Connecting to a Workflow Server Setting Oracle IPM System Security

7-10 Oracle Fusion Middleware Installation Guide for Oracle Enterprise Content Management Suite 5. On the Connection Settings page, enter or change values as necessary, and click Next .

6. On the Review Settings page, if the settings are correct, click Submit.

After the connection is created, you should be able to use IMPORT definitions for your applications.

7.2 Configuring the Full-Text Features in the Oracle UCM Repository

Oracle IPM supports two types of full-text searching under Oracle UCM: DATABASE.FULLTEXT and Oracle Text Search. Oracle IPM can use the full-text features if you configure full-text searching in the Oracle UCM repository first. For DATABASE.FULLTEXT systems, after the indexes are rebuilt, nothing needs to be done on the Oracle IPM side. Oracle Text Search, however, requires that the index be rebuilt any time an application with FullText enabled is created, deleted, or has modifications that involve field definitions. For more information on configuring full-text searching, see Section 5.3, Configuring Oracle Text Search for Oracle Content Server. For additional full-text configuration options, see Configuring the Search Index in the Oracle Fusion Middleware System Administrators Guide for Oracle Content Server. After full-text is enabled in Oracle UCM, you will need to create an application and check the FullText option on the application. For more information, see Specifying General Properties in Oracle Fusion Middleware Administrators Guide for Oracle Imaging and Process Management.

7.3 Connecting to a Workflow Server

A connection to a workflow server will be necessary for your solution to retrieve your task list. Oracle IPM connects to a workflow server when application fields are mapped to workflow payload elements. To connect, the provider, port, and credential information is passed using Web Services Inspection Language WSIL. WSIL uses the HTTP protocol and a specific XML format to allow for the discovery of the web service end points on a server. Oracle IPM follows links in the WSIL that meet certain criteria to discover deployed composites. The connection can be to an Oracle Business Process Management Oracle BPM or Business Process Execution Language BPEL server. For Oracle IPM to take advantage of BPM and Oracle BPEL Process Manager within an existing domain, the domain must be extended with Oracle BPM Suite - 11.1.1.0. When Oracle BPM Suite was installed, it automatically selected Oracle SOA Suite - 11.1.1.0 as its dependency. If you want to use Oracle BPEL Process Manager and not Oracle BPM, you can extend the domain with an Oracle SOA Suite installation and configuration. For more information about the installation and configuration steps for Oracle SOA Suite and Oracle BPM, see Oracle Fusion Middleware Installation Guide for Oracle SOA Suite and Oracle Business Process Management Suite. For more information about connecting to a workflow server, see Creating a Workflow Connection in Oracle Fusion Middleware Administrators Guide for Oracle Imaging and Process Management. After you have created a workflow connection, enter the name of that connection in the AXF_SOLUTION_ATTRIBUTES table for your solution. For example, the parameter key for a Business Process Execution Language BPEL server is named BPEL_CONNECTION , and the HelloBPEL sample script uses the connection name test. Configuring Oracle Imaging and Process Management 7-11

7.4 Setting Oracle IPM System Security

On a new Oracle IPM system, the first user to log in is automatically granted full permissions. Typically, this initial user associates other users or groups, after which his or her permissions are changed or revoked as needed. If security provider changes are made after this initial user login to Oracle IPM, take the following steps to reset Oracle IPM system security. For example, if you later change the security configuration to point to an Oracle Internet Directory provider or a Microsoft Active Directory provider, you must reset Oracle IPM system security. 1. Manually create or migrate users and groups to the new external security provider, using utilities as needed. For more information, see Section 4.9, Reassociating the Identity Store with an External LDAP Authentication Provider. 2. Run the refreshIPMSecurity WLST MBean command. For more information, see Oracle Fusion Middleware WebLogic Scripting Tool Command Reference.

7.5 Installing and Configuring Oracle Application Extension Framework