SMEC ASSET MANAGEMENT SYSTEM PMS Version 5.5. System Administrator s Guide
|
|
- Raymond Fleming
- 5 years ago
- Views:
Transcription
1 SMEC ASSET MANAGEMENT SYSTEM PMS Version 5.5 System Administrator s Guide January 2015
2 PREPARATION, REVIEW AND AUTHORISATION Revision # Date Prepared by Reviewed by Approved for Issue by 1 21-Jan-2015 R.Bartlett 2 23-Jan-2015 R. Bartlett The information within this document is and shall remain the property of SMEC Australia Pty. Ltd. Page i
3 TABLE OF CONTENTS 1 INTRODUCTION SYSTEM ARCHITECTURE DOWNLOADING PACKAGES FROM WEB SITE INSTALLATION OF THE SOFTWARE First Time Installation of Database on Database Server Upgrading an existing Database on Database Server Installing The Application On The Client Computers SQLncli_32bit and SQLncli_64bit Installing the SMEC Application Installation Wizard Software license file CONFIGURING THE APPLICATION Setting-up the database connection Setting User-Group passwords Changing the User-Group passwords The About TAB Configuration of the Client software Modifying the Application Configuration CUSTOMISATION APPLICATION SECURITY Logging in Setting security access levels Setting the security thresholds Customising the User-Group security settings Changing the system password for the user group connection Creating individual users Using Single Sign On to access the application Page i
4 1 INTRODUCTION The System Administrator is a user who has overall control of the system. Tasks performed by the System Administrator include: Installation of the software. Configuring the application. Creating users and assigning security permissions. Upgrading the software. Backing up the database. 2 SYSTEM ARCHITECTURE The SMEC PMS can be installed as a stand-alone application or as a module of the SMECAsset application. There are two different installation packages available on our Support Web Site that corresponds to the two types of installations. SMEC Pavement Management System (PMS) that is a specialist product used to manage road networks and determine long term pavement upkeep strategies; and SMECAsset is a generic Asset Register System designed to manage a variety of different assets (which can also include the PMS Road module). Even if the full SMECAsset installation is installed you may not get full access to all of the functionality of the SMECAsset system since access to all of the features is further controlled by the license file that has been provided. Version 5.5 is a Microsoft Windows based application that runs against a Microsoft SQL Server database (Version 2008 R2 or later). The system is designed to run with the database residing on a database server and the application installed on each of the individual client computers. In a stand-alone situation, both the database and the client application will reside on the same hardware. The application is supported on both 32 bit and 64 bit computers. 3 DOWNLOADING PACKAGES FROM WEB SITE The software packages can be installed from the SMEC Support Web Site: This will open up to the following web page: Page 2
5 Figure 1: SMEC Software web site In order to down the software you will need to be able to log in through the Clients Area Tab. Click on this TAB and then click on the Login button. Figure 2: Client's Area login This will bring up the log in form: Page 3
6 Figure 3: Login form If you do not already have a Username and Password then click on the Create new account. This will send your Username and account to SMEC for approval. Once approved, you will receive an containing a link. Clicking on the link will open up a login form with a default password which you should then change. Once you have logged in you can then open up the Client Resources and select Downloads. Figure 4: Downloading documents and upgrades If you are only going to be using the PMS then you should download SMECPMS. If you are going to be using both the PMS and the Total Asset Management System, (or there is a possibility that you wish to trial this option in the future) then you should download SMECAsset. Even with SMECAsset, the functionality that you can access will be dependent on the License File that will be sent to you by SMEC. SMECAsset utilises two databases. One for SMECAsset and the other for the PMS. If you download SMECPMS then only one database will be used. And this database will include some additional tables relating to the security and access privileges assigned to various users. If you are unsure which product is best for you then please contact SMEC for further explanation. Page 4
7 Figure 5: Chose SMECAsset or SMEC PMS As a minimum you should download both the Installation Package. The SMEC Common Runtime Library is required for an initial install or for a major software upgrade. The Runtime Library would not be required for minor software release upgrades. 4 INSTALLATION OF THE SOFTWARE If you are installing a software upgrade then it is important to back up the data first and put the backup in a safe location. 4.1 First Time Installation of Database on Database Server If this is the first time installation of the PMS then a PMS database will first need to be created on the database server. This server must be installed with Microsoft SQL Server Version 2008 R2 or later. SMEC will supply a starter PMS database that can be restored on to the server. Typically the database will be created with a name such as PMS or SMECPMS. Note that when the Installation Package is run on the first client computer, it will check to see if the database users are present that allow the system to access the PMS database. If not then the application will automatically create an SQL Script that the database administrator can run which will then enable the appropriate connection to be made between the application and the database. The next section will describe this more fully. 4.2 Upgrading an existing Database on Database Server If you are upgrading to the latest version of the PMS application then you should already have a PMS database residing on your database server. It is important to make a backup of this database prior to commencing the upgrade. Page 5
8 When the installation package for the new version is run (Refer to Section 4.3 the software will check to see if the database structure requires upgrading. The install package includes a process to carry out any upgrades that may be required. A log file will be generated during this process. Any issues reported in the log file will need to be resolved or referred to SMEC. 4.3 Installing The Application On The Client Computers SQLncli_32bit and SQLncli_64bit SQL Server Client software is required to be installed on each client computer that will be running the SMEC PMS in order to allow the application to talk to the database server. If you don t already have a copy of this client software for the Microsoft SQL Server database software then it can be downloaded from the internet from Microsoft s support site. The installation should only be required the first time the software is installed. The version that you install will depend on whether you have a 32 bit or 64 bit operating system Installing the SMEC Application First download the appropriate installation package and run-time libraries from the SMEC Support Web Site. (Refer to Section 3 ). If you are upgrading an existing installation and if it is a minor upgrade (e.g to 5.5.2) then the runtime libraries probably won t have changed and therefore don t have to be re-installed. If it is a first time installation or a major upgrade (e.g. Version 5.4 to 5.5) then you should install the run-time libraries as well as installing the application. In order to install the software on the computer you will need administration rights, or at least have rights to install applications. The SMEC software is supplied in a series of Microsoft Installer packages. These packages are in files with a.msi extension. The installation must be carried out on each client computer that is licensed to run the application. It is not important as to the order for which each msi package is run. If you try and run the installation package but a previous version is already installed then you will get the following message: You should uninstall any previous version first. This is done through the Control Panel. Refer to Figure 6. Page 6
