: <%t> <%c> <%d> <%l> <%m> %n System >
flashboardServer)
General >
For more information on log4j pattern layout, see Pattern layout. Flashboard
Server
Configuration
> Log Format.
(See AR
System
Administration
- Flashboard
Server
Configuration
(see page 673
).)
log_detail_format Format for the BMC Remedy Flashboards sever log output when log_level No AR System
parameter for BMC Remedy Flashboards server is set to DEBUG. Configuration
(Component name: Generic UI
com.bmc.arsys. Default value: <%t> <%c> <%d> <%l> <%m> %n form
flashboardServer)
For more information on log4j pattern layout, see Pattern layout.
log_filename Name of the BMC Remedy Flashboards server log file. No AR System
Administration
(Component Default value: arfbserver.log
Console >
name: com.bmc. System >
arsys. General >
flashboardServer )
Flashboard
Server
Configuration
> Log File
Name.(See
AR System
Administration
- Flashboard
Server
Configuration
(see page 673
).)
log_filepath The path for the BMC Remedy Flashboards server log file. No
log_filesize Maximum size (in kilobytes) for the BMC Remedy Flashboards server log No AR System
file. Administration
(Component
Console >
name: com.bmc. Default value: 100 KB System >
arsys.
General >
flashboardServer ) Flashboard
Server
Configuration
> Maximum
File Size.
(See AR
System
Administration
- Flashboard
Server
Configuration
(see page 673
).)
log_level The level of logging for the BMC Remedy Flashboards server. No AR System
Administration
(Component Values are: Console >
name: com.bmc. BASIC – The minimum log level which logs errors. System >
arsys. INFO – The log level which logs errors with information General >
flashboardServer ) DEBUG – The maximum log level which gives detailed log information. Flashboard
Default value: BASIC Server
Configuration
> Log Level.
(See AR
System
Administration
- Flashboard
Server
Configuration
(see page 673
).)
log_null_value The value to represent a null value in the BMC Remedy Flashboards logs. No AR System
Configuration
(Component name: Default value: - Generic UI
com.bmc.arsys.
form
flashboardServer)
log_viewer The method by which you want to view BMC Remedy Flashboards log No AR System
files. Values are: Configuration
(Component name: Generic UI
com.bmc.arsys. CONSOLE – The log entries are directed to the stderr (System.err) form
flashboardServer) of your servlet engine.
FILE – The log entries are saved to a file in the specified log
directory.
Log-DSO-Errors- Flag indicating whether to log failed pending distributed operations to the No AR System
To-Form Distributed Pending Errors form. Values are Configuration
Generic UI
T — Log errors to the form. form
F — Do not log errors to the form.
Log-File-Append Flag indicating whether to create a separate *.bak file or to append to the No AR System
existing log file. Values are Configuration
Generic UI
T — Append new log information to the existing file. form
F — (Default) Create a *.bak file.
Log-Form- Bitmask indicating the type of information to log in the common log form No AR System
Selected (AR System Log:ALL). To activate one bit, set this option to its value Configuration
(values are listed under the Debug-mode (see page 1183) option). To Generic UI
(Component activate two or more bits, add their values, and set this option to the total. form
name: com.bmc.
For example, to activate bits 1 and 3, set this option to 5 because bit 1
arsys.server) has a value of 1 and bit 3 has a value of 4. To deactivate a bit, subtract its
value from the value of this option. This option does not apply to the
following bits because information about their corresponding applications
is not logged to a form:
Log-To-Form Bitmask indicating the information to log in predefined forms (for example, No AR System
AR System Log: API and AR System Log: Filter). To activate one bit, set Configuration
this option to its value (values are listed under the Debug-mode (see page Generic UI
1183) option). To activate two or more bits, add their values, and set this form
option to the total. For example, to activate bits 1 and 3, set this option to
5 because bit 1 has a value of 1 and bit 3 has a value of 4. To deactivate
a bit, subtract its value from the value of this option. This option does not
apply to the following bits because no log form is created for their
corresponding applications:
Map-IP-Address IP address mappings that enable alerts to work through firewalls when No AR System
Network Address Translation (NAT) is on. You must set up a mapping for Configuration
2 (see page 1213)
each client computer that has access through the firewall where the client Generic UI
form
Max-AlwaysOn- The size of the memory buffer in bytes to store the logs in memory for Yes AR System
Buffer-Size always on logging feature. Administration
Console >
Default value: 5242880 bytes (5 MB) System >
General >
Server
Information >
Always On
Logging >
BufferSize.
(See Setting
Always On
logging (see
page 371).)
Max-Entries-Per- Maximum number of requests returned by a search. Because users can No AR System
Query also specify the maximum number of requests returned through Search Configuration
Preferences in the BMC Remedy AR System User Preference form, the Generic UI
(Component actual maximum is the lower of these values. The default value is no form
name: com.bmc. server-defined maximum.
arsys.server)
BMC recommends always setting a value for this parameter as
unqualified searches can yield enormous results resulting in unpredictable
system behavior.
Max-Log-File-Size Maximum size in bytes for system log files. If the maximum is reached, No AR System
the logging cycle restarts at the beginning of the file, overwriting existing Configuration
(Component information. The default value is 0 (no limit). This option does not apply to Generic UI
name: com.bmc.
the Arfork-Log-File. form
arsys.server)
Max-Log-History Maximum number of backup (.bak) log files to be allowed when the log file No AR System
reaches the Max-Log-File-Size value and a new log file is created. By Configuration
(Component default, the number of backup log files allowed is 1 and the maximum Generic UI
name: com.bmc. number of backup log files allowed is 999. form
arsys.server)
Max-Notify-Mail- Maximum number of bytes that can be in a line of a mail notification. No AR System
2 (see page Configuration
Line-Len
1213) Generic UI
form
Max-Password- No
Attempts
Maximum number of consecutive bad password retries a user can make. AR System
If this option is set to 3, the user has 3 chances to log in. If all 3 attempts Configuration
have bad passwords, the user account is marked INVALID. Values are 0 Generic UI
(which turns this feature off) and all positive integers. form
Max-Recursion- For forms that contain hierarchical data, such as manager and employee No AR System
Level relationships, the maximum number of levels in the hierarchy that a Configuration
recursive query retrieves. Values are any integer greater than 0. The Generic UI
default is 25. See ARGetListEntryWithMultiSchemaFields (see page 3714). form
Max-Vendor-Temp- Maximum number of temporary tables that can exist on an AR System No AR System
Tables server for a single vendor form. The Configuration
ARGetListEntryWithMultiSchemaFields function stores data from vendor Generic UI
data sources in these tables. By default, only one temporary table can form
exist for each vendor form. This setting applies to all vendor forms on the
server. It is overridden by the value of an individual vendor form's
Maximum Vendor Temp Tables property. Enter any integer greater than 0.
See ARGetListEntryWithMultiSchemaFields (see page 3714).
MaxWorkerThreads The maximum number of worker threads allowed for BMC Remedy AR System
Flashboards server. Configuration
(Component
Generic UI
name: com.bmc. Default value: 2 form
arsys.
flashboardServer )
MFS-Environment- Indicates the relevancy weight for the Environment field of a form in a No AR System
Field-Weight multiple-form search. The value can be any number between 0 and 2000. Configuration
Generic UI
Valid values: form
For more information, see Configuring forms for multi-form FTS (see page
1407).
MFS-Keywords- Indicates the relevancy weight for the Keywords field of a form in a No AR System
Field-Weight multiple-form search. The value can be any number between 0 and 2000. Configuration
Generic UI
Valid values: form
For more information, see Configuring forms for multi-form FTS (see page
1407).
MFS-Title-Field- Indicates the relevancy weight for the Title field of a form in a multiple- No AR System
Weight form search. The value can be any number between 0 and 2000. Configuration
Generic UI
Valid values: form
For more information, see Configuring forms for multi-form FTS (see page
1407).
Mid-Tier-Service- Password that administrators use to access the mid tier. No AR System
Password Configuration
Generic UI
(Component form
name: com.bmc.
arsys.server)
Minimum-API- Oldest API version with which the server communicates. The default value No AR System
Version is 0, which means that the server communicates with all API versions. If Configuration
the client's API version is less than the specified value, the server refuses Generic UI
to talk with the client, and the client receives a decode error. (A AR form
System client is any program that accesses the AR System server
through API calls, for example, BMC Remedy Developer Studio, plug-ins
loaded by the plug-in server, and so on.)
Minimum-CMDB- Oldest CMDB API version with which the server communicates. The No AR System
API-Version default value is 3. If the version of a CMDB call is less than the specified Configuration
value, the server refuses the call. This option is independent of the Generic UI
Minimum-API-Version option. form
MinWorkerThreads The minimum number of worker threads allowed for BMC Remedy AR System
Flashboards server. Configuration
(Component Generic UI
name: com.bmc. Default value: 2 form
arsys.
flashboardServer )
Multiple- Flag indicating whether other AR System servers can run on this server's No AR System
ARSystem-Servers host computer. Configuration
Generic UI
(Component Valid values: form
name: com.bmc.
arsys.server) T — (Default) Other servers can run on this server's host computer.
F — Other servers cannot run on this server's host computer.
To run multiple servers on the same host computer, this option must be
set to T in the configuration file of each server.
Multiple-Assign- Flag indicating whether multiple assignee groups can be stored in row- No AR System
2 (see page level security field ID 112. This enables users from multiple groups to Configuration
Groups
1213) access the same request. In the past, only one group could be stored in Generic UI
Field 112. form
Valid values:
Options you cannot set or view using the AR System Administration: Server Information form.
Note
BMC recommends that you use the AR System Configuration Generic UI form to modify
the configuration settings. Do not use the ar.cfg file to modify the configuration settings on
the AR System Configuration Generic UI form.
The following table lists the settings available for centralized configuration.
Tip
If you cannot view all the columns, click Full screen in the upper-right corner
of the page to open it in full screen mode. Alternatively, use the scroll bar at the
bottom of the table.
Press F to view the table in full screen mode. Press Esc to exit full screen mode.
To easily search for a specific parameter in the table, select the parameter from
the Setting list. Alternatively, type the name of the parameter in the Setting text
box. For example, to search for the Next-ID-Block-Size parameter, select it from
the Setting list, or type the parameter name in the Setting text box.
To search for the parameters which have a specific text string in the description,
type the string in the Description text box. For example, to search for the
parameters which have Configuration in the description, type Configuration in the
Description text box.
Next-ID-Commit 2 Flag indicating whether to perform a new commit transaction when the No AR System
(see page 1213) system generates the next ID for a record in the database. Configuration
Generic UI
Valid values: form
Next-ID-Block- Option that allocates next IDs in blocks instead of one at a time. Allocating No System >
Size in blocks increases performance during create operations. Values are any General >
positive number up to 1000. The default value is 25. (A value of 1 disables Server
the feature.) You can also disable it by removing it from the configuration Information >
file. You do not need to restart the server for the change to take effect. Configuration
This setting is always disabled on the Distributed Pending form so that > Next
DSO can operate correctly. Request ID
Block Size.
Warning: The use of this option might result in unpredictably large Next-ID
sequence gaps. The likelihood of this occurring increases with the use of (See Setting
multiple servers that share a database. The BMC Remedy AR System administrative
server does not malfunction because of this gap, and it should not be options (see
considered a defect. page 321).)
Notification-Web- Base URL that appears in email notifications. If this option is not used, the No AR System
Path Default-Web-Path option is used. (Notification-Web-Path is available Configuration
because the Default-Web-Path is specified for other applications such as Generic UI
Flashboards, and it might be different from the mid tier web path for form
opening requests in a notification.)
Num-Preload- Total number of preload segments loaded by the preload threads when No System >
Schema- preload threads are configured. See Setting the Preload Tables General >
Segments Configuration option. (see page 403) Server
Information >
(Component Advanced >
name: com.bmc. Number of
arsys.server) Preload
Segments.
(See Setting
performance
and security
options (see
page 314).)
Num-Preload- Number of preload threads to use when preload threads are configured. A No System >
Threads value of 0 indicates that preload threads are not used. The maximum General >
value is 30 or twice the number of preload segments, whichever is lower. Server
(Component
See Setting the Preload Tables Configuration option (see page 403). Information >
name: com.bmc. Advanced >
arsys.server)
Number of
Preload
Threads.
(See Setting
performance
and security
options (see
page 314).)
Num-selector- Defines the number of threads that can be used to monitor all the live No System >
threads1 client socket connections for IO activity. When the thread detects any General >
activity, it forwards the call to the appropriate queue. Server
Information >
Default value: 1 Ports and
Queues >
Number of
Selector
Threads.
(See Setting
ports and RPC
numbers (see
page 303).)
Oracle-Bulk- Number of data rows simultaneously fetched from the result set when an No AR System
Fetch-Count 2 Oracle database is queried. The minimum is 1, the maximum is 100, and Configuration
(see page 1213) the default is 50. The higher the value, the more memory is used during Generic UI
data retrieval. form
Oracle-Clob- (Oracle databases only) Flag controlling Oracle CLOB storage. No AR System
Storage-In-Row Configuration
Valid values: Generic UI
(Component form
name: com.bmc. T — CLOBs are created "in row." In-row CLOBs can degrade CPU
arsys.server) performance.
F — (Default) CLOBs are created "out row." Out-row CLOBs can
cause the database to grow rapidly.
Oracle-Cursor- Database setting that matches the setting in the Oracle initialization file ( AR System
2 (see initARS.ora if the BMC Remedy AR System database SID is ARS). No Configuration
Sharing
page 1213) Generic UI
Valid value: form
Oracle-SID 1 (see (Oracle databases only) System ID for the underlying database. No AR System
page 1213) Configuration
Generic UI
form
Oracle-Service 1 (Oracle databases only) Service Name for the underlying database. No AR System
Configuration
Generic UI
form
Overlay-mode 2 Specifies the default overlay group for the server. Clients that use the No AR System
(see page 1213) default overlay group (all clients other than Developer Studio) will retrieve Configuration
and use objects from the default group. Generic UI
form
Valid values:
See Ignoring overlay and custom objects at runtime (see page 2964).
Peer-listener-port1 Defines the port number where all the cache instances from different No System >
servers communicate with each other. General >
Server
(See Setting
ports and RPC
numbers (see
page 303).)
Plugin 2 (see page File name of one or more plug-ins that the plug-in server loads. The file No AR System
1213) name of the DLL or shared object is provided. The file name might be an Configuration
absolute file name or might be relative to the BMC Remedy AR System Generic UI
(Component installation directory. Add as many entries for this option to the server form
name: com.bmc. configuration file as needed, but specify only one file name in each option.
arsys.server)
Plugin-ARDBC- Number of threads dedicated to handling ARDBC requests from the BMC No AR System
2 Remedy AR System server. You must specify a minimum number. Configuration
Threads
Optionally, you can also specify a maximum number (the plug-in server Generic UI
increases the number of threads for a plug-in as needed up to the form
specified maximum). The syntax is
Plugin-ARDBC-Threads: <minimumNumberOfThreads
[<maximumNumberOfThreads>]
Plugin-AREA- Number of threads dedicated to handling AREA requests from the BMC No AR System
Threads 2 Remedy AR System server. You must specify a minimum number. Configuration
Optionally, you can also specify a maximum number (the plug-in server Generic UI
increases the number of threads for a plug-in as needed up to the form
specified maximum). The syntax is
Plugin-AREA-Threads: <minimumNumberOfThreads>
[<maximumNumberOfThreads>]
Plugin-Filter-API- No AR System
Threads 2 Configuration
Generic UI
form
Plugin-Filter-API-Threads: <minimumNumberOfThreads>
[maximumNumberOfThreads>]
Plugin-Log-File Full path name of the file to use if plug-in logging is on (see Debug-mode No AR System
(see page 1183)). Configuration
Generic UI
form
Plugin-Log-Level Option that specifies the type of information printed to plug-in log files. No AR System
Configuration
Valid values: Generic UI
form
10000 — No information (ARPLUGIN_OFF ).
1000 — (Default) Only severe messages (ARPLUGIN_SEVERE ).
900 — Severe and warning messages (ARPLUGIN_WARNING ).
800 — Status, severe, and warning messages (ARPLUGIN_INFO ).
700 — Configuration, status, severe, and warning messages (
ARPLUGIN_CONFIG ).
600 — Internal exceptions (ARPLUGIN_FINE ).
500 — Trace logs that log tasks as they are executed (
ARPLUGIN_FINER ).
400 — Code-level information (ARPLUGIN_FINEST ).
100 — All log information (ARPLUGIN_ALL ).
Plugin-Loopback- RPC socket number for the private server queue to which loopback plug-in No System >
RPC-Socket 2 API calls should be directed. Values are in the following ranges: General >
(see page 1213) Server
390621-390634 Information >
390636-390669 Ports and
390680-390694 Queues >
Plugin
Loopback plug-ins (such as the Report Creator plug-in) that call back into
Loopback
BMC Remedy AR System use this number to determine the queue to
RPC Program
request. By default, plug-in API calls are directed to a queue that
Number.
corresponds to the call type. To be effective, the server must be configured
to have a designated private queue for this option. (See Setting
ports and RPC
numbers (see
page 303).)
Plugin-Password No
Plug-in password. If this option is specified, the plug-in server accepts AR System
connections only from BMC Remedy AR System servers whose Server- Configuration
Plugin-Target-Password option is set to the same password. If this option Generic UI
is not specified, the plug-in server accepts connections from BMC Remedy form
AR System servers that are not configured to use a plug-in password.
Plugin-Port 2 (see The port number on which the plug-in server waits for incoming requests. No AR System
page 1213) Configuration
Generic UI
(Component form
name: com.bmc.
arsys.server)
Preference- Option that specifies whether users must use centralized preferences. No System >
Server-Option General >
Valid values:
Server
Information >
1 — Users can choose to use a preference server if one is
Advanced >
available.
Preference
2 — Users must use the specified preference server.
Server Option.
3 — Users must use a preference server, but they cannot use this
(See Setting
server as a preference server. If users choose a server that is not a
performance
preference server, a warning is returned.
and security
options (see
page 314).)
Private-RPC- RPC program number that determines the type of queue to which requests No System >
Socket are routed and the number of threads running on that queue. General >
Server
(Component Information >
name: com.bmc. Ports and
arsys.server) Queues >
Server Queue.
(See Setting
ports and RPC
numbers (see
page 303).)
Private-RPC- Option that designates debug queues. A debug queue is a type of private No AR System
Socket (for debug queue used by the BMC Remedy AR System Workflow Debugger. To Configuration
queue) make any private queue a debug queue, use this syntax:Private-RPC- Generic UI
Socket: rpcNumber Debug For example: Private-RPC-Socket: 390666 form
(Component Debug Alternatively, you can make a private queue a debug queue by
name: com.bmc.
selecting its Debug check box in the list of queues in the Ports and
arsys.server) Queues tab of the Administration Console.
Record-Object- Flag indicating whether the BMC Remedy AR System server records the No System >
Relationships relationships between workflow objects. General >
Server
Information >
(Component Note: If using a server group, all servers within the same server group Configuration
name: com.bmc. must have the same setting for this option. If they do not, the servers in the > Record
arsys.server) group inconsistently populate and un-populate the object relationship Object
database should they be the highest ranked server for the Administration Relationships.
operation when they are restarted. Only the highest ranked server for the
Administration operation in the server group will perform the required (See Setting
object relationship actions when restarted. administrative
options (see
Valid values: page 321).)
When you set this option to T and restart the server, it records the
relationships of all server objects before it accepts connections from
clients. Therefore, the first time you restart the server after selecting this
option, you cannot connect to the server with any clent for a period of time,
depending on how many objects are defined on the server. With a large
number of objects, such as with an ITSM application installed, this could
take as long as an hour depending on the performance of the database.
(Subsequent server startups are not affected by this setting.) When you
can connect, the recording of object relationship data is complete.
When you set this option to F or remove it and restart the server, all the
recorded relationships are removed from the database. You must restart
the BMC Remedy AR System server before a change to this option takes
effect.
Note: BMC recommends that you set this option by using the Record
Object Relationships option on the Configuration tab of the BMC Remedy
AR System Administration: Server Information form instead of setting it
manually in the configuration file. See Viewing and sorting related objects
(see page 2229).
Record-Server- Server events to log in the Server Events form, which makes server- No AR System
Events related changes available to workflow and API programs. Enter the Configuration
following values, separated by semicolons, for the events to record. Generic UI
form
1 — Form
2 — Field
3 — Menu
4 — Filter
5 — Import
6 — Active link
7 — Escalation
8 — View
9 — Container
10 — User
11 — Group
12 — Server setting
14 — Archive
15 — Server group actions
Register-With- Flag that prevents the BMC Remedy AR System server from registering No System >
Portmapper with a portmapper. Use this feature in conjunction with setting specific General >
ports to enable you to run servers on computers that do not have a Server
(Component portmapper. Information >
name: com.bmc.
Ports and
arsys.server) Valid values: Queues >
Register with
T — (Default) Register with portmapper.
Portmapper.
F — Do not register with portmapper.
(See Setting
No more than one server should try to register with AR System
ports and RPC
Portmapper in an environment with multiple servers on one computer.
numbers (see
page 303).)
Registry-Admin- Password of the BMC Atrium Web Services Registry admin user. Used by No AR System
Password workflow for the BMC Remedy AR System Web Services Registry form. Configuration
Generic UI
form
Registry-Admin- User name of the BMC Atrium Web Services Registry admin user. Used No AR System
User by workflow for the BMC Remedy AR System Web Services Registry form. Configuration
Generic UI
form
Registry-Location URL of the BMC Atrium Web Services Registry. Used by workflow for the No AR System
BMC Remedy AR System Web Services Registry form. Configuration
Generic UI
form
Remedy-App- Encrypted password that AR System application services such as No System >
Service-Password Approval Server use to access the BMC Remedy AR System server. General >
Server
(Component Information >
name: com.bmc.
Connection
arsys.server) Settings >
Application
Service
Password.
(See Setting
server
passwords,
RPC options,
and plug-in
timeouts (see
page 318).)
Required-Field- Character to add to the label of a field whose entry mode is Required. The No The Required
Identifier default is an asterisk. Field Identifier
field on the
Configuration
tab of the AR
(Component System
name: com.bmc. Administration:
arsys.server) Server
Information
form. (See
Setting
administrative
options (see
page 321).)
Required-Field- Position to add the character that identifies a Required field. No System >
Identifier-Location General >
Valid values:
Server
(Component Information >
name: com.bmc. 0 — Add the character to the beginning of the field label.
Configuration
arsys.server) 1 — (Default) Add the character to the end of the field label.
> Required
Field Identifier.
(See Setting
administrative
options (see
page 321).)
RMIRegistryPort Port number for the Remote Method Invocation (RMI) of the selected BMC AR System
Remedy Flashboards server. Administration
(Component Console >
name: com.bmc. System >
arsys. General >
flashboardServer) Flashboard
Server
Configuration
> RMI
Registry Port.
(See AR
System
Administration
- Flashboard
Server
Configuration
(see page 673)
.)
RPC-Non- Flag that enables BMC Remedy AR System on compliant systems to No AR System
Blocking-IO 2 (see receive remote procedure calls in a nonblocking mode. The mode prevents Configuration
page 1213) Generic UI
Remote attackers from disabling RPC services. form
Invalid or corrupt packets from temporarily disabling the arserverd
process.
Valid values:
HP
Solaris
108993-38 - Solaris 8
113319-19 - Solaris 9
IBM Does not specify a patch number. Multiple file sets might be required.
(If you do not obtain an IBM® patch, your server might crash.)
RPC-QUEUE-BY- This option specifies a private queue for a Client type. The option forces Yes System >
CLIENT-TYPE the API calls made by the Client Types to use this private queue. The General >
syntax is: RPC-QUEUE-BY-CLIENT-TYPE: Client-Type Private RPC Server
Queue. Information >
Ports and
For example: RPC-QUEUE-BY-CLIENT-TYPE: 0 390685. Queues >
Client Type to
RPC
Restriction
Mapping.
(See Setting
ports and RPC
numbers.)
Options you cannot set or view using the AR System Administration: Server Information form.
· EXACT — Use this value, if your Oracle database is set to perform case insensitive search or
case sensitive search. This is the recommended value for BMC AR System 9.0 and later.
Note
BMC recommends that you use the AR System Configuration Generic UI form to modify
the configuration settings. Do not use the ar.cfg file to modify the configuration settings on
the AR System Configuration Generic UI form.
The following table lists the settings available for centralized configuration.
Tip
If you cannot view all the columns, click Full screen in the upper-right corner
of the page to open it in full screen mode. Alternatively, use the scroll bar at the
bottom of the table.
Press F to view the table in full screen mode. Press Esc to exit full screen mode.
To easily search for a specific parameter in the table, select the parameter from
the Setting list. Alternatively, type the name of the parameter in the Setting text
box. For example, to search for the Next-ID-Block-Size parameter, select it from
the Setting list, or type the parameter name in the Setting text box.
To search for the parameters which have a specific text string in the description,
type the string in the Description text box. For example, to search for the
parameters which have Configuration in the description, type Configuration in the
Description text box.
Save-Login Flag indicating whether users must log in to client tools. This option No AR System
enables users to save a previous login of their choice. Configuration
Generic UI
Valid values: form.
SCC-Comment- Flag indicating whether a source code control integration requires you No AR System
Checkin to enter a comment at checkin. Valid values: Configuration
Generic UI
0 — (Default) No comment is required. form.
1 — A comment is required.
SCC-Comment- Flag indicating whether a source code control integration requires you No AR System
Checkout to enter a comment at checkout. Valid values: Configuration
Generic UI
0 — (Default) No comment is required. form.
1 — A comment is required.
SCC-Enabled Flag indicating whether a source code control system is being used No AR System
with BMC Remedy AR System. Configuration
Generic UI
Valid values: form.
SCC-Integration-Mode Flag indicating the level of source code control integration. No AR System
Configuration
Valid values: Generic UI
form.
0 — (Default) Advisory level.
1 — Enforced level.
SCC-Provider-Name Name of the source code control provider. For example: Visual No AR System
Source Safe. Configuration
Generic UI
form.
SCC-Target-Dir Character string for the source code control system target directory. If No AR System
none is present, this value is NULL. This string is limited to 255 Configuration
characters. Generic UI
form.
Select-Query-Hint 2 Text to use in a query hint in the WITH clause of a SELECT statement No AR System
(see page 1224) when queries are supplied to Microsoft SQL Server databases. This Configuration
option works only for queries triggered by GLE, GLEWF, and GME Generic UI
API calls. If this option is an empty string or is not present, no WITH form.
clause is generated. To determine the appropriateness of using this
feature in your environment, consult your SQL Server documentation.
This option is commonly used with a NOLOCK setting for allowing
queries to execute without being blocked by simultaneous updates,
thereby improving performance. For example, to allow SQL Server to
read data being updated and avoid blocking, use this syntax:Select-
Query-Hint: NOLOCK
ServerConnectAttempts
(Component name: Number of attempts, the BMC Remedy Flashboards server tries to AR System
com.bmc.arsys. connect to the BMC Remedy AR System server. Flashboard waits for Administration
flashboardServer ) the BMC Remedy AR System server to start up and tries to connect. Console >
If the connection fails, the flashboard keeps on retrying for the System >
connection, based on number of attempts value. General >
Flashboard
Default value: 10 Server
Configuration
> Server
Reconnect
Attempts.
(See AR
System
Administration
- Flashboard
Server
Configuration
(see page 673
).)
Server-Connect-Name New name for a server in a server group. By default, a server in a No AR System
2 (see page 1224) server group uses a fully qualified server name with domain to identify Configuration
itself. Others servers in the group use this name to communicate. To Generic UI
(Component name: change the server name, add this option to the configuration file: form.
com.bmc.arsys.server)
Server-Connect-Name: <myServerName>
Server-directory 1 (see Full path name of the AR System data directory. This directory No AR System
page 1224) contains support and log files for the AR System server. Configuration
Generic UI
(Component name: form.
com.bmc.arsys.server)
Server-Group-Email- Port number (RMIPort ) for email administration in Email Engine. If No AR System
2 (see page RMIPort is different from the default (1100 ), set this option to the Configuration
Admin-Port
1224) new, port number to enable the server to communicate email Generic UI
administration information to Email Engine during server group form.
processing. For example, in a single Email Engine configuration, use
this syntax:
Server-Group-Email-Admin-Port: 2020
If multiple Email Engines are configured for the server, each engine
must have a unique RMIPort. For a multiple Email Engine
configuration, use semicolons to separate the RMIPort numbers. For
example:
Server-Group-Email-Admin-Port: 2020;2030;2040
configuration
Server-Group-Flashboards-Admin-Port: 2021
Server-Group-Log-File Name and location of the server group trace log file. The default name No AR System
is arsrvgrp.log. For example: Server-Group-Log-File: c: Configuration
\temp\servgroup.log Generic UI
form.
Server-Group-Member Flag indicating whether the server is a member of a server group. No System >
General >
(Component name: Valid values: T and F (default). Server
com.bmc.arsys.server) Information >
Configuration
> Server
Group
Member.
(See Setting
administrative
options (see
page 321).)
Server-Name An alias that is always interpreted as the current server. This option is No AR System
used in multiple server installations to differentiate servers. If you Configuration
(Component name:
specify a value for this option, enter the value after the -h option when Generic UI
com.bmc.arsys.server) you use the arreload command-line utility. Otherwise, arreload uses form.
the default server name rather than the name specified by this option.
Do not specify a fully qualified name for this option. For example, use
alpha instead of alpha.remedy.com.
Note: If this server belongs to a server group and you use a common
server alias, you must also specify the Server-Connect-Name option.
See Server-Connect-Name (see page 1226).
Server-Plugin-Alias 2 Alias of a plug-in server. When the BMC Remedy AR System server No AR System
(see page 1224) calls a plug-in server, it must determine whether the plug-in server Configuration
name is an alias. Aliases can direct the BMC Remedy AR System Generic UI
(Component name: server to access a plug-in server running on a different host or form.
com.bmc.arsys.server) listening at a specified port number. The syntax is
Server-Plugin-Default- Number of seconds in which the plug-in server must respond to a call No AR System
Timeout before an error is returned. The minimum value is 0. The maximum is Configuration
600. Generic UI
form.
Default: 60
Server-Plugin-Target- Encrypted password used to call a plug-in server. The BMC Remedy No AR System
Password AR System server uses this password whenever it communicates with Configuration
a plug-in server running on the specified host and port. The syntax is Generic UI
{{Server-Plugin-Target-Password: <hostName>:<portNumber>: form.
<encryptedPassword>
Server-Side-Table- For server-side table fields, the number of requests (or size of the No System >
Chunk-Size chunk) that the server retrieves at one time from the database and General >
stores in memory to process during filter or filter guide actions. The Server
server then retrieves, stores, and processes the next chunk until all Information >
requests are processed. The value 0 causes the server to retrieve an Configuration
unlimited number of requests. The default is 1000 requests. > Server
Specifying a lower value causes the server to process smaller Table Field
chunks, which reduces server memory use but results in slower Chunk Size.
processing because the server must access the database many (See Setting
times, especially for large tables. Specifying a higher value causes administrative
the server to retrieve and process large chunks of data and access options (see
the database fewer times. This results in improved performance at the page 321).)
cost of increased memory use.
Server-Stats-Rec- Interval (in seconds) at which the server records server statistics. No AR System
Interval Configuration
Default: 60 seconds Generic UI
form.
Server-Stats-Rec-Mode Server statistics recording mode. This option determines what No AR System
information is recorded in the server statistics form. Configuration
Generic UI
Valid values: form.
To see the statistics, open the Server Statistics form. See Server
statistics for baseline data in BMC Remedy ITSM Deployment
documentation.
Set-Process-Timeout Number of seconds the BMC Remedy AR System server waits before No
ending a Set Fields process that did not finish. Values are 1 through
60.
SQL-Log-File Full path name of the file to use if SQL logging is on (see Debug-mode No AR System
(see page 1183)). Configuration
Generic UI
form.
SQL-Secure- (Microsoft SQL Server only) Flag indicating the type of authentication No AR System
Connection to use to connect BMC Remedy AR System to a Microsoft SQL Configuration
Server database. Generic UI
form.
Valid values:
T — Windows Authentication
F — SQL Authentication
SQL-Server-Always-On To enable the multi-subnet failover parameter for Microsoft SQL No AR System
server database failover Configuration
Generic UI
T- Set the multi-subnet failover parameter. form.
F- Disabled (Default)
SQL-Server-Set-ANSI- Option that causes the server to issue a SET ANSI_NULLS ON No AR System
Defaults 2 (see page 1224) command. Configuration
Generic UI
form.
Submitter-Mode Flag indicating whether the Submitter field can be changed and No AR System
whether the submitter of a request must have a write license to modify Configuration
it. Generic UI
form.
Valid values:
System-Logging- Bitmask that sets logging options for the operating system. No AR System
Options 2 (see page 1224) Configuration
Valid values: Generic UI
form.
System-Messages- Flag to specify whether system messages appear in the prompt bar or No AR System
Displayed a pop-up box. Configuration
Generic UI
Valid values:
form.
TCD-Specific-Port TCP port for the arserver process. If this option is not set, the No System >
dispatcher is randomly assigned to an available port. (TCD stands for General >
(Component name: transaction control daemon.) Server
com.bmc.arsys.server) Information >
Ports and
Queues >
Server TCP
/IP Port. (See
Setting ports
and RPC
numbers (see
page 303).)
Thread-Log-File Full path name of the file to use if thread logging is on (see Debug- No AR System
mode (see page 1183)). Configuration
Generic UI
form.
Track-Admin-Op- Flag indicating whether the BMC Remedy AR System server No AR System
Progress 2 (see page 1224) populates progress information (if any) during long-running Configuration
administrative operations, such as definition imports. Generic UI
form.
Valid values:
T — Track progress.
F — (Default) Do not track progress.
Two-Digit-Year-Cutoff 2 Integer that specifies the cutoff year for interpreting a two-digit year as No AR System
(see page 1224) a four-digit year. For example, if the two-digit cutoff year is 2040: Configuration
Generic UI
Two-digit years fall between 1941 and 2040. form.
1/1/55 is interpreted as 1/1/1955.
1/1/30 is interpreted as 1/1/2030.
Use-FTS-In-Workflow Controls whether the server will use full text searches when executing No System >
queries during workflow that have full text indexed fields in the General >
qualification. If this option is not used, the server will use the search Server
capability of the database. The options are T (use FTS in workflow) Information >
and F (do not use FTS in workflow). FTS > Use
FTS in
Workflow.
Use-Password-File Validation mechanism for unregistered AR System users. To set this No AR System
value, use the Authenticate Unregistered Users check box in the EA Configuration
tab of the AR System Administration: Server Information form. Generic UI
Windows Indicates whether the Windows domain service is used to form.
validate users not registered with BMC Remedy AR System.
Valid values:
Valid values:
Use-Server-Connect- Flag indicating whether the server name specified by the Server- No AR System
2 (see Connect-Name (see page 1226) option is used as the value for the Configuration
Name-In-Stats
page 1224) Server Name field when Server Statistics form entries are created. Generic UI
form.
Valid values:
User-Log-File Full path name of the file to use if user logging is on (see Debug-mode No AR System
(see page 1183)). Configuration
Generic UI
form.
VersionControl-Object- Option indicating whether the object modification log is enabled or No AR System
Modification-Log-Mode disabled. When the log is enabled, it records every change to AR Configuration
System objects in your system (see Version control in BMC Remedy Generic UI
AR System (see page 2260)). form.
Valid values:
0 — (Default) Disabled
10 — Enabled
You can also set this option by using the Object Modification Log field
on the Version Control tab in the AR System Administration: Server
Information form. See Setting version control options (see page 293).
VersionControl-Object- Option indicating whether the AR System server writes a definition file No AR System
Modification-Log-Save- each time an object is created or changed (see Version control in Configuration
Definition-Files BMC Remedy AR System (see page 2260)). This option is effective Generic UI
only when the object modification log is enabled. form.
Valid values:
You can also set this option by using the Save Definition Files field on
the Version Control tab in the AR System Administration: Server
Information form. See Setting version control options (see page 293).
Valid values:
0 — (Default) Disabled
10 — Enforced
You can also set this option by using the Object Reservation field on
the Version Control tab in the AR System Administration: Server
Information form. See Setting version control options (see page 293).
1. Options you can view (but not set) using the AR System Administration: Server Information form.
2. Options you cannot set or view using the AR System Administration: Server Information form.
For example, when you change the value of the arsystem.session_timeout setting, the AR System
server notifies BMC Remedy Mid Tier regarding the change. The mid tier, in turn, updates the
setting across all mid tiers in that cluster within 30 seconds.
Note
You can continue to change the configuration settings for the following
components by using the listed form or tool:
BMC Remedy AR System server — AR System Administration:Server
Information form (see page 285)
BMC Remedy Approval Server — AP-Admin-ServerSettings form (see page
1667)
BMC Remedy Mid Tier — Mid Tier Configuration Tool (see page 426)
You can use the AR System Administration:Plugin Server Information form (see
page 390) form to change the configuration settings for Java plug-in server.
You can use the AR System Configuration Generic UI form form for BMC Remedy
Email Engine configuration settings and any other configuration settings that are
not available in the preceding forms.
1. In a browser, open the BMC Remedy AR System Administration Console, and click System
> General > Centralized Configuration.
2. In the AR System Configuration Generic UI form, from the Component Name list, select the
component to which you want to add a setting.
3. Click Add.
4. Enter the name of the setting that you want to add and its value.
For a complete list of configuration settings, see Configuration settings (see page 1141).
5. Click Apply.
6. Click Close.
1. In a browser, open the BMC Remedy AR System Administration Console, and click System
> General > Centralized Configuration.
2. In the AR System Configuration Generic UI form, from the Component Name list, select the
appropriate component.
3. From the settings table, select the setting that you want to modify.
4. Make the required change, and click Apply.
5. Click Close.
1. In a browser, open the BMC Remedy AR System Administration Console, and click System
> General > Centralized Configuration.
2. In the AR System Configuration Generic UI form, from the Component Name list, select the
appropriate component.
3. From the settings table, select the setting that you want to disable.
4. Prefix the setting value with a hash symbol (#) to comment it out, and click Apply.
5. Click Close.
1. In a browser, open the BMC Remedy AR System Administration Console, and click System
> General > Centralized Configuration.
2. In the AR System Configuration Generic UI form, from the Component Name list, select the
appropriate component.
3. From the settings table, select the setting that you want to delete, and click Delete.
4. Click Apply and Close.
Service failover
A companion service is a process that the operating system starts (typically, when the system
starts up) or that armonitor starts. These processes communicate with the AR System server by
using the BMC Remedy AR System API to get their work and to create or change entries. In the
BMC Remedy AR System environment, companion services provide services such as the Email
Engine sending outgoing emails and handling incoming emails. You can deploy these services in a
server group, which provides resiliency if something fails. The servers in the group cooperate to
manage service failover. The server group manages when the companion services become active
to perform tasks and when they are suspended. Also, the companion services are tracked and can
fail over independently of any AR System server.
In this topic:
Companion services periodically assert their current state in the form of a heartbeat. This heartbeat
informs the AR System server of the companion service's state. When the AR System server does
not detect a companion service's heartbeat, it instructs another companion service to take over.
Note
Companion services do not have to run on the same computer as the AR System server.
Furthermore, multiple companion services can run on the same computer.
The following figure shows an example of a server group with companion services. Two companion
services (Email Engine instances) access the AR System server group through a load balancer.
The load balancer provides a single connection point, attempts to direct the load across all nodes
in the server group, and routes clients to active nodes in the server group when a node is inactive
due to a failure. Clients access the server group through the load balancer.
One companion service can perform multiple services. In this example, one Email Engine instance
can provide a service for sending outgoing emails and another service for handling incoming
emails. In such a configuration, each companion service can own, or have exclusive rights to
perform work on, any number of services. This configuration enables both companion services to
process work. (However, only one companion service can own a given service at a time.)
The companion service, in this case, would house two service providers (Email Engine instances).
The service providers' states are stored in a AR System form, and the server group manages those
states.
If the AR System detects that a companion service's heartbeat has stopped, it can instruct
another companion service to take over. Each service provider can fail over independently of the
other servers and independently of a given AR System server.
To ensure high availability in a server group environment, the email engine must point to
the load balancer or the AR server name.
AR System Service Failover Ranking — The form that you use to manage the ranking of
each service provider. You can view and change entries in this form. To change the ranking
of a service provider, see Changing the ranking of a service provider (see page 1240).
AR System Service Failover Whiteboard— A form that stores the current status of all service
providers. You can use this form’s entries to see which clients are:
Providing a service
Waiting to provide a service
Unavailable
Warning
State transitions
State Description
Suspending The service provider has been told to complete or abort any in-progress request and relinquish ownership of the
service.
Unavailable The heartbeat from the service provider is no longer being detected. (As part of a graceful shutdown, the service
provider can assert that it is no longer available.)
Within a server group, one node has an active service failover controller, which drives state
transition for the group. If the AR System server with that node goes down, another node in the
server group receives ownership of the controller. For more information about the controller, see
Service Failover Ranking Entries (see page 1239).
Original New state Changes driven by the AR Changes driven by the service provider
state System server
Active Unavailable The AR System server did not The service provider has shut down and is no longer available.
detect a heartbeat, which
indicates that the service
provider is not working or is
unavailable to take ownership of
a service.
Waiting Unavailable The AR System server did not The service provider has shut down and is no longer available.
detect a heartbeat, which
indicates that the service
provider is no longer available to
take ownership of a service.
Suspending Unavailable The service provider gracefully completes all the in-progress
requests and then is no longer available.
Original New state Changes driven by the AR Changes driven by the service provider
state System server
Active Suspending The AR System server intends to Not applicable. The service provider cannot assert a
fail over the service from one suspending state.
service provider to another. The
AR System server gives the
active service provider the ability
to gracefully finish any work that
is currently under way.
Active Waiting Not applicable. Only the service The service provider has completed its requests and intends to
provider can assert a waiting give the AR System platform the opportunity to recalculate the
state. highest ranked service provider for the service. The AR System
server would detect that there is no active service provider for
the service, examine the ranking criteria and available service
providers, and give ownership to (that is, make active) the
appropriate service provider.
Waiting Active The AR System server intends to Not applicable. Only the AR System server can determine and
fail over the service from one assign ownership of the service.
service provider to another. The
AR System server indicates to a
waiting service provider that it
should take ownership of the
service and begin processing.
If no other rankings exist for the service, the entry receives a ranking of 1. If other rankings exist,
the entry receives a null ranking (that is, an unset ranking), which is treated as the lowest ranking
(MAXINT (232 - 1)). This ranking assumes that existing providers are already working, and a
failover is not triggered when you introduce a new provider.
Rank is in ascending numerical order. Service providers with the numerically lower rank are
chosen before ranks of greater value (negative-valued rank takes a higher precedence over
positive-valued rank). If two providers of the same service have the same rank, then the service
failover controller chooses one.
1. In a browser, open the AR System Service Failover Ranking form in search mode:
http://midTierServer:portNumber/arsys/forms/ARSystemServer/AR+System+Service
Failover+Ranking/
2. Perform a search to see the entries in the form, and select the required entry.
3. Change the value in the Rank field.
The valid value for this field is any integer.
Note
Related topic
Service failover ranking entries (see page 1239)
nameSpace://service-name
Note
For example:
com.bmc.arsys.emaildaemon://outgoing/IN-REMDEV
Related topic
To configure Email engine behind a load balancer, perform the following steps:
2. Open the C:\WINDOWS\system32\drivers\etc\hosts file and add the following alias entry,
and save the file:
IPAddress serverName
Where,
IPAddress is the IP address of the load balancer
serverName is the server name alias of the load balancer
Note
When you configure two Email engines (Email Engine1 and Email Engine2) in a server
group environment, by default, Email Engine1 will be the Rank 1 server for both inbound
and outbound services.
To configure Email Engine1 as the primary server for inbound, and Email Engine2 as the primary
for outbound, you must perform the following steps:
Related topics
Security administration
This section describes how to administer BMC Remedy AR System security. Topics include:
BMC Remedy AR System includes one predefined user. You can use the User form in a browser
to rename this user and create additional users. For information about defining users for BMC
Remedy AR System, see Adding and modifying user information (see page 1246).
Users are assigned to groups according to their need to access information. For example, you
might create a group called Employee Services Staff whose members are permitted to view and
change only certain fields in an Employee Information form. You might have another group called
Employee Services Managers whose members are permitted to view and change all fields in the
Employee Information form, including salary information. You can also configure a hierarchical
relationship between groups to allow the parent group to inherit the permissions of the child group.
Use the following procedures to create, modify, or delete BMC Remedy AR System users and to
enable users to change their information. You can apply the three Fixed licenses included with
BMC Remedy AR System to new users.
To create users
1. Log in to a browser.
If you are the first administrator to log in, you must log in as an administrator and leave the
Password field empty. (BMC Remedy AR System user names are case-sensitive.)
During initial installation, the Demo user is installed as Administrator without a required
password. To keep BMC Remedy AR System secure, add a password for this user as soon
as possible.
2. From the AR System Administration Console, click System > Application > Users / Groups /
Roles > User.
The User form opens in Search mode.
3. Choose Actions > New to switch to New mode.
4. Enter information in the appropriate fields, as described in the User form fields table (see
page ).
5. Save your changes.
1. From the AR System Administration Console, click System > Application > Users / Groups /
Roles > User.
The User form opens in Search mode.
2. Click Search to retrieve a list of defined users.
3. Select the appropriate user from the list.
4. Modify information in the appropriate fields.
5. Save your changes.
Warning
To delete users
1. From the AR System Administration Console, click System > Application > Users / Groups /
Roles > User.
The User form opens in Search mode.
2. Click Search to retrieve a list of defined users.
3. Select the appropriate user from the list.
4. Choose Actions > Delete.
A confirmation box appears to verify that you want to delete the selected users.
5. Click OK.
Warning
If you delete the Administrator before you create another Administrator user, you
lose administrator privileges.
Important
In BMC Remedy AR System, you can have registered users and guest users. Each type of user
has different privileges within the system, as discussed in the following sections.
You enter data in the User form to define the components that work together to determine each
user's access to BMC Remedy AR System: login name, password, group membership, and license
type. You also define notification information for each user in this form. For information about the
restrictions for creating or modifying user information, see Restrictions (see page 1250).
To grant a user permission for BMC Remedy AR System objects, add the user to the groups to
which access will be given. To make a user part of a group, choose the appropriate group from the
Group List menu in the User form. (Multiple group names in the Group List field are separated by
spaces.) You can select from the reserved BMC Remedy AR System groups.
Notes
For more information, see Groups in BMC Remedy AR System (see page 1272).
The following table lists the key fields in the User form.
Key fields in the Roles form
Login Name
User Identifying name that the user enters into the User Name field when logging in to BMC Remedy
Information AR System. The name can be the same or different than the user name by which this user is
known to the underlying operating system. The dynamic group with an ID of 60988 has read
access to this field, enabling the user to view this field if a password policy is established. See
Enforcing a password policy introduction (see page 1303).
User Password Identifying password that the user enters when logging in to BMC Remedy AR System. This
Information field's length is 30 bytes, so you can enable users to enter as many as 30 bytes.
Note: Users cannot enter a 28-character password, or an error will occur during authentication.
The Password field is encrypted into the database by using a one-way hash (SHA-1), so
unauthorized users cannot retrieve passwords in clear text, for example, to log in to applications.
To enhance system security, select a password that is different from one used for another
purpose. If unsecure passwords are needed for applications, store the password in a character
field rather than the Password field (field 102). If the Password field is left blank, the BMC
Remedy AR System server does not validate the password with the user's Windows or UNIX
password, unless you configure the server to cross-reference a blank password. See Cross-
referencing blank passwords (see page 853). The dynamic group with an ID of 60988 has read
access to this field, enabling the user to view this field if a password policy is established. See
Enforcing a password policy introduction (see page 1303).
User Group List The access control groups to which the user belongs. If you leave this field empty, the user has
Information only basic Submitter, Assignee, Assignee Group, or Public permissions. Specify groups by name
or ID, as defined in the Group form. User permissions are determined in the Group List field of
the User form. If you later change the Group ID for a group, the users originally assigned to the
group are still attached to the old ID. If no group has the old ID, these users lose access to any
BMC Remedy AR System object for which they do not have permission through another group. If
you choose to This field is limited to 4000 bytes, including expanded strings. See Groups in BMC
Remedy AR System (see page 1272).
Note: If you create multiple groups with the same ID, the User form displays the first available
group name for the selected group id.
User Computed The names of the computed groups to which the User is a member. The members of a computed
Information Group List group are calculated by the server based on the groups that the User belongs to. This is a
display-only field, and the field ID is 121. To search in this field in a query-by-example, enter the
ID number of a computed group. To enter more than one computed group ID, include semicolons
after each ID. You must enter the computed group IDs in the same order in which the names
appear in the Computed Group List field when the user's record is displayed. In the following
examples:
You can also use the Advanced Search bar with the LIKE operator. Include the semicolon
with the complete ID.
To search for users who are members of both Computed Group 1 and Computed Group 2,
enter:
'Computed Group List' LIKE "%56%" AND 'Computed Group List' LIKE "%89%"
User Full Name Full name of a user. By default, this name appears in the Results pane of the User form when
Information users perform a search operation.
User License Type Type of license that the user is assigned: Read , Restricted Read , Fixed, or Floating. The default
Information is Read. See License types overview (see page 125) for further descriptions of these types.
User Application List of application licenses granted to the user. For example, BMC Change Mgmt User Fixed,
Information License where BMC Change Mgmt is the name of the application and User Fixed is the type of license.
BMC Remedy AR System automatically populates this field according to information entered in
the application's People form.
Note: To use BMC Remedy AR System-based applications from BMC Software, users need an
BMC Remedy AR System user license (to access the BMC Remedy AR System server) and an
application user license (to access the application).
User Default Method by which the user is notified for Notify filter and escalation actions when User Default is
Information Notify specified. The default setting on the User form is Alert.
Mechanism
User Email Email address used to notify the user if email is the notify method.
Information Address
User Status Defines the status of the user account. This field is for information only. It does not change the
Information status of a user's account. This field is set through workflow if you set a password policy. See
Enforcing a password policy introduction (see page 1303). The options are:
User Allowed Allows the user to make API calls using only the client types mentioned in the Allowed Client
Information Client Types Types field.
To enter more than one client type ID, include semicolons after each ID. In the following
example, the user can make an API call only to BMC Remedy Mid Tier, BMC Remedy Developer
Studio and BMC ProactiveNet Performance Management.
If the user makes an API call to the Client Type not assigned in the Allowed Client Types field,
the API call fails with the following error:
If the Allowed Client Type field is left blank, the user can make API calls using any client type.
For more information on the list of Client types, see List of Client Type ID (see page 2690).
Password Disable Disables password management for the user. If this check box is selected, when the User
Management Password Password Management Configuration form is updated, the user is not affected. For more
Management information about password management, see Enforcing a password policy introduction (see
For This User page 1303).
Dynamic
Group
Access
Password Last The last time the password was changed. BMC Remedy AR System automatically updated this
Management Password field when a user's password is changed.
Change for
Policy
Password Force Indicates that the user must change the password. The next time the user logs in, the user is
Management Password prompted to change the password. After the password is changed, the check box in the User
Change on form is automatically cleared through workflow.
Login
Password Number of The numbers of days before a user's password expires if it is not changed.
Management Days Before
Expiration
Password Number of Indicates when a user receives a warning message before the password is set to expire unless
Management Warning changed.
Days
Password Days After The number of days after which a user's account is disabled if the password is not changed.
Management Expiration
Until
Disablement
The following restrictions are applied before and after you create or modify any user in the User
and Group form.
1. Only an administrator can create, modify, or delete other users belonging to the
Administrator, Sub-Administrator, Struct Admin, or Struct Sub-Admin groups.
A user must have Group ID 1 (AR Administrator) in the group list to create/modify
/delete another user with any of the four administrative class groups in their group list.
2. No Admin user can create or modify a user (themselves included) with lesser administrative
restrictions than the user making the modification.
For example, an administrator user with Overlay Group 1 cannot create or modify users with
no overlay groups. Consider a situation where you have created an ABCGroup with an
Overlay Group set to 1. User ABCAdmin is part of Administrator group and ABCGroup.
However, ABCAdmin is restricted only to the ABCGroup. ABCAdmin can change (create
/modify/delete) any user belonging only to the ABCGroup. For more information about
creating a group as an overlay group, see Creating groups (see page 1252).
A user cannot create another admin user with the ability to modify base objects if they
themselves cannot do it.
BMC recommends that you should restrict your users to make modifications only to
custom objects and overlays.
3. Only an unrestricted administrator can create, modify, or delete groups that restrict a user’s
administrative capabilities.
Only an administrator with no overlay specific groups can create, modify, or remove
overlay specific groups.
BMC Remedy AR System includes a Public group and eight other special groups that are essential
for access control within the system. You can define additional groups based on a common profile
and assign access accordingly. For example, you might create a Sales group and allow members
to view the status of a request but not to change it. A group can also be a general category, such
as Browsers. For information about adding groups, see Creating groups (see page 1252).
Explicit groups — Groups to which you must manually assign users in the User form. When
a user becomes a member of a group, the user is given access to all objects and fields to
which the group is granted access. Explicit groups that you create are defined for a
particular server. If you move the objects to a new server with its own defined explicit
groups, you might need to resolve permission conflicts. Consider using a deployable
application, which uses role permissions that can be mapped to different groups on different
servers.
For more information, see Creating groups (see page 1252) and Adding and modifying user
information (see page 1246)
Implicit groups — Groups that depend on specific user circumstances and situations. Users
belong to these groups based on specific conditions, such as the contents of special fields
within each request. You do not directly assign users to implicit groups. Any dynamic groups
that you create are also implicit groups.
Creating groups
This section provides the steps to create BMC Remedy AR System access control groups.
Although there is no limit to the number of groups that you can create, for maintenance purposes
you might want to limit the number to avoid confusion. After you have created the necessary
groups, see Adding and modifying user information (see page 1246), to assign individual users to
the appropriate groups.
Use the Group form (shown in the following figure) in a browser to create and manage the access
control groups to which you grant or deny access to AR System objects. BMC recommends that
you should restrict your users to make modifications only to custom objects and overlays.
Note
The following table lists the fields you can set the Group form.
Fields in the Group Information form
Field Description
Group CUSTOMER_SUPPORTCUSTOMERSUPPORT
Name
Group ID Integer ID that is the recognized identity of the group. The ranges are:
If you use the same ID with multiple group names, you must keep the Group type the same for each because you
are creating aliases for the same group. To make sure that you do not create duplicate Group IDs, use Remedy
Administrator to build a unique inde on the Group ID field in the Group form. (See Defining indexes (see page 2330).)
The Group ID defines the priority of a group when a user obtains a floating license. See About floating licenses in a
license pool (see page 1324).
Note: If you create multiple groups with the same ID, the User form displays the first available group name for the
selected group id.
Long Additional information about a group. The text should be descriptive of the group because it appears by default in
Group the Results pane in the mid tier when listing groups.
Name
Parent The parent group, if any, of the current group. This field is optional. If a parent group is assigned, members of the
Group parent group have the same rights as members of the current group to objects that allow permissions inheritance. A
group can have at most one parent group. Any regular or computed explicit group can act as a parent group, except
for Administrator, Sub Administrator, and Customize. Implicit groups cannot be used as a parent group. (Implicit
groups include Assignee, Submitter, Assignee Group, and dynamic groups.) To assign a parent group, the parent
group must already exist. Select the parent group from the drop-down list. For:
An overview of hierarchical groups, see Using a parent group for permissions inheritance (see page 1276).
Information about setting permissions inheritance for an object, see Assigning permissions for individual or
multiple objects (see page 1298).
Information about row-level access control and hierarchical groups, see Controlling access to requests for
hierarchical groups (see page 1292).
Use the setting to define the group as an Overlay Group. The Overlay Group option on the Group Information Form,
provides the following access options:
Overlay Group field set to 1: When a group assigned to the user has the Overlay Group field set to 1, the
user is restricted to working on overlay and custom mode objects. In Developer Studio, the user can work
only in Best Practice Customization mode.
Overlay Group field set to 0: When a group assigned to the user has the Overlay Group field set to 0, the
user is restricted to working on base mode objects. In Developer Studio, the user can work only in Base
Developer mode.
Overlay Group set to (clear): When the Overlay Group is set to (clear), the Group provides no restrictions on
access to base, overlay, or custom objects.
Overlay Group field set to 999999999: When a group assigned to the user has the Overlay Group field set to
999999999, the user can work only in read-only mode on all base, overlay, and custom objects.
For more information, see Groups in BMC Remedy AR System (see page 1272) and Operations on objects restricted
by development mode (see page 2276).
Note: Do not assign an overlay to a computed group. If you assign an overlay to a computed group, the ARERR
8821 warning occurs and the computed group is saved with Overlay Group as NULL in the AR System server.
Note: Users must have administrator or sub administrator privileges on the AR server to access Developer Studio.
Computed Qualification string that defines a computed group. Construct the string from any valid combination of explicit group
Group IDs, explicit group names (in double quotation marks), user names (in single quotation marks), and operators such
Definition as AND, OR, and NOT. Optionally, use the AND, OR, NOT, Append Group, Append User, and parentheses buttons
to build the qualification string.
Examples
Floating About floating licenses in a license pool (see page 1324)Creating data fields (see page 2497)
Licenses
Application Manually enter the information for this field. You can add more than one entry of application names and number of
Floating licenses, separated by a semicolon. Use the following syntax when providing users with application licenses:
License
_vendorName_: _applicationName_
user
_typeOfLicense_: _Number of licenses_
;
Note
For the Application Floating License field, the value of typeOfLicense is 'Floating'.
Example
The applicationName string must be the same as the Product Name string in the Application Licensing dialog box (
Application > License Application) in BMC Remedy Developer Studio. If the Application Floating License field is
missing from the Group form, you can use Remedy Administrator to add the field. Use field ID 115. See Creating
data fields (see page 2497).
To use BMC Remedy AR System-based applications from BMC Software, you need an BMC Remedy AR System
user (floating) license (to access the BMC Remedy AR System server) and an application user (floating) license (to
access the application).
Unique A unique identifier for the group. A unique identifier is useful if you have two groups with the same name for
Identifier different applications. You can use the unique identifier to differentiate the two.
Datatag Tags the data record as needed. This field is optional. For example, it can store the name of the application which
uses this group.
Note
If attributes that you want to specify in the group definition are not represented in the
Group form, you can use Remedy Administrator to add the appropriate fields. However,
be careful that you do not modify or delete any of the original fields or field IDs.
To create groups
1. In a browser, open the Group form of the appropriate server in New mode.
2. Enter information in the appropriate fields, as described in the previous table.
3. Save your changes.
For a regular group, assign users to it by using the User form in a browser.
After you save a group, the server automatically reaches, and the new group appears in the
Group menu in the User form after a short delay. For more information about adding users,
see Adding and modifying user information (see page 1246).
To enable a dynamic group, add a field to the form with a field ID that is the same as the
group ID. For more information, see Group Category (see page 1253).
Note
If you create and save a group in the Group form using a browser, and then flush the mid
tier cache, the new group still does not appear when a user opens the field menu of a
group list in a form. The user must click the browser Refresh button to see the new group.
Managing groups
You can modify, delete, or search for groups in the Group form.
1. In a browser, open the Group form of the appropriate server in Search mode.
2. Enter values in fields, or use the Advanced Search Bar to specify search criteria.
For computed groups, enter one group ID or one user name (in single quotation marks) in
the Computed Group Definition field. If you use the Advance Search Bar, use the LIKE
operator to indicate that you are searching for a portion of a string. (See Operators (see
page 2680) for more information.) The search returns all computed groups that include the
specified user or group in the definition.
You cannot search the Computed Group Definition field for group names, or for strings that
include operators such as AND, OR, and NOT. This is because BMC Remedy AR System
converts group names to group IDs and encodes operators before storing them in the
database. However, the search results do show the strings as they were originally entered,
with group names and operators.
3. Choose Actions > Search to retrieve the list of currently defined groups that match your
search criteria.
To modify groups
1. In a browser, open the Group form of the appropriate server in Search mode.
2. Perform a search to retrieve a list of currently defined groups.
3. Select the appropriate group from the list.
4. Modify information in the appropriate fields.
5. Save your changes.
To delete groups
1. In a browser, open the Group form of the appropriate server in Search mode.
2. Perform a search to retrieve a list of currently defined groups.
3. Select the appropriate group from the list.
4. Choose Actions > Delete.
A confirmation box appears to verify that you want to delete the group entry.
5. Click OK.
Note
Permissions for a user are determined by the list of groups in the Group list field of
the user's entry in the User form. If you later delete a group or change its Group ID,
the users originally assigned to the group are still attached to the old ID. If there is
no group with the old ID, these users are no longer attached to any group.
The Access Type field in the following table lists the access that BMC Remedy Developer Studio
needs to the fields of the listed form.
If the Access Type is Read, grant the Struct Admin Permissions group View permission to
the form's fields.
If the Access Type is Read/Write, grant the Struct Admin Permissions group Change
permission to the form's fields (except field 1, which should always have View permission).
StuctAdmin group permissions matrix
Form Name Access Details
Type
Data Visualization Definition Read This form is used for all Flashboard, Flashboard Variable and Flashboard
/Write Alarm. BMC Remedy Developer Studio needs read-write access for this form.
Data Visualization Module Read This form is used in Form Editor to populate the Module Type property of Data
Visualization Field.
AR System Metadata: actlink Read All Metadata forms are used by Search, Analyzer and Workflow Viewer.
AR System Metadata: Read All Metadata forms are used by Search, Analyzer and Workflow Viewer.
actlink_auto
AR System Metadata: Read All Metadata forms are used by Search, Analyzer and Workflow Viewer.
actlink_call
AR System Metadata: Read All Metadata forms are used by Search, Analyzer and Workflow Viewer.
actlink_dde
AR System Metadata: Read All Metadata forms are used by Search, Analyzer and Workflow Viewer.
actlink_goto
AR System Metadata: Read All Metadata forms are used by Search, Analyzer and Workflow Viewer.
actlink_group_ids
AR System Metadata: Read All Metadata forms are used by Search, Analyzer and Workflow Viewer.
actlink_macro
AR System Metadata: Read All Metadata forms are used by Search, Analyzer and Workflow Viewer.
actlink_macro_parm
AR System Metadata: Read All Metadata forms are used by Search, Analyzer and Workflow Viewer.
actlink_mapping
AR System Metadata: Read All Metadata forms are used by Search, Analyzer and Workflow Viewer.
actlink_message
AR System Metadata: Read All Metadata forms are used by Search, Analyzer and Workflow Viewer.
actlink_open
AR System Metadata: Read All Metadata forms are used by Search, Analyzer and Workflow Viewer.
actlink_process
AR System Metadata: Read All Metadata forms are used by Search, Analyzer and Workflow Viewer.
actlink_push
AR System Metadata: Read All Metadata forms are used by Search, Analyzer and Workflow Viewer.
actlink_serviceaction
AR System Metadata: Read All Metadata forms are used by Search, Analyzer and Workflow Viewer.
actlink_set
AR System Metadata: Read All Metadata forms are used by Search, Analyzer and Workflow Viewer.
actlink_set_char
AR System Metadata: Read All Metadata forms are used by Search, Analyzer and Workflow Viewer.
actlink_sql
AR System Metadata: Read All Metadata forms are used by Search, Analyzer and Workflow Viewer.
actlink_wait
AR System Metadata: Read All Metadata forms are used by Search, Analyzer and Workflow Viewer.
arcontainer
AR System Metadata: Read All Metadata forms are used by Search, Analyzer and Workflow Viewer.
arctr_group_ids
AR System Metadata: Read All Metadata forms are used by Search, Analyzer and Workflow Viewer.
arctr_subadmin
AR System Metadata: Read All Metadata forms are used by Search, Analyzer and Workflow Viewer.
arreference
AR System Metadata: Read All Metadata forms are used by Search, Analyzer and Workflow Viewer.
arschema
AR System Metadata: Read All Metadata forms are used by Search, Analyzer and Workflow Viewer.
char_menu
AR System Metadata: Read All Metadata forms are used by Search, Analyzer and Workflow Viewer.
char_menu_dd
AR System Metadata: Read All Metadata forms are used by Search, Analyzer and Workflow Viewer.
char_menu_file
AR System Metadata: Read All Metadata forms are used by Search, Analyzer and Workflow Viewer.
char_menu_list
AR System Metadata: Read All Metadata forms are used by Search, Analyzer and Workflow Viewer.
char_menu_query
AR System Metadata: Read All Metadata forms are used by Search, Analyzer and Workflow Viewer.
char_menu_sql
AR System Metadata: Read All Metadata forms are used by Search, Analyzer and Workflow Viewer.
cntnr_ownr_obj
AR System Metadata: Read All Metadata forms are used by Search, Analyzer and Workflow Viewer.
escal_mapping
AR System Metadata: Read All Metadata forms are used by Search, Analyzer and Workflow Viewer.
escalation
AR System Metadata: field Read All Metadata forms are used by Search, Analyzer and Workflow Viewer.
AR System Metadata: Read All Metadata forms are used by Search, Analyzer and Workflow Viewer.
field_char
AR System Metadata: Read All Metadata forms are used by Search, Analyzer and Workflow Viewer.
field_column
AR System Metadata: Read All Metadata forms are used by Search, Analyzer and Workflow Viewer.
field_curr
AR System Metadata: Read All Metadata forms are used by Search, Analyzer and Workflow Viewer.
field_dispprop
AR System Metadata: Read All Metadata forms are used by Search, Analyzer and Workflow Viewer.
field_enum
AR System Metadata: Read All Metadata forms are used by Search, Analyzer and Workflow Viewer.
field_enum_values
AR System Metadata: Read All Metadata forms are used by Search, Analyzer and Workflow Viewer.
field_permissions
AR System Metadata: Read All Metadata forms are used by Search, Analyzer and Workflow Viewer.
field_table
AR System Metadata: filter Read All Metadata forms are used by Search, Analyzer and Workflow Viewer.
AR System Metadata: Read All Metadata forms are used by Search, Analyzer and Workflow Viewer.
filter_call
AR System Metadata: Read All Metadata forms are used by Search, Analyzer and Workflow Viewer.
filter_goto
AR System Metadata: Read All Metadata forms are used by Search, Analyzer and Workflow Viewer.
filter_log
AR System Metadata: Read All Metadata forms are used by Search, Analyzer and Workflow Viewer.
filter_mapping
AR System Metadata: Read All Metadata forms are used by Search, Analyzer and Workflow Viewer.
filter_message
AR System Metadata: Read All Metadata forms are used by Search, Analyzer and Workflow Viewer.
filter_notify
AR System Metadata: Read All Metadata forms are used by Search, Analyzer and Workflow Viewer.
filter_process
AR System Metadata: Read All Metadata forms are used by Search, Analyzer and Workflow Viewer.
filter_push
AR System Metadata: Read All Metadata forms are used by Search, Analyzer and Workflow Viewer.
filter_serviceaction
AR System Metadata: Read All Metadata forms are used by Search, Analyzer and Workflow Viewer.
filter_set
AR System Metadata: Read All Metadata forms are used by Search, Analyzer and Workflow Viewer.
filter_sql
AR System Metadata: image Read All Metadata forms are used by Search, Analyzer and Workflow Viewer.
AR System Metadata: Read All Metadata forms are used by Search, Analyzer and Workflow Viewer.
schema_archive
AR System Metadata: Read All Metadata forms are used by Search, Analyzer and Workflow Viewer.
schema_audit
AR System Metadata: Read All Metadata forms are used by Search, Analyzer and Workflow Viewer.
schema_group_ids
AR System Metadata: Read All Metadata forms are used by Search, Analyzer and Workflow Viewer.
schema_index
AR System Metadata: Read All Metadata forms are used by Search, Analyzer and Workflow Viewer.
schema_join
AR System Metadata: Read All Metadata forms are used by Search, Analyzer and Workflow Viewer.
schema_list_fields
AR System Metadata: Read All Metadata forms are used by Search, Analyzer and Workflow Viewer.
subadmin_group
AR System Metadata: Read All Metadata forms are used by Search, Analyzer and Workflow Viewer.
vendor_mapping
AR System Metadata: Read All Metadata forms are used by Search, Analyzer and Workflow Viewer.
view_mapping
AR System Metadata: vui Read All Metadata forms are used by Search, Analyzer and Workflow Viewer.
AR System Administration: Read This form is used by the Analyzer to read configuration data.
Server Information
AR System Ignored Read This form is used by the Analyzer to store results marked as Ignored.
Analyzer Results /Write
AR System Object Read This form is used to calculate related objects. It is used extensively in Search,
Relationships Analyzer, Object List, Relationships and Workflow Viewer.
Groups Read This form is used in Group Object List, Search and Analyser.
AR System Administrator Read These forms are used to read and write administrator and user preferences.
Preference /Write
AR System User Preference Read These forms are used to read and write administrator and user preferences.
/Write
AR System Version Control: Read These forms are used for Object Reservation feature.
Object Reservation /Write
AR System Version Control: Read These forms are used for Label Management.
Object Modification Log
AR System Version Control: Read These forms are used for Label Management.
Label /Write
AR System Version Control: Read These forms are used for Label Management.
Labeled Object /Write
AR System Currency Codes Read This form is used to get currency types that are shown in the Currency Types
property of a currency field.
AR System Orchestrator Read This form is used in Set Fields action when Data Source is set to Webservice.
Configuration
ReportType Read This form is used by Open Window action when Window Type is set to
Report.
Distributed Mapping Read These forms are used in Distributed Mapping and Distributed Pool editors
/Write
Distributed Pool Read These forms are used in Distributed Mapping and Distributed Pool editors.
/Write
DSO Distributed Logical Read Used by DSO Editors and DSO action to read logical names.
Name
BMC Remedy Localization Read These forms are used by L10n Toolkit.
Toolkit: Location Package
Join
BMC Remedy Localization Read These forms are used by L10n Toolkit.
Toolkit: Location Package
Link
BMC Remedy Localization Read These forms are used by L10n Toolkit.
Toolkit: Locations /Write
AR System Currency Label Read This form is used to read localized current code.
Catalog
Roles are defined for each deployable application and then mapped to explicit groups on the
server. You can map a deployable application's roles to different groups on different servers,
depending on how the groups are defined on each server. This allows you to develop and test the
application on one server and deploy it to a number of other servers without having to redefine
permissions on each server. You can also map roles to different groups for each development
state, such as Test or Production. You can then switch between states using BMC Remedy
Developer Studio or workflow.
Because roles are mapped to groups, the groups you define on the server and the users that
belong to them are the foundation of access control.
Use the Roles form in a browser to create roles to which you grant or deny access to objects in
deployable applications. In deployable applications, you assign permissions using implicit groups
(including dynamic groups) and roles. You then map roles to explicit groups on the server. For
more information about deployable applications, see Defining and managing an application (see
page 2279). This section provides the steps to create roles and map them to explicit groups.
Although there is no limit to the number of roles that you can create, for maintenance purposes you
might want to limit the number.
Note
You can map roles to regular or computed groups for the Test and Production application
development states. You can also create custom states and map roles for those states. To enable
a particular mapping, change the application's state. For more information, see Working with
deployable application states (see page 2289).
Use the following procedures to create, modify, or delete BMC Remedy AR System roles:
The following table lists the key fields in the Roles form.
Key fields in the Roles form
Field Description
Application Name of the deployable application for which the role is defined. You can define the same role for multiple
Name applications, but you must create a separate Roles form entry for each.
Role Name Name by which the role is known. Within each application, every role name should be unique. You can reuse the
same role name-role ID pairs across a suite of applications.
Role ID Integer ID that is the recognized identity of the role. The ID must be a negative number, such as -10001. Role IDs
must be unique for each application name. You can reuse the same role name-role ID pairs across a suite of
applications.
Test Enter or select one group name for the regular or computed group to which you want to map this role for the Test
application state. To enable this mapping, set the application's State property to Test. For more information, see
Working with deployable application states (see page 2289).
Production Enter or select one group name for the regular or computed group to which you want to map this role for the
Production application state. To enable this mapping, set the application's State property to Production. For more
information, see Working with deployable application states (see page 2289).
1. In a browser, open the Roles form in New mode for the server that contains the deployable
application for which you are creating roles.
2. Enter information in the Application Name, Role Name, and Role ID fields, as described in
the previous table.
If you save the role now, you can begin assigning permissions for this role to objects within
the application. A role is listed only for object in the deployable application to which the role
belongs.
3. Enter a regular or computed group ID in each Mapped Group field to define access
permissions for each application state.
4. Save your changes.
Note
- BMC Remedy AR System does not maintain the list of Application names. The
BMC Remedy AR System Administrator should keep a note of all the Application
names.
- Newly created roles appear in Permissions dialogs after the server recaches
(about 5 seconds, depending on your system).
1. In a browser, open the Roles form in Search mode for the server that contains the
deployable application for which you are creating roles.
2. Search the form to retrieve a list of currently defined roles for a particular application.
3. Select the appropriate roles and modify information in the appropriate fields.
4. Save your changes.
To delete roles
1. In a browser, open the Roles form in Search mode for the server that contains the
deployable application for which you are creating roles.
2. Search the form to retrieve a list of currently defined roles for a particular application.
3. Select the appropriate role.
4. Choose Actions > Delete.
A confirmation box appears to verify that you want to delete the role entry.
5. Click OK.
All user access definition and management is performed through forms that are accessible to
administrators. Policy management and implementation are controlled through the use of access
control groups and security role definitions and privileges. Access control groups are the basis by
which all user access is granted. Access control in AR System is additive. Each user starts out with
no access to AR System controlled objects, and administrators or subadministrators add
permissions as needed. Administrators can set default permissions and specific permissions on
objects in AR System, and subadministrators can set specific permissions to objects where
assigned.
Roles, including security roles, are specified in the AR System by membership in groups. The AR
System reserves eight group IDs for special group definitions with associated access privileges,
including the groups administrator and subadministrator. Members of the administrator group have
the security role administrator. Members of the subadministrator group have the security role
subadministrator.
When you assign a user to a group with Overlay Groups set to 1, you must also assign the
user to the Struct Admin or Struct Subadmin group. For more information, see Groups in
BMC Remedy AR System (see page 1272) and Operations on objects restricted by
development mode (see page 2276).
1. From the BMC Remedy AR System Administration Console, navigate to: Application > Users
/Groups/Roles > Groups
2. Create the Group as desired and select 1 in the Overlay Group drop-down menu, to make it
an Overlay Group.
1. From the BMC Remedy AR System Administration Console, navigate to Application > Users
/Groups/Roles > Groups
2. Create a group named Struct Admin Permissions, to provide access to the objects.
3. Set the Group Category field to Regular.
4. Set the Group Type field to Change.
1. From the BMC Remedy AR System Administration Console, navigate to Application > Users
/Groups/Roles > Users
2. Make sure the user is assigned the following groups:
Struct Admin
Struct Admin Permissions
For details see Struct Admin group permissions (see page 1257).
Note
When you create an object as a subadministrator, make sure to set the Subadministrator
Permissions so you can access the object.
Modify local applications, forms, and packing lists to which they have administrator access.
Create and modify filters, active links, and escalations associated with forms to which they
have administrator access.
Create and modify active link guides, filter guides, images, and menus.
Modify local applications, forms, and packing lists to which they have no administrator
access.
View or modify forms to which they do not have subadministrator access in local application
or packing lists to which they do have administrator access.
If a user has subadministrator access to a local application or a packing list, but not to a
form in the local application or packing list, the form is not listed in the object list or editor.
1. Include the Sub Administrator group in the Group list in the User form entry for every user
who is to be a subadministrator.
A member of the Sub Administrator group must have a fixed license.
2. Give a group, of which the user is a member, administrative access to the appropriate local
applications, forms, and guides. For more information, see Defining subadministrator
permissions (see page 1268).
To give all members of the Subadministrator group administrator access to an object, give
the Public group Subadministrator permission. To divide administrator access between
groups, as Subadministrator security role (see page 1266)shows, create a group for each
collection of objects, for example, Engineering Subadministrators and Sales
Subadministrators.
Note
After you have granted a group subadministrator permissions for an application, the members of
that group can modify the application's appearance, group permissions, help text, and change
history. Subadministrators can also change which forms are included in an application object,
although they cannot alter the forms themselves unless they have administrator access to them.
1. In the mid tier, open the User form of the appropriate server in Search mode.
2. Perform a search to find the user you want to give administrator access to.
3. Make the following changes:
1. In BMC Remedy Developer Studio, open the appropriate form, local application, or packing
list for modification.
2. Access the Subadministrator Permissions:
For a form, select the Definitions tab. In the Permissions panel, expand the
Subadministrator Permissions sub-panel.
For a local application or a packing list, in the Properties tab, click the Permissions >
Subadministrator Permissions property and then the ellipses button.
3. In the Subadministrator Permissions page or dialog box, use the arrow buttons to move the
appropriate groups into the Permissions list.
When assigning permissions for an application, you must assign the same permissions as
are assigned for the individual forms in the application.
The members of the group or role have the same privileges and permissions that an administrator
has for that object.
Access control
This section provides an overview of the BMC Remedy AR System access control. Topics include:
Note
For information about role-based access, see Role-based access overview (see page 131
).
Access control is the BMC Remedy AR System mechanism that controls which users can open an
application, form, or guide in a browser, can perform an action, and can create, view, modify, and
delete a request. You can configure AR System to run with limited access privileges and access to
limited set of resources on the host machine. This prevents malicious scripts or programs from
being installed on the machine.
1. Identify and create the groups and roles (for deployable applications) that reflect key
functions in your company and the type of information each function must access.
2. Create users on your BMC Remedy AR System server and assign their respective groups to
them.
Group membership ultimately determines which objects a user can access and which operations
individual a user can perform. BMC Remedy AR System has various levels of security:
Server — Controls access to the BMC Remedy AR System server. A user must be defined
on a server or connect to it as a guest user if the server permits them.
Application, form, and workflow — Controls access to BMC Remedy AR System objects. A
user must belong to a group that has permission to access an application, form, active link,
or active link guide to see it and use it.
Request (or row) — Controls access to individual requests in a form. A user can have
permission to view or change only requests the user created or those created by a member
of a group to which they belong.
Field (or column) — Controls whether a user can view or can change a field in a form.
A user can have permission to view or change a request but cannot see or change individual fields
unless the user also belongs to a group with the required field-level permission.
The following figure presents an overview of access control, and lists the questions that you can
use to determine the access that users have to BMC Remedy AR System.
BMC Remedy AR System includes a Public group and eight other special groups that are essential
for access control within the system. You can define additional groups based on a common profile
and assign access accordingly. For example, you might create a Sales group and allow members
to view the status of a request but not to change it. A group can also be a general category, such
as Browsers. For information about adding groups, see Creating and managing groups (see page
).
Public 0 Implicit Provides general access. Access granted to this group is granted to all users. Every user who
logs in to BMC Remedy AR System is automatically a member of the Public group. This
includes registered users (that is, listed in the User form) and guest users.
Administrator 1 Explicit Defines users who have full and unlimited access to BMC Remedy AR System. Administrators,
members of this group, can view any object or field in a browser and can create a request in
any form. Administrators can view, create, modify, and delete any server object in Remedy
Administrator. A user must have a fixed license or this group assignment is ignored.
Customize 2 Explicit Grants users the ability to customize their form view layout in the mid tier. Use this group with
caution.
Submitter 3 Implicit
Provides field access to the user whose login name is in the Submitter field (field ID 2) for a
particular request. The user who creates a request is usually automatically belongs to the
Submitter group for that requests. For more information, see Submitter and Assignee access
(see page ). See Enabling submitters to modify requests (see page 1301), to enable a
special server Submitter mode that allows the user who submitted a request to modify it
without having a write license.
Assignee 4 Implicit Provides field access to the user whose name is in the Assignee field (field ID 4) for a
particular request. The user whose name is in the Assignee field automatically belongs to the
Assignee group. For more information, see Submitter and Assignee access (see page 1287).
Sub 5 Explicit Provides administrative access to selected server objects. Subadministrators, members of this
Administrator group, can be granted administrative access to objects that have the Subadministrator
Permissions property. With administrative access, a subadministrator has the same access as
an administrator for that object. See Subadministrator security role (see page 1266). A user
must have a fixed license or this group assignment is ignored.
Assignee 7 Implicit Provides field access to the user who is a member of one of the groups listed in the Assignee
Group Group field (field ID 112) for a request. A user automatically belongs to the Assignee Group
group for requests in which the Assignee Group field exists and contains the name or ID of a
group to which the user belongs, the name or ID of a role that maps to a group to which the
user belongs, or the user's name. For more information, see Assignee Group access (see page
1287) and Form, active link guide, and application permissions (see page 1278).
Note: Do not confuse this group with the Assignee group, which gives permission to the
individual user named in the Assignee field.
Struct Admin 8* Explicit Struct Admin members can create, modify, and delete AR server objects, but have no access
(see to data or to administrative functions unless provided by other groups in the user's group list.
page
Note: For more information about Struct Admin permissions, see Struct Admin group
1273)
permissions (see page 1257).
The assigned user must have a fixed license or this group assignment is ignored.
Struct 9* Explicit Struct Subadmin members can modify AR server objects subject to the same rules that govern
Subadmin (see Sub Administrator group members. If the object's Administrator group list contains a group in
page which the Struct Subadmin user is a member, the user has access. Struct Subadmin members
1273)
have no access to data or to administrative functions unless provided by other groups in the
user's group list. The assigned user must have a fixed license or this group assignment is
ignored.
* This Group ID assignment might present a conflict with custom type assignments.
In addition to the groups listed in the previous table, groups with IDs in the range of 60000 to
60999 are reserved for dynamic groups.
Regular groups — Explicit groups that you create and to which you assign a specific list of
users. For information about assigning users to groups, see Adding and modifying user
information (see page 1246).
Computed groups — Explicit groups that you create and to which users are assigned based
on the memberships of explicit groups included in an expression. For example, you can
create a computed group definition such as (A AND B) OR C AND NOT D. This computed
group includes the list of users who are members of both groups A and B, or members of
group C, but not members of group D.
Computed groups make groups easier to manage. You can manage your users in a limited
number of regular groups, and use computed groups based on these regular groups for
more complex access control without the need to make changes in multiple groups.
Dynamic groups — Implicit groups are similar to the reserved Assignee Group group in that
the contents of special fields determine group membership. For more information, see
Dynamic group access (see page 1288).
Explicit groups — Groups to which you must manually assign users in the User form. When
a user becomes a member of a group, the user is given access to all objects and fields to
which the group is granted access.
Explicit groups that you create are defined for a particular server. If you move the objects to
a new server with its own defined explicit groups, you might need to resolve permission
conflicts. Consider using a deployable application, which uses role permissions that can be
mapped to different groups on different servers. For more information, see Role-based
access (see page 131).
For information about assigning users to groups, see Adding and modifying user information
(see page 1246).
Implicit groups — Groups that depend on specific user circumstances and situations. Users
belong to these groups based on specific conditions, such as the contents of special fields
within each request. You do not directly assign users to implicit groups.
Any dynamic groups that you create are also implicit groups. For more information, see Dynamic
group access (see page 1288).
Explicit A group to which you must assign users. Any regular and computed groups that you create.
Administrator Regular groups are groups to which you assign a
Sub specific list of users. Computedgroups are groups
Administrator to which users are assigned based on their
Customize memberships in groups included in an expression.
Implicit A group to which a user automatically (or Any dynamic groups that you create.Dynamic
implicitly) belongs by virtue of the Public groups use the contents of special fields to
contents of certain fields in a request. Submitter determine group membership.
You cannot assign users to implicit Assignee
groups. All users are members of Public. Assignee
You use the other types of implicit groups Group
to control access to requests (row-level
database access).
If a group has permission to access a form, field, request, active link, or active link guide and a
user belongs to that group, the user has access, even if the user belongs to other groups that do
not have access.
When a parent group is defined, you manage access to objects and data in the application by
assigning permissions to the child group and configuring the objects to allow permissions
inheritance. As a result, members of the parent group automatically have the same access as
members of the child group.
Any regular or computed group that you create can be a parent group. A parent group is not a
separate type of group, but rather represents a hierarchical relationship between the parent group
and the child group, in which the parent group inherits the permissions of the child group.
A parent group can have one or more child groups. A child group can also have child groups of its
own, forming a multilevel hierarchy, but each child group can only have one parent group. In a
multilevel hierarchy, assigning permission to a child group grants access to all ancestor groups,
such as the parent group of a parent group.
For example, in the following figure, the group named Parts Supplier is a parent to the Dealer A
and Dealer B groups, and an ancestor to all the groups in the relationship. Dealer A and Dealer B
are child groups to Parts Supplier, but parent groups to their respective Shop groups.
In this example, an auto parts supplier needs to control access to the order database, such that
employees of the parts supplier can see orders from all dealers and their respective authorized
repair shops, but employees of each dealer can see only their own orders or those of their
subcontracted shops. Employees of each shop can see only the orders for their own shop. This is
accomplished by assigning Parts Supplier as the parent group for Dealer A and Dealer B, and by
assigning Dealer A or Dealer B as the parent group for each of the shop groups.
To assign a parent group, you modify the Group form entry for the child group. See Creating and
managing groups (see page ).
Note
Hierarchical group relationships are used for permissions management only, and are not
recognized when sending notifications by group.
Static permissions inheritance controls hierarchical access for all AR System object types
that use permissions, such as forms, active links, applications, and so on. Hierarchical
access to fields is controlled by the permissions of the form. See Assigning permissions for
individual or multiple BMC Remedy AR System objects (see page ).
Dynamic permissions inheritance is a form property that controls record-level access to data
for hierarchical groups, in conjunction with implicit groups and related fields on the form. See
Controlling access to requests for hierarchical groups (see page ).
If the object properties do not include permissions inheritance, any hierarchical relationship defined
for any of the groups in the object permission list is ignored.
Form, active link guide, and application permissions (see page 1278)
Field permissions (see page 1279)
Active link permissions (see page 1284)
When creating a form, active link guide, or application, you must decide the permission for each
group or role:
Visible — Members of the group or role can select and view the object in the user client.
Hidden — Members of the group or role can access the object through workflow or by
entering the URL in a browser, but cannot select the form in the home page or in the object
list.
None — Members of the group or role have no access to the object.
Giving the members of a group access to a form does not automatically give those users access to
the fields in that form or to active links and active link guides that use that form. You must also
assign group permissions to each field and related object.
If the form, active link guide, or application is configured to allow static permissions inheritance,
granting permission to the form for a group also grants the same permission to any ancestors
(parent groups at all levels) of that group. Similarly, when you map a role to a group, the role
permissions for the application also apply to any ancestors of the mapped group.
The following figure lists the questions that you can ask to determine the access that users have to
forms in BMC Remedy AR System. You can use this flowchart for guides and applications as well.
Note
A user who has access to the form through a hierarchical group relationship is "in a group
with permissions to the form". Also, web users can open Hidden forms with the correct
URL, but the ability to use the form is controlled by field permissions.
Field permissions
Field permissions determine the types of access that groups or roles have for individual fields in a
form:
If neither permission is selected, members of the group or role cannot view or change the field.
Groups and roles are defined with maximum privileges of View or Change, as explained in To
define default permissions for a server or an application (see page 1297) and in the Field
permissions example (see page 1283). Groups or roles with maximum View permission can never
be assigned Change permission for a field; groups or roles with maximum Change permission can
If the form is configured to allow static permissions inheritance, granting permission to a field in the
form for a group also grants the same permission to any ancestors (parent groups at all levels) of
that group. Similarly, when you map a role to a group, the role permissions for the application also
apply to any ancestors of the mapped group.
