Select Matches from the Operation option list. Click Select. Click OK. Click Add. Click OK. Click OK. On the Fields tab, click Add. Select Security Group from the Field Name option list. Click OK. Select Hidden from the Type option list to ensure that thi
d. Click OK.
The AddEdit Rule Field ’name’ Screen is displayed.e. Select Hidden from the Type option list to ensure that this metadata field
does not display on the Check In, Update, Content Information, and Search pages. f. Optionally, enter a statement in the Required Message field.g. Select the Is derived field check box and click the corresponding Edit button.
The Edit Derived Value: Conditions Tab is displayed.h. On the Conditions tab, click Add.
The Edit Derived Value: Add Condition Screen is displayed. i. Enter the name of the field condition for example, HRsEyesOnly.j. Click OK.
The Add Condition screen closes and the clause-generating fields display on the lower pane of the Conditions tab. k. In the lower Value field, enter a confidential string for example, No specific title. This will help to prevent unauthorized users from using the Title metadata field to search for and retrieve the documents checked in using this profile.l. Click OK.
The Edit Derived Value screen closes and the computed Idoc Script clause is added to the derived field text pane.m. Click OK.
The Add Rule Field screen closes and the Title metadata field is added to the Fields list. 5. Add and define the Author metadata field as follows:a. On the Fields tab, click Add.
b. Select Author from the Field Name option list.
c. Select a general position from the Field Position option list.d. Click OK.
e. Select Hidden from the Type option list to ensure that this metadata field
does not display on the Check In, Update, Content Information, and Search pages. f. Optionally, enter a statement in the Required Message field.g. Select the Is derived field check box and click the corresponding Edit button.
h. On the Conditions tab, click Add.
i. Enter the name of the field condition for example, HRsEyesOnly2.j. Click OK.
k. Select Author from the Field option list.
l. Select Matches from the Operation option list.
m. Click Select.
3-48 Application Administrators Guide for Content Server The User View Screen displays. Select the applicable user name. For example, select an HR employee or whoever is authorized to view the documents checked in using this profile. This will help ensure that unauthorized users cannot search and retrieve these documents using the Author metadata field.n. Click OK.
The User View screen closes and the selected user is entered in the upper Value field.o. Click Add.
The clause is added to the clause pane.p. Click OK.
q. Click OK.
6. Add and define the Security Group metadata field as follows:a. On the Fields tab, click Add.
b. Select Security Group from the Field Name option list.
Parts
» Oracle Fusion Middleware Online Documentation Library
» About Native File Conversion Identifying MIME Types
» About Custom Fields Managing Content Fields
» Changing the Default Sort Order of the Opening Query
» About Managed Links Managing Linked Content with Link Manager
» Configuring Link Manager Managing Linked Content with Link Manager
» Managing Links Managing Linked Content with Link Manager
» Link Manager Database Tables
» Link Manager Filters Managing Linked Content with Link Manager
» Site Studio Integration Managing Linked Content with Link Manager
» Click Go located next to the Abort refresh activity option. The refresh activity
» About DCLs and Metadata Schemas
» About Content Profiles Using Profiles to Customize Content Screens
» Content Profile Rules Using Profiles to Customize Content Screens
» Click OK. Oracle Fusion Middleware Online Documentation Library
» Select the Is global rule with priority check box. You can optionally change the
» On the Conditions tab, click Add. Click OK. Click OK. Click OK. Click OK.
» Workflow Overview Introduction to Workflows
» Workflow Steps Introduction to Workflows
» Workflow Step Evaluation Process
» Pre-design Questions Planning a Workflow
» Designing a Workflow Modifying Workflows
» Criteria Workflow Process Creating a Criteria Workflow
» Basic Workflow Process Creating a Basic Workflow
» Idoc Script Functions and Variables
» About Jumps Customizing Workflows
» Jump Variables and Steps Setting Up Jumps
» Jump Examples Customizing Workflows
» Scenario 1: Criteria Workflow Workflow Scenarios
» Scenario 2: Tokens Scenario 3: Jump Based on Metadata Scenario 4: Time-Dependent Jump
» Acquiring a Digital Signature Setting Up Parallel Workflows
» Adding Ad Hoc Step Users Customizing Criteria Workflow Emails
» Paste the following code into the entry event of your workflow step. Note that
» Other Customizations Workflow Tips and Tricks
» Searching Within a Workflow Step Suppressing Workflow Notifications
» Workflow Item Stuck in EDIT or GENWWW Status
» Workflow Item Entered in Wrong Workflow
» About PDF Watermark How PDF Watermark Works
» Folders Overview Usage Scenarios
» Folders Structure Naming Folders Folders Component Security
» Folder Metadata Inheritance Trash Bin Metadata Propagation
» Folder Content Item Revisions
» Folder Archiving Folder Searching URL-Mapped Folders
» About WebDAV What is WebDAV?
» WebDAV Clients WebDAV Architecture
» Preventing Folder Static Inheritance for Specific Metadata Fields
» Optimizing System Performance Click OK.
» Virtual Folders Configuring WebDAV
» Other Issues Click OK twice to save the settings and close the Internet Options screen.
» Adding Custom Viewers and Renderers
» Content Tracker Summary About Content Tracker Components and Functions
» Content Tracker Reports Summary Data Recording Overview
» Data Reduction Overview Data Reporting Overview Content Tracker Terminology
» General Limitations General Considerations
» Data Collection and Processing
» Data Collection Operational Overview
» Data Reduction Operational Overview
» Data Output Operational Overview
» Tracking Limitations Operational Overview
» Data Reduction Features Data Tracking Functions
» Activity Snapshots Data Tracking Functions
» Service Calls Data Tracking Functions
» Web Beacon Objects Data Tracking Functions
» Click the Snapshot tab. Click OK. Open the Content Tracker Administration page: Click OK.
» Oracle and DB2 Case Sensitivity Access Control Lists and Content Tracker Reports Secure Mode
» Pre-Defined Reports Report Generation
» Custom Reports External Report Generator
» User AuthenticationAuthorization and Auditing Site Studio Web Site Activity Reporting
» Security Checks and Query Results
» Accessing Drill Down Reports Accessing Reports from the Information Page
» Creating Custom Report Queries
» Creating Secure Report Queries Using an External Report Generator
» About the Service Call Configuration File
» About the Content Tracker Logging Service
» Managing Service Call Information
» Configuration Variables Configuration and Customization
» Activity Metrics SQL Queries
» Web Server Filter Debugging Support Java Code Debugging Support DataBinder Dump Facility
» Search Rules About Content Categorizer
» XML Conversion About Content Categorizer
» Configuration Variable Setting Up Content Categorizer
» Understanding Search Rules Search Rules
» Pattern Matching Search Rules
» Abstract Search Rules Search Rules
» Categorization Engine Search Rule Filetype Search Rule
» Translation Transformation Using XSLT Stylesheets
» SearchML Transformation XSLT Transformation
» Flexiondoc Transformation XSLT Transformation
Show more