9 Figure 6: Using the Control Panel to uninstall applications Installation Wizard To install, double click on the msi package. This will bring up the following message: Figure 7: Installation warning message Click Run and this will start up the Install Wizard. Page 7
10 Figure 8: SMECPMS installation wizard Click Next and then select where you wish the application to be installed. (Note that the default location is recommended however a location should be chosen where the user has read/write access to the directory. Figure 9: Select the directory where you wish the application to be installed Once the installation is complete then click Close to exit the Wizard. Page 8
11 Figure 10: Finalise the installation Software license file Finally you should place a copy of the PMS license file into the directory where the PMS Application was installed. This license file will be provided by SMEC via an . You should not install the software on more client computers than you have paid for. 5 CONFIGURING THE APPLICATION The application must be configured on each of the computers where the software has been installed. The PMS software has a facility within the application that can be used to configure the back end database or the client software. First navigate to the location where application has been installed and locate the program called SMECPMS.exe. The Configuration functionality available from within the application will vary depending on whether the program is run as an Administrator or as a user without Administration privileges. Initially the program will need to be run by someone who is a database administrator since the system requires database administrator privileges in order to create the connection to the database and establish the different user groups that will be used within the system. Figure 11: Run as administrator Page 9
12 If the system detects that the system has not yet been configured, then it will open into the configuration form. This will by-pass the need to log in to the application Setting-up the database connection The program will open up showing the database TAB. If you are running the PMS as a stand-alone version then the SMECAsset database details (items 8 and 9 below) won t appear on the form. Figure 12: Configuration form The following is a description of the information appearing on the form: 1. This indicates if you have run the program as an Administrator. For nonadministrators this will be blank. 2. This is read from the licence file and indicates who the application has been licenced to. 3. This is read from the licence file and indicates the name of the database vendor for which the product has been licensed. 4. This shows the version of the client software that has been installed on the current client computer that is used to connect to the database on the server. This is automatically detected by the ConfigApp program. 5. This is the version of the database that is residing on the database server. This will appear once the database locations have been correctly provided and the Verify button is pressed. 6. This is the version of the SMECAsset application installed on the client computer. 7. This is a drop down used to toggle between Configure back-end databases and Configure Client work station. Note that if you are configuring a client work station then the ConfigApp must be run from that work station using the login of the user who will be running the SMEC program. This is because user specific information will be recorded in the User Registry Settings on the client computer. Page 10
13 8. This is the name of the Server that will be running the SMECAsset database. If you are installing the PMS as a stand-alone application then this field will not be present on the form. 9. This is the name of the database on the server that will be used by SMECAsset. If you are installing the PMS as a stand-alone application then this field will not be present on the form. 10. This is the name of the Server that will be running the PMS database. 11. This is the name of the database on the server that will be used by the PMS. 12. This is used to verify valid users using read-only information. It is recommended that this should not be changed from the default SMECAsset_Service value. 13. This is the password for the Service Account user. The default password is smecasset. 14. This is the username for the database system administrator. This is required if you are configuring the back-end database. 15. This is the system administrator password. This is required if you are configuring the back-end database. 16. Once the form has been filled in then you should press the Validate button. After validating the system will give the option of Applying the Settings and Closing ConfigApp. Click No if you wish the Configuration process to remain open so that you can continue to modify data. You can still apply the settings at a later stage. If you get an error at this stage saying.. : Login failed for user..: Then this indicates that the User Groups have not yet been set up on the backend database. (This error can also appear if the password has been changed for one or more of the User Groups.) A script will automatically be generated to do this task (Refer to Section ). The script will need to be run by the database administrator by opening up the script in Microsoft Management Studio. The script can be run against the Master database. 17. This is the database version that will be detected when the Verify button is clicked. If the version is compatible with the application version then the version number will be shown in green. If the database version requires upgrading then the version number will be shown in red and you will need to upgrade the database. Page 11
14 Figure 13: Check if databases require upgrading When you click OK then a button appears that, when clicked, will update the database to match the current version of the application. Figure 14: Run the database upgrade process Once the database has been successfully upgraded then the version will show green and the Upgrade Database button will disappear. When migrating the PMS database, a report will be generated that will indicate if any errors were detected during the migration process Setting User-Group passwords The system architecture utilises a series of User-Groups that are used to connect to the database. Once the User Groups are established then the application administrator can later assign (and customise) individual users to one of these default user groups. Initially, the user-groups will not be created against the database. Therefore when you press validate the connection to the database will fail and a message similar to that shown below will appear. Page 12
15 Click OK and you will see a new button Save User Creation Scripts will appear on the form. Figure 15: Process to build user creation scripts Click on this button and the system will create an SQL Script that can be used to create the connection strings for each of the User-Groups used by the system. You will be prompted as to where you should save this script on the hard drive. Page 13