Users must belong to a group or role with permission to view a form's Request ID field (core field
1), or they cannot access any information from that request. After you give a group or role access
to the Request ID field, or to any field in the form, the user does not automatically have access to
the form or to workflow attached to the field. You must grant permissions to each object
individually.
Note
In a Set Fields operation, because active links execute with the permissions of the user,
field values set through an active link are updated only if the user has permission to
change the field. Values retrieved must be accessible by the user. For more information,
see Set Fields action (see page 2813).
Field permissions (see page 1279) lists the questions that you can ask to determine the access that
users have to fields in BMC Remedy AR System. Some of the questions are covered in
Configuring after installation (see page 271).
Accessing fields
Advanced data fields require you to set permission on various levels. The advanced data field
types are table fields, panel fields, and attachment pools. For example, a panel field consists of
three levels, each requiring consistent permission settings: the panel holder, the panel, and the
fields on the panel (so the user can see the complete panel set). See Field types (see page 150)
for more information about the following advanced fields.
Table field permissions are set in the same way as button field permissions, with the exception that
you must set permissions at four levels. You must grant or deny a user access to the:
Table field
Columns in the table
Form from which rows are drawn
Fields from which each column draws its data
If a user does not have permission to view any columns, the field or list appears blank in the
user client.
If a user does not have permission to access a field in the supporting form that contains
column data, the user sees a blank cell.
If the user has no permission to access any of the cells in a row, the row is not displayed.
Panel field permissions are set at three levels. You must grant or deny a user access to
To see an individual field (the lowest level of the permission hierarchy), the user must have
permission to the upper levels of the hierarchy--that is, to the panel holder and the individual
panels.
Attachment pool permissions properties
For attachment pool field and attachment field permissions, you must grant or deny a user access
to both.
To see an individual attachment field, the user must have permission to the attachment pool field.
If a user does not have permission to view any attachment fields, the attachment pool appears
blank in the user client.
A special submit setting allows users to submit a new request without Change permission for data
and attachment fields that require a value. To use this feature, set the Allow Any User to Submit
property to Yes for each applicable field.
If the Allow Any User to Submit property is set to No and the field requires a value, a user must
have a Write license and belong to a group with Change permission for the field to submit a
request. For more information about using this feature, see Defining default permissions (see page
1295) and Assigning permissions for individual or multiple objects (see page 1298).
The following figure illustrates how both permissions and field definitions work together to
determine the access to a field. The example lists three groups: Browser, CS Staff, and Sales
Staff. These groups have different maximum privileges of View or Change, as explained in Defining
default permissions (see page 1295).
At the field level, each group is granted specific access to the Short Description data field:
John is a member of the CS Staff group and the Browser group. Although membership in the
Browser group alone does not allow him to change the field, he can change it because of his group
permission in the CS Staff group. When a user belongs to more than one group with different
permissions to a field, the user has the highest level of permission granted by a group to which the
user belongs.
Alice is a member of the Sales Staff group, which has maximum permission of Change. However,
at the field level, members of the Sales Staff group can only view the contents of this field.
Rick also can only view the contents of the Short Description field because he is a member of the
Browser group. Because the Browser group has maximum privileges of View, you can never give
him Change permission for the Short Description field through the Browser group as it is currently
defined.
After you give a group or role access to an active link, the user does not automatically have access
to the field to which the active link is attached or to the form that contains the field. You must also
assign permissions to the form and the field.
The following figure lists the questions that you can ask to determine the access that users have to
active links in BMC Remedy AR System.
Access to requests
Defining access to requests is important when you want to keep certain groups of users from
knowing that certain requests exist. For example, if you use BMC Remedy AR System as the
outsource help desk for several companies, you can assign access to requests so that only the
company that submitted the request can see it.
You determine which groups or roles have access to a request through the Request ID field (field
ID 1). If a group or role does not have access to that field, the group or role has no access to the
request, even if it has access to other fields in that form.
You can grant access to members of explicit groups or roles. For example, you can give managers
access to all requests. You can also grant access to members of implicit groups. For example,
submitters can see their own requests but not those submitted by other users. For more
information, see Controlling access by using implicit groups--Row-level security (see page 1286).
The following figure lists the questions that you can ask to determine the access that users have to
requests in BMC Remedy AR System.
Accessing requests
(Click the image to expand it.)
Controlling access by using implicit groups: Row-level security (see page 1286)
Submitter and Assignee access (see page 1287)
Assignee Group access (see page 1287)
Dynamic group access (see page 1288)
Using the Request ID field with implicit groups (see page 1288)
Using the Assignee Group and dynamic groups--Examples (see page 1289)
Controlling access to requests for hierarchical groups (see page 1292)
The following table shows the differences and similarities among these implicit groups and their
associated fields.
Implicit group Group ID Associated default field name Field ID Core field? Associated field contents
You can also grant parent groups row-level access. For information, see Controlling access to
requests for hierarchical groups (see page ).
Fields with row-level security in searches are handled differently than regular fields to ensure that
indexes (if used) are used properly and performance is not impacted.
For example, a form might contain two fields (Field1 and Field2) and two dynamic groups
(DynamicGroup1 and DynamicGroup2). DynamicGroup1 controls access to Field1, and
DynamicGroup2 controls access to Field2.
If regular fields were used, the following SQL WHERE clause would be used:
To have access as a member of the Submitter group, the contents of field ID 2 must be the
user's login name. Field ID 2 is usually set on submission by using the $USER$ keyword to
define this field's contents.
To have access as a member of the Assignee group, the contents of field ID 4 must equal
the user's login name. Field ID 4 is often set manually or by workflow to a user's name when
the status of the request changes.
To provide Assignee Group access, you must add the Assignee Group field (field ID 112) to your
form and then specify which users, groups, or roles should have access to the request in this field.
Although you can set the Assignee Group field manually, it is typically set by workflow.
For more information, see Using the Assignee Group and dynamic groups--Examples (see page
).
For more information, see Using the Assignee Group and dynamic groups--Examples (see page
).
To give submitters or assignees access to their requests on a single-user basis, grant the
Submitter and Assignee groups permission to the Request ID field.
To give other users access, grant the Assignee Group or dynamic groups access to the
Request ID field. Make sure that you also add field ID 112 (the Assignee Group field) or the
correct dynamic group fields to the form.
To grant access to requests for hierarchical groups, use the Dynamic Permissions
Inheritance form property. See Controlling access to requests for hierarchical groups (see
page 1292).
If you are using a user's login name to assign access, remember these tips:
In the Submitter or Assigned To fields, enter the user's login name without quotation marks.
In the Assignee Group or dynamic group fields , enter the user's login name in single
quotation marks. Double any single quotation marks that are part of the login name (for
example, 'Dan O''Connor' ).
To permit multiple user, group, and role names in the Assignee Group field and dynamic fields,
select Enable Multiple Assign Groups on the Configuration tab of BMC Remedy AR System
Administration: Server Information form. To enter users Dan O'Connor and Mary Manager, group
ID 12000, role ID -9000, and role Managers, use the following syntax:
Note
If a group and role have the same name, the role name is assumed. For example, if a
dynamic field contains Managers;Sales, BMC Remedy AR System assumes the
Managers and Sales roles, if they exist; otherwise, BMC Remedy AR System assumes
the Manager and Sales groups.
For more information about all settings in the BMC Remedy AR System Administration: Server
Information form, see Configuring AR System servers (see page 285).
Assignee Group and dynamic group permissions to the Request ID field, combined with the
contents of the Assignee Group field or dynamic group fields, determines who can see the request.
If a group or role to which the user belongs is in the Assignee Group or dynamic group field for a
request, that user is given whatever access privileges you defined for the Assignee Group or
dynamic group, as shown in the following figure.
Imagine that you are working for Acme Outsource Help Desks, Inc. Three computer companies
hire you to manage all of their help desk responsibilities. For security reasons, each computer
company must not know about the existence of the other two. Therefore, you must create one form
all three companies can use, but allows each company to see only the requests they create.
Explicit groups for each company have already been created, and each user belongs to one of
these company groups.
1. Create the groups (or roles) and users to which you want to assign access. In this example,
the four groups are:
Acme Help Desk Staff (who will have access to all requests)
Beta Computers
Gamma Computers
Delta Computers
Beta Computers, Gamma Computers, and Delta Computers users must belong only
to their company group. Acme employees can be members of more than one group.
2. Create a form, and give the appropriate groups Visible permission for it.
For example, giving the Public group Visible permission for the form enables all of the users
to see it.
3. Add Assignee Group access to the form.
The Assignee Group capabilities of BMC Remedy AR System are activated when you add a
character field to the form with field ID 112 and a database input length of 255.
4. Restrict access to the necessary requests.
Because only groups or roles with permission for the Request ID field can access a request,
restricting access to the Request ID field is the key to restricting access to a request. In this
example, the Acme Help Desk Staff and the Assignee Group groups have the appropriate
permissions for the Request ID field, as shown in the following figure.
Field permissions for the Request ID field
(Click to expand the image.)
With Assignee Group access, a user from Beta Computers can submit requests, and
anyone from Beta Computers can query them. However, no one from Gamma Computers or
Delta Computers can query Beta Computer's requests.
Note
You might want to give permissions to a single group to begin with and submit a
sample request to determine if any group other than the designated group can
access it.
5. Add workflow that inserts at least one explicit group, role, or user name into field ID 112
according to the business rules at your site. If Enable Multiple Assign Groups is selected on
the Configuration tab of the BMC Remedy AR System Administration: Server Information
form, you now can enter more than one explicit group, role, or user name into field ID 112.
For sample syntax, see Defining access to requests at the group level (see page 1288).
For more information about all settings in the BMC Remedy AR System Administration:
Server Information form, see Configuring AR System servers (see page 285).
Because field ID 112 is designed for administrators and your help desk staff, deny access
for most groups to this field. You can define a filter to set the contents of this field and use
an active link Change Field action to allow your help desk staff to see and change the field
as needed. If you must change the group or role in the field, field ID 112 includes system-
defined menus of all groups on the server and roles in the application (if the form is owned
by a deployable application). Administrators can override these menus in Remedy
Administrator as needed.
In the example, Acme allows access to its service call database from a browser but limits
users to view only requests submitted by members of their company. An access control
group was created for each different company name, and a filter that copies the company
name into field ID 112 (labeled Assignee Group in the following figure) executes when users
submit requests.
Using Assignee Group access in workflow
(Click to expand the image.)
When the filter executes, the Assignee Group for this request is Beta Computers.
You also could have created individual filters, one that enables Beta Computers to see their
requests, another that enables Gamma Computers to see their requests, and so on. Use
appropriate filter qualifications to make sure that only users from the Beta Computers group
can execute the filter, set field ID 112 to "Beta Computers," and so on. For more information
about creating and using filters, see Introducing workflow (see page 2620).
6.
BMC Remedy Action Request System 9.1 Page 1291 of 4703
BMC Software Confidential. BladeLogic Confidential.
6. Change the permissions of other fields in the form to grant access as needed. Include the
Assignee Group where appropriate.
As a result of carefully defining access control in your system, when members of Acme Outsource
Help Desks search all open help desk requests, they see a results list that includes requests
submitted by Beta, Gamma, and Delta Computers. In contrast, if users from Delta Computers
perform the same search, they see only the requests where Delta Computers is the Assignee
Group (that is, the requests submitted by anyone at Delta Computers).
1. Create the groups (or roles) and users to which you want to assign access.
2. Create a dynamic group in the Group form.
For example, create a group called Dynamic Access with a group ID of 60001.
3. Create a form, and give the appropriate groups Visible permission for it.
4. Add a character field to the form with field ID 60001, the same ID number as the dynamic
group ID.
5. Restrict access to requests in the form by granting the group Dynamic Access permission to
the Request ID field.
6. Add workflow that inserts at least one explicit group name or ID, role name or ID, or user
name into field ID 60001 according to the business rules at your site. If Enable Multiple
Assign Groups is selected on the Configuration tab of the BMC Remedy AR System
Administration: Server Information form, you can enter more than one explicit group, role, or
user name into field ID 60001. For sample syntax, see Defining access to requests at the
group level (see page 1288).
For more information about all settings in the BMC Remedy AR System Administration:
Server Information form, see Configuring AR System servers (see page 285).
Like field ID 112, dynamic group fields can be modified manually. They include system-
defined menus of all groups on the server and roles in the application (if the form is owned
by a deployable application). Administrators can modify these menus as needed.
Parameter Description
Name
Allows you to configure the number of threads (default value is 1) that will be used for computation of hierarchical
hgthread
groups. When all the existing worker threads are in use, the system starts additional threads as needed until the
s
configured number of threads is reached. These additional threads remain active until the BMC Remedy AR System
server is rebooted. BMC recommends that you use a significantly high number of threads (at least 5) in the following
scenarios:
Parameter Description
Name
You must increase the number of threads because these changes could result in updates to numerous entries
across several forms.
Allows you to configure compute delay (in minutes) for hierarchical groups. The default value for this delay is 5
hgdelay
minutes. The BMC Remedy AR System server waits for the specified amount of time before hierarchical groups
begin the compute activity. The delay time is calculated from the time when the last change is made to the group
hierarchy and when group changes are applied to the forms. If during the delay period a new change is made, then
the delay time is reset to take into account the last change made. The following example will help you understand
the hgdelay concept:
Suppose you have configured hgdelay time as 10 minutes. The BMC Remedy AR System server waits for 10
minutes before it computes the worker threads. During the delay time, if you make certain changes at the 7th
minute, then the delay time is further extended by 10 minutes. Thus the BMC Remedy AR System server begins its
task of computing worker threads at the 17th minute. If you make any subsequent changes, the delay time is
extended by 10 minutes each time.
To manage row-level access for the parent or ancestor groups in a hierarchical group relationship,
use the Dynamic Permissions Inheritance form property along with a second implicit group field on
the form. (You can also set static permissions inheritance property on the form to control access to
the form and its fields for parent groups.)
To configure dynamic permissions inheritance, you create a dynamic group that BMC Remedy AR
System populates with any parent or ancestor groups at run time, and add a field to the form with
the same ID as this dynamic group. At run time, for any group ID or name that workflow enters in
the child dynamic group field, BMC Remedy AR System checks for defined ancestor groups. If any
exist, BMC Remedy AR System enters the parent group ID (or IDs for multiple levels of hierarchy)
in the parent dynamic group field, giving the parent group row-level access to the request.
For an overview of hierarchical group relationships, see Using a parent group for permissions
inheritance (see page ).
1. Follow the appropriate procedure in Using the Assignee Group and dynamic groups--
Examples (see page ) to configure row-level access for the child group.
2. Create a new dynamic group that identifies the parent group relationships at run time, and
assign it a group ID in the dynamic group range, such as 60002.
For example, create a dynamic group named Parent Dynamic Access.
3. Add a character field to the form with the same field ID number as the Parent Dynamic
Access group ID, in this example, 60002.
4.
BMC Remedy Action Request System 9.1 Page 1293 of 4703
BMC Software Confidential. BladeLogic Confidential.
4. Grant the group Parent Dynamic Access permission to the Request ID field.
5. Select the Definitions tab.
6. Expand the Permissions panel and then the Group Permissions panel.
7. In the Dynamic Permissions Inheritance field, map the child implicit group field ID to the
parent dynamic group field ID, as in the following example:
112:60002 60001:60002
Enter the child dynamic group ID first, followed by a colon, and then the parent group ID.
For detailed information on permissions inheritance, see Using a parent group for
permissions inheritance (see page 1276).
8. Save the form.
Assigning permissions
You assign permissions to applications, forms, fields, active links, active link guides, flashboards,
flashboard variables, packing lists, and web services. BMC Remedy Developer Studio includes
these ways to assign or modify permissions:
Default permissions — The permissions automatically created for a new object. Default
permissions are preset permissions that you define per object type. You can set default
permissions to apply to all objects on the server, or only within an application. Once defined,
default permissions are automatically applied when you create any object of that type.
Defining default permissions is optional, but can be useful if a certain group or role should
always have permission to an object type. If you do not set default permissions, only
administrators (and subadministrators where assigned) can access an object until you
assign specific permissions to it. See Defining default permissions (see page ).
Permissions for individual objects — You can specify which groups or roles can access an
object when you create or modify the object. when you need to control user access at the
object level. The steps for this option are described in To assign permissions for a form (see
page ) and To assign permissions for other objects (see page ).
Permissions for fields — You can specify which groups or roles can view or change the data
in a field when you create or modify the field. A group can have permission to a form but
must also be granted permission to the fields in the form. The steps for assigning field
permissions are described in To assign permissions for one or more fields (see page ).
Batch permissions — You can specify permissions for multiple objects of the same type at
the same time. For more information, see Modifying object properties (see page 2216).
Group and role permissions — You can give a group or role access to every applicable
object in a server or deployable application instead of opening each object and modifying
the permissions individually. This method can be useful if you have added a new group or
role after the objects were created. The steps for this option are described in To assign
permissions for a group to multiple objects (see page ).
You can define default permissions for an object type for the server in general, or you can set them
within an application. Server default permissions are an administrator preference setting and are
stored in the user's Developer Studio workspace, so they only apply for the administrator or
subadministrator who defines them. Application default permissions are associated with the
application, so any administrator or assigned subadministrator can use them. Application default
permissions are applied to objects created in that application, but not to other objects on the server.
Setting default permissions is most appropriate for a development server. When developing an
application or a workflow component, first create the groups or roles that will have access to all the
objects in the application or workflow. Then, configure default permissions to use those groups or
roles. Thereafter, when you create these objects and fields, AR System applies the default
permissions and you only need to set individual object or field permissions in cases where the
default permissions are not correct.
Note
The objects created after setting the default permissions will not derive the default
permissions assigned before creating the objects.
Default permissions defined for forms on a server are shown here. The groups listed will be
granted visible permissions or hidden permissions to any new forms.
The Default Permissions dialog box for an application is shown here. In this case, the administrator
is assigning permission for new active link guides created in the application.
The default permissions for the object type are automatically applied to the object or field when it is
created, and are displayed in the Permissions property. To reset permissions to the defined default
permissions for an existing object or field, open the Permissions dialog box for the object or field,
and then click Restore Defaults.
For additional information about permissions, see:
Active link guide, application, form, web Visible View and access the object in the user client.
service
Active link guide, application, form, web Hidden Access to the object only through workflow.
service
Active link, packing list (none) View and access the object in the user client.
6. For fields only, select or clear the Allow Any User to Submitcheck box. Use this mode to
determine security for the field when a request is submitted. If the check box is:
Selected — Any user can assign a value to the field, regardless of whether the
submitter belongs to an explicit group with Change permission to the field.
Cleared (the default) — Only users who belong to one or more explicit groups with
Change permission to the field (or users who belong to explicit groups mapped to
roles with Change permission to the field) can enter data into the field. Row-level
security permissions cannot grant access during entry creation.
1. Select the group or role in the Permissions list and click Remove or click Remove All.
2.
BMC Remedy Action Request System 9.1 Page 1297 of 4703
BMC Software Confidential. BladeLogic Confidential.
2. Click OK to save your changes and close the Preferences dialog box. The default
permissions are defined for the server or application you selected and the current
administrator login. Each administrator can have different default permissions for objects
created on each server.
Note
You will not automatically see updates to this list if changes are made
simultaneously by another developer. To see concurrent updates, you must close
and reopen the Permissions panel on the Definitions tab.
1. In Developer Studio, open the object (such as an application, active link, or web service).
2. Open the Permissions panel.
3. For applications and web services, open the Group Permissions subpanel.
4.
BMC Remedy Action Request System 9.1 Page 1298 of 4703
BMC Software Confidential. BladeLogic Confidential.
4. To add more groups to the Permissions list, select Additive from the Overlay Type drop-
down list.
To overwrite the origin object's permissions, select Overwrite.
For more information about overlays, see Customizing applications using overlays and
custom objects (see page 2920).
5. Use the arrow buttons to move the appropriate groups and roles into the Permissions list.
All groups defined on the server (or roles defined for the application that contains the object)
are displayed.
To allow all users to see the object, add the Public group to the Permission list.
6. For objects that have different access levels, for each group or role in the Permissions list,
click the drop-down menu in the Permissions column to set the access level.
7. To set the object permissions to their defaults, click Apply Defaults.
For more information, see Defining default permissions (see page 1295).
8. Click OK to close the Permissions dialog box.
9. To configure hierarchical group access to the object, set the object permissions property
Static Permissions Inheritance to True.
1. In Developer Studio, open the Groups object list. (Double-click on Groups in the AR System
Navigator.)
2. Right-click the appropriate group, and select Assign Permissions.
3. In the Assign Group Permissions dialog box, select Fields or the appropriate object type.
If you select Fields, click the ellipsis button and select a form. Only forms that are not in
deployable application are available.
4. To remove permissions to objects or fields in the list, click Remove All or select objects and
click Remove.
5. To assign permissions to other objects or fields, click Add.
6. In the Selector dialog box, select the objects or fields in the list, and click OK to assign
permission for the group to those objects.
7. For object that have different access levels, in the Assign Group Permissions dialog box, for
each object in the list, click the drop-down menu in the Permissions column to set the
access level.
8. To assign permission for this group to other object types, return to step 3.
9. Click OK to save the permission changes.
Note
Administrators can select a setting that limits their view of the object list and the home page to only
those objects for which the Public group has Visible access. (Subadministrators can use this
setting to manipulate the visibility of only those forms to which they have access as a
subadministrator.) This allows you to quickly double-check which forms, entry points, and
applications have Visible permission assigned to Public.
For non-administrators, this setting has no effect; objects are displayed in the list according to the
user's group permissions.
http:// <webServerName>
/arsys/forms
Locked — Enables users who have their name in the Submitter field to modify their own
requests without a write license. This does not apply to users with a Restricted Read license
who cannot modify requests under any circumstances. In the locked submitter mode, after
the entry is submitted, the value in the Submitter field cannot be changed.
Changeable — Requires users to have a write (fixed or floating) license to change any
record, including requests for which they are the submitter.
For more information, see Setting license options (see page 310).
Refer to Multitiered access control model (see page 132) for more access control information.
Make sure the BMC Remedy Encryption Performance Security or BMC Remedy Encryption
Premium Security user name and the operating system user name are identical.
If you use Authentication aliases, the Login name alias should be identical to the operating
system user name.
Leave the Password field in the User form blank. See "Field" in Adding and modifying user
information (see page 1246)
Select the Cross Ref Blank Password check box on the EA (external authentication) tab of
the AR System Administration: Server Information form. For more information about
password configuration, see Setting external authentication options (see page 312).
Warning
Make sure that you specify a password for Administrator accounts (such as Demo) before
enabling Cross Ref Blank Password. Otherwise, an administrator can be locked out of the
system.
Where supported, the operating system password validation feature enables the operating system
to set the following password policies:
Aging and Password Restrictions can be configured in BMC Remedy AR System where the user
password is stored in the User form (see Enforcing a password policy introduction (see page )
and Enforcing restrictions on passwords (see page )). The operating system password
management system must be used to configure Aging and Password Restrictions where the user
password is stored external to the User form.
Note
The operating system password management system can also be configured to lock out
users after too many failed password attempts. Use this method when the user password
is stored external to the User form. See Max Number of Password Attempts in Setting
administrative options (see page 321). The operating system password management
system can also be configured to lock out users after too many failed password attempts.
This method is effective where the user password is stored external to the User form.
Note
If you are upgrading from a version prior to 7.1.00, note the changes to the User form, as
described in User form access (see page ).
The password management feature is preconfigured when you install BMC Remedy Encryption
Security, but it is not enabled. This section describes how to enable and use the feature.
Force all users or individual users to change their passwords when they use a browser
Enforce restrictions on passwords [Health Insurance Portability and Accountability Act
(HIPAA) standards are shipped as the default restrictions.]
Set up password expiration with scheduled warnings
Disable an account after the expiration period
Enable users to change their passwords at will
Important
If your system uses external authentication (through the Cross Ref Blank Password
option), be careful if you enforce password policy with the User Password Management
Configuration form. The policy should be enforced only for users whose passwords are
stored in the Encryption Security User form. If you enable the policy and have users who
are externally authenticated, disable the policy for the externally authenticated users as
described in Disabling password management for individual users (see page 1315). For
information about the Cross-Reference Blank Password feature used with external
authentication, see Cross-referencing blank passwords (see page 853).
To set the authentication server, open the BMC Remedy Mid Tier Configuration Tool, and click the
General Settings link. Then, enter the server in the Authentication Server field.
Reverting an individual user to global password management settings (see page 1316)
1. From the BMC Remedy AR System Administration Console, click System > General >
Password Management Configuration.
(Click on the image to expand it.)
2. In the User Password Management Configuration form, select the Enforce Policy and
Restrictions check box if it is not already selected.
3. Complete the fields in the Enforcement Policy and Restrictions sections. For more
information about these fields, see:
Enforcing restrictions on passwords (see page )
Setting up password expiration with scheduled warnings (see page )
Disabling an account after the expiration period (see page )
4. Click Save.
All users are forced to change their passwords at their scheduled expiration date. When
users change their passwords, they must enter the old password once and the new
password twice.
1. From the BMC Remedy AR System Administration Console, click System > General >
Password Management Configuration.
(Click on the image to expand it.)
2. In the User Password Management Configuration form, select the New User Must Change
Password check box.
3. Click Save. Now, when you create a user, the user is prompted to change the password the
first time the user logs in.
1. From the BMC Remedy AR System Administration Console, click System > Application >
Users / Groups / Roles > User. The User form opens in Search mode.
(Click on the image to expand it.)
Note
Changes in the User form take precedence over the configuration settings in the
User Password Management Configuration form. If you change the User form and
you want the user to use the global password management policy (as configured in
the User Password Management Configuration form), see Reverting an individual
user to global password management settings (see page 1316). If you change the
policy User Password Management Configuration form, changes in the User form
are overwritten.
The user cannot use the old password when changing the password.
The password cannot be a dictionary word, which is achieved by the following rules:
Must be a minimum of eight alphanumeric characters
Must include at least one uppercase alphabetic character
Must include at least one lowercase alphabetic character
Must include at least one non-alphanumeric (special) character
Users (except for the administrator and the password's user) cannot change the password.
This is accomplished through the Dynamic Group Access field (ID 60988) on the User form.
The account is disabled if the user does not change the password after the number of days
specified in the Days after force change until disablement field in the User Password
Management Configuration form.
1. From the BMC Remedy AR System Administration Console, click System > General >
Password Management Configuration. The User Password Management Configuration form
appears.
(Click on the image to expand it.)
2. To disable the default HIPAA character restrictions, select the Disable Default Character
Restrictions check box.
This check box disables the default HIPAA character restrictions regarding non-
alphanumeric characters and case-sensitivity. If the check box is selected, users can
enter any characters in the Password field, except for characters that are restricted
according to what you enter in the Restrictions Qualifier field.
Length restrictions are still enforced, but you change them in the Minimum Length
field as described in the following step.
3. Complete the following fields in the Restrictions section.
Minimum Length — Sets the minimum length the user must enter when changing a
password. You can enter a length of 1 through 30; the default is 8.
Restrictions Qualifier — Specifies restrictions in addition to the default HIPAA
restrictions. For example, to force users to include a numeric character in their
password, enter:
If the default HIPAA restrictions are enabled, you can add more restrictive qualifications, but
your restrictions cannot contradict the default restrictions. If you want less restrictive rules,
disable the default HIPAA restrictions. In summary, you can enforce restrictions in any of the
following ways:
Use the default restrictions — Do not enter a qualification in the Restrictions Qualifier
field.
Use the default restrictions, but refine them further — Simply enter a qualification in
the Restrictions Qualifier field.
Replace the default restrictions with your own custom restrictions — Select the
Disable Default Character Restrictions check box and enter a qualification in the
Restrictions Qualifier field.
Remove the default restrictions, and allow users to enter any combination of
characters — Select the Disable Default Character Restrictions check box and do not
enter a qualification in the Restrictions Qualifier field. See Restriction qualifications
scenarios (see page ).
Failure Message — Specifies the message if a password is entered that does not
qualify against the restrictions set.
4. Click Save.
Scenario 1
To add a restriction requiring users to include a numeric character in their password, enter the
following qualification in the Restriction Qualifier field:
This qualifier is appended to the default qualifier. With this restriction, aA1#, aa1#, and AA1# are
acceptable passwords if the minimum length for password is 4.
Scenario 2
To add the restriction of requiring a lowercase letter, enter the following qualification:
The following qualification would not work because you cannot invalidate the default qualifier,
which requires a letter in the password.
If the Disable Default Character Restrictions check box is selected, the default qualifier is ignored.
The qualifier entered in the Restrictions Qualifier field is the only qualifier used.
Scenario 4
To force users to include numeric characters in their password, enter the following qualification in
the Restrictions Qualifier field:
With this restriction, 1111 is an acceptable password if the minimum length is 4. A password
without any numbers, like aaaa, would cause an error.
Setting up password expiration with scheduled warnings
You can control when a password expires and how many days before the expiration users are
warned.
Note
Notifications that the User Password Management application sends are in English only.
1. From the BMC Remedy AR System Administration Console, click System > General >
Password Management Configuration. The User Password Management Configuration form
appears.
2. Complete the following fields in the Enforcement Policy section.
Number of Days Before Expiration — Indicates the numbers of days before a user's
password expires if it is not changed.
Number of Warning Days — Indicates when a user receives a warning message
before the password is set to expire unless changed.
3. Click Save.
Note
You can perform this function in the User form for individual users. See Adding and
modifying user information (see page 1246).
1. From the BMC Remedy AR System Administration Console, click System > General >
Password Management Configuration. The User Password Management Configuration form
appears.
2. In the Days After Expiration Until Disablement field, enter the number of days after which a
user's account is disabled if the password is not changed.
3. Click Save. You can also perform this function in the User form for individual users. See
Adding and modifying user information (see page 1246).
Important
If you enable users to change their passwords directly in the User form instead of the
User Password Change form, beware that the password restriction policy (default or
customized by you) is bypassed because the restrictions are enforced through the User
Password Change form, not through the User form.
Use the Advanced tab in the AR System Administration: Server Information form from the BMC
Remedy AR System Administration Console to create settings for security. This tab also contains
performance-related settings. You must be an administrator to make changes.
For more information about the BMC Remedy AR System Administration Console, see Navigating
the BMC Remedy AR System Administration console interface (see page 1048).
Note
1. In a browser, open the AR System Administration Console, and click System > General >
Server Information. The AR System Administration: Server Information form appears.
2. Click the Advanced tab.
3. Edit the options listed in the following table as needed, and click Apply.
Default Specifies the base URL for the mid tier and is used by clients such as Flashboards. The
Web Path URL appears as:
http: //hostName/contextPath
Maximum For forms that contain hierarchical data, such as manager and employee relationships,
Depth for specifies the maximum number of levels in the hierarchy that a recursive query retrieves.
Hierarchical By default, the maximum is 25. Enter any integer greater than 0. See
Query ARGetListEntryWithMultiSchemaFields (see page 3714).
Maximum Specifies the maximum number of temporary tables that can exist on an AR System
Vendor server for a single vendor form. The ARGetListEntryWithMultiSchemaFields function
Temp stores data from vendor data sources in these tables. By default, only one temporary
Tables table can exist for each vendor form. This setting applies to all vendor forms on the
server. It is overridden by the value of an individual vendor form's Maximum Vendor
Temp Tables property
Email Suppress Suppresses the server domain in the URL. The option is clear by default.
Server
Domain in
URL
Maximum Specifies the maximum line length that can be in an email. The default is 1024. If a single
Line Length line of the message is over this length, a return is automatically inserted. Limits the line
in Email length of email messages passed through the mail server to protect users from
excessively long lines.
Email Specifies the base URL that appears in email notifications. If this field is left blank, the
Notification Default Web Path is used. (The Email Notifications Web Path field is available because
Web Path the Default Web Path is specified for other applications like Flashboards, and it might be
different from the mid tier web path for opening requests in a notification.) If your
company has multiple domains, use a fully qualified path name.
Security Active Link Specifies the only directory that the Run Process active link action can run from, for
Run example, C:\arsys. If no directory is specified, active link processes can run from any
Process directory.
Directory
Active Link Specifies the type of shell the Run Process action can use, for example, /bin/csh. If no
Run path is specified, administrators can specify any shell.
Process
Shell(UNIX
servers only)
Allow Enables the administrator to use the arcache and arreload utilities. See arcache.exe or
arcache arcache (see page 1131) and arreload.exe or arreload (see page 1134). The option is
and arreload selected by default.
Maximum Specifies the maximum number of concurrent client-managed transactions. The default is
Concurrent 10, and the maximum value you can enter is 100.
Transactions
Client
Managed
Transaction
(CMT)
Configuration
Transaction Specifies the maximum time (in seconds) allowed to hold a transaction before a timeout
Timeout occurs. The default is 60 seconds, and there is no maximum. If a timeout occurs, the
server automatically rolls the transaction back, and the client receives an error on the
next operation that uses the transaction handle.
Localized Localize Enables the administrator to enable or disable localization of the server. Selected
Error Server indicates that the server is localized and enabled for such tasks as searching entries in
Messages localized forms, or using AR System Message Catalog to load the message. Clients are
enabled to display localized messages, but clients still have local catalogs, such as the
user.dll. You must select the Localize Server check box to see localized error messages.
Cleared is the default and indicates that the server is not localized. Such tasks as
searching localized forms and the localization of messages are disabled. The server does
not use the AR System Message Catalog form, and messages are shown from the error
catalog. The default message is displayed.
Note: If users in a different locale open a form with localized views before you select this
option, you must flush the mid tier cache after setting this option to make the localized
view available on the web. See Configuring the Cache Settings page (see page 472).
By default, when the BMC Remedy AR System server reads a system message (type 0)
from the AR System Message Catalog form, it caches the message text in memory to
avoid reading the message from the database each time the message is needed. To
modify this default behavior, see the "Localized-Messages-To-Cache" in ar.cfg or ar.conf
options E-M (see page 1086).
Catalog Displays the name of the form the server uses to resolve error messages when "Localize
Form Name Server" is selected. For more information about the AR System Message Catalog form,
see Localizing messages manually (see page 3073).
Filters Maximum Specifies the number of filters that can be performed in an operation. The default and
Filters for recommended number is 10000. Increase this number at your own risk only if you reach
an a limit in your system and you have verified that your workflow is valid.
Operation
Maximum Specifies the maximum number of nested filters and filter guides that execute to prevent
Stack of recursive actions on the server. The default and recommended number is 25. Increase
Filters this number at your own risk only if you reach a limit in your system and you have verified
that your workflow is valid.
Server Server Specifies how the server records server statistics. Select one of the following options: Off,
Statistics Recording the default, do not record server statistics; Cumulative Queue, record a cumulative
Mode statistic that is a combination of all the queue statistics; and Cumulative and Individual
Queue, record a cumulative statistic that is a combination of all the queue statistics as
well as statistics of each queue individually. Information is recorded in the Server
Statistics form, which is installed when you install AR System. See Server statistics for
baseline data (see page 1312).
Recording Specifies how often the server records server statistics. The default is 60 seconds.
Interval Remember that one (Cumulative Queue) or more (Cumulative and Individual Queue)
(seconds) entries are recorded in the Server Statistics form during each interval. If you have a short
interval, many records are created. This can affect the performance of the system and
the size of the database if you configure with too short an interval.
Server Server If the server belongs to a server group, specifies the name of the group. All servers in the
Group Group server group share this setting.
Names
Check Specifies how often the server communicates with other servers in the group. Each
Interval server can register its own status, determine whether any server is delinquent, establish
the parameters needed for sending signals, and determine operational responsibilities.
The default value is 60 seconds, the minimum is 30 seconds, and there is no maximum.
All servers in the server group share this setting, and when it is changed, all the
AR System servers in the group must be restarted.
Preference Preference Specifies where user preferences are read from. The options are User Defined, where
Server Server users can choose whether to use a preference server, and this server might or might not
Option be used depending on whether the Centralized Preference forms are defined; Use This
Server, where users must use a preference server, and this server is an available
preference server; Use Other Server, where users must use a preference server, and this
server is not available as a preference server. See Establishing a mandatory preference
server (see page 1334).
Preload Preload If the number of preload threads is not zero, specifies whether the threads are used only
Tables Tables At at server startup or for all cache reloads from the database. See Setting the Preload
Configuration Init Only Tables Configuration option (see page 403). The values are Yes, if preload threads are
configured (use them only at server startup) and No. If preload threads are configured,
always use them when loading the cache from the database. For information about the
corresponding configuration file setting, see "Preload-At-Init-Only" in ar.cfg or ar.conf
options N-R (see page 1099).
Number of Specifies the number of preload threads used when information is loaded from the
Preload database into the server cache. The maximum value is 30 or twice the number of preload
Threads segments, whichever is lower. The server might reduce the number of threads at runtime
if it determines that threads would be started with no work to do. If this field is set to 0, the
Preload Tables Configuration option is off. For information about the corresponding
configuration file setting, see "Num-Preload-Threads" in ar.cfg or ar.conf options N-R
(see page 1099).
Number of Specifies the total number of preload segments handled by the preload threads. Vary this
Preload setting to balance the load between preload threads and to optimize cache load time. A
Segments good initial setting for this option is 1/3 the number of schemas (forms) in the AR System
server. See Setting the Preload Tables Configuration option (see page 403). For
information about the corresponding configuration file setting, see "Num-Preload-Schema-
Segments" in ar.cfg or ar.conf options N-R (see page 1099).
1. From the BMC Remedy AR System Administration Console, click System > Application >
Users / Groups / Roles > Users. The User form opens in Search mode.
(Click on the image to expand it.)
1. From the BMC Remedy AR System Administration Console, click System > Application >
Users / Groups / Roles > User. The User form opens in Search mode.
(Click on the image to expand it.)
Note
When the tenant applies skins, the skins will be applied to that server's forms and is
limited to that tenant environment. In a mid tier multi-tenant environment, it affects only
the tenant using that server.
1. Create a AR System access control group using the BMC Remedy Mid Tier. Use the Group
form to create the group to which you want to grant access for configuring AR System skins.
For example, you might want to create a group with a name such as AR System Skin
Administrator. For more information about creating a group, see Creating groups (see page
1252).
Note
You can also use an existing group for mapping the Skin Designer role.
2. Open the Roles form in New mode and create a new role for the following applications:
a. AR System Administration
b. AR System Skins
3. For each application, enter the following details:
Field Value
ID -2 -2
Mapped Group Test: AR System Skin Administrator Test: AR System Skin Administrator
Production: AR System Skin Administrator Production: AR System Skin Administrator
For more information about creating and mapping roles, see Creating and mapping roles
(see page 1262).
Note
If the Skin Designer role is already defined for the above applications, modify the role to
add group information by searching the Roles form in Search mode.
When you map the role to the AR System Administrator group, all the users of the group can
access the AR System Skin Administration console. In a browser, the user can access the skin
administration console by clicking AR System Administration > AR System Skin Administration. For
more information about defining skins, see Defining skins (see page 3034) and Applying skins to
form views (see page 3029).
When you want the user's full name to be used as the BMC Remedy AR System login
instead of the user's computer account name. The system uses the alias when
authenticating the user.
When a user's name changes, the user can use the new name to log in to BMC Remedy AR
System but continue to use the same computer account name for authentication purposes.
Field ID 117
Database Length 30
You can set any permissions, including whether the values are optional or required. You can also
create workflow to populate and validate the values in this field.
Important
Be cautious when setting permissions. Typically, the values in this field should be set only
by an administrator or by workflow.
The information in the Authentication Login Name field is accessed when the user logs in to a BMC
Remedy AR System client and the following conditions apply:
These rules apply to all BMC Remedy AR System clients, including those accessing a BMC
Remedy AR System server by using C or Java APIs.
When users belong to specific authentication domains and you do not want to require users
to enter an authentication string when they log in.
When a user's computer account or domain name is subject to changes. Leveraging an
Authentication String Alias enables the user to continue using the same user name to log in
throughout the changes.
To configure an Authentication String Alias, add a character field to the User form in BMC Remedy
Developer Studio and name it Authentication String. Set the field's properties as follows:
Field ID 118
You can set any permissions, including whether the values are optional or required. You can also
create workflow to populate and validate the values in these fields.
Important
Be cautious when setting permissions. Typically, the values in this field should be set only
by an administrator or by workflow.
The information in the Authentication String field is accessed when the user logs in to an AR
System client and the following conditions apply:
The Authentication String Alias field on the User form interacts with the Authentication field in the
Login dialog box according to the following rules:
The value in the Authentication String field on the User form is used instead of the entry in
the Authentication field in the Login dialog box.
For backwards compatibility, if the Authentication String Alias field is not present on the User
form or the value in this field is NULL, the information entered in the Login dialog box is
used for authentication.
These rules apply to all BMC Remedy AR System clients, including those accessing a BMC
Remedy AR System server by using C or Java APIs.
Multiple IP addresses — With the exception of users who have Restricted Read licenses,
nonadministrative users can access a AR System server from only one computer at a time.
This restriction applies to the server, not to an application. For example, if you run the BMC
Remedy IT Service Management (ITSM) Suite on an AR System server, a user accessing
any form in any ITSM application on that server can do so from only one IP address.
AR System administrators (users who have the Administrator group in their Group List on
the User form) can access a server from multiple computers simultaneously.
Note
Wait time — After a user logs out of one computer, the user might need to wait a short time
to make sure the status is cleared before using the same login name to access another
computer.
Session takeovers — A user who is blocked from access can perform a session takeover
through a message dialog box. This can be helpful if someone forgets to log out of a client
at a different location. Only one session takeover is allowed every fifteen minutes for each
user.
Matching user names — In BMC Remedy AR System 6.3, multiple users with the same user
name but different passwords could log in at the same time. In BMC Remedy AR System
7.0.00 and later, multiple users with the same user name cannot log in concurrently if you
use the User form for authentication. If you use external authentication, however, multiple
users with the same user name can log in if they belong to the same groups. (In the cache,
only one session is created, and this session is used for all users who have the same user
name.)
If you try upgrading to BMC Remedy AR System 7.0.00 or later from a 6.3 system in which
you allowed multiple users to have the same user name but different passwords, the BMC
Remedy AR System upgrade scripts fail and generate a message suggesting that you
correct the multiple user name problem.
User licenses
When creating users, you must assign a license type to each user. The type of license a user has
determines the user's ability to access BMC Remedy AR System objects and to perform tasks.
This section contains the following information to assist you with licensing:
License types for users to access BMC Remedy AR System server (see page 1323)
About floating licenses in a license pool (see page 1324)
For more licensing information, see License overview (see page 123) and Working with BMC
Remedy AR System licenses (see page 274).
License Description
type
Read Enables users to search for and display requests within their assigned permissions. Administrators can configure the
BMC Remedy AR System server to enable users with Read licenses to submit requests and to modify requests that
they submit. See Enabling submitters to modify requests (see page 1301).
Restricted Enables users to create, search for, and display requests within their assigned permissions. Users with Restricted
Read Read licenses cannot modify any requests, including their own.
Restricted Read licenses enable the same login account to access BMC Remedy AR System from multiple IP
addresses simultaneously.
You can give guest users a Restricted Read license. See Setting administrative options (see page 321).
Fixed Includes all the capabilities of a Read license, and also enables users (based on the permissions of the groups to
which they belong) to modify and save requests that they did not submit. BMC Remedy AR System administrators
and subadministrators must have a Fixed license. Other BMC Remedy AR System users who consistently need to
modify requests must also have Fixed licenses.
A Fixed license is associated with a user name and is always "reserved" for that user. Users who have a Fixed
license can access the BMC Remedy AR System server at any time.
A user cannot be assigned the same Fixed license more than three times in one week. If this limitation is exceeded,
the user must wait one week from the first assignment of the Fixed license before it can be assigned again.
Floating Includes all the capabilities of a Read license, and also enables users to modify and save data for requests that they
did not submit based on the groups to which they belong. Multiple users can use the same Floating licenses, one
user at a time: they are available on a first-come, first-served basis. This type of license is designed for users who
occasionally need to modify and save requests.
When a user who is assigned a Floating license logs in to BMC Remedy AR System, the user is given a Read
license. When the user attempts to perform a search, modify, or submit operation, BMC Remedy AR System checks
for an available Floating license, and the following occurs:
If a Floating license is available, the user is granted write access to requests. The user retains write access
until the Floating license is released (see page 1324).
If no Floating licenses are available, the user is notified and continues to use the Read license until a Floating
license becomes available.Generally, Floating licenses are shared by all BMC Remedy AR System users.
You can, however, define license pools to reserve a set of Floating licenses for a group of users. This enables
you to prioritize the availability of Floating licenses. For example, you can allocate a number of licenses to
department managers to make sure that they can immediately approve essential requests. Users who do not
belong to this group cannot acquire any of the reserved licenses.
An AR System server license key activates three fixed write licenses (which you might have to
purchase, depending on your sales contract) and unlimited read and restricted read licenses. You
can purchase additional fixed write licenses and floating write licenses from BMC or from an
authorized reseller.
For more information about licensing, see License overview (see page 123) and Working with BMC
Remedy AR System licenses (see page 274).
The operating system password management system can also be configured to lock out users
after too many failed password attempts. Use this method when the user password is stored
external to the User form. For more information, see the Max Number of Password Attempts row in
the table in Setting administrative options (see page 321). The operating system password
management system can also be configured to lock out users after too many failed password
attempts. This method is effective where the user password is stored external to the User form.
If no licenses are available in the pool, a check is made to see if the user is a member of any other
group that has a license pool. If no licenses are available in any pool the user is a member of, a
check is made for floating licenses not associated with any pool. A user is never granted a floating
license from a pool of which the user is not a member.
License pools enable you to give priority to a group that needs licenses more urgently. The group
with the smallest group ID has the highest priority. When a non-reserved floating license becomes
available, it is granted to the next user who needs it, regardless of the priority of that user's access
to the system.
For more information about user groups, see Adding and modifying user information (see page 1246
) and Groups in BMC Remedy AR System (see page 1272).
Note
If the user is accessing BMC Remedy Mid Tier on multiple browser windows, the
token is released only after the user closes the last browser window associated
with the current HTTP session or navigates away from BMC Remedy Mid Tier.
A user does not perform a BMC Remedy AR System operation for the period of time in the
floating license time-out interval. See the Floating License Timeout (hours) row in the
Timeout tab fields table on the Setting timeout options (see page 295) section.
If a timeout occurs in a BMC Remedy Mid Tier session, all the floating licenses
held by the user are released back to the pool.
In addition, administrators can manually release user's license one time in a 24-hour period by
using the following procedure.
1. In a browser, open the BMC Remedy AR System Administration Console, and click System
> Application > Users/Groups/Roles > License Review.
2. From the Category list in the Manage User Licenses form, select Current Licenses.
3. From the License Type list, select Floating. A list of users with the selected license type
appears.
4. From the list of active users, select the appropriate user.
5. Click Release User. The license held by that user is released. Another user can take the
license and start working. If the original user returns, the user cannot get back into the
system if no licenses are available.
Note
If you release a Fixed or Read license, this procedure removes the user from the
list of current users; it does not affect the user's ability to connect to the server.
The next time the user accesses the server, the user obtains the licenses again
and the user's license information reappears.
6. Click Close.
1. In a browser, open the BMC Remedy AR System Administration Console, and click System
> Application > Users/Groups/Roles > License Review. The Manage User Licenses form
appears.
License information
(Click the image to expand it.)
Note
If your User form contains more than 30,000 users, the Server -
Registered Users option does not work well. Instead, search the User
form for a list of registered users.
Server - Invalid Users — Displays the number of users who are locked out of the
browser because of too many bad password attempts. To reset an invalid account,
reset the user's password. To set a maximum number of bad passwords, enter the
number in the Max Number of Password Attempts field in the BMC Remedy AR
System Administration: Server Information form (Configuration tab). To turn the
feature off (unlimited number of bad passwords allowed), set the number to 0 (the
default). You can also check for invalid users by using the driver program with the glu
command. See Using the driver program (see page 3978).
Application - Current Users — Displays the following information for each user
connected to AR System through an Integration System Vendor (ISV) license:
Name of the user
Type of AR System license assigned
Connect time during the current session
Time that the user last accessed the server during this session
Floating license pool
Application - Registered Users — Displays the following information for all users
known to AR System with an Integration System Vendor (ISV) license:
Name of the user
Type of AR System license assigned
Name of the licensed application
3. From the License Type list, select the license type for the category of users that you want to
view. The Write License Pool column shows the name of the current group (pool) from
which the user's Floating license was acquired. At another time, if a license is acquired from
a different pool to which the user belongs, that pool name is displayed.
4. Click Close.
If you customized the User form, these changes might affect your customizations.
These changes enable you to enforce a password policy. See Enforcing a password policy
introduction (see page ).
Using IBM DB2 Universal Database user names and passwords (see page 1328)
Assigning permissions when using SQL queries (see page 1329)
For information about configuration options and parameters associated with specific databases,
see Configuring after installation (see page 271).
When the DB2 database resides on the same computer as the BMC Remedy AR System
(AR System) server, ARAdmin user is not used. You can run the AR System server installer
as root or any other user as long as that user has administrator privileges for the specific
DB2 instance on which you install the BMC Remedy AR System database.
When the DB2 database resides on a different computer from the AR System server, the
database user name, aradmin, must be created in lowercase before installing AR System
server. The database user name is associated with the operating system. For overwrite and
new installations (but not for upgrade installations), this operating system account must exist
before installing AR System server. The password must be AR#Admin#. After the AR
System server is installed, you can change the password.
Because the database user name is associated with the operating system, you must make
password changes in the operating system and set the new password in the AR System
Administration: Server Information form. For more information about this form, see
Configuring after installation (see page 271).
See Using IBM DB2 Universal Database with BMC Remedy AR System (see page 1968) for DB2-
specific information.
Changing the BMC Remedy AR System database user name and password
The BMC Remedy AR System database user (ARAdmin by default) and password (AR#Admin# by
default) are set during the AR System server installation. You can, however, change them to suit
your needs.
2.
BMC Remedy Action Request System 9.1 Page 1328 of 4703
BMC Software Confidential. BladeLogic Confidential.
2. Update the database user name in the database. For more information, see your database
documentation.
3. Update the Db-user option in the AR System Administration: AR System Configuration
Generic UI form.
a. In the AR System Administration: AR System Configuration Generic UI form, from the
Component Name list, select the appropriate component.
b. From the settings table, select the Db-user setting.
c. Change the Db-user value to match the value you specified in step 2, and click Apply.
d. Click Close.
4. Restart the BMC Remedy AR System server.
Use the Database tab in the AR System Administration: Server Information form. See
Configuring after installation (see page 271).
OR
Use the ARSetServerInfo API call. See ARSetServerInfo (see page 3912).
Warning
Note
To change the database password in a server group, change the password in each AR
System server's AR System Administration: Server Information form. Each server
attempts to alter the password in the database, but only the first one changes the
password. Each server updates its configuration file. On database platforms that require
an existing (old) password to perform the change, the server initially logs a failure to the
SQL log as servers (after the first one) have their passwords changed. This occurs
because the subsequent servers do not know that the first server already changed the
password, so they do not supply the correct existing password. The servers recover from
this condition and successfully update the configuration file.
See Using IBM DB2 Universal Database with BMC Remedy AR System (see page 1968) for special
considerations for database user name and password with DB2.
Database User
Oracle ARAdmin
If you run BMC Remedy AR System as one of these users without permission to access the
database, you cannot issue the SQL query.
To access non-BMC Remedy AR System databases, use the database name as part of the SQL
query syntax. For example, for Microsoft SQL Server database:
databaseName.owner.table
acme.ARAdmin.CUSTMR_INFO
See Troubleshooting (see page 4141) for more information about log files.
The logged messages include information about termination of or failed server processes. A
termination entry about a server process also appears for normal shutdown. For example, any time
an AR System server shuts down, a message is written to this file.
See Log entry format (see page 4250) for detailed information about audit records.
Setting Description
Display Last The number of lines that you want to view from the most recent entries in the log. The default is 25.
See BMC Remedy Mid Tier logging (see page 4187) for more information about mid tier logging.
The following table lists the DSO log files for Java.
BMC Description
Remedy
Distributed
Server
Option log
file
ardist. Contains information about a custom distributed pool. Windows log file names In a Windows environment, if the
poolName. name of a distributed pool contains special characters, BMC Remedy AR System replaces those characters with a
log dot (.) in the pool's log file name. Special characters are characters not allowed in Windows file names, such as a
colon (:), forward slash (/), and question mark (?). For example, the log file for a pool named test:dso would be
ardist.test.dso.log. If you then created a pool named test/dso, its log file would be ardist.test.dso.log. To avoid the
confusion that these virtually identical log file names might cause, do not use special characters to differentiate pool
names. UNIX log file names In a UNIX environment, the special characters are allowed in file names. Therefore, if
the name of a distributed pool contains special characters, the characters are included in the pool's log file name.
For example, the log file for a pool named test:dso would be ardist.log.test:dso.
(UNIX) ARSystemServerInstallDir/db/
(Windows) ARSystemServerInstallDir\Arserver\Db
You can change the path or file names of the DSO log files in the AR System Administration:
Server Information form. (See Configuring BMC Remedy Distributed Server Option logging (see
page 4206).)
Note
This mode of debugging can generate a large amount of information quickly. It is not
unusual to have several hundred megabytes of information logged in one day.
If the server is licensed for full text search, the SQL debug mode also logs full text search (FTS)
searches in this file.
<SQL > <TID: 0000000620> <RPC ID: 0000000000> <Queue: Admin >
<Client-RPC: 000000 > <USER: > /* Wed Oct 04 2006 13:18:28.8280 */SQL Trace Log -- ON
<SQL > <TID: 0000002064> <RPC ID: 0000000000> <Queue: Admin >
<Client-RPC: 000000 > <USER: > /* Wed Oct 04 2006 13:18:29.1560 */CONNECT ARSystem,
USER ARAdmin
<SQL > <TID: 0000002064> <RPC ID: 0000000000> <Queue: Admin >
<Client-RPC: 000000 > <USER: > /* Wed Oct 04 2006 13:18:30.5780 */SET
CONCAT_NULL_YIELDS_NULL OFF
<SQL > <TID: 0000002064> <RPC ID: 0000000000> <Queue: Admin >
<Client-RPC: 000000 > <USER: > /* Wed Oct 04 2006 13:18:30.5780 */OK
<SQL > <TID: 0000002064> <RPC ID: 0000000000> <Queue: Admin >
<Client-RPC: 000000 > <USER: > /* Wed Oct 04 2006 13:18:30.5780 */SELECT @@version
<SQL > <TID: 0000002064> <RPC ID: 0000000000> <Queue: Admin >
<Client-RPC: 000000 > <USER: > /* Wed Oct 04 2006 13:18:30.5780 */OK
<SQL > <TID: 0000002064> <RPC ID: 0000000000> <Queue: Admin >
<Client-RPC: 000000 > <USER: > /* Wed Oct 04 2006 13:18:31.0000 */SELECT dbVersion FROM
control
<SQL > <TID: 0000002064> <RPC ID: 0000000000> <Queue: Admin >
<Client-RPC: 000000 > <USER: > /* Wed Oct 04 2006 13:18:31.3900 */OK
<SQL > <TID: 0000002064> <RPC ID: 0000000000> <Queue: Admin >
<Client-RPC: 000000 > <USER: > /* Wed Oct 04 2006 13:18:31.3900 */SELECT MAX(serverId)
FROM server_cache
<SQL > <TID: 0000002064> <RPC ID: 0000000000> <Queue: Admin >
<Client-RPC: 000000 > <USER: > /* Wed Oct 04 2006 13:18:31.7500 */OK
The SQL log file includes an "OK" line that displays the end time for each transaction that is logged.
If an SQL error or warning is encountered as a result of the command, the command is followed by
another line with the same header, but the SQL command is replaced with *** ERROR *** or **
** WARNING ****. The text of the error or warning from the database follows. This information
associates an operation with the user who performed the operation, and is useful for identifying
database issues.
Users can set individual preferences for the behavior and display characteristics of the clients they
use. These preferences are stored centrally (on a designated preference server).
Centralized preferences help users who want to have the same settings and customizations
available when they use multiple computers. Users who log in to web clients must use centralized
preferences.
Preference forms
AR System Stores preferences for web clients. Administrators can set the value of the fields in the AR System User
User Preference form (see page 1336)by using the PERFORM-ACTION-SET-PREFERENCE Run Process command
Preference (see page 2764).
form
AR System (Mid tier only) Stores searches that users create and save for a form in a browser. See:
Searches
Preference Types of browser searches for your end users (see page 2885)
form Security administration (see page )
AR System Stores preferences for BMC Remedy Developer Studio and BMC Remedy Data Import. By default, this form has
Administrator administrator permissions only. You might want to define subadministrator permissions (see page 1268). Display
Preference preferences and the list of login servers are stored in the AR System User Preference form. Developer Studio
form and Data Import users can also access these preference settings in the Options dialog box (choose Window >
Preferences). The changes made here are saved to the AR System Administrator Preference form.
To access these forms through the AR System Administration Console, click User Preferences or
Admin Preferences.
In BMC Remedy User Tool, If the preference forms are not present on the server or if the user
does not choose a preference server, the local ar.ini file is used to determine their preferences.
If the preference forms are not installed, you can import the definition files. For more information,
see Exporting and importing definitions (see page 3265).
Note
As a BMC Remedy AR System administrator, you can designate a mandatory preference server
that stores the system preference information. This configurable server setting provides a
mechanism to enforce the use of centralized preferences across an organization.
1. In a browser, open the AR System Administration Console, and click System > General >
Server Information.
The AR System Administration: Server Information form appears.
2.
BMC Remedy Action Request System 9.1 Page 1334 of 4703
BMC Software Confidential. BladeLogic Confidential.
Important
If Use This Server or Use Other Server is selected, the local preferences
are disabled. The system tries to connect to the designated preference
server. If no preference server is found, the default preference values are
used instead of the local ar.ini file.
For more information about the effects of these choices, see Behaviors associated
with preference server configuration (see page ).
4. Click OK.
Leaves the Preference The local preferences are used (ar.ini file).
Server field blank
Specifies a valid The system connects to the preference server, and the Accounts list is updated to reflect the list of
preference server servers specified on the Server List setting.
Leaves the The system searches the Accounts list for a server designated as a preference server. If one is found, the server
Preference name is written to the Preference Server field of the Login dialog box. In addition, the accounts list is updated to
Server field reflect the list of servers specified on the Server List setting for that preference server.
blank
Note
The user receives this warning: 50176 - A preference server has been selected based on the
Administrator settings.
If no preference server is available, the default preference values are used and no session specific changes to the
preferences are stored. (Local preferences are disabled.)
Specifies a The system connects to the preference server, and the Accounts list is updated to reflect the list of servers
valid specified on the Server List setting for that preference server.
preference
server
Specifies an The system searches the accounts list for a server designated as a preference server. If one is found, the server
invalid name is written to the Preference Server field of the Login dialog box. In addition, the accounts list is updated to
preference reflect the list of servers specified on the preference server.
server
Note
The user receives this warning: 50174 - The preference server specified is invalid. Another preference
server has been selected.
If no preference server is available, the default preference values are used and no session specific changes to the
preferences are stored. (Local preferences are disabled.) The user receives this warning: 50175 - The preference
server specified is invalid. User preferences will not be used.
Field Description
Name
Login The user's login name. Lets the administrator create, search for, and modify preferences for a specific user by
Name entering that user's login name in this field. Users can search for and modify their own preference records. The
default setting is $USER$.
Short Lets the administrator create, search for, and modify preferences based on a value in this field. The default setting
Description is Preference entry for $USER$.
Create The date the record was created. This field is display-only.
Date
Modified The date the record was last modified. This field is display-only.
Date
Last The login name of the user who last modified the record. This field is display-only.
Modified
By
Note: When adding image buttons to a form, you must add a label for the button image so
that screen readers can read the ALT tag for the image. When the No Vision option is set
in user preferences, the screen reader uses the label text to read the ALT tag.
Accessible Designates the type of nonvisual feedback that applies to workflow for this view. The Legacy*
Message options are
No Action — No messages are shown for accessibility. Active link message actions
of the type Accessible are ignored.
Message Action — Displays accessibility messages defined by the active link
message action of type Accessible.
All Actions — Displays accessibility messages to reflect visual changes on the
page as well as accessible messages defined by an active link message action of
the type Accessible.
Accessibility messages are displayed for visual changes caused by Change Field and Set
Field active link actions, and other user actions such as table refresh. These messages
reflect the visual changes that the user would have experienced otherwise. If a field is
hidden, changes caused by these actions are ignored.
Note: These options are not used in the BMC Remedy Mid Tier 6.3 and later.
* Legacy = The field is available for legacy environments that use BMC Remedy User, which is no
longer shipped with BMC Remedy AR System.
Tip
No Vision users might need more time to traverse forms, so increase the Session
Timeout in Minutes value on the Web tab. See Setting the Web tab (see page ).
Form Default Specifies the view to be used as the default for all forms. Legacy*
Form View
Note: If the user enters a view name that does not exist, BMC Remedy AR System
determines which view best fits. This might not be the default view.
Open Specifies the extension to be used as the default for all forms opened from other forms. Legacy*
Window
View Note: If the user enters an extension that does not exist, BMC Remedy AR System
determines which view best fits. This might not be the default view.
Extension
Note: This option is available only if the user is logged in as an administrator or sub
administrator to an active server.
Table Refresh Specifies whether the data in a table field is refreshed automatically every time a form is Web
Fields Content on displayed.
Display
Note: The user can refresh the table manually by clicking on it.
Report Report Specifies the name of the server where the following reporting forms reside: Legacy*
Server
ReportType
ReportCreator
Report
ReportSelection
The server name also serves as the home for report definition files created. This entry is
necessary when the server that stores the reporting forms is different from the server that
stores the data to be reported on. This field is blank by default.
ODBC Use Specifies whether to replace special characters with underscores when running reports. Legacy*
Underscores Using underscores is important if the user is running Crystal Reports and field or form
names contain special characters.
Result Alert Sort Displays the last column on which the user sorted a result or alert list. The user can specify Legacy*
View a value in this field.
Sort Criteria Displays the value set when the user chooses Actions > Sort Options and specify values. Legacy*
The user can set sort options on a per-form basis.
* Legacy = The field is available for legacy environments that use BMC Remedy User, which is no
longer shipped with BMC Remedy AR System.
Listen Port Port Number Designates the port on which to listen for alerts. N/A*
Logging Enabled Logging Designates whether logging should occur for Alert. N/A*
Web
Open Alert List Designates which application should be used to open the Alert List. The
using options are
AR System User
Web
Server Designates the server to be used to open the Alert list. N/A*
On Startup Display Alert Designates whether to display alert information when received. N/A*
Message
Flash Icon Designates whether to flash the Alert icon when an alert is received. N/A*
Run Process Designates whether to run a process when an alert is received. N/A*
* N/A = The setting does not apply to a particular client. The setting applies to activities such as
logging or other clients.
Confirm After Creating a New Defines whether a confirmation appears after a request is created. The options Web
Request are
When Deleting a Defines whether a confirmation appears when the user tries to delete a report. Legacy*
Report The options are
Yes — A dialog box appears when the user tries to delete a report.
When Deleting a Defines whether a confirmation appears when the user tries to delete a saved Legacy*
Saved Search search. The options are
When Deleting a Defines whether a confirmation appears when the user tries to delete a macro. Legacy*
Macro The options are
* Legacy = The field is available for legacy environments that use BMC Remedy User, which is no
longer shipped with BMC Remedy AR System.
Table Table Field Information about a table field that BMC Remedy AR System saves when the user Web
Field Column changes the size of columns in the table field, including the server name, form name,
Width table field ID, column ID, and the size of the column.
Table Field Interval at which tables automatically refreshes (in minutes). Valid values are 0-99. Web
Refresh
Interval
Schema Column Information about a results list that BMC Remedy AR System saves when the user Legacy*
Width changes the column size in a results list.
Column Information about a results list that BMC Remedy AR System saves when the user Legacy*
Order reorders the columns in a results list.
Grid Height Parameter set in Customize View mode by choosing Layout > Grid Size and specifying a Legacy*
value.
Grid Width Parameter set in Customize View mode by choosing Layout > Grid Size and specifying a Legacy*
value.
App Flag that specifies whether to display extra field name and ID information in the field Help Legacy*
Development text. Values are:
Mode
1 — Display the extra field information.
0 — (Default) Do not display the extra field information.
Max Size Upper limit for the number of items a menu can have. Used for currency and edit field Legacy*
Base Menu menus.
List Indent Space in pixels on left before list items in list menu. Legacy*
Items When smart menus is selected, the number of items where menus change from pop-up to Web
Threshold list menus.
Level When smart menus is selected, the number of levels where menus change from pop-up to Web
Threshold list menus.
* Legacy = The field is available for legacy environments that use BMC Remedy User, which is no
longer shipped with BMC Remedy AR System.
** N/A = The setting does not apply to the web client. The setting applies to activities such as
logging or other clients.
Search Search Designates the directories where the user can access custom reports and macros. The path Legacy*
Path is typically userHomeDirectory/arHome/arcmds. To change the search path, the user must
enter the entire directory name for the directory to which the user wants access. To specify
more than one directory, the user must separate each directory name with a semicolon.
Note: If the user deletes all directories from the search path, the user cannot access any
custom reports or macros.
Num Items The number of recently used items. The user can specify from 4 to 9 items. The default is 5. Legacy*
in Recently This setting applies to these menu lists in the browser:
Used List
File > Recent New Forms
File > Recent Search Forms
File > Recent Requests
File > Recent Entry Points
Actions > Recent Searches
Specifies the amount of time (in milliseconds) that the system waits to display a tool tip after Web
the user hovers over an object.
On On New Defines how fields are set in a form opened in New mode. The options are: Web
New
Set Fields to Default Values — (Default) Fields are filled with default values when a
new form is opened or when a form is reset after a request is submitted.
Keep Previous Field Values — Fields are filled with the previously used values when
that form is reset after a request is submitted.
Clear All Fields — All fields are cleared when a new form is opened or when a form is
reset after a request is submitted.
When no option is selected, the default (Set Fields to Default Values) is used.
On On Search Defines the action a form opened in Search mode takes after the user performs a search, Web
Search displays the records in modify or display mode, and then returns to the search form without
closing the form. The options are:
Set Fields to Default Values — Fields are filled with default values.
Keep Previous Field Values — Fields are filled with previously used values.
Clear All Fields — (Default) All fields on search forms are cleared.
Show Defines whether the user views only the results list after every search. If the user selects No, Web
Result List the results list and a detail pane are displayed after every search.
Only
Limit Defines whether the number of search results returned is limited. The options are: Web
Number of
Items No — (Default) All results are returned.
Returned Yes — The number specified here is returned. When the user selects Yes, the next
field is enabled, and the user can specify the number of search results returned. The
default value is 1000.
The Max Entries Returned by the GetList server setting in the Configuration tab of the AR
System Administration: Server Information form can override this preference. BMC Remedy
AR System uses the lesser value.
On Show Defines whether to show the advanced search bar when a new window is opened. Web
Open Advanced
Search Bar
Maximize Defines whether a form is maximized when it is opened. If the user selects No, the form fills Web
Window only a portion of the browser.
Diary Show Most Defines the order in which entries appear in the diary field of a form. The options are: Web
Field Recent First
Yes — Diary entries are listed in descending order by date, starting with the most
recent entry.
No — (Default) Diary entries are listed in ascending order by date, starting with the
earliest entry.
Default — See No.
Display As Specifies how menus attached to a character field are displayed. The options are: Web
To change these thresholds, use the Item Threshold and Level Threshold options on the Edit
tab. See Setting the Edit tab (see page ). If no option is selected, the default is used.
Expand at Determines whether field menus are expanded when the menu is opened. The options are: Legacy
Startup
Yes — All levels of the menu are displayed when the menu is opened. (This is not
supported in browsers.)
No — Only the first level is displayed when the menu is opened.
Flat Look Designates whether forms have a flat or 3-D look. The options are: Legacy*
On Forms
No — Use shadows to give the form a 3-D feel.
Yes — Do not use shadows. This gives the form a "flat" appearance.
* Legacy = The field is available for legacy environments that use BMC Remedy User, which is no
longer shipped with BMC Remedy AR System.
Home AR Designates the name of the server that contains your home page. For more information, See Web
Page Server Configuring home page preferences (see page 3057).
Form Designates the name of the form to be used as the default home page when the user logs in. For Web
Name more information, see Configuring home page preferences (see page 3057).
Object Enable, Show All — The Object List lists all the applications, guides, and forms on the
List servers that the user is logged in to.
Enable, Show Only Entry Points — The Object List lists only those entry points for which the
user has permissions.
Disable — Access to the Object List is not possible. The File > Open > Object List menu
item and toolbar button are disabled.
* Legacy = The field is available for legacy environments that use BMC Remedy User, which is no
longer shipped with BMC Remedy AR System.
Locale User Designates the language displayed on the user's system, in the format language _country, where Web
Locale language is the language code (such as fr for French or en for English), and country is the two-
letter country code (such as FR for France or US for United States). Some sample entries are:
Time Defines the time zone displayed on the user's system. Select a time zone from the menu, for Web
Zone example, Asia/Tokyo, America/New York, or Europe/Paris. Any ICU (International Component for
Unicode) format is accepted. This field is clear by default.
Display Defines the format in which the date and time appear. According to Windows format, the options Legacy*
Date are:
/Time
Style Short
Long
Custom
This setting is platform-independent and is not automatically the same as any preferences set in
the Windows Control Panel. Use a predefined Windows format. The default is Short.
Custom Defines the custom Date/Time length format. This field is active only when Custom is selected Legacy*
Date from the Display Date/Time Style menu list. To customize separators and other options, the user
/Time must use a predefined Windows format or a customized Windows format. The EEE and EEEE
Format day formats do not work in this field. For example, if the user enters EEEE, MMMM dd, yyyy, the
day of the week displays in the browser as EEEE, not the actual day (for example, Tuesday).
This field is clear by default.
Currency The type of currency to be applied for this locale (for example, USD for United States dollars). If Web
currency is specified here, it overrides the developer-defined Initial Currency Type field property.
If this field has a default value, it overrides the User Preference and the Initial Currency Type.
* Legacy = The field is available for legacy environments that use BMC Remedy User, which is no
longer shipped with BMC Remedy AR System.
Client Macro Designates whether the use of macros on the client is logged. Legacy*
Active Links Designates whether the use of active links on the client is logged. Mid tier
Timings (Web) Designates whether the time of a request and responses between browser, mid tier server, Mid tier
and BMC Remedy AR System server are logged.
Server API Designates whether use of APIs on the server is logged. Mid tier
Filter Designates whether use of filters on the server is logged. Mid tier
Log File Path Defines the path to the log file. Mid tier
* Legacy = The field is available for legacy environments that use BMC Remedy User, which is no
longer shipped with BMC Remedy AR System.
For more information about logging, see Analyzing logs (see page 4239) and Tracking client caches
(see page 4169).
After you enable logging, the information log appears on the Workflow Logging window. If
you want to delete the generated logs, click the Clear button that is displayed at the top of
the Workflow Logging window.
Open Dialog Shortcut Dir Indicates the directory to use when creating a shortcut. This value is used when the user Legacy*
selects an item from the Open Object List and right-clicks to create a shortcut or when
the user right-clicks a results list and chooses Send To > Desktop.
Performance Preferences that relate to how the browser caches forms. Definitions (for forms and Legacy*
related workflow) are loaded into memory from the .arf and .arv cache files and retained
as long as these files are current. This enables subsequent loads of the same form to
load more rapidly since the definitions do not have to be re-read from the disk each
time. To reduce the amount of memory used, several checks are made periodically to
see if definitions can be removed from the memory cache. During these checks, the
following calculation is performed:
Duration Since Last Used = Current Time - Time Definition Last Used
Max Age In If the Duration Since Last Used value is greater than the preference set for Max Age In Legacy*
Minutes Minutes, the form definition can be removed from the memory cache.
Min Age In If the Duration Since Last Used value is greater than the preference set for Min Age In Legacy*
Minutes Minutes, the form definition can be removed from the memory cache. If the system is
approaching the memory limit (Percent of Memory), the Duration Since Last Used value
is taken in conjunction with the Min Age In Minutes value to determine whether the
definition can be removed from the memory cache.
Usage Each time a form is opened, the system increments a usage count. As the memory limit Legacy*
Threshold is approached, the Usage Threshold value is compared to the usage count to determine
if the definition can be removed from the memory cache.
Percent Of Represents a memory threshold. It is compared to the percent of memory used for the Legacy*
Memory memory cache to determine if the memory limit is reached. This check is used in
conjunction with the Usage Threshold and the Min Age In Minutes values.
View Show Designates whether the macro bar is displayed when the browser starts. Legacy*
Macro Bar
Show Designates whether the status bar is displayed when the browser starts. Legacy*
Status Bar
Show Designates whether the toolbar is displayed when the browser starts. Legacy*
Toolbar
Disable Designates whether items under BMC Remedy on the Web under the main Help menu Legacy*
Web Help in the browser are disabled.
Save Designates whether to save information about open New and Search windows in the Legacy*
Window On browser when you close the tool.
Close
Query On Designates whether you can initiate a query by pressing the Enter key in the Request ID Legacy*
Return field.
Close After Designates whether to close a New window after a request is submitted in the browser. Legacy*
Submit
Result Designates which panes open when you double-click a record in a results view. The Legacy*
Open On options are:
Double-
Click Value greater than zero — Open the form with a results pane and a detail pane.
0 (Zero) — Open the form with a detail pane only.
* Legacy = The field is available for legacy environments that use BMC Remedy User, which is no
longer shipped with BMC Remedy AR System.
Recent Applications, Guides, etc. A list of recent applications or guides opened in the browser. Legacy*
Recent Entry Points A list of recent entry points opened in the browser. Legacy*
* Legacy = The field is available for legacy environments that use BMC Remedy User, which is no
longer shipped with BMC Remedy AR System.
Default Right Margin Defines the number of blank characters from the left or right edge of the page. The
Margins default for the left and right margin is 0 characters.
Top Margin Defines the number of blank lines from the top or bottom edge of the page. The default Web
value for the top and bottom margin is 1 line.
Bottom Margin
Default Column Titles Defines the default characters to separate column titles, columns, or requests, Web
Separators respectively. By default, column titles are separated by hyphens (-), and columns and
Column requests are separated by a blank space. You can use any of these special characters:
Request
\b (backspace)
\n (return)
\t (tab)
*
* (backslash)
** nnn (ASCII character)
Default Orientation Defines whether the default page is in Portrait or Landscape mode. Web
Page Size
Use printer Designates whether the default page size should correspond to the default printer page Web
default page size.
size
Lines Per Page Designates how many lines of text are printed on each page. The default value is 66. Web
Chars Per Line Designates how many characters are printed on each line. The default value is 80. Web
Misc. Column Title Per Designates a default value for how often column titles appear in a report. The options Web
Default are:
Page Break Per Designates a default value for how often page breaks occur in a report. The options are: Web
ODBCReportDot Indicates whether the ODBC driver should replace the dot in Crystal Report field names. N/A*
The options are:
* N/A = The setting does not apply to the web client. The setting applies to activities such as
logging or other clients.
Report Crystal Designates an application for viewing Crystal Reports. Options are Web
Report
Viewer Java (using browser Oracle VM)
Java (using Java Plug-in)
ActiveX
Netscape Plug-in
HTML with frames
HTML without frames (the default)
When no option is selected, the value that the administrator sets is used.
Note: Crystal Reports Server 11 and Business Objects 11 support only the DHTML viewer, so
do not select the Java, ActiveX, or Netscape Plug-in options. Crystal Enterprise 10 supports all
viewers.
Alert Refresh Specifies the interval, in minutes, that passes between queries to the Alert Events form. The Web
Interval default value is 0. The alert list displays the user's alerts by querying the Alert Events form that
contains the user's alerts.
Alert Specifies which servers contribute alerts to a web-based alert list. The administrator can enter Web
Servers the server names to retrieve alerts from this field. The server names must be separated by the
comma ( , ) delimiter. This field is clear by default.
Date Display Specifies the format in which the date and time appear. Options are Web
/Time Date
Text /Time Short
Style Long
(Web) Custom
The formats adhere to the ICU (International Component for Unicode) format. The format is
platform-independent and is not automatically the same as preferences set in the browser, or as
any preferences set in the Windows Control Panel. The user must use a predefined ICU format
or customize an ICU format to set web view Date/Time appearances. The default is Short.
Custom Specifies the format of date strings to be displayed in the browser if the user selects Custom Web
Date from the Display Date/Time Style (Web) menu. The user can add a forward slash (/), dash (-) or
Format a period (.) as separators. This field is clear by default. For more information about date formats,
see AR System server components and external utilities. (see page )
Custom Specifies the format of time strings to be displayed in the browser if the user selects Custom Web
Time from the Display Date/Time Style (Web) menu. The user can add a semicolon (:), dash (-), or a
Format period (.) as separators. This field is clear by default. For more information about time formats,
see AR System server components and external utilities. (see page )
Session Web
Session Specifies the number of minutes after which a session times out. The default is 90 minutes. The
Timeout user can set the session timeout for longer than 90 minutes, and this setting overrides the
in session timeout in the General Settings page of Mid Tier Configuration Tool.
Minutes
Animation Animated Specifies whether animated field effects (which show conditions such as state transition) are Web
Effects enabled.
* Legacy = The field is available for legacy environments that use BMC Remedy User, which is no
longer shipped with BMC Remedy AR System.
MM/dd/yyyy Month, Day, Year (leading zero for single-digit months, leading zero for single-digit days, four- 01/01/2009
digit year) 01/15/2009
MM/dd/yy Month, Day, Year (leading zero for single-digit months, leading zero for single-digit days, two- 01/01/09
digit year) 01/15/09
MM/d/yyyy Month, Day, Year (leading zero for single-digit months, four-digit year) 01/1/2009
01/15/2009
MM/d/yy Month, Day, Year (leading zero for single-digit months, two-digit year) 01/1/09
01/15/09
M/dd/yyyy Month, Day, Year (leading zero for single-digit days, four-digit year) 1/01/2009
1/15/2009
M/dd/yy Month, Day, Year (leading zero for single-digit days, two-digit year) 1/01/09
1/15/09
dd/MM/yyyy Day, Month, Year (leading zero for single-digit days, leading zero for single-digit months, four- 01/01/2009
digit year) 15/01/2009
dd/MM/yy Day, Month, Year (leading zero for single-digit days, leading zero for single-digit months, two- 01/01/09
digit year) 15/01/09
dd/M/yyyy Day, Month, Year (leading zero for single-digit days, four-digit year) 01/1/2009
15/1/2009
dd/M/yy Day, Month, Year (leading zero for single-digit days, two-digit year) 01/1/09
15/1/09
d/MM/yyyy Day, Month, Year (leading zero for single-digit months, four-digit year) 1/01/2009
15/01/2009
d/MM/yy Day, Month, Year (leading zero for single-digit months, two-digit year) 1/01/09
15/01/09
yyyy/MM/dd Year, Month, Day (four-digit year, leading zero for single-digit months, leading zero for single- 2009/01/01
digit days) 2009/01/15
yyyy/MM/d Year, Month, Day (four-digit year, leading zero for single-digit months)
2009/01/1
2009/01/15
yyyy/M/dd Year, Month, Day (four-digit year, leading zero for single-digit days) 2009/1/01
2009/1/15
yy/MM/dd Year, Month, Day (two-digit year, leading zero for single-digit months, leading zero for single- 09/01/01
digit days) 09/01/15
yy/MM/d Year, Month, Day (two-digit year, leading zero for single-digit months) 09/01/1
09/01/15
yy/M/dd Year, Month, Day (two-digit year, leading zero for single-digit days) 09/1/01
09/1/15
Format Example
dd MMMM, yy 01 January, 09
dd MMM, yy 01 Jan, 09
d MMMM, yy 1 January, 09
d MMM, yy 1 Jan, 09
MMMM d, yy January 1, 09
Format Example
MMM d, yy Jan 1, 09
Day formats
The following table lists the available day formats in AR System User Preference form.
Day formats
EEEE Long day format. The day is displayed in full. Friday, Thursday
Note
(Japanese environment only) On the Web tab of the AR System User Preferences form,
do not use the following format in the Display Date/Time Style (Web) field with the
Custom setting in a Japanese environment: EEEE, MMMM dd, yyyy Otherwise, the BMC
Remedy Mid Tier returns ARERR 9376 when a browser user tries to modify an entry in
any form.
Time formats
The following table lists the available time formats available in the AR System User Preference
form.
Time formats
h:mm:ss a Time in 12-hour format (no leading zero for single digit hours) 1:23:45 AM, 10:23:45 PM
hh:mm:ss a Time in 12-hour format (leading zero for single digit hours) 01:23:45 AM, 10:23:45 PM
H:mm:ss Time in 24-hour format (no leading zero for single digit hours) 1:23:45, 22:23:45
HH:mm:ss Time in 24-hour format (leading zero for single digit hours) 01:23:45, 22:23:45
Format Example
Format Example
Related topics
The administrator or browser users can set preferences by updating the AR System User
Preference form, which is available at the following case-sensitive URL:
The BMC Remedy Mid Tier does not use the operating system locale settings. It uses the
preference records created in the AR System User Preference form if the AR System server on
which the form resides is enabled as a preference server. (For details about the fields on each tab
in this form, see Setting the AR System User Preference form (see page ).) If a user does not
have a preference record, the default Java settings for the operating system's locale are used.
Conversely, the browser honors operating system locale settings when the user is not using a
preference server and when no locale is set in the Options dialog box in the browser. The following
field types use the operating system's locale information when parsing:
Date/Time field
Date field
Time field
Currency field
Real Number field
Decimal Number field
Diary field and the date and time stamp for each entry
Note
Users who log in to the browser can choose to use operating system locale settings or
centralized preferences. (Operating system locale settings are used when no preference
server is designated or available.) Regardless of whether centralized preferences or
operating system locale settings are used, multiple users can use the same client
computer with individual preferences and customizations. See Setting user preferences
(see page ).
Business Time 2.0 enables you to define periods of time as available or unavailable. To define
business time, you can use time segments such as workdays, holidays, or any other activity that
occurs in a business environment.
After you define the time segments, you can use the business time commands in your workflow.
The BMC Remedy AR System Business Time functionality is applicable to global enterprises with
multiple regional centers:
Businesses can use the availability function to block periods of time by region. For example,
a customer might want to make certain functions unavailable for Japanese offices during
Golden Week in Japan.
Businesses can use the Business Time function according to their own rules for shift work
during work days and during holidays. They can define the different shifts (for example, the
evening shift and the morning shift) and the holidays to capture their work environment.
Different offices can set up different holiday and break schedules. A central administrator
can enter and manage business time and holidays for all international locations in different
time zones.
The Business Time Segment form is the main business time form and is used to define segments
of time. These time segments can then be used to define any kind of activity.
Note
If you used the Business Time Holidays and Business Time Workdays forms in prior
releases, you can still use them to define holidays and workdays with the old set of
Business Time commands. However, in Business Time 2.0, all activities (including
holidays and workdays) are defined in the Business Time Segment form, and you must
use a new set of commands to work with the time segments defined in that form. The
"offset" that was previously available in the Business Time Workdays form is now
available in the Business Time Segment form. The Business Time 2.0 commands provide
the same functionality as the old Business Time commands (Add, Subtract, and Diff);
however, all future enhancements will be made to Business Time 2.0 only.
You can use the following summary of system forms to define Business Time 2.0:
To use the Business Time 2.0 commands (see Business Time 2.0 commands (see
page 1374)), you must create entries in the Business Time Segment form. The
remaining forms are optional that you can use to store entities and relate them to the
Business Time Segment entries.
These forms contain fields with IDs that BMC Remedy AR System recognizes. You
can change the name of the forms, but do not make copies of them because the AR
System server will not be able to find the correct form for finding business schedules.
Note
If you upgrade your Business Time objects from BMC Remedy AR System
5.0, delete the filter BusWk:ValidateTimes02. This filter is not intended for
use on BMC Remedy AR System versions 5.1 and later.
The Business Time Segment form represents a window of time that can be described as a one time
activity (which can span multiple days) or a recurring activity (which cannot span multiple days; it
must be scheduled within a 24-hour period).
In Business Time 2.0, time segments are defined using "levels". Levels 1 and 2 are special levels.
Level 1 time segments are treated as available time (workdays), and Level 2 time segments are
treated as unavailable time (holidays). If no Level 1 time segments are defined, all days are
considered available.
If holidays are defined at Level 2, they can be overridden by time segments at Level 3 and above.
If you do not want to override holidays, define them at a high level. For more information, see
Understanding levels (see page ).
To define business time and implement it in your BMC Remedy AR System application, follow this
process:
1. Define any combination of time segments, business hours, and business holidays.
For workdays, define available time segments at Level 1.
For holidays, define unavailable time segments at Level 2 or higher.
Define other time segments at Level 3 or higher.
2. Add business time commands to workflow in your application.
3. Test the application.
Using the list of Time Segment IDs, Workday IDs, and Holiday IDs, the Business Time component
in AR System builds a list of available and unavailable time windows for every day in the list of IDs.
For example, consider an entity that has a Workday schedule from 8:00 A.M. to 5:00 P.M., and two
activities associated with it. The first time segment defines an available time window at a Level 3
from 10:00 A.M. to 2:00 P.M., and the second time segment defines an unavailable time window at
Level 4 from 1:00 to 4:00 P.M. The Business Time component in BMC Remedy AR System
computes the final time window list for a day as shown in the following figure.
The application commands described in Business Time 2.0 commands (see page 1374) work from
the final list.
Understanding levels
Levels define a priority between different time segments, and a higher level time segment takes
precedence over lower-level time segments. Levels can be from 1 to 1000.
Levels 1 and 2 have special meaning. Level 1 time segments are "available" and can be used to
define workdays. Level 2 time segments are "unavailable" and can be used to define holidays.
Other time segments at Level 3 and above can be either "available" or "unavailable."
Note
Because higher levels of available segments can override Level 2 time segments, if you
do not want to override holidays, define holidays at a level higher than all other levels.
For all Business Time commands, a higher-level time segment takes precedence over lower-level
time segments, except for the Application-Bus-Time2-Get-Free-Window (see page 1378) command.
For same-level time segments, the order of overlapping activities is not guaranteed. The business
component in BMC Remedy AR System determines the final list for these time segments in the
order they are retrieved.
1.
BMC Remedy Action Request System 9.1 Page 1363 of 4703
BMC Software Confidential. BladeLogic Confidential.
2. In the ID field, enter a unique identifier. Use this identifier to reference the time segment in
workflow.
The identifier can be non-unique in special cases. For more information, see Migrating
Workdays and Holidays to the Business Time Segment form (see page ).
3. In the Description field, enter a description for the time segment.
4. In the Availability field, select Available or Unavailable.
5. For the Enable option, select Yes to enable the time segment.
Do not select Yes if you want to temporarily disable the time segment.
6. In the Level field, select a level.
Business Schedule Activities have a default level of 3, but you can change this level to any
number from 1 through 1000.
If the schedules for two activities or business hours and holidays conflict, the event with the
highest number takes priority.
See Understanding levels (see page 1363) for more information about levels.
7. In the Category field, enter a description for the category.
This field helps determine what type of schedule time segment the item is (for example,
blackout, maintenance, and so on.) Although it is not a required field, it can help you
categorize your time segments.
8. From the Timezone list, select a time zone.
See Using time zones (see page ) for more information.
The Offset field remains on the form for backward compatibility purposes. For new business
time segments, use the Timezone field.
