Home Page Icon
Home Page
Table of Contents for
Front cover
Close
Front cover
by Margaret Worel, Chuck Snow, Pablo E Romero, Thorsten Poggensee, Michael Oland, N
IBM FileNet P8 Platform and Architecture
Front cover
Notices
Trademarks
Preface
The team who wrote this book
Now you can become a published author, too!
Comments welcome
Stay connected to IBM Redbooks
Summary of changes
April 2011, Second Edition
Chapter 1. IBM FileNet P8 Platform overview
1.1 Information explosion
1.1.1 Content management goals
1.1.2 Enterprise content management solution requirements
1.2 IBM FileNet P8 Platform overview
1.2.1 FileNet P8 Platform ECM solutions
1.2.2 FileNet Enterprise Reference Architecture
1.2.3 IBM FileNet Platform core components
1.2.4 Application interfaces
1.2.5 Expansion products
1.3 Advanced topics
1.4 What is new in 5.0
1.5 Summary
Chapter 2. Core component architecture
2.1 Core components overview
2.2 Content Engine
2.2.1 Data model
2.2.2 Security
2.2.3 Event framework
2.2.4 Life-cycles
2.2.5 Content storage
2.2.6 Full-text indexing
2.2.7 Publishing
2.2.8 Classification
2.2.9 Protocols
2.2.10 APIs
2.2.11 CMIS
2.3 Process Engine
2.3.1 Architecture
2.3.2 Data model
2.3.3 Access control
2.3.4 Process orchestration
2.3.5 Component Integrator
2.3.6 Analysis and optimization
2.3.7 Rules framework
2.3.8 Protocols
2.3.9 APIs
2.4 Workplace and Workplace XT
2.4.1 Component Manager
2.4.2 User preferences
2.5 Configuration tools
2.5.1 Content Engine
2.5.2 Process Engine
2.5.3 P8 Platform tools
2.6 Case Manager
2.6.1 Data model
2.6.2 User interface
2.6.3 API
2.6.4 Case templating
2.6.5 WebSphere Process Server integration
Chapter 3. Application interfaces
3.1 Workplace XT
3.1.1 Tools
3.1.2 Creating content
3.1.3 Viewing images
3.1.4 Architecture
3.1.5 Customization
3.1.6 Workplace XT summary
3.2 Workplace
3.2.1 Architecture
3.2.2 Customization
3.2.3 Workplace summary
3.3 Electronic forms
3.3.1 Architecture
3.3.2 Integration
3.3.3 Dependencies
3.3.4 eForms summary
3.4 Business Process Framework
3.4.1 Architecture
3.4.2 Integration and connection points
3.4.3 BPF summary
3.5 ECM Widgets
3.5.1 Architecture
3.5.2 Integration and connection points
3.5.3 Dependencies
3.5.4 ECM Widgets summary
3.6 Summary
Chapter 4. Expansion products for content ingestion
4.1 Expansion product overview
4.2 Content ingestion products overview
4.3 IBM Content Collector
4.3.1 Overview: Email, File Systems, and SharePoint
4.3.2 Content Collector for SAP applications
4.3.3 Content Collector summary
4.4 IBM Datacap
4.4.1 Introduction to Datacap
4.4.2 IBM Datacap Capture process overview
4.4.3 Architecture
4.4.4 Components of the Datacap Taskmaster Capture solution
4.4.5 Products and applications
4.4.6 IBM Datacap Taskmaster Capture
4.4.7 Dependencies
4.4.8 Connection and integration points
4.4.9 Datacap summary
4.5 IBM FileNet Capture
4.5.1 FileNet Capture process overview
4.5.2 Capture systems architecture
4.5.3 IBM FileNet Capture products overview
4.5.4 IBM FileNet Capture Professional functions
4.5.5 IBM FileNet Capture Professional components
4.5.6 Integration points
4.5.7 IBM FileNet Capture summary
4.6 Summary
Chapter 5. Expansion products for connection and federation
5.1 Connection and federation products overview
5.2 IBM FileNet Services for Lotus Quickr
5.2.1 Architecture
5.2.2 User interfaces
5.2.3 Integration and connection points
5.2.4 IBM FileNet Services for Lotus Quickr summary
5.3 Content Management Interoperability Services
5.3.1 Architecture
5.3.2 Integration and connection points
5.3.3 CMIS summary
5.4 Content Federation Services
5.4.1 Architecture
5.4.2 Operations
5.4.3 Content Federation Services summary
5.5 Summary
Chapter 6. Expansion products for Information Lifecycle Governance
6.1 Information Lifecycle Governance overview
6.1.1 Compliance
6.2 IBM Enterprise Records
6.2.1 Architecture
6.2.2 Federated Records Management
6.2.3 Application Programming Interface
6.2.4 Bulk records operations
6.2.5 Dependencies
6.2.6 Enterprise Records summary
6.3 IBM Classification Module
6.3.1 Integration and connection points
6.3.2 Architecture
6.3.3 Components
6.3.4 Classification tools
6.3.5 Classification Module summary
6.4 IBM Content Analytics
6.4.1 Architecture
6.4.2 Integration and connection points
6.4.3 Dependencies
6.4.4 Summary
6.5 eDiscovery Manager and eDiscovery Analyzer
6.5.1 eDiscovery Manager
6.5.2 Architecture
6.5.3 Dependencies