16 Figure 16: Save user creation script Once saved, open up this script in management studio and run it to create the users. Now you should go back to the Configuration form where you should be able to validate successfully Changing the User-Group passwords. If you wish to change the User-Group passwords then this needs to be done in two locations: First it needs to be done for the SQL Server logins. The default logins were initially created using the creation script described above. If you wish to later change these defaults then this needs to be done by the database administrator through the process described in point 2. Secondly it needs to be done within the application. The default passwords supplied with the system will initially match the default passwords that were established through the User Creation Script that was described in the previous section. Changing the passwords for the User-Groups can be done within the Configuration process. First open the Security TAB and click Validate. (Note the Security Tab is only available to the Administrator User). The User-Groups will appear with the passwords disguised. Overtype the passwords with the ones you established in the User Creation Script and then click Validate. The system should now have new passwords for each of the different User-Groups. Page 14
17 Figure 17: User groups The Reset Permissions button will set any user defined permissions back to the default values. Any previous work done to customize permission levels will be lost. This button will also set the User Group passwords back to the initial default values. The button Upgrade Security Structure should not be used unless advised by SMEC. Page 15
18 5.2 The About TAB The About TAB describes a copyright notice covering the program and lists the Version number of the software application installed. Figure 18: Software version number 5.3 Configuration of the Client software If you wish to configure the system and you do not have system administrator rights then the system will open with reduced functionality. Normal users can configure some information on their local workstation (such as the working directory for the PMS modelling operations) but they will not be able generate user creation scripts for the database or to change User-Group passwords. The system will allow a normal user to validate their own user login and also validate if the database is current for the software version that they are running. However, to upgrade the database will require a user with system administrator privileges. Note that when a normal user is recording the location of the PMS working directory then this information is stored under the User Registry settings on the local computer. In such a case the configuration must be run locally by the user who will be running the SMEC application. Page 16
19 Figure 19: Configure client workstation 5.4 Modifying the Application Configuration After initial configuration the system will boot directly into the application without starting up the configuration tool. If you wish to revisit the configuration facility then you should log in to the system as an application administrator (the default user is admin ). Access to the configuration forms is done through the Administration Tab and Configuration. 6 CUSTOMISATION APPLICATION SECURITY 6.1 Logging in Having used the role creation SQL scripts to set up the roles in the database and then used the Configuration to match the same passwords for the Service Account, it is now necessary to set up individual users from within the application. There should be a shortcut icon on the user s desktop which they can double-click to open the SMEC application. Page 17
20 Figure 20: Desktop Shortcut The PMS can also be opened by going to Start > All Programs > SMEC Software > SMECPMS The login form will appear as shown below. Figure 21: SMEC Login Form Initially the User Name you need to enter is admin. The default password (until changed within the SMEC application) will also be admin. Press the Sign In button to start the program. Having logged on as an administrator, you should be given full access to all of the facilities of the system including the Administration tools. Refer to Figure 22. Figure 22: Administration tool set To change the default password, use the Change Password icon within the Administration menu items. Page 18
21 6.2 Setting security access levels The creation of users and setting up the security access for those users should be carried out by the admin user. This user is a system user and, as such, won t appear in the list of normal users. The admin user belongs to the User Group called SMECAsset_DBOwner. You should be careful of changing the security levels of this group otherwise it may be possible to lock yourself out of the system. You would then require assistance from SMEC to re-gain access to the administration functions of the system. The system uses a three step process for setting up the level of access assigned to users of the system. The three steps are: 1. Use the Security Descriptors menu to define the security threshold level required to gain access to each area of the system. 2. Use the User Groups menu to define the different types of users (Group of Users) and define the security levels for each menu item that is applicable for that group of users. If the security level is defined above the required threshold (as defined in step 1) then access is given. If the security level is defined below the threshold then access is denied. 3. Define individual users (and their passwords) and then assign these users to one of the groupings that have been set-up in step 2. If required, individual users can set up with their own unique security profile that is independent of any predefined grouping. Security can operate at a range of different levels including access to menu TABS, access to groups of menu items, access to individual menu items, and access to data within forms. The following example comes from the SMECAsset Application. Figure 23: Definition of Menu Item, Menu Tab and Menu grouping Setting the security thresholds The Security Descriptors menu is used to establish what level of security is required by the users in order to access or operate in various areas of the system. Page 19
22 Figure 24: Setting security threshold levels required for access Clicking on this menu item opens up the following form: Figure 25: Setting the permission levels required to access the system The access points within the system are described as a hierarchal tree structure that can be expanded on the left-hand side of the form. The default permission levels (at the time of system installation) are set to 50 for all security settings. The Application Administrator can change any of these settings using the slider to set the level from 0 to 100. Rather than using the slider it is possibly easier to simply highlight the security level number (in this case 50) and then type in the required number between 0 and 100. Unless you have a specific requirement to change the thresholds then it is recommended to leave the thresholds at the default level of 50. The form shows all areas of the system for both the full asset management system as well as the PMS module. If you are only going to be using the PMS module then the only items of interest are the ones highlighted in the red boxes shown in Figure 26 : Menu items related to the SMEC PMS. Page 20
23 Figure 26 : Menu items related to the SMEC PMS When individual users are set up then the individual s specific security setting must be set to greater or equal to the system threshold setting before access can be granted. Once you have established the system security levels for access then these settings can be exported to a CSV file (or previously saved settings can be imported) using the export/import buttons located at the top right-hand corner of the form. Currently the security permissions at record level have not been fully implemented for the PMS. Therefore don t try modifying the columns of data shown within the red box below. Figure 27: Setting the security permissions at a record level Page 21
24 6.3 Customising the User-Group security settings The system allows groups of users to be defined that will all be given a common security access level. Individual users can then be assigned to a group and thus inherit the groups security settings. It is then possible to further customise an individual s security settings to add or remove access to specific parts of the system. To set up the different permission levels associated with each group of users, click on the User Groups icon within the Administration tab. Figure 28: Setting the permissions for different groupings of users There are currently eight different User-Group categories that have been defined. Default security settings have been supplied for each grouping however these can be customised to suite the customers requirements. Figure 29: Setting security permissions for user-groups Page 22