9. In the Action field, select one of the following options:
Create as Described — Creates the scheduled time segment without checking to
determine whether the Start Date and Time and the End Date and Time conflict with
that of another scheduled time segment. This option creates a time segment with a
status of Published. It applies to both One Time and Recurring duration types.
Create Next Free — Finds the next free date and time and automatically creates the
scheduled time segment, making sure that no conflicting time slot exists. If the
specified Start Date and Start Time, and End Date and End Time are not available,
the time segment is scheduled for the next available time slot. This option creates a
time segment with a status of Published. It applies only to the One Time duration
type.
Note
To find conflicting items for the Create Next Free and Find Next Free
options, add items to the Non-Conflicting Activities field. If you do not, the
time segment you originally entered is used. See step 15 (see page 1366) for
more information.
Find Next Free — Finds the next free time slot based on the Start Date and Start
Time and the End Date and End Time, and puts the value into the Next Free Date
/Time field. This option creates a time segment with a status of Draft. It applies only
to the One Time duration type.
Publish — Changes the status from Draft to Published so the time segment can be
used by business time application commands.
Remove — Mark the scheduled time segment to be deleted in an escalation that runs
nightly.
Draft — Changes the status from Published to Draft so changes can be made to the
time segment. (You cannot change a record after it is published. First, move it to Draft
and save it. Then, make your changes.)
When you select an Action, the status of Draft, Published, or Remove appears in the
read-only Status field. A status of Draft indicates that the time segment can be
modified, but not used by business time application commands until the status
changes to Published.
10. In the Duration Type field, select One time to create a single occurrence of the time segment.
To create a recurring business time segment, see Defining a recurring time segment (see
page ).
11. Enter the Start Date, Start Time, End Date, and End Time for the duration of the time
segment.
If your day ends at midnight, select the End of Day check box. Then, any value in the End
Time field is ignored, and the day ends at midnight.
12. In the Earliest Start Time field, enter the earliest preferred start time for which to schedule
the time segment.
The search for a start time starts with the Start Date and Start Time and find the first
available time with the specified duration. If no time slot is found within the same day, it
continues to the next day, starting after the Earliest Start Time. If this field is blank, the
search for the next available time continues from 12:00 A.M. of the next day if necessary.
13.
BMC Remedy Action Request System 9.1 Page 1365 of 4703
BMC Software Confidential. BladeLogic Confidential.
13. In the Latest End Time field, enter latest preferred time by which the time segment should
end.
14. In the End Date Search Range field, enter the last date to search for an available time slot
within the specified Start Date and End Date. (The default is the End Date plus six months.)
The Start Date Search Range field is set to the Start Date and Start Time.
15. In the Non Conflicting Activities field, enter the IDs of the Business Time Segment, Business
Times Workdays, and Business Time Holidays definitions to check for schedule conflicts.
16. If you selected Find Next Free as the Action in the top portion of the form, click in the Next
Free Date/Time field and press Enter to find the next available time slot.
The next free period for the time segment appears in the Next Free Date/Time field. If the
value is the same as the Start Date and Start Time, that time is available. If the time is
different, the original time that was specified for the Start Date/Time was not available and
the value represents the earliest available time.
17. Save the form.
18. View the time segment.
19. If this time slot is not acceptable:
a. Select the Find Next Free option.
b. Search for the next free time slot.
c. Save the form.
3.
BMC Remedy Action Request System 9.1 Page 1366 of 4703
BMC Software Confidential. BladeLogic Confidential.
The Business Segment-Entity Associations form contains the following primary fields:
Entry ID — An identifier for an entity to which the time segment is being applied, such as an
asset or a change request.
Entry Owner ID — An identifier for the parent object owner of the entity. Enables you to
identify the original owner to determine whether you can change the association.
Time Segment ID — A time segment name that was defined on the Business Time Segment
form. For more information, see Scheduling a time segment (see page ).
Assignee Groups — Groups specified on Business Time Segment form. For more
information, see Scheduling a time segment (see page ).
Only one entity of the same type can exist in this form. After an entity is created, you must reuse
the existing copy in the entity from this form.
The Business Segment-Entity Association form contains the following primary fields:
Entity Type — Used to classify the type of entity being created. Depending on this value, it
determines how the values are mapped to the Attributes fields. For example, if you have
Entity Type defined as "Category," then you can map Attribute 1 to store Category 1 field
data, Attribute 2 to store Category 2 field data, Attribute 3 to store Category 3 field data, and
so on.
POID — Contains the Parent Object Instance ID field. It is used to reference any desired
generic object. Typically, it references the Instance ID of the parent object.
Attribute fields — Include a set of 10 generic attributes that can be used to describe an
entity. Any character values can be mapped into these fields to describe an entity.
Using the time zone value of the Level 1 time segment (see page 1370)
Using offset hours in Business Time 2.0 (see page 1373)
The following scenarios in this topic show ways to complete the Business Time Segment form, and
the results of the chosen options:
Standard time zone difference between AR System server and the Schedule scenario (see
page 1369)
Daylight savings time zone difference between AR System server and the Schedule scenario
(see page 1370)
Undefined time zone scenario (see page 1370)
Standard time zone difference between AR System server and the Schedule
scenario
Assumption: The AR System server is in PST (GMT -8:00) Pacific Time (US and Canada).
Schedule:
ID = Level1_Recurring_1_1_2000_8am_to_1_1_2031_5pm_Weekly_Once_Mon_
to_Fri_Asia_Calcutta
Level = 1
Availability = Available
DurationType = Recurring
StartDate = 1/1/2000
StartTime = 8AM
EndDate = 1/1/2031
EndTime = 5PM
Timezone = Asia/Calcutta
Result: The Schedule time shifts to 6:30 P.M. - 3:30 A.M. because the time difference between the
AR System server and the Schedule is 8 + 5.50 = 13.50 hours (meaning 13 hours and 30 minutes).
Daylight savings time zone difference between AR System server and the
Schedule scenario
Assumption: The AR System server is in PDT (GMT -7:00) Pacific Time (US and Canada).
Schedule:
ID = Level1_Recurring_1_1_2000_8am_to_1_1_2031_5pm_Weekly_Once_Mon_
to_Fri_Asia_Calcutta
Level = 1
Availability = Available
DurationType = Recurring
StartDate = 1/1/2000
StartTime = 8AM
EndDate = 1/1/2031
EndTime = 5PM
Timezone = Asia/Calcutta
Result: The Schedule time shifts to 7:30P.M. - 4:30 A.M. because the time difference between the
AR System server and the Schedule is 7 + 5.50 = 12.50 hours (meaning 12 hours and 30 minutes).
Schedule:
ID = Level1_Recurring_1_1_2000_8am_to_1_1_2031_5pm_Weekly_Once_Mon_ to_Fri
Level = 1
Availability = Available
DurationType = Recurring
StartDate = 1/1/2000
StartTime = 8AM
EndDate = 1/1/2031
EndTime = 5PM
Result: The Schedule considers the AR System server time because no time zone is defined.
Therefore, StartTime-EndTime remains 8 A.M. - 5 P.M.
You can define a time segment that has its own time zone. Consider the time segments TS1, TS2,
and TS3 in the following case:
Assumption: The AR System server is in the GMT + 5:30 - Asia/Calcutta time zone.
TimeSegment1:
ID = Level1_Recurring_1_1_2000_8am_to_1_1_2031_5pm_Weekly_Once_Mon_
to_Fri_Asia_Calcutta
Level = 1
Availability = Available
DurationType = Recurring
StartDate = 1/1/2000
StartTime = 8AM
EndDate = 1/1/2031
EndTime = 5PM
Timezone = Asia/Calcutta
Result: The Schedule time remains 8 A.M. - 5 P.M. because the server and the Schedule are in the
same time zone.
TimeSegment2:
ID = Level2_Recurring_1_1_2000_10am_to_1_1_2031_11am_Weekly_Once_
Mon_to_Fri_Use_Level_1
Level = 2
Availability = Unavailable
DurationType = Recurring
StartDate = 1/1/2000
StartTime = 10AM
EndDate = 1/1/2031
EndTime = 11AM
Timezone = Use Level 1
Result: The Schedule time remains 10 A.M. - 11 A.M. because the server is in the Asia/Calcutta
time zone and the Schedule (which uses the time zone of the Level 1 time segment) is in the Asia
/Calcutta time zone.
TimeSegment3:
ID = Level2_Recurring_1_1_2000_12pm_to_1_1_2031_1pm_Weekly_Once_
Mon_to_Fri_Asia_Calcutta
Level = 2
Availability = Unavailable
DurationType = Recurring
StartDate = 1/1/2000
StartTime = 12PM
EndDate = 1/1/2031
EndTime = 1PM
Timezone = Asia/Calcutta
Result: The Schedule time remains 12 P.M. - 1 P.M. because the server and the Schedule are in
the same time zone.
TimeSegment4:
ID = Level3_Avail_Recurring_1_1_2000_9am_to_1_1_2031_10am_Weekly_
Once_Mon_to_Fri_Australia_Sydney
Level = 2
Availability = Available
DurationType = Recurring
StartDate = 1/1/2000
StartTime = 9AM
EndDate = 1/1/2031
EndTime = 10AM
Timezone = Australia/Sydney
Result: The Schedule time is converted to ServerTime as 3:30 A.M. - 4:30 A.M. because the
Schedule time zone Australia/Sydney is in DST with an offset of 5.50 (that is, 5 hours and 30
minutes).
Using the four time segments and the Add command, the Business Time command is
Case 5: If you add 4 hours, the result is 1/23/2008 1:00:00 PM (10 AM-11 AM and 12 PM-1
PM are Unavailable).
Case 6: If you add 7 hours, the result is 1/23/2008 4:00:00 PM (10 AM-11 AM and 12 PM-1
PM are Unavailable).
Case 7: If you add 8 hours, the result is 1/24/2008 3:30:00 AM (10 AM-11 AM and 12 PM-1
PM are Unavailable).
Note
The Offset field on the Business Time Segment form remains for backward compatibility.
The use of this field is not recommended. Use time zones (see Using time zones (see
page )) instead of offsets in cases where offsets were used to compensate for time-
zone differences. In cases where offsets were used to specify time segments that span
midnight, use multiple time segments--one from Start Time to midnight and the other from
midnight to End Time.
The Business Time Segment form includes an Offset field, which is used under certain
circumstances to adjust for the time-zone differences between the client and the server. All
Business Time 2.0 commands are executed on the server, and they take in and return timestamp
values.
The AR System server converts date/time strings to a timestamp value. When the client and server
are on different time zones, if the conversion of the date and time to a timestamp happens on the
client (such as with active links), the offset should be set to the time zone difference between the
server and the client. If the conversion happens on the server, no offset is required.
For cases where the time segment spans across midnight (as specified in Defining business hours
using offset hours (see page ) for old Business Time commands), do not use offsets.
Because "One Time" time segments can span multiple days, these time segments can span
midnight. "Recurring" time segments cannot span midnight; therefore, you should create multiple
time segments--one that goes to midnight one day, and another that starts from midnight to the
next day.
The first Level 1 offset is considered and applied to all the time segments in the application
commands. Offset fields for non-Level 1 time segments are disabled.
The command arguments are positional in the syntax used to run the processes. You can omit
trailing arguments. However, to set a later argument, you must supply the arguments that come
before the one that you want to set. To pass a parameter, simply enter "" in its place.
Business Times commands take Daylight Saving Time (DST) into consideration. See Application-
Bus-Time2-Add (see page 1377) for an example.
Application commands
Business Segment-Entity Association commands
Old Business Time commands
Note
Business Time commands work only with Date/Time fields (not Date fields or Time fields).
Important
The Olson (also Olsen) time zone format is the default on AIX when time zones are set
through System Management Information Tool (SMIT). When the Olson time zone format
is used with an AR System server running on AIX, however, the AR System server
miscalculates dates and times when executing Business Time application commands.
Therefore, BMC recommends that you use the POSIX time zone setting for AR System
servers running on AIX. When the POSIX format is used, the AR System server correctly
calculates dates and times affected by Business Time application commands.
Application-Bus-Time2-Add
The Application-Bus-Time2-Add command adds the requested offset to the start time and
returns a timestamp representing the time calculated. Use this command to recalculate time into
the future.
The <startTime parameter> is required in this command. This parameter must be a value
such as a field reference ($<fieldName>$). Other fields are optional and use the default value if
not provided. You can specify multiple business activity names.
This adds one day to the value in <fieldName>. In the example, <fieldName> is <startTime>
. <amount> (offset) is set to 1, and <amountUnits> is set to 4 (representing days), thus adding 1
day to the calculation. The final syntax looks like:
$PROCESS$ Application-Bus-Time2-Add "$8/26/2004$" "1" "4"
Application-Bus-Time2-Diff
The Application-Bus-Time2-Diff computes the difference between the start time and the
end time. The command returns an integer representing the difference in seconds. Use this
command to compare two different times (start time and end time) to get the actual business time.
The <startTime> and <endTime> parameters are required in this command. Other fields are
optional and use the default value if not provided. You can specify multiple business activity
names.
Application-Bus-Time2-Subtract
The Application-Bus-Time2-Subtract subtracts the requested offset from the start time and
returns a timestamp representing the time calculated. Use this command to recalculate time in the
past.
The <startTime> parameter is required in this command. Other fields are optional and use the
default value if not provided. You can specify multiple business activity names.
Application-Bus-Time2-Get-Next-Window
The Application-Bus-Time2-Get-Next-Window command returns the start of the next
available or unavailable time segment that is <duration> seconds long. If <duration> is 0 (the
default), the command returns the start of available time segment or the start of unavailable the
time segment.
Additionally, depending on the <windowFlag>, the command returns one time segment or all the
time segments between <startTimeRange> and <endTimeRange>.
Application-Bus-Time2-Get-Free-Window
The Application-Bus-Time2-Get-Free-Window command returns the start of the next
available or unavailable free time segment at the same level or a higher level that is <duration>
seconds long. A free time segment at Level <level> and Duration <duration> is one where no
other time segment at the same or higher level as <level> overlaps, or starts or ends in the
<duration> of this time segment. After a free time segment is obtained, it can be created as
available or unavailable. The default value for <duration> is 0, which returns the next available
time segment.
The command considers all Business Time Segments at a certain level or above and treats them
as unavailable, regardless of whether they are available or unavailable. If Level 1 and 2 time
segments are present, they are always considered and are taken as available and unavailable,
respectively.
Application-Bus-Time2-Get-Free-Window scenarios
In this topic:
No Earliest Start Time or Latest End Time scenario (see page 1379)
Earliest Start Time for Level 2 scenario (see page 1380)
Earliest Start Time is specified or unspecified scenario (see page 1380)
Duration of two hours scenario (see page 1380)
Duration of 7200 seconds scenario (see page 1380)
A free window of duration 3600 seconds (1 hour) is required. There is no Earliest Start Time or
Latest End Time.
The following figure shows the return value for Get-Free-Window for a specific day. The two
Final lists show the final time window that Get-Free-Window uses in case a free window is
required at Level 2 or at Level 4.
For Level 2, the free window is available from 9:00 A.M. to 10:00 A.M. and from 4:00 P.M. to 5:00
P.M. Get-Free-Window returns 1121270400 (July 13, 2005, 9:00 A.M.).
For Level 4, the free window is available from 8:00 A.M. to 12:00 P.M. and from 3:00 P.M. to 4:00
P.M. Get-Free-Window returns 112166800 (July 13, 2005, 8:00 A.M.).
In this scenario, if the Earliest Start Time for Level 2 is 11:00 A.M., the return value at Level 2 is
1121295600 (July 13, 2005, 4:00 P.M.).
If the Earliest Start Time is 5:00 A.M. (or if it is not specified) and if the Latest End Time is 2:00 P.
M., the return value at Level 2 is 1121270400 (July 13, 2005, 9:00 A.M.).
If the Level is 4 and the duration is 7200 seconds, 1121266800 (July 13, 2005, 8:00 A.M.) is
returned.
When daylight saving time starts, the transition day has only 23 hours.
When daylight saving time ends, the transition day has 25 hours. It includes two numerically
identical hours:
Hence, for one hour each year, time keeping must distinguish between repeated hours.
The dates that daylight saving time starts and ends change year by year and city by city. To
accommodate this fluctuation:
The Java Timezone class contains the locale-specific information for these calculations.
In the following examples, assume that the AR System server is in Pacific Standard Time (US and
Canada, GMT -8:00) and daylight saving time occurs on March 11, 2007 2:00:00 A.M.
"Work" defines the available time window at Level 1 on March 11, 2007 from 12:00 A.M. to 5:00 A.
M. on the Business Time Segment form.
This adds 1 hour to the start time and returns 1173607200 (that is, Sunday, March 11 03:00:00 A.
M. PDT 2007).
If the Business Segment-Entity Association form contains entries for time segments, you can use
the following commands in place of the Application commands described in the previous section.
The following commands contain EntityID parameters so that you do not need to query the
Business Segment-Entity Association form and call the previous Application commands.
Application-Bus-Time2-Assoc-Add
Use the following syntax for the Application-Bus-Time2-Assoc-Add calculation:
Application-Bus-Time2-Assoc-Add "<startTime>" ["<amount>"
["<amountUnits>" ["<businessTimeSegmentName1>"
"<businessTimeSegmentName2>" . . . [-e "EntityID1" "EntityID2"... ]]]]
Application-Bus-Time2-Assoc-Diff
Use the following syntax for the Application-Bus-Time2-Assoc-Diff calculation:
Application-Bus-Time2-Assoc-Diff "<startTime>" "<endTime>"
["<businessTimeSegmentName1>" "<businessTimeSegmentName2>" . . . [-e
"EntityID1" "EntityID2"... ]]
Application-Bus-Time2-Assoc-Subtract
Use the following syntax for the Application-Bus-Time2-Assoc-Subtract calculation:
Application-Bus-Time2-Assoc-Subtract "<startTime>" ["<amount>"
["<amountUnits>" ["<businessTimeSegmentName1>"
"<businessTimeSegmentName2>" . . . [-e "EntityID1" "EntityID2"... ]]]]
Application-Bus-Time2-Assoc-Get-Next-Window
Use the following syntax for the Application-Bus-Time2-Assoc-Get-Next-Window
calculation:
Application-Bus-Time2-Assoc-Get-Next-Window "<startTimeRange>"
"<endTimeRange>" "<duration>" "<windowFlag>"
["<businessTimeSegmentName1>" " <businessTimeSegmentName2>" . . . [-e
"EntityID1" "EntityID2" . . . ]]
Application-Bus-Time2-Assoc-Get-Free-Window
Use the following syntax for the Application-Bus-Time2-Assoc-Get-Free-Window
calculation:
Application-Bus-Time2-Assoc--Get-Free-Window "<startTimeRange>"
"<endTimeRange>" "<level>" "<duration>" "<earliestStartTime>"
"<latestEndTime>" ["<businessTimeSegmentName1>"
"<businessTimeSegmentName2>" . . . [-e "EntityID1" "EntityID2" . . . ]]
Application-Get-Next-Recurrence-Time
Recurrence is defined by a set of fields on the Business Time Segment form. The fields the range
from 2300 to 2341 and contain recurrence patterns. Field 2300 contains the Recurrence Definition
Name used in the Application-Get-Next-Recurrence-Time command. For more
information about how these fields are used, see Scheduling a time segment (see page ).
Fields 2300 to 2341 can be defined on any form, and the Application-Get-Next-
Recurrence-Time command is provided to get the next time. (You can optionally create a
custom form with field IDs in the range of 2300 to 2341 to contain recurrence patterns, and specify
that custom form in the Application-Get-Next-Recurrence-Time application command.)
For all the recurrence time calculations, ICU library functions are used.
<formName> --Form that contains the recurrence fields, such as the Business Time
Segment form.
<startTime> --The starting date and time from which the next recurring day is to be
calculated.
<recurrenceDefinitionName> --Identifier indicating the entry in the form (specified by
<formName>) that contains the recurrence pattern to use for this calculation. This is the
name in field 2300.
weekly is an entry in the form that contains the recurrence fields, such as the Business Time
Segment form. The weekly entry is defined as Wednesday and Friday, every 3 weeks.
The return value is 1082136600, which corresponds to 4/16/04 10:30:00 AM. Calling
Application-Get-Next-Recurrence-Time again with a start time of 04/16/04 10:30 AM
returns 1083778200;1083951000, corresponding to 5/5/04 10:30:00 AM and 5/7/04 10:
30:00 AM.
Note
BMC recommends not using the Business Time Workdays and Business Time Holidays
forms. These forms remain for backward compatibility.
Important
If you use Approval Server, do not stop using these forms. The AP:Process Definition
form references them. For more information, see the Setting up the approval process
section.
Scheduling workdays
The Business Time Workdays form stores the day-to-day availability of each of your groups and
individuals, and a record of your company or location's business hours.
Business time in BMC Remedy AR System is calculated on the AR System server where the start
and end times on any given day must be in the range of 0-24 hours. Any business time outside this
range is considered invalid.
Note
Create separate schedules for Daylight Saving Time as needed based on locale
and conventions for that locale.
Business hours with a one-hour gap can occur when a one-hour lunch break is scheduled in the
work day. Use the Time Schedule Start and End times to specify that the business is open from 9:
00:00 A.M. to 12:00:00 P.M. and from 1:00:00 P.M. to 5:00:00 P.M., indicating a one-hour closed
time. Enter the information as shown in the following figure.
Business hours with one hour gap
(Click the image to expand it.)
Scheduling holidays
Use the Business Time Holidays form to define all scheduled holidays and other non-working days.
A holiday can be a full day or a few hours. Because of shift work, holidays might span over
midnight.
3. In the Schedule Name field, enter the unique identifier for this holiday schedule.
Use this identifier to reference this schedule in all business hours calculations.
Important
Enter the same name that you entered in the Name field of the Business Time
Workdays.
4. In the Holidays field, list the holidays that make up the holiday schedule.
Enter holiday time as:
date,startTime,endTime
For example:
07/4/09,9:00:00 A.M.,5:00:00 P.M.
is a holiday that starts at 9:00:00 A.M. on 7/4/09 and ends at 5:00:00 P.M. on the same day.
To separate the dates, press Enter or insert semicolons between the dates. The number of
dates that can be specified in this list is unlimited.
The holiday entry cannot span across midnight, and the Start time must be less than End
time. Holiday time uses the offset hours from the Workday schedule.
Only short date/time format is supported in the Business Time Holidays form. Long date
formats (such as January 1, 2005) are not supported.
The dates are interpreted on the server and follow the server's formatting rules. If clients are
configured for other date formats and the dates entered in the Business Time Holidays form
are entered in a client format incompatible with the server format, they are not correctly
interpreted as holidays, or they might be interpreted as a different day than was planned.
Note
<date>,, <endTime>
For example:
7/4/04,,5:00:00 P.M.
<date>, <startTime>
For example:
<date>
For example:
7/26/04
In this case, the start time defaults to 12:00:00 A.M. and end time defaults to 11:59:59 P.M.
To adjust using Holidays time, enter the start time as one day and enter the end time on the
next day. It would look like:
To adjust using Offset Hours, take your original Start/End time minus the value from Offset
Hours in the Business Time Workdays form to get the adjusted time. You can use either a
positive offset (which moves the times earlier) or a negative offset (which moves the times
later). The offset does not have to be unique. You can choose any value as long as the
adjusted times fall into the 0- to 24-hour range. For example, if a holiday starts at 10:00:00 P.
M. on 12/25/04 and ends at 6:00:00 A.M. on 12/26/04, you can supply an offset of three
hours to adjust the holiday time to start on 12/26/04 at 1:00:00 A.M. and end at 9:00:00 A.M.
This adjusted time is entered into the Holidays field following the format:
Note
The offset hours is specified in Business Time Workdays as part of a workday schedule.
Business time is calculated on the server and requires that start and end times be in the range of 0-
24 hours. An invalid business time is adjusted using the Offset Hours field on the Business Time
Workdays form. An example could be a valid business time on a client several time zones away
from the server. The time on the client might become invalid on the server if it crosses midnight
after the time-zone adjustment. The Offset Hours field is used in this situation.
Setting a positive offset moves the time later, a negative offset moves it earlier. Unique offset times
are not required. Any adjusted range defined with the offset hours is valid in the AR System server
as long as it falls into a single 0-24 hour range. For tracking purposes, use the Scheduling Diary
field to document how the offset adjustment is made.
If you use the old Business Time forms, you can use these commands, but they do not work with
Business Time 2.0.
The parameters for these commands are defined in Business Time command parameters (see
page ).
Application-Bus-Time-Add
The Application-Bus-Time-Add command adds the requested offset to the start time and
returns a timestamp representing the time calculated. Use this command to recalculate time into
the future.
The <startTime> parameter is required in this command. This parameter must be a value such
as a field reference ($<fieldName>$). Other fields are optional and use the default value if not
provided. You can specify multiple business activity names.
This adds one day to the value in $<fieldName>$. Show $<fieldName>$ as <startTime>.
Set the <amount> to 1 and set the <amountUnits> to 4 (representing days), thus adding one
day into the calculation. The final syntax looks like:
$PROCESS$ Application-Bus-Time-Add "$8/26/2004$" "1" "4"
Application-Bus-Time-Diff
The Application-Bus-Time-Diff command computes the difference between the start time
and the end time. The return is an integer representing the difference in seconds. Use this
command to compare two different times (start time and end time) to get the actual business time.
<workdayScheduleName>"]]
The <startTime> and <endTime> parameters are required in this command. Other fields are
optional and default if not provided. You can specify multiple business activity names.
Application-Bus-Time-Subtract
The Application-Bus-Time-Subtract subtracts the requested offset from the start time and
returns a timestamp representing the time calculated. Use this command to recalculate time in the
past.
The <startTime> parameter is required in this command. Other fields are optional and use the
default value if not provided. You can specify multiple business activity names.
In this topic:
Use the Specific Dates tab in the Business Time Segment form to specify a list of dates
(with the same time range). Make sure that the Start Date and End Date are in that list of
dates.
Set the Level to 2.
If holidays are defined with different start and end times, create different time segments.
They can all have the same IDs.
Select the End of Day check box to indicate the end of the day instead of 11:59:59 P.M.
The ID field on the Business Time Segment form is the same as the Tag field on the
Business Time Holidays form.
Example
Consider an example to configure the following Business Time Segment:
You can create the following Business Time Segments and relate them to a single business entity
(App Admin Console > Custom config tab > SLM > Configure Business Time):
A level 1 available segment recurring weekly with Monday, Tuesday, Wednesday, Thursday
and Friday checked, with the start time at 07:00:00 AM and the end time at 04:59:59 PM.
The first date can be a past date and the second date can be future date.
A level 2 unavailable segment recurring weekly with Monday, Tuesday, Wednesday,
Thursday and Friday checked, with the start time at 12:00:00 AM and the end time at 06:59:
59 AM. The dates should be same as before.
A level 2 unavailable segment recurring weekly with Monday, Tuesday, Wednesday,
Thursday and Friday checked, with the start time at 05:00:00 PM and the end time at 11:59:
59 PM. This can be achieved using the end of day checkbox. The dates should be same as
before.
A level 2 unavailable segment recurring weekly with Saturday and Sunday checked, with the
start time at 12:00:00 AM and the end time at 11:59:59 PM. This can be achieved using the
end of day checkbox. The dates should be same as before.
One (or few) level 2 unavailable segments recurring on specified dates with multiple holiday
dates separated by semicolons, with the start time at 12:00:00 AM and the end time at 11:59:
59 PM. This can be achieved using the end of day checkbox.
In this example, you may exclude the level 1 segment as the time which is not defined can be
assumed to be available. Note that in the example you cannot cross midnight using a recurring
segment so you have to define two segments for night time.
For information about using the Notify action to send an alert and other methods of notification
delivery, see Notify action (see page 2733).
The BMC Remedy AR System server uses the installed alert forms and related workflow to
maintain a list of registered alert users, to store pending alerts, and to display each user's alerts in
an alert list.
Users can view their alerts in the alert list in a browser, or they can receive alerts outside of BMC
Remedy AR System, for example, over a social networking service.
Application developers can enable an application to notify users about alerts by using the Notify
workflow action with the alert delivery mechanism. By registering users for the appropriate alert
types, your application can send alerts to a plug-in. Through the plug-in server, alerts can be
delivered to various destinations outside of BMC Remedy AR System, such as a web service or a
social networking service.
The Alert Events form is installed with BMC Remedy AR System. This form contains the alert
message, identification information about the source request, the name of the user to whom the
alert is directed, and information about the alert status.
The Read field is set to "X" when the user opens the alert. The Sent Successfully field is an
indication of whether the Alert was sent successfully. If a user is registered for more than one alert
destination, this field is set if the alert is delivered successfully to any one of the destinations. Use
of this field is optional and is controlled by the Update Sent Flag field in the AR System Alert User
Registration form. See Registering users for alerts (see page ).
You cannot delete the Alert Events form and its original fields, but you can add fields and workflow
to the form.
Viewing alerts
Users do not interact directly with the Alert Events form. Instead, users view their alerts by opening
a form that contains an alert list field in a browser.
The alert list field type is a special type of table field that automatically retrieves records for the
current user from the Alert Events form. Any form can contain an alert list field. The Alert List form
installed with BMC Remedy AR System contains only an alert list field and is the default form for
displaying alerts.
Alert list fields display the user's records from the Alert Events form. When a user clicks on an alert
in the list, BMC Remedy AR System opens the source request in the form that generated the alert.
To support such drill-down from the alert list table field, the form originating the alert must contain a
results list table field.
In alert list table fields, each column represents a field from the Alert Events form, and each row
represents a request from that form. The columns themselves are also fields, and you can specify
their properties.
The alert list displays alerts from multiple servers. For web clients, the alert list queries servers
configured in the mid tier. For more information, see Using the alert list in a browser (see page )
.
If a web user has access to multiple forms that have alert list fields, BMC Remedy AR System uses
the first form that it finds that contains an Alert List. Therefore, if the user has permission to multiple
forms containing an alert list, you cannot always predict which form will be used. BMC
recommends making sure that each group can access only one alert list form. This option enables
you to create forms with different workflow and different fields for different groups.
Initially, the CleanupAlertEvents escalation is disabled. You can enable it and customize it
according to your needs.
The Alert User Registration form contains all the information maintained by the server in earlier
releases, as well as new fields to support sending alerts through the web services plug-in or any
other alert plug-in.
Note
The Alert User Registration form replaces the internal alert_user table of alert users that
the AR System server maintained in earlier releases. An upgrade routine transfers the
existing information from the server table to this form at the first server start up after
upgrading. After the data has been transferred to the form, the server table is no longer
used.
The alert method is determined by the value in the Plugin Name field. When the Web Services
Plugin Name is specified, you provide the end point URL for the Web service to which the alert will
be sent in the Plugin Values field. You must define the Web service using the WSDL installed with
BMC Remedy AR System. In this case, BMC Remedy AR System sends alerts to the plug-in
server for processing by a specified plug-in. For information about sending alerts by Web services,
see Using Web services with alerts (see page ).
You can configure other applications to register and deregister alert users by using C or Java API
calls, by using a Web service, or by creating and deleting entries manually. (To deregister users
through a Web service, you must use one of the deregister operations described in Registering
and deregistering users by web service (see page 1400).)
The following table describes the fields in the Registration tab of the Alert User Registration form:
Registered The AR System login name of the user being registered for alerts.
User
Expiration The time, in seconds, after which the user's alert registration should expire. If the value is zero, there is no time limit.
Time An escalation runs every 10 minutes to delete expired entries. If an entry has expired but the escalation has not yet
(secs) run, the user continues to receive alerts.
Short N/A
Description
Plugin Defines the way alerts are sent for this user registration. The drop-down field menu takes its entries from the AR
Name System Alert Delivery Registration form. Two methods are installed with BMC Remedy AR System:
Alert API — Send alerts to a browser via the AR System Alert API.
Web Service — Send alerts via web service, such as the AR System Alert Web services plug-in, ARSYS.
ALRT.WEBSERVICE.
To use the Web Service plug-in, you must create a web service using the installed AR System Alert Web service
WSDL. See Using Web services with alerts (see page ).
Plugin Defines the destination to which alerts are sent for this user registration.
Values
If the Plugin Name is Alert API, this field contains the client and server IP addresses and the client port
number, formatted as semicolon-separated name-value pairs.
If the Plugin Name is Web Service, enter the end point URL of the Web Service you created using the Alert
Notification WSDL.
Encrypt Used to store a value that must be encrypted. For, example if a plugin requires a password, store the password in
Plugin this field.
Values
ReRegister A display-only field that allows the entry to be modified with a new expiration time. This field is only used when
resetting the Expiration Time in a browser. If the Expiration Time must be set back to its previous value, then the
browser will not send the data to the BMC Remedy AR System server. The ReRegister check box allows the data to
get dirty so that the browser can send the data to the BMC Remedy AR System server.
For Web services, you use the Reregister method to reset the Registration Time. See Using Web services with
alerts (see page ).
In this topic:
1. Create a regular form (see page 2332)on one server in your BMC Remedy AR System
installation where the mid tier is also installed.
2. Add an alert list field (see page 2398)to the form.
3. Make this form accessible in a browser through a URL (see page 2856).
1. Make sure that one server in your BMC Remedy AR System installation is defined as a
preference server.
For more information about preferences, see Setting user preferences (see page ).
2. Under General Settings (see page 464)in the Mid Tier Configuration Tool, enter the name of
the preference server used by alert system users.
b.
BMC Remedy Action Request System 9.1 Page 1398 of 4703
BMC Software Confidential. BladeLogic Confidential.
b. In the Refresh Interval field, enter the number of minutes between each automatic
refresh of the alert list.
A setting of 0 indicates no refresh interval.
Each server specified under Alert Servers is queried for new alerts, and these alerts
are displayed in the Web-based alert list.
Note
To send alerts via Web service, the AR System Web services plug-in ARSYS.ARF.
WEBSERVICE must be installed. See Setting up the environment for web services (see
page 3298).
The AR System Alert Web Services plug-in (ARSYS.ALRT.WEBSERVICE) converts the alert
information, including the alert text, recipient, and alert destination, to an XML document. It then
passes the alert request to the Web Services plug-in, which must also be installed and running.
The Web Services plug-in sends the alert to the destination Web service.
You can also use Web services to register users in the AR System Alert Users Registration form.
To receive alerts via Web services, create a Web service that uses the Alert Notification .wsdl file (
alertNotification.wsdl) installed with BMC Remedy AR System. This .wsdl is installed in the
<ARSystemInstallDir>/pluginsvr directory.
For more information about using Web services with BMC Remedy AR System, see Publishing the
BMC Remedy AR System functionality as a web service (see page 3288).
To register a user to receive alerts through the AR System Alert Web Services
plug-in
DeRegister --Deletes an entry that has the Web Service Plugin Type from the AR System
Alert User Registration form by using the Registered User name. The minimum values
required are Registered_User and DeRegister. DeRegister must be set to Yes. If
the remaining values are provided, they are used to search for an entry with those values.
Example:
<urn:Registered_User>?</urn:Registered_User>
<!--Optional:-->
<urn:Plugin_Name>ARSYS.ALRT.WEBSERVICE</urn:Plugin_Name>
<!--Optional:-->
<urn:Plugin_Values>?</urn:Plugin_Values>
<!--Optional:-->
<urn:DeRegister>Yes</urn:DeRegister>
DeRegisterOnRequestID --Deletes an entry that has the Web Service Plugin Type from
the AR System Alert User Registration form by using the Request ID of the entry. The
DeRegister element must be set to Yes.
Example:
<!--Optional:-->
<urn:DeRegister>Yes</urn:DeRegister>
<urn:Request_ID>?</urn:Request_ID>
GetByRequestID --Retrieves an entry from the AR System Alert User Registration form.
Example:
<urn:Request_ID>?</urn:Request_ID>
GetListByQual --Retrieves entries from the AR System Alert User Registration form by
using the qualification provided.
Example:
<urn:Qualification>?</urn:Qualification>
<urn:startRecord>?</urn:startRecord>
<urn:maxLimit>?</urn:maxLimit>
In this method, the default qualification is 'Registered User' = $USER$. The default
qualification is used if no Qualification element is present or if the Qualification
element is empty (for example, <urn:Qualification></urn:Qualification>).
To see all the registered users, enter the qualification in the format <urn:
Qualification> 'Registered User' LIKE "%%" </urn:Qualification>.
Note
You must be a member of the Administrator group to see all the registered users. If
a non-administrator uses this qualification, they will see only those records for
which they have permission.
<urn:Registered_User>?</urn:Registered_User>
<urn:Short_Description>?</urn:Short_Description>
<!--Optional:-->
<urn:Plugin_Name>ARSYS.ALRT.WEBSERVICE</urn:Plugin_Name>
<!--Optional:-->
<urn:Plugin_Values>?</urn:Plugin_Values>
<!--Optional:-->
<urn:Enc_Plugin_Values>?</urn:Enc_Plugin_Values>
<!--Optional:-->
<urn:Expiration_Time__secs_>0</urn:Expiration_Time__secs_>
<!--Optional:-->
<urn:Update_Sent_flag>?</urn:Update_Sent_flag>
ReRegister --Resets the value in the Registration Time field. The minimum value required
to be sent is the value in Expiration Time (secs). The value of this field can be the same as
what it was originally to reset the registration rime. If required, the remaining values can also
be sent to modify them along with resetting the registration time.
Example:
<!--Optional:-->
<urn:Registered_User>?</urn:Registered_User>
<!--Optional:-->
<urn:Short_Description>N/A</urn:Short_Description>
<!--Optional:-->
<urn:Plugin_Name>ARSYS.ALRT.WEBSERVICE</urn:Plugin_Name>
<!--Optional:-->
<urn:Plugin_Values>?</urn:Plugin_Values>
<!--Optional:-->
<urn:Enc_Plugin_Values>?</urn:Enc_Plugin_Values>
<urn:Expiration_Time__secs_>?</urn:Expiration_Time__secs_>
<urn:Request_ID>?</urn:Request_ID>
<!--Optional:-->
<urn:Update_Sent_flag>?</urn:Update_Sent_flag>
The Assignment Engine uses processes instead of workflow to automatically assign requests to
individuals. You can install this feature by using the BMC Remedy AR System suite installer.
The Assignment Engine is an AR System interface that processes the assignment of requests. It is
a rule-based application. The Assignment Engine administrator defines the processes and rules. A
process can have multiple rules.
An entry in the Application Pending form provides the process name and request ID of the
application request. Based on this input, the Assignment Engine executes the associated rules
against a form where the assignee information is stored. The correct assignee is located and is set
in a preconfigured field on the request form.
If multiple assignees are available, the predefined assignment methods are used to identify an
assignee for the request. See Integrating the BMC Remedy Assignment Engine into an application
(see page 902).
For information about configuring assignments using BMC Remedy ITSM, see Configuring
assignments.
Auto-assignment methods
The assignment method determines who is assigned to an issue when more than one person
matches the qualification. In such cases, the following assignment methods can be specified in an
assignment rule to automatically assign the issue:
Round Robin — Assigns the issue to the person who has gone the longest since receiving
an assignment.
For example, if person A was last assigned an issue at 9:00 A.M., and person B was
assigned an issue at 10:30 A.M., person A is selected.
Load Balance by Number — Assigns the issue to the person who has the fewest number of
issue assignments.
For example, if person A is assigned 2 issues and person B is assigned 3 issues, person A
is selected.
Load Balance by Capacity — Assigns the issue to the person who has the largest unused
capacity.
For example, if person A has a capacity rating of 10 and is assigned 5 issues, then the
unused capacity is 5. Similarly, if person B has a capacity rating of 20 and is assigned 8
issues, then the unused capacity is 12. In this case, person B is selected because of the
higher unused capacity.
But if person A and person B have a capacity rating of 10 and are assigned 10 issues, in
this case, the next open issue is assigned to the person who has gone the longest since
receiving an assignment.
Note
For the Load Balance by Number and Load Balance by Capacity assignment methods, it
is possible that two or more people qualify for an issue. In such cases, the assignment
does not happen in alphabetical or random order, but in the sequence in which the
records are fetched. This sequence is determined by the sort order on the assignee form,
if specified; else, in the order in which the records are created.
1. The BMC Remedy AR System client sends a request along with an application command.
This command tells the Assignment Engine which process should be run to perform auto
assignment.
2. Assignment Engine starts the process.
3. If a rule returns a set of assignees, Assignment Engine skips the execution of the remaining
rules defined in the process, and starts applying the assignment method. However, if a rule
does not return a set of assignees, Assignment Engine runs the next rule in the process.
4. Using the assignment method, Assignment Engine identifies a single assignee and the
request is assigned.
5. After the request is assigned, the assignee record is updated, and the assignment process
is successful. This record consists of the last assigned request time and the number of
tickets currently assigned to the assignee.
6. If all the rules fail to return a set of assignees, the assignment process fails.
Processes — Lists the processes that the Assignment Engine can use. Each process has a
Process Name.
Note
Each process consists of a request form and a set of sequential rules, all of which you enter
using the procedures described in the following sections.
Forms — Shows all forms registered with the Assignment Engine. To list forms used by a
specific process, select the process name from the Show For Process list. The Forms tab
also has a Related Processes table that shows the process for the form selected in the
table. If the form is used in more than one process, the Related Processes table lists all
those processes.
Rules — Shows all the rules in the Assignment Engine. To list rules used by a specific
process, select the process name from the Show For Process list. The Rules tab also has a
Related Processes table that shows the process for the rule selected in the table. If the rule
is used in more than one process, the Related Processes table lists all those processes.
For information on Assignment Engine server settings, see Configuring the Assignment Engine
server settings (see page 680).
ASE:Administration Allows you to configure processes, rules, and forms for Assignment Engine.
ASE:AssignAssoc_AssignForm This form is a join form of ASE:Assignment Association and ASE: Form
Information.
Note
ASE:AssignAssoc_AssignRules This form is a join form of ASE:Assignment Association and ASE: Assignment
Rules.
Note
ASE:Assignment Process Stores information about the processes that are configured with Assignment
Engine.
ASE:Assignment Rules Stores information about the rules that are configured with Assignment Engine.
Note
ASE:Config A back-end form that stores information related to logging and configuration.
ASE:Form Information Stores information about rules configured with Assignment Engine.
To set up assignments, you use only a few of these forms. See Integrating the Assignment Engine
into an application (see page ).
FTS is typically much faster than using the native database searching functionality when searching
in long text fields. It is also the only method available in BMC Remedy AR System for searching
text within attached documents.
With FTS, you can use your knowledge base. You can access your company's history of solving
problems, which is sometimes stored in long text fields or attachments. With the FTS option, you
can easily search long text fields to find solutions to related problems.
FTS solves many problems that users encounter when performing database searches, including:
Searching long text and attachment fields. The FTS option enables you to index character,
diary, and attachment fields for searching, and then matches entries from those fields
against the search criteria that you specify. Like database indexes, an FTS index can greatly
decrease the time required for a database search.
Improving search performance by searching large volumes of data.
Defining how the server interprets wildcards to customize search performance to your
specific needs.
Ranking search results according to their relevance to the search criteria. The more relevant
a search result is, the greater the weight. For more information, see Causing accrued and
weighted results with FTS (see page ).
To enable FTS
1. Install FTS with BMC Remedy AR System. (See Installing in BMC Remedy ITSM
Deployment online documentation.)
2. Configure the server for FTS. (See Configuring full text search (see page 578).)
3. Index fields for FTS. (See Defining a field for FTS (see page ).)
4. (Optional) Add a form search field to a form. (See Providing a shortcut for specifying
expanded FTS qualifications (see page ).)
5. (Optional) Set up forms for multiple-form FTS. (See Setting up FTS to search across
multiple forms (see page ).)
6. Re-index, as needed. (See Re-indexing considerations (see page ).)
To disable FTS
1. In a browser, open the BMC Remedy AR System Administration Console, and click System
> General > Server Information.
2.
BMC Remedy Action Request System 9.1 Page 1406 of 4703
BMC Software Confidential. BladeLogic Confidential.
For more information, see FTS tab configuration options (see page 579).
1. Configure each form so that it can be included in a multi-form FTS (see Configuring forms
for multiple-form FTS (see page )).
2. Configure the server for multi-form FTS (see Configuring the relevancy weight for fields in a
multiple-form FTS (see page )).
3. Update the AR System Multi-Form Search form (see Performing searches on multiple forms
(see page )).
4. Create or modify a form and workflow that enable users to search across multiple forms
(see Creating a form and workflow to search across multiple forms (see page )).
5. (Optional) Use date and time fields on your search form (see Using date and time fields on
your search form (see page 1414)).
If a user does not have permission to the Request ID field (field ID 1), the entire row is
eliminated from the multi-form FTS results.
The fields permissions of multi-form search enabled fields are not considered during multi-
form search. This causes the content for all the multi-form search enabled fields to appear in
the search results.
5. To exclude a form that has indexed fields from a multi-form search, select Exclude from
multi-form search.
6. (Optional) Enter field names in the following fields to set weighted relevancy fields:
Title — Enter the field that represents the title for the form. This field's contents
appear in the search results. Text found in this field is given a higher relevancy
weight than other fields on the form (based on what you enter in Title Field Weight
field on the FTS tab of the AR System Administration: Server Information form). For
example, you might enter the Summary field as the Title field because users are
more likely to enter text that would be found in the Summary field.
Environment — Enter the field that represents the environment for the form. This
field's contents appear in the search results. Text found in this field is given a higher
relevancy weight than other fields on the form (based on what you enter in the
Environment Field Weight field on the FTS tab of the AR System Administration:
Server Information form). For example, the form might contain a field that holds
environment information such as an Operating System field.
Keywords — Enter the field that would hold the words that would be included in a
search. This field's contents appear in the search results. For example, a keyword
might be printer. If you might enter the Problem Area field in the Keywords field.
When a user enters printer in a search, if that word appears in the Problem Area field,
that search result would have a higher relevancy weight than other fields on the form
(based on what you entered in Keywords Field Weight field on the FTS tab of the AR
System Administration: Server Information form).
You can enter only fields that have been indexed for FTS, and you cannot enter the
same field in more than one of the weighted relevancy fields.
For more information about the Title Field Weight, Environment Field Weight, and
Keywords Field Weight fields, see FTS tab configuration options (see page ).
7. Select the scan times for updates to fields that have been indexed for FTS.
Scan times affect only join, vendor, and view forms. For more information, see Scheduling
scans for updates (see page ).
8. Save the form.
Use the FTS tab of the AR System Administration: Server Information form to configure the
relevancy weights for:
See FTS tab configuration options (see page ) for more information.
You can set a title field, environment, and keyword on each form. See Configuring forms for
multiple-form FTS (see page ).
Note
You must re-index data so that any changes to the relevancy weights are applied to the
existing data.
The tabs on the AR System Multi-Form Search form represent the logical flow for you to follow to
set up a multiple-form search:
Note
A full-text search adds wildcards to search strings, but wildcards are not used in searches
across multiple forms.
For example, if you search for doc with full-text search, the percent wildcard (%) is added
before and after the string (for example, %doc%). Results can include strings such as
Doctor, Dock, doctrine, and haddock.
Conversely, for searches across multiple forms, wildcards are not added. It is assumed
that the applications knows what the actual terms are (because the application is already
using full-text search and controlling it more closely).
Must Have
May Have
Must Not Have
All the fields are optional, but the Must Have or May Have field must include data to obtain search
results. Additionally, the Must Have or May Have field must include data if the Must Not Have field
is supplied with a value.
Parenthetical AND, OR, and NOT queries can be constructed within the Must Have, May Have, and
Must Not Have fields. For example, in the May Have field, you could construct a complex
parenthetical query such as:
This produces a result where the entries searched must have computer, and must also have either
a keyboard or a mouse, and they must not have a printer.
If you perform an accrue type search in the May Have field (such as keyboard,mouse,computer
), the search results contain keyboard or mouse or computer. If you use the same accrue search in
the Must Have field, the search results contain only entries that contain all three.
If the May Have field and Must Have fields each contain a term, the only entries returned are
entries that match the Must Have field. However, any entries that also contain the words in the May
Have field have a higher score than entries that contain only words found in the Must Have field.
For example, if keyboard is in the May Have field and mouse is in the Must Have field, all entries
returned contain mouse, but entries that contain both keyboard and mouse have a higher score
than those entries that contain only mouse.
Form List — Enter a list of form IDs for forms that you want to search. Separate the IDs with
semicolons. If this field is blank, all FTS-indexed forms and fields (which the administrator
does not specifically exclude and to which the user has rights) are searched.
Search Filter — Enter an AND /OR /NOT qualification that uses the configured category
fields (defined by Full Text MFS Category Name field property) as well as create and modify
date fields. For example, you could supply the following search filter to limit the search:
In addition to using category fields, you can use the fields in the following table in a search filter
qualification.
When you filter with dates, you can use the =, <, >, <=, >= operators, for example:
The following qualification limits entries to those created only on September 1, 2009:
'createTime' = "1251784800"
The following qualification limits the entries to only those created since September 1, 2009
(open ended):
The following qualification limits the entries to those created only between (and including)
the dates of September 1, 2009, and September 15, 2009:
The following qualification limits the entries to those created only between (and excluding)
the dates of September 1, 2009, and September 15, 2009:
To configure what should be returned with each result, choose an option from Search Result Option
:
No Excerpt/WAH (the default) — Returns only the text that was searched for. (It does not
return an excerpt or the words surrounding the result.) This is the most efficient option.
Excerpt --- Returns the first thirty words of the resulting hit so that the user can read a
summary of the content. This option is less efficient than None, but more efficient than
Words Around Hit.
Words Around Hit (WAH) — Returns excerpts that contain the text from the search as well
as surrounding text. The text that was searched for is surrounded by brackets ([]). For
example, if printer was searched for, a result might be setting up the printer in the room 1B.
Count Only — Returns the potential number of matches for the search. (The count is taken
before row level permissions are applied, which may reduce the actual result set.)
Form
Entry ID
Title
Excerpt or Words Around Hit (if requested)
Weight (relevancy score)
Create Date
Modify Date
The Optional Return Fields area on the Result Data tab enables you to map a defined category
field to one of the Result fields. You can configure up to 20 result fields.
If the name of a category field is supplied in any result field at the time of the search, then that
result field is populated with the values from that category field. For example, if you enter the
following qualification, the values from the status filter field are returned in Result 1:
Note
To define a category field, enter a category name in the Full Text MFS Category Name
field property for the field. For more information, see Defining a field for FTS (see page
).
A character field where users enter the terms they want to search
A character field where users enter the terms they do not want in the results
A menu to choose the forms from which to search
Fields to enter a date range
A table field to display results
The following figure shows the example MFS:MultiFormSearch form, which is installed with BMC
Remedy AR System. You can study this form and its workflow to understand how multi-form
search works.
If you use the date and time in a filter query, send a normalized value (not the original date and
time string) through the filter. The normalized value is the same as the value on the AR System
server. (The date and time in the previous example is November 23, 2009, 12:00:00 A.M.)
Hidden_Integer [1250143200]
3. Use the value of the hidden integer for the value of the date that you are passing.
The resulting filter query would look something like this:
Re-indexing considerations
Most of the time, you should not have to rebuild your FTS indexes because the AR System server
periodically optimizes them after BMC Remedy AR System requests are added, changed, or
deleted. Some exceptions are:
If you change your Ignore Words List, Root Word List or Thesaurus you must rebuild the
FTS indexes (re-index). See How FTS indexing works (see page ).
Note
If you change your Ignore Words List, Root Word List or Thesaurus and you do not
re-index then only the entries inserted, deleted, or modified after that time are
affected.
If you change the Case Sensitivity setting, you must rebuild the FTS indexes, and the re-
indexing is started automatically when the change is saved.
Updates to entries for join, vendor, and view form types are not always generated in the
same manner as regular forms. See Scheduling scans for updates (see page ).
To rebuild the index for a specific field, you must clear the field for indexing on the Database
Properties tab of the Field Properties window, save the change, reselect the field for indexing, and
save the change.
Note
BMC recommends that you perform bulk indexing during off-peak hours, such as during a
maintenance window.
Do not rebuild indexes during normal production hours. Because re-indexing rebuilds your entire
set of FTS indexes from scratch, it can take a long time, depending on the following factors:
For more information about locating your FTS indexes, see Estimating the size of the FTS index
(see page ).
For multiple-form FTS, when you change the name in the Title field, the new Title field is re-
indexed for all existing entries. This updates the Title field values in the FTS index.
If you remove the field name in the Title field, the field is re-indexed to remove the Title field
values from the index.
For more information, see Configuring forms for multiple-form FTS (see page ).
When you add, remove, or change the Full Text MFS Category Name field property for a
field, the field is re-indexed.
For more information, see Defining a field for FTS (see page ).
If you change the Literal FTS Index field property for a field, the field is re-indexed.
If you change the Strips Tags For FTS field property for a field, the field is re-indexed.
After modifying the Ignore Words List, Root Word List, or Thesaurus
When you modify the Ignore Words List, Root Word List, or Thesaurus and you do not re-index,
your changes affect only entries inserted, deleted, or modified after that time.
For example, if you added network to the Ignore Words List, the FTS index ignores the word
network only for BMC Remedy AR System requests added or modified from this time forward.
However, the FTS index with the word network would still exist for all requests created before the
Ignore Words List was modified.
When you re-index all the fields in all your forms that are currently flagged as indexed for FTS, you
create a new FTS index that ignores the word network in all requests.
To change the Ignore Words List, Root Word List, or Thesaurus, see Configuring FTS for
localization (see page 591) or FTS tab configuration options (see page ).
Note
If you modify Ignore Words List, Root Word List, or Thesaurus, you must restart the
server for the changes to take effect.
You can index only the following field types for FTS:
Character
Diary
Attachment fields
Table fields (multiple-form searches only)
Index only frequently searched fields, such as work diaries and descriptions of problems, especially
if the underlying database does not support searches of these fields. For example, you could
perform a search for one or more keywords in a diary field that would retrieve and weigh all BMC
Remedy AR System requests that describe how to solve a problem suggested by those keywords.
You would perform a search on keywords or phrases such as:
When you define a field as indexed for FTS, it might take some time before that field is available for
searching if the form has entries. Indexing a field can take several hours, depending on the amount
of data in that field, the system load, and other factors. While a field is being indexed for FTS, you
can still do non-FTS searches on that field if the underlying relational database permits it.
For each field that you index for FTS, the amount of disk space required for the FTS index can
grow significantly. To estimate approximately how much space is required for your FTS index, see
Estimating the size of the FTS index (see page ).
Do not define fields for FTS during normal production hours, especially if you have many BMC
Remedy AR System requests in your database. Indexing uses database and AR System server
resources, which can have a significant impact on the performance of your system.
Note
The Index For FTS property does not appear for field types that are not valid for full text
search.
a.
BMC Remedy Action Request System 9.1 Page 1417 of 4703
6.
BMC Software Confidential. BladeLogic Confidential.
a. Enter a new or existing category name in the Full Text MFS Category Name field
property for the field.
At index time, the server checks whether an entry has any fields with a category
name (defined in the Full Text MFS Category Name field property). If so, the server
also indexes the field as that category name.
b. If the field is a table field that should be included in multiple-form searches, select
True for the Index for MFS property.
7. Save your changes.
BMC Remedy AR System begins to index the field for FTS.
The FTS index for a field is automatically updated and does not require manual
administration when you create, delete, or modify requests, provided that the field is a
character, diary, or attachment field on a regular form or view form with data that is not
changed from outside of BMC Remedy AR System.
This table would generate the following character string for indexing:
Sent email to customer Demo Still waiting to hear from customer. Demo Customer
responded. Demo
A string like this is created for each entry in the parent form using the table field rows that
correspond to that parent form entry.
All qualifying rows are indexed for the table field, regardless of the maximum rows value set
for table field entry retrieval.
For example, if you limit table field retrieval to 100 rows but 110 entries qualify, the server
includes all 110 entries in the character string it builds. If a search term is found only in the
10 entries the user does not see, it may not be apparent why the table field qualified as a
search hit. However, if the table is re-sorted, the search term could appear in the resorted
entries. (Note that table-field chunking is not relevant to indexing, but a search term might
not be displayed in the chunk the user is viewing.)
Permissions and row-level security is not enforced during searching on table fields, so a
user could potentially retrieve search hits from table field columns that the user cannot view.
Because character data is concatenated for table field searches, the server cannot eliminate
the data from inaccessible columns. If a table field contains highly sensitive data, you should
not index it for a multiple-form search.
BMC Remedy AR System does not automatically detect when entries are added or changed
in a supporting form, but the parent form entries should be re-indexed.
You can manually re-index a table field to keep the index up to date, but no automatic
solution exists. Instead, to keep table field indexes up to date, create workflow that pushes
updates to the parent form entries when changes are made to entries in the supporting form.
When a change is detected in the parent form entry, BMC Remedy AR System re-indexes
the entry, including the table field. Some applications update only the table field supporting
the form through parent form interaction. In those cases, the parent form might already be
experiencing an update, and additional workflow is not necessary.
Some table fields are not eligible for multi-form search indexing. If the table field qualifier
has EXTERNAL qualifications or display-only field references and the Index for MFS field
property is set to True, an error is returned when the user tries to save the form.
In many cases, you can achieve the necessary search functionality by creating a copy of the
displayed table field and making that copy a hidden table field on the form. This hidden table
field can have a simpler qualification containing only database fields, making it eligible for
multi-form search indexing. The goal is to index (in the copied table) all of the table field data
that can be seen when viewing the displayed table field. Many times the additional
qualification clauses that contain display-only fields are used to dynamically filter the table
field rows. By removing those clauses, the indexing occurs on all the rows in an unfiltered
manner. Because multi-form searching is not field specific, indexing a copy of the field with a
modified qualifier can produce the necessary results.
To increase the relevance, an entry must have a document boost value of 1.1 to 2000. The higher
the value, the more relevant the entry is. To decrease the relevance, an entry must have a
document boost value of 0 to 0.9. The lower the value, the less relevant the entry is.
configure more indexing threads for FTS. However, you must exercise care. For more information,
see the "Defining queues and configuring threads" section in Setting ports and RPC numbers (see
page 303).
A full text dispatcher thread processes the indexing tasks in real time on a first-in, first-out basis,
queuing them for indexing threads to process. As a result of this indexing model, the performance
of the originating transaction is affected only marginally by inserting the indexing task record into
the system table, and is not subject to delays associated with full text indexing. However, the data
might not be immediately available for searching. The size of the delay depends on the size of the
indexing queue and the availability of system resources to perform the indexing.
The Full Text Search (FTS) has smart processing for all the entries to be indexed. The smart
process optimizes the processing of the redundant entries and results better indexing performance.
It provides the following functionality:
Note
BMC recommends that you perform global re-index or schema re-index during off-
peak hours, such as during a maintenance window.
Re-indexing of entire schema or form deletes the existing indexes and creates the
indexes again. So the re-indexing of a form may be faster as compared to
individually updating the index for more number of entries.
If the administrator has disabled indexing, indexing tasks are still recorded, preserving the changes
for later inclusion when indexing is enabled.
Note
For HTML and XML file attachments, only the content (not the metadata) is indexed. That is, the
elements and their attributes are not indexed.
The mbox format (extracts email messages from the mbox format used by many email
archives and UNIX mailboxes)
Note
New versions of file formats for vendor products are assumed to be compatible with
previously supported versions. In the event that a vendor does not provide backwards
compatibility, BMC reserves the right to rescind support for a specified version of a
vendor's product and document such incompatibilities once confirmed. BMC might, at
BMC's discretion, attempt to address a discovered incompatibility by modifying the
current version of BMC Remedy AR System. However, if major architectural changes in a
vendor product require significant BMC development to achieve tolerance, support for the
vendor product may be deferred to a later version of BMC Remedy AR System.
How FTS indexing works for localization and attachment file formats
With some special considerations for attachment fields, the full text feature can index any content
where the character set is compatible with the AR System server's character set. If the AR System
server is running as a Unicode server, the full text feature has no restriction on the encoding format
of the data content. You can index and search content in multiple languages.
With a non-Unicode AR System server, the data content must be compatible with the server's
character set. When indexing and searching attachments with common formats, such as Microsoft
Office documents and PDF documents, the full text feature can process the data without a
dependency on the server's character set. For plain text files, the full text feature requires that the
server recognize the character set of the data.
Note
The locale of the AR System server defines the locale by which all text is processed.
Language text can be indexed and searched, but the analysis (stemming, thesaurus, and
root words) is applied according to the rules for the server's locale. For example, if the
server is set up for English (en), all words (whether they are English or any other
language) are processed as if they were English.
FTS assigns a weight to requests retrieved in an accrue operation. Weight is an integer value from
0 to 100. With weight, BMC Remedy AR System can sort requests in a results list using a "the
more, the better" approach. If a user sets the Field Sort Order in the browser to include WEIGHT in
descending order, the more search terms found in a request, the higher in the list it appears in the
set of retrieved requests. The closer Weight is to 100, the better it matches the search criteria.
For more information about modifying results list attributes to include FTS weights, see Displaying
FTS weight in a results list (see page ).
For literal fields, the content of the field is treated as a single token with no modification. For
example, x-y=z becomes x-y=z (one word). All the text constitutes the token or word stored in the
index. It can be found in a search only by supplying the exact matching string. That is, searching
for y does not find a match, but searching for x-y=z does find a match.
Words are split at punctuation characters, and punctuation is removed. However, a dot that
is not followed by white space is considered part of a token.
one:two becomes one two (two words).
Alpha#Omega becomes Alpha Omega (two words).
x.y.z becomes x.y.z (one word).
Words are split at hyphens unless the token contains a number, in which case the whole
token is interpreted as a product number and is not split.
x-y=z becomes x y z (three words).
KX-13AF9 becomes KX-13AF9 (one word).
Email addresses and internet host names are recognized as one token.
someone@bmc.com becomes someone@bmc.com (one word).
www.bmc.com becomes www.bmc.com (one word).
In words with no spaces, the ampersand (&) is retained.
Smith&Brown becomes Smith&Brown (one word).
If full text searching is activated and the field is indexed for FTS, FTS is used.
If full text searching is not activated or the field is not indexed for FTS, AR System uses the
search capability of the underlying database. Under these conditions, attachment fields have
only their names searched.
Field permission-related behavior for FTS fields is the same for non-FTS fields.
Users enter search criteria in the same way, whether they are using FTS or not, with the exception
of accrual searches.
The search method that the FTS engine uses depends on the following factors:
FTS uses these factors to determine the final search criteria. Succeeding factors override
preceding factors. For example, if a user includes a leading wildcard as part of a full text search but
the FTS Search Options setting is set to Ignore Leading Wild Card, FTS ignores the wildcard that
the user entered. See Using the query-by-example method (see page ) for more information.
The FTS engine uses the final search criteria to search the contents of all requests indexed for that
field, and it uses one of the following search methods:
Note
All the following examples use FTS in the Advanced Search Bar, not QBE. They assume
that the FTS Search Option is set to Query Unchanged.
With this example, a full text search finds requests with the phrase "firewall blocked" with the
search for blocked expanded to the word stem block with any of its variants.
Note
The use of wildcards in a word or phrase search affects how stemming is used. For more
information, see Searching for variations of word stems (see page 1430).
The following table outlines the expected search results using a word or phrase search.
For example, if you wanted to search for the words "firewall" and "blocked," enter:
For this example, a full text search will find requests with any occurrence of the words firewall or
blocked with the search for blocked expanded to the word stem block with any of its variants.
Note
You can use the accrue operator only with fields indexed for FTS. Using the same
operator for a field that is not indexed for FTS causes the AR System server to search for
the literal string with a database search.
The following table shows the expected search result using an accrue search.
With this example, a full text search finds requests where the entire content of the field is firewall
(or Firewall if searching with case insensitivity).
The following table outlines the expected search results using a literal search.
block
blocks
blocked
blocking
Wildcard searches — For example, if the search term is %blocking%, only requests
containing blocking" are returned.
Case-sensitive searches — For example, a case-sensitive search for block returns only
requests containing block.
Note
A full-text search adds wildcards to search strings, but wildcards are not used in searches
across multiple forms.
For example, if you search for doc with full-text search, the percent wildcard (%) is added
before and after the string (for example, %doc%). Results can include strings such as
Doctor, Dock, doctrine, and haddock.
Conversely, for searches across multiple forms, wildcards are not added. It is assumed
that the applications knows what the actual terms are (because the application is already
using full-text search and controlling it more closely).
If the property is not set to Equal, appropriate wildcards are added to the search terms
automatically.
If the property is set to Equal, you must add the appropriate wildcards to the search terms.
Note
Attachments cannot be searched with the QBE method unless a special Form Search
field is present on the form. For more information, see Providing a shortcut for specifying
expanded FTS qualifications (see page 590).
Users can enter a QBE in any field indexed for FTS, according to the following syntax:
left,center,right
However, the property settings influence how an accrue search works, as shown in the following
table.
Anywhere %left,center,right%
The client adds wildcards to the start and end of the search. The server makes a special interpretation of these
search criteria for a full text search and places a leading and trailing wildcard around each search term. For
example:
%left%,%center%,%right%
Leading left,center,right%
The client adds a wildcard to the end of the search. The server makes a special interpretation of these search
criteria for a full text search and places a trailing wildcard after each search term. For example:
left%,center%,right%
Equal left,center,right
The client does not add any wildcards to the search string, but it uses the EQUAL (=) operator instead of the LIKE
operator. This has no effect on the server's full text search.
1. On BMC Remedy Developer Studio, open the form and select the required field.
2. On Properties section of the field, on the Database property, select the QBE match from the
QBE Match drop-down list.
Users can search terms in multiple fields for a QBE search or specify an advanced search like the
following example:
This qualification returns all entries that contain firewall and were created on or after January 1,
2006.
Limitations of FTS
Limits to performing a full text search include:
In accrue searches, you cannot search for most punctuation marks because they are
treated as word separators.
In accrue searches, do not use words from the Ignore Words List. For example, if the word
the is in the Ignore Words List, searching on the phrase the, database, request in the
Short Description field might return requests with the word the in them, but it is not used in
the search itself. For additional information about the Ignore Words List, see Configuring the
Ignore Words List (see page ).
Submitted or modified requests might not appear immediately in the results list if you are
searching on a field enabled for FTS. Sometimes a short delay occurs between the time the
request is submitted or modified in the database and the time that the request is available
for searching in the FTS index.
The indexing of fields on form types that require scanning for changes (join, vendor, and
view forms with data updated outside of BMC Remedy AR System) does not recognize the
deletion of entries and does not remove the indexing for those entries from the index. You
must manually reindex those form types occasionally to remove deleted entries from the
index.
Searching conducted within filter workflow that involves qualifications with full text indexed
fields can produce unexpected results if the searching depends on data that was created
during the same filter sequence. Database searches can find data that was recently created,
but full text searches cannot. To preclude the use of full text searching during a filter that
conducts this type of search, select the Use FTS in Workflow option on the FTS tab of the
AR System Administration: Server Information form. For more information, see FTS tab
configuration options (see page 579).
Full text searches that involve a field reference to the right of the relational operator are not
supported. A warning message occurs that indicates that the query was treated as a
database query instead of an FTS query. The presence of 'Target' in the following
example returns the warning message if the Short Description field is indexed for FTS:
If no variables are to the right of the LIKE keyword in the statement, FTS handles the
search. For example:
In this example, the search is handled by FTS because the known values (block and ing)
are combined to form one known value (blocking).
The arftsutil utility is embedded in the AR System interactive GUI installer and runs automatically if
a single-file Lucene 2.9 index is detected. If the GUI installer detects that a Lucene 4.9 index is
present, it does not execute arftsutil again.
The AR System GUI installer has no option to override automatic migration but you can bypass the
migration by running the installer in silent mode with the following option:
-J BMC_AR_SKIP_FTS_INDEX_MIGRATION=true
To manually migrate a 2.9-based index, run arftsutil from the command line.
Windows servers:
Note
Related topics:
Every server with valid BMC Remedy AR System Server Group Operation Ranking acts as
an indexer server.
Each indexer has its own copy of indexes.
The searcher server sends the search requests to indexer servers.
In event of an indexer server failure or service interruption, a search request is routed to the
highest ranking available indexer server to complete the search request.
You can install more than one FTS server in a server group. Each FTS server is defined in AR
System Server Group Operation Ranking form acts as an indexing server and provides FTS search
services to other servers in the server group. If the FTS Rank 1 server becomes unavailable, the
FTS server that is ranked 2 contains the redundant FTS data and is used for the failover. So all the
servers in the server group operate as an independent FTS server, providing high availability and
service failover.
For more information about how FTS high availability works in a server group environment, see
High-availability architecture for FTS (see page 581) and Configuring full text search for a server
group (see page 382).
For more information about the BMC Remedy AR System Server Group Operation Ranking, see
Setting failover rankings for servers and operations (see page 378).
Note
To configure FTS high availability and failover, all FTS plug-ins must run on same port.
Note
This video is recorded using the earlier version of BMC Remedy AR System and is valid
for BMC Remedy AR System 9.1.
Related topics
Upgrading from 7.6.04, 8.0, 8.1, or 8.8: You should reconfigure failover in the FTS ranking
form, after the upgrade is complete. In this case, an extra plugin entry ARSYS.ARF.FTS
ARSYS.ARF.FTS is created on the indexer machine. There is no impact of this entry and
you can ignore it.
Upgrading from 7.6.04 SP5, 8.1 SP1 or SP2: You need not reconfigure failover in the FTS
ranking form.
To enable failover with the AR System Server Group Operation Ranking form , refer to Setting
failover rankings for servers and operations (see page 378).
For information on enabling FTS high availability, refer to Enabling FTS high availability (see page
).
Related topic
FTS Configuration form in the AR System Administration Console (see page 584)
BMC Remedy AR System server implementation BMC Remedy AR System server implementation
1 Set Entry
BMC Remedy AR System server implementation BMC Remedy AR System server implementation
3 Index Entry
1 Set Entry
3 Index Entry
Mail A computer system within your environment that is running a third-party software program that processes incoming
server and outgoing email messages. Examples include the Microsoft Exchange server or the UNIX sendmail program.
Failover A mail server that acts as a failover system, assuring uninterrupted processing of messages, when the primary mail
mail server stops working. You can define this by using the BMC Remedy AR System Email Failover Mail Server form.
server For more information, see Multiple mail server support (see page ).
Email A user account on a mail server that permits a user to transmit or receive email messages.
account
Note
An email account is not the same as an email address. An email account consists of a user name and
often includes a password. Users must log in to the mail server by using an email account before they can
send and receive email.
Mailbox An entry in the BMC Remedy AR System Email Mailbox Configuration form, which resides on your AR System
server. A mailbox contains all of the information required by BMC Remedy Email Engine to access mail from a mail
server or to request that mail be sent by a mail server. As such, a mailbox can contain such information as the name
of the mail server, the protocol used by that mail server for sending or receiving mail, and email account information
(if required). Mailboxes are configured to be either Incoming mailboxes or Outgoing mailboxes.
Incoming A mailbox containing the information required by BMC Remedy Email Engine to connect to and read email
mailbox messages from a specific email account on a mail server. Email messages in this email account are assumed to be
directed to the BMC Remedy Email Engine. The installation program provides an option for creating and configuring
an initial incoming mailbox. You can use this mailbox to get started with BMC Remedy Email Engine; you can then
change these settings or configure additional mailboxes.
Outgoing A mailbox containing the information required by BMC Remedy Email Engine to create and send messages. BMC
mailbox Remedy Email Engine uses this mailbox to send notifications, send the results of queries, and so on. The
installation program provides an option for creating and configuring an initial outgoing mailbox. You can use this
mailbox to get started with the BMC Remedy Email Engine; you can then change these settings or configure
additional mailboxes.
In a broader sense, instructions see all the parameters contained in an email message that perform certain
actions; for example, logging in to the server, querying for all tickets assigned to a user, and returning the
results in HTML format.
In a narrower sense, instructions see a specific set of actions used in an email message; for example, Query,
Submit, or Modify. The term Instruction can also be used as an alias for Action in a label/value pair.
This topic presents a sample scenario that demonstrates how Email Engine interacts with the BMC
Remedy AR System and your mail server. The following figure presents a sample environment for
an Email Engine implementation, including the flow of activity.
In the XYZ Company, Shelly needs a list of the latest issues stored in the Help Desk (HD) Incident
form. She wants the results of this query to be returned in an easy-to-read email. Also, Shelly
wants to make sure that her coworkers, Katie and Mark, will be copied with the results of this
query. All of the steps that Email Engine and the users must take to make this happen follow.
1. The local administrator installs Email Engine, configuring Incoming and Outgoing mailboxes
to work with the company mail server.
After Email Engine is started, it contacts the AR System server. It then reads all the entries
in the AR System Email Mailbox Configuration form and creates Incoming and Outgoing
mailboxes based on that information.
2. After the administrator notifies the user base that Email Engine is running, Shelly composes
an email instructing the Email Engine to perform a query of the HD Incident form. She uses
specifically formatted instructions to be read and understood by the Email Engine. She
sends this message to an email account on the company mail server that Email Engine polls
for incoming.
3. After waiting for a prescribed polling period, Email Engine logs in to the company mail server
by using the email account information gathered during step 1 (see page 1442). Because the
mailbox information tells the Email Engine that this email account is to be treated as an
Incoming Mailbox, the Email Engine reads the most recent emails from this account, by
using one of several email protocols (POP3, IMAP4, MBOX, or MAPI), including the email
that Shelly sent.
4. Email Engine interprets the instructions and translates them into API calls to the AR System
server, attempting to fulfill her query request.
5.
BMC Remedy Action Request System 9.1 Page 1442 of 4703
BMC Software Confidential. BladeLogic Confidential.
5. The AR System server responds to Email Engine API calls with the appropriate query
information for the HD Incident form.
6. Email Engine uses the formatting instructions in the Outgoing Mailbox to construct an email
message to the company mail server. Email Engine then transmits the message with
instructions to send the message to Shelly, Mark, and Katie, by using the outgoing email
protocol (SMTP or MAPI).
7. Shelly, Mark, and Katie log in to the mail server, and they find the email constructed by the
Email Engine, which contains a neatly formatted list of the most recent requests.
This example illustrates the relationship between the Email Engine and other systems in a
simplified environment. Your environment might differ from the one presented here. For example,
the Email Engine might reside on the same system as the AR System server. Alternatively, you
might configure the Incoming Mailbox and Outgoing Mailbox to use the same email account on
your mail server, and so on. Many of the configuration options available are explained in the
upcoming sections. Also, as you proceed through this section, you will learn about the other Email
Engine features for processing email.
Realizing the importance of BMC Remedy AR System notifications, the administrator takes steps
to replace the plain text email generated by the Email Engine. To improve its look and feel, he
designs attractive HTML pages to use as header, footer, result, and content templates. He works
Most important, he designs a data-driven workflow that dynamically assigns the correct templates
based on the ticket's impact. The templates are designed so that users can quickly tell whether a
ticket's impact is urgent, high, medium, or low.
1. Shelly is visiting an important client in Chicago. She needs information from the corporate
website within the hour to close an important deal, but the web server is down and her web
client keeps returning error messages. She composes an email with status marked Urgent
and sends it to the Incoming mailbox.
2. The Email Engine receives the email from the mail server. It parses the instructions in her
email, and makes the appropriate API calls to the AR System server.
3. The server fires a filter that triggers a Notify action. Under normal circumstances, email
notifications are formatted with a standard HTML header and result template. But if a
submission is marked Urgent, the filter workflow creates an email notification with the Urgent
header template.
4. The Email Engine constructs the message according to formatting instructions contained in
the Outgoing Mailbox it is using. This message consists of the field values from the HD
Incident form (submitter, short description, status, assignee, and so on) along with the
header and reply templates that are stored by the AR System server in the AR System
Email Templates form. The Email Engine then transmits the message to the mail server with
instructions to send the message to Francie Frontline, the first-line Customer Support
engineer.
5. Francie Frontline logs in to the mail server to see if she has new mail. She sees the Urgent
email constructed by the Email Engine. She clicks the URL in her email, and the ticket
opens in her browser. Because the email is marked Urgent, its importance jumps to the top
of her To Do list. She troubleshoots and quickly resolves the problem. When Francie marks
the ticket as Fixed, the server fires a filter Notify action. Shelly then receives an email
notification from the system that her web access problems have been solved. She can now
access the information she needs to close her sale.
For more information, see Dynamically assigning templates to outgoing email (see page ).
In the illustration, M1 is specified as the primary mail server, and M2 and M3 are specified as
failover servers. If the Email Engine detects that M1 is not working, it checks whether M2 is
available, and if so, it switches to M2.
The Email Engine then tries to connect to M1, and if that is not yet working, it connects to M2.
Then, if the Email Engine detects that M2 is not working, it checks for the availability of M1. If M1 is
still not working, it looks for the failover server for M2, which is M3. If M3 is available, it switches to
M3 and continues processing messages as described in the preceding note.
If none of the configured mail servers is working, the Email Engine produces an error and stops
processing.
When switching from a server being currently used to its failover server, an entry is added to the
stderr.log (Windows) or emaild.sh_log (UNIX) file. However, when switching back from the failover
server to the primary server, no change is made to stderr.log or emaild.sh_log.
Note
The multiple mail server support is currently available for the SMTP protocol only.
In this scenario, John, the local BMC Remedy AR System administrator, has decided to test the
notification capabilities of the Email Engine.
1. In the XYZ Company, the IT department has a service-level agreement (SLA) that urgent
HD incident tickets must have a response in one hour. The AR System administrator
designs an escalation that triggers a Notify action to send an email notification to the
backline support engineers if the SLA is not met. Because of a sudden swell of incoming
tickets, the front line engineers cannot respond to one of the urgent request in one hour. As
a result, the AR System server triggers an escalation.
2. Because John has configured the Notify escalation to use email as the notification
mechanism, when the escalation is triggered, the AR System server creates an outgoing
record in the AR System Email Messages form. The Email Engine monitors the AR System
Email Messages form for all outgoing messages, and then sends the messages to the
outgoing mailbox on the mail server.
3. The Email Engine constructs the message according to formatting instructions contained in
the Outgoing Mailbox it is using. This message consists of the field values from the HD
Incident form (submitter, short description, its urgent status, assignee, and so on). The
Email Engine then transmits the message to the mail server with instructions to notify Bob
Backline, the back line Customer Support engineer.
4. Bob's email client receives the new email. He reads that an urgent ticket has been assigned
to him. Most importantly, Bob sees that all the necessary details of the ticket are contained
in the email constructed by the Email Engine.
Note
The examples of outgoing email in these sections make extensive use of label/value
pairs, aliases, variables, templates, and special keyword syntax as message content; the
Email Engine ignores any other text. For more information, see the detailed reference
material and examples of their use in Creating and using email templates (see page ).
This section describes the different types of outgoing email in the Email Engine:
Notifications — The most important use of outgoing email is using workflow to send
notifications to users. AR System uses the Email Engine to send all notifications, not just
email. You must install the Email Engine to send notifications (see page 1447)from the AR
System server.
Replies to senders — A common function of outgoing email is making replies to senders
(who send email to the incoming mailbox) with results. When you created an incoming
mailbox, one crucial task you perform is associating an outgoing mailbox, specifically for the
purpose of replying to emails that require a response, for example, query results. For more
information, see Sending professional-looking reply email (see page 1477).
Messages form — You can send outgoing email using the AR System Email Messages
form. You can type the message, or specify contents templates to use in the body of the
email. Typically, you only use the AR System Email Messages form (see page 1462)for
configuring or troubleshooting the Email Engine. The average user never sees or needs this
form.
Sending notifications
This section contains information about:
The most important use of the Email Engine is sending notifications to users because AR System
uses it to send all notifications, not just email. You must install the Email Engine to send
notifications from the AR System server.
One major benefit of the Email Engine is the ability to notify users with a professional-looking
HTML-formatted email. The following figure illustrates a notification that a ticket was created and
sent to a user. In the notification email, users can then click a URL to open the ticket in a browser
and view additional details about the ticket.
If you choose Email as the delivery mechanism when creating a Notify filter or escalation, you can
send the following types of information in an email notification:
Text messages
Contents of selected fields (if the user being notified has the appropriate permission for
those fields)
Attachments (if an attachment field exists on the form)
Shortcut (if you select the Add Shortcut option in the Notify dialog box, a shortcut is as an
attachment to the email notification; this shortcut provides a link to the entry on the AR
System server.)
To send email notifications, you must install the Email Engine. The Email Engine can be installed
on a separate server from the AR System server processing the workflow. When you install Email
Engine, point to the AR System server you intend to use. For more information about using filter or
escalation workflow, see the Filter and escalation workflow considerations.
Note
If you create notifications using the Submit execute condition with join forms, the fields
returned in the notification message will not be populated. This is because there is no
Request ID with join forms during a Submit operation.
In a Notify action from filter or escalation workflow (see the following figure), you can select Email
as a notification mechanism. When you select Email, the bottom part of the window displays three
tabs — Fields, Messages, and Templates — that are used to define the configuration and contents
of your email message.
The Email Engine must be running to enable you to send email notifications. You can set some
configuration options in the Create Filter (or escalation) dialog box when you create a Notify filter or
escalation to customize your email.
1. Make sure that you have an outgoing mailbox configured with Default Outgoing Mailbox set
to Yes, or set Mailbox Name in the workflow to the configured outgoing mailbox. Otherwise,
you will not receive any notifications.
For more information, see Configuring outgoing mailboxes (see page 634).
2. Create your Notification filter or escalation.
3. Click the If Action tab or the Else Action tab.
4. From the New Action list, select Notify.
The Notify Filter (or escalation) page of the Create Filter (or escalation) dialog box is
displayed. The fields required to define the Notify filter or escalation appear.
5. In the Text field, enter the text of the message.
You can use the Text list to insert fields from the current form or keywords into the text. The
field or keyword will be expanded when the notification is sent, to a maximum of 32 KB.
You can include sophisticated BMC Remedy AR System functionality in the text of an email
notification. The following figure demonstrates the use of a URL that performs a search that
goes directly to the request the user needs to view.
This URL appears in the notification email as a link that the user clicks to display the ticket in
a browser.
A direct access URL used in email notification
(Click the image to expand it.)
For more information, see URLs for forms and applications (see page 2855).
6. In the User Name field, enter the name of the users or groups to notify. For each recipient,
an entry is made in the AR System Email Messages form (see the following figure). You can
enter a maximum of 255 characters.
To specify one or more recipients, enter any of the following choices separated by hard
returns (the server evaluates each line separately) in the User Namefield:
AR System user logins
AR System groups
Email addresses
Include the email domain name if you are entering an email address (for example,
Joe.User@acme.com) or a keyword (for example, $USER$@acme.com). The order
in which these entries appear is the order in which the Email Engine searches for
addresses. If the contents of the User Name field do not match an existing User or
Group definition, the system interprets the field contents as a literal address and
sends the notification to that address by SMTP, IMAP, MAPI, or POP mail protocols.
This address can be an email address representing users who are not using BMC
Remedy AR System, an alias for a group, or an email address representing a
program.
Warning
Do not use group notifications as an email system for broadcast type items
because the server processes a notification for each member. An email
alias is more efficient. If you are using a field reference (for example,
$Submitter$), do not include the domain name as part of the notification
because the email address is being read from the Email Address field of the
user's entry in the User form.
7. Enter a value in the Priority field; ranges of 1 to 10 are acceptable. By default, emails are
sent out from the Email Engine in the order they were received, not in the order of priority.
8.
BMC Remedy Action Request System 9.1 Page 1450 of 4703
BMC Software Confidential. BladeLogic Confidential.
8. To set properties in the EmailDaemon.propertiesfile so that the Email Engine sends high-
priority emails first and then lower priority emails, change the following property as shown:
*SortMessages= true *
For more information, see Email daemon issues when AR System server stops (see page
4534).
9. From the Mechanism field, select Email.
The Fields, Messages, and Templates tabs are activated. For more information, see
Defining fields in email notifications (see page 1451) and The Messages and Templates tabs
(see page 1453).
10. Select the Add Shortcut check box to include the originating request as an ARTask
attachment in the email that is sent.
11. Save the filter or escalation.
1. Enter the text that will appear in the subject line of the email.
Subject text can include the use of keywords, for example, $USER$. The field or keyword
will be expanded when the notification is sent. If you enter a field name in the Subject Line
field, the notification will contain the value of the field in the database. You can enter a
maximum of 255 characters.
2. Select which fields have the content you want to select in the email (in addition to the
notification text).
Note
The Request ID of entries from display or vendor forms are not returned in
notifications.
Note
If you use a content template to format the email, the template will override
any of the options that are selected. For example, if an administrator
selected All, but the template only uses a few fields, only the fields in the
template appear in the email.
Make sure that all fields used as variables in header, footer, and content templates
are selected in the Include Fields list of the filter. (For more information, see Variables
(see page ).)
To be able to send the field contents, make sure that users being notified have the
necessary permissions. See Access control (see page 1269).
The order of fields included in an email notification is strictly based upon their
arrangement in the form view. Using their X and Y coordinates, the order of fields
begins top left to right, then down (in a zigzag-like pattern). Fields excluded from the
form's default view are randomly included at the bottom of the list. If a form includes
page fields, the pages are ignored. The order of fields included in the notification is
still based on their actual X and Y coordinates in the form.
3. To include attachments in an email notification, select the attachment fields from the Fields
list.
Including attachments with notifications
(Click the image to expand it.)
Make sure the receiver of the notification has permission to the attachment field on the BMC
Remedy AR System form. The following figure shows that this notification will be sent to the
ticket assignee ($Assigned To$). To receive the attachment, the $Assigned To$ group must
have permission to the field, which the BMC Remedy AR System administrator defines
After the notifications are sent, the message status changes in the Email Messages form
from Yes to Sent.
If you chose to delete Notification messages in your mailbox configuration, the notification
email entry is deleted from the Email Messages form. (See Deleting email notifications (see
page ).)
Any entries in the fields in the Messages and Templates tabs will override the default settings. If
there are no entries in the Messages and Templates tabs, and no default mailbox exists, an error
message will be generated.
1. In the Mailbox Name field, enter the name of the outgoing mailbox that you want to handle
the notifications if you do not want to use the default mailbox.
You can use a field or a keyword to substitute the mailbox name. This mailbox name should
correspond to a valid mailbox configured in the AR System Email Mailbox Configuration
form.
2. Enter information in the From, Reply To, CC, and BCCfields:
If you make multiple entries in these fields, separate the entries by hard returns. The
maximum size of these fields is 32000 characters.
You can use the following entries in the fields:
AR System user logins
AR System groups
Email addresses--Include the email domain name if you are entering a user's
name (for example, Joe.User@acme.com) or a keyword (for example,
$USER$@acme.com).
A field
A keyword
The order in which these entries appear is the order in which the Email Engine
searches for addresses.
If you fill in these fields, the Email Engine populates the equivalent fields in the AR
System Email Messages form for the appropriate user name (the following figure).
However, if the information for these fields in the AR System Email Messages form is
supplied from the AR System Email Mailbox Configuration form (that is, a specified
mailbox, or a default mailbox that has already been configured), you need to display
and save the AR System Email Messages form before you see the entries.
3. In the From field, enter the name to be displayed to indicate where the mail is from.
If this field is blank and there are no entries in the From field on the Advanced tab of the AR
System Email Mailbox Configuration form for the specified mailbox, or for the default
mailbox, there will be no entry in the email to indicate who the email is from.
4. In the Reply To field, if you enter a group name, a reply will be sent to all the names in the
group.
If this field is blank, and there are no entries in the Reply To field on the Advanced tab of the
AR System Email Mailbox Configuration form for the specified mailbox, or for the default
mailbox, there will be no entry in the email to indicate any Reply To.