6.5.4 Integration and connection points
6.5.5 eDiscovery Analyzer
6.5.6 Dependencies
6.5.7 Integration and connection points
6.5.8 eDiscovery Manager and eDiscovery Analyzer summary
6.6 Summary
Chapter 7. Building an ECM solution
7.1 Enterprise content management
7.2 Working with content
7.2.1 Data model
7.2.2 Document life cycle
7.2.3 Security
7.2.4 Storage
7.2.5 Classification
7.3 Business processes
7.3.1 Workflow definitions
7.3.2 Task-based processes
7.3.3 Analysis and optimization
7.4 Advanced case management
7.5 User interface
7.5.1 Out-of-the-box
7.6 Data sources
7.6.1 Ingestion
7.6.2 Federation
7.7 Content processing and classification
7.7.1 Classification
7.7.2 Events
7.7.3 Renditioning
7.8 Compliance and governance
7.8.1 Records management
7.8.2 Discovery
7.9 Monitoring
Chapter 8. Security
8.1 Authentication and authorization
8.1.1 Terminology
8.1.2 Authentication in IBM FileNet P8
8.1.3 Separated authorization
8.1.4 Single Sign-On
8.2 Securing core P8 components and resources
8.2.1 Content Engine
8.2.2 Process Engine
8.2.3 IBM FileNet P8 user interface access roles
8.2.4 Security aspects for installation and maintenance
8.3 Access to information
8.3.1 Security of Content Engine objects
8.3.2 Default instance security
8.3.3 Security precedence and inheritance
8.3.4 Calculating authorization
8.3.5 Authorization calculation example
8.4 Setting security across the enterprise
8.4.1 Marking sets
8.4.2 Security policies
8.4.3 Document lifecycle policies
8.4.4 Dynamic security inheritance
8.4.5 Security-partitioned systems
8.5 Gradual security requirement changes
8.5.1 How document and process life cycle affects security
8.5.2 Managing security updates
8.5.3 Updates using business processes
8.5.4 Institutional reorganizations
8.6 Content-level security
8.6.1 Local copies on user machines and client cache files
8.7 Network security
8.7.1 Demilitarized Zones
8.7.2 Encryption on the wire
8.7.3 Web services security
8.8 Auditing
8.8.1 Logging in the Content Engine
8.8.2 Logging in the Process Engine
8.9 A practical example
8.10 Summary
Chapter 9. Infrastructure and scalability
9.1 Overview
9.2 Supporting technologies
9.3 Horizontal versus vertical scalability
9.3.1 Horizontal scaling: Scale out
9.3.2 Vertical scaling: Scale up
9.3.3 Server virtualization
9.3.4 Load balancing
9.4 Scaling the IBM FileNet P8 core engines
9.4.1 Workplace/Workplace XT
9.4.2 Content Engine
9.4.3 Full-text indexing
9.4.4 Process Engine
9.4.5 Summary
9.4.6 Scaling add-on products
9.4.7 IBM FileNet Image Services
9.5 Tuning the IBM FileNet P8 Platform for performance
9.5.1 J2EE Application Server
9.5.2 Database
9.5.3 Application design
9.6 Distributing an IBM FileNet P8 system
9.6.1 Geographically dispersed users
9.6.2 Disaster recovery
9.7 IBM FileNet P8 in a DMZ environment
9.8 Sample deployment
Chapter 10. Architecting an IBM FileNet P8 solution
10.1 Basic approach
10.1.1 Module selection
10.1.2 Leading architectural requirements
10.1.3 Availability requirements
10.1.4 Performance requirements
10.1.5 Number of environments
10.1.6 Total cost of ownership
10.2 Solution overview
10.3 Solution template: Customer services support
10.3.1 Scenario
10.3.2 Business problems and their solutions
10.3.3 Customer architectural constraints
10.3.4 Solution architecture
10.3.5 Solution processes
10.3.6 Future enhancements
10.4 Solution template: Enterprise-wide document management
10.4.1 Scenario
10.4.2 Business problems and their solutions
10.4.3 Customer architectural constraints
10.4.4 Solution architecture
Appendix A. User accounts
Security requirements of user accounts
Related publications
IBM Redbooks
Online resources
Help from IBM
Back cover
Search in book...
Toggle Font Controls
Playlists
Add To
Create new playlist
Name your new playlist
Playlist description (optional)
Cancel
Create playlist
Sign In
Email address
Password
Forgot Password?
Create account
Login
or
Continue with Facebook
Continue with Google
Sign Up
Full Name
Email address
Confirm Email Address
Password
Login
Create account
or
Continue with Facebook
Continue with Google
Next
Next Chapter
Note: Before using this information and the product it supports, read the information in “Notices” on page xi.
Add Highlight
No Comment
..................Content has been hidden....................
You can't read the all page of ebook, please click
here
login for view all page.
Day Mode
Cloud Mode
Night Mode
Reset