25 Use the form to set the security level for all users assigned to the group. If the security level is set lower than the threshold that was previously defined in the Security Descriptors manual then you will see a line drawn through the security level number. This indicates that access will be denied to this item Changing the system password for the user group connection Each user group has a system password that allows connection to the database. The passwords stored within the application database must match the passwords allocated to the logins of the User Group for the SQL Server installation. Note that the User Group passwords are different to the User s individual password that allows each user to log in to the application. The Application Administrator is the only who should need to know the passwords for the user groups. The default user group passwords were set through the Create User Scripts that were generated and then run during the initial system configuration. Refer to Section If you do wish to change the passwords then this requires a two-step process: 1. Click on the Button located on the right-hand side of the record that relates to each of the user groups. Figure 30: Changing passwords for user groups A pop-up form will appear that will allow you to enter a new password that will be used to connect to the database for that group of users. 2. The database administrator will then need to Open up Microsoft SQL Server Management Studio and then click on Security Logins. Right-click on the name of the User Group being changed and then select Properties. Now change the Password to match the new password entered through the application. Click OK to save. Page 23
26 Figure 31: Setting passwords for user group logins Note that changes to the User Group passwords can also be made through the Configuration menu item within the Administration TAB. The database administrator will still need to perform Step 2 (above) to complete this process. 6.4 Creating individual users Once the overall security thresholds have been defined and the security levels attributed to each of the user groups have been set then you can create individual users and assign these users to a User Group. Figure 32: Creating individual users Clicking on this icon will open up the form used to define the individual users. The form is in two parts. The top part is where new users are added while the bottom part shows the permissions currently assigned to each user. Page 24
27 Figure 33: Defining individual users and their security settings To add a new user, click on the + in the navigation bar and then fill in the details for the user being added. The first column, Code, is the username that will be entered into the Login form (Refer Figure 34. ) This needs to be unique and the field is restricted to 100 characters. If you are using Single Sign On (Refer to Section ) then this code needs to correspond to the Network User ID for the user. Otherwise any name can be used. Page 25
28 Figure 34: Application Login form The next two columns, Name and Description, are simply text fields to further define who the user is. Both of these fields also allow up to 100 characters to be entered. The next column is used to store the User Group to which the user will be assigned. The security settings for the various user groups were already determined as per Section 6.3 ). The User Group can be selected from a drop down list. This is a mandatory field even if you are going to further customise the security settings for this particular user. Once a user group is selected, the security settings attributed to that grouping will appear in the bottom half of the form. You can only modify these settings if the Use Grp box (second last column) is un-checked. The next column is SSO (Single Sign On). If you are not using Single Sign On (Refer to Section ) then this box should be un-checked. The next column is Disabled. If this box is checked then the user will not be able to sign in to the application. This is used to disable a user without removing all of the user s details. Normally this box should be un-checked. Although the individual users inherit the group security, modifications to the security can be made that are specific to each individual. In order to further customise the permissions so that they are specific to an individual user then Use Grp box should be un-checked. The final column in the record is used to establish the password that the user will enter into the Login form in order to gain access to the system. (If Single Sign On is being used then the user will not be required to enter a username and password to run the SMEC software). Clicking on the PWD button will open up the following form. Page 26
29 Figure 35: Change Password form To enter a password the Single Sign On (SSO) box should be unchecked. The system does also provide a Change Password facility that is independent of the System Users creation form. This means that the System Administrator can set up the security settings so that they can have access to the Change Password menu without having access to the other Administration functionality. If set up like this then users will be able to change their own passwords. Figure 36: Example showing how system has been set up to allow to 'Change Password' only Using Single Sign On to access the application If the SSO button is checked then the system will authenticate the user based on the based on the logon credentials provided when the user started up the computer. In this case the Code provided must match the Network User ID for the computer when logging onto the network. One way to verify what the Network User ID that the system is using is to first login to the client computer with the users credentials, Run the PMS as admin, open up the Configuration menu and then you should see the Network User ID displayed on the User Tab. See below. Page 27
30 Figure 37: Network User ID displayed within the configuration form If you try to use the SMEC Application to change the password for a SSO user then the following message will appear: Page 28
ROCK-POND REPORTING 2.1
ROCK-POND REPORTING 2.1 Installation and Setup Guide Revised on 09/25/2014 TABLE OF CONTENTS ROCK-POND REPORTING 2.1... 1 SUPPORT FROM ROCK-POND SOLUTIONS... 2 ROCK-POND REPORTING OVERVIEW... 2 INFRASTRUCTURE
More informationLiveNX Upgrade Guide from v5.2.0 to v5.2.1
LIVEACTION, INC. LiveNX Upgrade Guide from v5.2.0 to v5.2.1 UPGRADE LiveAction, Inc. 3500 Copyright WEST BAYSHORE 2016 LiveAction, ROAD Inc. All rights reserved. LiveAction, LiveNX, LiveUX, the LiveAction
More informationStandalone on a Single PC 3. Server/Network Installation to Access VETtrak from Multiple PCs Database... Server Installation
Install Guide 2 Install Guide Standalone on a Single PC 3 1 Install VETtrak... 3 2 Install.NET... Framework 7 3 Install Firebird... 7 4 Configuration... 8 Database Connection... 9 Registration Key... 10
More information1. ECI Hosted Clients Installing Release 6.3 for the First Time (ECI Hosted) Upgrading to Release 6.3SP2 (ECI Hosted)
1. ECI Hosted Clients........................................................................................... 2 1.1 Installing Release 6.3 for the First Time (ECI Hosted)...........................................................
More informationLiveNX Upgrade Guide from v5.1.2 to v Windows
LIVEACTION, INC. LiveNX Upgrade Guide from v5.1.2 to v5.1.3 - Windows UPGRADE LiveAction, Inc. 3500 Copyright WEST BAYSHORE 2016 LiveAction, ROAD Inc. All rights reserved. LiveAction, LiveNX, LiveUX, the