5. In the CC and BCC fields, if there are no entries in these fields or the Default Addressing
section of the Advanced tab of the AR System Email Mailbox Configuration form for the
specified mailbox, or for the default mailbox, no copies of the email will be sent.
If you specify multiple recipients in the User Name field (see the following figure), the name
or names specified in the CC and BCC fields on this form will appear only in the CC and
BCC fields of the AR System Email Messages form entry for the first user listed in this User
Name field. The permissions applied to the recipients of the CC and BCC fields will be the
same as those of this first listed user. This might be a security issue, especially if you list a
group name with some ambiguity about which is the first name on the list. You might list
names individually in the User Name field so that you have more control over the permission
status.
6. In the Organization field, enter a company name, an organization, a keyword, or a field
reference to a name that you would like to appear on the email.
Tip
A more "advanced" solution can use a Set Fields action to dynamically set template
values using data-driven workflow on a transaction basis. For example, a filter could read
a value from a hidden field on a form. By default, a notification would use a default header
template. But if a ticket was marked Urgent, workflow would substitute a value that uses
the Urgent header template instead. For more information, see Dynamically assigning
templates to outgoing email (see page ).
1. In the Header, Content, and Footer fields, specify the names of the templates to use for a
header, content, or footer of the email notification.
You can enter the name of the template directly, or enter a field reference or keyword that
leads indirectly to a template name. The templates specified here must be stored in the AR
System Email Templates form, and the name must be the same as that entered in the
Template Name field of the AR System Email Templates form.
For more information about creating and using templates, see Creating and using email
templates (see page )
When you create a content template for_email notifications_, the variable format must
correspond to a field's database name and not the field label.
If you are using a content template for email notifications and you want to see the
notification text in the corresponding email, you must use the following variable format in the
content template:
To create a content template to show Status History when doing email notifications,
represent the Status History in the following formats:
These formats are based on AR System core field ID 7. The Status History strings shown
here as examples could also be displayed languages other than English.
Note
You cannot use BMC Remedy AR System keywords in content templates for
outgoing emails in notifications.
2. Click Add Action, and save your changes to the filter or escalation.
The system determines which templates to use in the following order:
a. The template entries in this tab.
b. The templates set as defaults for the mailbox entered in the Mailbox Name field of the
Messages tab of the Notify action dialog box.
c. The templates set as defaults for the default mailbox.
d. No templates are used.
If no template is used for the Content, the order of fields included in an email
notification is strictly based upon their arrangement in the form view. Using their X
and Y coordinates, the order of fields begins top left to right, then down (in a zigzag
pattern). Fields excluded from the form's default view are randomly included at the
bottom of the list. If a form includes page fields, the pages are ignored. The order of
fields included in the notification is still based on their X and Y coordinates in the
form.
The Notify filter and escalation action integrates with Email Engine templates, allowing dynamic
template assignment. With templates stored as "data in a form," you can see them using workflow.
The Templates tab of the Notify action allows you to assign header, content, and footer templates.
As demonstrated in , you can hard-code these templates by using the template name. You could
also dynamically assign templates through workflow.
Suppose that the XYZ software company uses four HTML header templates (already stored in the
AR System Email Templates form) to provide a banner at the top of outgoing emails that are sent
when records are assigned. The templates are designed so that technicians can quickly tell if an
incident's impact is urgent, high, medium, or low.
Urgent Header_Urgent.htm
High Header_High.htm
Medium Header_Medium.htm
Low Header_Low.htm
You can create a data-driven approach to dynamically assign the correct template for the
appropriate impact.
The following procedure assumes your Email Engine is properly configured, your users have their
own email mailboxes set up, and you have created and stored your templates. This procedure
requires that you first create the following BMC Remedy AR System objects:
9. Create a filter to set the value for the Header Template field on the XYZ Incident form.
a. In the Basic tab, select XYZ_Incidents as the form.
b. Select Submit and Modify as the execute conditions.
c. Enter 'TR.Impact' != $NULL$ as the Run If qualification.
Here you want the filter to execute on Submit or Modify whenever the value of the
Impact field changes (that is, when the filter detects there is a new transaction value
in the Impact field).
10. In the If Action tab, create a Set Fields action with the following parameters:
a. Read the value for the field from the XYZ_Templates form.
b. Enter 'Impact' = $Impact$ as the Set Fields Run If qualification.
c. Select Header Template as the field name and $Template Name$ as its value.
With this workflow, the name of the proper template, based on its impact, is stored
with each incident. Here you define the filter to query the XYZ Templates form
created earlier where 'Impact' = $Impact$, and you set the value of the Header
Template field on the XYZ Incident form from the value of the template name field on
the XYZ Templates form.
11. On the filter, create a Notify action.
a. Place the variable $Header Template$ in the Header field.
b. Enter other parameters as needed, for example, $Submitter$ as the user name,
relevant text (including request ID of the ticket), and so on.
The result of this filter is data-driven automatic template assignment workflow.
12. In the XYZ Incidents form, create a new ticket (for example, for Joe User) and assign it an
urgent value.
The filter workflow executes and creates a new ticket. This workflow will also create an
email notification with the proper header template dynamically assigned based on its impact
level.
When Joe User opens his email client, he receives the following email:
An email notification with the Urgent header template
(Click the image to expand it.)
You could enhance this with a content template used specially for urgent tickets.
Email notifications do not go through this client transition; therefore, the data in the notification is in
the same format as that stored on AR System server. This might result in incorrect date/time and
numeric values being displayed in a notification to different locales. For more information, see
Submitting email requests across different time zones (see page 4535).
Tip
Most of the time, you will use the AR System Email Messages form for troubleshooting
the Email Engine. When you first start using the Email Engine, you might not want
notifications automatically deleted to make sure they are sent to the expected users,
outgoing email is formatted correctly, and so on. But after your Email Engine is running
correctly, you should automatically delete email notifications, unless you are using email
templates to modify records; otherwise, your server can quickly fill up with email
notifications. If you configure the system to delete messages automatically, the Email
Engine will not permit you to modify records. The Email Engine includes a security feature
that checks the outgoing records to verify that incoming email with a modify action comes
from the same server.
1. In the AR System Email Mailbox Configuration form, open the entry of your outgoing
mailbox, and click the Advanced Configuration tab.
Option to delete outgoing notification messages
(Click the image to expand it.)
For more information, see Configuring advanced outgoing mailbox properties (see page 635).
You can use content templates with notifications or escalations to arrange the fields and values of
the entry that triggered the notification. Content templates used with notifications or escalations can
contain the following information:
Plain text
Variables
For example, the #$$AR Notification Text$$# variable is replaced by the text entered in the
Text Field of Notification group in BMC Remedy Developer Studio.
Core fields
For example, core fields are replaced with their actual values in the email that is sent out.
You use the following syntax with core fields:
#$$<DatabaseNameOfField>$$#
Form fields
You can use the fields on the form on which the notification action or escalation is based in
content templates. You use the following syntax with form fields:
#$$<DatabaseNameOfField>$$#
Content templates used with notifications or escalations cannot contain the following
information:
Keywords — Keyword substitution in content templates is not implemented in Email Engine
7.0.00 and later. As a result, $USER$ or $DATABASE$ in a content template will not be
replaced with actual values.
Field IDs — Field IDs are not substituted with entry values. As a result, #$$536870925$$# is
incorrect. Instead, you should use #$$Id_Integer$$# where Id_Integer is the database name
of the field.
The following example illustrates a content template for outgoing notifications:
<html>
</Root>
<head>
<meta http-equiv="Content-Language" content="en-us">
<meta http-equiv="Content-Type" content="text/html; charset=windows-1252">
<meta name="GENERATOR" content="Microsoft FrontPage 4.0">
<meta name="ProgId" content="FrontPage.Editor.Document">
<title>Lighthouse</title>
</head>
<body>
<p><font face="Arial Black"> #$$AR Notification Text$$# </font></p>
<p><img border="0" src="./images/lighthouse.gif" width="174" height="188"></p>
<p><font face="Arial Black"><b>Lighthouse</b></font></p>
<p><font face="Arial Black"> RequestID: #$$Request ID$$# </font></p>
<p><font face="Arial Black"> EmployeeName:#$$Name_Char$$#</font></p>
</body>
</html>
You can use the AR System Email Messages form to send outgoing email, as shown in the
following figure.
You can type the message, or specify content templates to use in the body of the email. To send
email from the Email Engine, you must use a specific label/value pair syntax along with the Action
label in the body of the email.
You can add the content from the From, To, Subject, etc. fields to the body of the email. You can
insert a string value of the field that you want to add on the AR System Email Messages form. For
example, if you want to insert the email address from the From field in the body of the email, you
must insert the #$18086$# variable, where 18086 is the ID of the From field.
You can include attachments with your email using the Attachments tab. From the Advanced
Options tab, you can use a template, substitute variables, or an alternate attachment as your body
content. (For information, see Displaying advanced options for outgoing email (see page ).)
Warning
When sending HTML messages, any content in Plain Text Body tab is ignored. To send
plain text messages, make sure that all the required content is in the Plain Text Body tab
and that the HTML Body tab is empty.
1. Open the AR System Email Messages form in New mode in a web client (as shown in the
following figure).
AR System Email Messages form
(Click the image to expand it.)
Tip
To view the AR System Email Messages form in a browser, use this syntax:
http:///arsys/forms//. For more information, see URLs for opening forms and
applications (see page 2856).
2. From the Mailbox Name menu, select an outgoing mailbox to use for your email message.
The settings in the AR System Email Mailbox Configuration form for the specified mailbox
will be used, unless overridden by entries in the AR System Email Messages form. If you
leave this field empty, the default outgoing mailbox will be used. (For more information, see
Configuring outgoing mailboxes (see page 634).)
3. Select Outgoing from the Message Type list.
4.
BMC Remedy Action Request System 9.1 Page 1464 of 4703
BMC Software Confidential. BladeLogic Confidential.
0 Normal
1 High importance
2 High importance
3 Normal (default)
4 Low importance
... ...
By default, emails are sent out from the Email Engine in the order they were received, not in
the order of priority. But you can set properties in the AR System Configuration Generic UI
form for the Email Engine to send high priority emails first and then lower priority in that
order.
Use the following properties:
To ignore priority (default):
com.bmc.arsys.emaildaemon.SortMessages= false
com.bmc.arsys.emaildaemon.SortMessages= true
To send the email with a template other than the default templates for the specified
mailbox, see Using the Templates tab (see page 1470).
To add an attachment alternative to be used for the content of your email instead of
typing content in the body panes, or using a template, see Using the Variable
Replacement tab (see page 1471).
8. Click Send to send the mail from the outgoing mailbox to the user.
BMC Remedy Email Engine supports Rich-text-formatting (RTF) formatting applied to the text in
the email messages. Also, you can see the attached images inline with the text.
Following are the limitations for the outgoing email notifications in BMC Remedy Email Engine to
support RTF functionality:
The number of attachment fields in a mail must match the number of attachments.
While creating the notification filter from the Fields list section, select all the attachment
fields from the attachment pool associated with the RTF field.
For using RTF fields with images, embedded images can only be sent by using the
attachment pool with the RTF field.
For attachments in the outgoing mails,
Do not change the text in the Description field on Image options dialog box.
Do not change the content of the alt and title attributes, because these are auto-
generated by the mid tier, and will be used by the Email Engine for finding the name
of the image.
Do not copy-paste the images. You must insert the images using the image option on
the RTF field. Otherwise, the images might not appear inline with the text.
1. Open the AR System Email Messages form in New mode to create an outgoing message.
For sample contents of an outgoing message, see Sending outgoing email with the Email
Messages form (see page 1462).
2. Click the HTML Body tab.
3. Enter HTML content, as shown in the following example:
Server: polycarp<BR>
Login:Francie Frontline<BR>
Password <input type= "password" name= "Password" size= "15" maxlength= "14" >
<BR>
Key: 1234 <BR>
Action: Modify<BR>
Form:TestSecurityForm<BR>
Request ID: 000000000000003 <BR>
Assigned To <input type= "text" name= "!4!" size= "20" value= "Assignee" >
<BR>
Short Description <input type= "text" name= "!8!" size= "40" value= "Enter a
short description" > <BR>
Status
<input type= "radio" value= "New" name= "!7!" /> New
<input type= "radio" value= "Assigned" name= "!7!" /> Assigned
<input type= "radio" value= "Fixed" name= "!7!" /> Fixed
<input type= "radio" value= "Rejected" name= "!7!" /> Rejected
<input type= "radio" value= "Closed" name= "!7!" /> Closed
<BR>
In addition to HTML formats, any label/value pairs that you include must follow specific
syntax requirements. For more information, see Creating and using email templates (see
page )
For how to define HTML, especially input type controls, see any standard HTML reference
book or reputable online source ( http://www.w3.org/ ). Additional HTML examples are
demonstrated in Sending modify instructions in HTML (see page ).
4. Click Send to send the mail from the outgoing mailbox to the user.
The Email Engine generates the email, as shown in the following figure.
An outgoing email in the HTML format
(Click the image to expand it.)
Password control field — Users become nervous about sending passwords in clear
text. For security, this HTML message includes a Password control field as an input
type. When the user enters their password, the text is masked; asterisks appear
instead of the typed symbols or letters, as shown in the following figure.
A Password field with encryption
Text input fields — Users modify the contents of the Assigned To and Short
Description fields by using text input fields.
Radio buttons — Users modify the status by selecting an input type Radio control
field. They can select only one radio button option.
For information about encoding user-defined markup text in outgoing email
messages, see Encoding user-defined text in outgoing HTML email (see page 1490).
Note
Having a large number of records in the email messages and email attachment forms
might degrade the performance of the Email Engine.
1. In the Attachments tab of the AR System Email Messages form, click the arrow next to the
blank field at the bottom of the pane.
2. Select the attachment.
3. Click the Add Existing button.
Your attachment is added to the list in the attachment pool.
When you send or save your email, the email and the attachment are associated through
the AR System Email Association form. The system will assign the association a unique ID.
Modifying an attachment
Use the following procedure to modify attachments in outgoing email.
To modify attachments
Deleting an attachment
Use the following procedure to delete attachments in outgoing email.
To delete attachments
Content templates replace the body of the email so that you do not have to enter anything in
the body tab of the AR System Email Message form.
The content can be associated with a specific form and contain the fields and their
corresponding values relating to a specific record. You can create these templates in a text
editor or export them using BMC Remedy Developer Studio.
You can also specify actions to be performed when the Email Engine parses contents of the
email. The content template can also contain formatting instructions.
Header and footer templates are used to place lines of text or graphics on an outgoing
message. If header and footer templates are specified in content templates as a label/value
pair, they will be applied to the email reply.
All the templates you use here must be previously stored in the AR System Email Templates form.
If you leave Template fields blank, the system uses the default templates for the mailbox in the
Mailbox Name field, or it uses the default mailbox and its settings if no Mailbox Name is entered.
The template specified here will override those configured for the specified mailbox, or the default
mailbox.
For information about configuring your outgoing mailbox, see Configuring outgoing mailboxes (see
page 634).
The Variable Replacement tab (the following figure) enables you to replace any variables in the
template with a value at the time of execution. This applies only to the specific outgoing email and
the templates specified in the Templates tab.
The AR System Email Messages form — Advanced Options, Variable Replacement tab
(Click the following image to expand it.)
You can use the Field Values field or the Qualification field with a particular form to retrieve
required data and substitute it in the email.
*Server: polycarp
Login:
Password:
Key:
Action: Modify
Form: TestSecurityForm
Request ID: \[$$#$$Request ID$$#$$\]
Submitter ! 2 !:
Short description ! 8 !:
This template includes a variable value for the Request ID field by replacing the Request ID:
00000000001 label/value pair with Request ID:
[HTMLUATarsadministering1030:$$#$$Request ID$$#$$].
7. Click the Variable Replacement tab.
8. Enter a value for a variable in the template in the Field Values field, as shown in the
following figure.
For example, with the following variable in your template:
This value will then be substituted for the variable when the outgoing email is sent.
When an entry is created in the Email Messages form for the outgoing message, the Field
Values field of the Variable Replacement tab is populated with the database name of the
field and its value in the entry. This database name is matched with the database name that
is specified within #$$...$$# in the content template, and a substitution is made accordingly.
So, make sure to use the exact database name in the content template delimited by
#$$...$$#.
If you create an outgoing email from the Email Messages form instead of using a notification
or escalation, then you can use the field ID in the Field Values field of the Variable
Replacement tab. In the same tab, you can specify the form name and qualification criteria.
As a result, when the outgoing email is sent, the qualification criteria is evaluated, entries
that match the criteria are retrieved, and the values of the entries are substituted for the field
IDs in the Field Values field.
If a template is specified in the Templates tab and the template contains field IDs, then
those field IDs are substituted with the values of field IDs in the field value of the Variable
Replacement tab of the Email Messages form.
9. Enter the name of the server on which the form resides.
10. Enter the name of the AR System form to which these values apply.
11. Enter any access information necessary in the AR System Server TCP Port field and the AR
System Server RPC Number field.
12. Enter a qualification in the Qualification field to search for the Request ID of a record on
which you want to perform an action (the following figure).
This action will be specified in a Content template.
The AR System Email Messages form — Advanced Options, Variable Replacement tab
(Click the following image to expand it.)
You can also make this static in the Content template by specifying Request ID:
00000000001 instead of the variable Request ID:
[HTMLUATarsadministering1030:$$#$$Request ID$$#$$], but using the Variable
Replacement feature allows more flexibility.
The Attachment Alternatives tab enables you to add the content of your email as a plain text or
HTML attachment, instead of typing it into the Body field in the Message tab. The contents of the
attachment appear in the body of the email.
Errors tab
The Errors tab enables users to view error messages if an email is not sent correctly. For example,
if the To field has an invalid character like a space, then an error is generated and is viewable in
the Error tab.
1. If you supply a template, the system uses it as the message body, and uses the following
rules for variables:
If you supply an attachment in the Values attachment field of the Attachment
Alternatives tab of the AR System Email Messages form, the attachment will be used
to determine the values for variables contained in the template.
If you do not supply an attachment in the Values attachment field, but you supply
information in the Field Values or a qualification in the Qualification field of the
Variable Replacement tab of the AR System Email Messages form, the information
will be used to determine values for variables contained in the template.
If you do not supply field values, but your content template contains a query to obtain
information to substitute in the email, the query information will be used to generate
the message. For query information to be used, a form, server, and qualification must
be supplied. If any one of these items is missing, the message creation will fail.
Note
If none of these points is true, the system uses the template as is.
2. If you do not supply a template, but attach a file (HTML or plain text, or both) to the Content
attachment fields in the Attachment Alternatives tab of the AR System Email Messages
form, the system uses these attachments as the content.
3. If none of the items in the previous steps is supplied, the system uses the contents of the
Body fields in the Message tab of the AR System Email Messages form for the body of the
email (HTML or plain text, or both).
AdditionalMailHeaders=X-Loop-Detect, <customHeader>
<subjectName>
X-Loop-Detect: <headerValue>
<customHeader>: <headerValue>
Note
Email messages consist of header, content, result, and (optionally) footer components. Each
component can be text or HTML. Usually, header and footer templates are used as defaults in the
outgoing mailbox, and content templates are used in outgoing messages or filter notifications.
Imagine a user sends an incoming email to search for all urgent open tickets. Without the use of
header or content templates, the Email Engine returns the following reply email.
This email, as illustrated in the following figure, is a simple ASCII-format message generated by the
Email Engine. It is functional but quite plain.
The following figure shows the same outgoing email generated by the Email Engine, but this time
configured to use an HTML header template and an HTML result template when replying.
The difference between the two outgoing emails is evident. The ASCII email contains all the
important details, but is plain. Using HTML templates, outgoing email conveys the same
information but is much more inviting to read.
Note
Although most mail clients can display HTML, there might be some clients that cannot
display HTML. Assess which mail clients are supported in your organization before
implementing a pure HTML solution.
Adding a header
Adding a header to outgoing email messages can enrich the user experience. With a basic
knowledge of HTML, you can make your messages look professional. Adding a header requires
creating a template, and then configuring the outgoing mailbox to use the new default header
template.
Note
To add a footer template, you would use the same steps as described in the following
procedure.
<html>
<head>
<title>Default Header</title>
</head>
<body>
<table width= "816" bgcolor= "#0069A5" >
<tr>
<td vAlign= "top" width= "196" ><img src= "LogoTriangle.gif" width= "200"
height= "90" lowsrc= "LogoTriangle.gif" ></td>
<td vAlign= "top" width= "608" >
<div align= "center" >
<p> </p>
<p><b><font face= "Geneva, Arial, Helvetica, san-serif" size= "4" color= "white
" Email Engine Demo </font></b></p>
</div>
</td>
</tr>
</table><hr>
</body>
</html>
3. Create an entry in the AR System Email Templates form for your header template:
a. Select HTML as the template format, enter Header Default as the template name,
and add header_default.html as an attachment.
b. Click Add Attachment in the Template Attachments tab.
4. In the AR System Email Attachments form, select Template as the type, enter LogoTriangle.
gif as the attachment name, add LogoTriangle.gif as an attachment, and save the email
attachment entry.
5. In the AR System Email Templates form, click Refresh Table to display the bitmap template
attachment, and save the template entry.
For more information, see Adding attachments to HTML templates (see page ).
6. In the AR System Email Mailbox Configuration form, open the outgoing mailbox entry.
7. Under the Advanced Configuration tab, specify Header Default as the default header
template.
8. Send a sample outgoing email. The following figure displays the email sent by the Email
Engine to your mail client.
An outgoing message with a header template
(Click the image to expand it.)
XYZ Corporation
#$$Submitter$$# has successfully created a #$$Status$$# ticket.
Ticket Number: #$$Request ID$$
#$$Assigned To$$# has been assigned to your request.
Problem Description: #$$Short Description$$#
Using an HTML result template (as shown in the following figure) gives you greater control over the
appearance of the returned data and makes the return email look much more professional. For
more information about data formats and labels, field variables, and result templates, see Creating
and using email templates (see page )
The following example walks you through the procedure for using result templates with outgoing
email. The example is simple but complete, and you can easily add more functionality.
1. Make sure the Email Engine is properly configured to send reply results. For more
information, see Configuring BMC Remedy Email Engine for replying with results (see page
691).
2. Create a result template for your reply email. The following figure is an HTML result
template designed for this exercise. The fields that are referenced in the result correspond
to fields used in the HD Incident form. The variables for field values must use the field name
(its database name) as the variable name, not the field ID.
An HTML result template
(Click the image to expand it.)
3. Create an entry in the AR System Email Templates form for your result template.
For more information, see Adding attachments to HTML templates (see page ).
4.
BMC Remedy Action Request System 9.1 Page 1481 of 4703
BMC Software Confidential. BladeLogic Confidential.
#
# File exported Tue Sep 28 17 : 01 : 33 2004
#
Schema: HD Incident
Server: POLYCARP.eng.bmc.com
Login: Demo
Password:
Action: Submit
Result: Results Template Default
# Values: Submit, Query
Format: Short
# Values: Short, Full
For more information, see Email reply using result templates in HTML format (see page )
.
This simple example contains an XML attribute (name), an attribute value (#$$Employee
Name$$#), and several elements (age) with their values (#$$Age$$#).
Tip
2. Add the template as a text template to the AR System Email Template form.
The name of this XML template is employee. For information, see Storing templates in the
AR System Email Templates form (see page ).
3. Send an incoming email to the Email Engine that queries the server and returns the results
using the XML template, for example:
Action:Query
User: Demo
Server:polycarp
Schema:employee
Result Template:employee
Employee Name \! 536870913 \!:John Doe
This email specifies that the employee XML template be used in the outgoing email to return
the results of the query.
The following figure displays the outgoing email generated by the Email Engine.
A reply from the Email Engine using an XML template
(Click the image to expand it.)
Observe how the query results of this email are displayed in XML format. If your outgoing
mailbox is configured to include an HTML header, the resulting email (combining an HTML
header template with an XML result template) would no longer be displayed in purely XML
format.
For information about encoding user-defined markup text in outgoing email messages, see
Encoding user-defined text in outgoing HTML email (see page 1490).
1. Create an HTML template that you will include in your outgoing message.
The following sample HTML template defines font styles and colors in the <BODY> tag. You
can include embedded styles in your content file, but the Email Engine does not support
linking your HTML template to a cascading style sheet.
2. Create an entry in the AR System Email Templates form for your content template, for
example, BMC_Picnic_Invite.html.
For more information, see Adding attachments to HTML templates (see page ).
3. Open the outgoing mailbox entry in the AR System Email Mailbox Configuration form.
4. Under the Advanced Configuration tab, specify BMC_Picnic_Invite.html as the content
template.
5. (Optional) Include a header or footer template.
Otherwise, your email will use any default templates configured for your outgoing mailbox.
6. Send a sample outgoing email.
The following figure displays the outgoing email sent by the Email Engine to your mail client.
An outgoing message with the header and HTML content templates
(Click the image to expand it.)
Instruction: Query
Instruction Number: 1
Instruction Template:
Message Type:
Message Number: 24
Message Text: No matching requests (or no permission to requests) for qualification
criteria.
Appended Text: TestSecurityForm
By using an HTML status template, your outgoing email can look more professional as well. The
following procedure shows you how to create an HTML template that formats status more
attractively.
<html>
<head>
<title>Status Template</title>
<meta http-equiv= "Content-Type" content= "text/html; charset=iso- 8859-1" >
</head>
<body bgcolor= "#FFFFFF" text= "#000000" >
<table width= "75%" border= "1" cellspacing= "1" cellpadding= "3" >
<tr>
<td colspan= "4" >
<div align= "center" ><b>Your request to the AR Server returned the following
error. If you have questions, contact your <a href= "mail%20to:%20stamps1@eng.
bmc.com" >Administrator</a>.</b></div>
</td>
</tr>
<tr>
<td width= "12%" >Error Number</td>
<td width= "28%" >#$$ActionStatus.Number$$#</td>
<td width= "18%" >Message 1 </td>
<td width= "42%" >#$$ActionStatus.Text$$#</td>
</tr>
<tr>
<td width= "12%" >Error Type</td>
<td width= "28%" >#$$ActionStatus.Type$$#</td>
<td width= "18%" >Message 2 </td>
<td width= "42%" >#$$ActionStatus.AppendedText$$#</td>
</tr>
</table>
</body>
</html>
This HTML template defines a simple table with two rows for the error number and error
types. It also includes an email address that users can respond to if they have questions. Of
course, your HTML template could include color, special fonts, and so on.
2. Create an entry in the AR System Email Templates form for your status template, for
example, Status_default.html.
For more information, see Adding attachments to HTML templates (see page ).
3. Open the outgoing mailbox entry in the AR System Email Mailbox Configuration form.
4. Under the Advanced Configuration tab, specify Status_default.html as the status template.
5. (Optional) Include a header or footer template.
The sample email shown in the following figure uses the default header template configured
for the outgoing mailbox.
6. Send an incoming email to the Email Engine that will generate an outgoing status email, for
example, a query that returns no records.
The following figure displays the outgoing status email generated by the Email Engine.
An outgoing message with the default header and HTML status templates
(Click the image to expand it.)
By default, outgoing error messages generated by Email Engine do not contain the body of the
original incoming email request. To help users troubleshoot failed email requests for submit,
modify, and query actions, use the variable #$$ORIGINALMAIL$$# to include the incoming body in
outgoing messages.
Schema: HD Incident
Server: reepicheep.eng.bmc.com
Login: Demo
Password:
Action: Submit
The status template associated with the user's request, MyStatusTemplate, includes these
label/value pairs:
If the user's submission fails, Email Engine generates an error message based on
MyStatusTemplate. Because the value of the Original Mail label in that template is the
variable #$$ORIGINALMAIL$$#, the original email body is put in place of that variable in the
error message:
To include attachments to incoming requests in outgoing error messages, the associated status
template must contain the variable #$$ORIGINALMAIL$$#, and the incoming request must contain
the following information:
For example, a user submits an email request that includes this information:
Schema: HD Incident
Server: reepicheep.eng.bmc.com
Login: Demo
Password:
Action: Submit
Description ! 8 !: I need a new mouse for my computer.
StatusTemplate: MyStatusTemplate
! 536880912 !: file1.txt
! 536880913 !: file2.txt
Using that information, Email Engine gets the appropriate HD Incident form from the specified
server and then gets the attachment information from the specified attachment fields. If the HD
Incident form does not contain field 536880913, Email Engine cannot get file2.txt. Thus, if the
submission fails, the user receives an error message that includes the original email message and
only one attachment, file1.txt.
[#ENCODE_HTML_START#]
...
[#ENCODE_HTML_END#]
Important
You can only specify these markers directly in the HTML Body tab, or in an HTML content
template, or both.
If you include user-defined markup text in outgoing HTML messages, the recipient client does not
render the text as HTML. Instead, it displays the text as is.
For example, consider that you enter the following markup in the message body:
<html>
<body>Leave application <br> Approved <br>
<Timespan="app.calendar" string=$today$/>
</body>
</html>
When the message is received, the email client attempts to render the text as HTML. The output
appears as follows:
Leave application
Approved
You need to indicate that the following text is user-defined markup, which should not be rendered
as HTML content:
<Timespan="app.calendar" string=$today$/>
<html>
<body>Leave application <br>
Approved <br>
[#ENCODE_HTML_START#] <Timespan="app.calendar" string=$today$/>
[#ENCODE_HTML_END#]
</body>
</html>
When the message is received, the email client correctly renders the user-defined markup as
follows:
Leave application
Approved
<Timespan="app.calendar" string=$today$/>
1. In the XYZ Company, the AR System administrator has configured the Email Engine to
receive email submissions by using email as a client to the AR System server. To make
email easier to use, he has created and sent to his user base several email templates that
cover typical work situations, for example, submitting entries to the HD Incident form, and
querying the status of their tickets.
2. Joe User cannot print his document because his printer has a paper jam that he cannot fix.
He opens one of the email templates and sends an email to submit a request to the HD
Incident form.
3. The Email Engine receives the email from the mail server. It parses the instructions in his
email, and makes the appropriate API calls to the AR System server.
4. The server creates an entry in the HD Incident form. Slightly suspicious of using email to
create trouble tickets and also wanting to verify the status of his printer problem, Joe User
opens the HD Incident form in a browser. He finds his entry already assigned to the frontline
Customer Support engineer who is fixing the printer.
For more information, see Sending a submit instruction to the Email Engine (see page ).
Using email as a BMC Remedy AR System client is no different. To execute query instructions to
the Email Engine, the following information must be included:
The major difference between the mid tier and an email client is that the mid tier sends its queries
directly to the AR System server, while incoming email is first processed by the Email Engine and
then sent to the server.
To send a query
Schema: HD Incident
Server: polycarp
Login: Francie Frontline
Password: <userPassword>
Action: Query
Tip
Copy and paste these examples into your mail client, and then modify them as
needed.
The following figure shows the minimum information you need to send a query email. Here a
label called Action specifies an instruction. To send a query to the Email Engine, the label
Action must be set to Query.
A query instruction email
(Click the image to expand it.)
5. Optionally, use the AR System Email Messages form to verify that the Email Engine has
received your email.
After the Email Engine has parsed the instruction and sent the query to the AR System
server, the server returns the query results that the Email Engine sends back to the email
client (as shown in the following figure).
Otherwise, the Email Engine will return an error message that indicates missing parameters
or an error while parsing the qualifier.
6. Open the returned email to see the results of your query (the following figure).
Tip
One benefit of the Email Engine is that outgoing email from the Email Engine can
include a formatted header or footer, like the HTML header template shown in the
following figure. For more information, see Incoming and outgoing mail templates
(see page 1526).
This email message sent from the Email Engine shows that all fields of all entries in the HD
Incident form were returned. In effect, your email query was an unqualified search of the HD
Incident form, useful for the example, but certainly a performance impact on the server. You should
always include a qualification in your email queries.
Tip
Create a user-defined instruction that runs the query. This allows the user to quickly
execute queries based on instructions that the administrator has predefined.
1. Create an email.
2. To execute a query that returns all tickets that Francie Frontline submitted, include the
Qualification label with the following query value in your email message to the Email Engine:
Schema: HD Incident
Server: polycarp
Login: Francie Frontline
Password: <userPassword>
Action: Query
Qualification: 'Submitter' = "Francie Frontline"
In the qualification, the field name Submitter must be the same as the database name of the field.
Also, field names are case sensitive, and must exactly match the database name of the field.
You can also query entries by using field IDs instead of the database name of the field. For
example, the following Qualification label will produce the same results when the Submitter field
has a field ID of 2.
In your qualification, you can include relational operators. The following qualification retrieves an
entry whose employee ID = 9 and that was submitted by Francie Frontline.
1. Create an email.
2. To execute a query that returns only the fields specified in the results list, include the Format
label with the Short value in your email message to the Email Engine:
Schema: HD Incident
Server: polycarp
Login: Francie Frontline
Password: <userPassword>
If the Format is not explicitly specified, by default, it will be automatically assigned a value of Full,
which will return all fields in the form.
For example, when the Submitter field has a field ID of 2, the following syntax produces the same
results as if you had entered "Francie Frontline" in the Submitter field in the mid tier:
You can use this same shorthand syntax to search for request IDs. The following template
searches for request ID from the HD Incident form:
Schema: HD Incident
Server: polycarp
Login: Demo
Password:
Action: Query
!1!:TT00000000119
Your email query can include multiple fields to search for all new urgent requests:
If the qualification does not match any entries, the email returned from the Email Engine will
indicate this.
To submit an entry into a BMC Remedy AR System form, send an email with instructions with the
Action label set to Submit.
To execute submit instructions to the Email Engine, the following information must be included:
Schema: HD Incident
Server: polycarp
Login: Francie Frontline
Password: <userPassword>
Action: Submit
!Submitter!: Francie Frontline
!Short Description!: Printer not working
The field name between the exclamation marks must exactly match the field name in the
database and is case sensitive.
As with a Query action, Submit actions can also use the field ID instead of the database field
name. The following syntax will return the same results if the Short Description field ID
equals 8:
You can add a comment before the exclamation mark used with field names as in the
following example. The Email Engine will parse only the characters between the
exclamation marks, for example, the field ID (8) of the Short Description field:
Schema: HD Incident
Server: polycarp
Login: Francie Frontline
Password: <userPassword>
Action: Submit
What is the problem! 8 !: Printer not working
Who is submitting! 2 !: Francie Frontline
If the value for the field is more than one line, then enclose it between
[HTMLUATarsadministering1030:$$ and $$]. For example, if you have a longer value for the
Short Description, it could be sent to the Email Engine as:
The Email Engine will correctly parse the syntax when the email is submitted.
4. Send your email.
If you successfully submitted your email, the email returned will look something like this:
If the incoming mailbox is configured to Reply With Entry, then all the fields of the newly created
entry will be returned to the sender. (For more information about this configuration option, see
Configuring advanced incoming mailbox properties (see page 659).)
If the entry cannot be created, the Email Engine will return an error message (as shown in the
following figure) that indicates missing parameters. Make sure your incoming email includes all
required fields, for example, Submitter.
Tip
Another benefit of the Email Engine is that status from the Email Engine can be
formatted, like the status template shown in the following figure. For more information,
see Incoming and outgoing mail templates (see page 1526).
Schema: HD Incident
Server: polycarp
Login: Francie Frontline
Password: <userPassword>
Action: Submit
!Submitter!: $USER$
!Short Description!: Printer not working
To use the Format label, configure the incoming mailbox Reply With Entry parameter to Yes. If
Reply With Entry is set to No, then the Format label is ignored and the confirmation email will
contain only the Request ID number.
Note
Join forms do not send values of fields on Submit when the Reply with Entry parameter is
set to Yes for the incoming mailbox.
By default, the Format label is set to Full, which means all fields in the form are included in the
confirmation email. To include only fields from the results list in the confirmation message, set the
Format label to Short:
Schema: HD Incident
Server: polycarp
Login: Francie Frontline
Password: <userPassword>
Action: Submit
Format: Short
!Submitter!: Francie Frontline
!Short Description!: Create entry for new hire.
Note
If you are using message/rfc822 attachments with a submit template, make sure the mail
client you use is sending the file name of the attached message properly. To test this,
send an incoming mail with a message attachment, then view the Attachment tab on the
Email Messages Form for the name of the attached file. If you use Outlook Express to
submit the message to the Email Engine and save the attachment by using the .msg
extension, the file name remains intact.
To include attachments
Schema: HD Incident
Server: polycarp
Login: Francie Frontline
Password: <password>
Action: Submit
!Submitter!: Francie Frontline
!Short Description!: I am including the filter.log file.
Attachment field !536880912!: filter.log
Your label/value pair syntax should not see the attachment pool, but to specific attachment
fields.
4. Insert your attachment file anywhere in the email.
If the attachment name including the extension is not supplied, the email submission will not
pass the attachment to the attachment field.
Do not include two attachment files with the same name, as in the following example:
The Email Engine will accept the email submit instruction; however, the Email Engine
cannot recognize which of the two filter.log files to insert into the 536880912 attachment
field.
How modify instructions work with incoming email (see page 1502)
Sending modify instructions in plain text (see page 1504)
Sending modify instructions in HTML (see page 1508)
Limitations to sending a Modify instruction (see page 1511)
1. The BMC Remedy AR System administrator at XYZ completed the following tasks to enable
the Email Engine to modify entries in the AR System server:
Associated the incoming and outgoing mailboxes
Enabled the incoming mailbox to accept modify instructions
Created and sent security keys to trusted users of BMC Remedy AR System, for
example, the IT department. For more information, see Configuring BMC Remedy
Email Engine for modify actions (see page 689).
Note
The incoming and outgoing mailboxes in the Email Engine can be one
physical mailbox, performing both the incoming and outgoing functions.
2. Joe User has a serious problem with his PC. He needs an IT engineer to install the latest
service patch and has submitted an entry on the HD Incident form (Request ID
000000000000055). Francie Frontline, who has BMC Remedy AR System administrator
privileges, is working on Joe's ticket. She needs Joe to verify his current PC configuration
and modify his ticket with updated information. She sends an email to Joe that includes the
following mandatory parameters:
Key
Action: Modify
Form name
Server name
Request ID
Her email to Joe must contain at least these items for modify instructions to work
properly. She also includes names of fields that Joe can modify. After she sends her
email, a copy of the email is stored in the Messages form and the email is sent to
Joe.
3.
BMC Remedy Action Request System 9.1 Page 1503 of 4703
BMC Software Confidential. BladeLogic Confidential.
3. Joe User replies to the email. He updates the work log label/value pair in the email, for
example, Worklog !536870922!: I'm running Service Patch 6. Because he
has used email to submit and query BMC Remedy AR System entries, he knows how to
include additional fields to update information about the new department he was transferred
to, for example, !Department!: Product Marketing.
4. The Email Engine receives the reply from the mail server and verifies that Francie's original
email exists in the Email Engine (in the AR System Email Messages form) and that the
sender's email address is contained in the recipient field of the original email. It then parses
the modify instruction in Joe's email, and modifies the ticket in the HD Incident form.
5. The Email Engine returns the results to the sender, Joe User. If the email had failed (for
example, Joe modified the encryption value or he tried to use a different Request ID), the
Email Engine returns an error message that indicates faulty parameters or other problems.
1. The BMC Remedy AR System administrator sends an outgoing message from the AR
System Email Messages form to the user who wants to modify an entry. The message can
be sent in plain text or HTML format. (To use HTML, see Sending modify instructions in
HTML (see page ).)
2. The user replies to the message with new values of the entry the user wants to modify (see
To reply to an email containing modify instructions (see page 1506)).
Server: polycarp
Login: Joe User
Password:
Key:
Action: Modify
Schema: HD Incident
Request ID: 000000000000003
! 536870913 !:
You can substitute field IDs for database names. For example, if the Problem
Summary field is field ID 8, then you could replace the database name with its field
identifier !8! and produce the same results:
! 8 !:
Optionally, you can enter comments before the field ID, for example:
Note
Because there are no content template labels, you can use a result
template as its equivalent when performing a Modify action with incoming
mail.
When you send the email, the Email Engine appends an internal label, ##Modify##.
The Email Engine generates an encrypted value for this label by using the Server
Name, Schema Name, and Request ID (as shown in the following figure).
If the ##Modify## label is found in the content of the email, the Email Engine
prepends the encrypted value to that label. If more than one ##Modify## label is
found, the encrypted value is prepended to all these labels.
Warning
The placement of the ##Modify## label and its encrypted value must be
such that the value is included in the reply email.
4. Click Send to send the mail from the outgoing mailbox to the user.
2. Open a reply window for the email that contains the modify instructions.
Note
You must reply to the same mailbox as the one from which the email was sent.
Warning
The user who is replying cannot add additional submit, query or modify instructions
to the email. Do not change the Request ID, Schema name, or Server label/value
pairs when replying to the administrator's email.
4. Fill in any missing parameters as needed --- Login, Password (if there is a password), and
Key. (For information about creating security keys, see Testing your mailbox configuration
(see page 655).)
The following example shows the content of a sample reply from Joe User:
Server: polycarp
Login: Joe User
Password: yadayada
Key: 1234
Action: Modify
Schema: HD Incident
Request ID: 000000000000003
! 536870913 !: Bob Backline
Comments! 8 !: Modified last name from Frank Frontline to Bob Backline
##Modify##:\[$$ckI2UoIK4gNibZMvL7k7uI/
eDhsoIU5JBTYvh5DMXaQnhPhicyCT/g==$$\]*
In this example, Joe User also modified the contents of the Short Description field (field ID
8).
5. Send the email reply.
When the incoming mailbox of the Email Engine receives the reply from the user, it makes
sure that the original email sent by the administrator exists within the Email Engine and that
the sender's email address is contained in the recipient field of the original outgoing email.
The Email Engine then parses the email. If you successfully modified the entry, the Email
Engine returns the results to the email client. Otherwise, the Email Engine returns an error
message that indicates any missing parameters or other problems.
1. Using the AR System Email Messages form, create an outgoing message in New mode.
For sample contents of an outgoing message, see Sending modify instructions in plain text
(see page ).
2. Click the HTML Body tab.
3. Enter contents like the following example:
Server: polycarp
<BR> Login: Joe User<BR>
Password <input type= "password" name= "Password" size= "15" maxlength= "14" >
<BR>
Key: 1234 <BR>
Action: Modify<BR>
Form:HD Incident<BR>
Request ID: 00005 <BR>
Assigned To <input type= "text" name= "!4!" size= "20" value= "Assignee" >
<BR>
Short Description <input type= "text" name= "!8!" size= "40" value= "Enter a
short description" > <BR>
Status
<input type= "radio" value= "New" name= "!7!" /> New
<input type= "radio" value= "Assigned" name= "!7!" /> Assigned
<input type= "radio" value= "WIP" name= "!7!" /> WIP
<input type= "radio" value= "Resolved" name= "!7!" /> Resolved
<input type= "radio" value= "Closed" name= "!7!" /> Closed
<BR>
This example of an HTML-formatted outgoing message allows Joe User to do the following
tasks with entry 00005:
Enter a password in an input type Password control field. When users enter their
password, stars appear instead of the typed symbols or letters.
Modify the contents of the Assigned To and Short Description fields.
Modify the status in an input type Radio control field. Users can select only one radio
button option.
With HTML format, you can also include system information (for example, server
name or form name) in hidden fields. The data is still within the message, but users
do not see it.
The following example is a Help Desk request message with Schema and Action as
hidden fields with default values supplied:
Note
To learn how to define input type controls, see any standard HTML
reference book or reputable online source ( http://www.w3.org/ ).
5. To execute the modification, reply to the email received with the modified values for the
HTML fields that you can see and have permission to change.
Responding to the Modify instruction (HTML format) sent to a user
(Click the image to expand it.)
Using the HTML controls you have defined, click in a field to modify its contents, for example, enter
Assigning this ticket to Bob Backline in the Short Description field. Also observe that Joe's
password is encrypted.
With HTML, users can modify only the fields you provide. As a result, creating outgoing HTML
email requires some planning by administrators. For example, if Joe User could not enter his
password, the Email Engine would reject the modify action due to permission problems. Email is no
different than any other AR System client. Like logging in to the mid tier, he could not use email to
"log in" to the Email Engine without entering a password.
The Email Engine does not support the Modify All operation. Only one entry can be modified
with one modify instruction. However, you can include multiple modify instructions in one
email message if you include the full login information (server, login, and password) for each
entry that you want to modify, as in the following example:
Server: polycarp
Login: Francie Frontline
Password: Key:1234
Action: Modify
Schema: HD Incident
Request ID: 000000000000003
!536870913!:
Server: polycarp
Login: Francie Frontline
Password: Key:1234
Action: Modify
Schema: HD Incident
Request ID: 000000000000004
!536870913!:
You can combine the modify instruction with submit or query instructions in a single
message, provided multiple instructions (modify with submit or query) have been sent from
the administrator.
Users cannot add new instructions when replying to the message containing modify
instructions.
The following example walks you through the procedure for creating workflow to modify requests.
In this example, make sure that the Demo user is still active and has an email address that works
with the Email Engine. Make sure your incoming and outgoing mailboxes work correctly. Finally,
set the polling intervals on your incoming and outgoing mailboxes to one minute so that you can
The example is simple but complete, and you can easily add more functionality. For example, you
could create a Run If qualification in your filter to search for records that are marked Urgent and
are assigned to your Managers group.
1. The BMC Remedy AR System administrator at XYZ has enabled the Email Engine to modify
entries in the AR System server. He has associated the incoming and outgoing mailboxes,
enabled the incoming mailbox to accept modify instructions, and created and sent security
keys to trusted users of BMC Remedy AR System. For more information, see Configuring
BMC Remedy Email Engine for modify actions (see page 689).
Note
The incoming and outgoing mailboxes in the Email Engine can be one physical
mailbox, performing both the incoming and outgoing functions.
2. BMC Remedy AR System receives a submit request. A filter uses email to send a
notification that a request has been received. This email is formatted by using a modify
template.
3. The user receives the message in her email client and then replies to it. She modifies the
request by entering the following information:
1. Create a new form and name it appropriately, for example, Modify Email Workflow.
2. Do not add any new fields.
3. Save the form.
1. Create a filter.
2. Enter a filter name, for example, Modify EmailFilter.
3. Select Modify Email Workflow as the Form Name.
4. Select Submit as the Execute On condition.
5.
BMC Remedy Action Request System 9.1 Page 1513 of 4703
BMC Software Confidential. BladeLogic Confidential.
5. Leave the Run If condition blank. After you verify that you can use your filter workflow to
modify requests, you can add a Run If qualification later.
6. Click the If Action tab, and perform the following actions:
a. From the New Action list, select Notify.
b. In the User Name field, enter Demo.
c. From the Mechanism list, select Email.
d. In the Subject field, enter Modify Email Workflow.
e. In the Text field, enter the following information as the text of the message:
Login:
Password:
Key:
Action:
Modify Form: Modify Email Workflow
Request ID: $Request ID$
Submitter!2!: $Submitter$
Short Description:!8!: $Short Description$
The Modify action in the text of the outgoing message is the special instruction that
allows the Email Engine to modify an entry on the AR System server. The Modify
action is valid only in Reply with Result emails. For more information, see Modify
action (see page 1533).
7. Save your filter.
#
# File exported Tue Sep 21 15:34:56 2004
#
Schema: Modify Email Workflow
Server: POLYCARP.eng.bmc.com
Login: Demo
Password:
Action: Submit
# Values: Submit, Query
Format: Short
# Values: Short, Full
Submitter !2!: Demo
Short Description !8!: Email Test*
The incoming mailbox is configured to reply with results and generates an email response. Also,
when a record is submitted, filter workflow triggers a Notify action that includes instructions for
modifying the record.
The following procedure describes how you reply to email notifications generated by workflow.
3.
BMC Remedy Action Request System 9.1 Page 1515 of 4703
BMC Software Confidential. BladeLogic Confidential.
3. In the mid tier, open the Modify Email Workflow form in Search mode.
4. Make sure a new record was created in the Modify Email Workflow form.
5. Check for new mail in your mail client.
If you properly configured the Email Engine and all your permissions are working correctly,
you should receive an email notification (as shown in the following figure) from the filter that
you created previously.
A notification email (sent from filter) with the modify key
(Click the image to expand it.)
The following figure shows the modify key added to the notification:
##Modify##:\[$$ckI2UoIK4gNQ0qROehOucPFOokiXb/DfA07EiNObusaHtOquCV/ FSA==$$\]
Warning
You cannot modify a record through email without this ##Modify## key. Do not edit
this key in any way!
6. Reply to the returned email, and enter the following information into the body of the email:
Login: Demo
Password:
Key: patience
Action: Modify
Form: Modify Email Workflow
Request ID: 000000000000002
Submitter! 2 !: Demo
Short Description:! 8 !: Modifying requests with workflow is great!
##Modify##:\[$$ckI2UoIK4gOt6aqHF2QE9x5d1nqwf6FJLifugKurp68lQH9XRehn Ew==$$\]
Make sure you add the Login and security key. Update the Short Description so that you can
verify that modifications work on records in the Modify Email Workflow form.
7. Send the reply email.
8. In the AR System Email Messages form, confirm that the incoming mailbox has received the
email with the modify instruction.
9. In the mid tier, refresh the query results of the Modify Email Workflow form.
The modify action should have modified the Short Description in the record.
1. Make sure you have an incoming mailbox and an outgoing mailbox configured and
associated with one another.
2. Set Enable Modify Actions to Yes in the AR System Email Mailbox Configuration form for
the incoming mailbox.
3. Make sure you have a valid security key.
4. Create a template (for example, TestModify) that includes a modify action.
You will use this template for the reply email; see the Result Template label in step 6 (see
page 1517).
Server: polycarp
Login:
Password:
Key:
Action:
Modify Form: TestSecurityForm
Request ID: [$$#$$Request ID$$#$$]
! 2 !:
! 8 !:
Because this template replaces the hard-coded label/value pair (Request ID:
000000000000026) with a variable value (Request ID: $$#$$Request ID$$#$$]),
you can construct an email that gives you the flexibility to search for a specific parameter.
5. Add the TestModify template to the AR System Email Templates form.
6. Use your mail client to create an incoming mail. Include a Query action in the body of your
email.
For example:
Server: polycarp
Login: Demo
Password:
Action: Query
Form: TestSecurityForm
Qualification: 'Request ID' = "000000000000026"
Result Template: TestModify
This email provides all the information required for the Email Engine to perform the query
action, and then to perform the modify action in the TestModify template.
Tip
If the Qualification was part of the TestModify template, you could have omitted the
Qualification line from the email.
8. Open the reply email and modify the parameters as required. For example, add values in !2!
(a different name) and !8! (modifying the short description). Do not change the Action, Form,
and Request ID label/value pairs.
9.
BMC Remedy Action Request System 9.1 Page 1518 of 4703
BMC Software Confidential. BladeLogic Confidential.
9. Fill in any essential missing parameters --- Login, Password (if there is a password), and
Key, and send the email reply with the modifications included.
A confirmation email that the modify action was successful
(Click the image to expand it.)
Note
You must reply to the same mailbox as the one from which the email was sent.
The Email Engine parses the email and the server modifies the entry. The Email Engine
then sends you a confirmation message, as shown in the following figure.
You can perform a search on the form to verify the result.
The Attachment Alternatives tab (the following figure) displays any attachments in the incoming
email. The tab displays the links to each message as it is rendered by the Email Engine in plain
text, HTML, and email client formats.
Note
For incoming email, you typically will not see information under the Templates and
Variable Replacement tabs.
The following figure illustrates an incoming query that did not return any results. Information
includes the severity of the error, error number, date created, and error message text.
Note
The examples of incoming email in this section make extensive use of label/value pairs,
aliases, variables, templates, and special keyword syntax as message content; the Email
Engine ignores any other text. For more information, see the detailed reference material
and examples of their use in Creating and using email templates (see page ).
Using incoming email, users can submit, query, or modify entries on the AR System server. Users
can send incoming emails through an external email client to a configured mailbox on the Email
Engine. If users send email through a third-party email client, they can enter the content into the
body of the email or specify a template.
The message content of incoming email must follow a particular syntax that is specified by a given
set of label/value pairs, for example:
Schema: HD Incident
Server: polycarp
Login: Joe User
Password: 12345
Action: Submit
The rules for label/value pairs and variables are exactly the same as those for templates.
Tip
Like the mid tier, incoming email can trigger workflow that fire on submit or modify. Email
functions like any other BMC Remedy AR System client to the AR System server. For
example, if the transaction meets the filter's Run If condition, the filter will fire, regardless
of whether the client is the mid tier or an email.
#$$Variable Name$$#
If you expect the value of a variable to span multiple lines, then enclose the variable with brackets:
[$$
...
$$]
The following example of a template file (.arm file) submits a new employee name into the
Employee Information form:
The characters between exclamation marks exactly match the field ID or database name of the
field on the form. The variable is called VEmployee_Name. Because the variable might span
multiple lines, it is enclosed by brackets [$$...$$].
When you send a submit instruction, you also can provide a value for variable
$$VEmployee_Name$$, as shown in the following example:
To set up the BMC Remedy AR System mailbox, you must have UNIX superuser (root user)
access on the UNIX server.
1. Set up an ARSystem user account in the /etc/passwd file, as in the following example (new
entry in bold ):
root:x:0:1:0000-Admin(0000):/:/sbin/sh
daemon:x:1:1:0000-Admin(0000):/:
bin:x:2:2:0000-Admin(0000):/usr/bin:
sys:x:3:3:0000-Admin(0000):/:
adm:x:4:4:0000-Admin(0000):/var/adm:
lp:x:71:8:0000-lp(0000):/usr/spool/lp:
smtp:x:0:0:mail daemon user:/:
uucp:x:5:5:0000-uucp(0000):/usr/lib/uucp:
listen:x:37:4:Network Admin:/usr/net/nls:
nobody:x:60001:60001:uid no body:/:
noaccess:x:60002:60002:uid no access:/:
*ARSystem:x:50:10:AR System mail user:/home/ARSystem:/bin/sh*
2. Edit the /etc/aliases file and add the alias ARSystem with the mailbox of /usr/spool/mail
/ARSystem, as follows:
/etc/aliases file
#######################
# Local aliases below #
#######################
# Email Alias for AR System mailbox
ARSystem:/usr/spool/mail/ARSystem
Note
On some UNIX platforms, you need to run the newaliases command to have the
ARSystem aliases recognized. If you have questions or problems, see your UNIX
system administration documentation or UNIX system administrator. The email
directory /usr/spool/mail will vary between UNIX platforms.
3. Create the mailbox file you defined for this user in the /etc/aliases file or /usr/lib/aliases file
(HP-UX), by performing the following command:
# touch /usr/spool/mail/ARSystem
4. Change the group name to daemon, or to the owner of the mailbox alias name, as in the
following example:
Note
The group name varies between UNIX platforms. For most UNIX platforms, it is the
group daemon, while on HP-UX, it is mail. To verify the proper group name to use,
check the group name for the mail directory by using the command ls -ldg.
5. Change the mailbox permissions so they are readable and writable by all, as in the following
example:
This section describes the various types of templates, their use in incoming and outgoing
mailboxes, as well as label/value pairs. Labels are keywords unique in the Email Engine, and
values are their data. Label/value pairs can be included in templates and used to instruct the Email
Engine to interact with your AR System server.
Tip
The term "template" can be slightly misleading because email templates are more than
simply the pattern of label/value pairs you export by using Developer Studio. A variety of
email templates also function as the actual headers, footers, and content of your email
messages.
Email templates serve two main functions for incoming and outgoing messages:
For incoming messages (email that users send to an incoming mailbox), users can include
templates in their emails that contain specially formatted instructions. These instructions use
combinations of field labels and their values, usually referred to as label/value pairs. The
Email Engine parses (that is, translates) these instructions into commands to the AR System
server to perform a query, submit or modify an entry, or complete any other such action.
For outgoing messages (sent by the Email Engine by using an outgoing mailbox), templates
can provide formatting of content in messages that include the results of queries or various
other requests.
Templates used for incoming and outgoing messages can be formatted by using plain text, HTML,
or XML. Templates are defined and stored in forms on the AR System server and can be retrieved
for use by the Email Engine when called upon by incoming or outgoing mail.
In this topic:
Content templates — Used for outgoing messages. These templates can be associated with
a specific form and contain the fields and their corresponding values relating to a specific
record. They can also contain plain text or reserved variables.
You can create these templates in a text editor (shown in the following figure), or export
them by using Developer Studio, selecting the form and fields that are to be contained in the
template. The content template can also contain formatting instructions and label/value pairs
to specify a header, footer, result, or status template. A content template is attached by
using the AR System Email Messages form or by using workflow with filters and escalations.
A plain text content template
(Click the image to expand it.)
When using a content template with workflow, ensure that you include the fields specified in
the content template in the Fields tab of the Notify action. Content templates can also be
formatted in HTML, similar to the result template shown in the following figure.
Header and footer templates — Used to place lines of text or a graphic at the beginning or
end of a message. They can be specified in the outgoing email using the AR System Email
Messages form. If they are specified in content templates or an email body as label/value
pairs, they will be applied to the email reply.
An HTML header and footer template
(Click the image to expand it.)
Result templates — Defines the format to use when replying to an incoming instruction with
the results of an action. A label/value pair must be specified in the email containing the
action. Result templates can be either HTML or plain text.
Result template – HTML
(Click the image to expand it.)
Status templates — Used when the execution of an incoming instruction results in an error.
A label/value pair must be specified to include specific status information in the email or
content template. Status templates can be either HTML or plain text. (For more information,
see Reserved variables (see page 1545).)
An HTML Status template
(Click the image to expand it.)
Using this feature, the administrator can set up variable substitutions to be used in an email with
minimal input from the user. The associated template supplies the rest of the information. For
example, the template shown in the following figure logs the user Demo in to the server reepicheep
, queries the HD Incident form for all tickets with an urgent status, and returns the full information
about all fields that this user has access to. But all that the user needs to do is send an incoming
email with the Action label/value pair that identifies the user instruction, for example, Action: Urgent
.
User-defined templates look the same as other templates and are stored in the AR System Email
Templates form. For more information, see Action label (see page ) and Sending incoming
email with user instructions (see page ).
Creating templates
In BMC Remedy Developer Studio, you can generate the email templates associated with a
particular form by choosing Tools > Export Mail Templates. The templates are generated as text
files.
You can modify the templates in a text editor so that they are in a different format and include all
necessary specifications.
You can also create your own custom template by using any text editor. These templates must
adhere to the rules outlined in this guide if they are to include fields, variables, and label/value
pairs.
Hidden fields are omitted from templates even though they might have public permissions and are
set to enable any user to submit. You can add any of the fields that are not exported to the
template. The user can gain access to these fields if their security key, supplied user information,
or their email address connects to the correct user name and depending on how the mailbox was
configured. If the user name used by the Email Engine has access to this field, then the field is
accessible.
1. Log into BMC Remedy Developer Studio as a BMC Remedy AR System administrator.
2. In the BMC Remedy AR System Navigator, right-click serverName, and choose Export >
Mail Template.
3. In the Export Mail Template dialog box, click the ellipsis (...) button next to the Form field.
4. In the Form Selector dialog box, select the form for which you want to generate mail
templates, and click OK.
5. In the Export Mail Template dialog box, perform the following actions:
a. In the View Details table, select the views your want to use in the template.
b. Click the ellipsis (...) button next to the To File field to specify the file name and
location where you want the templates stored.
If you specify an existing folder and file name, you have two choices:
Overwrite — Overwrites the mail template of an existing file. This option is
useful when you are re-exporting a template that has changed.
Append — Appends the contents to an existing file. If several templates are in
a single file, the mail processor will not be able to process the request.
The template is saved as a single text file with an *.arm extension. Using the
AR System Email Templates form, users can associate these files with their
mail messages.
The following example shows an email template exported by using Developer Studio.
#
# File exported Fri Apr 30 09 : 54 : 36 2004
#
Schema: HD Email
Server: POLYCARP.eng.bmc.com
Login:
Password:
Action: Submit
# Values: Submit, Query
Format: Short
# Values: Short, Full
In general, lines beginning with a pound sign (#) are treated as comments, and can occur
anywhere in the message. Comments are optional and can be retained or deleted.
Form Name of a BMC Remedy AR System Yes No Schema Form label (see page
form. )
Server Server that will be affected by the Yes No Server label (see page
instruction. )
Login User name used when executing the Yes No User User Name Login, Password, and
instruction. Name Login TCP Port labels (see
page )
Password Password used when executing the Yes No Login, Password, and
instruction. TCP Port labels (see
page )
TCP Port TCP port used when logging in to the AR Yes No TCP Login, Password, and
System server. TCP Port labels (see
page )
RPC Number RPC number used when logging in to the Yes No RPC RPC Number and
AR System server. Authentication labels
(see page )
Authentication Authentication string used when logging in Yes No RPC Number and
to the AR System server. Authentication labels
(see page )
Language Language used when logging in to the AR Yes No Language label (see
System server. page )
Action Denotes the instruction to be executed. Yes No Instruction Action label (see page
)
Format Specifies the format of the information. Yes Yes Format label (see page
)
Qualification Qualification for a query-based instruction. Yes No Query Search Qualification label (see
page )
Result The name of the template to use in the Yes No Result Result Template label
Template reply. ResultTemplate (see page )
Status The name of the template to use when Yes No Status Status Template label
Template Status Information is returned. StatusTemplate (see page )
Header The template to be used as the header in No Yes Header Header Template and
Template the reply email. HeaderTemplate Footer Template labels
(see page )
Footer The template to be used as the footer in No Yes Footer Header Template and
Template the reply email. FooterTemplate Footer Template labels
(see page )
!Name! or !ID! The database name or ID of a AR System Yes Yes !Name! or !ID! labels
Form Field. (see page )
Key The key associated with a given sender or Yes No Encryption Key Key label (see page
user. Encryption )
Request ID The Request ID of the entry on which the Yes No Entry ID EntryID Request ID label (see
possible action must be executed. RequestID page )
Form label
The Form label identifies the form that the instruction will use. If no BMC Remedy AR System form
is specified or the specified form does not exist, the mail process verifies whether a default
Workflow form was defined in the AR System Email Mailbox Configuration form. If not, the item is
rejected because a form must be specified. The alias for this label is Schema. An example of a
Form label/value pair is Form:formName.
Server label
The Server label identifies the server that the instruction will affect. If no server is specified or the
specified server does not exist, the mail process defaults to the server information specified in the
EmailDaemon.properties file. An example of a Server label/value pair is Server:serverName. (For
more information, see EmailDaemon.properties file (see page 638).)
Set a security key in the AR System Email Security form. You must add Key:securityKey to
the email. If Key:securityKey matches an entry in the AR System Email Security form, then
the corresponding user name is used.
Use the supplied user information: user login name, password, possible authentication,
possible language, possible RPC, and possible TCP inside the email by using the
appropriate labels and values.
Use the sender's email address. The Email Engine searches through the User form for the
appropriate user name by searching for the email address. It uses the first user it finds
whose email address corresponds.
The passwords and security keys are encrypted in the AR System Email Messages form. The
aliases for Login are User, User Name, Name, and Login Name.
Note
If you try to send an email in an HTML template, do not use a colon in the Login, Name,
or Password labels. For example, do not use: Login: <input type="text"
name="!536870918" size=50/> Instead, use the format: Login <input type="
text" name="!536870918" size=50/> With this format, the Email Engine can
parse correctly that Login is a label for a field on the form and not an instruction.
The TCP Port label identifies the TCP/IP port of the AR System server, if your AR System server is
not using the BMC Remedy AR System portmapper. The alias for TCP Port is TCP.
Language label
The Language label defines the locale used when logging in to the BMC Remedy AR System
server. If no language is specified, the default values are used. The values are the same as they
are in the BMC Remedy Developer Studio and other BMC Remedy AR System clients. The format
of the Language label/value pair is Language: localeLanguage, for example, Language:en_US.
Action label
The Action label defines the operation to perform on a specific BMC Remedy AR System form. The
Action label/value pair is required in the incoming email so that the parser can generate valid
instructions. Valid actions are Submit, Query, Modify, and a user-defined value. If no value is given
for the label, the email is only logged and no actual execution takes place. An alias for Action is
Instruction.
Valid values for this label are in the following table, and explained in detail after the table.
Value Description
Submit Submits a new entry on a specific BMC Remedy AR System form. This is valid within any incoming email. The syntax
is Action:Submit.
Query Searches for entries on a specific BMC Remedy AR System form. The syntax is Action:Query.
Modify Modifies a specific entry contained within a specific BMC Remedy AR System form. This is only valid in reply emails
(that is, emails that have been sent to the user from a BMC Remedy AR System server). The syntax is Action:Modify.
Submit action
By using the Submit action in an email, users can enter values for field labels, and submit a new
record. You can see an example of a template with a Submit action in Sending a submit instruction
to the Email Engine (see page ).
Query action
The Query action lets you search for existing entries. To increase server performance, you can
configure a limit to how many matches are returned in the message. If a request exceeds the
configured search match limit, an additional message is provided that indicates what the limit is.
(See the definition for "Limit Number of Items Returned" on the AR System User Preference form
in Setting the General tab (see page 1344).)
For sample templates with Search (Query) actions, see Using templates with outgoing email (see
page ).
Modify action
The Modify action enables you to modify existing entries, but due to the nature of this command
and the security implications, the command can be executed only under the following conditions:
The message containing the modify action must be sent from an AR System administrator to
the user.
The user can only change field values and cannot add new actions or modify existing
actions when replying to the email that contains the modify action. The user must not modify
the modify key included in the email.
The sender or the user of the email must supply a valid Security Key.
Note
The incoming mailbox must be configured to allow modifications. For more information, see
Configuring BMC Remedy Email Engine for modify actions (see page 689).
In the outgoing mailbox, make sure the Delete Outgoing Notification Messages field is set to
No. You cannot modify a record by email if you delete outgoing email messages.
The Email Engine inserts the following special label and value into the email if the email contains a
Modify action:
The encrypted value contains information, which the Email Engine uses to determine the following
items:
For more information, see Using workflow to modify requests (see page ) and Sending a Modify
instruction to the Email Engine (see page ).
User-defined instruction
A user-defined instruction is a text string that the BMC Remedy AR System administrator
determines and that is used as a value for an Action label. A user-defined value can consist of any
text, as long as it is defined in the AR System Email User Instruction Templates form for user-
defined instructions. For more information, see Sending incoming email with user instructions (see
page ).
Format label
For Query, Submit, and Modify actions, you can specify that requested information be formatted in
full or short form by entering Full or Short after this keyword. An example of a Format label/value
pair is Format:Full.
The Full format lists the information for all accessible fields, with each entry separated by a line of
hyphens.
The Short format returns only the fields defined in the results list. If no fields are defined for the
results list, it returns the Short Description field.
In Submit and Modify actions, use only the Format label if the advanced configuration setting Reply
with Entry is set to Yes for the incoming mailbox.
For Query, the default format is Full. All matching requests are listed in the body of the response,
one after another.
Qualification label
The Qualification label and its value are required only for a query-based instruction. The value can
be any properly formatted search. All of the restrictions that apply to the Advanced Search bar in
the mid tier apply when performed through email. A sample qualification string:
A null value will be treated as if it is a "return all records" query, such as 1 = 1. Aliases for this label
are Query and Search.
The Result template is usually associated with a particular form. This template consists of label
/value pairs and variables (described on Variables (see page )) that correspond to fields on the
BMC Remedy AR System form being queried. These variables are replaced by the data found on
the form based on the instruction being executed. For example, you can include variables in your
template that let users click a direct access URL to open a specific Request ID:
Sample HTML result template (see page 1561) illustrates how this variables is used in a result
template. The value given for this Result Template label is the name or Request ID of the template
contained in the AR System Email Template form. When the Email Engine receives this label and
value, it retrieves the template file and uses it as required. Aliases for this label are Result and
ResultTemplate. An example of a result template label/value pair is Result: resultTemplateName.
For more instructions, see Email reply using result templates in HTML format (see page ).
This template does not have to be related to a particular form; the variables are specific to status
information and therefore can be used for any instruction on any form. The value given for the
Status Template label is the name or Request ID of the status template contained on the AR
System Email Template form. When the Email Engine receives this label/value pair, it retrieves the
template and use it as required. Aliases for this label are Status and StatusTemplate. An example
of a status template label/value pair is StatusTemplate:statusTemplateName.
The Header and Footer templates typically contain basic text, or they can be HTML documents
with logos, graphics, and decorative typefaces. The value given for this label is the name or
Request ID of a template contained on the AR System Email Template form. When the Email
Engine receives this label/value pair, it retrieves the template and uses it as required. The label
/value pair method is used when requesting results from a server by way of email.
Aliases for the Header Template are Header and HeaderTemplate; aliases for the Footer Template
are Footer and FooterTemplate. An example of a header template label/value pair is
HeaderTemplate:headerTemplateName.
Blanks are acceptable. If any characters other than digits and spaces are between the exclamation
points, the reference is not recognized as a field ID.
The argument to the ID/name label should be of the same data type as that of the field (data type
information need not be included explicitly as the parser will determine the appropriate data type of
the field by default). If this is a query action, and the argument is of a different data type than
defined for this field, an error will be generated.
Labels for fields need not be present in any specific order within an email message. You can
precede the field name/ID label with any text that you want to include. This text will not be parsed
by the Email Engine. It is common practice to include the actual field name in this way:
In the previous example, the Email Engine treats the text Submitter as regular text. The field ID !2!
is parsed and the variable $USER$ is the value used for any submit or query action that might
have been specified.
Only fields that have values are used in the request. Fields that do not have values are ignored.
To specify the Request ID for join forms, use the Request IDs of the forms referenced by the join
form separated by a vertical bar. For example, a join form Request ID might appear as
TT000567|TT000890.
Key label
If your incoming mailbox is configured to require a security key, then the Key label/value pair must
be present in the incoming email message. A key is required to use the Modify action. The
passwords and security keys are encrypted in the AR System Email Messages form. Aliases for
the Key label are Encryption Key and Encryption. An example of a Key label/value pair is Key:
testKey. For more information, see Configuring incoming mailbox security (see page 691).
Request ID label
The Request ID label is only valid for the Modify action and defines the Request ID or Entry ID of
an entry on the corresponding form against which the Modify action is to be executed. The Request
ID is required for a Modify action as it serves to identify the specific form entry you want to modify.
Aliases for the Request ID are Entry ID, EntryID, and RequestID. An example of a request ID label
/value pair is RequestID:0000012345.
In this topic:
Basic format
The basic format is the simplest. You can associate a label with a constant value or a variable
value. The labels and associated constant values are written as follows:
Label:[$$Value$$]
The opening and closing $$ enable the parser to extract the value from the email, including
situations where the value incorporates multiple lines. If the value does not incorporate multiple
lines, the label/value pair can be written as follows:
Label:Value
Tip
You should use the [$$ ... $$] variable syntax when the Email Engine needs to
parse multi-line values. Strictly speaking, you do not need to use this multi-line syntax for
all label/value pairs, but it is recommended to adopt if you think the values in a variable
might exceed a single line.
The label and value do not have to be left justified, and can be prefaced by text on the same line.
You do not have to surround the label with any special characters.
You can associate a label with a variable also. A variable is written as follows:
#$$variable_name$$#
Label:[$$#$$variable_name_Value$$#$$]
XML format
The XML format is as follows:
<Label>Value</Label>
BMC Remedy AR System fields are treated differently. The format is as follows:
or:
HTML format
The four major HTML field types are:
Text fields
Radio buttons
Checkbox buttons
Menu field
These types have a fixed format in HTML. In HTML, however, an editor automatically generates
the correct format when filling in any missing field values. You can still use the Basic format within
the HTML document. The corresponding fields can be used in situations where input is required
from the user. The email client must allow or support the ability to edit HTML fields directly; such an
example would be Microsoft Outlook when it is configured to edit emails with Microsoft Word. To
create a template by using HTML field types, see Sending outgoing email in HTML (see page ).
The name tag represents the label, and the value tag represents the value.
Text field
In HTML, a text field typically looks like this:
This represents a text field into which data can be typed so it easily represents a label/value pair.
The name tag contains a label, such as Action, and the value tag will contain a corresponding
value, such as Query.
Radio buttons
Radio buttons allow you to design a document where the user can select from a given range of
possibilities. Unlike a text field where only one set of tags between the <> markers represent a label
/value pair, radio buttons can contain several sets of tags that comprise one instruction label and
several values. An example follows:
This represents two radio buttons grouped together under the name Action. The values for the
radio buttons would be Submit and Query. The selected value would be determined by the word
"checked." The resulting label/value pair would be Action:Submit.
Checkbox buttons
Checkbox buttons allow you to design a document where there are several possibilities, but those
possibilities are not grouped together. An example follows:
or
In the first example, the label and value is not used because the word "checked" is not included in
the definition. But in the second example, the label and value is used because the box was
checked.
This field can give the user the ability to select the parameters that are valid and those that are not.
Menu field
The menu field acts as a selection box where you will be able to create a label from which any
specific value can be selected from a range. In the following example, the Action label has possible
values of Modify, Submit, and Query.
The type is a select HTML field; the label is Action; and the values are Modify, Submit, and Query.
The tag containing the word "selected" determines the label/value paid to be used.
The menu field also allows the user to specify different visible text in the field with the correct field
values defined underneath.
If the parameter is defined again after an action statement, then that parameter takes precedence
over the global parameter for that action only. For more information, see Email content template
with Submit and Query actions (see page ).
Variables
In this topic:
Variables allow the administrator to create generic templates. Variables are used only with
templates that are to be used as one of the following types of templates:
Variables are placeholders that are replaced by specific values defined when:
The user instruction is executed and where the values are defined by a user sending the
email executing this user instruction.
The template for new outgoing emails is used as a content template. The variables are
defined by values of the fields in the entry that triggers the notification.
Variables can be used in place of values in the label/value pairs in templates. The variable is
replaced by a value at execution time.
#$$variable_name$$#
Label:[$$#$$Value$$#$$]
For more information about label/value formats, see Basic format (see page 1538).
The name of the variable can be the same as a AR System field, so there are no restrictions if
used in the context of a AR System form. This allows you to use existing AR System field values to
define the value of a variable. The variable value is retrieved from the same !Field ID! label as
that of AR System fields so the variable name might also be the name or ID of an existing AR
System field.
In content templates used for outgoing emails, variables for field values must use the field
database name, not the field ID. For specific examples, see Using variables with notifications (see
page 1543).
For outgoing emails, the variable value is determined in the following order:
1. If you supply an attachment in the Values attachment field of the Attachment Alternatives
tab of the AR System Email Messages form, the attachment is used to determine the values
for variables contained in the template. For more information about how to do this, see
Using the Attachment Alternatives tab (see page 1474).
2. If you do not supply an attachment in the Values attachment field, but supply information in
Field Values, or obtain a value by using a qualification in the Qualification field of the
Variable Replacement tab of the AR System Email Messages form, the information is used
to determine values for variables contained in the template. For more information, see Using
the Variable Replacement tab (see page 1471).
3. If you do not supply field values, but your content template contains a query to obtain
information to substitute in the email, the query information is used to generate the
message. For query information to be used, a form, server, and qualification must be
supplied. If any one of these items is missing, the message creation will fail.
Variable examples
The following example shows a field value used as a variable in a query or qualification:
Inside the same template or defined in the user-defined instruction template received in email, this
variable could be associated with a value as follows:
After the parser has extracted all the required information, the variable is replaced with the
appropriate value, resulting in a query as follows:
Query:[$$ 'Last Modified By' = "User" AND 'Modified Date' > "21/01/2004" $$]
Note
Variables can be used only for form field values and qualifications. They do not work for
Login or Server labels. For example, the variable Login: #$$Joe User$$# would not be
correctly parsed by the Email Engine and would return an unknown user error. Only local
fields (fields after the Action label) can be substituted. Global fields (fields before the
Action label) cannot be substituted. Labels like Server, Schema, Login, Password, or Key
are considered to be global and cannot be substituted.
For example, if the user has a template to mail out the user information through a notification that
looks like the following, it will not work for notifications:
To use this template in notifications, the user must change it so that it looks like the following
example:
Note
Do not use the Request ID to return entries from display or vendor forms in a notification.
If you construct a content template by using the #$$Request ID$$# variable and use
the content template in the Templates tab of notifications on display or vendor forms, the
system will not generate errors, but it also will not return the Request IDs.
Format Description
SHORT A numerical date that includes the numerical month, day, and year (for example, 06/18/04). The order of each
component is based on the Regional Options properties in the Control Panel.
MEDIUM Longer numerical date description, for example, Jan 12, 1952.
LONG An alphanumeric date that includes the day of the week, month, day, and year (for example, Friday, June 18, 2004).
The order of each component is based on the Regional Options properties in the Control Panel.
FULL Completely specified numerical date description, for example, Tuesday, April 12, 1952 AD.
You cannot mix different locales for short and long formats. So, in the countries where the valid
value is mm/dd/yy, dd/mm/yy is not valid and will not work, especially when the dd part is greater
than 12. You can see examples of valid date format values when you open Regional Options on
your Control Panel for long and short dates.
As a result, depending on your locale, 31/01/04 will work as a short date if your locale is set to dd
/mm/yy, not mm/dd/yy. The format 31-Jan-04 will not work, but you can use Jan 31, 2004 or
January 31, 2004.
Reserved variables
The Email Engine uses reserved variables to place the results of executing an email. You can use
reserved variables in Result and Status templates, but not in Content templates. Reserved
variables fall under two main categories:
Action information — Useful when creating a template that will contain the results of
executing the associated action. They can be defined in a Result template with variables
that define the fields of a specific form. The Email Engine will replace these variables with
the correct values before the results are returned to the sender of the email containing the
actions.
The following formats are valid:
#$$Action.Name$$# — The action value, such as Submit or Query.
#$$Action.Number$$# — The position of the action within the entire execution list.
#$$Action.Form$$# — The name of the AR System form involved in this action.
#$$Action.Query$$# — The qualification (if any) associated with the instruction. (This
reserved variable is valid only for User Defined Instruction templates.)
Status information— Used to store the results of system-generated errors. The following
formats are valid:
#$$ActionStatus.Number$$# — The error or warning number.
#$$ActionStatus.Type$$# — The type of error, such as Severe, Error, Warning.
#$$ActionStatus.Text$$# — The message text.
#$$ActionStatus.AppendedText$$# — The associated appended text.
These are also values that you would define in a status template; they are common to
all forms. The following figure displays an email that includes these reserved
variables for status information. This particular email uses the HTML status template
found in Types of email templates (see page 1527).
The following rules apply for specific Status History information in the templates:
You must use the fully qualified status history name, for example:
Status-History.New.USER Status-History.New.TIME
Diary fields and character fields with a maximum length of over 50 characters can use
multiple lines of text.
Values can be entered anywhere after the delimiting character. Leading and trailing blanks
are ignored when the Email Engine reads a value.
Comments are optional. Because the Email Engine ignores any lines that do not contain a
valid label/value pair, you do not have to add a # symbol in front of comments.
If the user does not enter a value into a field that has a default value defined, then the
default value is loaded. If the user does not enter a value into a required field and there is no
default value defined for it, an error will result.
template_attachment1.htm.
Use the AR System Email Attachments form to make sure that a specific attachment is always
included with any message that makes use of a specific template. You can add graphics to HTML
templates by using this form. This is particularly useful for header templates if you want to add a
company logo to the header information in your email.
Warning
Note
The Email Engine does not support linking your HTML template to a cascading style
sheet.
1. Open the AR System Email Templates form in new mode in the mid tier.
2. From the Template Format menu, choose HTML.
This activates the buttons on the Template Attachments tab to add attachments to your
template.
3. Add a template file as an attachment, and click Save.
4. Click the Template Attachments tab, and then the Add Attachment button.
5. In the AR System Email Attachments form, select Template from the Type menu.
The AR System Email Attachments form for templates
(Click the image to expand it.)
6. Right-click in the attachment pool, and choose Add from the menu that appears.
7. In the Add Attachment dialog box, navigate to the appropriate location and open the file.
The file is added to the list of attachments on the AR System Email Attachments form. If you
are using a Windows system, you can also click and drag an attachment to the attachment
pool.
Note
If you attach multiple images (such as .gif or .jpg files) with a template and use the
same name for each image, the Email Engine will use only the first attachment.
8. Select the item in the attachment pool, and click the edit button next to the Attachment Name
field.
The name of the template attachment is displayed. For example:
template_attachment1.htm
Note
If you specify an attachment name that is different from the file name, the
attachment does not appear in the email messages based on this template. For
example, if you are attaching the banner1.jpg file and you specify newBanner1.jpg
in the Attachment Name field, the image is not visible in the corresponding email
messages.
In this topic:
To delete an attachment
To modify an attachment
1. Click the Templates Attachments tab in the AR System Email Templates form.
2. Select the attachment you want to modify.
3. Click the Modify Attachment button.
The AR System Email Attachments form opens (see The AR System Email Attachments
form for templates (see page 1547)).
4. Click Search to locate the attachment.
The attachment appears on the attachment list.
5. Modify the attachment as required. You also can modify the Attachment Name.
6. Click Save.
1. In the Template Attachments tab of the AR System Email Templates form, click the arrow
next to the blank field at the bottom of the pane.
2. Select the attachment.
3. Click the Add Existing button.
Your attachment is added to the list in the attachment pool.
4. Click Save.
1. Export the HTML template from the AR System Email Templates form on the source server.
2.
BMC Remedy Action Request System 9.1 Page 1549 of 4703
BMC Software Confidential. BladeLogic Confidential.
2. Import the template into the AR System Email Templates form on the target server.
3. Copy the attachments associated with the template from the source server.
4. Manually add the attachments to the template in the AR System Email Templates form on
the target server.
Creating and storing a template for use with user instructions (see page 1551)
Creating user instructions (see page 1552)
Sending a user instruction in an incoming email (see page 1553)
Results of the user instruction (see page 1553)
Using variables with user instructions (see page 1554)
A good analogy for understanding user instructions is that they are "macros" for email. You can
make Email Engine interaction easier for your users by creating custom actions that reduce the
need to learn the Email Engine syntax of label/value pairs, variables, and so on. These custom
actions are called user instructions. The following figure provides a sample scenario of how to
create user instructions for your user community.
User-defined instruction templates automate actions to make it easy to perform common user
actions. Like macros, you can create predefined submit and query actions with these instruction
templates.
Every user instruction must be associated with an email template. Templates provide generic
layout for similar emails that are sent from or into the Email Engine, simplifying Email Engine
interactions for users. User Instruction templates enable you to associate a template with an
incoming email through an entry in the AR System Email User Instruction Templates form.
1. The administrator creates a template, and then adds the template to the AR System Email
Templates form. The user instruction template looks the same as any other template.
2. The administrator creates a user instruction in the AR System Email User Instruction
Templates form by entering an instruction name in the Instruction field.
3. The administrator associates the template created in step 1 (see page 1542) with the user
instruction name.
4. The user sends an incoming email that contains the user-defined instruction (Action label
/value pair) to the Email Engine. The email contains an Action label and a value
corresponding to the valid character string in the Instruction field of the Email User
Instruction Templates form. The value for the variable that appears after the Action label is
extracted from the email, and the associated template is then executed.
5. As a result, the Email Engine constructs a message according to the template instructions
and sends the message to the user.
1. Use a text editor to define a template, and name the file with an .arm extension.
The following example is a template file (IN_Install_AllUrgent.arm) that queries all urgent
records in the TestSecurityForm form.
Schema: TestSecurityForm
Server: polycarp
Login: Demo
Password:
Action: Query
Format: Full
Header Template: Header_Urgent.html
Result Template: Default Content
Qualification: 'Status' <= 2 AND 'Impact' = 3
A template can contain one or more instructions. For more information, see Creating
templates (see page ).
Tip
Test the template by sending email to the incoming mailbox and see if it returns
the expected results.
2.
BMC Remedy Action Request System 9.1 Page 1551 of 4703
BMC Software Confidential. BladeLogic Confidential.
2. In the mid tier, open the AR System Email Templates form in New mode.
Storing a template
(Click the image to expand it.)
Note
You can associate more than one user instruction with a template containing one or more
instructions.
In the mid tier, open the AR System User Instruction Templates form in New mode, and complete
the form as follows:
1. Do not enter a template ID. The system will create the unique ID in the Instruction Template
ID field when you save the entry.
2. From the Template Name menu, select the template that contains that actions you want to
associate with the user instruction. You can use only templates that are stored in the AR
System Email Templates form, for example, UrgentRequests. (See Creating and storing a
template for use with user instructions (see page ).)
3.
BMC Remedy Action Request System 9.1 Page 1552 of 4703
BMC Software Confidential. BladeLogic Confidential.
3. To restrict the user instruction to one incoming mailbox, select a mailbox from the Mailbox
Name menu.
4. Enter a character string value for the Instruction field. This value is used to identify this
template when used in an incoming email, for example, Urgent.
Action: Urgent
The email should include any values for the variables if any variables exist in the template
associated with the user instruction.
4. Send the email.
After receiving an incoming email, the Email Engine processes a user instruction as follows:
1. Retrieves the associated user instruction entry from the AR System Email User Instruction
Templates form and determines which template is associated with the instruction.
2. Retrieves the associated template from the AR System Email Templates form.
3. Replaces the variables in the template with the values defined by the information in the
email.
4. Executes the template with substituted values in the incoming email.
Templates and user instructions can make it easier for your users to interact with the Email Engine,
reducing the need for them to learn the Email Engine syntax. Instead, all they need to do is use the
user instruction name as the value of the Action Label.
Login:Frank Frontline
Password:mypassword
Action: Submit
!Employee_Name!: [$$Joe Smith$$]
The characters between the exclamation marks match the variable name in the template that is
associated with the user instruction (Submit). The Email Engine will then:
1. Match the string between exclamation marks in the email with the variable name in the
template.
2. Retrieve the database name or field ID between the exclamation marks in the template.
3. Substitute the field with that database name with the value sent in the email.
You can copy and paste these examples into the body of an email message, or you can use the
examples to create your own templates. For more information, see Creating and using email
templates (see page 1524).
1. Export the email template for the form that you want to make available for searching.
A sample of an exported mail template appears as follows:
Schema: vacation
Server: polycarp
Login:
Password:
Action: Submit
Values: Submit, Query
Format: Short
Values: Short, Full
Submitter !2!:
Short-Description !8!:
b.
BMC Remedy Action Request System 9.1 Page 1555 of 4703
2.
b. In the fields section of the email template, define only the Request ID. It must have a
field ID value of 1.
c. Enter the Request ID of the entry to be retrieved.
d. Remove all other fields from the mail template. (The only field in the body should be !
1! requestIDNumber.)
The following example shows an exported template that was modified to search for a
request ID:
Schema: vacation
Server: polycarp
Login:
Password:
Action: Query
Format: Short
Values: Short, Full
!1!:TT00000000119
1. Export the email template for the form that you want to make available for searching.
An example of a mail template for a form follows.
c.
BMC Remedy Action Request System 9.1 Page 1556 of 4703
2.
c. Edit the fields portion of the email template to include the fields you are searching,
but remove all other information.
The following example shows an exported template that was modified to search for
multiple fields.
1. Export the email template for the form that you want to make available for searching.
The following example shows a mail template for a form:
Login:
Password:
Action: Query
Format: Short
Qualification: 'Source' = "Phone" OR 'Source' = "email"
1. Export the email template for the form that you want to make available for submitting.
Make sure that the form contains an attachment pool and a valid attachment field.
2. Edit the template to include the label and value for an attachment field (for example, Attach!
536880912!:), as shown here:
Note
Make sure that you use the ID of the attachment field, not the attachment pool.