More informationMigrating to MIL-Comply SQL Server Edition
Migrating to MIL-Comply SQL Server Edition Step by step instructions for migrating MIL-Comply s local database to Microsoft SQL Server or SQL Server Express. Pre-start Checklist: The following items must
More informationAPPENDIX B: INSTALLATION AND SETUP
APPENDIX B: INSTALLATION AND SETUP Page A. Overview... B:1 How do I install and setup ICMS?... B:1 Do I need special security rights to install ICMS?... B:1 Installation Basics... B:1 How do I get a quick
More informationHR-Lite Database & Web Service Setup Guide
HR-Lite Database & Web Service Setup Guide Version: 1.00 HR21 Limited All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means, electronic or mechanical,
More informationIQSweb Installation Instructions Version 5.0
IQSweb Installation Instructions Version 5.0 Contents Additional References... 3 IQSweb ROSS Connection... 3 IQSweb V5.0 Install/Upgrade Scenarios... 4 IQSweb Configuration Options... 5 A. Single Computer/Server
More informationInstalling SSP Admin Console
The School Seating Planner admin console for SIMS is an application that enables School Seating Planner to integrate with SIMS in order to set-up, configure, and maintain the seating planner for your school
More information29 March 2017 SECURITY SERVER INSTALLATION GUIDE
29 March 2017 SECURITY SERVER INSTALLATION GUIDE Contents 1. Introduction... 2 1.1 Assumptions... 2 1.2 Prerequisites... 2 2. Required setups prior the Security Server Installation... 3 1.1 Create domain
More informationIT Essentials v6.0 Windows 10 Software Labs
IT Essentials v6.0 Windows 10 Software Labs 5.2.1.7 Install Windows 10... 1 5.2.1.10 Check for Updates in Windows 10... 10 5.2.4.7 Create a Partition in Windows 10... 16 6.1.1.5 Task Manager in Windows
More informationNetSupport ServiceDesk Product Manual Version 3.10
NetSupport ServiceDesk Product Manual Version 3.10 Manual COPYRIGHT (C) 2013 NetSupport Ltd. All rights reserved. The Information in this document is subject to change without notice. NetSupport Ltd. reserves
More informationenicq 6 Installation Guide
Vermont Oxford Network enicq 6 Documentation enicq 6 Installation Guide Release 1.4 Published January 2018 2018 Vermont Oxford Network. All Rights Reserved. enicq 6 Installation Guide Introduction Welcome
More informationData Store and Admin Tool User Guide
Data Store and Admin Tool User Guide Contents Contents What is a Data Store?... 8 Getting Started... 8 System Requirements... 8 Supported Operating Systems... 8 Support SQL Servers... 8 Tools Required
More informationXIA Configuration Server
XIA Configuration Server XIA Configuration Server v6 Cloud Services Quick Start Guide Tuesday, 20 May 2014 1 P a g e X I A C o n f i g u r a t i o n C l o u d S e r v i c e s Contents Overview... 3 Creating
More informationWinDSX New Installations
WinDSX New Installations Use these instructions for new Installations. a) Make sure that the Comm Server PC has the.net Framework 4.0 or higher installed. b) Make sure you have Administrative Privileges
More informationTrusted Advisor User Guide. inty CASCADE v 2.9.0
Trusted Advisor User Guide inty CASCADE v 2.9.0 Table of Contents 1. Overview... 2 2. Logging in to inty CASCADE... 2 2.1 Forgotten Password... 4 2.2 Password Complexity... 5 3. Home Page... 7 4. Navigation...
More informationPCGENESIS TECHNICAL SYSTEM OPERATIONS GUIDE
PCGENESIS TECHNICAL SYSTEM OPERATIONS GUIDE 1/7/2019 Section C: The VerraDyne Print Manager Topic 1: Configuring the VerraDyne Print Manager, V1.1 Revision History Date Version Description Author 1/7/2019
More informationChapter. Accessing Files and Folders MICROSOFT EXAM OBJECTIVES COVERED IN THIS CHAPTER
Chapter 10 Accessing Files and Folders MICROSOFT EXAM OBJECTIVES COVERED IN THIS CHAPTER Monitor, manage, and troubleshoot access to files and folders. Configure, manage, and troubleshoot file compression
More informationCITO2 Installation & User Instructions
CITO2 Installation & User Instructions DD 56107 Stoneridge Electronics Ltd 1. Installation...4 1.1. System Requirements...4 1.2. Installing CITO2...4 1.3. Uninstalling CITO2...4 2. Starting and closing
More informationPrint Audit 6. Print Audit 6 Documentation Apr :07. Version: Date:
Print Audit 6 Version: Date: 37 21-Apr-2015 23:07 Table of Contents Browse Documents:..................................................... 3 Database Documentation.................................................
More informationCopyright SolarWinds. All rights reserved worldwide. No part of this document may be reproduced by any means nor modified, decompiled,
APM Migration Introduction... 3 General Requirements... 3 Database Requirements... 3 Stopping APM Services... 4 Creating and Restoring Orion Database Backups... 4 Creating a Database Backup File with Database
More informationLesson 3: Identifying Key Characteristics of Workgroups and Domains
1-16 Chapter 1 Introduction to Windows XP Professional Lesson 3: Identifying Key Characteristics of Workgroups and Domains Windows XP Professional supports two types of network environments in which users
More information12d Synergy Server Installation Guide
12d Synergy Server Installation Guide Version 3.0 April 2017 12d Solutions Pty Ltd ACN 101 351 991 PO Box 351 Narrabeen NSW Australia 2101 (02) 9970 7117 (02) 9970 7118 support@12d.com www.12d.com 12d
More informationInstallation and Configuration Guide
Installation and Configuration Guide 2013 DataNet Quality Systems. All rights reserved. Printed in U.S.A. WinSPC and QualTrend are registered trademarks of DataNet Quality Systems. All other trademarks
More informationCloud Compute. Backup Portal User Guide
Cloud Compute Backup Portal User Guide Contents Service Overview... 4 Gaining Access... 5 Operational Guide... 6 Landing Page... 6 Profile View... 6 Detailed View... 8 Overview... 8 Cloud Backup... 8
More informationService administrator and Card ordering user guide
Service administrator and Card ordering user guide 1 Contents 1. What is a service administrator? 2. What is a service role? 3. How do I apply as the initial service administrator / register my organisation?
More informationReliable High-Speed Connection to Publication Database for Synchronization
PCS Axis v1.9 Client/Server New Installation with Replication May 2015 Introduction American Innovations (AI) is pleased to announce version 1.9 of our Pipeline Compliance System Axis software (PCS Axis
More information5 MANAGING USER ACCOUNTS AND GROUPS
MANAGING USER ACCOUNTS AND GROUPS.1 Introduction to user accounts Objectives.2 Types of User Accounts.2.1 Local User Account.2.2 Built-in User Account.2.3 Domain User Account.3 User Profile.3.1 Content
More information// Mamut Business Software. Update Guide
// Mamut Business Software Update Guide Contents Updating to a New Version 3 How to Create Backups 5 Updating to the latest version 7 How to move the Program to a Different Computer/Server 14 How to move:
More informationINSTALLATION INSTRUCTIONS
INSTALLATION INSTRUCTIONS NZ Tax Management Version: 2015.04 Service Pack Author Created and Published by Reckon Limited Level 12, 65 Berry Street North Sydney NSW 2060 Australia ACN 003 348 730 All Rights
More informationIBM Atlas Policy Distribution Administrators Guide: IER Connector. for IBM Atlas Suite v6
IBM Atlas Policy Distribution Administrators Guide: IER Connector for IBM Atlas Suite v6 IBM Atlas Policy Distribution: IER Connector This edition applies to version 6.0 of IBM Atlas Suite (product numbers
More informationInstalling the PC-Kits SQL Database
1 Installing the PC-Kits SQL Database The Network edition of VHI PC-Kits uses a SQL database. Microsoft SQL is a database engine that allows multiple users to connect to the same database. This document
More informationEkran System v.6.0 Privileged User Accounts and Sessions (PASM)
Ekran System v.6.0 Privileged User Accounts and Sessions (PASM) Table of Contents About... 3 Using Privileged User Accounts... 4 Password Vault Configuration... 5 Defining Domain Administrator Credentials...
More informationClient Installation and User's Guide
IBM Tivoli Storage Manager FastBack for Workstations Version 7.1.1 Client Installation and User's Guide SC27-2809-04 IBM Tivoli Storage Manager FastBack for Workstations Version 7.1.1 Client Installation
More informationFollow all of the steps indicated below for each process. Some steps may require IT assistance.
The instructions provided below are for upgrading EnergyCAP Enterprise from Release 6.0 to Release 6.1SP1. The version number of EnergyCAP 6.1 is 6.1.60.xx. (xx will correspond to the current build, and
More informationContents OVERVIEW... 3
Contents OVERVIEW... 3 Feature Summary... 3 CONFIGURATION... 4 System Requirements... 4 ConnectWise Manage Configuration... 4 Configuration of Manage Login... 4 Configuration of GL Accounts... 5 Configuration
More informationOneRoof CyberCafePro Client Installation, Setup and User Manual
OneRoof CyberCafePro Client Installation, Setup and User Manual Suggestion: View manual on computer at 200% to see screenshot details. Client Manual: Version 6.0.x March 15, 2010 Copyright 2010, OneRoof,
More informationONESolution General Information
ONESolution General Information Contents Requesting Access and Logging in to ONESolution... 2 ONESolution Home Screen... 3 Default Settings... 14 Workflow... 18 Transaction Originator... 18 Transaction
More informationSupervisor Insight. Installation Guide.
Supervisor Insight Installation Guide www.monitorbm.com Supervisor Insight Installation Guide Copyright 2014 Monitor Business Machines Ltd The software contains proprietary information of Monitor Business
More informationBackup using Quantum vmpro with Symantec Backup Exec release 2012
Backup using Quantum vmpro with Symantec Backup Exec release 2012 Step 1) If the vmpro appliance name and IP address are not resolved through DNS, update the Windows hosts file to include the IP address
More informationLab 11-1 Lab User Profiles and Tracking
In the following lab instructions, you will be setting up groups, users, and passwords to require password-protected login to Kofax Capture modules. Rights will be assigned to the groups and users that
More informationManaging WCS User Accounts
CHAPTER 7 This chapter describes how to configure global e-mail parameters and manage WCS user accounts. It contains these sections: Adding WCS User Accounts, page 7-1 Viewing or Editing User Information,
More informationSetup Smart Login for Windows V2
Setup Smart Login for Windows V2 Smart Login allows workstations to login to a Smart-Net server without having to join a domain. Smart Login is suitable for both laptops and desktop PC s. Features Users
More informationLepideAuditor for File Server. Installation and Configuration Guide
LepideAuditor for File Server Installation and Configuration Guide Table of Contents 1. Introduction... 4 2. Requirements and Prerequisites... 4 2.1 Basic System Requirements... 4 2.2 Supported Servers
More informationObtaining a login and password to the Online Application
Obtaining a login and password to the Online Application You should have received a password to the online application from Regional Credentialing. If you ve forgotten your password, please contact us.
More informationPlatinum~Pro (v21.0): Deployment Guide (v1.2)
(v1.2) INTRODUCTION... 2 SYSTEM REQUIREMENTS... 4 CHAPTER 1 DEPLOYMENT... 6 CHAPTER 2 UPGRADING... 12 CHAPTER 3 MIGRATION... 15 CHAPTER 4 UNINSTALLATION... 16 APPENDIX 1 DEPLOYMENT ISSUES... 18 APPENDIX
More informationXIA Links. Administrator's Guide. Version: 3.0. Copyright 2017, CENTREL Solutions
Administrator's Guide Version: 3.0 Copyright 2017, CENTREL Solutions Table of contents About... 4 Installation... 6 Installation Requirements (Server)... 7 Prerequisites (Windows Server 2016)... 9 Prerequisites
More informationManaging WCS User Accounts
7 CHAPTER This chapter describes how to configure global email parameters and manage WCS user accounts. It contains these sections: Adding WCS User Accounts, page 7-2 Viewing or Editing User Information,
More informationUpgrade Tool Guide. July
Upgrade Tool Guide July 2015 http://www.liveaction.com 4.X to 5.0 The Upgrade Guide from 4.X to 5.0 consists of three parts: Upgrading the LiveAction Server Upgrading the LiveAction Node Upgrading the
More informationInstalling Sentry-go Quick Monitors, Sentry-go Plus!, Client Tools & Enterprise Reporting
Installing Sentry-go Quick Monitors, Sentry-go Plus!, Client Tools & Enterprise Reporting 3Ds (UK) Limited, November, 2013 http://www.sentry-go.com Be Proactive, Not Reactive! This guide gives full details
More informationDS2 Support. DS2 / inet System Installation Scenario 2. Scenario 1: - Windows 2003 Server - Utilizing an External SQL Server
DS2 Support DS2 / inet System Installation Scenario 2 Scenario 1: - Windows 2003 Server - Utilizing an External SQL Server Author: Jason May Revision 8.0 Revision Date 03/2009 Overview The purpose of this
More informationChapter A1: Setting up BankLink Practice, BankLink Notes and BankLink Notes Online
Chapter A1: Setting up BankLink Practice, BankLink Notes and BankLink Notes Online This chapter is aimed at BankLink Administrators This chapter covers setting up BankLink Practice and BankLink Notes Online
More informationLicense Manager Client
License Manager Client Operations Guide NEC NEC Corporation of America November 2010 NDA-30899, Revision 6 Liability Disclaimer NEC Corporation of America reserves the right to change the specifications,
More informationPACS. Installation & Going Live. User Guide. pacs1.4
PACS Installation & Going Live User Guide pacs1.4 Tribal SchoolEdge Level 1, 17 Madden Grove RICHMOND VIC 3121 Support Centre: Web: https://support.schooledge.com.au/ Email: support.schooledge@tribalgroup.com