3. In a third-party client tool such as Microsoft Outlook Express, create a new email, and copy
and paste the template into the body of the email
4. Add all the required values, for example, Login name, password, and so on.
5. Supply the attachment file name including the extension after the attachment field parameter.
A user email template filled out with a filter.log file attached appears as follows:
Password:
Action: Submit
# Values: Submit, Query
Format: Short
# Values: Short, Full
# Values: Short, Full
Submitter ! 2!: Demo
Short Description ! 8!: Submitting email with attachment file.
Attach!536880912!: filter.log
6. Insert your filter.log attachment file anywhere in the email. If the attachment name including
the extension is not supplied in the email template, the email submission will fail.
7. Send the email to the incoming mailbox.
When creating or modifying templates, any values that are defined before the Action label are
global and apply to all the actions specified. Any value declared after the Action statement takes
precedence over the global definition for that action only.
In the following example, the Schema and Server label/value pairs are global, and therefore apply
to both the Submit and Query actions.
Schema: HD Incident
Server: polycarp
Login: Demo
Password:
Action: Submit
# Values: Submit, Query
Format: Full
# Values: Short, Full
Submitter ! 2 !: $USER$
Short Description ! 8 !: Need to create new post office box.
!Last Name!: Stampovich
!First Name!: Ivan
!Email!: stampovic @bmc .com
!Location!: Sunnyvale
!Phone!: 222 - 3333
!Status!: Assigned
!Impact!: Medium
!Item!: Email
!Category!: Applications
!Type!: Office
!Problem Summary!: Need to create new post office box.
! 536870920 !: boot.ini
! 536870920 !: boot.ini
Action: Query
Qualification: 1 = 1
If you did not specify a template for the email reply, the Email Engine would reply with the results
shown in the following figure:
The Query action returns the Submit entry to the user, along with any other entries that meet the
qualification. Because no template was defined as a Results Template, the Email Engine uses the
default internal text format.
Schema: HD Incident
Server: polycarp
Result: HDIN Content
Login: Demo
Password:
....
When the Email Engine sends the reply email, it will use the result template shown in the following
figure.
For a detailed example, see Creating a result template for reply email (see page 1481).
The Result Template must be stored in the AR System Email Templates form before it can be used
in the email. For more information, see Storing templates in the AR System Email Templates form
(see page ). If graphics are included, and these are not contained in the HTML file, the graphics
must also be added using the Template Attachments tab of the AR System Email Templates form.
For more information, see Adding attachments to HTML templates (see page ).
In this template, variables correspond to a field on the HD Incident form on which the template is
based (for example, #$$Last Name$$# ). The administrator only specifies the fields that are of
interest. For more information, see Variables (see page ).
When you send your email, the Email Engine parses and executes the instructions in the Results
template. It formats the reply and substitutes values for the variables. For more information about
results templates, see Result Template label (see page ).
The following HTML code was used to create the result template shown in the following figure.
Copy, paste, and then adapt what you need for your own result template.
Information_______________________________________________________
_____________________</U></FONT></B></TD></TR>
<TR borderColor=#cccccc>
<TD width= "11%" height= 56 >
<DIV align=center><IMG height= 40 src= "people.gif"
width= 38 ></DIV></TD>
<TD width= "17%" height= 56 ><B><FONT size= 3 >Last Name</FONT></B></TD>
<TD width= "21%" height= 56 ><FONT size= 3 >#$$Last Name$$#</FONT></TD>
<TD width= "14%" height= 56 ><B><FONT size= 3 >Email</FONT></B></TD>
<TD width= "37%" height= 56 ><FONT size= 3 >#$$Email
Address$$#</FONT></TD></TR>
<TR borderColor=#cccccc>
<TD colSpan= 5 ><FONT size= 3 ><B><FONT
color=# 008000 ><U>Incident
Information_______________________________________________________
_______________________</U></FONT></B></FONT></TD></TR>
<TR borderColor=# 333333 >
<TD borderColor=#cccccc width= "11%" rowSpan= 3 >
<DIV align=center><FONT size= 3 ></FONT><FONT size= 3 ><B><IMG height= 43
src= "tools.gif" width= 46 ></B></FONT></DIV></TD>
<TD borderColor=#cccccc width= "17%" ><B><FONT
size= 3 >Impact</FONT></B></TD>
<TD borderColor=#cccccc width= "21%" ><FONT
size= 3 >#$$Impact$$#</FONT></TD>
<TD borderColor=#cccccc width= "14%" ><B><FONT
size= 3 >Status</FONT></B></TD>
<TD borderColor=#cccccc width= "37%" ><FONT
size= 3 >#$$Status$$#</FONT></TD></TR>
<TR>
<TD width= "17%" ><B><FONT size= 3 >Category</FONT></B></TD>
<TD width= "21%" ><FONT size= 3 >#$$Category$$#</FONT></TD>
<TD width= "14%" ><B><FONT size= 3 >Type</FONT></B></TD>
<TD width= "37%" ><FONT size= 3 >#$$Type$$#</FONT></TD></TR>
<TR>
<TD width= "17%" ><B><FONT size= 3 >Item</FONT></B></TD>
<TD width= "21%" ><FONT size= 3 >#$$Item$$#</FONT></TD>
<TD width= "14%" ><B><FONT size= 3 >Assigned To</FONT></B></TD>
<TD width= "37%" ><FONT size= 3 >#$$Assigned To$$#</FONT></TD></TR>
<TR>
<TD borderColor=#cccccc colSpan= 5 >
<HR>
<FONT size= 3 ></FONT></TD></TR></TBODY></TABLE></TD></
TR></TBODY></TABLE><B><FONT
color=# 008000 size= 3 ></FONT></B></BODY></HTML>
Schema: HD Incident
Server: polycarp
Status Template: Status Default
Login: Demo
Password:
....
Similarly, the Status Template must be stored in the AR System Email Template form. For more
information about status templates, see Status Template label (see page ).
When you send your email, the Email Engine parses and executes the instructions in the content
template. If there is an error, the resulting status email will be formatted like the following figure.
The Email Engine substitutes values for the variables.
Schema: HD Incident
Server: polycarp
Result Template: Result Template
Header Template: Default Header
Footer Template: Default Footer
...
You can also add a header or footer template to an email by selecting it in the relevant field of the
Templates tab of the AR System Email Messages form. Use the template fields on the AR System
Email Messages form to determine the templates used when creating an outgoing message. The
label/value pair method is used when requesting results from a server by email.
In each case, the templates must be stored in the AR System Email Templates form before they
can be used in the email. For more information, see Storing templates in the AR System Email
Templates form (see page ). If graphics are included, and these are not contained in the HTML
file, you must also add the graphics using the Template Attachments tab of the AR System Email
Templates form. For more information, see Adding attachments to HTML templates (see page ).
For more information, see Header Template and Footer Template labels (see page ).
To use your old email templates after an upgrade to Email Engine 7.0.00 or later, use the following
procedure.
1. Verify the following settings in the AR System Email Mailbox Configuration form:
Incoming mailbox is Enabled.
Email Action for your incoming mailbox is set to Parse.
Use Original Template Format is set to Yes, if you want to use your original templates
for your incoming mailbox "as is" without using the 7.0.00 and later email template
features.
Use Supplied User Information field is set to Yes.
2. If only one form is used for email submissions, set the Default Workflow Form to that form
name.
3. To guarantee that no other form is used for email submissions, set Force Default Workflow
Form to Yes.
4. If the original templates do not include a user name, user password, or form name, perform
one of the following tasks:
Modify the template to include these parameters and values.
Create a template that includes one or more of these values with a user instruction.
For more information, see Sending incoming email with user instructions (see page
).
These forms are generated when you install the Email Engine.
Note
If any of the email forms are deleted after you install the Email Engine, you must import
those forms manually. They are not imported when you restart the AR System server.
Warning
BMC recommends that you do not archive or audit the forms containing core fields.
AR System Email Failover Mail Server Configuration form (see page 1566)
AR System Email Mailbox Configuration form (see page 1567)
AR System Email Templates form (see page 1571)
AR System Email User Instruction Templates form (see page 1572)
AR System Email Error Logs form (see page 1573)
AR System Email Security form (see page 1573)
Field Description
Mail Server Name/IP The name or IP address of the mail server that the Email Engine can use to send or receive emails.
Failover Mail Server The name or IP address of the mail server that acts as a failover system for the other mail server
Name/IP mentioned on this form.
Important
The Email Engine does not resolve the mail server if either Mail Server Name/IP or
Failover Mail Server Name/IP contains a new line character. You should use either the
server name or the IP address in both fields. If you use the server name in one field and
the IP address in the other, an error message is displayed and you are not allowed to
save the form. You should use similar naming conventions for both the AR System Email
Configuration form and the AR System Email Failover Mail Server form. You should not
provide the IP address in one form and the server name in the other. If you use different
naming conventions in these forms, no error is displayed, but the failover mail server is
not used successfully if the primary mail server stops working.
Use the AR System Email Mailbox Configuration form to create mailboxes and specify their use.
For each mailbox, the form provides a name and email address for the mailbox administrator,
actions associated with the mailbox, connection and security provisions, and defaults.
For more information, see Configuring outgoing mailboxes (see page 634) and Configuring
incoming mailboxes (see page 657).
Field Description
name
Status Select Enabled to activate the mailbox. Select Disabled to keep the mailbox disabled.
Email Select the email protocol. Incoming mailboxes include following protocols: For 32-bit JVM:
Server
Type POP3
IMAP4
MBOX
MAPI
Field Description
name
POP3
IMAP4
MBOX
Polling Enter the number of minutes after which the Email Engine will check for incoming mail from the mail server for this
Interval mailbox.
(Minutes)
Email Enables the secure socket layer. Used only with POP3 and IMAP4.
Server
Requires
SSL
Inbox Path Enter the full path file name to the mbox file corresponding to the user email account that will be used. Used only
with MBOX.
Email Enter the name or IP address of the mail server used in your organization. Used only with POP3 and IMAP4.
Server
Name/IP
Email Enter the port used for connecting to the mail server. The default port number is determined by the protocol
Server Port selected and whether Secure Sockets Layer (SSL) is selected. Used only with POP3 and IMAP4. If you do not
enter a port number, the following default values will be used:
POP3: 110
POP3 with SSL: 995
IMAP4: 143
IMAP4 with SSL: 993
Email Enter the user name of the administrator or user for this email account. Used only with POP3 and IMAP4.
Server
User
Email Enter the user name of the administrator or user for this email account. Used only with POP3 and IMAP4.
Server
Password
Profile Enter the name of the Microsoft Exchange profile to be used for incoming mailbox. Used only with MAPI.
Name
Associated Enter the name of an outgoing mailbox used to reply to incoming emails that require a response.
Mailbox
Name
Email Select Parse to enable the Email Engine to detect and process instructions included in an incoming email message,
Action or accept the default value of None for no action.
Use Select Yes to enable the system to use only the parsing mechanism used in the original parsing system (BMC
Original Remedy Mail Server release 5.1 or earlier) and thus ignore special HTML fields and XML formats.
Template
Format
Reply With Select Yes to enable the results of an Action to be included with an email reply, or select No if results should not be
Result included.
Field Description
name
Reply With Select Yes to return the complete entry of a submit or modify action. Select No to use the default single-line entry.
Entry
Enable Select Yes to enable modify actions, or No to prevent modify actions from being performed.
Modify
Actions
Default Enter the name of the form upon which the Email Engine will execute instructions found within the incoming email
Workflow message if no specific form is specified in the email message.
Form
Force Select Yes if the Default Workflow Form should be used regardless of what was specified in an incoming email.
Default This action will confine all instructions received by this mailbox to the specified form.
Workflow
Form
Use Select Yes to force a security key to be used for incoming mail to this mailbox.
Security
Key
Use Select Yes to use AR System server login information that might be included within the incoming email message.
Supplied
User
Information
Use Email Select Yes to use the email address of the sender as a form of authentication.
From
Note: If the database is case sensitive, make sure that the character case of the email address from the user form
Address
and email address of the sender is the same.
Status Select Enabled to activate the mailbox. Select Disabled to keep the mailbox disabled.
Email Server Select the email protocol. Outgoing mailboxes include the following protocols: For 32-bit JVM:
Type
SMTP
MAPI
SMTP
Polling Enter the number of minutes after which the Email Engine will check for new outgoing mail waiting to be sent
Interval from this mailbox.
(Minutes)
Email Server Enables the secure socket layer. Used only with SMTP.
Requires SSL
Email Server Enter the name or IP address of the mail server used in your organization. Used only with SMTP.
Name/IP
Email Server Enter the port used for connecting to the mail server. The default port number is determined by the protocol
Port selected and whether Secure Sockets Layer (SSL) is selected. Used only with SMTP. If you do not enter a port
number, the following default values will be used:
SMTP: 25
SMTP with SSL: 465
Email Server Enter the user name of the administrator or user for this email account. Used only with SMTP.
User
Email Server Enter the user name of the administrator or user for this email account. Used only with SMTP.
Password
Profile Name Enter the name of the Microsoft Exchange profile to be used for the outgoing mailbox. Used only with MAPI.
Associated Enter the name of the incoming mailbox that will be used to receive instructions or notifications.
Mailbox Name
Default Select Yes so that all outgoing messages for which an outgoing mailbox is not specified will be sent using
Outgoing information in this entry.
Mailbox
Display Name Enter the name you want displayed in the From line of the outgoing email.
Email Address Enter the full email address of the administrator or owner of this mailbox.
Reply To Enter the Reply-to email address for the mailbox owner or administrator, if you plan to enable users to reply to
Address notification messages sent from this mailbox.
Organization For email clients that display an organization name, enter the name of the mailbox owner, or administrator's
organization.
Delete Select Yes to have outgoing notification messages deleted from the AR System Email Messages form after they
Outgoing have been sent from this mailbox.
Notification
Messages
Default Enter the email addresses to send to if addresses have not been specified in the Messages tab for a notify filter
Addressing or escalation.
Default To Enter the default email addresses for those who should receive outgoing messages from this mailbox.
Default CC Enter the default email addresses for those who should receive copies of outgoing messages from this mailbox.
Default BCC Enter the default email addresses for those who should receive blind copies of outgoing messages from this
mailbox.
Default If a user creates a message without specifying a template in the Templates tab for either Notify filter or
Templates escalation actions, then this template will be used by default.
To include graphic elements in your email, you can add these as attachments to the template in the
AR System Email Templates form. You must store templates in the AR System Email Templates
form before you can use them.
For more information, see Storing templates in the AR System Email Templates form (see page
1546).
Encoding Choose the language setting used to read and parse the contents of templates. If no setting is specified, the default
encoding of the local system is employed.
Template Enter the name of the email template. The contents of the Template Name field are automatically populated if you
Name attach a new file, then click inside the field. You can edit the name as needed. After saving your template, the AR
System Email Templates form uses data-driven workflow to populate menus in the Email Engine forms that use
templates, for example, when you add an email template to a Notify action.
File Name Select the template files from the Attachment field. Includes size and label information.
Click to open the AR System Email Attachments form in New mode. Lets you select and add an attachment (for
example, HTML file or bitmap) that is always used with a specific template.
Add
Attachment
button
(HTML
templates
only)
Modify Click to open the AR System Email Attachments form in Search mode so you can modify an attachment. The
Attachment template will not be available for use until the Email Engine cache is updated.
button
(HTML
templates
only)
Delete Click to delete the attachment from AR System Email Attachments form.
Attachment
button
(HTML
templates
only)
Refresh Click to refresh the table after you have added, modified, or deleted an attachment.
Table
button
(HTML
templates
only)
For more information, see Sending incoming email with user instructions (see page 1550).
Instruction Template ID System-generated unique ID. The contents of this field are read-only.
Template Name Menu lets you select template that is executed as the content of user instruction and used in the email.
Mailbox Name Menu lets you associate incoming mailbox used with user instruction.
Instruction Valid character string consisting of Action label and value used to access user instruction field.
For more information, see Email error and system status logs (see page 4248).
Message Type Either an error log or a status log — and the severity level of the message. Severity levels are as follows:
Severe: Errors that prevent successful execution of a specific task and might require administrator
intervention. This is the default value.
Warning: Errors that can cause problems when executing a task.
Info: Status information.
Config: Information related to mailbox configuration. For configuration information, see Configuring
outgoing mailboxes (see page 634) and Configuring incoming mailboxes (see page 657).
Fine: Internal exceptions, which are handled by the application but logged for tracing purposes.
Finer: Trace logs that record specific tasks as they are executed within the application.
Generated By Error generated either by the Email Engine or by the AR System server.
For more information, see Configuring incoming mailbox security (see page 691).
Security ID System-generated unique ID. The contents of this field are read-only.
Status Menu that lets you activate the key. Select Disabled to keep the key disabled.
Key Name of key consisting of a set of alphanumeric characters. You can use almost any combination of
letters and numbers for a security key.
User Name Name of a valid BMC Remedy AR System user to whom the security key should apply.
Force for Mailbox Enables the security key for this mailbox only. Select No to enable the key for all mailboxes in your email
environment.
Mailbox Name Name of the Incoming Mailbox to which you want this security key applied.
Force from Email Key required for mail received from specific email accounts. If you select Yes, the Email Address field
Addresses becomes enabled.
Email Addresses Option that verifies incoming messages from a set of specific email accounts using a security key.
Note
To configure multiple email address for a single security key, you must separate the email
addresses with a semicolon (;).
Expiration Date Expiration date for this security key. After the key expires, you can either modify the expiration date in this
form, or set the Expires field to No.
Description Description for the key, such as why it was created or instructions for modifying or deleting it.
Use the AR System Email Messages form to store information for outgoing and incoming email
messages. Each message is stored as an entry in the AR System Email Messages form.
For each message, this form provides the name of the mailbox from which the message was
generated, the message type, name and organization of the mailbox owner; names of recipients
sent to and copied; the text of the message (in HTML, plain text format, or a combination of both);
and (under a separate tab) a list of any attachments included with the message.
For information about using the Email Messages form to troubleshoot traffic between incoming and
outgoing email, see Setting up outgoing email (see page 1445).
Display Advanced Options Select Yes to display the advanced options available for viewing email information and errors.
Message tab
Reply To Reply-to email address for the mailbox owner or administrator, if you plan to enable users to reply to notification
messages sent from this mailbox.
Organization For email clients that display an organization name, the name of the mailbox owner, or administrator's
organization.
To Email addresses for those who should receive outgoing messages from this mailbox.
CC Email addresses for those who should receive copies of outgoing messages from this mailbox.
BCC Email addresses for those who should receive blind copies of outgoing messages from this mailbox.
Priority Value to use in the email message to get the desired Microsoft Outlook priority. Numbers from 1 to 100 are
acceptable.
Attachments tab
Refresh Table Refreshes table after you have added, modified, or deleted an attachment.
Templates tab
AR System Server With qualification variables, name of the server on which the form resides.
AR System Server TCP With qualification variables, any access information necessary.
Port
AR System Server RPC With qualification variables, any access information necessary.
Number
AR System Form With qualification variables, name of the AR System form to which these values apply.
Attachment Alternatives Attachment pool enables you to add the content of your email as a plain text, HTML, or RTF
attachment, instead of typing it into the Body field in the Message tab.
Date The date on which the message was sent; this value is retrieved from the Date header of the incoming message.
Received
Date Sent The date on which the message was sent; applicable to outgoing messages only.
Execute The timestamp of when the incoming message was executed, or when the outgoing message was sent.
/Send At
Parse The parsing status of the message; applicable to incoming messages only. The options and their meanings are:
Message
No — The message has not yet been parsed.
Yes — The message is still in the incoming queue.
Error — An error occurred when parsing the message.
Parsed & Executed — The message was successfully parsed and executed.
Send The sending status of the message; applicable to outgoing messages only. The options and their meanings are:
Message
No — The message has not yet been sent.
Yes — The message is still in the outgoing queue.
Error — An error occurred when sending the message.
Sent — The message was successfully sent.
Error Sending-Retrying — The Email Engine is trying to send the message again, because an error
occurred at the previous attempt.
Errors tab
Enables users to view error messages if their email is not sent correctly.
Log Message Type If a request fails to submit, the original message is returned as an attachment.
Log Message Text If a request fails to submit, the error message that indicates the reason for the failure is returned.
Copying incoming messages to the AR System Email Messages form (see page 1578)
To copy the rectified incoming messages to the AR System Email Messages form
(see page 1578)
Enabling the Clean AR System Email Error Messages escalation (see page 1579)
Message tab (see page 1579)
Attachments tab (see page 1580)
Advanced Options tab (see page 1580)
Message Information tab (see page 1581)
Errors tab (see page 1581)
The AR System Email Error Messages form stores any incoming email message that has not been
processed correctly due to any runtime error, along with the error details.
Note
Warning
(For incoming mails that have not been processed correctly due to any runtime error) The
Email Engine considers the HTML format, by default. If the incoming message is in a
plain text format, Email Engine first checks for the HTML format and when not found,
considers the plain text format. But, if the incoming mail is in a plain text as well as HTML
format, the Email Engine only considers the HTML format. For the Email Engine to
consider the plain text format, change the HTML format to a plain text format (without any
spaces) or clear the HTML format.
Note
BMC recommends that you perform the rectification process individually on every error
out email message. Do not perform the rectification process on more than one email
message at the same time using the 'Modify All' option.
To copy the rectified incoming messages to the AR System Email Messages form
1. From the Message Information tab, change the status of the message to Yes.
2. Click on the Copy to AR System Email Messages Form button. After the rectified messages
are copied to the AR System Email Messages form, the Email Engine processes the
incoming actions at the next polling interval. However, if there are messages in the incoming
queue, the rectified messages are parsed at the next polling interval. Increase the time of
the polling interval, if you want to parse the rectified messages in spite of the messages in
the incoming queue.
The messages stored on the AR System Email Error Messages form, are not deleted even
after they are moved to the AR System Email Messages form. The administrator can
configure the period and the conditions for deleting these mails using the "Clean AR System
Email Error Messages" escalation.
Note
Note
4. To clean up the system logs, restart the BMC Remedy Email Engine.
All the messages in the AR System Email Error Messages form will be deleted depending
upon the conditions set in the escalation. For each message, this form provides the name of
the mailbox from which the message was generated, the message type, name and
organization of the mailbox owner; names of recipients sent to and copied; the text of the
message (in HTML, plain text format, or a combination of both); and (under a separate tab)
a list of any attachments included with the message.
Fields on the AR System Email Error Messages form
Field name Description
Message tab
Reply To Reply-to email address for the mailbox owner or administrator, if you plan to enable users to reply to notification
messages sent from this mailbox.
Organization For email clients that display an organization name, the name of the mailbox owner, or administrator's
organization.
To Email addresses for those who should receive outgoing messages from this mailbox.
CC Email addresses for those who should receive copies of outgoing messages from this mailbox.
BCC Email addresses for those who should receive blind copies of outgoing messages from this mailbox.
Priority Value to use in the email message to get the desired Microsoft Outlook priority. Numbers from 1 to 100 are
acceptable.
Attachments tab
Refresh Table Refreshes table after you have added, modified, or deleted an attachment.
Templates tab
AR System Server With qualification variables, name of the server on which the form resides.
AR System Server TCP With qualification variables, any access information necessary.
Port
AR System Server RPC With qualification variables, any access information necessary.
Number
AR System Form With qualification variables, name of the AR System form to which these values apply.
Attachment Alternatives Attachment pool enables you to add the content of your email as a plain text, HTML, or RTF
attachment, instead of typing it into the Body field in the Message tab.
Date Received The date on which the message was sent; this value is retrieved from the Date header of the incoming
message.
Date Sent The date on which the message was sent; applicable to outgoing messages only.
Execute/Send At The timestamp of when the incoming message was executed, or when the outgoing message was sent.
Parse Message The parsing status of the message; applicable to incoming messages only. The options and their meanings
are:
Errors tab
Enables users to view error messages if their email is not sent correctly.
Log Message Type If a request fails to submit, the original message is returned as an attachment.
Log Message Text If a request fails to submit, the error message that indicates the reason for the failure is returned.
Administrators can access this form from the Template form if an attachment is needed for a new
template. Users can access attachments from this form when they compose an email message.
Type Email or Template attachment. Used for storing attachments for both incoming and outgoing emails. It also
stores attachments for templates, such as a graphic for an HTML template.
File Name Enables users to view error messages if their email was not sent correctly.
(attachment
pool)
Warning
Because this information is used internally by the Email Engine, you should not create or
modify entries in this form.
Warning
Because this information is used internally by the Email Engine, you should not create or
modify entries in this form.
Warning
Because the information in this form is used internally by the Email Engine to store
instructions, you should not create or modify entries in this form.
For incoming messages, this information includes the association between the message and
any attachments included with the message.
For outgoing messages, this information includes associations for attachments that should
be included when the message is sent.
Unique ID.
Source type (email or template). If the source type is template, the form reflects the
association between a template and any attachments that should be included when that
template is used. An example is an HTML template with graphics that must be included to
make sure that the message is displayed correctly.
Source ID (the ID of the email or template).
Destination type (email attachment).
Destination ID (the ID of the attachment).
This association enables multiple emails to be associated with one attachment, or one email to be
associated with multiple attachments.
Warning
Because this information is used internally by the Email Engine, you should not create or
modify entries in this form.
In this topic:
Approval processes
An approval process is a set of rules and procedures, based on data, that enforce processes and
workflow to require the appropriate people to review, approve, and reject requests.
A process must have rules to make sure all required approvals occur, no erroneous
approvals occur, and sufficient authority is present to enable approval.
A process must have procedures to route an approved request to the next approver, to stop
routing a rejected request, and to notify a person when a response is required.
Every approval requires a process to obtain appropriate signatures. Business processes often
require the signatures of several people in one or more operational groups. Business processes
also need to allow for alternate approvers to cover days when the regular approvers are
unavailable.
A given request might require one simple approval process, or several processes that work with
each other. Often the appearance of a single operation involves multiple approvals. Some requests
must follow a process, but can be approved automatically based on certain criteria.
In Approval Server, an approval process is the set of rules and forms that generate data to
authorize specific BMC Remedy AR System workflow. An approval process consists of definitions
for the operation itself, rules that define what happens at each specific stage in the process, and a
place to store signatures. While process administrators need to understand these rules, they are
transparent to approvers. The types of rules and how they interact are described under Approval
rules (see page ).
The data generated by an approval process, such as the type of approval, approver signatures,
requests for more information, and time stamps for audit trails, is stored in the detail record and
other supporting forms. This enables you to track the approval process for auditing or
troubleshooting purposes. For more information about data, see Approval data and audit (see page
).
Approval roles
Three roles are involved in the approval process: those requesting approval (requesters), those
approving requests (approvers and alternate approvers), and process administrators who set up
and modify the BMC Remedy Approval Server configuration.
Most approval processes are transparent to requesters, who therefore do not need a thorough
understanding of Approval Server. This document is primarily written for approvers and process
administrators.
Requesters
Requesters are people who want something to be approved. Requesters work with an application
that starts an approval process by entering an approval request. Approval requests are routed to all
required approvers according to the rules of the approval process.
Approval Server allows requesters to enter approval requests, check the status of their requests,
and responds to More Information requests.
Approvers
Approvers are people who have the authority to approve, reject, reassign, hold, or provide
questions and comments for a request in a approval process.
The process administrator configures approvers for each process, so that each request has a
specified approver list. Different requesters can have different approver lists for the same process.
An approver list specifies the exact list of signatures required for a request. A signature can come
from an individual or from a business role containing multiple individuals, such as department
managers. Approval Server allows you to work with any combination of individuals and roles to
create the approver list for each process.
Approvers review outstanding requests that are assigned to them, and to take action on those
requests. Approver actions are performed using Approval Central, which is the Approval Server
console. (For more information, see Approval Central (see page ).) The actions approvers can
take include:
Approving
Rejecting
Reassigning
Holding
Requesting and responding to More Information Requests
Checking status
Approvers have access to the details of the request being processed as well as to the request
history. The history includes a list of all approvers who have responded to the request, and the
actions they took. Also, any comments that have been entered by other approvers are available for
review.
If approvers need to obtain more information before approving a request, they can send a More
Information request to any BMC Remedy AR System user. A More Information request is separate
from the approval request, but remains associated with it.
Alternate approvers
When an approver will not be available, such as during a business trip or vacation, the approver
can define an alternate approver who has the same authority within an approval process. An
alternate is someone who substitutes for the approver and acts with the approver's authority and
privileges for a duration of their choice.
Approvers can to set up any number of alternates. Each alternate can be set up to substitute within
one or more approval processes.
Process administrators
The process administrator is a user who has permission to carry out design and administration
tasks in Approval Server. Process administrators perform the following tasks:
Note
Approval Server process administrator is not the same as the BMC Remedy AR System
administrator. See Approval data and forms (see page ) for an explanation of the
process administrator's responsibilities.
The following topics provide information about approval forms, processes, rules, and fields:
The following topics provide information about the types of approval server data:
Because approval server processes are designed to implement business processes and rules, you
can use the following data (You must have BMC Remedy AR System Administrator permissions to
view the data) as an audit trail for any process that uses the approval server:
You can also use approval server logging to record data about all requests and responses, as well
as to track the configuration changes made by the process administrator or AR System
administrator. For information about how to activate approval server logging, see Working with the
AP-Administration form. (see page 626)
A set of standard forms and related workflow objects are installed along with approval server. Most
objects are named with the prefix "AP,". Sample application objects are named with either "AP-
Sample" or "AP-Sample2." The standard forms are described in more detail in Adding approvals to
an application (see page 2892) and Administration forms (see page ). This section introduces
some of the basic forms for ease of reference.
Approval Central
See Overview of Approval Central. (see page 1017)
Detail form
All data about an approval request are stored in the AP:Detail form. You can use this form to
determine the status of a request, and to see a history of activity on the request for any approval
process.
Signature form
All data about signatures associated with an approval request is stored in the AP:Signature form.
Administrators can use this form to review the responses to a request.
Note
Detail-Signature form
The AP:Detail-Signature join form joins data from the AP:Detail and AP:Signature forms. You link
this form to your application's approval request form to create a three-way join form when you add
approvals to your application.
For example, in the sample applications, the application request forms are AP-Sample2:Get
Agreement and AP-Sample:Lunch Scheduler.
For example, in the Get Agreement sample application the three-way join form is AP-Sample2:
Issue Detail Signat. It joins AP-Sample2:Get Agreement with AP:Detail-Signature.
See Creating the join forms (see page 2894). For general information about join forms, see Join
forms (see page 2306).
Note
If you change the status of a request from an application's three-way join form, the
change is not reflected immediately on Approval Central. Users must click on a link on
Approval Central or refresh the page to see the change. To make such a change visible
automatically, application developers must provide workflow that sends the refresh event
to the Approval Central form on the Modify or Close event of the three-way join form.
Without such workflow, the Approval Central form cannot know about changes to a
request, because the status change activity does not occur on the form.
For example, the Lunch Scheduler sample application uses the AP-Sample:Signature Authority
form.
Approval processes
An approval process is the routing of an approval request through a defined series of steps until
the process is done. The approval process requires signatures and is governed by approval server
rules and behavior. You can use approval server to automate any business process, and you can
customize the process to implement the operational guidelines of your organization. By using
approval server, you can make sure that any process follows well-defined rules, that the right
people are notified and the correct signatures are obtained, and that you can provide an audit trail
of requests and the decisions made by approvers.
An approval process defines the routing of any item that requires signatures. An approval
process can consist of many operations, transitions, and decision points, each contributing
toward a defined destination. The approval process ensures that all the necessary steps
take place to implement a business operation that requires signatures or approvals, such as
approving new hires or signing purchase orders. In each case, the overall process is the
same each time it is performed.
For more information about approval processes, see Approval process types (see page )
.
Approval rules augment the standard behavior of the approval server, and govern how an
approval request is handled at various stages of the approval process. You use rules to
retrieve and save approval data and to make decisions during the process, such as who the
next approver is, whether more signatures are needed, and whether the routing process is
complete.
For more information about approval rules, see Approval rules (see page ).
The following figure illustrates the five stages of any approval process. The approval server checks
for rules belonging to each stage during the approval process. Any given approval process does
not require rules in all five stages, but most approval processes include rules in at least the
approver response and Process Done stages.
Depending on the process design and the rules used, the approval cycle can include several
iterations of the next approver, approver response, and Completion Check stages.
Stage 1, Self Check — If the process includes either Auto Approval or Self Approval rules,
the approval server immediately applies them to determine whether the requester has
sufficient authority to approve his or her own request. If so, the approval process is done
and the approved request is returned to the requester.
Stage 2, Next Approver (routing) — If no Auto Approval or Self Approval rules are included
in the process, or if the Self Check stage determines that the request must be routed to an
approver, the Next Approver stage begins. For most process types, the approval server
applies one or more next approver rules to start a cycle of identifying people who need to
approve the request. (The exception to this is the Ad Hoc process type, as explained in
Approval process types (see page ).) The Next Approver stage is repeated until all
approvers have received the request.
Stage 3, Approver Response — In this stage of the process, approvers either approve or
reject an approval request. This action completes the signature line for that approver. If an
approver approves the request, the approval process continues. If an approver rejects the
request, the approval process is usually done. (You can override this behavior with
Signature Accumulator and Statistical Override rules).
The Approver Response stage is repeated as necessary, and is closely integrated with the
Completion Check stage.
Stage 4, Completion Check — The Completion Check stage accepts the results of the
Approver Response stage, and checks to see if the routing of a request is complete. Routing
is complete if all required approvers have received the request, whether they have
responded. If all required approvers have not received the request, the process returns to
the Next Approver stage.
The Completion Check stage is repeated as necessary until the Completion Check passes.
Stage 5, Process Done — The approval process is done when the request is approved by
all (or enough) required approvers, or when it is rejected. This stage is also done if an error
state is recorded or if the request is cancelled. During this stage, the approval server
determines whether the approval was successful, and takes appropriate action, such as
delivering a notification of the completed request to the requester.
Note
The difference between "complete" and "done" is important. When a request is complete,
it has been routed to all approvers. Even when routing is complete, all required approvers
have not necessarily responded. The request is done when all required approvers have
approved or rejected the request.
For an example of each process type, examine the sample applications installed with approval
server. For information about how to create, modify, and delete processes, see Defining an
approval process (see page ). For information about rules and how they are used with each
process type, see Approval rules (see page ). For information about creating rules, see
Defining approval rules (see page ).
Parent-Child process
The Parent-Child process type uses the relationships between requesters and approvers, and
between approvers and other approvers, in conjunction with a Get Next Approver rule, to
determine the routing of an approval request. You define these relationships in a signature
authority form.
The Management Cost Authorization process in the Lunch Scheduler sample application is an
example of a Parent-Child rule. It uses the Manager Login Name field on the AP-Sample:Signature
Authority form to define the "parent" login name of each sample user.
In a process where each approver has a defined relationship to the next approver, such as
employee to manager and manager to director, the most appropriate process type is usually
Parent-Child. In this type of process, the approval request is routed up an approval hierarchy from
the "child" (requester or previous approver with lower authority) to the "parent" (approver with
higher authority). A manager-employee relationship is often the hierarchy represented with a
Parent-Child approval process.
The following figure illustrates an example Parent-Child process, in which an engineering change
Parent-Child hierarchy
(Click the image to expand it.)
In a Parent-Child process, the approval server automatically routes the request to the next
approver according to the defined relationship. Persons represented by "X" in the diagram do not
receive the approval request because they do not have parent relationships with the requester or
any approvers.
A rejection from any approver rejects the request for everyone in the hierarchy. This is also true if
the process uses two or more separate approval hierarchies. Process administrators can configure
notifications to inform all approvers when any other approver has rejected a request.
The following considerations apply to a Parent-Child process:
A Parent-Child process requires a Get Next Approver rule that defines how to find the next
approver. This rule must include the name of the field containing the identity of the parent
and must return the Approver List, which is a string of individuals or roles. See Defining Get
Next Approver rules (see page ).
When an approver marks an approval request as approved, the approval server
automatically checks for the parent of that approver and, if one is found, routes the request
to that person.
When it generates the first Approver List for a Parent-Child process, the approval server
assumes that the "previous" approver is the originator of the approval request (the
requester). This means that the parent of the requester becomes the first approver.
Level process
The Level process type uses a hierarchical set of organizational levels, in conjunction with a Get
Next Approver rule, to determine the routing of an approval request. The process administrator
defines the organizational levels and their members in a signature authority form.
The Major Account Level Approval process in the Lunch Scheduler sample application is an
example of a Level process. It uses the Account Approval Level field of the AP-Sample:Signature
Authority form to define organizational levels and the sample users who belong to them.
If anyone in a certain organizational position, such as a job level, can approve a request, the Level
process type is often the best fit. In a Level process, the approval server delivers the request to all
approvers in the next level. When the defined number of approvers in any level have approved the
request, the approval server routes the request to the next level.
The following figure illustrates a request for a soft drink machine to be placed in a company
courtyard. The request must be approved by the refreshment, landscape, and maintenance
committees. The Level process defines the order in which the committees see the request.
In a Level process, a request must be approved by at least one approver in each level before it
passes to the next level. The approvers for a given level can consist of individuals or roles. A Level
process does not dictate the number of approvers on each level. You can set up routing to the next
level to require signatures from any number of individuals in each level. For information about
configuring roles, see Defining roles (see page ).
A Level process uses a level value to indicate the position of individuals or roles. The approval
server uses the value in the level field to determine an approval sequence, starting with level 0.
The highest level is 1000. The approval server skips over unused levels.
The following considerations apply to a Level process:
A Level process requires a Get Next Approver rule that defines how to find the next
approver. This rule must identify the name of the field containing the level identifier, and
must return two values: a level indicator, and a string of individuals or roles. See Defining
Get Next Approver rules (see page ).
The process rules must be configured to determine whether a request should be routed to
more than one person in each level.
Ad Hoc process
In an Ad Hoc process, no Get Next Approver rule is used, and the process administrator does not
define approver or organizational relationships. Instead, the requester and the approvers designate
the next approver or a set of approvers while working with the request. The requester enters at
least one approver when creating the request. Approvers can add additional approvers when they
respond to the request.
The Issue Approval process in the Get Agreement sample application is an example of an Ad Hoc
process.
Note
An Ad Hoc process is not the same as an ad hoc override. Ad hoc overrides allow
specific approvers to alter a predetermined routing. An Ad Hoc process includes no
predetermined routing. See Get next approver manually (see page 1602).
When entering approvers, users must enter the exact AR System login ID of the next approver. To
prevent typographical errors and allow users to select from a list, the AR System administrator
must construct field menus that contain the appropriate approvers for an Ad Hoc process. See
Working with menus (see page 2442).
Rule-Based process
The Parent-Child, Level, and Ad Hoc process types are partially preconfigured and, therefore, are
relatively simple to implement. A Rule-Based process is similar to a Parent-Child process, except
that a Rule-Based process relies on rules that you create to define the relationships between
approvers. This option enables you to define a routing method that allows more complexity than
predefined relationships. However, a Rule-Based process requires more thought and work to
implement.
The Special Overdue Approval process in the Lunch Scheduler sample application is an example
of a Rule-Based process.
Parent- Hierarchy of individuals. The process Get Next Approver and Parameterized Get Next Approver rules
Child administrator defines the relationships between determine the relationship of the next approver to the current
individuals. owner.
Level Hierarchy of organizations. The process Get Next Approver and Parameterized Get Next Approver rules
administrator defines the levels and their determine the next level and approvers.
members.
Rule- Custom, as determined by the process Determined by the Process Administrator. Parameterized Get Next
Based administrator. Approver rules can add approvers.
One Must Sign — Creates a single signature entry for all the relevant approvers. Only one
of the approvers needs to take action.
All Must Sign — Creates a separate signature entry for each approver. All approvers must
take action for the request to proceed further.
(Process-level only ) Allow Only One Approver — Creates a single signature entry for an
approver. If a requester specifies multiple approvers for a request, the approval server
returns an error.
How the action date for a Parent-Child or Level process is calculated (see page 1597)
How the action date for an Ad Hoc process is calculated (see page 1598)
Each approval server process and signature can be associated with an action date . The action
date enables approvers to know in advance the duration within which to take action on requests
assigned to them. Process administrators can use this value to determine whether a process is on
track or needs intervention (automatic or manual). This helps in addressing requests and driving
them to completion in a timely manner. The action date is based on the Automatic Action interval
defined for a process. For more information, see Approval Central (see page 1707).
The action date is calculated by using the following fields on the tabs of AP:Process Definition:
Configuration — Process Due, Signature Due, Buffer Period, and Enable Preview
Signature Escalations — Automatic Action and Notification (First) intervals
Applications can override the Process Due interval by directly passing the desired Process Due
Date as a parameter of the New-Details command. For more information, see BMC Remedy
Approval Server application commands (see page 2796).
The action dates for processes and signatures are stored in the following fields:
Note
Using Enable Preview to determine the action date might increase the processing time for
a new request due to the steps required to retrieve the list of future approvers.
When working with notifications and escalations, make sure that the appropriate notification and
escalation types on AP:Admin-ServerSettings are enabled.
If Enable Preview is set to Yes, the total number of approvals in the process is calculated by
fetching the future approvers with the help of the Preview feature. The effective Signature Due
period is calculated as follows:
This value is then compared with the one specified in the Signature Due field, and the minimum of
the two is considered.
If no value is entered in the Signature Due field, the derived signatureDue is used for further
computation.
For more information, see Creating signature escalations (see page 1615).
The value of Enable Preview is ignored, because the ad hoc nature of the process makes it
impossible to identify the future approvers.
For more information, see Creating signature escalations (see page 1615).
Approval rules
The Approval Server includes the rule types that are used in various stages of an approval
process. A given process does not usually include all types of rules, and some do not include all
process stages.
This section introduces the rule types included with the approval server, and describes how they
function in the approval process. The following figure illustrates how each rule type fits into the
overall approval process.
The Approval Server uses the Self Check stage of an approval process to prevent unnecessary
routing. Rule types that you can use in the Self Check stage include:
Auto Approval
Get Authority or Get Authority Self
Self Approval
The Auto Approval and Self Approval rule types use different methods to determine whether the
requester has sufficient authority to approve his or her own request. The Get Authority and Get
Authority Self rules gather data to be used by the Self Approval rule.
For example, if an Auto Approval rule says that everyone in the company can be reimbursed for a
business lunch up to $40, and Frank requests approval for a $25 lunch, the Auto Approval
condition is met and the approval server uses the Auto Approval rule to automatically approve
Frank's request.
The Management Cost Authorization process of the Lunch Scheduler sample application contains
an example of an Auto Approval rule. To create an Auto Approval rule, see Defining Auto Approval
rules (see page ).
The difference between Get Authority and Get Authority Self rules is in when they run during the
approval process. The approval server runs Get Authority rules during both the Self Check stage
and the Completion Check stage of the approval process. It runs Get Authority Self rules only in
the Self Check stage. You determine which rule type to use based on the data you need to gather
in each stage of the approval process.
You can use a combination of get authority rule types in a process that requires more than one
type of get authority check. For example, a company's business rules might require one set of self
approval levels for expenses (such as $100 for regular employees, $200 for managers and above),
but another set of approval limits for major purchases (such as up to $5000 for managers and
higher expenses requiring three approvers including a Vice President). A process to support these
business rules would include two different signature authority forms. A Get Authority Self rule
would support the Self Approval rule, and a Get Authority rule would support the Get Next
Approver rules.
The Cost Get Approval Authority rule in the Lunch Scheduler sample application is an example of a
Get Authority rule. To create Get Authority rules, see Defining all Get Authority rules (see page )
.
Note
A third type of get authority rule, called Get Authority Regular, is performed only during
completion processing. See Get Authority and Get Authority Regular rules (see page )
.
The following is an example of a self approval rule: If Frank requests approval for a $50 business
lunch, the condition of the $40 Auto Approval rule is not met. In this case, the Self Check stage
continues with a Get Authority or Get Authority Self rule to collect Frank's employee status. The
data gathered shows that Frank has authority to approve lunches up to $100. The Self Approval
rule uses this data to test whether Frank has authority to approve his own $50 lunch.
The Cost Approve for Myself rule in the Lunch Scheduler sample application is an example of a
Self Approval rule. To create a Self Approval rule, see Defining Self Approval rules (see page ).
In the Next Approver stage, the approval server determines to whom the request must be routed
next and creates the appropriate electronic signature lines. Depending on the process type and the
rules it contains, the approval server can automatically determine the next approver, or allow the
current approver to select the next approver. If the next approver is a role, more than one individual
can be eligible to sign one signature line. In this case, the first role member who responds
determines the outcome for that signature line. See Defining roles (see page ).
The sample applications contain the following examples of Get Next Approver rules, in each type of
process where these rules are used:
Cost Get Next Approver, in the Management Cost Authorization process (a Parent-Child
process)
Level Get Next Level, in the Major Account Level Approval process (a Level process)
Overdue Assign Approvers, in the Special Overdue Approval process (a Rule-Based
process)
To create a Get Next Approver rule, see Defining Get Next Approver rules (see page ).
An Ad Hoc process, which requires all approvers to be added by the users, as described in
Ad Hoc process (see page 1595).
An ad hoc override, in which you configure the process to allow approvers to alter the
predetermined routing. This is controlled by the Allow Ad Hoc Next Approver? field on the
Basic tab of the Process Definition form. See Creating a process (see page ).
A Parameterized Get Next Approver rule, which works together with the preview feature and
an application command to pass run-time variables to the approval server.
When the process allows users to add approvers, use a Validate Approver rule to verify the added
approver against a list of valid approvers.
The Parameterized Get Next Approver rule works exactly like a Get Next Approver rule, with the
following exceptions:
Run-time variables can be part of the qualification and Set Fields operations.
Approvers can be added to any level, not just the next level.
After any Get Next Approver rules are executed, the server executes all Parameterized Get Next
Approver rules. If a Parameterized Get Next Approver rule exists, but the current record does not
have any parameters, the rule is skipped.
To create a Parameterized Get Next Approver rule, see Defining Parameterized Get Next Approver
rules (see page ).
Validate Approver rules
The approval server uses Validate Approver rules to protect against inappropriate ad hoc
assignments. If the test to validate the approver fails, the user assigning the invalid approver
receives an error and must correct it before the request can proceed.
The Issue Validate Approvers rule in the Get Agreement sample application is an example of
Validate Approver rules. To create a Validate Approver rule, see Defining Validate Approver rules
(see page ).
The following figure illustrates how rules and ad hoc approver entries are used in the Next
Approver stage of an approval process.
Note
When a request enters the Approver Response stage of the approval process, the Approval Status
for the next approver's signature is "Pending." The approver can approve or reject the request,
request more information, or place a request on hold. When an approver responds in one of these
ways, the signature line for that approver is changed to Approved, Rejected, Hold, or More
Information.
The Approval Server sets the signature value automatically, depending on the approver's
response. You do not have to define a rule to implement this behavior. By default, the approver's
response determines whether the request passes into the Completion Check stage, or remains in
the Approver Response stage.
Approved — When an approver approves a request, the request passes to the Completion
Check stage, where the approval server determines whether more signatures are required.
See Completion Check stage (see page 1608).
Rejected — If an approver rejects a request, the request moves to the Process Done stage.
No more routing occurs, and the request is withdrawn from approvers who have placed the
request on hold or requested more information.
Hold — When an approver places a request on hold, the approval server changes the
signature line to Hold, but no other action occurs. Process administrators should establish
escalations to prevent requests in Hold status from being neglected indefinitely.
More information — If an approver requests more information, the approval server changes
the approval status to More Information, but no other action occurs within the approval
processing for that approver. The approval server allows an approver to hold, approve, or
reject a request without waiting for the More Information response. When this occurs, the
More Information request is terminated.
You can override the default behavior of the approval server in this stage. To do so, you use the
following rule types:
Signature Accumulator
Statistical Override
Signature Accumulator and Statistical Override rules can use ratios between approved and
rejected signatures to determine the outcome of a process. These rules preempt the usual routing
to bring the approval process to a conclusion based on statistics that you define. These two rule
types are also known collectively as "statistical decision-making rules."
An example of a statistical decision making rule is: "If more than 50% of the approvers approve the
request, then approve the process." With this rule in place, if the approval request has a list of five
approvers, and the first two approvers reject the request, the remaining approvers are still given a
chance to approve it. If the last three approvers approve the request, the request is approved
overall.
Signature Accumulator and Statistical Override rules run during the Approver Response stage
(whenever an approver responds to a request). If any Statistical Override rules are defined, then
the statistical decision-making approval process begins. If no Statistical Override rules exist, the
approval server follows its default logic, and the request moves to the Completion Check or
Process Done stage.
A Signature Accumulator rule collects statistical information about the signature records associated
with an approval process, for use in a Statistical Override rule. You define the criteria for counting
signatures.
In a Level process, only signatures associated with the current level are included in the set. These
are referred to as "current signature records." In all other process types, all signatures associated
For each signature record, the approval server applies each existing Signature Accumulator rule,
provided the Run If qualification passes. For example, if the approval server finds four signatures to
check, the server runs all the Signature Accumulator rules on the first signature, then on the
second signature, and so on until all the signatures are finished.
Examples of Signature Accumulator rules are included in the sample applications. They are Issue
Increment Signature Limit and Issue Retrieve Signature Limit, in the Get Agreement Sample
application. For information about using these examples, see Example of decision-making rules in
a sample application (see page 1649). To create a Signature Accumulator rule, see Defining
Signature Accumulator rules (see page ).
A Statistical Override rule preempts the default behavior of the approval process and causes the
process to be approved or rejected before all pending signatures have been completed. To do so,
the rules check whether the statistical conditions required for making a decision have been
satisfied.
Statistical Override rules can perform one of three actions: approve, reject, or do nothing. If a
Statistical Override rule approves or rejects a request, the request is done and moves to the
Process Done stage. If the conditions for approving or rejecting are not met, the process continues
the default behavior of checking for more signatures to gather.
When the Statistical Override rule approves or rejects a request, the normal approval process is
preempted by performing the following actions:
Level Only signatures for Preempts the approval server to proceed to Preempts the approval server to reject the
the current level the next level. request and stop the processing.
Parent- All signatures, at all Preempts the approval server to proceed to Preempts the approval server to reject the
Child times proceed to next parent. request and stop the processing.
Ad Hoc All signatures, at all Preempts the approval server to approve Preempts the approval server to reject the
times the request. request and stop the processing.
Rule- All signatures, at all Preempts the approval server to proceed to Preempts the approval server to reject the
Based times the next set of approvers. request and stop the processing.
Warning
If you define Statistical Override rules, you must also define a rule to approve or reject the
process if no pending signatures exist. If a rule is not defined to handle this condition, the
approval server considers this as an error condition.
The following figure illustrates how the approval server uses both types of statistical decision-
making rules in the Approver Response stage.
Statistical Override rules evaluate the data gathered for the active signature record by a Signature
Accumulator rule or by the approval server. If the Statistical Override rules can be based solely on
the statistical data that the approval server gathers by default, you do not need to define a
Signature Accumulator rule.
Total Signatures
Total Approved
Total Rejected
Total Pending
Total Hold
Total More Information
Total Canceled
Total Closed
Total Error
Examples of Statistical Override rules are included in the sample applications. They are Issue
Statistical Approval and Issue Statistical Boundary Condition in the Get Agreement Sample
application.
For information about using these examples, see Example of decision-making rules in a sample
application (see page 1649).
To create Statistical Override rules, see Defining Statistical Override rules (see page ).
The Completion Check stage of an approval process determines whether conditions exist to stop
routing a request to additional approvers. If a completion check is successful, routing stops and no
additional approvers will see the request.
Get Authority
Get Authority Regular
Completion rule
Like Get Authority rules, Get Authority Regular rules collect data that is used by the Completion
rule. The approval server runs Get Authority Regular rules only during the Completion Check stage
of an approval process.
Completion rules
Completion rules test whether sufficient authorization exists to stop routing an approval request. A
process is complete when the approval server has routed the request to all required approvers
even if they have not yet all responded.
No Completion— If the Completion rule condition is not met, the Get Next Approver rules
are performed and the request is routed to the next approver. If no new approvers are found
by the Get Next Approver rules, the approval server checks the Approval Success field of
the Process Definition form.
If this field is set to No More Approvers, the process is done with a status of
Approved.
If the Approval Success field is set to Completion Rule, the process is done with an
error state, because no more approvers exist and no Completion rule has succeeded.
Successful Completion — If the Completion rule condition is met, the request is not routed
to any further approvers. If outstanding signatures exist when the routing Completion rules
are fulfilled, the request remains active until either all approvers approve or one rejects the
request.
A process that requires a fixed number of signatures will complete successfully when the process
exhausts the Approver List. For example, you can create a process that completes routing when
any five approvers respond, instead of completing with one approver of a specific authority.
Alternatively, the same request might require signatures from two steps up the management
hierarchy. When Frank's manager and his manager's manager have approved the request, no
more approvers are required, and the process is complete. In this case, the Completion rule uses
data gathered by a Get Authority rule to test the approver relationships.
The Cost Completion and Level Completion rules in the Lunch Scheduler sample application are
further examples of Completion rules. For information about creating a Completion rule, see
Defining Completion rules (see page ). The following figure illustrates how the approval server
uses the Completion, Get Authority, and Get Authority Regular rule types during the Completion
Check stage.
The sample applications contain many examples of Approval Process Done rules, including, for
example, Cost Approved, Cost Rejected, Issue Approved, and Issue Rejected. To create an
Approval Process Done rule, see Defining Approval Process Done rules (see page ).
Chained processes
You can initiate a new approval process automatically when the first process is done.
For example, if a manager approves a new computer purchase, the IT department can start
another chained approval process that determines the exact model of computer to buy.
For a description of chained processes in the Lunch Scheduler application, see Chaining approval
processes (see page ).
Approver fields
This topic contains information about how the Approval Server manages the sizes of approver
fields and a utility that is used for this purpose.
13207 Approvers
AP:Signature
AP:PreviewSignatures
AP:PreviewInfo
You can increase the length of these fields to the maximum limit permitted by the database (
VARCHAR limit) by manually executing a approval server utility. See Approval Change Schema
(see page 1612).
Note
In release 7.5.00, the approval server only checks the size of the Approvers field at
startup, and enforces this length as the maximum limit for approver names. If the default
limits are insufficient, you need to increase the field lengths manually.
Microsoft 8000
SQL Server
Note: Even though the VARCHAR limit on SQL Server is 8000 characters, the Approval Change Schema utility
sets the field length to 4000 characters to support Unicode.
Oracle 4000
To use longer approver names with previews, make the following changes:
For regular previews, increase the length of the Approvers and Original Approvers fields on
AP:PreviewSignatures.
For real-time previews, increase the length of the Approvers field on AP:PreviewInfo.
chgschema
-x Server
-u User
[-p Password] [-t TCP Port]
[-r RPC Port] [-a Authentication String]
The following table describes the parameters that administrators need to supply when running the
chgschema utility:
Parameter Description
-x (mandatory) Name or IP address of the BMC Remedy AR System server to log into (or localhost, if applicable).
-u (mandatory) Specify the BMC Remedy AR System user name. This user must belong to an administrator group,
otherwise the utility can not be run successfully, and the following error is displayed at the command prompt and
written to approval-utils.log:
Admin verification failed: <userName>
-p (optional) Specify the password for the aforementioned user. Omit this parameter if the user account does not have
a password.
-t (optional) TCP port number of the server being logged into. This parameter is required if the BMC Remedy AR
System server is configured to listen on a particular TCP port.
-r (optional) RPC port number of the server being logged into. This parameter is required if the BMC Remedy AR
System server is configured to listen on a particular RPC port.
Note
The chgschema utility increases the lengths of the approver fields provided that
the current lengths are not already set to the maximum VARCHAR limit, or to
unrestricted or 0 (zero). In case of the Member List field, if the maximum length
supported by the database is less than 512 characters, the current field length is
not modified. This ensures that the corresponding data remains intact.
After running the utility, you must restart the approval server for the changes to
take effect.
View — Opens the AP:Process Definition form for the selected rule in Modify mode. You
must select a process from the list to use this button. Use this option to view and modify
existing processes.
Search — Opens a blank AP:Process Definition form in Search mode. Use this option to
search for a process using a field that does not appear in the processes list.
Create — Opens the AP:Process Definition form in New mode. Use this option to create a
new process.
Delete — Deletes the selected process. You must select a process from the list to use this
button.
Refresh — Refreshes the current list of processes. Use this button to refresh the list, for
example, after adding a new process.
Creating a process
This section contains information about:
To create a new process, click Create on the Process tab of the AP:Administration form. This
opens the AP:Process Definition form in New mode.
For more information, see AP-Process Definition form (see page 1689).
Basic — Use this tab to define basic information about the process, including the process
name and type, the associated form, and approval success criteria.
Configuration — Use this tab to specify:
Process intervals to calculate the Action Date for a request
Menus to generate lists of users that appear when creating a More Information
request (by adding a question or comment), reassigning a request, and assigning a
request to an ad hoc approver
The mandate for rejection justification and the application form's field on which to
push an approver's input
Signature Escalations (Normal, Urgent, and Low)--Use these tabs to schedule notifications
and automatic actions for pending requests.
More Info Escalations — Use this tab to schedule notifications for requests in the More
Information state.
Administrative Info — The fields on this tab contain the change history and help text (if any)
for the process. Use the Help Text field to document the process.
In most cases, you need only one process for your approval request, but it is possible to create
multiple processes. For an example of an application that uses three separate approval processes,
see the Sample Lunch Scheduler form that is described in Sample process descriptions (see page
).
Note
Before you can create a process, the approval request form that you link your process to
must exist on the AR System server, and must appear in the list of forms on the Form tab
of AP:Administration. To link the approval request form for your application to the
approval server, see Adding the approval request form to the approval server (see page
2898).
1. Open the Process Definition form if it is not already open. See Creating a process (see page
).
2. On the More Info Escalations tab, select or enter the names of the business calendar and
the holiday calendar you want to use for More Information Escalation notifications.
These names must match existing schedule names from the Business Time Workdays or
Business Time Holidays forms. For information about setting up business times, see the
Defining business schedules using Business Time (see page 1359).
3. If you want to send notifications when a signature line has been outstanding (in any state)
for too long, specify the Notifications: Still Outstanding parameters:
a. Enter a number in the First Interval field to indicate when you want the first
notification sent, and select the item that this number represents for the Unit list.
For example, if you want the first notification sent two days after the approval request
enters the More Information state, enter a 2 in the First Interval field and select Days
from the Unit list.
b. If you want a second notification, enter a number in the Repeat Interval field and
select the item that this number represents from the Unit list.
4. Click Save.
Scenario:
After an employee submits his expenses in the Expense Management System, the manager is
notified. The request status is set to Submitted.
The desired approval schedule is two days. This must include only business working days and
exclude weekends and holidays. If a request is submitted on a Friday, the manager is expected to
approve the request by the following Monday. If Monday happens to be a holiday, the manager can
approve the request by Tuesday. These calculations are based on the organization's business
calendar and holiday calendar.
In addition, you can set the time past which the request will change its status automatically. In our
example, the status is set to Approved. If the approval request is outstanding for more than two
days, the request is auto-approved and employees will be reimbursed their expenses.
The primary feature of signature escalations is notifying the approver about the outstanding
approval. This can be implemented in the following situations:
The interval when the submitted request is auto-approved is considerably long. For
example, if the time when the request is auto-approved is 10 days, you would want to keep
notifying the manager until that time.
The changed state is set to a status between Submitted and Approved statuses. For
example, if the approval request is outstanding, the status is set to pending after two days.
The manager is kept notified about the pending request.
Auto-approval is not implemented. All approvals require express approval from the
manager.
Successive notifications can be set at the frequency based on the first notification. If the first
interval is set to 3 days, the manager receives the first notification on Wednesday for the request
submitted on Friday last. If we set the repeat frequency to 1 day, the manager receives the second
notification on day 4 (Thursday), the third on day 5 (Friday), and so on.
The notification feature can be set to include various conditions prior to approval or completion,
such as:
pending action
error or invalid state
process put on hold
when requesting more information
The following procedure applies to all the priority levels that are associated with a request: Normal,
Urgent, or Low.
1. Open the Process Definition form if it is not already open. See Creating a process (see page
).
2. On the Basic tab, select a process from the list and click View.
3. Open the tab for the appropriate priority level:
Signature Escalations (Normal)
Signature Escalations (Urgent)
Signature Escalations (Low)
Note
4. Select or enter the names of the business calendar and the holiday calendar you want to
use for signature escalation notifications.
These names must match existing schedule names from the Business Time Workdays or
Business Time Holidays forms. For information about configuring business times, see
Defining business schedules using Business Time (see page 1359).
5. To change the state of an approval request automatically if no signature action occurs after
a specified interval, enter the Automatic Action parameters:
a. Enter a number in the After Interval field to indicate when you want the state
changed, and select the item that this number represents from the Unit list.
For example, if you want the state to change two days after the approval request
enters a certain state, enter 2 in the After Interval field, and select Days from the Unit
list.
b. In the Change State field, use the drop-down list to select the state that you want to
apply to the approval request.
The options are Pending, Approved, or Rejected.
If you set these parameters, approvers can see the resulting date and time after
which the state of the approval request changes automatically. This is shown on AP:
Show-Detail > Action Date field and Approval Central > Action Date column. For
more information, see AP-Show-Detail form (see page 1724) and Approval Central
(see page ).
6. To send notifications when a signature line has been outstanding (in any state) for too long,
specify the Notification: Still <OutstandingState> parameters. For example, If a signature
line has been outstanding in Pending state for too long then specify the Notification: Still
Pending parameters.
a. Enter a number in the First Interval field to indicate when you want the first
notification sent, and select the item that this number represents from the Unit list.
b. If you want a second notification sent, enter a number in the Repeat Interval field and
select the item that this number represents from the Unit list.
This is shown on the Approval Central > Past Due requests > Action Date column.
For more information, see Approval Central (see page ).
7. If you want to send notifications when the approval request remains in a certain state
(Pending, Error, Hold, or More Information) too long, specify the Notification: Still <in State>
parameters. For example, if a signature line has been outstanding in Hold state for too long
then specify the Notification: Still Hold parameters.
a.
BMC Remedy Action Request System 9.1 Page 1617 of 4703
BMC Software Confidential. BladeLogic Confidential.
a. Enter a number in the First Interval field to choose the state that indicates when you
want the first notification sent, and select the item that this number represents from
the Unit list.
b. If you want a second notification sent, enter a number in the appropriate Repeat
Interval field and select the item that this number represents from the Unit list.
To create a process
The following figure depicts the basic process definition for the sample Management Cost
Authorization process.
Note
The Process Due interval is required for the action date feature. If this field is left
blank, no action date is associated with the process or its corresponding requests.
3. Enter a number in the Signature Due field, and select the item that this number represents
from the Unit list.
For example, if you want every signature to be due in two days, enter 2 in the Interval field,
and select Days from the Unit list.
4. Enter a number in the Buffer Period field, and select the item that this number represents
from the Unit list.
This value is used as a delta to be deducted from all other intervals, except Signature Due,
to derive the minimum of all the required process intervals.
5. In the Enable Preview field, select Yes if you want to consider future approvers when
calculating the Signature Due date. Select No if you want if you want to use the value in the
Signature Due field only.
6. Click Save.
Besides these process intervals, you also need to specify certain values in the Signature Escalation
tabs and on the AP:Notification and AP:Admin-ServerSettings forms.
1. Open the AP:Administration form. See Working with the AP-Administration form (see page
626).
2.
BMC Remedy Action Request System 9.1 Page 1619 of 4703
BMC Software Confidential. BladeLogic Confidential.
To delete a process
Note
The delete operation is permanent and cannot be undone. When you delete a process, all
of its associated rules are deactivated.
Note
If you want to rename an approval process or an approval form, you can apply the new
process or form name to all existing requests in the process, or only to active requests.
If you want to rename a process or approval form, you must also edit any related
workflow, such as the filter that starts the process, to correct the process name.
Note
If you leave the Scope of Update field blank, approval server considers All
Requests to be the default value.
7. To change the name of the process or object as well as the related requests, the Including
Object Itself check box must be selected.
If you have already manually changed the process or form name, clear this check box. In
this case, BMC Remedy AR System renames only the related requests, you must enter the
current process or form name in the field labeled "Enter new process name" or "Enter new
form name."
8. Click Rename to complete the action.
Defining roles
The approval server can route a request to a role instead of to an individual. When you route to a
role, the request is routed to all members of the role. You specify whether one member of the role
can approve a request or whether all members must approve it.
The Overdue Oversight role is an example of the use of roles in the Lunch Scheduler sample
application. This rule works with the Rule-Based process to route approvals for an overdue account
to the members of the Overdue Oversight role.
To define a role
1. Open the AP:Administration form. See Working with the AP-Administration form (see page
626).
2. On the Role tab, click Create.
Defining an approver role
3. In the AP:Role form, enter a Role Name in the Role Name field.
The name should be descriptive of a job or a responsibility, for example, MIS Management.
4. Select an option from the If Multiple Approvers list.
This determines how many signature line records the approval server creates for the role
when building an Approver List.
The options are:
One Must Sign — This option creates a single signature line record for the role. The
signature line is complete when one of the members of the role acts upon the
approval request.
All Must Sign (default) — This option creates a separate signature line for each
member of the role.
This option is overridden when the If Multiple Approver setting for the process is
defined as One Must Sign. When this is the case, the role follows the One Must Sign
process setting. See Creating a process (see page ).
Note
If you include a role in the member list of another role, the If Multiple
Approvers option of the parent role will take precedence. For example,
suppose that Role A is defined with If Multiple Approvers set to All must sign
and you include Role A in the member list of Role B. Role B is defined with
If Multiple Approvers set to One must sign. In this example, the approval
server uses the settings for Role B.
that filter the list for each rule type. For example, to see a list of all existing Get Next Approver
rules, click the Next Approver link on the diagram.
To see only the rules for a specific process, select the process from the menu in the Show for
Process field.
View — Opens the AP:Rule Definition form for the selected rule in Modify mode. You must
select a rule from the list to use this option to view and modify existing rules.
Search — Opens a blank AP:Rule Definition form in Search mode. Use this option if you
want to search for a rule using a field that does not appear in the rules list.
Create — Opens the AP:Rule Definition form in New mode. Use this option to create a new
rule.
Delete — Deletes the selected rule. You must select a rule from the list to use this option.
Refresh — Refreshes the current list of rules. Use this option to refresh the list, for example,
after adding a new rule.
Show all — Refreshes the list of rules with all existing rules. Use this option to refresh the
list after narrowing it to show only one type of rule.
Creating a rule
This section contains information about:
Using the Basic tab on the Rule Definition form (see page 1625)
Using the Set Fields tab on the Rule Definition form (see page 1626)
To create a new rule, click Create on the Rule tab of the AP:Administration form. This opens the
AP:Rule Definition form in New mode.
Note
To create a rule, you must first create the process that the rule will support. See Defining
an approval process (see page ).
AP:Rule Definition consists of three tabbed views (depending on the type of rule):
Basic — The fields on this tab store identification and execution information about the rule,
as well as a Run If qualification statement, if any.
Set Fields — For rules that include a Set Fields action, the fields on this tab specify the
action to be executed by the rule when a transaction passes the qualification statement.
Administrative Information — The fields on this tab contain change history and help text (if
any) for the rule. Use the help text field to describe the purpose of the rule, or any other
information helpful to process administrators.
To complete the fields on the Basic tab that are common to all rules
6.
BMC Remedy Action Request System 9.1 Page 1625 of 4703
BMC Software Confidential. BladeLogic Confidential.
6. In the Status field, select either Active or Inactive. The default value is Active.
Inactive rules do not run when the process runs. While you are developing a set of rules for
a process, it might be helpful to use the Inactive status. When you are ready to test your
rules, change the Status field to Active.
Note
If you save a rule with the Status field empty, the rule is saved as Active.
7. In the Assignee Group Permissions field, the Public group appears by default. If you use this
field for multi-tenancy support, create workflow to populate this field with the correct
assignee group name. You do not need to change this setting when creating the rule.
The approval server supports multi-tenancy for use by application service providers. The
Assignee Group Permissions field is field 112, and appears on all the approval server forms.
The field 112 value from records created in the AP:Details form is used automatically in all
the other approval server forms, for example, AP:Signature, AP:More Information, and so
on.
8. If the rule requires a qualifying condition to control execution, enter the condition in the
Qualification area of the Basic tab. This field is labeled "Rule" or "Run If," depending on the
rule type. Process Done rules use a radio button field to set the execution condition.
You can type the condition statement or you can build it by using the qualification bar and
list. When the qualification is met, the rule actions execute. You can use currency, date, and
time fields in Run If and Rule qualification statements.
For more information, see the Security administration (see page ). For specific examples
pertaining to various rule types, see the discussion of each rule type in this section.
9. Click Save.
When you construct assignments using the Set Fields tab, you can also use currency, date, and
time fields, currency functions such as CURRCONVERT, CURRSETDATE, CURRSETTYPE, or
CURRESETVAL, and date functions such as DATEDIFF, DATENAME, DATENUM, or DATEADD.
Depending on the rule type, the Set Fields tab provides the following action options in the Set
Fields Type field:
Query — Use this action to specify a form (from the current server or another server) and a
qualification for a query to that form. You can assign the value of any field from the queried
form. If no match is found for the qualification, a NULL value is assigned. If multiple matches
are found, the value assigned depends on the If Multiple Rows setting on the Basic tab.
SQL — Use this action to specify an SQL command to be run on either the AR System
server or another database. You can assign the value from any returned column. If the
command finds no entries, a NULL value is assigned. If it finds multiple entries, the value
assigned depends on the If Multiple Rows setting on the Basic tab.
Process — Use this action to specify a process to be run on the AR System server. If the
command returns an empty string or an error, a NULL value is assigned.
Other — This setting enables you to specify an action by using an AR System filter. See
Filters (see page 2622).
When you select the type of action, the buttons and fields in the qualification area change
according to the action type.
The following figure illustrates a rule that uses Value as the Set Fields Type.
In this example, the rule uses the Value Set Fields Type to assign a value to a particular field. This
value can be a hard-coded value, a keyword, or a value from a field of a schema.
Set Fields tab for a value
The following figure illustrates a Get Authority rule from the sample applications that makes a query
to the AP-Sample:Signature Authority form.
In this example, the rule uses a query to the AP-Sample:Signature Authority form to retrieve the
signature dollar limit for the current approver.
Set Fields tab for the Get Authority rule with a query
The following figure illustrates a Get Authority rule from the sample applications that specifies an
SQL command to be executed on the AP-Sample:Signature Authority form. This form has a T274
table in the AR database.
Note
To successfully run an SQL query, you must provide the T-Table name.
In this example, the rule specifies an SQL command that will retrieve the signature dollar limit for
the current approver from the AP-Sample: Signature Authority form.
Set Fields tab for the Get Authority rule with an SQL command
The resulting entries will have $Signature Dollar Limit$ as the first column. $1$ represents the
value of $Signature Dollar Limit$.
Note
$1$ represents the value of the first column of the resultant row.
The following figure illustrates a rule that uses process as the Set Fields Type.
In this example, the rule specifies a process that will run on the AR System server. You can specify
any executable process, such as a batch file (only for Windows), a shell or Perl script, or any other
application.
Note
The process must not contain any pauses, sleep delays, or white spaces. The output of
the process must be in the form of strings.
The output must be separated by the string defined in the Separator String field. After being
separated by the separator, each resultant string will be represented by $1$, $2$, and so on.
Note
You must ensure that the separator string in the Set Fields tabs and the separator string
in the application are the same.
Creating Auto Approval rules is optional. If you do not define an Auto Approval rule, no automatic
approval occurs.
Note
Auto Approval rules cannot use values retrieved from forms other than the current
request. To retrieve values from another form, use a Self Approval rule. See Defining Self
Approval rules (see page ).
If an Auto Approval rule's condition is met, the request moves directly to the Process Done stage.
When an approval request meets the criteria in an Auto Approval rule, the approval server sets the
rule state to Approved in the Detail record. This action activates an Approval Process Done rule.
This topic explains how to define an Auto Approval rule with a example.
1. Follow the procedure in Using the Basic tab on the Rule Definition form (see page )to
complete the basic information about the rule.
Select Auto Approval in the Rule Type field.
Write a rule condition to test for a specific field value from the approval request form,
for example, checking whether the value for an Estimated Total field is less than
$15.00.
2. (optional) Enter an Audit Text message.
This message is written to the audit log when the condition for this rule passes. The audit
text can include embedded field references that are filled when the rule condition passes. If
you do not enter an audit message, a default message is written to the audit log.
3. Click Save to save your changes.
Get Authority — Runs in both the Self Check and Completion Check stages of the approval
process
Get Authority Self — Runs only in the Self Check stage of the approval process
Get Authority Regular — Runs only in the Completion Check stage of the approval process.
You use the same procedure to define these types of get authority rules.
All get authority rules gather information about the current approver or environment that is used by
subsequent Self Approval or Completion rules.
1. Follow the procedure in Using the Basic tab on the Rule Definition form (see page )to
complete the basic information about the rule.
In the Rule Type field, select Get Authority, Get Authority Self, or Get Authority
Regular.
Create a condition statement in the Run If field if necessary. The condition statement
controls whether the rule actions execute. This field is optional for this rule type; if no
qualification exists, the rule always runs.
2. Click the Set Fields tab.
3. In the Set Field Type field, select an action from the menu.
The Set Field Type indicates the type of assignment to be used for the rule action. See
Using the Set Fields tab on the Rule Definition form (see page ).
4. In the From Form field, select a form name from the menu.
This value defines the form that the rule will search for the requested data; for example, the
AP-Sample:Signature Authority form.
5. In the On Server field, select the server where the form is located.
Current — The form exists on the current server.
Alternate — The form exists on another server. In this case, type the remote server
name in the Server field.
6. In the Qualification area, enter a qualification statement to define the parameters for
retrieving the authority data.
For example, to retrieve the current approver's signature authority limit from the AP-Sample:
Signature Authority form, define a qualification statement that sets $Approver$ (current
approver) to equal the Login Name field in the Signature Authority form.
Click Fields from the Set Fields Form to select the Login Name field from the form
named in the From Form field.
Click Fields from Application Form to select the $Approver$ field from the current
record of the AP:Signature form.
7. In the Fields Data area, enter the names of the field or fields to receive the data in the Field
Name column, and a value statement or the name of each source form field in the Value
column.
Use the field list button to the right of each field to select the field names. The fields in the
Field Name column are located in the AP:Signature form. The fields in the Value column are
located in the form named in the From Form field (such as AP-Sample:Signature Authority).
8. Click Save.
The value in this approver's Signature Dollar Limit field on the AP-Sample:Signature Authority form
is written to a temporary field named Temp Decimal 1 in the Details form. The value in the
temporary field is then available for use by any Self Approval or Completion rule.
A Self Approval rule differs from an Auto Approval rule in that Self Approval rules can use values
retrieved from another form. Self Approval rules usually depend on a Get Authority Self or Get
Authority rule to retrieve a value from another form. For example, a Get Authority Self rule can
retrieve the signature authority value for the requester and write the value to a temporary field on
the AP:Signature form. This makes the signature authority value available for use by a Self
Approval rule.
When an approval request meets the criteria in a Self Approval rule, the request moves directly to
the Process Done stage. The approval server sets the rule state to Approved in the Detail record,
which activates an Approval Process Done rule.
1. Follow the procedure in Using the Basic tab on the Rule Definition form (see page ) to
complete the basic information about the rule.
In the Rule Type field, select Self Approval from the list.
Build a condition statement that tests for a specific field value to determine if the rule
passes. The condition can reference any value of the current approval request or any
values retrieved by a Get Authority or Get Authority Self rule.
For example, test to see if a signature authority field value is $100.00 and the total
approval request amount is less than or equal to $100.00.
2. (optional) Enter an Audit Text message.
This message is written to the audit log when the condition for this rule passes. The audit
text can include embedded field references that are filled when the rule condition passes. If
you leave the Audit Text field blank, a default message is written to the audit log.
3. Click Save.
The following figure shows an example of a Self Approval rule from the Lunch Scheduler sample
application. In this example, the rule condition is a statement comparing the value in the Estimated
Total field of the approval request with the value in a temporary field (Temp Decimal 1) on the AP:
Signature form, and the value 200.
For this Self Approval rule to work, a Get Authority Self or a Get Authority rule must also be
included in the process to retrieve the value for the temporary field. In this example, the temporary
field value is a signature authority value pulled from the AP-Sample:Signature Authority form by a
Get Authority rule. The Estimated Total field is located on the approval request form (AP-Sample:
Lunch Scheduler).
In addition to the rule condition, this sample rule includes a customized audit trail message to be
written to the audit log when the rule passes.
1. Follow the procedure in Using the Basic tab on the Rule Definition form (see page ) to
complete the basic information about the rule.
Select Prep Get Next Approver from the Rule Type list.
The rule condition in the Run If text box is optional. Use this field to define a
conditional statement that controls whether the rule executes. If you do not define a
condition, the rule always passes.
2. Open the Set Fields tab and perform the following steps:
a. In the Set Fields Type field, select the action type from the menu. See Using the Set
Fields tab on the Rule Definition form (see page ).
b. If the action type is Query, select a form name from the From Form list. This value
indicates which form to search for the data being retrieved by the query.
c. In the On Server field, select Current if the form exists on the current server, or select
Alternate if the form exists on another server, and enter the server name where the
form is located in the Server field.
d. Depending on the action type, enter the qualification statement or command line in
the Qualification area.
e. In the Fields Data area, enter the name of the field or fields to receive the data in the
Field Name column, and a value statement or the name of each source form field in
the Value column.
f. Click Save.
The Overdue Prep Get Next rule in the Lunch Scheduler sample application, illustrated in the
following figure, is an example of a Prep Get Next Approver rule. It gathers information that will be
used by the Rule-Based process Special Overdue Approval. The Basic tab in this example does
not contain a Run If statement. This means that the rule always runs. On the Set Fields tab, a
Value action increments the level field with the value $Level$+1.
When If Multiple Approvers is set to One Must Sign, the approval server creates a single
signature record for the entire approver list. To complete the signature record, only one of
the approvers in the list must act on the approval request.
When If Multiple Approvers is set to All Must Sign, the approval server creates a separate
signature record for each approver in the approver list. If a role is in the approver list, the
approval server creates a separate signature record for each member of the role. In this
case, each approver must act on the approval request to complete his or her signature line.
A signature record is considered complete when any approver on the signature record approves,
rejects, or cancels the approval request.
For a Get Next Approver rule in a Parent-Child process, the following considerations apply:
The approval server assumes that the current approver is the key component of the
qualification.
To build the first approver list when the request is submitted, the approval server considers
the originator of the approval request to be the previous approver.
When the approval server creates the first approver list when the request is submitted, it assumes
that the previous level was -1. Therefore, the first level is the level with the lowest number. The
approval server keeps track of the current approver level during the approval cycle.
For a Get Next Approver rule in a Level process, the following considerations apply:
Use the Next Approver Rule Is field on the Rule Definition form to define a set of rules that evaluate
the conditions necessary to add an approver to the current approver list. See Rule-Based process
(see page 1595).
Ad Hoc processes
Ad Hoc processes do not use the Get Next Approver rule type, because an Ad Hoc process
expects that users will add the next approver. See Ad Hoc process (see page 1595).
1. Follow the procedure in Using the Basic tab on the Rule Definition form (see page )to
complete the basic information about the rule.
Select Get Next Approver from the Rule Type list.
The rule condition in the Run If text box is optional. Use this field to define a
conditional statement that controls whether the rule executes.
2. In the If Multiple Results field, select a value from the menu.
This field determines what occurs when more than one row of data is returned by the Get
Next Approver rule. The following choices are available:
Value from First — Uses the value from the first record retrieved.
Values from All — Uses all of the values retrieved.
Return Error — Returns an error message if more than one record is retrieved.
Clear — Leaves this field blank.
3. In the If Multiple Approvers field, select a value from the menu.
This field value determines the signature requirements when more than one approver is
returned by the Get Next Approver rule.
One Must Sign — A single signature record is created and only one of the approvers
listed in the record is required to act upon the approval request to consider the record
complete.
All Must Sign — A separate signature record is created for each individual in the
approver list, including individuals within a role. In this case, all of the approvers
retrieved by the Get Next Approver rule must act upon the approval request.
The Basic tab in this example does not contain a Run If statement, so the rule always runs. The If
Multiple Approvers setting causes the approval server to create a single signature record for the
approver list (One Must Sign). Therefore, only one approver action is required for the approval
request to be complete. The Next Approver Rule Is field is set to Ending, so no other Get Next
Approver rules will be processed after this one.
On the Set Fields tab, the Qualification statement causes the approval server to match the current
approver ($Approver$) to the Login Name field in the AP-Sample:Signature Authority form during
the query. The current approver could be the approval request submitter or an approver.
The rule retrieves the "parent" of the current approver by getting the value from the $Manager
Login Name$ field on the matching record in the AP-Sample:Signature Authority form and setting
the value in the Next Approver field of the approval request.
For example, an approver using the preview feature in a Parent-Child process might see the
following hierarchy of approvers:
1. Allan
2. Lin
3. Akon
4. Penni A Parameterized Get Next Approver rule would allow approver Lin to enter an
additional approver, Michel, at the same level as Penni, for example.
You use the Parameterized Get Next Approver rule in combination with the Add-PGNA-
Values application command. The Add-PGNA-Values command populates the detail record
with the run-time variables to be used by the rule. See BMC Remedy Approval Server
A Parameterized Get Next Approver rule works exactly like a Get Next Approver rule, with
the following exceptions:
You can use run-time variables in the qualification and Set Fields operations.
Approvers can be added to any level, not only the next level.
After the Get Next Approver rules are run, the server runs all Parameterized Get Next
Approver rules. If Parameterized Get Next Approver rules exist, but the current record does
not supply any parameters, the approval server the approval server skips the parameterized
rules.
Use this topic to define a Parameterized Get Next Approver rule and to see an example.
1. Follow the procedure in Using the Basic tab on the Rule Definition form (see page ) to
complete the basic information about the rule.
Select Parameterized Get Next Approver from the Rule Type list.
The Run If condition is optional. Use this field to define a conditional statement to
control whether the rule runs.
2. In the If Multiple Results field, select a value from the menu.
This field determines what occurs when more than one row of data is returned by the Get
Next Approver rule. The following choices are available:
Value from First — Uses the value from the first record retrieved.
Values from All — Uses all of the values retrieved.
Return Error — Returns an error message if more than one record is retrieved.
Clear — Leaves this field blank.
3. In the If Multiple Approvers field, select a value from the menu.
This field value determines the signature requirements when more than one approver is
returned by the Get Next Approver rule.
One Must Sign — A single signature record is created and only one of the approvers
listed in the record is required to act upon the approval request to consider the record
complete.
All Must Sign — A separate signature record is created for each individual in the
approver list, including individuals within a role. In this case, all of the approvers
retrieved by the Get Next Approver rule must act upon the approval request.
Clear — Leaves this field blank.
4. In the Next Approver Rule Is field, select a value from the menu.
This field value determines how the approver list is constructed when multiple Get Next
Approver rules are included in the process.
Additive — Indicates that any name or role this rule assigns to the approver list is
added to the existing approver list, and further rules are to be processed.
Ending — Indicates that any name or role this rule assigns to the approver list is
added to the existing approver list, but no further rules are to be processed.
Exclusive — Indicates that this rule assigns the entire approver list, and no further
rules are processed. In addition, if a previous rule created an approver list, that list is
ignored.
Clear — Leaves this field blank.
5. Select Yes or No from the Guaranteed Add list.
Yes — The parameterized rule runs even when a Completion rule would otherwise
determine that the process is done, thus guaranteeing that the user will be added as
an approver.
No — If a Completion rule determines that the conditions exist for the process to be
done, the process does not return to the Get Next Approver stage to run this rule.
6. Click the Set Fields tab.
7. In the Set Fields Type field, select the appropriate action type. See Using the Set Fields tab
on the Rule Definition form (see page ).
8. For a query, select a form name from the From Form menu. This value indicates in which
form to search for the query.
9. In the On Server field, select the server where the form is located.
Current — The form exists on the current server.
Alternate — The form exists on another server. In this case, type the server name
where the form is located in the Server field.
10. Depending on the action type, enter the qualification statement or command line in the
Qualification area.
11. In the Fields Data area, enter the name of the field or fields to receive the data in the Field
Name column, and a value statement or the name of each source form field in the Value
column.
12. Click Save.
The following figure illustrates an how an example Parameterized Get Next Approver rule operates.
The example rule includes the following settings:
1. A user enters an approval request in a process that includes an approval hierarchy, such as
a Parent-Child or Level process.
2. When working with the approval request, the first approver uses the preview feature to view
the existing approvers for the request, for example, by clicking a button on the approval
form. The approver decides to add Michel LeTourneau as an approver at a future level, for
example, level 4.
3. The approver uses functionality added to the approval request form, such as a button that
opens an "Add Approvers" form, to enter the level and the approver name. When the
approver saves his or her changes, a filter runs that captures these values and sends an
Add-PGNA-Values application command using the values to the approval server.
For example:
4. The approval server receives the command, and stores the data in the Param Data field on
the AP:Detail record.
5. After the approval server runs the Get Next Approver rules, it runs Parameterized Get Next
Approver rules. While running the parameterized rules, it retrieves the values from the
Param Data field in the detail record. In this case, it retrieves 4/Michel LeTourneau and
parses this into %1="4" and %2="Michel LeTourneau"
6. The approval server replaces the variables in the Parameterized rule with these values:
Run If qualification — $Level$ = 4
Set Fields — $Next Approver$ = "Michel LeTourneau"
7. If the condition matches, the Set Fields action is executed. If the condition never matches
and the regular Get Next Approver rules do not return any approvers, the approval server
checks for the Guaranteed Add flag. If this is set to yes, the parameterized rule executes,
even though the Run If condition is not satisfied.
Parameterized Get Next Approver rules are executed when a preview is generated, so the added
approver is visible when future approvers preview the request.
This rule validates the approver name at the time of entry by searching for a match to the entered
name on a specified form, for example, a signature authority form such as AP-Sample:Signature
Authority in the sample application.
You can define any number of Validate Approver rules. This allows you to search more than one
form to validate an approver name. This topic includes the following information:
Warning
Approver names in Validate Approver rules are case sensitive. Make sure approver
names are entered correctly by providing a menu of names for requesters to select from.
See Working with menus (see page 2442).
1. Follow the procedure in Using the Basic tab on the Rule Definition form (see page )to
complete the basic information about the rule.
Select Validate Approver from the Rule Type list.
The Run If condition is optional. Use this field to define a conditional statement to
control whether the rule runs.
2. Click the Set Fields tab.
3. In the Set Fields Type field, select the appropriate action type. See Using the Set Fields tab
on the Rule Definition form (see page ).
4. For a query, select a form name from the From Form menu.
This value indicates in which form to search for the query.
5. In the On Server field, select the server where the form is located.
Current — The form exists on the current server.
Alternate — The form exists on another server. Enter the remote server name in the
Server field.
6. Depending on the action type, enter the qualification statement or command line in the
Qualification area.
7.
BMC Remedy Action Request System 9.1 Page 1645 of 4703
BMC Software Confidential. BladeLogic Confidential.
7. In the Fields Data area, enter the name of the field or fields to receive the data in the Field
Name column, and a value statement or the name of each source form field in the Value
column.