More informationVersion Operator Orientation. TIMMS Client. A guide to using the TIMMS System. Training & Navigation Notes
Version 7.2.4 Operator Orientation TIMMS Client A guide to using the TIMMS System Training & Navigation Notes Disprax Pty Ltd 2015 WHAT IS TIMMS? TIMMS Stands for: Total Industry Management and Marketing
More informationEnter your Appserv username and password to sign in to the Website
Appserv Desktop Access Logging on from a Windows 10 Device Step 1. To sign in to the Appserv Desktop Access website, either enter the following address into the Microsoft Edge browser address bar, or click
More informationSafeConsole On-Prem Install Guide
SafeConsole On-Prem Install Guide This guide applies to SafeConsole 5.0.5 Introduction This guide describes how to install a new SafeConsole server on Windows using the SafeConsole installer. As an option,
More informationTermination Payout Calculator
Termination Payout Calculator User guide System requirements Installation Getting started & logging in Changing your password Users Searching Importing termination records Exporting (CSV or for the Tax
More informationAccessing McKesson Radiology 12.3 PACS Remotely Over VPN
Accessing McKesson Radiology 12.3 PACS Remotely Over VPN Web: www.interiorhealth.ca 2 Getting Started Please ensure that your PACS administrator has setup your McKesson account for access to the McKesson
More informationexacqvision-entrapass (W10) Installation Guide
1 Overview Purpose ExacqVision recorders now include Kantech Entrapass CE software. The purpose of this document is to guide the technician or installer through the process of installing and registering
More informationOVERVIEW Feature Summary... 3 CONFIGURATION System Requirements... 4 ConnectWise Manage Configuration... 4
Contents OVERVIEW... 3 Feature Summary... 3 CONFIGURATION... 4 System Requirements... 4 ConnectWise Manage Configuration... 4 Configuration of Manage Login... 4 Configuration of GL Accounts... 5 Configuration
More informationBDO P11D Enterprise Version 25.0 Getting Started
BDO P11D Enterprise Version 25.0 Getting Started Introduction Installation instructions for Version 25.0 are provided in this guide; see Installing P11D Enterprise 2018-19. Please read the instructions
More informationClient Installation and User's Guide
IBM Tivoli Storage Manager FastBack for Workstations Version 7.1 Client Installation and User's Guide SC27-2809-03 IBM Tivoli Storage Manager FastBack for Workstations Version 7.1 Client Installation
More informationZAVANTA Standalone Installation
Customer Support Instructions Doc Number: TechSup-2022 Document Owner: Technical Support Last Author: Technical Support General Description Description: This document covers the instructions for installing
More informationSafeConsole On-Prem Install Guide. version DataLocker Inc. July, SafeConsole. Reference for SafeConsole OnPrem
version 5.2.2 DataLocker Inc. July, 2017 SafeConsole Reference for SafeConsole OnPrem 1 Contents Introduction................................................ 2 How do the devices become managed by SafeConsole?....................
More informationInstallation Manual. Fleet Maintenance Software. Version 6.4
Fleet Maintenance Software Installation Manual Version 6.4 6 Terri Lane, Suite 700 Burlington, NJ 08016 (609) 747-8800 Fax (609) 747-8801 Dossier@dossiersystemsinc.com www.dossiersystemsinc.com Copyright
More informationVirtual CD TS 1 Introduction... 3
Table of Contents Table of Contents Virtual CD TS 1 Introduction... 3 Document Conventions...... 4 What Virtual CD TS Can Do for You...... 5 New Features in Version 10...... 6 Virtual CD TS Licensing......
More informationNetwork DK2 DESkey Installation Guide
VenturiOne Getting Started Network DK2 DESkey Installation Guide PD-061.2.306 DESkey Network Server Manual Rev A Applied Cytometry CONTENTS 1 DK2 Network Server Overview... 2 2 DK2 Network Server Installation...
More informationWelcome to your Lacerte products! We appreciate your business.
Welcome to your Lacerte products! We appreciate your business. Please follow steps 1 through 4 in this guide: Step 1: Install the Final 2014 Program Step 2: Install the 2015 Program Step 3: Transfer Your
More information10ZiG Technology. Thin Desktop Quick Start Guide
10ZiG Technology Thin Desktop Quick Start Guide 2010 05 20 Introduction This document is intended as a quick start guide for installing Thin Desktop. After reading this document, you will know how to:
More informationTHE UNITED REPUBLIC OF TANZANIA
THE UNITED REPUBLIC OF TANZANIA PRESIDENT S OFFICE - PUBLIC SERVICE AND GOOD GOVERNENCE e-government Agency GOVERNMENT MAILING SYSTEM USER GUIDE 1 P a g e Contents Contents... 2 1. Introduction... 4 2.
More informationInstallation Guide. Mobile Print for Business version 1.0. July 2014 Issue 1.0
Installation Guide Mobile Print for Business version 1.0 July 2014 Issue 1.0 Fuji Xerox Australia 101 Waterloo Road North Ryde NSW 2113 For technical queries please contact the Fuji Xerox Australia Customer
More informationRWT Network System Installation Guide
RWT Network System Installation Guide Copyright 2003, Talking Fingers, Inc. Page 1 of 48 This document is Copyright 2003 by Talking Fingers, Inc. All rights are reserved. This document may not be copied
More informationEntropy Software General Administration & Configuration
Entropy Software General Administration & Configuration V1.02 1 of 34 Contents 1. Customising your Entropy system... 4 1.1 Entering or editing your Organisation s name into Entropy... 4 1.2 Adding a Watermark...