8. Click Save.
The approval server automatically populates the hidden Total fields in the join forms with the
number of signature records in Pending, Approved, Rejected, Hold, More Information, Cancelled,
Error, and Closed states. These values are often sufficient to construct a Statistical Override rule. If
not, you can define Signature Accumulator rules to gather other data. This topic includes the
following information:
If a Signature Accumulator rule exists, it runs when a signature record is Approved, Rejected, or
Cancelled. The approval server collects a set of current signature records and applies the
Signature Accumulator rules for the approval process to each record (provided the Run If
qualification passes). After all rules have been applied for the current signature, the approval
server moves to the next signature and applies the rules.
A Signature Accumulator rule uses the Set Fields operation to collect and store the signature data.
Typically, the Set Fields operation in a Signature Accumulator rule performs an addition to
accumulate information, as in the following example:
The assignment of the Set Fields operation is always to the Detail record that the approval server
is processing. After all rules have been applied for one signature, the approval server moves to the
next signature and applies the rules.
1. Follow the procedure in Using the Basic tab on the Rule Definition form (see page ) to
complete the basic information about the rule.
Select Signature Accumulator from the Rule Type list.
Use the Run If qualification to include or exclude signatures. The Run If condition is
qualified on each signature, for example:
If the Run If condition is met, the server will perform the Set Fields operation.
2. Click the Set Fields tab.
3. In the Set Fields Type field, select the appropriate action type. See Using the Set Fields tab
on the Rule Definition form (see page ).
4. For a query, select a form name from the From Form menu.
This value indicates in which form to search for the query.
5. In the On Server field, select the server where the form is located.
Current — The form exists on the current server.
Alternate — The form exists on another server. In this case, type the remote server
name in the Server field.
6. Enter a qualification statement to define the parameters for retrieving the authority data.
For example, to retrieve the current approver's signature authority limit, define a qualification
statement that sets $Approver$ (the current approver) to equal the user name field on the
signature authority form (such as Login Name on AP-Sample:Signature Authority).
7. In the Fields Data area, enter the name of the field or fields to receive the data in the Field
Name column, and a value statement or the name of each source form field in the Value
column.
8. Click Save.
1. Follow the procedure in Using the Basic tab on the Rule Definition form (see page )to
complete the basic information about the rule.
Select Statistical Override from the Rule Type list.
In Statistical Override rules, the Run If condition specifies the condition to be
evaluated. For example, to check if 50 percent or more of the signatures have been
approved, you create a Run If condition as follows:
To derive the statistical override value, you can use static values, arithmetic
operations, keywords, the results from functions, and values from the record that the
approval server is processing in the AP:Detail-Signature form.
2. Click the Set Fields tab.
3. In the Set Fields Type field, select the appropriate action type.
See Using the Set Fields tab on the Rule Definition form (see page ).
4. For a query, select a form name from the From Form menu.
This value indicates in which form to search for the query.
5. In the On Serverfield, select the server where the form is located.
Current — The form exists on the current server.
Alternate — The form exists on another server. In this case, type the remote server
name in the Server field.
6. Enter a qualification statement, if any.
7.
BMC Remedy Action Request System 9.1 Page 1648 of 4703
BMC Software Confidential. BladeLogic Confidential.
7. In the Fields Data area, type one of the following values (or its integer equivalent) into the
first entry in the Valuelist:
Approved
Rejected
In a Statistical Override rule, the Field column on the Set Fields tab is automatically
populated with the statistical override field name. The Set Fields function sets the
specified value in the statistical override field on the Detail form. The only valid
statistical override values are Approved or Rejected.
8. Click Save.
The signature authority data that supports these sample rules is imported with the sample
applications and stored in the Signature Dollar Limit field of the AP-Sample:Signature Authority
form, as shown in the following figure.
Rule functionality
When one of the sample approvers responds to a request, the sample statistical decision-making
rules run. Signature Accumulator rules run before Statistical Override rules. In this case, they both
have a Run If condition that causes the Set Fields action to occur only when the approver's
signature is set to Approved. (If the approver's signature is set to Rejected, these rules do not run
and default behavior causes the request to be rejected.)
The rule Issue Retrieve Signature Limit has execution order 0, so it runs first. It retrieves the
Signature Dollar Limit for the current approver, and sets the value in a temporary field
(Temp Decimal 1) on the Detail form.
For this rule, the Set Fields qualification used is:
This qualification retrieves the signature authority amount for the current approver by
matching the current approver's login name to the Login Name field on the AP-Sample:
Signature Authority form.
The rule Issue Increment Signature Limit has execution order 1, so it runs next. It
increments another temporary field in the Detail form with the current cumulative signature
dollar value for all approvers who have responded.
The example Statistical Override rules run after the Signature Accumulator rules are complete.
The rule Issue Statistical Approval has execution order 0. The Run If condition causes it to
run only when the Approver response is set to Approved.
It checks the current cumulative signature authority. If the current cumulative
signature authority is greater than $500, the Set Fields action sets Statistical Override
to Approved.
This approves the request, regardless of whether all approvers have responded. In
this way, the rule preempts the default approval server behavior and approves the
request. In this case, the other Statistical Override rule does not run because the
request is done.
If the current cumulative signature value is less than $500, the Set Fields action does
not occur, and the request is not yet done.
The rule Issue Statistical Boundary Condition has execution order 1. It runs only if the first
Statistical Override rule did not result in approving the request.
If signatures are still pending, the Set Fields action does not occur, and the approval
process continues.
If a hold exists or a More Information request is pending, the Set Fields action does
not occur, and the approval process continues.
If approvers remain, and the current cumulative signature authority is not greater than
$500, the Set Field action sets Statistical Override to Rejected, and the request is
done.
These two Statistical Override rules work together to assure that the approval
process always ends with the request set to either Approved or Rejected.
Note
This example assumes that the request is for an amount greater than $500.
The Get Agreement sample application does not include a field for the
amount of the request. In an actual approval process, you would also need
a field to gather the amount of the request, and a Run If condition to test the
amount.
This section describes how to create a request that will activate the example Signature
Accumulator and Statistical Override rules, and how to observe the action of the rules after each
approval. Use a browser to perform these procedures.
1. Log in to the appropriate AR System server as the sample user Frank Williams.
2. Open the AP-Sample2:Get Agreement form in New mode.
3. In the Summary field, type:
I want to purchase a new laser printer.
4. In the Details field, type:
A really nice new laser printer costs $600.
This entry is only a comment, and does not affect the behavior of the rule.
5. In the Initial Approvers field, type:
Jack Miller; Larry Goldstein; Violet Anderson
Make sure to type a semicolon between each approver's name.
6. Click Save. To illustrate how statistically driven approvals work, the following procedure
uses the AP:Detail-Signature form to view the approval status after a response by each
approver.
1. Using a browser, log in to BMC Remedy AR System as an administrator, and open the AP:
Detail-Signature form in Search mode.
2. In the Approval Status field, select Pending, and click Search.
The approval request created by Frank Williams is pending for Jack Miller, Larry Goldstein,
and Violet Anderson.
3. Log in as Jack Miller, open Approval Central, and approve the request from Frank Williams.
For example, the following Run If condition would check if 50 percent or more of the signatures
have been approved:
When the Run If condition has been met, the preempted decision is specified on the Set Fields tab.
Completion rules are usually teamed with the Get Authority or Get Authority Regular rules. The
authority rules retrieve information about an individual's or role's authority from other forms and
make the information available to Completion rules.
1. Follow the procedure in Using the Basic tab on the Rule Definition form (see page ) to
complete the basic information about the rule.
Select Completion from the Rule Type list.
Construct a rule condition. The Completion rule condition defines whether the
approval process is complete (no further routing of the request is necessary). If the
condition is met, the process is complete. If it is not met, the approval server returns
the request to the Get Next Approver stage of the approval process.
2. Click Save.
The following figure illustrates an example Completion rule from the Lunch Scheduler sample
application. In this example, the temporary field Temp Decimal 1 on the AP:Detail form contains
the current approver's signature limit, which was retrieved by a Get Authority rule. The rule
compares the Estimated Total field on the approval request to this signature limit. If the condition
passes, the approval process is considered complete.
You must define a Get Authority or a Get Authority Regular rule for the Completion rule to work
correctly in this example.
Approval Process Done rules are often used to change the state of the approval request. For
example, you use one Approval Process Done rule to change the state of the approval request to
Approved and another Approval Process Done rule to change the state of the approval request to
Rejected.
When an approver marks an approval request as either Approved or Rejected, the approval server
sets this status in the AP:Signature record for that approver. When the conditions are met to
approve the request, as determined by the process definition or a Completion rule, the approval
server sets the status in the AP:Detail record for the request. To change the status in the approval
request form, you use an Approval Process Done rule. This also applies to approval requests that
are cancelled or that end in an error.
1. Follow the procedure in Using the Basic tab on the Rule Definition form (see page ) to
complete the basic information about the rule.
Select Approval Process Done from the Rule Type list.
Select one or more rule conditions from among the radio buttons: Approved,
Rejected, Cancelled, or Error.
The rule executes when the AP:Detail record is put into the selected state.
2. Click the Set Fields tab.
3. Select a value from the Set Field Type list. See Using the Set Fields tab on the Rule
Definition form (see page ).
4. In the Field Data area, enter the appropriate Field Name and Value to change the status of
the approval request.
5. Click Save to save the rule.
The following figure illustrates an example Approval Process Done rule from the Lunch Scheduler
sample application. This Approval Process Done rule is activated when the AP:Detail record is
marked Approved during the Completion check. In this rule, the Set Fields action sets the hidden
Approval Workspace field on the AP-Sample:Lunch Scheduler request form to Cost approved. In
this case, the value set is used by the chained processes in the application. A later action results in
marking the request approved overall. See Chaining approval processes (see page ).
You can use the table of rules on the Rule tab of AP:Administration to filter rules by process, or by
rule type.
To modify a rule
To delete a rule
Note
The delete operation is permanent and cannot be undone. Check for any rule
dependencies before deleting a rule. For example, Self Approval and Completion rules
might depend on a Get Authority, Get Authority Regular, or Get Authority Self rule. If the
Get Authority rule is deleted, the dependent rule will no longer function as designed.
The following topics provide information about the purpose of the three processes in Lunch
Scheduler, and illustrates how to chain several processes together to form one approval process:
This section describes the application's processes and how they work together. For information
about the rules used in each process, see Defining approval rules (see page ).
Note
The Lunch Scheduler and Get Agreement sample applications are not actually packaged
as BMC Remedy AR System applications. They consist of a related set of workflow
objects, including the approval request form, active links and filters, approval processes,
and approval rules.
When using Lunch Scheduler, the requester specifies information about the customer, the
restaurant, and the number of attendees. These choices populate fields containing details about
the total costs and information about the customer's relationship with the company.
Lunch Scheduler includes three different approval processes chained together and uses three
different filters with Run Process commands to start these processes. For more information, see
Using Run Process and $PROCESS$ commands (see page 2760).
The chained processes are:
Management Cost Authorization — This is a managerial approval based on the total cost of
the lunch. It is a Parent-Child process, so the request is routed to a hierarchical series of
managers until a manager with sufficient cost authority approves it. The filter AP-Sample:
Start Cost Approval starts this process.
Major Account Level Approval — This process runs if the account is a major or enterprise
account. It is a Level process that causes the request to be routed to the major account and
enterprise account teams. The filter AP-Sample:Start Level Approval starts this process.
Special Overdue Approval-- This process implements a special review of the request if the
account is currently overdue. It is a Rule-Based process. The filter AP-Sample:Start
Overdue Approv starts this process.
When requests are submitted in this application, they follow the appropriate approval processes.
The processes enforce the business rules of the company, and the approval data gathered
provides an auditable record of the business lunch activity at the company.
Note
The Questions, Comments with attachments, Notes, and Multi-process preview features
are available out-of-the-box with this sample application. For more information, see AP-
Show-Detail form (see page 1724).
AP-Sample:Lunch Scheduler — This is the approval request form for the application.
AP-Sample:Lunch-Detail — This is the inner join between the AP-Sample:Lunch Scheduler
and AP:Detail forms. It is used for internal processing by the approval server and for Global
Override operations. The join criteria is Request ID to Request.
The Lunch Scheduler application uses three separate approval processes that run serially.
Approval processes that are designed to run serially are referred to as a chained approval process.
Two of the processes run conditionally, using a condition statement to determine if the process is
required for each request.
This section describes the operation of each process. To see how each process is initiated and
how the processes are chained together, see Chaining approval processes (see page ).
The filter AP-Sample:Start Cost Approval starts the Management Cost Authorization process. This
filter uses the following application command:
In this command, the -t option identifies the name of the process to run. See BMC Remedy
Approval Server application commands (see page 2796).
The filter AP-Sample:Start Level Approval starts the Major Account Level Approval process. The
Run If criteria in the filter must be met for this filter to run. The filter uses the following command:
In this command, the -s option identifies the name of the approval request form, the -e option
identifies the request ID for the current request, and the -t option identifies the name of the process
to run. See BMC Remedy Approval Server application commands (see page 2796).
The filter AP-Sample:Start Overdue Approv starts the Special Overdue Approval process. The Run
If criteria of the filter must be met for this filter to run. The filter uses the following command:
In this command, the -t option identifies the name of the process to run. See BMC Remedy
Approval Server application commands (see page 2796).
The Lunch Scheduler application demonstrates the technique of chaining three different approval
processes together to approve Lunch Scheduler requests. The Lunch Scheduler application uses
workflow to start the initial process and to automatically run the additional processes when
necessary.
In the Lunch Scheduler application, the filter that starts the initial process, Management Cost
Authorization, is configured to run when the AP-Sample:Lunch Scheduler form is submitted or
modified. Using the Submit condition assures that this process will run first. The chained
processes, Major Account Level Approval and Special Overdue Approval, use filters that are
configured to run only when the AP-Sample:Lunch Scheduler form is modified.
In the Lunch Scheduler application, a character field named Approval Workspace, ID 536870920,
tracks the process status. The Approval Process Done rules for each process enter a string in this
field to represent the current process status. The Run If conditions of the filters that start the Major
Account Level Approval and Special Overdue Approval processes test this value to determine if
the chained process should run.
The three processes in the sample Lunch Scheduler run in this order:
1. The Management Cost Authorization process runs first because the filter is configured to run
when the request is submitted.
In the Process Done stage of this process, the Approval Process Done rules populate
the Approval Workspace field of the Lunch Scheduler request form. For example, if
the request is approved, the Approval Process Done rule enters Cost-Approved in
this field.
2. Because the request form was modified, the filters for the two chained processes are run.
If the customer is a major or enterprise account, the filter's Run If condition causes
the Major Account Level Approval process to run.
When the Major Account Level Approval process is done, its Approval Process Done
rules modify the Approval Workspace field to indicate the process result. For
example, if the request is approved, the Approval Process Done rule enters Level-
Approved in this field.
If the customer is not a major or enterprise account, the Major Account Level
Approval process does not run.
If the account is not overdue, the Special Overdue Approval process does not run. If
the account is overdue, this process runs only after the Approval Workspace field has
been set to Level-Approved.
3.
BMC Remedy Action Request System 9.1 Page 1661 of 4703
BMC Software Confidential. BladeLogic Confidential.
3. If the Major Account Level Approval process runs, its Approval Process Done rules again
modify the request form. This causes the filters for the two chained processes to start again.
In this case:
If the Level process completed with an approval, and the request is marked to
indicate that the account is overdue, the filter's Run If condition causes the Special
Overdue Approval process to run.
If the Level process completed with any other result (such as rejection), or if the
request does not indicate that the account is overdue, the Special Overdue Approval
process does not run, and the overall approval process is complete.
These three steps explain how the three processes are chained together to create
the overall approval process in the Lunch Scheduler application.
In addition to the filters that start the three processes, a fourth filter, AP-Sample:Test
Level Approval, runs whenever the approval request is modified. This filter runs only
after the Approval Workspace field is marked Cost-Approved, and if the Account
Type is not major or enterprise. The filter performs a set fields action that sets Level-
Approved in the Approval Workspace field. This assures that the Approval Process
Done rules function the same, even though the Level process did not actually run.
For example, in the Lunch Scheduler application, a request automatically restarts if anyone
changes the restaurant, the company, or the number of attendees. This ensures that users cannot
make a change after the request has been approved.
The sample application implements this functionality by using a set of filters that watch for a
change to the Company, Number of Attendees, and Average Cost/Person fields when the form is
modified. If this occurs, a filter sets the Approval Workspace field to contain a cancellation string.
Another filter resets the status of the request to Pending Approval in this case. (If the requester
cancels the request by another means, such as by modifying the Approval Status field, the request
does not restart because in that case the Approval Workspace field has not been set.)
To activate sample users, an AR System administrator must enter them in the User form, with
either a fixed or floating write license. Make sure you have purchased sufficient write licenses to
create the sample users as actual accounts in your AR System database.
Alternatively, you can use existing licensed users with the sample applications. To do so, you must
modify the data in the AP-Sample:Signature Authority form by replacing the sample login names
with login names that already exist in your AR System User form.
The sample application users are set up in a Parent-Child hierarchy. Each has a spending authority
limit, as shown in the following figure. To follow the sample application procedures in this
document, configure at least the users Frank Williams, Jack Miller, Larry Goldstein, and Violet
Anderson. If you use your own existing AR System users, configure at least four users, one each
with the signature authority values matching these four sample users.
Approval forms
AR System administrators, process administrators, and approvers can access the most important
approval server functionality in the Approval Central and AP:Administration forms. For example,
BMC recommends using AP:Administration to access the AP:Server Settings and AP:Admin-
Rename forms, rather than opening the helper forms independently.
Administration forms
Administration forms are used either by approval administrators to manage process settings, or by
the approval server to manage data.
AP-AdhocDetails form
This form stores the information entered through the AP:AdhocDialog form. See AP-AdhocDialog
form (see page 1718).
AP:AdhocDetails form
If Multiple
One — Indicates that at least one ad hoc approver must approve the corresponding request.
All — Indicates that at all the ad hoc approver must approve the corresponding request.
Independent
Yes — Indicates to the Approval Server that the request can proceed to the next level of its process
without waiting for the signature of the current ad hoc approver.
No — Indicates to the approval server that the current ad hoc approver's signature is required before
the request can proceed to the next level of its process.
Detail ID The detail ID corresponding to the signature for which the ad hoc approver is added.
Process Name The name of the process to which the corresponding request belongs.
Form Name The application request form through which the request was created.
Application The request ID of the application through which the corresponding request was created.
Request ID
Locked
Yes — Indicates to the approval server that the ad hoc approver entry is ready to be associated with
the corresponding approval request.
No — Indicates to the approval server that the ad hoc approver entry is not to be associated with the
corresponding approval request.
Note
When AP:AdhocDialog is used to add ad hoc approvers, this field is set to Yes by default.
SigToBeDeleted When an ad hoc approver entry is deleted, this field is used to indicate the corresponding signature entry that
should be deleted.
For more information, see Using a custom ad hoc dialog box with the approval server (see page
2914).
AP-Administration form
Process administrators use this form to create and modify the records that make up approval
processes. See Working with the AP-Administration form (see page 626).
Field Description
Show for process Use the menu to limit the display list to items associated with the selected process. This
field is not active for the Role and Form categories.
Process, rule, notification, role, Click a tab to display a list of items of that type. This also selects which category of items
form, administrator, alternate is used when you click the buttons on this form.
Search Click this button to open a search form for items of the category determined by the current
tab.
Create Click this button to create a new item of the category determined by the current tab.
Server settings Click this link in the navigation pane to open the Server Settings form. See AP-Admin-
ServerSettings form (see page 1667).
Rename Click this link in the navigation pane to open the AP:Admin-Rename form. See AP-Admin-
Rename form (see page 1667).
AP-Admin-DeleteVerify form
This form appears when a process administrator tries to delete an entry in the AP:Administration
form. The entry could be a process, rule, notification, role, form, another process administrator, or
an alternate approver.
You can delete only one entry at a time. When you select a process and click Delete, the dialog
indicates that if you proceed, the associated rules, notifications, and administrators are also
deleted.
AP-Admin-Rename form
This form appears when a process administrator selects Rename in the navigation pane of the
Administration form.
Field Description
Select the type of object to be Select Process to rename a process, or Form to rename a form.
renamed
Select the form to be renamed Select the process name from the menu. When BMC Remedy AR System supplies the GUID,
/Select GUID of the process to select the supplied GUID.
be renamed
Enter new process name / Type the replacement name for the process or form. The name of a process can be as long as
Enter new form name 80 bytes. This equates to 80 characters in English and most European languages, but only 40
characters in double-byte languages.
Scope of update Select an option from the menu to determine which of the associated detail records are
renamed.
All Requests renames all detail records for current and past approval requests
associated with the form or process.
Only Active Requests renames detail records only for currently open approval requests
associated with the form or process.
Note
If you renamed a process manually instead of using the AP:Admin-Rename form, the
Rename command will not change names of attached rules. You must restore the
process name manually and rename the entire process, or you can rename all the
attached rules by using this form.
AP-Admin-ServerSettings form
Process administrators use this form to change server settings for the approval server. To open
this form, select Server Settings in the navigation pane of the AP:Administrator form.
Basic tab
Fields on the AP:Admin-ServerSettings form — Basic tab
Field Description
Logging Settings
Log File Type the directory path and file name for the log file.
Name
Note : By default, the arapprov.log file is displayed in the AR server in the AP:Admin-ServerSettings form. The log
file is located in the AR server machine at <AR System Installation Directory>\Arserver\Db.
Other Settings
Definition Type a number of seconds to define how often the approval server checks the definitions for changes. A larger
Check number increases BMC Remedy AR System performance by checking less often. A smaller number of seconds is
Interval useful while creating and testing a process. A zero (0) in this field causes the system to check for definition changes
with each operation.
Note: When testing custom applications, after creating a process, you should wait until the Definition Check Interval
period before creating requests. Otherwise, the processing of requests fails, and the following error is written to the
logs:
Private Type the RPC socket number of a private queue to use when accessing the AR System server. Leave this field
AR empty if you do not use a private queue.
Server
RPC
Socket
Plugin Type the RPC socket number of a private queue used for loopback calls. Leave this field empty if your server does
Loopback not use a dedicated queue for loopback calls.
RPC
Socket
Reset Reset to reload the form with the previously stored values.
For information about the basic tab, see Configuring server settings for BMC Remedy Approval
Server logging and loopback calls (see page 4204).
Notifications tab
The Notifications tab allows you to enable or disable notifications for various approval server
events.
You can specify whether or not to send notifications on the following events:
Approve Cancel
When any of these event types occur during an approval process, the approval server acts
according to the following choices:
To use notifications, you must define the specific notifications for each process in the AP:
Administration form.
For information about the notification tab, see Setting notifications for approval events (see page
2901).
Escalations tab
AP:Admin-ServerSettings form — Escalations tab
(Click the image to expand it.)
Still Active
Disabled means the approval server disables escalations for this event type during an approval process.
Still Active Enabled means the approval server enables escalations for the approver list when this event type occurs
(repeat) during an approval process.
Enabled Including Alternate (default setting) means the approval server enables escalations to the approver
Still
list as well all active alternates when this event type occurs during an approval process.
Pending
These settings enable escalations for each event type. To use escalations, you must define the specific escalations
Still
for each process in the AP:Process Definition form.
Pending
(repeat)
Still Hold
Still Hold
(repeat)
Still More
Info
Still More
Info (repeat)
Still Error
Still Error
(repeat)
For information about the escalation tab, see Setting escalations for approval events (see page 2901
).
AP-Customize-SourceID form
This form appears when you click the Customize link on the Basic tab on the AP:Form. This form
enables you to specify the application form that opens when users click the Request ID link on
Approval Central.
The following table lists the fields available on the AP:Customize-SourceID form and their
descriptions.
Fields Descriptions
Display Displays the following window types. For information about each window type, see the Open Window action. Select
Mode the mode in which you want to open the custom form.
Modify
Display
Modify Directly
Display Directly
Dialog
Search
Submit
Form Displays the list of all available forms on the server, except the Display-Only forms.
Name
Note
If you selected Dialog for the Display Mode field, the Form Name list also includes the Display-Only form
names.
Select the form you want to open when you click the Request ID link on Approval Central.
View Displays the lists of available views for the selected form. Select a view for the selected form.
Label
Note
If you do not select a view, the form opens in the default view.
Lookup Displays a list of fields present on the selected custom form (See the Form Name field description).
Field
Note
This option appears if the Display Mode field contains one of the following items:
Modify
Display
Modify Directly
Display Directly
Select a field from the list with which you want to compare the Request ID field value (ID 1) on the application
request form. When you click the Request ID link on Approval Central, the custom form opens with a record that
matches the value in the selected field.
Note
Integer
Real
Decimal
Date/Time
Date
Time
Currency
Diary
Field Displays ten fields with IDs 14301 to 14310 that you can use to map the fields on the custom form to the fields on the
Mappings application request form.
Note
This option appears if you selected Dialog, Submit or Search in the Display Mode field.
Select an application request form field from the menu list that you want to map with the custom form field. You can
map up to 10 fields from the application request form to the custom form. The reserved IDs (14301 to 14310) are
assigned to these fields on the custom form. When you open the custom form through the Request ID link, these
mappings populate the custom form fields (14301 to 14310) with the corresponding values on the request form fields
that you selected or mapped for the current request.
Note
If you do not define the mapping between the custom form fields and the application request form, a blank
form opens when you click the Request ID link on Approval Central.
AP-Detail form
This form holds all data about an approval request. You can use this form to determine the status
of a request, and to see a history of activity on the request for any approval process. In addition to
the fields described in this section, the AP:Detail form also includes hidden Currency, Date, and
Time fields to store temporary results during workflow. For example, Currency Field 1 and
Currency Field 2 are temporary fields of the currency type.
AP:Detail form
Field Description
Application The BMC Remedy AR System populates this field the with name of the approval request form for the request.
Request The BMC Remedy AR System populates this field with the AR System ID for the request.
Process
Field Description
The BMC Remedy AR System populates this field with the name of the approval process for the current Detail
entry.
Comments The BMC Remedy AR System stores comments entered by approvers in this field.
Submitter The BMC Remedy AR System populates this field with the AR System user name of the person who submitted
the request.
Status The BMC Remedy AR System populates this field with the status of the request.
Approval This field contains an audit trail of date, time, and approver for actions taken on this request. This information is
Audit Trail part of the permanent record for this request.
Global Approves the request, overriding the regular approval process. You must have process administrator override
Approve authority to perform this action. However, BMC recommends using Approval Central for overrides.
Global Reject Rejects the request, overriding the regular approval process. You must have process administrator override
authority to perform this action. However, BMC recommends using Approval Central for overrides.
Assignee The BMC Remedy AR System populates this field with the Assignee Group for the request. This field supports
Group the multi-tenancy feature.
Permissions
Process The BMC Remedy AR System populates this field with the GUID for the process associated with the request.
Instance ID
Signing Tracks the method (Approval Console or Email Engine) used for approving or rejecting a request.
Method
AP-Detail-Signature form
This form is a join form that combines data from the AP:Detail and AP:Signature forms. You link
this form to your application's approval request form to create a three-way join when you add
approvals to your application. The approval server uses this form for internal processing. The
visible fields of this form appear by default in the three-way join form, which displays request
details.
To open the three-way join form, click Request ID on Approval Central, and click the Show
Signatures button (if implemented) on the application form that appears.
In addition to the fields described in this section, the AP:Detail-Signature form also includes many
hidden fields used to store temporary results during workflow.
AP:Detail-Signature form
(Click the image to expand it.)
Field Description
Approval The BMC Remedy AR System populates this field with the current status for the signature record.
Status
Pending — The approval server is waiting for a response to a request for this signature line.
Approved — The request is approved for this signature line.
Rejected — The request is rejected for this signature line.
Hold — The request is on hold for this signature line, so no approval server actions occur.
More Information — The approver associated with this signature line is waiting for a response to a More
Information Request.
Cancelled — This request was withdrawn from the approval process.
Error — The approval server detected an error state while processing this request.
Closed — This request is ended and operations can no longer be performed on it.
Password This field is optional. The administrator should configure it to appear on the three-way join form when the process
has Require Passwords set to Yes. Type your password for verification. The approval server verifies the contents of
this field before a Save operation occurs.
Approval Displays the priority of this request as defined in the approval process.
Priority
Comments Enter any comments you want to store with the approval request.
Next When the process allows ad hoc approvers to be added, type the AR System user names of the next approvers.
Approvers
If Multiple If you enter ad hoc approvers, select how the approval process operates when more than one approver appears in
Approvers the Next Approver field.
One Must Sign — A single signature entry is created for all approvers in the Next Approver field. Only one of
those approvers needs to take action on the request.
All Must Sign — Separate signature entries are created for all approvers in the Next Approver field. All
approvers must act on the request for it to move to the next stage.
Reassign Type the AR System user name of an approver to whom you want to reassign this request.
To
Approvers The BMC Remedy AR System populates this field with the AR System user name of the approver for this signature
line.
Approval This field contains an audit trail of date, time, and approver for actions taken on this request. This information is part
Audit Trail of the permanent record for this request.
Field Description
Assignee The BMC Remedy AR System populates this field with the Assignee Group for the request. This field supports the
Group multi-tenancy feature.
Permission
For The BMC Remedy AR System populates this field with the name of the approval request form for the request.
Application
For The BMC Remedy AR System populates this field with the AR System ID for the request.
Request
For The BMC Remedy AR System populates this field with the name of the approval process of this request.
Process
Submitter The BMC Remedy AR System populates this field with the name of the person who submitted the request.
Approver This field records the AR System user name of the approver who has responded for this signature line. The name
Signature appears only after an authorized person modifies the Approval Status field.
Alternate This field records the AR System user name of the alternate approver who modifies the Approval Status field, if any.
Signature
More This field contains More Information requests sent by the approver for this request and signature line, and the
Information responses to those requests. The field is not populated until the requestee responds to the More Information
request.
More Opens AP:Dtl-Sig-MoreInfoDialog and searches for More Information requests associated with this approval
information request.
Signing Tracks the method (Approval Console or Email Engine) used for approving or rejecting a request.
Method
AP-DynamicLabels form
This form enables you to set locale-specific labels for four fields on the AP:Show-Detail form, and
the tool tip labels for the fields on the AP:Form — Tooltip Configuration tab.
AP:DynamicLabels form
(Click the image to expand it.)
Field Description
Process Select the process for which you want to customize the field labels.
Label for Provide labels for the fields 14508, 14509, 14510, and 14511, and click Save. For information about where these
14508 labels appear, see AP-Form form (see page 1677).
Label for The default labels for these fields are GL Account, Cost Center, Total Cost, and Phase, respectively.
14509
Label for
14510
Label for
14511
Label for
14712
Label for
14713
Label for
14714
Label for
14715
Label for
14716
Label for
14717
Label for
14718
Label for
14719
Label for
14720
AP-Form form
This form is linked to the Form tab of AP:Administration. Process administrators use this form to
attach approval request forms to the approval server.
Basic tab
AP:Form — Basic tab
(Click the image to expand it.)
Field Description
Lookup Type a keyword to be used by the approval server when searching for this form. The keyword acts as a permanent
Keyword search term, even if the name of the form changes.
Used By This field contains the name of the BMC Remedy AR System application that uses this form. BMC Remedy AR
System populates this field with Approval.
Assignee The BMC Remedy AR System populates this field with the Assignee Group for the request. This field supports the
Group multi-tenancy feature.
Permission
Request The Request ID Link Association has three options to check the link association for the form mentioned in the Form
ID Link Name field.
Association
Application Request Form – Opens the application request form associated with the form mentioned in the Form
Name field. For Example, opens CHG:Infrastructure Change form for Change Management users.
Approval-Application 3-Way-Join Form – Opens all the join forms associated with the form mentioned in the Form
Name field. For Example, opens CHG:ChangeAPDetailSignature form for Change Management users.
Customize – When you select Customize, you can open any form associated with the form mentioned in the Form
Name field, other than Application Request Form and Approval-Application 3-Way Join Form. For Example, opens
SRS:RequestDetails form for Service Request Management users.
View Label Select specific view name on the form. The selected view opens when you click the Request ID.
Advanced tab
The Advanced tab enables Process administrators to define field mappings for a request form at
the application level. These mappings are not mandatory. Not all field types are supported for
mapping.
Warning
If you define mappings on the unsupported field types on the AP:Form form, the approval
server might fail.
Character Date
Integer Time
Real Diary
Date/Time Attachment
Currency Checkbox/Radio box
The fields on this form are reserved field IDs in the approval server. You can map them to other
fields on the application forms by using the corresponding menus. The values from the mapped
fields are displayed on Approval Central and AP:Show-Detail. The following table describes where
these values appear.
Requestor Map to a user field on the application form. The value from the mapped field is displayed in the Requestor
column on Approval Central.
Field 1 The value from the mapped field is displayed in the Summary column on Approval Central.
Field 2 Currently, the approval server does not use Field 2. This field was used in releases earlier than 7.5.00 to display
certain fields on the approval console.
Field 3Field 4 The values from the mapped fields are displayed in the top panel on AP:Show-Detail. For example, for a request
Field 5Field 6 of the Lunch Scheduler sample application, these values appear against the following labels:
P-C GL Account
P-C Cost Center
P-C Total Cost
P-C Phase
In your application, you can specify the labels that should appear for these fields on AP:Show-Detail.
Field 7 The value from the mapped field can be used in accordance with the user requirement. Currently, the value of
this field is not displayed anywhere on Approval Central.
Field 8 The value from the mapped field is displayed in the Notes field for a request on Approval Central.
Field 9 Note:
Note
Changing the field mappings on this form only affects new requests. The older requests
retain their original field values.
You can map them to fields on the application forms by using the corresponding menus. The
values from the mapped fields are displayed in a tool tip on Approval Central. The following table
describes where these values appear.
Field 3 {14713}
Field 4 {14714}
Field 5 {14715}
Field 6 {14716}
Field 7 {14717}
Field 8 {14718}
Field 9 {14719}
Field 10 {14720}
Note
If the value from the mapped fields contains any HTML content, approval server renders
the content as HTML content.
For information about the Administrative Information tab, see Administrative Information tab on AP-
Alternate form (see page 1720).
AP-Notification form
Process administrators use this form to create and modify notifications sent by approval processes.
This form opens from when you click View or Create from the Notification tab of the AP:
Administration form.
Basic tab
AP:Notification form — Basic tab
Process name Select the process name from the list. The process must already exist.
Status Use the drop-down list to select the status of the notification.
Process The BMC Remedy AR System populates this field with the GUID of the selected process.
Instance ID
Notify On Use the drop-down list to select the type of event that will trigger this notification.
Note: If you choose Error, the notification is sent only if the status of the request is set to Error in the AP:
Signature and AP:Detail forms.
Assignee Group The BMC Remedy AR System populates this field with the Assignee Group for the request. This field
Permission supports the multi-tenancy feature.
Qualification If necessary, enter additional conditions to control when the notification is sent. The approval server uses
condition in this field in addition to the Notify On event.
Details tab
AP:Notification form — Details tab
Send to
Notify List — The approval server sends notifications to the default recipients for the event type. See the
following table. When a request is approved or rejected, the notification is sent based on the If Multiple
Approvers setting on the AP:Process Definition form:
One Must Sign — The notification is sent only to that approver and not the other approvers in the
signature line.
All Must Sign — The notification is sent to that approver and all the other approvers for whom signature
lines have been created. See AP-Process Definition form (see page 1689).
Other — If you select Other, enter the notification recipients in the field to the right. To use a field reference
(for example, $ fieldName$ ) click the field menu icon.
Subject Type a subject line for the notification message. You can select AR System variables from the list.
Additional To attach additional field information to the notification, use the drop-down list to select the field names.
Fields
Message Type the message text for the notification. Use the drop-down list to include AR System variables in the message
text.
Priority Select a priority from 0 to 10 to allow users to sort their notifications by order of importance. Entries created with an
earlier version of the approval server will default to a Priority of 1.
Email tab
AP:Notification form — Email tab
(Click the following image to expand it.)
Fields Each field on this form includes the Fields button. Use this menu to select fields from the approval server
forms when completing each field, if appropriate.
Keywords Each field on this form includes the Keywords button. Use this menu to select AR System key words when
completing each field, if appropriate.
Mailbox name Enter the name of the AR System outgoing mailbox that you want to handle the notifications.
From Enter a name for the sender of the notification, or select variables from the Fields and Keywords menus.
Reply To Enter a name for the Reply-To field of the notification email, or select variables from the Fields and Keywords
menus.
CC Enter the recipients of the notification email, or select variables from the Fields and Keywords menus.
BCC Enter the recipients of the notification email who should receive blind copies, or select variables from the
Fields and Keywords menus. Recipients entered in this field do not appear in the recipient list for other users.
Use Email Select "Yes" to use the email based approval template. The appropriate template name will be automatically
based Approval displayed in the Content field. Default value is "No".
template
Organization Enter a company name, an organization, a keyword, or a field reference to a name for the notification email.
Header Enter the names of templates to use for the header of the email notification. You can enter the name of the
template directly, or enter a field reference or keyword to retrieve a template name.
Content Enter the names of templates to use for the content of the email notification. You can enter the name of the
template directly, or enter a field reference or keyword to retrieve a template name.
Note: If you select "Yes" for the Use Email based Approval template field, the template name will be
automatically displayed for this field.
Footer Enter the names of templates to use for the footer of the email notification. You can enter the name of the
template directly, or enter a field reference or keyword to retrieve a template name.
For information about the Administrative Information tab, see Administrative Information tab (see
page ).
The field values correspond to the input parameter values of the Generate-Multi-Process-Preview
command. See BMC Remedy Approval Server application commands (see page 2796).
Field Description
Phase- The semicolon-separated list of processes, each prefixed with some related information and separated by a colon
Process List (: ). Some processes might not have any related information prefixed.
AP-PreviewInfo form
The approval server uses this form to store preview data when the process is configured to
generate previews. Process administrators can use this form to preview all the approvers assigned
to work on an approval request.
You must enter data into all the visible fields to search the AP:PreviewInfo form.
See Configuring approval server to work with flowcharts (see page 629).
AP:PreviewInfo form
Field Description
Single Select the appropriate value to indicate whether you want to generate a single process or multi-process preview.
/Multi
Process
Retrieval Users have an option of specifying a value as a qualification for the query being made.
Type
Full — Returns list of all completed signatures (from the AP:Signature form), and all previews from the
preview form.
Remaining — Returns list of only the preview signatures (those that are not yet opened and entered in the
AP:Signature form).
Complete — Returns list of only the signatures that have already been completed, that is, those that already
exist on the AP:Signatures form, and are still open (Pending/More Info). You can query the AP:Signature
form for this information as well, but form displays such data in a better format.
Field Description
Application
Form
Name
AP-PreviewSignatures form
This form keeps track of signature entries generated as part of the approval preview feature
(except for real-time preview).
Note
The approval server uses this form internally, and users must not use this form to create
records manually.
When a signature or detail record-related application command is submitted, the approval server
creates signatures of future approvers in the chain if the Generate Preview field for the process
definition is set to one of the following:
On Request Only
On Start of Process
On Generation or Change to a Signature
Real-time preview does not use the AP:PreviewSignatures form because it stores signature
records in-memory.
AP:PreviewSignatures form
Field Description
Field Description
Individual Enter the AR System user name of the individual who is to be a process administrator.
Authority Use the drop-down list to select the privileges allocated to the individual in the field preceding.
Full Admin — Grants the ability to modify processes as well as the ability to approve or reject a request
regardless of the normal process.
Override Only Admin — Grants the ability to approve or reject a request regardless of the normal process, but
not the ability to create or modify processes.
Notify Use the drop-down list to determine the method for notifications to this user.
Method
None — The approval server does not send a notification.
Email — The approval server sends the notification through email. Notifications can be sent to non-AR System
users, to an alias for a group, or to an email address representing a program.
User Default — The approval server sends the notification using the default notification method defined in the
User form for each of the recipients.
Covering This option determines the processes for which this person receives process administrator privileges.
All — Grants process administrator authority for all Approval processes defined in the Process Definition form.
Specific Process — Grants process administrator authority for the process you select in the Process Name
field.
Use the drop-down list to select a process name if you selected Specific Process in the Covering field.
Field Description
Process
Name
Status Use the drop-down list to determine the status of this person's process administration privileges.
Active — The process administrator authority is enabled and the user can immediately work on processes or
requests.
Inactive — The process administrator authority is disabled. This allows you to temporarily suspend authority of
the user when it is not needed, and enable it at a later time.
For information about the Administrative Information tab, see Administrative Information tab (see
page ).
Note
Basic tab
AP:Process Definition form — Basic tab
(Click the image to expand it.)
Field Description
Process Enter a name for this process. Process names must be unique and must have no more than 254 characters
(including spaces). It is helpful to make the name descriptive of the process's function.
Form Select the AR System form that you are connecting to the approval server. This becomes the approval request
form.
Note: You must add the form to the Form tab of the AP:Administration form to make it appear on this menu.
Parent-Child
Level
Ad Hoc
Rule-Based
Active — (Default) The process generates approvals for the approval request form.
Inactive — The process is disabled and generates no approvals.
You might want to set the status to Inactive during the development of the process and the associated rules. When
all the appropriate rules are in place, you can modify the process and set the status to Active. Requests related to
processes in the Inactive state are displayed on Approval Central, but approvers cannot act upon such requests.
The following message is displayed in such an event:
This action is not allowed on the selected requests, because the related process is inactive. (ARERR 46411).
However, approvers can take action on requests that are related to processes in the Inactive state from the
application's three-way join. To prevent approvers from acting on such requests from the three-way join,
developers need to write the appropriate workflow.
Request Enter a valid AR System user name or select the field that identifies the owner of the approval request from the
Owner Field menu. The fields in this menu are populated from the approval request form. See Request Owner field (see page
1693).
First Enter a valid AR System user name or select the field that identifies the first approver for this process from the
Approver menu. The fields in this menu are populated from the approval request form. This field is required for Ad Hoc
Field process type, optional if you allow ad hoc overrides, and otherwise unused.
Field Description
Note: If you select the On Request Only, On Start of Process, or On Generation or Change to a Signature option,
the preview displayed might not be the most current information.
Can Specify whether approvers should or should not be able to reassign a request of this process type to another
Reassign? approver.
Full Name Select a form that provides the full name of the approver to be added to the signature line. You could also enter a
Form custom form name by using the adjacent text field. This information is pushed to the Full Name field on the AP:
Signature form. For more information, see Full Name (see page 1704) and Full name form (see page 1694).
Exclude This menu lists all the fields on the application form. Select a field that contains user names. The users from the
User Field selected field are excluded from the list of approvers (their signatures are not created) for a request of this process
type. If the selected field contains a role:
Note: The check for excluding users from the list of approvers is done before signature creation,
therefore it does not impact the requests for which signatures have already been created.
Approval Select the manner with which the approval server determines whether the approval process for a request is
Success complete:
No More Approvers — (Default) The process is complete when all signature lines are complete. If you select
this option and if the signature line for a request is cancelled and no other signature exists, the request is
marked Approved, not Cancelled.
Completion Rule — Use a Completion rule to determine the successful completion of the approval process.
If you select this option, you must create a Completion rule and associate it with this process or the process
is never considered complete.
If Multiple
Approvers
Field Description
This field applies only if you are defining an Ad Hoc process or are going to allow ad hoc overrides. The value you
select determines how many signature line records the approval server creates when building an approver list.
Specify using the available options how to manage signature entries when a request is assigned to multiple
approvers:
One Must Sign — Create only one signature line for a list of potential approvers. The signature line is
complete when one of the approvers acts on the request. The first approver to act on the request
determines the response; the request is withdrawn from the other approvers.
Note: The field for approver names on a signature-line record is limited to 255 characters on certain
databases. Using roles might help you to work around this limitation, because roles are internally expanded
to individual approver names during further processing.
This option overrides 4the If Multiple Approver setting on any roles selected as an approver.
All Must Sign — Create separate signature lines for each approver. All approvers must act on their own
signature line for the request to proceed.
If an approver list includes roles, the If Multiple Approver setting for the specific role determines whether the role is
expanded into individual signature lines for each member of the role or a single signature line is created for the
entire role. See Defining roles (see page ).
Allow Only One Approver — (Default) Create a single signature line for one individual. If you use this option
and a requester specifies multiple approvers, the approval server stops the process and marks it as an
error.
For information about how notifications are sent when a request is approved or rejected, see AP-Notification form
(see page 1681).
Allow Ad This field applies to Parent-Child, Level, and Rule-Based process types. Specify using the available option whether
Hoc Next users can add approvers to the approver list for a request:
Approver?
Anyone — The requester and any approver can select an ad hoc next approver.
Approver — Only approvers can specify an ad hoc next approver.
No one — (Default) The process should not allow users to specify an ad hoc next approver.
For Self This field specifies how the approval server determines the next approver, when the requester is not the person
Assignment who submitted the approval request (for example, when an assistant enters an approval request on behalf of
someone else). Select from the available options:
Use Get Next Approver Rules — (Default) Use a Get Next Approver rule to determine the first approver.
Assign to Owner if Approver — Use the requester as the first approver if the requester is defined as a valid
approver for the approval server. If you select this option, you must define a Validate Approver rule to verify
whether the owner is a valid approver.
Always Assign to Owner — Use the requestor as the first approver in all cases.
Validate This field tells the approval server whether to verify the value in your next approver field with a Validate Approver
Approvers rule when creating a request. Select from the available options:
Require This field determines whether the approver must enter a password to save changes to an approval request. Select
password from the Available options:
Yes — Mandate the use of a password when saving changes to an approval request.
Field Description
Assignee The BMC Remedy AR System populates this field with the Assignee Group for the request; the Public group is
Group selected by default. The approval server uses this field to support multi-tenancy for use by application service
Permissions providers. If you use this field for multi-tenancy support, create workflow to populate this field with the correct
assignee group name. You do not need to change this setting when creating the rule. The ID of this field is 112,
and it appears on all approval server forms. The field 112 value from records created in the AP:Detail form is used
automatically in all the other approval server forms (for example, AP:Signature, AP:More Information, and so on).
See Error 333 and Assignee Group Permission (see page 4540).
Ad Hoc This drop-down list displays all the forms in the AR System server. Select the form that you want to be displayed
Form when an approver clicks the Adhoc button on the AP:Show-Detail form. Approvers should be able to provide data
about ad hoc approvers in this form, and the form should have the necessary workflow to store this data in the AP:
AdhocDetails form. If you select a custom form, make sure that application developers have added the necessary
fields and workflow to it.
Retrieving This field determines the course of action in case the approval server fails to retrieve the first approver for a
first request.
approver
failed, Yes — (Default) Set the state of the request to Error and add the error details to the audit trail.
error? No — Set the state of the request to Pending. Later, if Add-Sig is started for that request, the same AP:
Detail record is used.
Search Appears in the Search mode; click to search the AP:Process Definition form.
Save Appears in the New mode; click to save the entry to the AP:Process Definition form.
The execution of Self Approval rules — The value of this field is compared with the current
user's name, and if they match, the rule is executed, otherwise it is skipped.
Finding the first approval in the approval chain — In the Parent-Child, Level, and Rule-
Based process types, the first approver in the chain is completely dependent on the name of
the person stored in the field mapped to AP:Process Definition > Request Owner Field. The
Request Owner field must contain a valid entry in the approval lookup form (for example, AP-
Sample:Signature Authority is the lookup form for the Lunch Scheduler sample application).
To set an appropriate value for Request Owner field, a process administrator must consider
the following:
Does this field store the name of the person defined in the approval lookup form?
Is the organizational structure for this user defined in the approval lookup form? The
value of Request Owner field is not considered when finding the first approver in an
ad hoc process, because the requester is responsible for specifying all the required
approvers.
Create a filter on this form, which runs on a service action. This filter uses the data in the first field
(10001) as input to generate the corresponding full name for the second field (10002).
See Full Name (see page 1704).
Configuration tab
AP:Process Definition form — Configuration tab
(Click the image to expand it.)
Process Intervals
These fields are used to determine the action date for signatures on a request pertaining to this process. See Associating an
action date for a process or signature (see page 1596).
Process Enter a number in the Interval field and the select the Unit of measurement. This specifies the total duration in
Due which the process is due.
Field Description
Signature Enter a number in the Interval field and the select the Unit of measurement. This specifies the total duration in
Due which each signature for the process is due.
Note: If you enter a value more than what is specified in Process Due, this value is ignored. The value in Process
Due is then used to compute the action date, instead of the one you specify in this field.
Buffer Enter a number in the Interval field and the select the Unit of measurement. This buffer period is considered as a
Period delta to be deducted from all process intervals, except Signature Due, when computing the action date.
Enable Select Yes to use the Preview feature in calculating the Signature Due Date. The Preview feature is used to fetch
Preview information about the future approvers, to calculate the total number of signatures required to complete the
process. The Signature Due interval is then computed as the Process Due interval divided by the total number of
signatures required. Select No to avoid the use of the Preview feature. In this case, only the value specified in
Signature Due is considered.
Note: This field is used only in the case of Parent-Child and Level processes. The value of this field is not
considered when calculating the Signature Due interval for ad hoc requests.
More Select the menu from which to derive user names for the corresponding operations. The selected menu
Information determines the list of users that appears when a user creates a More Information request (by adding a question or
Reassign comment), or chooses to reassign a request, or to assign a request to an ad hoc approver. If you do not specify a
Ad-hoc menu for any of these operations, users do not have the option of choosing names from a user list; they can
continue with the operation by entering login names manually.
Rejection Justification
Require Select Yes to make it mandatory for an approver to provide a justification when rejecting a request. In addition to
Justification storing the justification in various approval server fields, it is pushed to the application form's field specified in the
on Justification Field menu. Select No to indicate that rejection justification is optional; an approver is not prompted to
Rejection justify rejecting a request. However, if provided, the justification is processed further.
Justification Select the field in which to store the rejection justification. This menu lists Character fields from the application form.
Field
Note: Currently, this menu also displays Attachment fields along with Character fields, because of an AR System
server issue.
From the list of available fields, select a Character field whose length is unrestricted (0 ). Otherwise, if the approver
enters a justification of more than 255 characters:* A warning is added to the approval log.
If you do not select a field from this menu, the approver's input is stored in the Justification field (ID 14518) on AP:
Signature and as a comment of the Justification type on AP:Question-Comment-Info. See AP-Rejection
Justification form (see page 1724).
The three tabs (Normal, Urgent, and Low) on the Signature Escalation tab contain identical fields.
Use schedules
Business Use the drop-down list to select a workday schedule created on one of the business time workday forms.
calendar
Holiday Use the drop-down list to select a holiday schedule created on one of the business time holiday forms.
calendar
Automatic action
After Type a numeric value for the amount of time to pass before this action is taken. For example, type a 2 for two hours
Interval or two days. The unit is determined in the next field.
Note: This is called the Automatic Action interval, which is used to compute the action date for the corresponding
process.
Unit Select the unit of Hours or Days as the unit for the interval in the previous field.
Change Use the drop-down list to select the status you want to force on this request if no activity occurs in the interval defined
State in the two preceding fields. Leave this field and the preceding two empty if you do not want the status of a request
changed automatically.
Note: This reflects on AP:Show-Detail > Action Date field and Approval Central > Action Date column. See AP-Show-
Detail form and Approval Central.
Notifications (Notification: Still Outstanding and Notification: Still in State) are used to determine the escalation or notification
mechanism for signatures on a request.
Notification: Still Outstanding Use these fields to send a notification to an approver whose signature is in Pending or Hold state for
a specified interval.
First Type a numeric value for the amount of time to pass before this notification first occurs.
Interval
Note: This is one of the Escalation intervals, which is used to compute the action date for the corresponding process.
Unit Select the unit of Hours or Days for the interval in the previous field.
Note: This reflects on Approval Central > Past Due requests > Action Date column. See Approval Central.
Field Description
Repeat Type a numeric value for the amount of time to pass before this notification recurs. For example, type a 2 for two
Interval hours or two days. The unit is determined in the next field.
Unit Select the unit of Hours or Days for the interval in the previous field.
On State Set the separate escalation and repeat intervals to occur when a form is saved with the status of Pending, Error,
Hold, or More Information.
First Type a numeric value for the amount of time to pass before this notification first occurs. For example, type a 2 for two
Interval hours or two days. The unit is determined in the next field.
Note: This is one of the Escalation intervals, which is used to compute the action date for the corresponding process.
Unit Select the unit of Hours or Days for the interval in the previous field.
Repeat Type a numeric value for the amount of time to pass before this notification recurs. For example, type a 2 for two
Interval hours or two days. The unit is determined in the next field.
Unit Select the unit of Hours or Days for the interval in the previous field.
Use schedules
Business Use the drop-down list to select a workday schedule created on one of the business time workday forms.
calendar
Use the drop-down list to select a holiday schedule created on one of the business time holiday forms.
Field Description
Holiday
calendar
First Type a numeric value for the amount of time to pass before this action first occurs. For example, type a 2 for two
interval hours or two days. The unit is determined in the next field.
Unit Select the unit of Hours or Days for the interval in the previous field.
Repeat Type a numeric value for the amount of time to pass before this action recurs. For example, type a 2 for two hours
interval or two days. The unit is determined in the next field.
Unit Select the unit of Hours or Days for the interval in the previous field.
AP-Question-Comment-Info form
The approval server uses this form internally to store additional information that requestors and
approvers provide about requests.
The following table describes the data stored in this form and the source of that data.
Question Stores text from the Question field on AP:Show-Detail or AP:More Information.
Comment Stores text from the Summary field on AP:Show-Detail or the Comment field (if added) on the application form. If
you add an activity log entry of the Justification type on AP:Show-Detail, text from the Summary field is also stored
here. Attachments associated with comments are stored in the attachments table adjacent to this field.
Justification Stores text from the Justification For Action field on AP:Show-Detail or Approval Central. If the Justification For
Action field and its appropriate workflow is added to the application form or the three-way join form, the
corresponding text is stored here.
This form also stores the text from the following sources:
Form Field
AP:Show-Detail
Response
Notes
Field Description
Name Type Click the option button to select whether the word is a keyword or function.
Assignee Group Permissions Select the name of the special control group for you want to have row-level permissions.
AP-Role form
This form opens when you click View or Create on the Role tab of AP:Administration. Process
administrators use this form to create role definitions for approval processes. See Defining roles
(see page ).
For more information about the Administrative Information tab, see Administrative Information tab
(see page ).
This field is valid only if more than one entry exists in the Member List field.
Status Use the drop-down list to select the status of this role.
Member List Type the AR System user name for each person who is a member of this role. Use a semicolon (:) as a separator
between names.
Basic tab
Process administrators use this form to create and modify rules for approval processes. See Using
Definition
Rule Name Type a name for this rule. The name of a rule can be as long as 254 characters in English and most European
languages, but only 127 characters in double-byte languages.
For Process Use the drop-down list to select a process for this rule.
Process The BMC Remedy AR System automatically populates this field with the GUID of the process.
Instance ID
Order Type a number to determine execution order for this rule. Larger numbers execute after smaller numbers. Rules
with the same number in this field execute in an unpredictable order.
Status Use the drop-down list to select the status of this rule.
If Multiple Use the drop-down list to select the behavior when multiple results are found.
Results
Value from First — The approval server uses the value from the first record retrieved.
Values from All — The approval server uses all of the values retrieved.
Return Error — The approval server produces an error message if more than one record is retrieved.
Next Use the drop-down list to select the behavior when multiple Get Next Approver rules exist.
Approver
Rule Is Additive — This rule appends approvers to the existing approver list, and further rules are processed.
Ending — This rule appends additional approvers to the existing approver list, but no further rules are
processed.
Exclusive — This rule assigns the approver list, and no further rules are processed. If a previous rule
created an approver list, the process ignores it.
This field is usually used for a Rule-Based process that has a set of Get Next Approver rules to build an approver
list.
Assignee Error 333 and Assignee Group Permission (see page 4540)
Group
Permissions
Qualification
Run if This field label appears for the following rule types:
Get Authority
Get Authority Regular
Get Authority Self
Get Next Approver
Parameterized Get Next Approval Rule
Prep Get Next Approver
Signature Accumulator
Statistical Override
Validate Approver
Enter the qualification in the Run If field. Use the buttons and drop-down list to help. See Using the Rule tab on AP-
Administration (see page 1623). In addition, you can dynamically define the search criteria by using the EXTERNAL
keyword. When using the EXTERNAL keyword, make sure you see fields using single quotes instead of dollar
signs, for example:
'Submitter' = "John"
$Submitter$ = "John"
the value from the current transaction will be returned: "John" = "John"
Rule This field label appears for the following rule types:
Auto Approval
Self Approval
Completion Rule
Enter the qualification in the Rule field. Use the buttons and drop-down list to help. See Using the Rule tab on AP-
Administration (see page 1623). In addition, you can dynamically define the search criteria by using the EXTERNAL
keyword. When using the EXTERNAL keyword, make sure you see fields using single quotes instead of dollar
signs, for example:
'Submitter' = "John"
$Submitter$ = "John"
the value from the current transaction will be returned: "John" = "John"
Audit text This field appears for Auto Approval and Self Approval rules. Type the text you want to appear in the permanent
record for the request whenever this rule executes. Use the drop-down list to select keywords to include in your
audit trail message.
Rule State This field label appears for Approval Process Done rules. Select one or more rule conditions from among the radio
buttons. The options are:
Approved
Rejected
Cancelled
Error
The rule executes when the approval detail record moves to the selected state.
Guaranteed
Add Yes — The parameterized rule runs even when a Completion rule would otherwise determine that the
process is done, thus guaranteeing that the user will be added as an approver.
No — (Default) If a Completion rule determines that the conditions exist for the process to be done, the
process does not return to the Get Next Approver stage to run this rule.
The Set Fields tab appears only when you select a rule type for which you can specify a Run If
qualification and the subsequent Set Fields actions.
Set Fields Select an item from the drop-down list to specify how the rule should populate this field type. The options are:
Type Value, Query, SQL, Process, and Other.
From Form For a query, select the name of the form that contains the data to retrieve.
On Server Use the drop-down list to select the server that contains the form.
Current — Select this option if the form resides on the same server as the approval server.
Alternate — Select this option if the form resides on another server.
Server Type the name of the server that holds the form. This field is available only when the On Server field contains the
value Alternate.
Separator Type the letters, numbers, or symbols to use when separating multiple entries set in the same field. This field is
string disabled with some options available in the Set Field Type field.
Qualification
SQL Type a qualification or use the other fields to select functions or keywords. You can dynamically define the search
Command / criteria by using the EXTERNAL keyword. When using the EXTERNAL keyword, make sure you see fields using
Qualification single quotes instead of dollar signs, for example:
'Submitter' = "John"
$Submitter$ = "John"
"John" = "John"
Fields data
Field name Type a field name or use the drop-down list to select a field name. The Field Name field is disabled with some
options available in the Set Field Type field. One rule can populate more than one field by using separate lines for
Field Name and Value.
Value Type the value or use the drop-down list to select a value to populate the field. The Value field is disabled for some
Set Field types. One rule can populate more than one field by using separate lines for Field Name and Value.
For more information about the Administrative Information tab, see Administrative Information tab
(see page ).
AP-Signature form
This form stores the signature lines for approval requests. Administrators can use this form to
review the responses to a request. However, you should modify this information only through
Approval Central.
AP:Signature form
Field Description
Approval ID The BMC Remedy AR System populates this field with the AR System ID for this request.
Approvers The BMC Remedy AR System populates this field with the name of the approver for this signature line.
Field Description
More The BMC Remedy AR System populates this field with the questions and answers to More Information
Information Requests.
Approval Status The BMC Remedy AR System populates this field with the status of the request.
Next Approver The BMC Remedy AR System populates this field in an ad hoc situation with the name of the next approver.
If Multiple This field is valid only if multiple entries exist in the Next Approver field. Select one of the options:
Approvers
One Must Sign — A single signature entry is created for all approvers in the Next Approver field. Only
one of those approvers needs to take action on the request.
All Must Sign — Separate signature entries are created for all approvers in the Next Approver field. All
approvers must act on the request for it to move to the next stage.
Alternate The BMC Remedy AR System populates this field with the user name of an alternate approver, if the alternate
Signature acts on the request.
Approver The BMC Remedy AR System populates this field with the user name of the approver when the approver acts
Signature on the request.
Signature The BMC Remedy AR System populates this field with the method by which this request was approved.
Method
Alternate — An alternate signed this request instead of a normally scheduled approver.
Regular — A normally scheduled approver signed this request.
Override — Someone with process administration authority performed an override to respond to this
request instead of a normally scheduled approver.
Assignee The BMC Remedy AR System populates this field with the Assignee Group for the request. This field supports
Group the multi-tenancy feature.
Permissions
Full Name Used to store the full names of approvers to whom the corresponding request is assigned.
Role ID Used to make a signature role aware. For more information, see Creating signature escalations (see page )
.
The approval server automatically drops duplicate signature lines if an approver appears in multiple
groups to which a request is assigned or if there are duplicate individual mappings.
In such an event, entries such as the following are recorded in the approval log:
You can safely ignore such log entries. The signature lines are dropped because the approval
server maintains only one signature line for an approver per request until the associated process is
active.
Full Name
The approval server uses the login name to search for the corresponding full name when creating
a signature entry. It first searches the User forms, and if they do not full name information is not
present, it searches the custom form specified on the AP:Process Definition form. This information
is stored in the Full Name character field (14201). See Full name form (see page 1689).
If there is no custom Full Name Form, or if the full name information is not found through this form,
the login name is used as default.
Setting the full name on a signature line is a one-time activity; this value is not set at run time. The
full name provided at the time of signature line creation stays constant. When upgrading to release
7.5.00 or later, if the Full Name value is not available, it is set according to the current Full Name
value from the related form. If the Full Name value must be set dynamically, application developers
must write the appropriate escalations. Applications can fetch user information from different forms,
such as the User form, the CTM:People form, and so on.
Role ID
If a signature is created by expanding a role, the Role ID character field (14200) stores the role ID
of the source role, which was expanded to create the individual signature line. The following
situations could occur:
If a role has One Must Sign set to true, only one signature entry is created for all the
members belonging to the role. The related role ID is copied to the Role ID character field.
If a role has All Must Sign set to true, the role ID is copied to each signature entry that is
created by expanding the role.
Depending on the process definition, the signature entries are created as follows:
When One Must Sign is defined at the process level, only one signature entry is created,
regardless of the If Multiple Approvers setting at the role level. In this case, the individuals
defined as approvers and the individuals expanded from the roles provided as approvers
appear in a single signature entry. Role IDs for all the roles in the approvers list are put in
the newly added field on the AP:Signature form for the corresponding signature.
When All Must Sign is defined at the process level, multiple signatures are created
according to the If Multiple Approvers setting at the role level. In this case, each signature
entry contains the role ID that was responsible for creating the entry by expanding the
individuals in the role.
The Role ID field remains blank for individuals in the approvers list.
The Role ID field can have a single role ID or multiple roles IDs based on the definitions. All
role IDs are enclosed between semicolons.
Consider a case where a role is defined as an approver, which in turn is composed of roles.
When this is expanded recursively to write individuals in the signature entry, the Role ID
field has the role ID of the base role that was provided as the approver.
For example: The Finance role contains the users Jim and Frank. The Purchase role
contains the users Paul and Bob. The Administrator role is a superset of Finance, Purchase,
and a few more roles. When the Administrator role is defined as an approver for a request,
even though it expands the Finance, Purchase, and other roles recursively to get individual
approvers, the Role ID fields of the signatures created for these approvers contains the role
ID of the Administrator role.
User forms
User forms are used by submitters, approvers, process administrators, and so on.
Approval Central
The Approval Central form, which acts as the approval server console, appears when you log in to
BMC Remedy AR System and click the Approval Central link on the home page. This link is
localized.
Tip
The localized link is visible only if the Localize Server option is enabled on the Advanced
tab of the AR System Administration: Server Information form. See Setting performance
and security options (see page 314).
Note
The Approval Central view is not supported on 7.0.01 or earlier versions of AR System
clients. When Approval Central is opened in version 7.0.01 of BMC Remedy Mid Tier, a
warning message is displayed and the counts against the links in the left pane are not
displayed.
Approvers use Approval Central to respond to approval requests, and to access request details.
Requesters use it to access More Information requests sent to them. See Processing approval
requests (see page 1017).
Approval Central enables you to quickly review the approval requests awaiting your attention.
These could be direct requests or requests for which you act as an alternate approver. You can
approve, reject, hold, or view the details of a pending request by using the appropriate buttons
provided in the form. You can act on single or multiple requests at one time without opening each
request individually.
You can reassign a pending request only if the Can Reassign option for the corresponding
approval process is set to Yes in AP:Process Definition.
When you open Approval Central, the Pending Approvals table appears by default, and it displays
requests that have the Pending, Hold, or More Information status.
The left pane contains two sections: Summary and Actions. Clicking a link in these sections
displays a corresponding panel in the right pane.
Summary
The links in this section correspond to pre-defined searches. A table in the corresponding panel on
the right displays the search results. See Approval Search Result table (see page 1713).
Field Description
Pending Click to view the requests that await your approval. Such requests are in the Pending state. The following links are
Approvals displayed under the Pending Approval link:
Needs Attention
Past Due
Due Soon
For more information, see Pending Approvals table (see page 1709).
Needs Click to view the requests for which a question or answer is directed at you. Such requests are in the More
Attention Information state. The Need Attention Approvals panel displays a table with the columns: From, To, Action Date,
Description, Application, Request, and Status.
Past Due step 5 (see page 1617)step 6 (see page 1617)To enter signature escalations (see page 1616)
step 5 (see page 1617)To enter signature escalations (see page 1616)
Due
Soon
Rejected Click to view the requests that you approved earlier, but are rejected by an approver further in the approval
by Others sequence. This is a pre-defined search, the results of which appear on the right pane in the Approvals Rejected by
Others panel.
The table contains the columns: From, To, Action Date, Application, Request, and Status, which
display the corresponding information for each request.
You can perform one of the following actions on any selected request in this table:
Click Respond to answer the corresponding question. The AP:More Information form opens
in Modify mode.
Click View to open the corresponding question-answer thread. The AP:More Information
form opens in Display mode.
After you respond to a question or view the answer to a question you raised, the state of the
request changes from More Information to Pending.
Actions
Field on Approval Central — Actions section
Field Description
The right pane displays the appropriate panels when you click the link in the Summary or the
Actions sections in the left pane. You can expand or collapse these panels using the arrow icon
next to the panel title.
Some rows might have a bell icon displayed in the first untitled column, indicating that the
corresponding request is Urgent.
The second untitled column contains check boxes that you can use to select the corresponding
requests. Use the check boxes to select multiple requests on which you want to perform similar
actions or use the check box in the table header to select all the requests.
Clicking on a row without using the corresponding check box, will select that row and deselect
everything else. To select or deselect all the requests in this table, select the check box in the table
header. See Working with multiple pending requests (see page 1715).
Note
When you click Approve, Reject, or Hold, the status of the selected requests
changes. These modified requests continue to appear in the Pending Approvals
table until the table is refreshed, or until you navigate to another page or link.
When you click a row-level icon without explicitly selecting the row, the row gets
selected first. To execute any row-level action, the row must be selected first.
Field Description
Action Date Signature Escalations tabs (see page 1695)step 5 (see page 1617)To enter signature escalations (see page 1616)
Summary The description associated with the Request ID (Application ID). This value is populated from field 14506 on AP:
Detail that contains the Description value for the associated application request. When you hover over this field, a
tool tip displays the information mapped in the Tooltip Configuration tab of AP:Form. This additional information
helps you take a quick decision about the request.
Note
This tool tip appears only if the appropriate setting is done on the Tooltip Configuration tab of AP:Form.
See AP:Form form (see page ).
Requester The name of the requestor. This information is obtained from the three-way join form for the related application.
Acting As The name of the approver to whom the request is originally assigned. This field contains a value only if you are the
alternate approver for the original request assignee.
Priority The priority of the approval request that is stored in the corresponding AP:Detail record. The possible values are:
Urgent, Normal, and Low.
Application The application name associated with the request. For example: SRM, Change Management. This name is
provided by the application itself.
Status The current state of the request. The possible values are: Pending, Approved, Rejected, Cancelled, Hold, More
Information, Error, and Closed.
Reject icon Justification For ActionRejection justification for approval requests (see page 1021)
In case of approval generated by a Process Designer process, the Hold option is not supported for SRM and
Change requests.
Reassign Click to reassign the selected request to another person. If Can Reassign is set to Yes for the corresponding
icon process, the AP:Reassign dialog box prompts you to enter the name of an approver; otherwise an error is
displayed. For more information, see Reassigning approval requests (see page 1037).
In case of approval generated by a Process Designer process, the Reassign option is not supported for Service
Request Management (SRM) and Change requests.
Note
The AP:Reassign dialog box appears only once, which means that all the selected requests are assigned
to the same person. Validation for the user name entered in the dialog box is not provided out-of-the-box.
Approval Click to open the AP:Show-Detail form, which displays the details of the highlighted approval request and enables
Details icon you to take further action.
Note
When you click the Approval Details icon on the Approval Central form, if the AP:Show-Detail form does
not load the sequence diagram, the following error message appears: Error during loading
document
To fix the issue, perform the following steps:
For more information, see Working with request details. (see page 1022)
View Click to display all the questions and responses, if any, for the selected request. If there is no question for the
Questions selected request, the following pop-up message is displayed:
and
Responses No Questions Present
icon
Preferences Click to set the preferences to display items in this table. You can choose to display or hide a column, set the
refresh interval, and reset or save the display settings.
Justification Enter some meaningful text in this field to be recorded as a justification for your action, and click Reject. An entry is
For Action added to the Activity Log table. If you click any other action button, this field is ignored. For information about how
your input is processed, see Rejection justification for approval requests. (see page 1021)
Approval Search
Enables you to specify criteria for searching through approval requests. Select or enter field values
in this section of the form to search for requests and display the results in the Search Results table.
Quick search
Select an approval status from the Show list to search for requests with the selected status. The
default status is Pending. After you select a value for this field, the Search Results table is
refreshed.
To filter your search results further, you can enter a search string in the text box, and click the
Search icon. The approval server finds all the requests with the selected status, that also contain
any of the specified words in a field, instead of matching a string of characters. This search action
tries to match the search string to the data present for the Summary, Application, and the
Requestor fields for the requests.
Advanced search
You can also use Advanced Search to specify a detailed search criteria.
Note
Field Description
Application Select an application from the list of available applications. Select the name of the approval request form from the
list to search for approval requests related to that form.
Process Select a process. If you select an application, only the processes belonging to that application appear in this menu.
Acting As Select a value from the list to search for requests with the selected type of approver authority. The default is Myself.
If you choose All and perform a search, the resulting list contains the same requests that appear when you click the
Pending Approvals link.
Note
User Contains the name of the current user or the user on whose behalf you are acting as alternate or performing an
override.
If Acting As is set to Myself or Global Override, BMC Remedy AR System populates this field with the name
of the current user.
If Acting As is set to Alternate or Override, you must enter the AR System name of the user for whom you are
acting as an alternate, or performing an override.
Approval Select an approval status from the list to search for requests with the selected status. The default is Pending.
Status
Requester Type all or part of a requester's BMC Remedy AR System full name to search for approval requests from that
requester. The search results display the requests created by this requester only if you have the correct privileges
on the corresponding requests.
Summary Enter one or more words in the summary that you want to search for.
Action Signature Escalations tabs (see page 1695)step 5 (see page 1617)To enter signature escalations (see page 1616)
Date
Priority Select the priority. This is the priority of the approval request and not that of the application request.
Modified Select the date on which the requests you want to search for were last modified.
Date
Search Click to perform the search after you specify all the required criteria.
Some rows might have a bell icon displayed in the first untitled column, indicating that the
corresponding request is Urgent.
The second untitled column contains check boxes that you can use to select the corresponding
requests. Use the check boxes to select multiple requests on which you want to perform similar
actions.
Clicking on a row without using the corresponding check box selects that row and deselect
everything else. To select or deselect all the requests in this table, select the check box in the table
header. See Working with multiple pending requests (see page 1715).
Note
When you click Approve, Reject, or Hold, the status of the selected requests changes.
These modified requests continue to appear in the Pending Approvals table until the table
is refreshed, or until you navigate to another page or link.
Field Description
Action Date Signature Escalations tabs (see page 1695)step 5 (see page 1617)To enter signature escalations (see page 1616)
Summary The description associated with the Request ID (Application ID). This value is populated from field 14506 on AP:
Detail that contains the Description value for the associated application request. When you hover over this field, a
tool tip displays the information mapped in the Tooltip Configuration tab of AP:Form. This additional information
helps you make decisions about the request.
Note
This tool tip appears only if the appropriate setting is done on the Tooltip Configuration tab of AP:Form.
See AP:Form form (see page ).
Requester The name of the requestor. This information is obtained from the three-way join form for the related application.
Acting As The name of the approver to whom the request is originally assigned. This field contains a value only if you are the
alternate approver for the original request assignee.
Priority The priority of the approval request that is stored in the corresponding AP:Detail record. The possible values are:
Urgent, Normal, and Low.
Application The application name associated with the request. For example: SRM, Change Management. This name is
provided by the application itself.
Status The current state of the request. The possible values are: Pending, Approved, Rejected, Cancelled, Hold, More
Information, Error, and Closed.
Reject icon Click to reject the selected request. If rejection justification is mandatory, but the Justification For Action field is
empty, a dialog box prompts you to enter a reason for rejecting the request. See Rejection justification for approval
requests. (see page 1021)
Reassign Click to reassign the selected request to another person. If Can Reassign is set to Yes for the corresponding
icon process, the AP:Reassign dialog box prompts you to enter the name of an approver; otherwise an error is
displayed. For more information, see Reassigning approval requests (see page 1037).
Note
The AP:Reassign dialog box appears only once, which means that all the selected requests are assigned
to the same person. Validation for the user name entered in the dialog box is not provided out-of-the-box.
View Click to display all the questions and responses, if any, for the selected request. If there are no questions for the
Questions selected request, the following pop-up message is displayed:
and
Responses No Questions Present
icon
Preferences Click to set the preferences to display items in this table. You can choose to display or hide a column, set the
refresh interval, and reset or save the display settings.
Justification Enter some meaningful text in this field to be recorded as a justification for your action, and click Reject. An entry is
For Action added to the Activity Log table. If you click any other action button, this field is ignored. For information about how
your input is processed, see Rejection justification for approval requests. (see page 1021)
Note
Multiple row selection does not work for requests of the Needs Attention category.
You can now select multiple requests and change the status. When you click the appropriate action
button, a guide runs through the individual requests and performs the actions. If one or more of the
associated processes require passwords, you are prompted to provide them once, before the
action is performed.
Setting display preferences on Approval Central
Use the Preferences menu to set display preferences for the tables on this screen as follows:
Save — Click to save any changes you made to the appearance of the table or the refresh
interval. These changes are saved only for the current session and are not persistent, which
means they are not retained when you log out and log in again.
Action buttons
You can select one or more requests on Approval Central and click the appropriate buttons to
perform the desired actions. The buttons are disabled only if there are no requests to be selected.
Selecting one or more requests enables all the action buttons regardless of the status of the
request. If a certain action can not be performed on a selected request, one of the following occurs:
Clicking the action button has no effect. For example, if you select a request that is on hold,
clicking the Hold button will have no effect.
Clicking the action button displays an error message and the request remains unchanged.
For example, if you select an request with the Approved, Rejected, or Error status and click
either Approve, Reject, Hold, or Reassign, the following error message is displayed:
Select atleast one row with appropriate status to perform the buttonLabelaction. (ARERR
errorNumber)
Approve Click to approve the selected requests. If other approvers are required, BMC Remedy AR System routes the
Selected requests to the respective next approvers. If no further approvers are required, the request statuses change
to Approved, and the approval process is done.
Reject Click to reject the selected requests. If rejection justification is mandatory, but the Justification For Action field
Selected is empty, a dialog box prompts you to enter a reason for rejecting the request. The same comment is applied
to all the selected requests. See Rejection justification for approval requests. (see page 1021)
Hold Click to put the selected requests on hold. The request statuses change to Hold until any further action is
Selected performed on them.
Request Details
The Request Details section displays all the data related to an approval request. This data is
fetched from the AP:Show-Detail form. For more information, see AP:Show-Detail form (see page
1724).
For information about the approval request details, see AP:Detail form (see page ).
Field Description
Request Displays the application ID (the request ID or any other ID in the application) as a link. Click the link to display the
ID relevant application form.
Note
If you upgrade from an earlier version of the BMC Remedy Approval Server to 7.5.00 or later, this link
displays the correct application ID for newly created requests. The application ID might not be accurate for
requests that were created before upgrading. To specify the value for this link, the process administrator
must map the Application Request ID field on the Advanced tab of AP:Form to the appropriate field on the
application form. See AP:Form form (see page ).
When you click any of the Approve, Reject, or Hold, or Reassign icons, a dialog box prompts you
to enter your password. The statuses of the selected requests are changed only if you provide a
valid password, otherwise an error message is displayed.
More Information
The More Information section enables you to add questions or comments to the current request in
a table.
To modify or delete questions or comments associated with the current request, you must go to the
Activity Log tab on the AP:Show-Detail form.
For more information, see Activity Log tab (see page 1728).
Type This drop-down list enables you to specify whether you are creating a comment or a question.
Question Select a name from the user list or enter the AR System login name of the person to whom you want to raise a
To question. This field is enabled only if you select Question from the Type drop-down list. Using the Question To field,
an approver can ask questions to the requestor or any other person who belongs to the same group as the approver.
Note
The approval server does not have any way to know where a particular user's details are stored. (The
consuming applications are responsible to validate the login name.) The source of a user could be any
form other than the User form that the BMC Remedy AR System provides, for example, the user
information could be retrieved from an LDAP server.
Question This field is labeled as Question when you choose to add a question to the approval request; enter the question
/ here. It is labeled as Summary when you choose to add a comment; enter the brief comment here.
Summary
Response This field is labeled as Response when you view a question about the approval request; the corresponding response
/ Notes appears here. It is labeled as Notes when you choose to add a comment; enter the detailed comment here.
AP-AdhocDialog form
This form appears when you click the Adhoc button on the AP:Show-Detail form for a request. The
appearance of this dialog box is dependent on the value of the Ad Hoc Settings field on the AP:
Process Definition form; it appears only if the Default option is selected. However, if the process
administrator selects the User Defined option, the custom dialog box for the corresponding form is
displayed.
The AP:AdhocDialog form shows the list of existing ad hoc approvers, if any, and enables you to
add to or remove from this list. If the table contains multiple rows, the first row is selected by default.
AP:AdhocDialog form
Name Select a name from the user list or enter the name of a new ad hoc approver. You can also specify multiple ad hoc
approvers by typing their names separated by semicolons. If you select a row in the following table, the
corresponding approver name appears in this field, but you can modify and save it.
Sequence Enter or modify the sequence at which to add the ad hoc approver. The default is 1.
Yes — Indicates to the approval server that the request can proceed to the next level of its process without
waiting for the signature of the current ad hoc approver.
No — Indicates to the approval server that the current ad hoc approver's signature is required before the
request can proceed to the next level of its process.
Preferences Click to set the preferences to display items in this table. You can choose to display or hide a column, set the
refresh interval, and reset or save the display settings.
Note
Note
Add Click to add a new ad hoc approver, after you enter appropriate values in the fields.
Modify Select a row that you have not yet saved, and click to modify the details of the corresponding ad hoc approver.
Note
This button remains disabled when you select rows that have already been saved.
Delete Select one or more rows using the corresponding check box and click to delete the association of the
corresponding ad hoc approvers with the current request.
Save Select one or more rows using the corresponding check box and click to save the new ad hoc approvers to the AP:
AdhocDetails form.
Note
Even though a row is added to the table, it is not saved until you explicitly select it and click Save.
Close Click to close the dialog box; if there are any unsaved records in the table, you can confirm whether to return to
the dialog box and save them or ignore them and close the dialog box. If you make any changes to the list of ad
hoc approvers, the contents of the Approver tab reflect the same.
Note
After you add an ad hoc approver at the current level and save the record (the data is
saved in the AP:AdhocDetails form), you cannot modify it. If you need to make changes,
delete the existing ad hoc approver record and create a new one. You can modify the
record of an ad hoc approver who is assigned for a future level.
AP-Alternate form
Approvers use this form to create, delete, maintain, and search alternate approvers to take action
on their behalf. However, they are not permitted to define alternate approvers for anyone other
than themselves.
Alternate Type the AR System user name of the person who is to act as alternate.
For BMC Remedy AR System automatically populates this field with the user name of the current user.
Note
Start Date Open the calendar control and select the date and time when the alternate's authority begins.
End Date Open the calendar control and select the date and time when the alternate's authority ends.
Notify Alternate Select whether the alternate is notified when a request comes to the original approver.
To notify alternates, the process administrator must perform the following tasks:
Covering Select a value to identify which processes are included in this alternate's authority.
All — This alternate has authority to approve all processes for which the original approver has
authority.
Specific Process — This alternate has authority for only the process specified in the Process field.
Process If you selected Specific Process, select the process for which the alternate has authority.
Process Instance BMC Remedy AR System automatically enters the GUID of the process selected in the Process field.
ID
Status BMC Remedy AR System automatically completes this field based on the server's current date and time.
Alternate ID BMC Remedy AR System populates this field with an AR System ID for this record.
Create Date BMC Remedy AR System populates this field with the date this alternate was created.
Assigned To Type the name of the original approver assigning authority to this alternate. The default is the current user.
Help Text Type information to aid users who are setting up alternates.
Change Type any additional information to be recorded with the alternate assignment. This information becomes part of
history the permanent record for this alternate.
Last Modified BMC Remedy AR System populates this field with the name of the person who last modified this alternate.
By
Last Modified BMC Remedy AR System populates this field with the date of the last modification to this alternate.
Date
AP-Dtl-Sig-MoreInfoDialog form
This form appears when you click More Information on the AP:Detail-Signature form, or Manage
More Information on the three-way join forms in the sample applications. When opened, it is
populated with a list of More Information requests related to the current approval request.
AP:Dtl-Sig-MoreInfoDialog form
Field Description
Existing More This field displays any More Information records attached to the current approval process.
Information records
Preferences Click to set the preferences to display items in this table. You can choose to display or hide a column, set
the refresh interval, and reset or save the display settings.
New Record Opens the AP:More Information form in New mode, where you can create a new More Information
request.
Field Description
To Select the recipient's name from the menu, or enter the recipient's AR System user name. You can not select or
enter multiple names in this field. The user names in this drop-down list are determined by the menu specified in the
process definition. For more information, see AP-Process Definition form (see page 1689).
From AR System user name of the sender of the More Information request. This field is read-only after the record is
saved.
Assignee The BMC Remedy AR System populates this field with the Assignee Group for the request. This field supports the
Group multi-tenancy feature.
Permission
AP-Password form
This form appears when an approver clicks Approve, Reject, or Reassign on Approval Central for a
request whose process requires a password. An approver must enter the correct AR System user
password and click Submit. If the password in authenticated, the request status is changed.
Otherwise, an authentication error is displayed and no action is taken on the request.
Field Description
Submit Enter the correct password to approve or reject the request, and click to submit the password for authentication. If
authenticated, an Approve or Reject action occurs. If not authenticated, BMC Remedy AR System returns an
authentication error.
Cancel Click to close the dialog box without submitting the password. No action is taken on the request.
AP-Reassign form
This form appears when an approver selects one or more approval requests on Approval Central
or opens the AP:Show-Detail form for a record, and clicks Reassign.
Select a name from the user list or enter the precise AR System login name of the approver to
whom you want to reassign the request, and click OK.
If the requests you selected belong to different processes, each of which have a different menu
configuration for the user list, the user list pertaining to the first request is displayed. To choose
from the appropriate user list for a request, work with a single request at a time.
Click Cancel to close the dialog box without performing any action on the request.
Enter the justification for rejecting the request, and click OK.
When rejecting multiple requests simultaneously, the dialog box appears only once. The
same comment is added to the activity log of all the selected requests.
Click Cancel to close the dialog box without providing a comment.
If the process mandates rejection justification, the Reject action is skipped and a message
to that effect is displayed. The request remains in the Pending state.
AP-Show-Detail form
The AP:Show-Detail form displays all the data related to an approval request. This data is fetched
from the AP:Detail form.
The P-C Phase, P-C GL Account, P-C Cost Center, and P-C Total Cost are generic character
fields, which application developers can use to show additional character data. The labels of these
fields can also be changed dynamically so that the labels are in sync with the values. These labels
are localized.
Note
Localized labels are visible only if the Localize Server option is enabled on the Advanced
tab of the AR System Administration: Server Information form. See Setting performance
and security options (see page 314).
The Action Date field indicates the duration after which the state of the approval request is
changed automatically or a notification is sent to the relevant approver to act on the same. This
occurs only if it is so defined in the process. For more information, see AP-Process Definition form
(see page 1689) and Creating signature escalations (see page 1615).
View a history of activities on a request for any approval process in the form of a table or a
flowchart.
Add or remove ad hoc approvers to the approval chain.
Add and view questions, comments, notes, and attachments for further information.
Field Description
Approver Displays the approval process preview for the current request as a flowchart or a table.
tab
Activity Displays the list of questions and comments associated with the current request in a table. You can also add or
Log tab delete questions and comments.
Reassign Click to reassign the current request to another person. If Can Reassign is set to Yes for the corresponding process,
a dialog box prompts you to enter the name of an approver; otherwise an error is displayed.
Adhoc Click to add ad hoc approvers to the approval chain or remove existing ad hoc approvers for the selected requests.
The table or flowchart in the Approver tab is updated accordingly. The Adhoc button is disabled in the following
conditions:
If the Default option is selected for the Ad Hoc Settings of a process, the AP:AdhocDialog appears for the
corresponding request. See AP-AdhocDialog form (see page 1718).
When you click any of the Approve, Reject, Reassign, Hold, or Adhoc buttons, a dialog box
prompts you to enter your password. The request status is changed, or the AP:AdhocDialog form is
displayed, only if you provide a valid password, otherwise an error is displayed.
Approver tab
This tab displays a preview of the processes through which the current request might traverse until
it reaches the Completion Check stage.
Field Description
Preview Type: Click to see a preview of how the current request might traverse through the current approval process. This
Current preview is generated after the process begins (when the detail and signature records for the current request
Process Only have been created).
Zoom Click the icon to see an enlarged flowchart view in a new window.
Note
Note
This button is provided because the mid tier does not allow the use of the F5 key (Windows) to refresh
the contents of the current screen.
A legend at the bottom of this tab indicates the meaning of the status icons attached to each
signature in the preview.
Note
When the AP:Show-Detail form is viewed through versions earlier than 7.5.00 of BMC
Remedy Mid Tier, the Preview Type option on the Approver tab is unavailable (disabled).
Sequence diagram
The sequence diagram is a flowchart representation of the approval chain for the current request. If
you add or remove an ad hoc approver, or perform any other action on the request, it is reflected in
the flowchart immediately. If an approver name is not available, the flowchart displays empty
blocks in its place. The flowchart displays only valid approvers.
The flowchart view is localized. Its elements can be displayed in all languages available with BMC
Remedy AR System.
Note
Localized data is visible only if the Localize Server option is enabled on the Advanced tab
of the AR System Administration: Server Information form. See Setting performance and
security options].
The flowchart view is available out-of-the-box on the AP:Show-Detail form, which has two related
active links, namely, the AP:Show-Detail-LoadObject and AP:Show-Detail-HandleEvent forms.
Note
The DVF cannot be seen using Firefox 2.0.0.11 on Mac 10.4.11. This is an issue with the
browser.
The flowchart view is backward compatible with BMC Remedy Mid Tier releases 7.1.00 and 7.0.01.
You can use BMC Remedy Mid Tier to see the flowchart view for an approval request.