More informationMulti-Sponsor Environment. SAS Clinical Trial Data Transparency User Guide
Multi-Sponsor Environment SAS Clinical Trial Data Transparency User Guide Version 6.0 01 December 2017 Contents Contents 1 Overview...1 2 Setting up Your Account...3 2.1 Completing the Initial Email and
More informationEsko. Suite 12 Engines Installation (Beta)
Suite 12 Engines Installation (Beta) Contents 1. Before installing Suite 12... 3 1.1 How to change Data Execution Prevention (DEP) Settings...3 1.2 How to change the password policy... 4 2. How to install
More informationRedBeam Inventory Tracking User Manual
RedBeam Inventory Tracking User Manual Contact us at www.redbeam.com. Page 1 Table of Contents Table of Contents... 2 Overview... 4 RedBeam Inventory Tracking... 4 PC Prerequisites... 4 Mobile Computer
More informationQuest Desktop Authority Full Build Update Release Notes
Quest Desktop Authority Full Build Update 10.1.0.1006 Release Notes January 5, 2018 Version 10.1.0.1006 Importance: Mandatory Contents Readme Resolved Issues Compatibility of This Update Installing This
More informationMigrating ABECAS Insight
Published: March 15, 2012 Installation Guide for Migrating ABECAS Insight VERSION 7.6.0.2621 or greater For Microsoft Windows Server 2008 (Standard or Enterprise Editions only) This includes R2 editions
More informationSWCS 4.2 Server Manager Users Guide Revision /22/2012 Solatech, Inc.
SWCS 4.2 Server Manager Users Guide Revision 39 10/22/2012 Solatech, Inc. Contents Introduction... 5 Installation... 5 Installing on a server with the Solatech Window Covering Software... 5 Running the
More informationInstalling and Configuring Worldox/Web Mobile
Installing and Configuring Worldox/Web Mobile SETUP GUIDE v 1.1 Revised 6/16/2009 REVISION HISTORY Version Date Author Description 1.0 10/20/2008 Michael Devito Revised and expanded original draft document.
More informationUC for Enterprise (UCE) Room Direct for Hospitality (UNIVERGE UA5200 )
UC for Enterprise (UCE) Room Direct for Hospitality (UNIVERGE UA5200 ) A UA5200 Solution Operations Guide NEC Corporation September 2010 NDA-31121, Revision 1 Liability Disclaimer NEC Corporation reserves
More informationEnd User Manual. December 2014 V1.0
End User Manual December 2014 V1.0 Contents Getting Started... 4 How to Log into the Web Portal... 5 How to Manage Account Settings... 6 The Web Portal... 8 How to Upload Files in the Web Portal... 9 How
More informationFront Desk 2018 Practice Management System
Front Desk 2018 Practice Management System Physitrack Integration Guide Copyright Smartsoft Pty Ltd. 1996-2018 All rights reserved. No part of this publication may be reproduced without the express written
More informationPROXIMITY Encoding System
PROXIMITY Encoding System ins-206 Date code: 251103 Contents 2 Contents Setting up the system...4 Introduction...4 What s in the box...5 Installing the system...5 Initialising the program...6 Initialising
More informationINSTALLATION GUIDE Spring 2017
INSTALLATION GUIDE Spring 2017 Copyright and Disclaimer This document, as well as the software described in it, is furnished under license of the Instant Technologies Software Evaluation Agreement and
More informationControlsoft Identity and Access Management Software Controlsoft Identity Access Management Software
Controlsoft Identity Access Management Software IA Server Software Installation Guide v8.0.229 2018 Controlsoft Ltd 9010-0050 Issue 6 Page 1 of 39 29/10/2018 Contents 1. Introduction... 3 1.1. PC Specifications...
More informationInstallation. Overview and Technical Notes
Installation - Page 1 of 9 Installation Overview and Technical Notes PedCath is a Congenital Cardiac Catheterization Reporting Tool. It was designed to allow user generated comprehensive reports following
More informationBefore you attempt to connect to IFAS, there are a few settings that you will have to change in Internet Explorer.
KU Endowment Account Reporting System IFAS End-user Setup Note: For this setup, please be sure to have your computer technician or other technical resource handy. Some of these steps may require administrative
More informationWorkstation Configuration Guide
Workstation Configuration Guide August 13, 2018 Version 9.6.134.78 For the most recent version of this document, visit our documentation website. Table of Contents 1 Workstation configuration 4 1.1 Considerations
More informationVMware AirWatch Database Migration Guide A sample procedure for migrating your AirWatch database
VMware AirWatch Database Migration Guide A sample procedure for migrating your AirWatch database For multiple versions Have documentation feedback? Submit a Documentation Feedback support ticket using
More informationControlPoint. Advanced Installation Guide. September 07,
ControlPoint Advanced Installation Guide September 07, 2017 www.metalogix.com info@metalogix.com 202.609.9100 Copyright International GmbH., 2008-2017 All rights reserved. No part or section of the contents
More informationTOP Server Version 6 Security Settings
TOP Server 1 (10) TOP Server Version 6 TOP Server 2 (10) Contents Security Built In... 3 User Manager Configuration... 3 New User Accounts... 5 New User Group and Properties... 5 Configuration Security...
More informationSecureGuard VMS. SecureGuard All-In-One Quick Install Guide V. 2.5
SecureGuard VMS Quick Install Guide V. 2.5 9/30/2018 2 Table of Contents Purpose... 3 Installation... 3 Setup... 4 Startup & Live View... 26 3 Purpose This is a step-by-step guide to installing the current
More informationComputer Based Examinations
Computer Based Examinations CBE V24.0 Installation Instructions Existing CBE Centres This document is intended for existing CBE centres that currently have ACCA CBE software installed, and are installing
More informationAct! Link for Accounting Administrator Guide
Act! Link for Accounting Administrator Guide Contents Act! Link for Accounting Introduction Page 3 Compatibility Page 5 Server Preparation Page 6 Act! Link for Accounting Program Installation Page 22 Registration
More informationKASPERSKY LAB. Kaspersky Administration Kit version 6.0. Reference Book
KASPERSKY LAB Kaspersky Administration Kit version 6.0 Reference Book KASPERSKY ADMINISTRATION KIT VERSION 6.0 Reference Book Kaspersky Lab Ltd. Visit our website: http://www.kaspersky.com/ Revision date:
More informationThe tool can also be accessed by clicking the Self Service Password Manager icon on your desktop, or by visiting:
Self Service Password Manager Last revised: April 2017 Last reviewed: April 2017 Information Technology Division Next review: September 2018 This guide should be used to learn how to set-up a Self Service
More information