Note
When the AR System server has encryption enabled (Premium Security or Performance
Security), the multi-process preview flowchart might take longer to load.
Table
The table depicts the approval sequence. If you add or remove an ad hoc approver, or perform any
other action on the request, it is reflected in the flowchart immediately.
Field Description
Justification Enter some meaningful text in this field to be recorded as a justification for your action, and click Reject. An entry is
For Action added to the Activity Log table. If you click any other action button, this field is ignored. For information about how
your input is processed, see Rejection justification for approval requests (see page 1021). After you enter text in this
field and click Reject, the entry might not appear in the Activity Log table. However, the activity is recorded and the
corresponding entry is visible when the request is opened again in the AP:Show-Detail form.
Note
Like the Comment and Question options, you cannot use the Justification option to create a justification to
the approval request. Even though you select Justification from the Type drop-down list, Comment is
selected. This is because, the Justification option is used to display existing justifications for the rejected
requests.
Activity Log This section enables you to add, modify, and delete comments, questions, notes, and attachments to the current
Details request.
Type This drop-down list enables you to specify whether you are creating a comment or a question.
Question Select a name from the user list or enter the AR System login name of the person to whom you want to raise a
To question. This field is enabled only if you select Question from the Type drop-down list. Using the Question To
field, an approver can ask questions to the requestor or any other person who belongs to the same group as the
approver.
Note
The approval server does not have any means to know where a particular user's details are stored. (The
consuming applications are responsible to validate the login name.) The source of a user could be any
form other than the User form that BMC Remedy AR System provides, for example, the user information
could be retrieved from an LDAP server.
Question / This field is labeled as Question when you choose to add a question to the approval request; enter the question
Summary here. It is labeled as Summary when you choose to add a comment. Enter the brief comment here.
Response / This field is labeled as Response when you view a question about the approval request; the corresponding
Notes response appears here. It is labeled as Notes when you choose to add a comment. Enter the detailed comment
here.
Attachment Use this field to add an attachment along with your comment. Only one attachment is allowed per comment. If you
view a comment that has an attachment associated with it this table field displays the file name, size, and label for
the same. Note that attachments cannot be associated with questions. This field is disabled when you select
Questions from the Type drop-down list.
Add Click to add a comment or question to the approval request. This field is enabled only if you have the necessary
permissions.
Cancel Click to cancel any new comment or question that you were trying to add to the current request.
Right click anywhere in this tab to open the Preferences context menu. This menu enables you to
refresh the contents of the table, add or remove columns from the view, set the refresh interval,
and reset or save the changes you make to the table.
Comments
This feature enables submitters (requestor and approvers) to include comments and attachments
for an approval request. These could be useful as additional information for the next approver in
the chain.
Approvers can work with comments in the following ways using this form:
Add or delete their own comments, and view the comments included by other approvers.
Include an attachment at the time of creating a comment. They can also modify or delete the
attachments associated with their own comments.
Edit or delete comments of other approvers if they are the Alternate Approvers or
Administrators. Approvers other than these can only view the corresponding details.
Provide a comment with an attachment through the application form. The workflow on the
Activity Log checks the respective application form for the requestor's comment on the
selected approval request. If a comment is available, it displays the comment in the Activity
Log table.
Modify or delete comments they created. If the requestor modifies a comment or its
attachment, or both, the Activity Log displays the modified details whenever an approver
invokes the Activity Log (or refreshes the table).
Questions
This feature enables approvers to ask questions about an approval request to requestors and other
approvers. These answers could be useful as clarifications to the current and future approvers in
the chain.
Approvers can work with questions in the following ways using this form:
Add, modify, and delete their own questions, and view the questions raised by other
approvers.
Edit or delete questions raised by other approvers if they are the Alternate Approvers or
Administrators. Approvers other than these can only view the corresponding details.
Cannot create a question because the Activity Log, which is invoked from Approval Central,
is available only to approvers. A requester does not have access to the Activity Log.
Provide the response to a question through the More Information form.
An approver can raise a question to any user of the system (or application). If the
notifications are configured, the respective user receives a notification. The user then clicks
the Response button in the Request Details section of Approval Central to open the AP:
MoreInformation form for the request.
An approver can raise only one question at a time per request because, when a question is
created, the status of the request is changed to More Information. After a requestor or
approver responds to the question, the request is again assigned the Pending status.
Approvers can modify or delete the questions they raised before the addressees respond to
them. No notification is sent in this case.
The question details in the table are associated with the Approval ID, Signature ID, and a
Question ID.
Questions cannot be redirected.
Every question can be associated with only one answer.
AP-ShowDetail-DeleteVerify form
This form appears when an approver tries to delete an Activity Log entry in the AP:Show-Detail
form. The entry could be a question, comment, or justification that the approver created.
You can delete only one entry at a time. You cannot delete entries created by the requestor or
other approvers.
Click Yes to delete the entry for the request. The corresponding record in the AP:Question-
Comment-Info form is deleted.
Click No to close the form without deleting the entry.
See Using the old Business Time forms (see page 1384).
Approval Join Fix - joinfix (See Running the Approval Join Fix utility (see page 2897))
Approval Change Schema - chgschema (See Approval Change Schema utility (see page
1612))
Approval Upgrade - upgrade (See Overview of the Approval upgrade utility in BMC
Remedy ITSM Deployment documentation)
===========================
Command:
b. If you type chgschema, and press enter, the interface displays the parameters for the
utility and prompts the user to enter the required arguments as follows:
c. If you type upgrade, and press enter, the interface displays the parameters for the
utility and prompts the user to enter the required arguments as follows:
Note
The logs for the chgschema and joinfix utilities are stored in the approval-utils.
log file located in the approvalServerInstallDir\bin directory.
The log for the upgrade utility is stored in the log file as per the -l parameter.
However, if the value for this parameter is not specified, then the logs are stored in
the approval-utils.log file.
After running the utilities, you must restart the approval server for the changes to
take effect.
Feature Details
Configure server settings for BMC Remedy SSO (see page Add a cookie domain, set session details, enable logs, and enter
702) SAML information.
Manage realms in BMC Remedy Single Sign-On (see page Add or edit realm details.
1734)
View session details (see page 1735) View the session details for a user or a realm.
Feature Details
1. Perform one of the following actions on the Realm tab of the Admin console:
a. To add a realm, click Add Realm.
b. To edit a realm, click the Edit icon for the realm that you want to edit.
2. On the General tab, enter the realm details. For more information about the realm
parameters, see Realm parameters (see page 1734).
Realm parameters
Field Description Applicable
version
Realm ID Unique realm identifier. Realm ID must not be more than 80 characters and can only include 9.0.01
alphanumeric characters and the following special symbols: *, ., _, and -. and later
Realm Comma-separated domain names of applications that are integrated with BMC Remedy Single Sign- 9.1 and
Domain(s) On. Domain names must start from the left side of the server name on which the applications are earlier
hosted. Ensure that you do not add a domain in more than one realm.
Application Comma-separated domain names of applications that are integrated with BMC Remedy Single Sign- 9.1.01
Domain(s) On. Domain names must start from the left side of the server name on which the applications are and later
hosted. Ensure that you do not add a domain in more than one realm.
URL to which a user is redirected to after the user logs out from BMC Remedy Single Sign-On. 9.1 and
earlier
Final
Logout
URL
After URL to which a user is redirected to after the user logs out from BMC Remedy Single Sign-On. 9.1.01
Logout and later
URL
Related topics
1. On the Branding tab, enter the branding details. For more information about the branding
details, see Branding parameters.
2. Click Preview to see the preview of the login page.
Branding parameters
Field Description
Company Logo Specifies the company logo. Click the Edit icon to specify the image that you want to use for the company
logo.
Background Image Specifies the background image. Click the Edit icon to specify the image that you want to use as a
background image.
Related Topic:
Field Description
Maximum Session Time Time that was associated for the session.
Related topics
Managing the BMC Remedy Single Sign-On administrator console (see page 1733)
BMC Remedy Single Sign-On authentication (see page 112)
Before using DSO, you should be familiar with BMC Remedy AR System.
Important
Distributed transfers
A distributed transfer sends information from a source form on one server to a target form on
another server or on the same server. You configure a distributed transfer by defining a distributed
mapping (see Distributed mapping (see page 1744)) and by creating workflow to perform the
transfer (see Creating workflow to perform DSO operations (see page 1750)). Then, when a request
is created or modified in the source form, that action can trigger the workflow to create a copy of
the request and transfer it to the target form. The transfer can include all or some of the data in the
request.
The following figure shows the basic flow of a distributed transfer. (The request in the darker form
has ownership after the operation is completed.) For an example of how to set up a distributed
transfer, see Distributed transfer scenario (see page 1776).
0 Gets a list of pending items to process from the distributed pending queue. The list includes details about each operation.
For information about the distributed pending queue, see Managing pending distributed operations (see page 1769).
1 Identifies the next pending item to process from the list obtained in stage 0.
2 Gets the definition of the source form associated with the pending item.
3 Gets detailed information about the request to transfer, which is identified by the request ID in the Source ID field of the
pending item.
4 Gets the definition of the distributed mapping associated with the pending item.
6 Gets the definition of the target form associated with the pending item.
7 Transfers the request from the source form to the target form.
8 After the transfer operation is complete, updates information about the status of the operation in the request identified by
the Source ID field of the pending item.
The other types of distributed operations — updates, returns, and deletes — use a subset of these
stages.
To track these stages, use the DSO logs (see Configuring BMC Remedy Distributed Server Option
logging (see page 4206)).
To modify a request, users must own it. Typically, ownership is transferred with a request.
When ownership is transferred with a request, an ownership chain is created. The ownership chain
begins with the copy of the request that has ownership — also called the — master copy (see the
definition for Master Flag in Distributed fields (see page 1746)) — and extends back through all
copies of the request from which ownership was transferred.
For example, a request on the sanfrancisco server must be resolved on the chicago server.
Therefore, you transfer the request with ownership to chicago so that chicago users can modify the
request as necessary. Depending on your workflow configuration, sanfrancisco users might receive
notice of changes made to the request on the chicago server through a distributed update
operation. But sanfrancisco users cannot modify their copy of the request unless the request is
returned with ownership through a distributed return operation.
Note
For information about mapping chains, see Setting up chained distributed transfers (see
page 1784).
Data Only No No No Typically used for archiving. Because data-only copies cannot hold
ownership, they cannot start ownership chains.
Data + Yes Yes Yes master copy.Distributed updates (see page 1741)
Ownership
Independent Yes No Yes Cannot receive updates from the master copy because independent
Copy copies are outside the ownership chain. Independent copies can start new
ownership chains.
Copy + Yes No Yes Transfers an independent copy of a request to the target server and then
Delete deletes the original request.
Dynamic data, such as an entry in a defect-tracking form, is often modified at the site to which it is
transferred. Use a Data + Ownership operation to transfer this type of data.
Static data, such as customer biographical information, is typically not modified at the site to which
it is transferred. Use a Data Only or Independent Copy operation to transfer this type of data.
Distributed updates
A distributed update keeps all copies of a request in an ownership chain synchronized with the
master copy (the request with ownership). Modified information in the master request is
automatically sent to other requests in the chain at a specified time interval: daily, hourly,
immediately, or whenever ownership of the request is returned.
For example, suppose you have a broken keyboard. You submit a replacement request on the
sanfrancisco server. Because the chicago server handles office equipment replacements, the
sanfrancisco server uses a Data + Ownership distributed transfer to send the request to the chicago
server. This creates an ownership chain between the sanfrancsico and chicago copies of the
request. After the keyboard is replaced, the status of the master request on the chicago server is
changed to Completed. Because the distributed mapping between the forms is configured to
update the other copies in the ownership chain immediately, this change triggers the DSO to
update the status of the copy on the sanfrancisco server.
Consider the following factors when deciding whether distributed updates are required:
When distributed transfers occur between two forms whose requests are static, the copy on
the source server probably does not need to be updated because the master request does
not change after it is transferred. For example, Data Only and Independent Copy transfers
usually fit this criteria.
If users at the target site modify the master request and users at the source site need those
modifications, copies in the ownership chain should be updated. For example, Data +
Ownership transfers usually fit this criteria.
The following figure shows the basic flow of a distributed update. (The request in the darker form
has ownership after the operation is completed.)
For an example of how to set up a distributed update, see Distributed update scenario (see page
1780).
Distributed returns
A distributed return is used to send an updated request back to the originating server with
ownership. Distributed returns are triggered by workflow on the server that returns the request.
For example, after the keyboard is replaced in the preceding example, the status of the master
request on the chicago server is changed to Completed. When this change occurs, workflow is
triggered and the modified request is transferred back to the sanfrancisco server with ownership,
leaving a data-only copy of the request on the chicago server. The request can now be modified on
the sanfrancisco server if necessary.
The following figure shows the basic flow of a distributed return. (The request in the darker form
has ownership after the operation is completed.)
For an example of how to set up a distributed return, see Distributed return scenario (see page 1781)
.
Distributed deletes
A distributed delete deletes copies of a request.
Warning
If the master copy in an ownership chain is deleted, all copies of the request in the
ownership chain are deleted. See Request ownership chains (see page 1740).
Additional delete capabilities enable you to delete specific requests, including data-only requests.
You must specify a separate filter or escalation action to run the distributed delete process for each
copy of the request.
For example, an employee submits a phone repair request on the sanfrancisco server. Because
telecommunication services are handled by the chicago server, a Data + Ownership distributed
transfer sends the request to the chicago server, creating an ownership chain between the
sanfrancsico and chicago servers.
Later, the employee discovers that his phone is unplugged, not broken, and calls the support
center to cancel the repair request. Instead of changing the status of the request to Completed, the
support person changes the status to Canceled. This change triggers previously configured
workflow to execute a distributed delete operation, which deletes the master request on the chicago
server and the copy of the request on the sanfrancisco server.
For an example of how to set up a distributed delete, see Distributed delete scenario (see page 1782
).
Distributed mapping
Distributed mapping defines how data is transferred from one form to another, how frequently
distributed updates are processed, and how conflicts in distributed operations are resolved.
Distributed mapping is typically used to link two fields with matching field IDs or field names
between forms. You can also create custom distributed mapping that links nonmatching fields or
that links a single field to multiple fields. Distributed mappings are server objects. They are created
in the Distributed Mapping editor, and they are stored in the Distributed Mapping form.
Configuring a distributed mapping to transfer data between identical forms is a simple process. To
transfer data between nonmatching forms, however, you must:
Determine which fields in the source form should be mapped to fields in the target form.
Consider the results of mapping fields containing different data types. For example, the data
types must be compatible, such as strings and integers.
Consider the results of mapping fields of unequal size. For example, if the length of a source
field exceeds the length of a target field, the distributed operation results in an error.
To ensure that BMC Remedy AR System uses the type of mapping appropriate for each situation,
you can create multiple mappings between forms. Then, when creating the filter or escalation that
triggers a distributed operation, you can specify which mapping to use or let the system select a
default mapping. See Creating distributed mappings (see page 1756).
You can also override settings in a mapping for a particular distributed operation. See Overriding
mapping settings on a per-request basis (see page 1748).
For example, in the development environment, you create a logical mapping with the logical server
name as destination_server, physical server name as dev_server, and use the logical server name
in a distributed mapping. While moving the distributed mapping to the production environment, you
only need to replace the physical server name with the actual production server name in the
Distributed Logical Mapping form.
With the custom mapping option, you can also use distributed logical mapping to assign a logical
(temporary) constant string value for fields whose actual value is not known while developing the
distributed mappings. At run time, DSO replaces the logical constant string with actual value from
the Distributed Logical Mapping form.
In distributed mapping, a logical name (server name or constant string value) must be enclosed in
the dollar symbol ($).
Note
Distributed fields
To manage ownership-based transfers, you must add distributed fields to the forms involved in the
transfers.
You can also override much of a mapping definition by assigning values to the distributed fields. At
runtime, DSO uses any such values in the source form's distributed fields to overwrite
corresponding values in the mapping definition.
The following groups of distributed fields provide different levels of control over distributed
mappings:
If you archive a form that contains distributed fields, the distributed fields are copied to the archived
form, but they are not updated after being archived.
The data in all basic distributed fields is system-generated (DSO sets the values). Several are
protected and can be overwritten only by using the ardist program (see Distributed Server
Administration program (see page )).
Field Description
name
Failure — The operation failed, was deleted, and will not be retried.
Timeout — The operation was retried until the retry time expired. See Retries (see page 1759).
Canceled — The operation was deleted from the pending table before it was processed.
You can use this field to examine the results of distributed operations, set up filters to detect failures, and set up
escalations to detect distribution problems.
You can use this field to examine the results of distributed operations, set up filters to detect failures, and set up
escalations to detect distribution problems.
From source
Form
From source
Server
From Specifies the distributed pool on the source (From) server that processed the distributed operation.
Pool
In addition, this group of fields stores mapping history information. For example, if you want to
know where a request was transferred, you can review the To Mapping, To Form, and To Server
fields.
Field Description
name
To Tells DSO which mapping to use when transferring the request. If the mapping specified in this field does not exist or
Mapping is disabled, the distributed operation fails.
From Specifies the mapping that was used during a transfer to create this request. Only DSO can set the value of this field.
Mapping
To Specifies the ID of the request to which the data was transferred. Only DSO can set the value of this field.
Request
ID
To Form target
To target
Server
Mapping Contains a history-tracking record created at the time of transfer. The record includes the date and time of transfer,
History the source request ID, the source form, the source server, and the name of the specific mapping used. The result is a
record of all transfers to this request. Only DSO can set the value of this field.
Note: By default, this is an unlimited-length character field. If you set a maximum length for this field, records might be
truncated.
Current Specifies the form in which the master copy of the request resides. Only DSO can set the value of this field.
Form
Current Specifies the server on which the form with the master copy of the request resides. Only DSO can set the value of this
Server field.
For example, to change the method of distributed transfers from Data Only to Data + Ownership for
a particular distributed operation, you can use workflow to modify the Transfer Mode distributed
field. See Creating workflow to perform DSO operations (see page ).
For more information, see #Adding distributed fields to forms (see page ).
Add the advanced distributed fields to the form that will be the source form in the distributed
operation. (See Adding distributed fields to forms (see page ).)
The names of the advanced distributed fields match the names of the fields in the Options
panel of the Distributed Mapping editor with the exception of Max Time to Retry, which is
called Retries in the editor (see Distributed Mapping editor (see page 1744)). On the source
form, these fields accept the same values as their counterparts in the editor.
Create workflow to update the appropriate advanced distributed fields on the source form
when you submit or modify a request in that form.
The values that the workflow adds to the fields on the source form override the values set in
the editor when the mapping was created.
For example, you might have a mapping whose transfer mode is Data Only, but for one transfer
performed by that mapping, you need to send data and ownership. To do this, you would add
advanced distributed fields to the transfer's source form and then use workflow to set the Transfer
Mode field in the appropriate request to Data + Ownership.
Distributed pools
DSO uses distributed pools to process multiple distributed operations at the same time. This
simultaneous processing minimizes delays and significantly increases the output of distributed
operations when DSO activity is heavy.
Distributed pools are server objects. They are created in the Distributed Pool editor, and they are
stored in the Distributed Pool form.
After defining a pool, you must associate DSO filter or escalation actions with the pool (see
Creating workflow to perform DSO operations (see page 1750)).
Pending distributed operations in a pool are queued and then executed in the order received
(FIFO: first in, first out). Therefore, when setting up pools, consider the interdependencies between
the forms in an application. All distributed operations associated with one form and all distributed
operations on interdependent forms should use the same pool to ensure that the operations are
executed in the correct order.
You can use different pools for unrelated distributed operations or when sending data-only or
independent copies of requests to different destinations. For example, suppose your system is
experiencing heavy distributed activity, and multiple data-only or independent copy transfers are
pending from different applications. Because these operations do not need to be completed in a
particular order, you can assign them to different pools.
Implementing DSO
This section contains information about working with distributed fields, mappings, and pools. It also
explains how to administer data transfers between forms.
To configure BMC Remedy Distributed Server Option (DSO), you need the appropriate
permissions. See Access control (see page 1269).
For more information, see Enabling distributed fields (see page ) and Reserved fields (see
page 2474).
To perform a distributed transfer operation, you must create a distributed mapping (see Creating
distributed mappings (see page 1756)) plus a filter or an escalation with a DSO Transfer action on
the source server.
Warning
To ensure that DSO actions are executed in the correct order, assign all
related DSO actions to the same distributed pool. For example, all DSO
actions associated with the same form should use the same distributed
pool.
To Server — The physical name or the logical name of the target server for the
transfer.
Note
Logical server names appear in the list enclosed in the dollar sign.
To perform a distributed return operation, you must create a distributed mapping plus a filter or
escalation with a DSO Transfer action on the source server. On the target server, you must create
a compatible distributed mapping plus a filter or escalation with a DSO Return action. In some
cases, it can be identical as that of the source server.
Warning
To ensure that DSO actions are executed in the correct order, assign all related
DSO actions to the same distributed pool. For example, all DSO actions
associated with the same form should use the same distributed pool.
7.
BMC Remedy Action Request System 9.1 Page 1752 of 4703
BMC Software Confidential. BladeLogic Confidential.
Warning
To ensure that DSO actions are executed in the correct order, assign all
related DSO actions to the same distributed pool. For example, all DSO
actions associated with the same form should use the same distributed
pool.
Server — The physical name or the logical name of the server on which the form
containing the specified request resides.
Form — The name of the form containing the specified request.
6. Save the filter or escalation.
Warning
When you delete a field on a From (source) form that is mapped to a field on a To (target)
form, you also delete the mapping to the target field. If the target field is optional, only
data transferred between the two fields is affected. If the target field is required, the entire
transfer operation fails.
For an overview of distributed mappings, see Distributed mapping (see page 1744).
For an example of how to create a distributed mapping, see Distributed operations scenarios (see
page 1775).
2 To From A list of mappings associated with the To server and the To form is generated. Default
Server (source) mappings are listed first in the order they were created. The first mapping in the list is
and To form selected.
Form
4 To Filter or A list of mappings associated with the To server and the To form is generated. Default
Server escalation mappings are listed first in the order they were created. The first mapping in the list is
and To selected.
Form
5 From Distributed A list of mappings is generated from all distributed mappings on the server whose From
Form mapping Form value matches the name of the source form. Default mappings are listed first in the
order they were created. The first mapping in the list is selected.
For each server involved in ownership transfers and returns, you must define a separate,
compatible distributed mapping. That is, to transfer requests with ownership from server 1 to server
2 and to return them with ownership from server 2 to server 1, you must have a distributed
mapping on both servers.
Tip
On both server 1 and server 2, use the same distributed mapping name and to select the
same criteria for each mapping.
Default default mappingCreating workflow to perform DSO operations (see page 1750)
Mapping
From
Server Specifies the name of the server from which the distributed operation is initiated (the source server). You can
Name enter or select any server on which you are a valid user. You can also select a logical server name that has
already been defined. To create or edit a logical mapping, see Enabling logical mappings (see page 1767).
Note
You can specify a server name other than the default server name for distributed operations. For
example, your operating environment might require you to use the fully qualified domain name
(FQDN) for your server. See Specifying a DSO host name (see page 575).
Warning
This field is limited to 64 characters. If the server name exceeds that limit, it is truncated, and the
distributed operation fails. This is most likely to occur when you select the following Allow Any
Server in Server Group option. In that case, this field must contain the server name alias, which is
specified in the Server-Name option of the AR System server configuration file.
Allow Specifies that the mapping can use any server in the group as the From server. See Configuring DSO for a
Any server group (see page 384). Available only when the server is in a server group.
Server
in
Server Note
Group
When you select this option, the From Server Name field must contain the server name alias, which
is specified in the Server-Name option of the AR System server configuration file.
Form source
Name
To
Server Specifies the name of the server to which the transfer is mapped and from which update and return
Name operations occur (the target server). You can enter or select any server on which you are a valid user. You
can also select a logical server name that has already been defined. To create or edit a logical mapping, see
Enabling logical mappings (see page 1767).
Note
This field is limited to 64 characters. If the server name exceeds that limit, it is truncated, and the
distributed operation fails.
Form target
Name
4. In the Save Distributed Mapping As dialog box, enter a name for the mapping.
Distributed mapping names can include up to 80 characters, including spaces. In the
Options panel of the Distributed Mapping editor, enter the following information, then save
your changes.
Field Description
When to Specifies the update frequency for the original request if a copy transferred with ownership is updated:
Update Daily — At two minutes past midnight.
Hourly — At two minutes past the hour.
Immediately — Right after the copy is changed.
No Update — Never.
On Return — Only when ownership is returned.
Independent Copy — Transfers an independent copy with ownership. It is outside the ownership
chain of the original copy.
See Types of distributed transfers (see page 1740).
Note
At a minimum, to transfer ownership, the form must have the basic distributed fields (see page
1746).
Duplicate Specifies the action that occurs if you transfer a request and the target form already contains a request
Request ID with the same request ID:
Action Create New — A new request is created on the target server for the transfer.
Error — The transfer fails.
Overwrite — The transferred request overwrites only the mapped fields on the request on the
target server that has the same request ID. (To overwrite all fields, see Overwriting all fields in
duplicate requests (see page ).)
Note
If you do not map the Request ID field, the system always creates a new Request ID on the To
server for the transferred request.
Enforce Specifies whether to enforce patterns defined in fields on the target form:
Pattern Yes — The target system pattern checks data sent to the target form. Data transferred to fields on
Matching the target form must follow pattern attributes defined in mapped fields on the target form.
No — The target system does not pattern check data sent to the target form.
For example, suppose you map two character fields. On the target form, the mapped field's Pattern
property is set to $LOWER$. On the source form, a user enters uppercase letters in the mapped field.
When the system attempts a distributed transfer, the operation succeeds or fails depending on whether
you enforce pattern matching. Other field properties are also subject to pattern matching. See the
definition for "Pattern" in Field properties (see page 2548).
Require Specifies whether to require values in fields defined as required fields on the target form:
Required Yes — The target system does not allow NULL entries in required fields on the target form.
Fields Optional fields on the source form must contain data if they are mapped to required fields on the
target form.
No — The target system allows NULL entries in required fields on the target form except in core
fields.
For example, suppose you map an optional field on the source form to a required field on the target form.
A user enters no data in the optional field on the source form. When the system attempts a distributed
transfer, the operation succeeds or fails depending on whether you allow NULL entries in required fields
on the target form.
Match by Specifies whether to use request IDs or another qualification to find the correct request in the target form:
Request ID Selected — Distributed transfers are performed when the request ID in the target form matches the
request ID in the source form.
Cleared — Target and source data are matched according to the qualification entered in the
following Matching Qualification field.
For example, if you do not want to use server-specific request ID prefixes to distinguish the requests from
one another, you can use this method (see Preventing duplicate request IDs (see page 1798)). In this case,
use a different data field that uniquely identifies each request to match a target request with a source
request.
Matching
Qualification
Retries Specifies the maximum number of times a pending item is retried before the system cancels the item:
Forever — The item is retried until its operation succeeds.
Only Once — The item is tried one time. If its operation does not succeed, it is not retried.
Try for Maximum of — The item is retried throughout the period of time that you specify.
See Managing pending distributed operations (see page ).
5. In the Transfer to Target panel of the editor, specify how the data in a source form is
mapped to a target form for a transfer.
See these sections:
Setting up automatic mapping (see page 1759)
Using the excluded fields option (see page 1760)
Creating custom mapping (see page 1761)
6. In the Return from Target panel of the editor, specify how the data in a target form is
mapped to a source form for an update or a return.
See these sections:
Setting up automatic mapping (see page 1759)
Using the excluded fields option (see page 1760)
Creating custom mapping (see page 1761)
7. To view, add, and edit Help text for the distributed mapping, use the Help Text property in
the Properties tab.
In most cases, the Help text is simply a description of the mapping. Only AR System
administrators and subadministrators who have the mapping open in the Distributed
Mapping editor can view and edit the Help.
See the definition for "Help Text" in Field properties (see page 2548).
8. To view, add, and edit change history for the distributed mapping, use the Change History
properties in the Properties tab, then save your changes.
For each distributed mapping, AR System automatically records information about the
owner, the user who last modified the mapping, and the date of the modification. You can
view and modify this information at any time by opening the mapping in the Distributed
Mapping editor.
See the definition for "Change History" in Field properties (see page 2548).
Note
Before performing this task, ensure that the information in the Basic and Options panels
of the Distributed Mapping editor is correctly specified. See Creating distributed mappings
(see page 1756).
Note
If you are not creating mapping between identical forms, ensure that no unwanted
unmapped fields exist on the forms.
6. To customize any of the mappings listed in the table or to add custom mappings, see
Creating custom mapping (see page 1761).
You can use the excluded fields list for both DSO transfer and DSO return actions.
Note
Before performing this task, ensure that the information in the Basic and Options panels
of the Distributed Mapping editor is correctly specified. See Creating distributed mappings
(see page 1756).
2.
BMC Remedy Action Request System 9.1 Page 1760 of 4703
BMC Software Confidential. BladeLogic Confidential.
2. In the Transfer to Target or Return from Target panel, select Like Field IDs or Like Field
Names, and click Add.
3. In the Object Selector, select the fields that you want to exclude from mapping, and click OK.
The excluded fields appear in the table on the Transfer to Target or Return from Target
panel.
The source and target forms contain fields whose IDs and names do not match.
You want to use keywords, static values, arithmetic operations, functions, or processes
based on the values of one or more fields in the source form to populate a field in the target
form.
Warning
If you modify a source or target form used in a custom mapping, the custom mapping
might be invalid until you make the appropriate changes to the mapping.
Before performing the following task, ensure that the information in the Basic and Options panels of
the Distributed Mapping editor is correctly specified. See Creating distributed mappings (see page
).
Note
This option shows the logical strings that can be used for custom mapping.
For more information, see Distributed logical mapping (see page ).
When specifying field mappings in the Expression Editor, ensure that the values you
enclose in dollar signs ($) do not match strings used as keywords (unless you want to
map a keyword value). For example, if you have a field named OS (short for
"Operating System") and specify the field mapping as $OS$, map the value for the
keyword OS (in this case, your operating system) instead of the preferred field value.
For more information, see Keywords (see page 2685).
Important
Always map the source and target Request ID fields to each other. If you do
not, the system creates a new ID on the target server for the transferred
request. If you use matching qualifications, you must also map the fields
used in the qualification to uniquely match one request with another.
7. Repeat steps 3 (see page 1761) through 6 (see page 1761) for each field that you want to
map.
8. To delete a mapping from the table, select the Field value, press Delete, then s.
9. Save your changes.
Warning
Before you modify the name of a distributed mapping, verify that it is not associated with
a packing list. Developer Studio does not update the name of a distributed mapping in a
packing list. Instead, the distributed mapping is removed, and you must re-add it to the
packing list under the new name.
Tip
You can use DSO to send copies of distributed mappings to other servers. This enables
you to administer the mappings from one server and ensure that all mappings remain
synchronized. See Broadcasting distributed mappings and pools (see page 1793).
7.
BMC Remedy Action Request System 9.1 Page 1763 of 4703
BMC Software Confidential. BladeLogic Confidential.
7. In the Save Distributed Mapping As dialog box, enter a name for the new distributed
mapping.
8. Click OK.
The new distributed mapping is listed on the Distributed Mappings tab.
Using distributed pools is optional. If you use them, however, you must create them for various].
Tip
You can use DSO to transfer pool definitions to other servers, enabling you to administer
and synchronize all pools from one server. See Broadcasting distributed mappings and
pools (see page 1793).
Field Description
State Specifies whether the pool is active (enabled) or inactive (disabled). Select the appropriate value:
Enabled (default)
Disabled
Interval If the Polling check box is selected, specifies the interval, in minutes, at which the pool queries the distributed
(mins) pending queue.
Minimum interval is 5 minutes (default).
Maximum interval is 1440 minutes (24 hours).
If you enter values outside these limits, the system uses the limit closest to your value.
Note
When setting a polling interval, consider the number of requests processed by the pool. For
example, if a pool processes 2 million requests each day and has a 720-minute (12-hour) polling
interval, the pool will be deluged with 1 million requests to process every 12 hours.
Note
DSO recognizes only one distributed pool for each pool name and creates a log
file for that pool (see Configuring BMC Remedy Distributed Server Option logging
(see page 4206)). Thus, you cannot use the same name for multiple pools, even if
you use a different case. For example, DSO considers pool names HIKE4, Hike4,
and hike4 to be the same and creates only one pool with these values.
6. (Optional) In the Properties tab, select the Help Text property, click its ellipsis button, enter
any appropriate Help text for the pool, and click OK.
7. (Optional) In the Properties tab, select the change history New Description property, click its
ellipsis button, enter any appropriate change history information for the pool, and click OK.
See the definition for Change History in Field properties (see page 2548).
8.
BMC Remedy Action Request System 9.1 Page 1765 of 4703
BMC Software Confidential. BladeLogic Confidential.
Warning
The delete operation is permanent. Ensure that you no longer need a distributed pool
before deleting it.
For pools with heavy activity, however, BMC recommends that you make them polling pools, which
query the distributed pending queue at specified intervals. For example, suppose a pool is
configured to query the queue every 12 hours. If a request associated with the pool is submitted to
the queue 1 hour after the pool's last query, the request is not processed for 11 hours. Use this
option to shift the processing of noncritical requests to periods of low database activity.
To set a polling interval for a distributed pool, use the Distributed Pool editor. See Creating
distributed pools (see page 1764).
For an overview of distributed logical mappings, see Distributed logical mapping (see page 1745).
You can also create a mapping to define a logical name for a field whose value is not known at the
time the distributed mappings are being developed. While moving this mapping to production
environment, you can change the value of the physical name with the actual value for this field in
the Distributed Logical Mapping form. This ensures that the mapping works properly for your
production environment.
1. In a browser, open the AR System Administration Console, and click System > Distributed
Server Option > Distributed Logical Mappings > New request.
2. Enter the following information:
Logical Name: Specifies the name of the logical entity (server or field name) defined
in the distributed mapping
Physical Name: Specifies the name of the actual entity (server or field name) where
the user wants to use the distributed mapping
Logical Server Name: When selected specifies that this logical name is for a server.
This is required only if you want to select the name of the logical server in the Server
Name box either in the Distributed Mapping editor or the DSO action editor in BMC
Remedy Developer Studio.
3. Click Save.
1. In a browser, open the AR System Administration Console, and click System > Distributed
Server Option > Distributed Logical Mappings > Search.
2. From the results list, select the item to modify.
3. Modify the mapping as necessary.
4. Click Save.
1. In a browser, open the AR System Administration Console, and click System > Distributed
Server Option > Distributed Logical Mappings > Search.
2. From the results list, select the item to delete.
3. Click Delete.
4. In the confirmation message, click OK.
1. In the left pane of the AR System Administration Console, click System > Distributed Server
Option > Pending DSO Operations.
2. In the Distributed Pending form, enter the appropriate search criteria, and click Search.
For each item that appears in the results list, the form includes this information:
Field Description
Other String that specifies additional information about the distributed operation. The string includes one or more
of these parameters:
-e — ID of the target request in a distributed delete operation.
-E — ID of the source request in a distributed delete operation.
-o — Flag indicating a limit override in which the DSO server cannot initiate a transfer or return
operation.
-p — Name of the pool to which a distributed delete operation is assigned.
-s — Name of the form involved in a distributed delete operation.
-x — Name of the server involved in a distributed delete operation.
Pool Name of the pool to which the distributed transfer, update, or return operation is assigned.
Warning
1. In the left pane of the AR System Administration Console, click System > Distributed Server
Option > Pending DSO Operations.
2. In the Distributed Pending form, enter the appropriate search criteria, and click Search.
3. In the results list, select the item to remove.
4. Select Actions > Delete.
5. Select View > Refresh Search to update the list of items.
For information about when polling DSO servers and pools check for requests, see these sections:
If an item succeeds or if it fails with a nonrecoverable error, it is removed from the distributed
pending queue. (You can configure DSO to move pending items that fail with nonrecoverable
errors to the Distributed Pending Errors form. See Logging failed pending items (see page 1772).)
By default, if a pending item fails with a recoverable error, such as an unavailable target server,
DSO periodically retries the item as follows:
To specify whether the Status value of failed items remains set to New or is changed to Retry, set
the Mark Pending Retry field in the AR System Administration: Server Information form. (See the
definition for "Mark Pending Retry" field in AR System Administration - Server Information form -
DSO tab (see page 576).)
To limit the number of times the item is retried, change the default Retries value in the distributed
mapping. See the definition for "Retries" in Creating distributed mappings (see page 1756).
If you specify values in the Retries "Try for Maximum of Hours/Minutes " option and the specified
time limit elapses, the item is removed from the distributed pending queue. This occurs even if one
or more retries were not attempted. In this case, if the item includes a Transfer Status or Update
Status field, it is set to Timeout.
Note
By default, the system allows three minutes of connection time for processing each
distributed operation. This might be an insufficient amount of time in some situations and
might cause pending distributed operations to fail. See Configuring the RPC timeout
setting (see page 576).
For example, suppose a filter containing a DSO action executes on both Submit and Modify
operations. If the following sequence of events occurs, two pending items for the same Help Desk
request are added to the distributed pending queue:
This example adds two pending items to the distributed pending queue (one in step 3 and one in
step 4) for the same request in the Help Desk form.
In such situations, the DSO server performs the distributed operation specified in only the most
recent duplicate item (in this example, the pending item created in step 4). For each of the other
duplicate items, it adds the following entry to its log file and then deletes the item:
For information about DSO logging, see Configuring BMC Remedy Distributed Server Option
logging (see page 4206).
The form is available only on AR System servers that have a license for DSO.
For more information about DSO logging, see Configuring BMC Remedy Distributed Server Option
logging (see page 4206).
1. Open the AR System Administration: Server Information form for the local server.
2.
BMC Remedy Action Request System 9.1 Page 1772 of 4703
BMC Software Confidential. BladeLogic Confidential.
2. On the DSO tab, select Log Errors to DSO Pending Errors Form.
3. Click OK or Apply.
Your changes take effect immediately. You do not have to restart the AR System server.
Add the following field to at least one of the join form's underlying forms:
Add field ID 322 to the join form from one of the underlying forms.
Field ID 322 is a reserved field that has characteristics similar to field ID 112, the Assignee
Group field. A join form can contain only one instance of each reserved field.
For CREATE and MERGE operations that trigger DSO actions on join forms, create workflow
that populates field ID 322 with the request's joinEntryID before the DSO action occurs.
The joinEntryID is composed of the request IDs of both underlying forms, separated by a
vertical bar (|).
The system uses the contents of field ID 322 to populate the Source ID field of the
Distributed Pending form.
Note
Evaluate the workflow to determine whether you need to protect any of the merge
filters from the DSO user. If you do, use this qualification: $USER$ !=
'Distributed Server'. For more information about the DSO user, see
Configuring a password for the DSO user (see page 570).
Note
For distributed operations involving join forms, the DSO logs do not include the Request
ID of the request created or modified in the target form.
Tip
BMC recommends that you perform distributed operations directly on the underlying
forms of a join form instead of on the join form whenever possible.
Should one server own master copies of transferred requests, or should all copies be
independent?
See Types of distributed transfers (see page 1740).
How often should requests be updated on a server?
See the definition for "When to Update" in Creating distributed mappings (see page
1756).
How should duplicate request IDs be handled?
See Managing request IDs in distributed environments (see page 1797).
Will you need to override distributed mapping settings on a per-request basis?
See Overriding mapping settings on a per-request basis (see page 1748).
4. Determine which distributed fields to add to the forms identified in step 2 (see page 1774).
See Distributed fields (see page 1746).
5. Add distributed fields to the forms identified in step 2 (see page 1774).
See Adding distributed fields to forms (see page 1754).
6. Determine whether you will use distributed pools.
See Distributed pools (see page 1749).
7. (Optional) Create distributed pools according to your analysis in step 3.
See Enabling distributed pools (see page 1764).
8. Determine how to map the forms identified in step 2 (see page 1774).
See Distributed mapping (see page 1744).
9. Create the required distributed mappings.
See Creating distributed mappings (see page 1756).
Note
Unless otherwise noted, this section assumes that you are mapping between two
servers. To maintain data integrity on more than two servers, see Chained and
broadcast distributed transfers (see page 1783).
10. Create filters or escalations that define the conditions under which distributed operations
occur.
See Creating workflow to perform DSO operations (see page 1750).
11. (Optional) Employ some of these advanced functions:
Setting up chained distributed transfers (see page 1784)
Setting up broadcast distributed transfers (see page 1791)
Each of the topics in this section is a start-to-finish example of how basic distributed operations are
implemented between two geographically distinct servers at Acme Industries.
Acme makes custom office furniture that is distributed to and returned from vendors such as office
supply stores. Assume you are a manager with administrator privileges and a fixed license at the
Acme plant in San Francisco, California. Acme recently opened another plant in Chicago, Illinois.
Labor is divided between the plants as follows:
Information about Acme's vendors is stored in Acme's customer information forms. Products
returned from vendors for various faults are entered into Acme's bug tracking forms. You must set
up distributed operations between the bug tracking form on the sanfrancisco server and the bug
tracking form on the chicago server. Both servers have DSO licenses.
Note
All the examples in this section assume that you have created the Acme West Bug
Tracking form on the sanfrancisco server and the Acme East Bug Tracking form on the
chicago server.
1. Add distributed fields to the Acme bug tracking forms (see page 1777).
2. Create distributed mappings for the Acme bug tracking forms (see page 1777).
3. Create a filter with a DSO Transfer action on the From server (see page 1779).
4. Test the distributed mapping (see page 1780).
After you complete these tasks, a bug request created on the sanfrancisco server for Choice
or Superior products is transferred to the chicago server.
Note
In this section, you create identical distributed mappings on the From (sanfrancisco
) and To (chicago) servers. Such mappings are required for distributed update and
return operations, which are covered in the following sections.
Distributed mappings specify which fields on the From form (Acme West Bug Tracking) supply data
to which fields on the To form (Acme East Bug Tracking).
10. Configure the Transfer to Target panel, Auto Map dialog box, and Return from Target panel
as described in step 4 (see page 1778) and step 5 (see page 1778).
11. In the Save Distributed Mapping As dialog box, enter Acme E to W Bug Track, then click OK
.
To transfer data from a form on the sanfrancisco server to a form on the chicago server, you must
create a filter with a DSO Transfer action on the sanfrancisco server.
For overview information, see Creating workflow to perform DSO operations (see page ).
The qualification states that the filter action should be executed when the product name
does not begin with the letter P.
Thus, when a request is created in the form associated with this filter (the Acme West Bug
Tracking form) for a Choice Desk Chair or a Superior Side Chair, the action associated with
this filter is executed.
8. Right-click the If Actions panel, and select Add Action > DSO.
9. In the Type list in the DSO panel, select Transfer.
10. To use the default mapping, leave the other fields blank, then select File > Save.
11. In the Save Filter As dialog box, enter a name for the filter, such as Acme W to E Bug Track,
then click OK.
To test the mapping in this example, open the Acme West Bug Tracking form in a browser, and
create some requests for each of the Acme products. All requests submitted for products the
Choice Desk Chair and Superior Side Chair products should be immediately transferred with
ownership to the Acme East Bug Tracking form. The original request on the sanfrancisco server
becomes a data-only request (see Types of distributed transfers (see page 1740)).
Notes
1. If you have not created a distributed mapping for both bug tracking forms, do so.
See To create distributed mappings for the Acme bug tracking forms (see page 1777).
2. In Developer Studio, open the distributed mapping used by the Acme West Bug Tracking
form on the sanfrancisco server.
3. In the Options panel, select the appropriate option from the When to Update list.
A distributed mapping plus a filter or escalation with a DSO Transfer action on the source
server
A compatible or an identical distributed mapping plus a filter or escalation with a DSO
Return action on the target server
3. In the Associated Forms panel of the Filter editor, click Add, select the Acme East Bug
Tracking form, and click OK.
4. In the Execution Options panel, set the options shown in the following figure:
'Status' = "Fixed"
The qualification states that the filter action should be executed when the status for the bug
is fixed.
Thus, when the status of a request in the form associated with this filter (the Acme East Bug
Tracking form) is changed to Fixed, the action associated with this filter is executed.
7. Right-click the If Actions panel, and select Add Action > DSO.
8. In the Type list in the DSO panel, select Return, then select File > Save.
9. In the Save Filter As dialog box, enter a name for the filter, such as Acme E to W Bug Track,
then click OK.
For example, suppose a request created in the Acme West Bug Tracking form is transferred with
ownership to the Acme East Bug Tracking form. If you delete the copy of the request in the Acme
East form, the original copy in the Acme West form is also deleted. (AR System does not delete
copies of the request in either form that are not in the active ownership chain.)
For more information, see Request ownership chains (see page 1740).
6. Right-click the If Actions panel, and select Add Action > DSO.
7. In the Type list in the DSO panel, select Delete.
8. Fill in the other fields as shown in the following figure, then select File > Save.
Filter editor — DSO Delete action
9. In the Save Filter As dialog box, enter a name for the filter, such as Acme Bug Distributed
Delete, then click OK.
Now, when a request is deleted from the Acme West Bug Tracking form, this DSO action
deletes the request with the same Request ID in the Acme East Bug Tracking form on the
chicago server.
Both chained and broadcast distributed transfers involve multiple servers. For example:
A chained distributed transfer occurs when the sanfrancisco server transfers a request to
the chicago server, and then the chicago server transfers the request to the toronto server.
A broadcast distributed transfer occurs when the sanfrancisco server transfers the same
request to two servers, chicago and toronto.
Consider the overhead that might be involved in the implementation and maintenance of these
features. When data is distributed among more than two sites, your troubleshooting effort might
increase exponentially.
The examples in this section assume that you are an administrator at Acme Industries (see
Distributed operations scenarios (see page )). You are mapping forms among three servers
located in San Francisco, Chicago, and Toronto. All the servers have DSO licenses.
The procedures in this section build on procedures in Distributed operations scenarios (see page
).
You can set up a distributed environment involving more than two locations in which the servers
are "chained," creating a staggered distribution effect.
For example, in this section, you create a distributed transfer on the sanfrancisco server that sends
a request from the Acme West Bug Tracking form to the Acme East Bug Tracking form on the
chicago server whenever someone creates or modifies a bug request for Choice Desk Chairs or
Superior Side Chairs in the Acme West form.
You then create a distributed transfer on the chicago server that sends any bug request for
Superior Side Chairs that is transferred into the Acme East Bug Tracking form to the Acme Canada
Bug Tracking form on the toronto server.
The qualification states that the filter action should be executed when the product
name on the Acme East Bug Tracking form begins with the letter S.
h. Right-click the If Actions panel, and select Add Action > DSO.
i. In the Type list in the DSO panel, select Transfer.
j. Select Override Loop Detection, then select File > Save.
See Avoiding infinite loops (see page ).
k. In the Save Filter As dialog box, enter a name for the filter, such as Acme E to C Bug
Track, then click OK.
By default, BMC Remedy AR System protects you against infinite loops by providing automatic
loop detection. If you need to update the original request, however, perform the following
procedure to override this protection.
In Developer Studio, select the Override Loop Detection check box in DSO Transfer or DSO
Return subpanel on the If Actions panel in the filter or escalation editor.
Warning
If you shut down loop protection, you risk creating infinite loops and overwriting the
original record in a distributed transfer or distributed return operation.
To transfer requests from toronto to chicago, you can either create another mapping from toronto
to chicago or reuse existing mappings by chaining Mapping A to Mapping B.
Tip
Create a separate mapping chain each time you have a different starting and stopping
place. Doing so avoids the looping issue that might occur if you create one mapping chain
from sanfrancisco to chicago, chicago to toronto, and toronto to sanfrancisco to transfer
copies with ownership.
Controlling updates
To control updates, select a value other than No Update in the When to Update list in the Options
panel of the Distributed Mapping editor.
Any changes made to a request in the To form of a mapping are sent back as updates to the From
form in the mapping.
Controlling returns
To control returns, you can create a filter that looks for a condition in which Data + Ownership is
the Transfer mode. This filter action takes the transferred request and executes another mapping
specified in the filter action. The filter action then returns the request to the From form defined in
the Transfer mapping.
Deleting requests
Users can delete only the master copy or independent copies of a request in an ownership chain.
When the master copy of a request is deleted, all other requests in the ownership chain are also
deleted.
You can use the DSO Delete filter action to delete requests that are outside the active ownership
chain, or you can use ardist to clear the Master Flag (see Distributed Server Administration program
(see page )).
You can set up a distributed environment involving more than two locations. In this environment,
one server "broadcasts" copies of a request to multiple recipients.
Broadcast distributions are typically used to propagate forms, such as remote knowledge bases,
from a central source. Ownership does not transfer with the requests, and when the distributed
copies are modified, the original request is not updated.
For example, if you define a mapping on the sanfrancisco server that sends a data-only copy of a
request to the chicago server, you must also define a mapping on the sanfrancisco server that
sends another data-only copy of the same request to the toronto server.
If you try to broadcast copies of requests with ownership, the system successfully executes the
transfer specified by the first filter action. All remaining transfers to other servers, specified by
subsequent filter actions, result in error messages because ownership was transferred off the From
server during the first filter action.
Tip
Use one or more distributed pools when performing broadcast distributed operations.
Doing so allows many of the transfers in the broadcast to occur simultaneously instead of
one at a time. See Distributed pools (see page ).
This section explains how to set up a broadcast distributed transfer that sends requests created in
the Acme Product Info Archive form on the sanfrancisco server to the Acme Product Info Archive
forms on the chicago and toronto servers. The following figure illustrates the flow of this example
See Creating distributed mappings (see page ) and Distributed transfer scenario (see
page ).
2. Create a distributed mapping named Acme ProdInfoArch W to T between the Acme Product
Info Archive forms on the sanfrancisco and toronto servers.
In the Distributed Mapping editor, use these values in the Optionstab:
Field Value
See Creating distributed mappings (see page ) and Distributed transfer scenario (see
page ).
3. Create a filter with two DSO Transfer actions.
Both actions should execute on Submit and Modify. Use the following action names. No
qualification is necessary.
Action 1 Acme ProdInfoArch W to E
Use the same filter to transfer requests from the sanfrancisco server to the chicago server
and from the sanfrancisco server to the toronto server. Define the transfers as separate filter
actions, which execute in order when the criteria on sanfrancisco is met.
See Creating workflow to perform DSO operations (see page ).
4. Test the broadcast by creating some requests in the Acme Product Info Archive form on the
sanfrancisco server.
Data-only copies of the requests should appear in the Acme Product Info Archive forms on
the chicago and toronto servers.
For example, on the sanfrancisco server, you can create distributed mappings for the Distributed
Mapping and Distributed Pool forms. Then, you can broadcast those mappings to the chicago and
toronto servers.
See Creating distributed mappings (see page ) and Distributed transfer scenario (see
page ).
2. On the sanfrancisco server, create a distributed mapping named Distributed Mapping:
sanfrancisco to toronto between the Distributed Mapping forms on the sanfrancisco and
torontoservers. In the Distributed Mapping editor, use these values:
Panel Item Value
See Creating distributed mappings (see page ) and Distributed transfer scenario (see
page ).
3. Create a filter with two DSO Transfer actions.
Both actions should execute on Submit and Modify. Use the following action names. No
qualification is necessary.
Action 1 Distributed Mapping: sanfrancisco to chicago
Use the same filter to transfer requests from the sanfrancisco server to the chicago server
and from the sanfrancisco server to the toronto server. Define the transfers as separate filter
actions, which execute in order when the criteria on the sanfrancisco server is met.
See Creating workflow to perform DSO operations (see page ).
4. Test the broadcast by creating or modifying a distributed mapping on thesanfranciscoserver.
Data-only copies of the requests should appear in the Distributed Mapping forms on the
chicago and toronto servers.
5. To broadcast distributed mappings for the Distributed Pool form from the sanfrancisco
server to the chicago and toronto servers, repeat step 1 (see page 1793) through step 4 (see
page 1794) for the Distributed Pool form.
The data in many distributed fields is system-generated (DSO sets their values). You cannot
manually change the values of such fields in a request. The ardist program, however, enables you
to overwrite the values in these distributed fields:
From Form
From Mapping
From Pool
From Server
Master Flag
Warning
The ardist program simply edits field values in a specified request. It does not distribute
data between forms and should not be considered a command-line version of DSO.
Note
If you use corresponding uppercase and lowercase arguments in the same command
line, such as*-m 1 -M*, the field value is set to NULL.
Argument Description
Sets the From Form field to NULL. This is a flag; do not assign it a value.
-C
Sets the From Form field value. Use this to change the source form name.
-c
Runs the program in Debug mode, printing debug information to the terminal. This is a flag; do not assign a value to
-d it.
Argument Description
Sets the From Pool field to NULL. This is a flag; do not assign it a value.
-L
Sets the From Pool field value. Use this to change the source pool name.
-l
Sets the Master Flag field to NULL. This is a flag; do not assign it a value.
-M
Sets the Master Flag field to the specified value (1 = Yes, 0 = No). Use this if your transfer gives you zero or multiple
-m requests with ownership.
Sets the From Mapping field to NULL. This is a flag; do not assign it a value.
-P
Sets the From Mapping field value. Use this to change the mapping name.
-p
Sets the From Server field to NULL. This is a flag; do not assign it a value.
-R
Sets the From Server field value. Use this to change the source server name.
-r
Specifies the name of the server on which the form (-s ) containing the request to modify resides.
-x
The request ID is the piece of data that you are most likely to use to identify and track requests. It
should be unique. In BMC Remedy AR System, requests generated on the same server have
unique IDs. But requests generated on different servers might have identical IDs. Such duplicate
request IDs create conflicts when requests are transferred or shared between servers in distributed
environments.
For information about assigning prefixes to request IDs, see Changing the Request ID field length
or prefix (see page ).
Generates an error message and does not perform the distributed operation
Generates a new request ID for the newer copy of the request
Overwrites the older copy of the request with the newer copy
By default, the overwrite action updates only the mapped fields on the target request, but
you can configure this action to update all the fields on the target request.
See Overwriting all fields in duplicate requests (see page ).
When you create a distributed mapping, you must specify how it handles duplicate request
IDs. If possible, treat all mappings the same. Using different strategies can cause
administrative problems when data is tracked.
For example, matching qualifications are useful when you do not want to use request ID prefixes to
distinguish requests from one another. In this case, use a data field other than Request ID that
uniquely identifies each request. BMC Remedy AR System can use that field to match a request in
the target form (if one exists) with one in the source form.
Note
You should create a unique index on the data field used to distinguish one request from
another.
For more information, see Request IDs in distributed environments (see page ).
1. Stop the BMC Remedy Action Request System Server serverName service.
2. Open the appropriate AR System server configuration file:
(Windows) ARSystemInstallDir\Conf\ar.cfg
(UNIX) ARSystemInstallDir/conf/ar.conf
3. Enter the following flag to update mapped fields and to set unmapped fields to NULL:
DSO-Merge-DupID-Overwrite: T
Note
For information about setting Server Event options, see Setting server logging options
(see page 302).
You can use the Server Events form to notify other servers of cache changes if multiple servers are
sharing the same database. The form can also notify interested clients of cache changes and user
or group events. For more information, see Using server events in workflow (see page ).
Note
You might find server events especially helpful in a load-balanced environment. However,
with the server groups feature, you do not need to use server events as part of the
mechanism for communicating between servers in a load-balanced environment. For
more information, see Configuring a hardware load balancer with BMC Remedy AR
System (see page 524).
With the options on the Server Events tab of the BMC Remedy AR System Administration: Server
Information form, you can specify which activities to record to the form. For more information about
selecting Server Events options, see Setting server logging options (see page 302).
The Server Events form is similar to other BMC Remedy AR System forms. You can add fields and
workflow to it, but you cannot delete the reserved fields, which are discussed in the following
section.
800 AR_RESERV_SVR_EVENT_TYPE
801 AR_RESERV_SVR_EVENT_CAUSE
802 AR_RESERV_SVR_EVENT_DETAILS_1
803 AR_RESERV_SVR_EVENT_DETAILS_2
804 AR_RESERV_SVR_EVENT_DETAILS_3
These fields distinguish the Server Events form from all other forms. Only one Server Events form
can exist in the AR System database; therefore, only one form contains these reserved fields.
Case 1: When the server starts, the server creates the Server Events form automatically if
the form does not already exist in the BMC Remedy AR System database. If you delete the
Server Events form, the server automatically regenerates the form the next time the server
is started.
Case 2: If you create your own Server Events form, you must supply default values with the
correct data type for the required core fields. If the Server Events form already exists and
you try to create a form with the reserved fields, the server returns an error when you try to
save the form. Error checking does not allow the existence of more than one Server Events
form.
You can modify the Server Events form by using BMC Remedy Developer Studio or a driver. You
can rename the Server Events form; however, if any of the reserved fields is removed, the form is
no longer a valid Server Events form.
Changes to server objects (such as forms, The AR System server records the API calls Viewing server object
filters, active links, escalations, fields, VUIs, that cause server object changes changes (see page 1803)
char menus, and containers)
Changes to server settings Alert users when server settings change Viewing server setting
changes (see page 1806)
Alert registration Alert users who are registered or deregistered Viewing alert registration
activity (see page 1814)
Server group activity A server in a server group fails and another Viewing server group
server takes over actions (see page 1815)
Client Timeout A client timed out before the server could Viewing client timeout
respond. server event details (see
page 1816)
Adding a user
#define AR_SVR_EVENT_CHG_SCHEMA 1
#define AR_SVR_EVENT_CHG_FIELD 2
#define AR_SVR_EVENT_CHG_CHARMENU 3
#define AR_SVR_EVENT_CHG_FILTER 4
#define AR_SVR_EVENT_CHG_IMPORT 5
#define AR_SVR_EVENT_CHG_ACTLINK 6
#define AR_SVR_EVENT_CHG_ESCAL 7
#define AR_SVR_EVENT_CHG_VUI 8
#define AR_SVR_EVENT_CHG_CONTAINER 9
#define AR_SVR_EVENT_CHG_USERS 10
#define AR_SVR_EVENT_CHG_GROUPS 11
#define AR_SVR_EVENT_CHG_SVR_SETTINGS 12
#define AR_SVR_EVENT_CHG_ALERT_USERS 13
#define AR_SVR_EVENT_ARCHIVE_DONE 14
#define AR_SVR_EVENT_SERVGROUP_ACTION 15
#define AR_SVR_EVENT_CHG_LICENSES 16
#define AR_SVR_EVENT_DYNAMIC_PERM 17
#define AR_SVR_EVENT_CHG_IMAGE 18
Use the tables in the following topics to look up the description that corresponds to the type
number and cause number of the server event for which you need information.
In the Event Details 1 field, the object names recorded for the Set calls are the names of the
objects before the Set operation. Therefore, if an ARSetSchema call renames the form from AA to
BB, AA is the form name recorded in the Event Details field for the server event.
For "Set" API calls, if the name of the object is changed, the Event Details 2 field contains the old
name of the object, and the Event Details 1 field contains the new name. If the name is not
changed by the Set call, the Event Details 2 field contains a NULL datatype.
In the Event Details fields, semicolons separate multiple items. No spaces follow the semicolon.
The string recorded in the Event Details fields can have maximum lengths of 255 bytes (
AR_MAX_SVR_EVENT_DETAILS ), not including the NULL. If the value to record in the Event
Details fields exceed the maximum, the value is truncated.
Note
Type Cause Cause Description Event Details 1 Event Details 2 Event Details 3
2 0 or 13 ARSetField field ID; field name form name old form name
2 151 ARCreateMultipleFields field ID; field ID; ...; field ID form name
5 35 ARImport
Type Cause Cause Description Event Details 1 Event Details 2 Event Details 3
Event Type: 10
Event Cause: User added (0), modified (1), or deleted (2)
Event Details 1: Entry ID of the user and the user login name
Event Details 2: Unused
Event Details 3: Unused
Request ID: The unique number assigned to identify a particular request
Event Date: Time and date that the event occurred
Submitter: User who caused the user change event
The following information appears in the fields on the Server Events form when a group,
application, or role change is recorded:
Event Type: 11
Event Cause: Group, application, or role that was added (0), modified(1), or deleted(2)
Event Details 1: Entry ID of the group and the group name; or application name; or entry ID
of the role
Event Details 2: Unused
Event Details 3: Unused
Request ID: The unique number assigned to the entry in the Server Events form
Event Date: Time and date that the event occurred
Submitter: User who caused the group change event
On the User form, the value in the Event Details 1 field for the user login name is the value in
reserved Field 101. For the Group form, the value for the group name is the value in reserved Field
105.
When a user login name or group name is modified, the name recorded in the Event Details 1 field
is the name after it is modified. For example, if an ARSetEntry is called to change the user's login
name from YY to ZZ, ZZ is recorded as the user's login name in the Event Details 1 field.
In the Event Details fields, semicolons separate multiple items. No spaces follow the semicolon.
Event Type: 12
Event Cause: The numeric value of the server option AR_SVR_INFO_XX
Event Details 1: The input datatype and input value to the SetServerInfo call (For more
information, see Datatypes values (see page ).)
Event Details 2: Unused
Event Details 3: Unused
Request ID: The unique number assigned to identify a particular request
Event Date: Time and date that the event occurred
Submitter: User who called SetServerInfo
For the following server options, the input password is replaced with an arbitrary number of
asterisks before storing it in the Event Details 1 field:
AR_SERVER_INFO_DB_PASSWORD
AR_SERVER_INFO_DSO_USER_PASSWD
AR_SERVER_INFO_DSO_TARGET_PASSWD
AR_SERVER_INFO_APP_SERVICE_PASSWD
AR_SERVER_INFO_MID_TIER_PASSWD
AR_SERVER_INFO_REM_WKFLW_PASSWD
AR_SERVER_INFO_REM_WKFLW_TARGET_PASSWD
AR_SERVER_INFO_PLUGIN_PASSWD
AR_SERVER_INFO_PLUGIN_TARGET_PASSWD
The datatype is included in the Event Details 1 field because AR_DATA_TYPE_NULL does not
have a value, only the datatype.
In the Event Details fields, semicolons separate multiple items. No spaces follow the semicolon.
An ARImport API call can result in many server object changes, but this event is recorded as one
server event. Therefore, even though one Import call can add or modify several forms, filters, and
active links, the server records these changes as an Import object change event, and the Cause
field contains the RPC call number of ARImport.
12 5 AR_SERVER_INFO_ALLOW_GUESTS datatype;value
12 6 AR_SERVER_INFO_USE_ETC_PASSWD datatype;value
12 7 AR_SERVER_INFO_XREF_PASSWORDS datatype;value
12 8 AR_SERVER_INFO_DEBUG_MODE datatype;value
12 10 AR_SERVER_INFO_DB_PASSWORD datatype;value
12 15 AR_SERVER_INFO_SET_PROC_TIME datatype;value
12 16 AR_SERVER_INFO_EMAIL_FROM datatype;value
12 17 AR_SERVER_INFO_SQL_LOG_FILE datatype;value
12 19 AR_SERVER_INFO_FLOAT_TIMEOUT datatype;value
12 20 AR_SERVER_INFO_UNQUAL_QUERIES datatype;value
12 21 AR_SERVER_INFO_FILTER_LOG_FILE datatype;value
12 22 AR_SERVER_INFO_USER_LOG_FILE datatype;value
12 28 AR_SERVER_INFO_MAX_ENTRIES datatype;value
12 31 AR_SERVER_INFO_ESCALATION_LOG_FILE datatype;value
12 33 AR_SERVER_INFO_SUBMITTER_MODE datatype;value
12 34 AR_SERVER_INFO_API_LOG_FILE datatype;value
12 37 AR_SERVER_INFO_FTEXT_TIMEOUT datatype;value
12 45 AR_SERVER_INFO_DS_RPC_SOCKET datatype;value
12 46 AR_SERVER_INFO_DS_LOG_FILE datatype;value
12 47 AR_SERVER_INFO_SUPPRESS_WARN datatype;value
12 50 AR_SERVER_INFO_SAVE_LOGIN datatype;value
12 56 AR_SERVER_INFO_ADMIN_ONLY datatype;value
12 57 AR_SERVER_INFO_CACHE_LOG_FILE datatype;value
12 59 AR_SERVER_INFO_THREAD_LOG_FILE datatype;value
12 65 AR_SERVER_INFO_TCD_TCP_PORT datatype;value
12 66 AR_SERVER_INFO_DSO_DEST_PORT datatype;value
12 78 AR_SERVER_INFO_NFY_TCP_PORT datatype;value
12 79 AR_SERVER_INFO_FILT_MAX_TOTAL datatype;value
12 80 AR_SERVER_INFO_FILT_MAX_STACK datatype;value
12 81 AR_SERVER_INFO_DEFAULT_ORDER_BY datatype;value
12 82 AR_SERVER_INFO_DELAYED_CACHE datatype;value
12 83 AR_SERVER_INFO_DSO_MERGE_STYLE datatype;value
12 84 AR_SERVER_INFO_EMAIL_LINE_LEN datatype;value
12 85 AR_SERVER_INFO_EMAIL_SYSTEM datatype;value
12 86 AR_SERVER_INFO_INFORMIX_RELAY_MOD datatype;value
12 87 AR_SERVER_INFO_PS_RPC_SOCKET datatype;value
12 88 AR_SERVER_INFO_REGISTER_PORTMAPPER datatype;value
12 89 AR_SERVER_INFO_SERVER_NAME datatype;value
12 90 AR_SERVER_INFO_DBCONF datatype;value
12 92 AR_SERVER_INFO_AP_RPC_SOCKET datatype;value
12 93 AR_SERVER_INFO_AP_LOG_FILE datatype;value
12 94 AR_SERVER_INFO_AP_DEFN_CHECK datatype;value
12 95 AR_SERVER_INFO_MAX_LOG_FILE_SIZE datatype;value
12 96 AR_SERVER_INFO_CLUSTERED_INDEX datatype;value
12 97 AR_SERVER_INFO_ACTLINK_DIR datatype;value
12 98 AR_SERVER_INFO_ACTLINK_SHELL datatype;value
12 99 AR_SERVER_INFO_USER_CACHE_UTILS datatype;value
Datatypes values
For server setting changes, the Event Details 1 field records the datatype and value. The datatype
is recorded as 0, 2, and 4, corresponding to the datatypes in the following table.
0 NULL AR_DATA_TYPE_NULL
2 Integer AR_DATA_TYPE_INTEGER
Event Type: 13
Event Cause: User registered for alerts (102), user deregistered for alerts (103)
Event Details 1: User login name, IP address of computer user logs into, and other details.
Event Details 2: Unused
Event Details 3: Unused
Request ID: The unique number assigned to identify a particular request
Event Date: Time and date that the event occurred
Submitter: User who caused the alert change event
In the Event Details fields, semicolons separate multiple items. No spaces follow the semicolon.
13 102 User logs in Operation type tag (R);byte length of user name;user name;registration time;IP address of client;
to alert client port;actual client IP address;server IP address that client expected;registration flag;client
client version;client codeset
13 103 User logs Operation type tag (U);byte length of user name;user name;IP address of client;client port;client
out from version
alert client
Event Type: 14
Event Cause: Copy to archive only (1), delete from source only (2), copy to archive and
delete from source (3)
Event Details 1: Source form name
Event Details 2: Details of the activity
Event Details 3: Destination form name
Request ID: The unique number assigned to identify a particular request
Event Date: Time and date that the event occurred
Submitter: User who caused the archive change event
Archive activity
14 1 Copy to archive only Source <Actual number of entries copied to archive> of <Total Destination
form number of matches> form name
name
14 2 Delete from source Source <Actual number of entries deleted from source> of <Total Destination
only form number of matches> form name
name
14 3 Copy to archive and Source <Actual number of entries copied to archive and deleted Destination
delete from source form from source> of <Total number of matches> form name
name
Event Type: 15
Event Cause: Failover (1), relinquish (2), takeover (3)
Event Details 1: Server performing action
Event Details 2: Name of operation
Event Details 3: Other server
Request ID: The unique number assigned to identify a particular request
Event Date: Time and date that the event occurred
Submitter: User who caused the server group action event
Type Cause Cause Description Event Details 1 Event Details 2 Event Details 3
15 1 Server in group fails over an Server that an operation Name of the Server that an operation is
operation is failing over to. operation failing over from.
involved.
Type Cause Cause Description Event Details 1 Event Details 2 Event Details 3
15 2 Server in group is Server relinquishing an Name of the Server expected to take over a
relinquishing an operation operation. operation relinquished operation.
involved.
15 3 Server in group takes over Server taking over an Name of the Null
an unowned operation. unowned operation. operation
involved.
Event Type: 17
Event Cause: Start (1), end (2)
Event Details 1: Schema for which the groups are being updated
Event Details 2: Null
Event Details 3: Null
Request ID: The unique number assigned to identify a particular request
Event Date: Time and date that the event occurred
Submitter: User who caused the hierarchical group event
Type Cause Cause Description Event Details 1 Event Details Event Details
2 3
17 1 A group command is Schema for which the groups are being Null Null
initiated initiated
17 2 A group command is Schema for which the groups are being Null Null
completed completed
Event Details 2 Read-only call indicator (0 for API call that updates, 1 for read-only API, in character format)
Event Details 3 Form name if the API call involves a form; otherwise, NULL
You can create workflow that is triggered when a server event is recorded. For example, you might
want to create a filter that fires when an entry is submitted to the Server Events form, indicating
that an object change occurred. The filter should execute a Run Process action that runs the
arsignal program to force a companion AR System server to reload its cache. The filter should
have one such action for each companion server.
To make the machine1 server reload its cache, construct the filter run process action as follows:
arsignal -g machine1
If machine1 was running on specific port 2033, the action would be as follows:
arsignal -g machine1:2033
For more information about arsignal, see arsignal.exe or arsignal (see page 1135).
Managing data
This section contains information about managing your data in BMC Remedy AR System, including
exporting and importing data and definitions, and the AR System database.
Auditing data
The following topics provide information about auditing:
If you have at least one field configured for auditing on a form, you can record data in a main form
in an audit form or log form when any of the following actions occur:
Form level — Enable auditing for a form, specify an audit style, and specify the name of the
form that will contain the audited data. If the audit form does not exist, BMC Remedy AR
System creates it.
Field level — Specify whether a field should be:
Audited — A change to this field triggers audit processing.
Copied — The field value is copied to the corresponding field in the audit form if the
audit field is triggered. Audit fields that have not changed are not copied.
Audited and copied — The field triggers an audit if the field is changed. If it is not
changed, it is still copied.
When you configure a main form for auditing, you specify whether to perform a form-style audit
(see page 1819)or a log-style audit (see page 1822). Because BMC Remedy AR System updates the
audit forms for both styles, a special user named AR_AUDITOR performs the audits. This name is
displayed in the Last Modified By field for all audits.
You can selectively audit entries by providing an audit qualification. If the audit qualification fails,
the audit does not occur (even if the values of audit fields have changed).
Using flag fields to view changes to an individual field (see page 1829)
Audit processing and filters (see page 1830)
Form-style audits
A form-style audit records data from the main form to an audit form. The audit form:
Is a regular form that serves as the destination for data audited in the main form.
Resides on the same server as the main form.
Contains the same fields as the main form.
Contains several audit-specific fields.
When you configure a main form for a form-style audit, you specify a name for the audit form.
When the form is audited, data from the main-form fields configured for auditing is copied to
corresponding fields on the audit form. If there are fields in the main form not configured for
auditing, the corresponding fields on the audit form are left blank.
In this topic:
General
Any changes to the definitions in the main form (such as adding or deleting a data field) are
applied to the audit form.
You can change the form and view properties of the audit form.
Only an administrator can delete entries.
If the main form belongs to a deployable application, the audit form also belongs to the
same application.
If the main form is made "licensable," then the audit form is also made licensable.
An audit form cannot be further audited, but it can be archived.
Archive forms cannot be audited.
Fields
Data fields, attachment pools, and panel holders cannot be modified or added to an audit
form. All other field types, such as trim, or table, can be added or modified.
Limit information of the fields must be the same as the corresponding fields in the main
form.
The permissions for fields on the Audit forms is read access.
Workflow
When an audit form is created, the workflow from the main form is not copied to the audit
form. You can add workflow to an audit form, but workflow cannot modify data in an audit
form.
Data can be exported from an audit form, and data can be imported into an audit form, but
existing entries in an audit form cannot be overwritten.
While audited main forms are imported, if the main form is audited Copy style and the audit
form is not found, audit for the main form is disabled and a warning (Form not Found.
ARError 303 ) is returned.
During an import in place, if the main form has fields added or deleted, those fields are also
added to the audit form.
If the main form is part of a lock block from an exported definition, the audit form is part of
the same lock block. If a field in the main form is audited after locking the form, the
corresponding flag field is not created. (For more information, see Using flag fields to view
changes to an individual field (see page ).)
Any uniqueness constraints (indexes) that exist on the main form are removed from the
audit form. You can add indexes to the audit form.
When the audit form is created, the entry points are cleared. The administrator can add
entry points.
When the audit form is created, the disable status history form property is not copied from
the main form to the audit form. The audit form has status history disabled by default.
All other form properties are copied from the main form to the audit form. However, after the
audit form is created, subsequent changes to the main form properties are not copied to it.
The audit form by itself cannot be imported. Either the main form by itself or both the main
and audit forms can be imported.
When the audit form is created for the first time, all fields (including non-data fields) are
created. After that, if non-data fields are added to the main form, they are not added to the
audit form.
Important
When you delete multiple fields from the main form, BMC Remedy AR System attempts
to delete those fields from the audit form as well. If any of those fields contains data, none
of them are deleted from the audit form. If the fields are deleted one by one from the main
form, the fields that do not contain data are deleted from the audit form.
Action The actions that triggered the audit. The options are:
2 — Set
4 — Create
8 — Delete
16 — Merge
Fields Changed The database names of the audit fields that changed. The syntax for the list is as follows:
;databaseName;databaseName;databaseName;
User The user that modified the entry in the main form.
Audit Date The date and time when the audit occurred.
Last Modified By The user who created the entry in the audit form last. (AR_AUDITOR is always the user who creates the
entries.)
Audit Join Key Used for join form auditing. BMC Remedy AR System maintains this field.
BMC Remedy AR System does not create these fields as part of any view in the audit form, so you
must add them to the view to use them. (In BMC Remedy Developer Studio, open the audit form,
and choose Form > Add/Remove Fields On View.)
Note
The owner of the non-core fields on the audit form (form style) is set to the owner of the
audit form, not the original form.
If the audit form has data, use the ARDeleteSchema API call with both
AR_SCHEMA_DATA_DELETE and AR_SCHEMA_SHADOW_DELETE options. This deletes the
audit form with data.
Log-style audits
A log-style audit records data from the main form into a log form. The log form:
Is a regular form that serves as the destination for data audited in the main form.
Resides on the same server as the main form.
Contains only audit-specific fields. (See Log form fields (see page 1822).)
When you configure a main form for a log-style audit, you specify a name for the log form. When a
main form is audited, BMC Remedy AR System copies values from the main form to a text field in
the log form.
Important
A log-style audit form can contain data from multiple main forms.
In this topic:
Action The actions that triggered the audit. The options are:
2 — Set
4 — Create
8 — Delete
16 — Merge
Fields Changed The database names of the audit fields that changed. The syntax for the list is as follows:
;databaseName;databaseName;databaseName;
User The user that modified the entry in the main form.
GUID This field is set if the main form contains a field with ID 179.
Log A list of field-value pairs that represent the changes to the main form. The syntax is as follows:
fieldName1:fieldValue1
fieldName2:fieldValue2
Log Key 1 Fields that help in searching of log entries. For more information, see Log keys (see page 1823).
Log Key 2
Log Key 3
Audit Date The date and time when the audit occurred.
Last Modified By The user who created the entry in the audit form last. (AR_AUDITOR is always be the user who creates the
entries.)
Log keys
When a log form is created, it contains special character fields named Log Key 1, Log Key 2, and
Log Key 3. These fields can help in searching of log entries.
In BMC Remedy Developer Studio, you can set a field to any of these Log Key fields. During an
audit, the value of this field goes to the key that was selected.
Only three keys are available, and you cannot set two fields to the same log key. Also, you cannot
set log keys for diary and attachment fields.
Have a fixed set of fields. (See Log form fields (see page 1822).)
Do not belong to any application when they are created.
Do not belong to any lock block when they are created.
While audited main forms are imported, if the main form is audited Log style and the Log form is
not found, audit for the main form is turned off and a warning (Form not Found. ARError 303) is
returned.
Configuring auditing
This section contains information about configuring auditing:
Note
Do not audit system forms (such as User, Group, Server Statistics, and Server Events)
because these forms use reserved fields that should exist only on the one form in BMC
Remedy AR System.
1. In BMC Remedy Developer Studio, open the form you want to audit.
2. Click the Definitions tab, and expand the Other Definitions panel and then the Audit panel.
3. From the Audit Style list, select the type of audit you want to perform:
None — No auditing is performed.
Form — A snapshot of the audited form is saved to the audit form you specify. Only
the audit and copy fields in the audit form contain values.
Log — Whenever a form is saved after an audit field or set of fields changes values,
an entry is created in the log form you specify.
4. From the Audit State field, select Enable.
You can select Disable to disable audit functionality temporarily. Any other audit
configuration values you have specified remain intact.
5. From the Audit Only Changed Fields field, select how the audit function operates when no
field is changed:
Default — Use the setting defined in the Configuration tab (see page 321)of the BMC
Remedy AR System Administration: Server Information form.
Yes — Auditing occurs only when at least one field value changes as the result of an
operation.
No — Auditing occurs whenever there is an operation on the form. Before BMC
Remedy AR System 7.5.00, the server always audited every operation.
6. If you specified a form audit, enter an audit form name in the Audit Form field.
7. If you specified a log audit, enter a log form name in the Log Form field.
The audit or log form you specify is created when you save the main form.
8. (Optional) Specify a qualification.
The incoming entry is audited only if it satisfies this qualification.
9.
BMC Remedy Action Request System 9.1 Page 1824 of 4703
BMC Software Confidential. BladeLogic Confidential.
9. Click OK.
In the audit form's Audit panel, the name of the main form is displayed next to the Audit
From Form label.
In the log form's Audit panel, the number of forms using the log form is displayed next to the
Audit From Ref Count label.
Audit fields are copied only if their value changes. For copy fields, either the value in the current
transaction is taken (if present) or the value is taken from the database. If an entry is created and
no value is entered for a copy field, nothing is copied. Fields specified as audit and copy trigger an
audit and are copied if changed. If not changed, they behave like copy fields.
Note
System fields, including Create Date and Last Modified By, cannot be audited.
1. In BMC Remedy Developer Studio, open a form for which auditing is enabled.
See Configuring a form for auditing (see page ) for more information.
2. Select the fields you want to audit.
3. In the Properties tab, set the value for the Audit Option property.
The options are:
None — Changes to this field are not recorded by any audit processing.
Audit — Changes to this field trigger audit processing and its new value is recorded in
the audit form or log form, depending on the audit style you specified at the form
level. If the value does not change, its value is not recorded.
Copy — The database value or the value in the current transaction if present is
recorded during an audit, but does not trigger audit processing.
Audit and Copy-Changes to this field trigger audit processing. If the value has not
changed, the value from the database is recorded (similar to the behavior of the Copy
option).
4. (For log-form audits only) In the Properties tab, set the values for the Audit Log Key
property:
Key 1 — The value of this field appears in the Log Key 1 field in the log form.
Key 2 — The value of this field appears in the Log Key 2 field in the log form.
Key 3 — The value of this field appears in the Log Key 3 field in the log form.
5. Save the form.
Could not create the Archive or Audit Form specified. Archive/Audit for this form has been
disabled. (ARWARN 8992)
Form does not exist on server Form1: (ARWARN 303).
The problem is that the BMC Remedy AR System server is attempting to create the table field in
the audit form, but because the table field's form is missing, it cannot pass the validation.
To resolve this problem, create the table field's form, or delete the table field from the main form.
Attributes
Field limits
Display properties
Help text
When you modify the following properties, the audit form is unchanged:
Entry mode
Index for FTS
Permissions
When vendor or view forms have form-style auditing, the audit form created is a regular form,
which includes core fields. Therefore, you might have to provide default values for the Short
Description and Submitter fields because they are required fields (for example, if you have
workflow configured for the audit form).
Join forms
Both form-style and log-style auditing are available for join forms. An audit of a join form is
triggered if the join form contains audit fields from the base forms and the audit qualification (if
present) is TRUE.
Form style
For a form-style audit, the join forms' underlying forms must also be configured for form-style audit
and must be enabled. BMC Remedy AR System creates the join forms' audit form as a join form of
the underlying forms' audit forms and use the Audit Join Key fields in the join criteria, as shown in
the following figure.
After BMC Remedy AR System creates the audit join form, you can modify the join criteria for the
audit form to add more qualifications.
The following figure illustrates how join-form audits work in join forms. If Join Form 2 satisfies the
join audit criteria, an audit occurs for Forms A, B, and C (irrespective of A, B, and C's audit
qualification), and audit records are visible by way of Audit Join Form 2.
If Join Form 2 fails the join audit criteria but Join Form 1 satisfies the audit criteria, an audit occurs
for Forms A and B, and audit records are visible by way of Audit Join Form 1, but not Audit Join
Form 2. If Form C has audit enabled, Form C is audited, and Audit Form C has entries, but audit
data cannot be viewed from Audit Join Form 2.
In summary, for the first audited join form that passes the join audit criteria, BMC Remedy AR
System generates a unique GUID and uses this GUID to update the Audit Join Key fields in this
join form's underlying audit forms. Because the audit join form has a join criteria based on the Audit
Join Key, the audit join form displays only data entered or modified in the corresponding audited
join form. If the base forms of the join are modified directly, these base forms are audited, but the
audit join form does not display the modifications because the value of the Audit Join Key fields is
empty.
Log style
For a log-style audit, a regular form is created and contains the special log-style audit fields.
Important
Data entered in the join form is copied to the log form regardless of whether any of that
data is pushed to the underlying base forms. This means that the data captured in a log-
style audit form might not reflect the content of the main form or its underlying base
forms.
When you modify the following properties of character fields on the main form, the BMC Remedy
AR System server updates the audit form:
Attributes
Field limits
Help text
When you modify the following properties, the audit form is unchanged:
Entry mode
Display properties
Index for FTS
Permissions
Distributed Server Option (DSO) works on audit and log forms, but the Transfer and Update flags
are not updated.
For a log-style audit, if the audited form contains an Assignee Group field or any other dynamic
group fields, the server does not create these fields on the log form. If you add these fields to the
log form, the values of the fields are always copied to the log form, even if the Audit Option for the
field is set to None.
Flag fields are not in any view, and they are created with the field ID in the name, for example, F_
fieldIDC, where _fieldID is the field ID of the audited field. (If a join form is audited, fieldID is the
field ID of the audit field in the join form.)
Note
In the base form of a join, if a field is set to audit after the audit join form is created, the
flag field is created in the base form's audit form and in the audit join form.
When auditing is triggered, and if the audit field changes value, the corresponding flag field
contains a "1" to indicate that the field changed; otherwise, it remains empty.
By using a flag field, you can refine your search and view changes to an individual field.
F_fieldID_C
where fieldID is the ID of the field for which you want to view the audit. This field must be one of the
fields that have the Audit or Audit and Copy attribute enabled.
For example, Form A has fields A, B and C, and audit is turned on for A and B. To view the
changes to A, search Form A with the following qualification:
'F_536870913_C' = "1"
where 536870913 is the field ID of field A. This query displays all of the records where field A has
changed.
The exception is a join form that is audited by Log Style. For these forms, auditing occurs at the
end of Filter Phase 1. For example, if Join Form AB has Set Fields filter actions and has auditing
enabled, the audit occurs after all the Set Field actions are executed.
If an error occurs in the transaction (including errors while auditing), the entire transaction is rolled
back.
Note
Phase 3 filter actions (such as Run Process, Notify, and DSO) are not audited.
For information about filter processing, see Filter processing in BMC Remedy AR System server
(see page 2832).
BMC Remedy Approval Server is a self-contained, shared module that can be attached to any
BMC Remedy AR System application. It is a flexible solution for automating any approval or
signature process in any organization. Several BMC Remedy solutions use BMC Remedy Approval
Server to automate approvals, including BMC Change Management, BMC Service Request
Management, and BMC Asset Management. You can also write custom applications that use BMC
Remedy Approval Server.
Note
BMC Software does not advise customers about policies and procedures, but can provide
information about recommendations for using BMC Software products to support an
organization's policies and procedures.
BMC Remedy Approval Server is a software tool that helps implement business processes. It can
support compliance audits by providing an audit trail and proof of authenticity associated with an
approval, such as US FDA 21 CFR (Code of Federal Regulations) Part 11.
For more information about implementing processes and integrating applications with BMC
Remedy Approval Server, see Configuring the BMC Remedy Approval Server (see page 626).
The following topics provide information about how BMC Remedy Approval Server supports
compliance audits:
Using well-defined processes and rules consistently is one key to a successful compliance audit.
Because BMC Remedy Approval Server uses defined processes and rules to gather approvals
(signatures) from the appropriate decision-makers, you can ensure that the processes and rules of
the business are always followed when gathering signatures.
By using BMC Remedy Approval Server and applications based on it to implement business
processes, you can create operational checks to ensure that approval steps take place in the order
and according to the conditions specified by your business rules.
Electronic signatures
In general, an electronic signature is stored data that reflects the intent of the individual to indicate
his or her signature. It must include the name of the signer, the date and time the signature was
executed, and the meaning of the signature.
BMC Remedy Approval Server provides this functionality for BMC Remedy AR System based
applications. Any application that uses BMC Remedy Approval Server to generate signatures, such
as BMC Change Management or a custom approval application, automatically uses the BMC
Remedy Approval Server functionality to permanently store each electronic signature along with a
set of related information.
Important
Many national and state governments have enacted laws that specifically define the term
"electronic signature". Companies using BMC Remedy Approval Server to support
compliance audits, where this term carries a specific meaning, should use the information
in this section together with appropriate legal advice.
Many audit guidelines also require that the approver's identity be verified at the time the signature
is entered. With BMC Remedy Approval Server, you can apply several types of control to ensure
that the approver has signature authority and to verify the approver's identity.
For more information about access control in BMC Remedy AR System, see Access control (see
page 1269).
Note
The following topics provide information about the elements of an auditable process:
Written logs
To support a process audit, a log of the process actions must contain information sufficient to
answer the following questions:
What was the action taken or decision made (the meaning of the signature)?
When was the action taken or decision made (the date and time of the signature)?
Who took the action or made the decision (the signature)?
In a manual system, this information is kept by storing the relevant paper documents in a filing
system. When you use BMC Remedy Approval Server to implement a process, BMC Remedy AR
System stores the answers to these three questions in the Approval Audit Trail field, which is
associated with every request. For information about how BMC Remedy Approval Server uses the
Audit Trail Field, see AP-Detail form (see page 1673).
You can also use the Audit form property to track changes to data in any form. If this property is
configured, BMC Remedy AR System tracks changes to audited fields in the form according to
settings you specify. You can selectively audit entries by providing an audit qualification, or audit all
changes to the specified fields. For information about using BMC Remedy AR System form
auditing, see Using audit records (see page 1330).
You can also track supporting data in the BMC Remedy Approval Server and BMC Remedy AR
System log files. For information about using these log files, see Working with logs (see page 4179).
Signatures of approvers
In a manual system for approving requests, such as expense or change requests, the approver's
signature is a physical signature on a document that signifies approval of the decision, expenditure,
or change. The document must describe the request, and the signer must also date the request.
The approver's physical signature is verified by human recognition of the approver's handwritten
signature.
In an automated process implemented by BMC Remedy Approval Server, the approver selects an
option to Approve or Reject a request. This action records the decision as the approver's electronic
signature in the Signature form, along with the date, time, and all information contained in the
request.
For more information about BMC Remedy Approval Server signatures, forms, and handling
approval requests, see Configuring the BMC Remedy Approval Server (see page 626).
Archiving data
The archive feature of BMC Remedy AR System provides a convenient way to periodically store
data (not definitions) from a form to an archive form; this reduces the amount of data accessed
during searches on the main form, thus improving system performance. Archiving applies to all
types of forms, except display-only and join forms. The main form is the form on which archive is
set (data is read from this form), and the archive form is the form to which data is copied.
The archive form is a regular form with special behaviors. It must be on the same server as the
main form.
When configuring a form for archiving, you can designate an existing form as the archive form if it
has the characteristics of an archive form. (See Characteristics of archive forms (see page ).) If
you do not enter the name of an existing form, BMC Remedy AR System creates the form.
Copy to Archive and Delete from Source — The entries you choose from the main form are
copied to the archive form and deleted from the main form.
Delete from Source — The entries you choose from the main form are deleted; no archive
form is involved.
None — Select this option to delete the archive settings for the form. The form is not
archived.
Related topic
Archiving concepts (see page 169)
Notes
Do not archive system forms (such as User, Group, Server Statistics, and Server
Events) by using the Copy to Archive or the Delete from Source option because
these forms use reserved fields that should exist only on one form in BMC Remedy
AR System.
You cannot archive join forms and vendor forms. Any existing archive defined for
join form and vendor form is ignored for archiving.
Important
To make changes in the Age Qualification field, you must select the overlay type as
Overwrite.
Archive panel
(Click the image to expand it.)
Note
Archives must be of type copy and delete or delete. Any archives that are of
type copy at the time of upgrade will be converted to copy and delete. This
ensures that records in the archive form are unique.
Warning
If you select Copy to Archive and Delete from Source, and select the No
Attachments and No Diary Fields options, the data in the attachments and
diary fields are deleted from the main form and are not copied to the archive
form.
11.
BMC Remedy Action Request System 9.1 Page 1836 of 4703
BMC Software Confidential. BladeLogic Confidential.
11. To specify the age criteria for archiving records, enter the number of days and age
qualification field. The default qualification field is Modified Date. This is a new parameter
added in the archive definition, which specifies that the records should be archived when
they have reached a specific age. For information about understanding age qualification,
see Age qualification in archiving concepts. (see page 170)
For example, to archive statistics that were last modified before 30 days from the current
date in the Application Statistics form, enter:
Number of Days: 30
Qualification Field: Modified Date
12. The description fields in the archive policy form and Archive Manager Console show the
description from the archive definition. Write the description in such a way that even an
administrator less familiar with the application is able to understand the effects of the policy.
13. Save the form.
After the data is archived according to your qualification criteria at the time specified, you
can open your archive form and view archived data using a browser.
Important
When a view form is archived, the archive form is created as a regular form
containing core fields that are not in the source form. You must supply default
values for the required Submitter and Short Description core fields in the archive
form.
If multiple BMC Remedy AR System servers use a single database, you can disable archiving on
all the servers except one if you want archiving to take place on only one server. If the server is a
member of a server group, configure the server group in the BMC Remedy AR System Server
Group Operation Ranking form to make sure that only one server performs the archiving operation.
For more information, Configuring server groups (see page 375).
Errors are logged in the arerror.log file. Because there is no API, there is no entry in the API log
file.
To create an entry for archiving in the Server Events form, select the Archive option on the Server
Events tab of the AR System Administration: Server Information form.
If you select the Archive check box, every archive event is logged into the Server Events form.
You must create all the relationships between the forms using associations object. For
information about creating associations, see Creating associations (see page 2234).
You must have configured your archive from the Archive panel in the Definitions tab of that
form. For information about configuring data archiving, see Configuring data archiving for a
form (see page 1835).
Note
Indirect associations having Many to Many cardinality cannot be followed for archiving.
Even if you select those associations, they will be ignored during the archiving process.
Note
You can only create Additive overlay type for the Association to follow for Archive
panel.
4. Select the option for defining associations that needs to be archived with the form. The list
displays the associations to follow options as per level of precedence .
Follow Parent — This option inherits parent settings. If you select this option, the
option specified for the parent form is applied to the child form. For example, if “All
Enforced” option is selected for the parent form, the child form also follows “All
Enforced” associations. For more information, see Association to follow example (see
page 1841).
None — No associations are selected to follow for archiving with this form. No related
forms will be archived.
Selected — Only the selected associations are archived. When you choose this
option, you can select the associations and the related forms that you want to
archive.
All Enforced — All enforced associations are followed for archiving. After you choose
this option, all enforced associations are automatically marked as selected in the
associations list. If required, unenforced associations can also be selected from the
associations list.
All — All the associations for this form are archived. Generally, this option is not used
for archiving. If you select this option, associations not meant for archiving are also
included.
Note
Note
You can also view a list of associations which are not available for following as
they do not exist on the server which the form is defined.
You can also view a list of forms which should be archived along with this form.
However, if no archive is defined, these forms will not be archived. You can double-
click any such form and configure data archiving on it. For information about
archiving steps, see Configuring data archiving for a form (see page 1835).
While following association for archive, server will not archive data for a related
form, if archive is not defined for it. Also, in that case, server will not follow any of
the associations of the related form since it did not archive the data from related
form itself.
Following table illustrates associations that will be followed and the forms that will be archived
depending on the Associations to follow for Archive setting defined for each form.
Form A Form B Form C Associations that will be followed for Forms that will be
archiving archived
AC
Form A Form B Form C Associations that will be followed for Forms that will be
archiving archived
1. In a browser, open the AR System Administration Console, and click System > General >
Server Information.
The AR System Administration: Server Information form appears.
2. Click the Configuration tab, and perform the following step:
a. Enter the Archive Interval value in hours. For example, if you enter value 2, all the
forms where you have enabled archiving, are archived after every two hours.
Note
Note
You can also set the global archive interval by using the Run Every (hours) field from AR
System Archive Manager Console. For more information, see Changing how often the
archiving process runs.
Related topics
Archiving overview (see page 168)
After the data is archived, you can remove a specific range of archive data permanently from your
system. Exporting and deleting of old archive data is to be carried out to align with your data
retention and records management life cycle policies.
Warning
Do not perform the export operation during peak hours or while doing upgrades. After you
start the export operation, you cannot cancel it.
Export and Delete — exports and deletes data in the archive forms
Export — only exports the data in the archive forms
Delete — only deletes data in the archive forms
7.
BMC Remedy Action Request System 9.1 Page 1844 of 4703
BMC Software Confidential. BladeLogic Confidential.
7. Click Save.
8. Click New search to search for the record that you was exported.
9. Enter the age of the archive as the search criteria.
10. Click Search.
11. The Status field displays the status of the operation.
12. Upon completion of the operation, the Result field displays the result of this operation, which
is a directory containing the exported archive having the
<AGGAA5V0HGXU0ANJECBEAAAFI4HFYR> format. If the operation failed, the Result
field displays an error message with information about why it failed. You can see detailed
error logs in the arextension.log file located in the <ARInstallationDirectory>/ARServer/Db
directory.
Notes
You can export/delete all the archived forms present in the system. For each
exported archive form, a new CSV file is created in a directory located under the
<ARInstallationDirectory>/ARServer/Db directory.
Errors, if any, are logged in the arextension.log file located in the
<ARInstallationDirectory>/ARServer/Db directory.
Exporting and deleting archive data is an asynchronous operation. When you
create an entry in the system form, AR System Archived Data Management,
workflow defined on this form runs in the background.
In a server group environment, the export and delete operation runs on the server
on which the entry was created. However, if the mid tier is connected to a load
balancer, then create entry operation could be sent to any of the servers in the
group that are behind the load balancer. If you need the export and delete
operation to run on a specific server in the group, then you must specify the server
before you create entry into AR System Archived Data Management form.
You can also perform a export and delete operation from the Archiving console,
which provides a more wizard-like experience. For information about using the
Archiving console, see Managing the archiving process (see page 1850).
Limitation
1. Make sure that the main form in BMC Remedy Developer Studio is closed.
If the main form is not closed, your archive form might be regenerated and the archive
settings might not be cleared.
2. In BMC Remedy AR System Navigator, expand serverName > All Objects.
3. Double-click Forms.
4. In the Forms list, right-click the form name, and choose Delete.
5. In the Confirm Deletion dialog box, click OK.
6. In the Confirm dialog box, click OK.
If the archive form has data, use the ARDeleteSchema API call with both
AR_SCHEMA_DATA_DELETE and AR_SCHEMA_SHADOW_DELETE options. This deletes the
archive form with data.
Instead of losing the archive information, clear the Enable check box, and the archiving information
is preserved. To resume archiving, select Enable again.
Qualifications
You can select the data to be archived based on a qualification. If you do not specify a
qualification, all the data in the form is archived. Consider the effect on performance when using
this option.
Licensing
When you license an application and license the main form, the archive form is also licensed.
Attributes
Entry mode
Field limits
Help text
When you modify the following properties, the archive form is unchanged:
Display properties
Index for FTS
Permissions
FTS and MFS settings for form fields
However, if the fields are deleted one by one from the main form, the fields that do not contain data
are deleted from the archive form.
General
The archive form is a regular form. The detail view in the BMC Remedy Developer Studio
forms list shows its Type as Archive.
Changes to the definitions of the main form (for example, adding or deleting FTS or
database indexes) are also applied to the archive form. Addition of data fields cause the
same fields to be created on the archive form. Deleted data fields are deleted from the
archive form if the form contains no data; otherwise they are preserved.
Trim and button fields are not created automatically, but you can manually add trim and
button fields to an archive form.
View changes are not part of the form definition and changes to them are not applied to the
archive form. You can change the form and view properties of the archive form explicitly.
If the main form belongs to a deployable application, the archive form also belongs to the
same application.
If the main form is made "licensable", the archive form is also made licensable.
The archive form cannot be audited or further archived.
Fields
When the BMC Remedy AR System creates a new archive form, the following two fields are
included on the form:
Original Request ID (ID 450)
Original Create Date (ID 451)
These fields contain the Request ID and Create Date from the main form. These
fields are not placed in the view. To add them, open the archive form in BMC
Remedy Developer Studio, and choose Form > Add/Remove Fields On View. Then,
move the fields to the Fields in View table.
You can use the Create Date of the archive form as the archive date. The remaining
core fields on the archive form contain the same values as the main form.
Data fields, attachment pools, and panel holder cannot be modified or added to an archive
form. All other field types, such as trim or table, can be added or modified.
The data fields in the main and archive form have identical field limits. The permissions on
archive forms are always read access.
Workflow
Workflow from the main form is not attached to the archive form when it is created. You can
add workflow to an archive form, but workflow cannot modify data in an archive form.
Filters that execute on Delete execute when archiving deletes data.
Data can be exported from an archive form and imported into an archive form, but existing
entries in an archive form cannot be overwritten.
During import, if only the main form is present, archiving is disabled for that form, and a
warning is returned. When archive is enabled for that form, BMC Remedy AR System
checks to see if the archive form is present. If no form is found, BMC Remedy AR System
creates the archive form. If the archive form is found, it is used only if it is a valid archive
form.
If the main form is part of a lock block from an exported definition, the archive form is part of
the same lock block.
Any unique index on the main form is created as a non-unique index on the archive form. As
the Entry ID and Create Date fields are duplicated on the archive form in the new fields, any
index on those fields is applied to the new fields instead.
When an archive form is created, the entry points are cleared, but you can add entry points.
All other form properties are copied from the main form to the archive form. However, after
the archive form is created, subsequent changes to the main form properties are not copied
to the archive form.
The owner of the non-core fields on the archive form is set to the owner of the archive form,
not the original form.
Changes to the definitions of the main form (for example, adding or deleting FTS or database
indexes) are also applied to the archive form.
· Addition of data fields cause the same fields to be created on the archive form. Deleted data fields
are deleted from the archive form if the form contains no data; otherwise they are preserved.
Task Description
AR System Archive Manager Walkthrough of the BMC Remedy AR System Archive Manager console and managing the
console overview archiving solution. Click here to learn more.
Opening the AR System Archive Steps to launch the console. Click here (see page 1851) to learn more.
Manager console
Turning archiving on and off Enable or disable archiving. Click here to learn more.
Changing how often the Control the frequency of archiving. Click here to learn more.
archiving process runs
Changing when a record is Determine whether a record is ready for archiving. Click here to learn more.
ready for archiving
Disabling individual archiving Disable archiving of specific record types. Click here to learn more.
policies
Running an on-demand archive Run archiving outside the archiving schedule. Click here to learn more.
process
Exporting and deleting archive Move or delete archived records. Click here to learn more.
data
Stopping an archive run after it Stop an on-going archiving operation. Click here (see page 1851) to learn more.
has started
Notes
To access the AR System Archive Manager console, you must have the role of Archive
Admin.
When entering values in console fields, you must type numbers that are positive, whole
numbers, equal to or greater than 1.
You can also connect with other users for related discussions on the BMC Community .
Scheduled, full archive run—To stop an entire, scheduled archive run in mid-process, from
the AR System Archive Manager console, turn archiving off.
Individual archiving policy—To stop an individual archiving policy in mid-process when it is
part of a scheduled archiving run, disable the policy in the AR System Archive Manager
console. When you disable an individual policy that is part of a regular archiving run, the
archiving run skips the remainder of the qualified records covered by the disabled policy and
moves on to the next archive policy.
On-demand archive—To stop an on-demand archive, disable the applicable policy in the AR
System Archive Manager console.
Note
When you turn off archiving or disable an archiving policy as mentioned here, the
archiving process finishes archiving the record currently being processed and then
either stops or moves on to the next archiving policy. All of the records that the
archiving run processed before you disabled it remain committed to the Archive
form.
BMC Remedy AR System .def and .xml files are text-based and the .migrator file is binary-based.
All three types of files contain one or more BMC Remedy AR System object definitions. Similar to
the .def and .xml file, the .migrator file stores the actual support file, along with the object
definitions.
Export object definitions to BMC Remedy AR System .def and .xml formats, which BMC
Remedy Migrator exports as server independent. See Exporting object definitions on a
server (see page ).
Convert .def and .xml files to the .migrator format, which can be launched independently.
The files are displayed in their own server windows. See
Migrate objects from a server to a .migrator file, a .migrator file to a server, or between*.
migrator* files.
Note
When converting a .def or .xml file to a .migrator file, the original .def or .xml file remains
intact. The newly converted .migrator file is stored within the same directory where the .def
or*.xml* file is stored.
1. In the left pane of the server window, under BMC Remedy AR System Objects, click an
object type.
2. In the right pane, select the objects you want to export.
3. Select Tools > Export Definitions.
4. In the Save As dialog box, enter a file name, including the .def or .xml extension, and click
Save.
If the definition file already exists, you can append the existing file.
1. In the left pane of the server window, under BMC Remedy AR System Objects, click an
object type.
2. In the right pane, select the objects you want to export.
3. Select Tools > Export Locked Definitions.
4. In the Lock Key field of the Object Lock dialog box, enter a lock key of up to 27 characters.
You must enter a valid lock key consisting of alphanumeric characters (for example, 123456
or abcxyz or abc789 ). You cannot use double-byte characters. Objects with the same lock
key are encrypted as a group in the definition file.
5. In the Verify Lock Key field, enter the lock key again.
6. Select a lock type, either Hidden or Read Only.
Filters, filter guides, and escalations can be hidden. For more information about lock types,
see Types of object details (see page 2019).
7.
BMC Remedy Action Request System 9.1 Page 1852 of 4703
BMC Software Confidential. BladeLogic Confidential.
7. Click OK.
During the export, locked objects can exist in the same definition file with unlocked objects.
Because lock information is encrypted, no one can remove a lock or change the lock type in
the definition file.
8. In the Save As dialog box, enter a file name, including the .def or .xml extension, then click
Save.
If the definition file already exists, you can append the existing file.
Select Tools > Convert Definition Files. When the Open dialog box appears, select a .def or .
xml file, and click Open. A progress bar appears as the file is being converted to the .
migrator file format.
Select File > Open, select a .def or .xml file, and click Open. BMC Remedy Migrator
converts the .def or .xml file to a .migrator file with the same name.
Integration of external data with data residing in your BMC solution stack
Data migration, import, change, and export
Data integration
The Atrium data integration services are available for BMC Remedy AR System through the Atrium
Integrator adapter, an AR System Database Connectivity (ARDBC) plugin, the Atrium Integrator
Spoon client, and the Atrium Integrator forms — all are installed with the AR System server. These
services enable you to:
You can rapidly extend the scope of your data management capabilities by adding Atrium
Integrator, the BMC Remedy ITSM suite of applications, and the BMC Atrium Configuration
Management Database (CMDB).
The following diagram illustrates the AR System interaction with the Atrium Integrator adapter, the
Spoon client, and the Atrium Integrator forms.
Component Description
Atrium An ARDBC plugin that receives requests for executing and monitoring jobs from the AR System server, sends
Integrator them to the Atrium Integrator Carte server, then returns the Carte server results to the AR System
adapter server. Installed with your AR System server.
Atrium A GUI used to create and manage data integration jobs and transformations. Installed with your AR System
Integrator server.
Spoon client
(see page 1907
)
Atrium A web server for data integration that allows remote job and transformation execution by accepting XML files
Integrator that contain the job's (or transformation's) execution configuration. Enables remote monitoring as well as starting
Carte server and stopping of jobs and transformations that run on the server. Installed with your AR System server.
Atrium A plugin used to import data from and/or export data to an external data store to and/or from the AR System
Integrator AR server and/or the BMC Atrium CMDB. Installed with your AR System server and BMC Atrium Core installation.
and CMDB
plugins
Component Description
BMC Remedy
AR System
server
BMC Remedy Forms that store jobs and transformation definitions and log files. The Spoon client can be used to access the
AR System repository.
repository
BMC Remedy Forms that are shipped with AR System or are created by you.
AR System
forms
Atrium Atrium Integrator ARDBC plugin front-end forms that allow job execution and monitoring on the
Integrator Carte server. Installed with your AR System server.
forms (see
page 1880)
External data Flat files, spreadsheet files, database files, or other data that is imported or exported to or from your AR System
server for data migration.
Related topics
Atrium Integrator
Importing data with Atrium Integrator in BMC Atrium Core 9.1 online documentation.
Configuring Atrium Integrator for data import in BMC Atrium Core 9.1 online
documentation.
Troubleshooting in BMC Atrium Core 9.1 online documentation.
Known Issues in BMC Atrium Core 9.1 online documentation.
Jobs — A job performs high-level data flow control. A job is composed of one or more
transformations and it executes transformations. Jobs are used to coordinate ETL activities
such as defining the flow and dependencies for what order transformations should run, or
prepare for execution by checking conditions such as, "Is my source file available?" or
"Does a table exists in my database?" Jobs are saved with the .kjb filename extension.
Steps — A step is the basic unit of a transformation that performs an action such as data
loading. Groups of steps define input and output stores. As such, steps are organized into
categories such as Input steps or Output steps. Steps also exist in jobs.
Hops — A hop shows data flowing from one step to another in a pictorial representation of a
transformation in the Spoon client. The data in a hop originates at an Input step and is
destined for an Output step.
Transformations, jobs and their related components are stored in the BMC Remedy AR System
form repository, which can be accessed using the Spoon client.
Form repository
When you save a transformation, the form repository starts and commits the client-managed
transaction. If the transformation already exists, the data related to the transformation (such as,
transformation attributes) is cleared from all related transformation forms. In addition, it saves:
When you save a job, the form repository starts and commits the client-managed transaction. If the
job already exists, the data related to the job (such as, job attributes) is cleared from all related job
forms. In addition, it saves:
When you load a transformation into the Spoon client, the form repository reads all:
When you load a form into the Spoon client, the form repository reads all:
Job attributes
Job entries and job entry attributes
Job hops
Job notes
Job parameters
Job settings
Database connections, slave servers, cluster schemas, and partition schemas
Input steps
Input steps in a transformation or job read data from a data source. To read AR System data and
export it into other formats such as .csv file or XML file, AR System includes the AR Reader
adapter plug-in, or ARInput step. For more information, see ARInput step (see page 1859).
Output steps
Output steps in a transformation or job write data to a data source. To import data into AR System
from an external source (such as a flat file, .csv file, XML file, or relational database tables), AR
System includes the AR Writer adapter plug-in, or AROutput step. For more information, see
AROutput step (see page 1862).
Variable input
The ARInput, AROutput, and ARX File Input adapter plug-ins, as well as the AR Connection
module, support variables as input.
The server name, port number, and RPC number can be defined as variables when defining an AR
System connection (or AR Connection) for an ARInput step or an AROutput step. The .arx filename
in the ARX File Input step can also be defined as a variable. For more information, see Variable
form (see page 1905).
ARInput step
The ARInput step allows data to be extracted from a BMC Remedy AR System form. It also:
Uses its connection input parameters to create an AR System server connection. The
connection is created once and reused as needed.
Substitutes chunk size and qualifications with real values, if variables are used.
Uses the GetListEntryWithFields (GLEWF) call on the form by providing the field IDs of
the user-selected fields and fetches data with the user-provided chunk size.
Converts each entry to an Atrium Integrator row format and sends it to the next step.
Supported conversions are from standard AR System data types to data types supported by
Atrium Integrator. Data types are listed below.
General tab
Connection — Click the New button to create a new BMC Remedy AR System server connection.
Click the Edit button to modify an existing connection. You can select an existing connection from
the dropdown menu.
Form Name — Name of the BMC Remedy AR System form from which data is extracted.
Chunk Size — Number of records to be fetched from the AR System server at one time. This
number may be specified as a variable. If a variable is specified, the ARInput step will use the
variable value at runtime.
Qualification tab
The Qualification tab allows you to provide a qualification string to extract data from an AR System
form. If a qualification string is not provided, all data is extracted from the form using a 1=1
qualification. If variables are used in the qualification string, the ARInput step will use the variable
values at runtime.
Click the Configure Qualification button to open and configure the qualification.
Fields tab
The Fields tab allows you to specify a list of fields to be extracted from an AR System form. The
Get Fields button allows you to add all fields from a form to the list.
None No type
Null None
Integer Integer
Real Number
Char String
Diary String
Time Integer
Bitmask Integer
Bytes Binary
Decimal Bignumber
Attach Binary
Date Date
Ulong Integer
Display String
View String
Complex AR System data types such as Attachment, Currency, and Status History are handled in
the same way the AR System Import tool and ODBC driver handle data types. For example, the
Currency field is split into its separate parts, such as Date, Type and Value, and each is identified
separately in the field list. See Importing data into BMC Remedy AR System forms (see page 1908)
for more data import information.
AROutput step
The AROutput step allows data to be inserted into a BMC Remedy AR System form. It also:
Connects to the AR System server using the connection input parameters. A connection is
created once and reused.
Substitutes commit size and qualifications with real values, if variables are used.
Checks if it should start a new batch based on the flag, if the commit size is provided. This
flag is true by default. After a transaction is started, it changes to false. Once the
transaction is committed, the flag is reset to true.
Retrieves the input row from the previous step using the Atrium Integrator get row API
function.
Converts the Atrium Integrator input row to an AR System form entry using the Mapping
Field list. The Atrium Integrator row data type is converted to the AR System data type. After
the value is converted to the corresponding AR System data type, a second-level
conversion is required if the field's data type does not match the converted value's data
type. The data type conversions are listed below.
Parses the matching qualifications and substitutes the values of stream fields from the input
row in the qualification object.
Prepares the merge type based on duplicate request action, requires any required fields,
and enforces pattern-matching flags.
Uses the Java ME API call by providing the AR System form name, qualification (optional-if
not present it passes a NULL), merge type, and multi-match option. If the server does not
support the new Java ME API with a qualification, then it explicitly gets the matching request
using a GLEWF call. Then it performs the merge based on the specified merge type.
Checks whether it is time to commit the transaction based on the record number if a bulk
transaction is started. If it is, then it calls the end bulk entry transaction API and sets the
start bulk entry transaction flag to true.
General tab
Connection — Click the New button to create a new AR System server connection. Click the Edit
button to edit an existing connection. Select an existing connection from the dropdown menu.
Batch Commit Size — (optional) If provided, data will be imported using bulk API, which may be
specified as a variable. If it is specified as a variable, the AROutput step will use the actual value
provided.
Duplicates tab
Duplicate Request Action — Select Error, Create New, Overwrite or Update for the duplicate
request ID action.
Match By Request ID — Select to use the Request ID for a matching output row.
Multi Match Option — Select when more than one record matches the matching qualification.
Matching Qualification String — (optional) If a qualification string is not provided, matching occurs
with the Request ID. Variables may be used in the string. At runtime, variables are substituted for
actual values. Click the Configure Matching Qualification button to open the qualification helper
dialog and configure a matching qualification. Fields from previous steps are displayed here and
may be used inside the qualification.
Require Required Fields — Select this option to allow or disallow null values for required fields.
Enforce Pattern Matching — Select this option to enforce pattern matching. For example, a pattern
may be configured such that a field's value is alphanumeric. Selecting this option will ensure that
this pattern is enforced.
Skip Workflow Processing — Select this option to bypass workflow processing when this row is
written to the form. When selected, workflow defined on a merge action for this form will not be
executed.
The Field Mapping tab allows you to map the output fields from previous step(s), or stream fields,
to their respective AR System form fields.
The Edit Mapping button provides a helper dialog to map the fields.
None Null
Number Real
String Char
Date Date
Boolean Enum
Integer Ulong
Bignumber Decimal
Binary Attach
Passes an ARX file to the AR System ARX parser which extracts schema info and data
lines.
Displays schema names in a list, which allows the user to select one schema at time.
Displays all fields for the selected schema in the Fields table when the Get Field button is
clicked.
During an execution of a transformation, the ARX parser reads the data line and converts it
into a token.
Converts tokens into the proper Atrium Integrator data types.
Handles multiple schemas in single file.
Treats multiple occurrences of same schemas as single schema and combines all data
together.
The data type conversion is same as that of the ARInput step, see ARInput data type conversions
(see page 1862) for details on the ARInput data type conversions.
The ARX File Input step dialog contains the following fields:
Step Name — Unique label for the ARX File Input step in a transformation.
File Name — ARX file name and path from which data will be read. The location can be
defined as a variable.
Chunk Size — Number that specifies the size of the data to be read at one time from the
ARX file. The default value is 100. This value can be defined as a variable.
Schema Names — Name of the AR System schema containing data to be read from the
ARX file.
Connection — Click the New button to create a new AR System server connection. Click the
Edit button to edit an existing connection. Select an existing connection from dropdown
menu.
The Field Name column contains a list of fields to be extracted from the ARX file for a given
schema. If an AR System connection is provided, the field names are extracted from the AR
System form and not the ARX file.
If field names and field labels differ and you want to map ARX file Input step data to an AROutput
step, use the AR System connection. You can automatically map all fields to the AROutput step in
the Enter Mapping window of the Field mapping editor using the Auto Map button.
AR Connection module
You can create AR System database connections for transformations in the Spoon client using the
AR Connection module. Once an AR System database connection is defined, it is available to all
ARInput and AROutput steps in a transformation.
The Atrium Integrator adapter uses the AR System Client Managed Transaction feature to open a
database connection instance and share that connection with all transformation steps.
Transformations using ARInput, AROutput, and CMDB sources use this feature because the
sources operate on objects with relationships and make modifications on multiple forms and/or
tables based on data in other tables (as well as results from previous steps). For example, the
adapter might receive data from an LDAP server and place it in User forms. If a problem occurs,
rolling back changes is easy when the transformation runs in a single database connection.
To enable this feature, select the Make the transformation database transactional check box in the
Transformation properties dialog box.
Error handling
The ARInput, AROutput and ARX File Input steps throw an exception if they receive an error when
executing API calls. This halts the transformation execution. To implement out-of-the-box support
for skipping error rows and continuing execution of the subsequent input rows, you must define an
error handling step in the Spoon client for the related ARInput, AROutput or ARX File Input steps in
a transformation. The error handling step could be a text file Output step that writes the error
information to an error log file.
Directory structure
When designing a file input step (such as ARX File Input or text file input) in a transformation, enter
the appropriate UNIX or Windows path available from the BMC Remedy AR System server in the
Filename field.
Example
If you add a new column to an Excel input file, add it at the end of the worksheet. If you add a new
column elsewhere in the worksheet, you must manually add its corresponding field number to the
Field tab in the Excel Input step. In addition, you must add all columns from the Excel spreadsheet.
The following error message displays if you use the Excel Input step, sort on any tab in the Fields
tab, save the transformation, and then 1) preview rows in the file or 2) run the transformation in
BMC Remedy AR System or with the Spoon client.
org.pentaho.di.core.exception.KettleValueException:
Unexpected conversion error while converting value [v String] to a Number
Log Files
arcarte.log — All Execution Instance messages are recorded in this file according to the
logging level specified when you created the Execution Instance.
arcarte-stdout-<timestamp>.log — All messages that the Carte server prints to the console
are recorded in this file.
arcarte-stderr-<timestamp>.log — All error messages that the Carte server prints to the
console are recorded in this file.
The ARDBC plug-in log file is arjavaplugin.log. All ARDBC plug-in messages are recorded in this
file. By default the log level is warn. If you want to log info or debug messages:
1. Open <AR_system_installation_directory>/pluginsvr/log4j_pluginsvr.xml
2. Search for logger com.bmc.arsys.pdi.
3. Change the log level to info or debug.
4. Restart the AR System server.
Example
<logger name="com.bmc.arsys.pdi">
<level value="info" />
</logger>
The Log field in the UDM:ExecutionStatus form shows the log file for a specific Execution Instance.
However, the log lines displayed are stored in the Carte server's memory, which has a maximum
buffer of 5000 lines to control memory usage. As new log file lines are added, the Carte server
deletes the older log file lines. However, this information is retained in the arcarte.log with all other
Carte server log file information. See the third-party documentation for more information about this
logging limitation.
To configure the Carte server to store more than 5000 log lines, set the
KETTLE_MAX_LOG_SIZE_IN_LINES parameter in the armonitor.cfg file for the Carte Java
process, and restart the AR System server.
A transformation or job can be configured to log the execution information to AR System logging
forms. Use these forms to configure logging:
When you run a transformation or job in the Spoon client, the log information is displayed in the
Logging tab of the Execution results panel.
This section describes runtime, design, and plug-in error messages for the Atrium Integrator
adapter. For related BMC Remedy AR System error messages, see BMC Remedy AR System
error messages (see page 4310).
Message Description
Error parsing the qualification The ARInput step failed to parse the specified qualification.
Error while fetching next set of records The ARInput step failed to fetch the next chunk of records from the AR
System server.
Error while fetching attachment for field: {0} The ARInput step failed to fetch the Attachment value for a row.
Error in AROutput Step The AROutput step failed to send the output to BMC Remedy AR System.
Error in BULK ENTRY Transaction: {0} The AROutput step failed to commit the bulk entry transaction.
More than one entry matched the qualification and Review the qualification and modify it to ensure that it matches one entry,
the multi match option is set to ERROR or change the multi-match option to update first or update all.
Error while parsing matching qualification The AROutput step failed to parse the specified matching qualification.
No or Empty Currency Code for Currency value for <currency field name>.TYPE
field {0}
No conversion date for Currency value for field {0} <currency field name>.DATE
Error while fetching fields information for form {0} The AROutput step failed to fetch field information from a form in BMC
Remedy AR System.
EXTERNAL operator is not supported in the Remove the External operator from the qualification.
matching qualification
Error while setting the private RPC Queue An error occurred while setting the private RPC queue number on the AR
connection.
Error while reloading the password collection An error occurred while reloading information from the UDM:
RAppPassword form.
Error while impersonating user {0} An error occurred while impersonating the provided user.
Error occurred while trying to create transaction on An error occurred while starting a client managed transaction on the AR
the ARdatabase connection.
No valid database connection defined! No connection related information is defined on AR connection. Please
define host, port, TCP port, RPC port, user name on connection to avoid
this error.
Error occurred while trying to connect to the An error occurred while connecting to BMC Remedy AR System.
database
Error disconnecting ARdatabase: {0} An error occurred while disconnecting from BMC Remedy AR System.
Error performing commit on connection An error occurred while committing the client managed transaction on the
AR connection.
Error performing rollback on connection An error occurred while rolling back the client managed transaction on the
AR connection.
Error occurred while trying to get list of tables An error occurred while fetching a list of form names from BMC Remedy
AR System.
Error occurred while trying to get table fields An error occurred while fetching a list of fields on a form from BMC
Remedy AR System.
Error occured while trying to get table entries An error occurred while fetching form entries from BMC Remedy AR
System.
Error while fetching last log date An error occurred while fetching the last log date from log forms such as,
the UDM:TransformationLog form or the UDM:JobLog form.
Unable to write log record to log form {0} An error occurred while writing a log record to the logging form, such as
the UDM:TransformationLog form or the UDM:JobLog form.
Error while fetching log records from {0} form An error occurred while fetching log records from logging form such as,
the UDM:TransformationLog form or the UDM:JobLog form.
Error while clearing log form entries from {0} form An error occurred while deleting log records from a logging form such as,
the UDM:TransformationLog form or the UDM:JobLog form.
Unable to clean up old log records from log table {0} An error occurred while deleting log records from a logging form such as,
the UDM:TransformationLog form or the UDM:JobLog form.
Exception while converting string to diary list value1 The AROutput step cannot convert a string value to a diary list field
value.
Java.lang.OutofMemoryError arcarte.logarmonitor.cfg
Message Description
Field with ID {0} does not have name {1} FieldsGet FieldsFields
on form {2}
It was not possible to retrieve the target The AROutput step dialog could not fetch AR fields from a form. Problems
fields for this step because of an error: establishing a connection to the BMC Remedy AR System server might exist.
{0}
Certain referenced fields were not found! The AROutput step dialog cannot find BMC Remedy AR System fields specified in
These target fields were not found: {0} the field mapping. Check the mapping to ensure that the correct field names are
used.
Chunk size cannot be blank, please Use a Chunk size value greater than zero in the ARX File Input step.
specify chunk size.
Message Description
Error fetching in progress import requests The ARDBC plug-in failed to fetch the requests left to process since
the last processing.
Create Entry not supported on form {0} The Atrium Integrator adapter ARDBC plug-in only supports the
Create Entry call in the UDM:Import form, the UDM:Execution form,
and the UDM:ScheduleProcessor form.
Error while creating an entry on form {0} A Create Entry operation failed in an Atrium Integrator adapter
ARDBC plug-in vendor form.
Repository Directory or Object ID is required for For the Create Execution Instance request, you must provide a
Operation CREATE_EXEC_INSTANCE Repository Directory or an Object ID for the transformation or job.
Failed to reload password collection The Atrium Integrator adapter ARDBC plug-in failed to re-read all the
passwords from UDM:RAppPassword form.
Get List Entry With Fields not supported on form {0} Get List Entry With Fields
Error while fetching data from form A Search Entry operation failed on a vendor form that belongs to the
Atrium Integrator adapter ARDBC plug-in.
Qualifier operator OR and NOT are not supported only In the vendor forms that support Search, modify your qualification
AND is supported because only the AND conditional operator (and not OR or NOT) is
supported.
Only EQUAL relational operation is supported for In the vendor forms that support Search, modify your qualification
qualifier because only the EQUAL relational operator is supported.
Field {0} is not supported for query. Supported fields for In the vendor forms that support Search, check the associated Field
query are {1} IDs and modify your qualification because an unsupported field is
used in the qualification.
Error while fetching entry from form {0} A Search Entry operation fails on a vendor form that belongs to the
Atrium Integrator adapter ARDBC plug-in.
Error performing asynch task {0} The ARDBC plug-in failed to process an asynchronous UDM:Import
task.
Error processing UDM Import (Entry ID {0}) The ARDBC plug-in failed to process an asynchronous UDM:Import
task.
Regular forms that allow you to configure Atrium Integrator engine settings are also provided. With
these forms you can:
The Unified Data Management (UDM) administrator can access all UDM forms on BMC Remedy
AR System. UDM users have access to a subset of the forms as shown in the following table.
Form name Form type UDM Admin role access UDM User role access
UDM:Config Regular x
UDM:Execution Vendor x x
UDM:ExecutionInstance Regular x x
UDM:ExecutionStatus Vendor x x
UDM:Import Regular x
UDM:JobEntryLog Regular x x
UDM:JobLog Regular x x
UDM:LoggingChannelLog Regular x x
UDM:PermissionInfo Regular x
UDM:RAppPassword Regular x
UDM:RepositoryObject Vendor x x
UDM:ScheduleProcessor Vendor x
UDM:StepLog Regular x x
UDM:StepPerformanceLog Regular x x
UDM:StepStatus Vendor x x
UDM:TransformationLog Regular x x
UDM:Variable Regular x x
UDM:CartePending Regular x x
Configuration form
The UDM:Config regular form contains connection details for the Atrium Integrator repository and
Atrium Integrator engine. The repository is created when the AR System server is installed, and the
parameters are configured with default settings from the AR System server. The settings are stored
in the UDM:Config form fields and can be modified by users with AR System administrator level
access.
You need to update the UDM:Config form if you are performing one of the actions listed below:
Action Details
Configure UDM in a server A server group environment consists of two or more servers that share the same database and
group are designated as part of a server group.
Server groups are designed to provide failover operations for crucial operations. They can also
provide scalability and load balancing.
Notes:
Before configuring the UDM:Config form for a server group environment, you must rank the
Atrium Integrator servers
by using the AR System Server Group Operation Ranking form. If you assign ranking 1 to
Action Details
Configure UDM in a non- In a non-server environment, a single server exists. In case of server failure, jobs stop running.
server environment
Note: You need not rank the single server by using the AR System Server Group Operation
Ranking form.
Restore the database When you perform database restore, the data might contain references to the production server
which may not be applicable
in the new upgrade environment. In this case, you have to update the server name references.
For details,
see Updating the destination server names after migration
Note: Update the Atrium Integrator Server Name field in the UDM:Config form when you restore
the database.
Note
After updating the UDM:Config form, You must restart the AR System server for the
changes to take effect.
UDM:Config form
Section Fields
Repository Connection
Details Private RPC Program Number — A private RPC queue for all operations (such as, load and
save) on the repository.
The default value is 0 for no private RPC queue.
API Timeout Normal (seconds) — The API time for all operations (such as, load and save)
on the repository. The default value is 7200 seconds.
Atrium Integrator Engine Update the fields in this section if you are configuring UDM in a server group or a non-server
Connection Details environment.
For details, see
Atrium The name of Even when you select a server in the Atrium Integrator Engine Server Name which is not As a single
Integrator the server ranked 1 in the AR System Server Group Operation Ranking form, the system runs the server exists in
Server hosting the jobs on the server which is ranked 1. a non-server
Name Atrium environment, the
The server name mentioned in the Atrium Integrator Engine Server Name must match
Integrator. Atrium Integrator
with the value specified in the Server-Connect-Name parameter in the ar.cfg form.
By default jobs run on the
this is the single server.
AR System
The server
server
name mentioned
name.
in the Atrium
Note: BMC Integrator
recommends Engine Server
you not to Name must
use server match with the
alias name, value specified
host name, in the Server-
and IP Name
addresses. parameter in the
ar.cfg form.
Host The host The Host name mentioned in the UDM:Config form must match with the diserver or carte The
name server host name mentioned in the armonitor.cfg form. recommendation
assigned to is same for
As an example, you can see the AR server name mentioned in the armonitor.cfg file
the server server group
below.
hosting the and non-server
Atrium environment .
Integrator
server. By
default, this
is the AR
System
server host
name.
Port The server The default port value must be 20000. The default port
port value must be
assigned to 20000.
the Atrium
Integrator
server.
In the above example, jobs always run on the primary server NEWSC-PD-AR-01. Even if
you trigger the jobs from the secondary or a third server, the jobs always run on the primary
server.
In the above example, the diserver or carte plugin is enabled for all the 3 servers.
Related topics
armonitor.conf or armonitor.cfg (see page 1119)
Execution form
The UDM:Execution vendor form is used to execute transformations and jobs. Creating a new
entry for this form leads to the execution of the specified operation on the specified transformation
or job listed on the form. If the requesting user does not have permission for the requested
transformation or job, an error is returned.
To execute a transformation or job, you must first create an execution instance by creating a row in
this form.
This execution instance can be started, stopped, paused, or removed by creating another record
with the same Execution Instance Name and a new Start, Stop, Pause or Remove operation.
UDM:Execution form
Related topics
UDM:ExecutionInstance form
Note that you cannot use this form to create a new Execution Instance, you can only use it to view
existing Execution Instances that were created from by the Create Execution Instance operation
the UDM:Execution form.
The UDM Execution Instance form contains the following fields:
Log Level — The level of logging to be used for the execution. The default value is Minimal
logging. Selections include:
Nothing
Error
Minimal
Basic
Detailed
Debug
Row level
Atrium Integrator Engine Server Name (required) — The name of the Atrium Integrator
server.
In a server group environment, this field displays the primary AR server name.
Primary AR server is server which is ranked as 1 in the AR System Server Group
Operation Ranking form. Even when a user triggers a job from a secondary server,
the job request is sent to the primary AR server. While viewing the execution
instance, the Atrium Integrator Engine Server Name field displays the primary AR
server name.
As a single server exists in a non-server environment, the Atrium Integrator Engine
Server Name field displays the single server name.
If you restore the database, you must update this field to reflect the correct primary
AR server name.
Variable Set Name — Specifies an optional variable set to be used by the execution
instance.
Permissions — Specifies the assigned permissions or role.
UDM:ExecutionStatus form
Use this form to search for the current execution status of a transformation or job instance. The
following types of searches are supported:
For each search result, the following attributes are returned in the form:
Step Execution Status — Table containing execution status of steps for the transformation
instance.
Import form
The UDM:Import regular form allows you to import a job or transformation definition file ( .kjb or .ktr)
into a BMC Remedy AR System form repository. To import the transformation or job into the
repository, create an entry in this form and attach the .kjb or .ktr file. To write over an existing job or
transformation, set the Duplicate Action field to Overwrite.
UDM:Import form
Note
For BMC Remedy AR System servers running Linux, default form permissions
must be set to valid values before a transformation is executed.
Data Tag — Enter the required data for tagging import files.
Duplicate Action — Select Error or Overwrite.
Instance ID — A unique identifier for the import instance.
Type — The type of the imported object, either a job or a transformation.
Status — The status of the import request. For example, In Progress, Completed, or Error.
Error Message — The error message text for the Error status type.
UDM:JobEntryLog form
For each log file, the following attributes are returned in the form:
Job Entry Log ID — Unique identifier for the job in the log file.
Log — Displays logged string of job run.
Batch ID — Unique identifier for a batch of jobs.
Job ID — Unique identifier for the job.
Job Name — Unique label for a job.
Job Entry Name — Unique label for a job entry.
Channel ID — Unique identifier for the job's channel.
Lines Read — Displays quantity of lines read.
Lines Written — Displays quantity of lines written to the repository.
Lines Input — Displays quantity of lines the file input.
Lines Output — Displays quantity of lines output by the file.
Lines Updated — Displays the quantity of lines revised.
Lines Rejected — Displays quantity of lines that were not written, read or updated.
Log Date — Displays month, day and year the log file was created.
Number of Result Rows — Displays quantity of rows resulting from the job run.
Number of Result Files — Displays quantity of files resulting from the job run.
Result — Select Yes to view the job results.
Permissions — The assigned permissions or role.
Errors — Displays the quantity of errors resulting from a job run.
Created by — Displays the job originator.
Modified by — Displays the name of the last user to change the job file.
Create date — Displays the month, day, and year the job was developed.
Modify date — Displays the month, day, and year the job was last changed.
UDM:JobLog form
For each log file, the following attributes are returned in the form:
Modified by — Displays the name of the last user to change the log file .
Create date — Displays the month, day, and year the log file was developed.
Modify date — Displays the month, day, and year the log file was last changed.
UDM:LoggingChannelLog form
For each log file, the following attributes are returned in the form:
UDM:PermissionInfo form
Name — The name of the repository object for which the permission is assigned.
Type — Type of the repository object, transformation, job, directory, database connection, or
slave server.
Object ID — Unique identifier for the repository object.
Directory ID — Unique identifier for the directory of the job or transformation.
Atrium Integrator Server Engine Name — Set an Atrium Integrator engine server name for a
particular transformation or job in this field. After you set an Atrium Integrator engine server
name for a particular transformation or job, then the ARDBC plugin always executes that
transformation or job on that particular Atrium Integrator engine server. In this way, you can
load balance the data integration jobs across multiple Atrium Integrator engine servers. If
you do not set an Atrium Integrator engine server name for a transformation or job then that
transformation or job will always be executed on the co-located Atrium Integrator engine
server.
Permissions – The assigned permission or role.
The BMC Remedy AR System user password is not stored as part of the AR System connection
defined in a transformation for security reasons. The steps provided by BMC use an impersonation
API to connect to the AR System server. These steps query this form with the server name defined
in the AR Connection to get the Remedy Application Service password for that server. The steps 1)
create an initial connection to the server using the Remedy Application Service user name and
password (queried earlier from this form), and 2) impersonate the user named in the AR
Connection definition.
By default, the installer populates this form with the current AR System server's name and Remedy
Application Service password. If you must create connections using a fully qualified domain name
(FQDN) or IP address, enter the alternative entries in this form. For example, if you want to create
remote server connections, enter information about the remote server in this form.
UDM:RAppPassword form
Server Name — The AR System server name to which a connection must be created from a
transformation. You need to update the AR System server name if you are performing one
of the actions listed below:
Configure UDM in a server group: In a server group environment, multiple servers
exist. Make sure that the RappPassword form contains all the possible sever name
values that you use.This is required as the UDM:RappPassword form is used to
authenticate Remedy application service password for the $server$ value that comes
from the BMC Remedy Midtier. The $server$ can be host name, IP address, alias
name, or a Load Balancer name. Incorrect or missing information on this form might
result in load step failure.
In the example below, the UDM:RappPassword form contains the alias names for AR
server and Load Balancer.
newsc-s: AR server alias name
newscorp-vip: LB alias name
Note
If 1) a load balancer server name is provided for an AR System server connection in BMC-provided
Pentaho step (such as, ARInput, AROutput, or CMDB) or 2) if a load balancer is defined in the
UDM:Variable form, you must populate the UDM:RAppPassword form with the load balancer
server name and its password (which is the same as the Application Service Password on the
other AR System server.)
Note
If you change the application password you must also update the RApp password.
The UDM:RepositoryObject vendor form lists all existing transformations and jobs from the
repository for which the current user has permissions.
Search by type — Returns all transformations or jobs from all repository directories for which
the current user has permissions.
Search by type and directory — Returns all transformations or jobs from a specific directory
for which the current user has permissions.
Search with no qualification or (1 = 1) qualification — Lists all jobs from all repository
directories when the default value in the Type field is job.
Example
The UDM:RepositoryObject form contains the following fields for each object:
UDM:ScheduleProcessor form
Request ID — The ID of the requesting BMC Remedy AR System Job form item.
Name — The name of the scheduled transformation or job that is executed.
Params — The job parameters from the AR System Job form.
Common Params — Any common parameter assigned on the BMC Remedy AR System
Job form.
UDM:StepLog form
For each log file, the following attributes are returned in the form:
Step Log ID — Unique identifier for the step in the log file.
Log — Displays logged string of the step run.
Batch ID — Unique identifier for a batch of step log files.
Trans ID — Unique identifier for the related transformation.
Trans Name — Unique label for the related transformation.
Step Name — Unique label for the step.
CopyNr — Unique number of copies.
Channel ID — Unique identifier for the channel.
Lines Read — Displays quantity of lines read.
Lines Written — Displays quantity of lines written to the repository.
Lines Input — Displays quantity of lines the file input.
UDM:StepPerformanceLog form
For each log file, the following attributes are returned in the form:
Step Performance Log ID — Unique identifier for the step in the log file.
Batch ID — Unique identifier for a batch of step log files.
Trans ID — Unique identifier for the related transformation.
Trans Name — Unique label for the related transformation.
Step Name — Unique label for the step.
CopyNr — Unique number of copies.
Lines Read — Displays quantity of lines read.
Lines Written — Displays quantity of lines written to the repository.
Lines Input — Displays quantity of lines the file input.
Lines Output — Displays quantity of lines output by the file.
Search by transformation name — Returns the execution status of all steps from all
execution instances of the specified transformation.
Search by transformation name and execution instance name — Returns the execution
status of all steps of a particular transformation execution instance.
No qualification — Returns the step status of all transformation execution instances.
UDM:StepStatus form
For each step status returned in a search, the following attributes are displayed:
UDM:TransformationLog form
For each log file, the following attributes are returned in the form:
Modify date — Displays the month, day, and year the transformation log file was last
changed.
Variable form
All variables used in transformations and job fields require entries in the UDM:Variable regular
form. The variables allow sets of common variable values to be substituted and used when
executing transformations and jobs. Variables are permission-based and substituted at runtime,
during the execution.
UDM:Variable form
Encrypted Value — An optional encrypted value for the variable. See "Encrypted variables"
below.
Assignee Group Permissions — The assigned permission or role required to use the
variable.
Variable sets
A variable set is a group of variables with a unique variable set name associated with a specific job
or transformation. Each variable must be associated with a variable set. Variables defined by the
current user take precedence if more than one variable with the same name is part of the same
variable set.
Encrypted variables
Variable values may be encrypted. If a value has been assigned in both plain text and encrypted
fields, the encrypted value takes precedence over the plain text value. All variable values, such as
a database password, should be encrypted.
UDM:CartePending form
Use these fields to see the details of new and in-progress jobs:
Atrium Integrator Engine Object ID: Internal unique identifier assigned by the Atrium Integrator
engine for the execution instance.
Atrium Integrator Engine Server Name: The name of the server hosting the Carte server.
Job-Transformation Status: Choose to view jobs with status New and In Progress
Job Configuration XML: Lists the details of all the New or In progress jobs depending on the
selection.
For complete documentation on creating transformations and jobs using the Atrium Integrator
Spoon client, see the third party documentation.
Once installed, the application can be accessed from the Windows Start menu, under Programs,
under the BMC Software folder. AR System administrator permissions are required to log on and
use the Spoon client.
1. Create an execution instance on the AR System server using the UDM:Execution form.
2. Select Create Execution Instance in the Operation field.
3. Create an entry in the AR System Job form and include the date, time, and recurrence.
4. Create an entry in the AR System Job Item form with the Atrium Integrator transformation or
job name and execution instance name created in step 1.
When a job is executed in this framework, an entry is automatically added to the UDM:
ScheduleProcessor form. This form then processes the job based on the job parameters.
The scheduling framework provides a escalation that runs hourly and retrieves due jobs from AR
System Job form. The due jobs are moved to a pending queue where the pending queue
processor writes each job item entry to appropriate vendor form based on a job type mapping
provided in the AR System Job Type Mapping section.
For the "pentaho" job type, AR System places an entry into the UDM:ScheduleProcessor vendor
form. The ARDBC plug-in form receives all the parameters, such as the transformation or job
name, type and execution instance. Then it starts the execution instance on the Atrium Integration
engine server using these parameters.
1. Create an execution instance on the AR System server using the UDM:Execution form.
2. Select Create Execution Instance in the Operation field.
3. Assign the other fields on the form as necessary.
4. Use the UDM:Execution form to create another entry.
5. Select Start Execution Instance in the Operation field. (You can also stop, pause/resume, or
remove an execution instance by configuring another value in the Operation field.)
Starting Data Import and logging on to AR System servers (see page 1908)
The import process (see page 1909)
Supported mapping file types (see page 1910)
Defining Data Import preferences (see page 1911)
Creating mapping files (see page 1914)
Importing data (see page 1918)
Using a saved mapping file (see page 1918)
1. Select Start > Programs > BMC Software > Data Import.
2. In the User Name field, enter your user name.
3. Enter the password of the AR System user.
4. (Optional) If you are required to specify an authentication string or a preference server, click
Options.
a. (Optional)
Enter an authentication string.
Whether you need an authentication string depends on how your server validates
users. For most situations, this field is not used. See Setting up an authentication alias
For information about exporting and importing object definitions, see Importing and exporting object
definitions and locking objects (see page 3263).
1. Complete all edits on the data file before you start Data Import. Do not edit the data file
between the time you open Data Import and the time you start the actual import operation.
2. Export the source data to a file compatible with Data Import. (See Supported mapping file
types (see page ).)
3. Define Data Import preferences. (See Defining Data Import preferences (see page ).)
4. Make sure that adequate space exists where the import log file will reside.
Data Import writes error messages and failed records to a log, which can become quite
large.
5. Make sure that the database has adequate space to store the imported records. Contact
your database administrator for assistance.
6. Create a mapping file. (See Creating mapping files (see page ).)
7. Import the file. (See Importing data (see page ).)
You can create .arx, .xml, and .csv files with the artext utility, which is designed primarily for
localization. For information about artext, see Localizing message components of a form view (see
page 3072).
To use ASCII data obtained from a source outside of BMC Remedy AR System, remember these
rules:
Note
When attachments are exported in AR Export format from a browser, a .zip file is created
that includes the .arx file and the attachments.
Default preferences are set in the Preference window of Data Import. They are stored locally or in
the AR System Administrator Preference form (if you logged into a preference server).
When you create a mapping file (choose File > New Mapping), the preferences in the Preferences
window are used by default. To change the preferences, click the Options tab in the mapping file in
Data Import, and save the mapping.
Note
The preferences in the Preferences window affect only new mapping files. For example, if
you create an EmployeeRecords mapping file and save the file, the current preferences
from the Preferences window are used. If you later update the preferences in the
Preferences window, the preferences for EmployeeRecords remain unchanged. To
change the preferences for EmployeeRecords, use the Options tab.
Note
Number of Note-b
Records
Per
Transaction
Duplicates Handle Defines how to handle duplicate request IDs. The options are
Duplicate
Request Generate New ID for All Records — Assigns new request IDs to all requests in the data file,
IDs By whether or not any IDs are duplicates. Generates request IDs for records that do not already
have them, for example, in a CSV file created outside AR System.
Reject Duplicate Records — Entries are imported using their existing IDs. If an ID is already in
use, an error is generated. The error is processed according to your preferences. See Defining
Data Import preferences (see page 1911) for more information.
Generate New ID for Duplicate Records — Entries are imported using their existing IDs. If a
record with the same ID already exists in the database, a new ID is generated for the imported
record.
Replace Old Record with New Record — Entries are imported using their existing IDs. If a
duplicate ID exists, the entire database record is overwritten with the record being imported.
You must map the required core fields with this option; otherwise, the server rejects the
records. See Importing data (see page ) for more information about mapping.
Update Old Record with New Record's Data — Entries are imported using their existing IDs. If
a duplicate ID exists, only the fields being imported are replaced, merging the record. This
setting also automatically makes all non-core required fields optional. See Data Handling (see
page 1913) for more information about preferences related to required fields.
If Multiple Defines what happens when multiple requests match. The options are
Requests
Match Skip Record — Skips the record in the data file and does not import anything for that record.
Use First Matching Request — Updates the first request with the data from the data file.
Update All Requests — Updates all the requests with the one from the data file.
Make Non- Specifies that noncore required fields are optional during the import. By default, the check box is
Core cleared, and all required fields are treated as required. If a required field has a NULL value, an error is
Required generated. The error is processed according to what you enter in the Bad Records field under the
Fields "Error Handling" section.
Optional
Disable Specifies that records are imported, even if the data in a field does not match the specified pattern. By
Pattern default, the check box is cleared, and the server rejects records if data in the field does not match the
Matching specified pattern. The error is processed according to what you enter in the Bad Records field under
the "Error Handling" section.
Suppress Suppresses the default values of the fields. If the field has a default value and the data you are
Field importing for the field is empty, the import process does not use the default value for that field.
Default
Values
Remove Specifies that all leading white space is removed from each field imported. By default, the check box
Leading is cleared, and values are imported exactly as they appear in the data file.
Spaces
and Tabs
Remove Specifies that all trailing white space is removed from each field imported. By default, the check box is
Trailing cleared, and values are imported exactly as they appear in the data file.
Spaces
and Tabs
Truncate Specifies that fields that are too long are truncated. By default, the check box is cleared, and fields
Strings whose contents are too long generate an error. The error is processed according to what you enter in
Exceeding the Bad Records field under the "Error Handling" section.
Field Limit
Import Specifies how BMC Remedy AR System imports records that contain fewer fields than described by
Records the field titles in the data file. Problem records are imported with NULL values in the missing fields. By
with Too default, the check box is cleared, and the problem records are not imported and an error is generated.
Few Fields The error is processed according to what you enter in the Bad Records field under the "Error
Handling" section.
Import Specifies how BMC Remedy AR System imports records that contain more fields than described by
Records the field titles in the data file. By default, this option is selected. The problem records are imported,
with Too and the extra fields are ignored. If you clear the check box, the problem records are not imported, and
Many an error is generated. The error is processed according to what you enter in the Bad Records field
Fields under the "Error Handling" section.
Date Short Date Defines the short-date format. The options are
Format Format
M/d/yy
d/M/yy
yy/M/d
The component order is based on the Locale settings as defined by Oracle Java.
Short Date
Separator
Time Hour Mode Defines the hour mode. The options are
Format
12 Hour — Tracks in the 12-hour clock (default).
24 Hour — Tracks in universal time.
Separator Defines the time format separator between the hours, minutes, and seconds. A colon (:) is the default.
(Time You can use any character that is not part of the field separator string for the data file.
Format)
AM/PM Specifies where the symbol is positioned if you select 12 Hour for the Hour Mode. The options are
Position
Prefix — The symbol is positioned before the time string (for example, AM 10:23:47 ).
Suffix (default) — The symbol is positioned after the time string (for example, 10:23:47 AM ).
AM Symbol Defines the symbol that indicate mornings if you select 12 Hour for the Hour Mode.
PM Symbol Defines the symbol that indicates afternoon if you select 12 Hour for the Hour Mode.
Decimal .arm.armx
Separator
Bad Defines what happens when the import process encounters a bad record. The options are
Records
Alert User with Popup Dialog — Interrupts the import and displays an error message (default).
The message contains these choices:
Yes — Skips the problem record, writes the error and the record data to the import log,
and continues to import remaining records.
Yes to All — Skips all problem records that generate the same error, writes the error and
the records to the import log, and continues to import remaining records.
Stop Import — Stops the import and prompts you to copy all remaining data to the
import log.
Skip Bad Records — Skips problem records without displaying an error message, and
continues with the import.
Try Fallback Mapping Before Alerting User — If a mapping generates an error, BMC Remedy
Import uses the fallback mapping specified in the Fallback Mapping preferences. If the fallback
mapping also generates an error, a message is displayed. The error is generated against the
original mapping error. Errors are not generated against fallback mappings.
* These settings are affected by field attributes set when fields are defined. See Fields overview
(see page 149) and Creating and managing fields (see page 2470).
A mapping file determines which pieces of data to import into the fields on the target form
(mapping) during the import process. You can map all fields in a data file to all fields in a form, or
you can map fields individually.
AR Export or AR XML — Field IDs are matched first, and then field names are matched for
fields without matching IDs.
CSV or ASCII — Only field names are matched.
When only the AR System server can detect the error (such as when the data is not an acceptable
value), the fallback mapping is not used. For example, the data value is outside the range set for
the form field, or a required field has a NULL value.
Source Export file that contains the data to import. The file must be in .arx, .csv, .xml, or .asc format.
Data File
Contains (CSV and ASCII format only) Determines whether BMC Remedy Import converts the field titles into data.
Field If the first line of data contains field titles, select the File Contains Field Titles check box so that the
Titles titles are converted to data.
If the first line of data does not contain titles, clear the check box.
Field (ASCII format only) The field separator used in the .asc file.
Separator
Field Description
Source
Form
Name
Custom (Optional) The custom_options.xml file, which used to specify date and time formats, the separators to be
Options used, and other information. This field appears only if the source data file selected is a CSV or ASCII file.
File
Note: During installation, a sample empty custom_options.xml file is installed in the installation folders for
BMC Remedy Developer Studio and Data Import. You can change the name and store it anywhere.
4. Map the fields in the Field Value Mappings section using either of the following methods.
a. Click Auto Map to add all fields and map fields to fields of the same name. For more
information, see Tips for mapping all data file fields (see page ).
Or
b. Click Add.
c. In the Add Mapping dialog box, select a Field Name.
d. Use the Keyword or Field buttons to add a value to the Value field.
You can also type field names, keywords, or any constant string into the Mapping
Value field.
For example, suppose you select the Create Date field, and you want each record in
the destination form to have today's date as the value in the Create Date field.
Choose $DATE$ in the Keyword list. The resulting value in the destination form is the
date of the import. See Keywords (see page 2685).
e. Repeat this step for all the fields that you want to map.
Note
If the data file contains duplicate field titles, an error is generated. If the data
is*.arx* or .xml format, the field titles appears as their field IDs. If the data
file is .csv or .asc format, the fields appear with an appended number (for
example, fieldTitle1, fieldTitle2, and so on).
The Options tab does not include a Log File field, but it is included in the Preferences
window.
The Options tab includes the following fields, which are not included in the
Preferences window.
Data Disable Setting this flag causes the server to suspend enforcement of associations on
Handling Enforced entries getting imported. Associations are still enforced on other entries affected by
Associations workflow that might be triggered by entries getting imported. The server will only
honor this flag if the user of the import tool is an administrator.
8. (
Optional) Save the mapping.
9. Import the data as described in Importing data (see page ).
Make sure that all fields map correctly. If necessary, resolve unmatched or incorrectly
matched fields by mapping those fields individually.
If the matching is partially successful, all possible matches are added. To complete the
mapping, map remaining fields individually.
If no matches are found and no entries are in the Form Fields list, an error is generated. You
can delete mappings and map fields individually or start the import with the partial mapping.
If no fields are mapped, an error is generated, and you must load a mapping or map fields
manually.
Importing data
Importing data into a form involves loading a data file and a target form, defining preferences for
the import, and mapping data. To import data into a form, you must have Change permissions for
the fields to which you want to import data. For system fields such as Create-date, you must be the
administrator or subadministrator of the form.
To import data
Stopping an import
You can stop an import before it ends. You are prompted to copy unprocessed records to the log.
There must be enough disk space in the import log partition to copy the records.
Mapping files have an .armx extension. You can use .arm files from previous AR System releases,
but if you modify them, they are saved with an .armx extension.
Data Import reads and writes mappings in PC format, with CR LF at the end of each line.
Notes
If your objects are not displayed correctly after you import, see Troubleshooting BMC Remedy
Flashboards (see page 4519).
To prepare to import objects or data, you can export them to an XML file.
Specifically, every AR System object type has an associated structure definition in XML, which is
specified by the XML Schema Definition (*.xsd ) file. The *.xsd files reside on the AR System
server and are used to validate the AR System object definitions as valid XML.
Exported objects in XML format comprise an XML document, which might also be referred to as an
instance of a particular XML schema definition for that object. If the XML schema definitions are
loaded into an XML editor, someone who is knowledgeable about AR System objects and XML can
edit the XML document.
The XML schema definitions are designed to be similar to the definitions in the * .def files. For more
information about the XML Schema definitions of BMC Remedy AR System objects, see the data
structure information in the C API Reference .
AR System XML definition files are used the same way as the classic .def (definition) files. When
exporting objects in Developer Studio, you can choose AR XML Definition Files (* .xml ) in the Save
as type field of the Export File dialog box. The Import File dialog box works in the same way,
allowing you to bring in XML definitions to your BMC Remedy AR System server.
To import XML data, run Data Import. Open your XML data file by selecting AR XML Files (* .xml )
in the Files of Type field. The other mapping and import steps are the same as previous versions of
BMC Remedy AR System Import tool.
These calls use the AR System API structures that are described in the ar.h file. For more
information about the XML API calls, see the Developing an API program (see page 3377).
Warning
If the AR System server has Record Object Relationships enabled, the relationships are
recorded as the objects are created during import. If you import a large application or
many object definitions, the server might become highly loaded and unresponsive for a
period of time.
On a computer with Developer Studio installed locally, set the current directory to the
directory that contains the Developer Studio executable (by default, C:\Program Files\BMC
Software\ARSystem\developerstudio). The commands must be run in this directory. File
arguments without a directory path are created in the current directory.
Command-line import and export are provided by the DefinitionImport and DefinitionExport
commands. These commands are implemented as Windows batch (.bat ) files.
Every command executed opens a separate AR System session, executes the command,
and logs out.
DefinitionImport and DefinitionExport parse options in the order they are listed in
DefinitionImport and DefinitionExport options (see page ). Options are interpreted in a
predictable order and might not be executed in the order you enter them.
You cannot perform an action against two servers with one command. For example, you
must issue two commands to export object definitions from one server and import them into
another server.
Enclose arguments that contain blank spaces or symbols in quotation marks.
-- Writes the version to standard output and exits without executing other options.
version
-p password Uses the password to connect to the server. Required if the account has a
password.
-w authentication Uses external authentication string or Windows domain to connect to the server.
- portNumber Uses the TCP port number to connect to the server. Required if the server does not
portnum use the default port and there is no port mapper.
-o logFileName Write log and error output to the file. If not specified, the output is written to the
standard error output.
-inplace Import in place. Overwrite each existing object without deleting the object first.
DefinitionImport only.
-lock lockType lockKey Export the objects locked. Valid lockType values are
1 --Read only.
2 --Hidden.
-G Import or export all active link guides. Any -g options are ignored.
-l commandFileName Import or export the objects specified by the XML command file.
To create an XML import/export command file from a working list or a packing list,
use the Save as Import/Export Commands pop-up menu command for packing lists
or working lists in Developer Studio. See the Introduction to Application
Development with BMC Remedy Developer Studio .
You can also use an XML file created from a packing list in an earlier release using
the Generate XML command in BMC Remedy Administrator. (This product is no
longer available.)
Import-export scenarios
The following are examples of common tasks you might perform with DefinitionExport and
DefinitionImport.
To export objects from a single form, use the following command format:
To parse an XML packing list, and export all objects defined in that packing list, use the following
command format:
Note
You cannot export server objects that include a percent sign (%) in their name.
To import specific objects from a source file, use the following command format:
To parse an XML packing list, and import all objects defined in that packing list, use the following
command format:
The -l option parses the XML packing list and imports all objects defined in the packing list. This
option overrides other options in the same command.
To run the runmacro utility, you must set the library path to the directory where the runmacro
executable resides. To do so, use these commands:
LD_LIBRARY_PATH=<runmacroDir>
HP-UX
SHLIB=<runmacroDir>
AIX
LIBPATH=<runmacroDir>
The runmacro command has the following formats. Items between square brackets are optional.
Enclose arguments that contain blank spaces or symbols in double quotation marks.
You can use the original version of runmacro without the output file option (-o):
You can use runmacro with the -o option to use the arcopy syntax, which copies the
output to a file:
When you use the -o option to export data with attachments, the attachments folder is created in
the same directory as the export file. The attachments folder name uses an integer time stamp (for
example, 917732184), and the folder location is specified in the output file name of the runmacro
command.
When creating macros, you can record a login with the proper permissions if you perform actions
that require those permissions (for example, an administrator deleting records). If your macro does
not record a login, you must specify login information using the -U option and the -P option (if
necessary).
This table lists the runmacro options, which can appear in any order in the command line:
Option Description
-o Output file name — Name of the file in which to store the data. The file is initially truncated, and then all the data is
written to the file (one data set after another).
-h Home directory — Path to the ARSystemHomeDir directory. If you do not specify the -d option, runmacro also looks in
this directory for the arcmds directory that contains the macro to run.
-d Macro directory — Directory that contains the macro if your macro is not in the ARSystemHomeDir\arcmds directory or if
you do not have an ARSystemHomeDir directory.
-x Server name — Name of a server to connect to. This option might be included more than once to connect to multiple
servers. Use the following format: -x serverName
-p Parameter — Value for a parameter. There might be more than one -p option in a command line. If the macro specified
(using the -e or -i options) has a parameter, a value can be supplied by naming that parameter and assigning a value.
If the parameter name or value includes a space or other special character, the data must be enclosed in quotation
marks to cause proper interpretation of the special characters. Use the following format for each parameter specified: -p
parameter = value
-U User name — Required login parameter that identifies the user account. The -U option must be in uppercase.
-P Password — Optional login parameter that identifies the user account. Omit the -P if the user account has no password.
The -P option must be in uppercase.
Within the query string, double quotation marks must be preceded by a backslash (), which functions as an escape
character. For example:
Option Description
-Z Internal format qualification file name — File name containing the query in Remedy internal format.
-z Client tool format qualification file name — File name containing a regular query.
-w Authenticator — Name of the external authentication string or Windows NT domain. This is related to the Login window's
(or -W Authentication field. See Authentication String Alias introduction (see page 1319).
)
-f Form name — Form that is exported. The -f (or -s) option can be repeated multiple times if there are several forms to
(or -s export. If multiple servers are selected, each server is searched for the form, and the first one found is all that is
) exported. To control this, specify only one server environment for the operation. If the -f (or -s) option is not specified,
the system exports all available regular data forms. It does not export join or external forms.
-t Type of file to write — File type for the output file: arx, csv, or xml. If not specified, the default of arx is used.
-O Forces override — If the user has already logged in as this same user from a different IP address, this option tells the
server to use the new IP address of the runmacro client and invalidates the old IP address.
Note: This option does not apply to users with administrator permissions.
Use the Data Import command-line utility (a Java utility) to automate importing data in a multi- or
single-threaded environment. (See Importing in a multithreaded environment (see page ).)
You can import with or without a mapping file. See Importing with a mapping file (see page )
and Importing without a mapping file (see page ).
set APIDROP=.\plugins\com.bmc.arsys.studio.api_90\lib
if not exist "%JAVA_HOME%" set JAVA_HOME=jdkPath
set PATH=%JAVA_HOME%\bin;%PATH%;%APIDROP%
3. Add the appropriate options to the command line in the batch file. Make sure the .jar file
names in the classpath reflect the appropriate release of BMC Remedy AR System, for
example:
For a list of available options, see Data Import command-line utility options (see page ).
4. At the command line, run the batch file.
1. Navigate to the ARSystemHome/api/lib directory and make sure that the following .jar files,
required to run the Data Import Utility, are present in the lib folder:
arapi91_build001.jar or arapi91_build002.jar (for Service Pack 1)
arapiext91_build001.jar or arapiext91_build002.jar (for Service Pack 1)
log4j-1.2.14.jar
2. Create a DataImport.sh file in the ARSystemHome/api/lib directory.
3. Set the following environment variables in the DataImport.sh file:
APIDROP — The location where arapiext91_build001.jar and arapi91_build001.jar or
newer versions are installed.
JAVA_HOME — The location of your JDK (for example, /usr/Java/jdk1.5.0_14 ).
Path
For example:
#!/bin/sh
APIDROP=ARSystemHome/api/lib
JAVA_HOME=${JAVA_HOME:-jdkPath}
export JAVA_HOME
PATH=$JAVA_HOME/bin:$PATH:$APIDROP
export PATH
Note
4. Enter the following command to use the Data Import utility on UNIX:
The use of ${1+"$@"} option allows the command to accept inputs when the script is called.
Note
For a list of available options, see Data Import command-line utility options (see page 1931)
.
When using the Data Import utility on Japanese UNIX systems, convert the data and .armx
mapping files to EUC format before the files are moved to the UNIX server. (The .arx and .xml data
files are already in EUC format when they are generated in the client tool, but the .csv file is not.
Therefore, the .armx and .csv files must be converted.) Make sure that all of the data file names
and a mapping file names are in English.
Specifying the -M or -m option in the command line determines whether you use a mapping file.
Note
If you are copying the mapping file between different operating systems (such as
Windows to UNIX), make sure that the file is converted properly so that the operating
system can read the file.
You can override specific settings saved in the mapping file by using additional options. In this way,
you can use the data mappings you created for one data file and destination form for imports with a
different data file and form combination.
BMC recommends that you use AR Export (.arx ) and AR XML (.xml ) file formats when importing
without a mapping file. In these file formats, field values are mapped by matching field IDs, which
are both included in the file. For CSV files, field values are mapped by matching the field labels (if
present in the file) to the field names (database names of the fields) retrieved from the server.
When a browser exports data into a CSV file, the field labels and the field names are not
necessarily the same. Only fields with names and labels that match are auto-mapped.
Consequently, if CSV files do not include field labels, the field values cannot be mapped.
Without a mapping file, include the server name, form name, and data file name in the command
line. Mappings are built by querying the server and the data file.
-o
-z
-filelist
-threads
For information about these options, see Data Import command-line utility options (see page ).
You must include a form name in the Data Import utility command. (If a mapping file is
provided and includes a form name, the form name is optional.)
If any data files in the specified data directory contain data from a different form, the Data
Import utility cannot resolve the difference. The utility imports the data in specified form only.
If a mapping file is specified and if the specified form uses the same mapping file for all data
files, the Data Import utility imports all file types (.arx, .csv, .xml, and .ascii ).
For .arx and .xml files, if you run the Data Import utility without including a form name and a
mapping file, data from the individual file is imported to their respective forms, so make sure
that data files are not interdependent. For example, when importing Group form and User
form data, users belong to groups. The User form data is dependant on Group form data,
and the Data Import utility cannot resolve this dependency.
For CSV and ASCII files, you must include a form name in the command because these
files do not include form information.
The Data Import utility does not validate workflow on forms where data is imported.
For AR System 7.1.00 and later versions, the Data Import utility uses bulk APIs (unless the -
e option is used). When a bulk API fails in its first attempt, it rolls back the entire operation
and retries up to the last completed entries again with bulk API. The remaining records are
imported it by using individual APIs.
Options that you specify to handle duplicate records (-D ), bad records, and multiple
matches (-t ) are common to all of the threads.
There is no explicit command-line option for bad-records handling. By default, the Data
Import utility skips the bad records.
In an .armx mapping file, you can specify bad-records handling as follows:
<datahandling *badrecords="SKIP"*
duplicaterecords="GEN_NEW_ID"
stripleading="false" striptrailing="false" transactionSize="0"
truncate="false"/>
"Bad-Record-Handling: 1"
Use the following format in the command line. Items between square brackets are optional.
Note
-u User name Required login parameter that identifies the user account.
Note: Every cross-platform CLI command opens a separate Data Import session, executes the
command, and logs out. Therefore, you must log in with every command. If Data Import does not find
the user name, Data Import prints the usage messages and exits.
-p Password Password for the user account. If the user account has no password, omit the -p option.
-x Server name The server to log in to. If you do not specify the -x option, the server name in the mapping file is
used.
-w Authentication Name of an external authentication string or Windows NT domain. This is related to the Login
string window's Authentication field, which is discussed in Setting up an authentication alias (see page 1318)
.
-r RPC program Private server, for example, if a dedicated import server is available. If you do not specify the -r
number option, the default administrator server's RPC program number (390600) is used.
-a TCP port Port number for the server. This value is especially important in a multiple server environment. The
number option also identifies a TCD specific port, if chosen.
- Path to Specifies the path to the custom_options.xml file, which is used to specify date and time formats, the
custom custom_options. separators to be used, and other information. You can use this option if the source data file is in CSV
xml or ASCII format. See Using the custom_options.xml file (see page 1935).
Note: During installation, a sample empty custom_options.xml file is installed in the installation
folders for Developer Studio and Data Import. You can change the name and store it anywhere.
Destination form name or pair. A single name indicates that the form name in the source data file
matches the form name on the server. To specify a pair of names, separate the form names with an
equal sign, without any spaces around the equal sign:" destinationForm" =" fileForm". The
destination form is the form on the server into which data is imported. The file form is the form
specified in the data file. Specifying pairs maps data from one form (specified in the data file) to a
different form (identified on the server). You can specify multiple pairs by using this option multiple
times, for example:
-f "Target_form_a"="File_form_b" -f "Target_form_c"="File_form_d"
If the -f option is not specified, Data Import tries to import all data sets in the source data file. For
each data set, if a matching destination form is found on the server, the data is imported. If no
matching form is found, the data set is ignored.
Path to a directory of data files — For multithreaded environments, the -o option specifies the
path to the directory that contains the data files to import.
Path to data file — For single-threaded environments, the -o option specifies the file that
contains the data files to import.
If you do not specify the -o option, the data file specified in the mapping file is used.
-z Path to the Specifies the path to the options.xml file, which contains the data import commands and the import
options.xml file parameters for individual files and directories for multithreaded import. The Data Import command-
line utility uses the -z option to identify the location of the options.xml file. See Using the options.xml
file (see page 1936).
Note: The -z option cannot be used in the options.xml file; if used, the Data Import command-line
utility disregards this option.
-filelist (For The data files can be of any type (for example, ARX, CSV, XML, and ASC ). All of the data is
multithreaded imported into the form designated with the -f or -M option. If you do not specify the -filelist option, the
environments command imports all the data files in the directory specified with the -o option, regardless of file type.
only) List of
data files to
import
- (For If you do not specify the -threads option, the default of 50 threads is used. If the number of files in the
threads multithreaded data directory or number of files you specify in the -filelist option is less than the -threads value or the
environments default value (50), the number of threads used is equal to the number of files in the data directory or
only) Number number of files specified in -filelist option.
of threads in
Note: Make sure that your hardware configuration can handle the number of threads that you enter.
the pool.
-l Full path name Use this option to log details of the import execution.
of the log file
If you do not specify this option, the logs will appear on the console instead of displaying an error
message that a log file path was not specified.
-e Duplicate field Field ID of the field to check for duplicate data. For example, for the Short Description field, enter 8.
To specify multiple values for a single schema, separate them with commas and double quotation
marks (for example, "2,4,8" ). The maximum number of IDs you can specify is 6. From this release of
BMC Remedy AR System, you can now specify multiple values for multiple schemas. For this,
separate the schema names (and their values) by a semi-colon and the values by commas (For
example, SchemaName=1,2,3; SchemaName=4,7,8 ). The maximum number of IDs you can specify
is 6. Make sure that the source data file includes values for all the fields that are being used for
checking duplicate data. When -e option is omitted, then Request ID field (field ID 1) is used.
Additionally, if the -e option is not used for importing records, the Data Import utility uses bulk mode
to import records. (See the -b option for more information about the bulk size.)
-b Bulk size Specifies the number of records to process in bulk simultaneously. For AR System 7.1.00 and later
versions, the default size is 100.
Note: If the -e option is used, records are imported individually. If the value of the -b option is set to 0,
bulk mode will not be used.
-g
Activate Bulk If the -e option is used, the bulk transaction mode is switched off by default. In this case, you can still
Mode activate the bulk transaction mode using the -g option.
Note: The bulk transaction mode is purposefully switched off with -e option as it gives different
results than sequential import when there are duplicate records within the data file itself. To forcefully
use bulk mode when the -e option is used, you can use the -g option. You can decide whether you
want to use the -g option when there are duplicate records in your data files. For example, you must
use the "-g 1 " value in the Java Import command line to use the bulk mode. If any value other than " -
g 1 " is used, the force bulk mode is not activated.
-n Suppress filters Suppresses the merge filters during merging of entries on forms.
-s Suppress Setting this flag causes the server to suspend enforcement of associations on entries getting
associations imported. Associations are still enforced on other entries affected by workflow that might be triggered
by entries getting imported. The server will only honor this flag if the user of the import tool is an
administrator.
-t Multiple match Use when more than one entry matches. Enter a value of 3 to affect the first match, and a value of 5
options to affect all matches.
-v Forces override If the user has logged in from a different IP address, this option tells the server to use the new IP
address of the Data Import client and invalidates the old IP address.
-i Suppress If specified, this option will ignore the default values of fields if the value in the data file is null or not
default values supplied.
0 — Do not suppress default values for mapped fields, but ignore non-mapped fields.
1 — Suppress default values for mapped fields, but ignore non-mapped fields.
2 — Suppress default values for mapped fields, suppress default values for non-mapped
fields by explicitly putting NULL value.
3 — Do not suppress default values for mapped fields, suppress default values for non-
mapped fields by explicitly putting NULL value.
Note: If the value of –D is set to 4 (update option), then the Data Import utility does not suppress the
default values while creating new records.
-D Duplicate ID Defines how to process records that contain request IDs that duplicate those already in the form.
Include one of the following numbers with this option:
Note: The Reject duplicate records silently mode (parameter value 5) is available in the BMC
Remedy Data Import command-line utility only.
-q Suppresses Suppresses the required field property for non-core fields. The options are 1 (on) and 0 (off) .
the field
property for
non-core fields.
-c Truncates Truncates character values that are longer than the field length for character fields. The options are 1
character (on) and 0 (off) .
values
-h If supplied, the $PATTERN$ field limit is ignored. The options are 1 (on) and 0 (off) .
Suppresses
pattern
matching for
fields
- Specifies the The character set name must be supplied as listed in the IANA Charset Registry.
charset character set
used in the
data file
OFF does not log any information, and ALL is the maximum log level, which logs detailed log
information. The default log level is 3.
To import data with a mapping file, use either -M or a combination of -m and -d to specify the
mapping file to use. (You cannot use both the combination of -m and -d with -M ; they are mutually
exclusive.)
Note
The combination of -m and -d options is supported for the legacy .arm mapping file types
only. If the mapping file is .armx, only -M is valid.
The following table describes the mapping file options. For more information, see Importing with a
mapping file (see page ).
Option Description
-m Name of the mapping file to use. You can verify the required name by opening the mapping file and using the string
contained in the first line of the file.
-d Directory that contains the mapping file being referenced with the -m option.
Data Import searches for formats (date and time, separators, and so on) as follows:
1.
BMC Remedy Action Request System 9.1 Page 1935 of 4703
BMC Software Confidential. BladeLogic Confidential.
Note
You can use the mapping file and the custom_options.xml file simultaneously. In
such cases, the a.m. and p.m. symbol settings and the separator settings of the
mapping file take precedence. However, the date and time formats in
custom_options.xml are considered with the formats in the mapping file for parsing
date and time values. In such cases, custom_options.xml provides additional date
and time formats (the mapping file can have only one), which is helpful for parsing
data files that contain date and time strings of different locales.
The Data Import command-line utility uses the options.xml file as the input. The utility identifies the
location of the options.xml file using the new command line parameter, -z.
Consider the following important points before using the options.xml file:
The Data Import command-line utility follows the sequence of the data import commands
defined in the options.xml file.
Each command tag listed in the options.xml file will be executed. If the same command tag
occurs multiple times, the Data Import command-line utility executes the command tags as
many number of times as listed.
Important
The Data Import command-line utility invocation command must have -x, -u, -p, and -z
parameters to start importing the data files using the options.xml file.
The parameters that are included in the options.xml file override all the parameters passed
through command line.
If any error occurs during the command execution in the options.xml file, the Data Import
command-line utility continues to execute the further commands listed in file.
The Data Import command-line utility allows sequential and parallel importing of data in a
single JVM invocation instance. This is done through the options.xml file using the isSerial
attribute. If the value of the isSerial attribute is 'False' (default) or the attribute is not
specified, the Data Import command-line utility imports the data by using the parallel mode.
During parallel importing, the utility imports multiple data files simultaneously.
The options.xml file has a global tag (optional) for global parameters. The global parameters
can be overridden by individual command tags (local parameters specified in individual
commands), except for the threads and the debug parameters. These global parameters
cannot be overridden by local parameters.
Note
The threads and the debug parameters are not considered if they are specified as local
parameters in a command tag format.
If the -o and -z parameters are combined, the Data Import command-line utility treats the
paths specified for the -z parameter as relative. The tool thus combines the paths specified
in the -o and -z parameters and then continues importing the files listed in options.xml file.
If only the -z parameter value is specified, the path specified for the -z parameter is
considered as the absolute path.
For example, if the following values are specified:
-o "c:\temp" -z "opt\FileName.arx"
The final path (relative path) is "c:\temp\opt\FileName.arx"
And if the following values are specified:
-z " c:\opt\FileName.arx"
The final path (absolute path) is "c:\opt\FileName.arx"
Note
The preceding rule is true only for the data file's path specified in the -o
parameter; all the remaining parameters that take the file path as an input
are used as absolute paths or as relative paths with respect to the current
invocation directory.
The -z parameter cannot be used with the pattern and filelist parameters through
the command line. These parameters can only be used independently or with the -o
parameter (as a directory).
The data import invocation using the -z parameter generates a summary file containing the
results of all the data import commands defined in the options.xml file. This summary file
has the same name as the options.xml file. For example, if the options.xml file has the
name, option_fnd.xml, the Data Import command-line utility generates a summary file
named option_fnd_summary.log.
If the -l parameter (full path name of the log file) is specified for every command in the
options.xml file, the Data Import command-line utility creates separate log files for every
command tag. If the log file is the same for multiple command tags in the options.xml file, all
the logging details for these command tags are written in that one log file. If the -l
parameter is not specified in the command and in the options.xml file, the Data Import
command-line utility creates a log file in the current directory with the same name as the
data file name (datafilename.log ).
If the debug parameter is specified as a global parameter, the value of this parameter will
be common for all the commands in the options.xml file.
In the options.xml file, the number of threads in a pool can be configured at the global level
by setting the -threads parameter in the global tag with the optimum value. This switch is
optional; if the command does not have this switch, the value of the -threads parameter is
set to its default value (50).
Note
Note
You can rename the options.xml file to any custom name. Make sure that the file contains
only the above XML tags and attributes, and is a valid and well-formed file. If the options.
xml file is not a valid file or it does not exist, the Data Import command-line utility displays
an error and will not proceed further.
<import>
<global>
<parameter name ="x" value="ServerName"/>
<parameter name ="u" value="UserName"/>
<parameter name ="p" value="Password"/>
<parameter name ="debug" value="3"/>
<parameter name ="threads" value="32"/>
</global>
<commands isSerial = "true">
<command>
<parameter name ="D" value="1"/>
<parameter name ="o" value="DataFileDirPath"/>
</command>
<command>
<parameter name ="D" value="3"/>
<parameter name ="o" value="DataFileDirPath1"/>
<parameter name ="e" value= "10000,10050"/>
</command>
</commands>
<import>
In the following example, the -o option specifies the path to the directory that contains the
data files to import. All of the data in the files is imported to the specified form.
For example:
The data in the files in C:\files is imported to the HelpDesk form. A log is created in test.log.
In the following example, the -filelist option is used with -o, and only the data files listed are
used. All of the data in the files is imported to the specified form.
For example:
The data in the user.arx, user.csv, abc.xml, and xyz.ascii files in C:\files is imported to the
HelpDesk form. A log is created in test.log.
In the following example, the server name, form name, and data file name are optional
because the mapping file contains the information:
In the following example, the server name, form name, and data file name override the
names in the mapping file. When you use the Data Import utility with a mapping file, you can
override one or more of those names.
The -d and -a options are not shown in the following examples, but if you work with multiple servers
on the same computer, you can use -d for duplicate record handling and -a to specify a port
number.
The following examples show how you can use the Data Import utility without a mapping file:
In the following example, minimal options are used. The dataFilePath specifies the data file
with path to import. If there are multiple data sets in the same data file, an import is
attempted for all forms.
In the following example, the formName determines which set of data from the data file is
imported to the server. The form name on the server and in the data file must match.
In the following example, an import is being attempted into the form called formA on the
server, but the data comes from formB in the data file.
Note
The AR Export utility does not export the contents of an AR System server form to a CSV
file or to an XML file.
The utility can extract all the data from an AR System server form. The utility can also extract data
from a form based on the string that defines the qualification criteria. If the form contains an
attachment, the attachment data is extracted to a folder whose name is the same as that of the .arx
file. By default, the utility adds a time stamp to the folder containing the attachment data.