top-image

Archives for DFC DCTM

Documentum : Deleting of audit trail entries dm_audittrail
Hi, After the post on creation of audittrail (http://www.javablog.fr/documentum-creation-of-audit-trail-entries-dm_audittrail.html), I would like to present the purge of audittrail because "DELL ECM/OpenTxt" advises to purge/archive the audittrail data in order to improve the system's performances.   So, several solutions are possibles: archiving the audittrail in external database, then, deleting these events in audittrail via custom jobs, deleting the useless audittrail of technical events (custom indexation,...) ...more»
Documentum : Principal-Mode Authentication : Use of IDfPrincipalSupport
Hi, After the post concerning the Documentum : Ticketed Authentication, Generation Of DM_TICKET, I would expose in this post the principal-mode authentication via the use of IDfPrincipalSupport interface. The DFC javadoc describes this interface: An interface supported by classes that can establish sessions using principal-mode authentication. Principal-mode authentication is a form of authentication in which the caller has already established the ...more»
Documentum : DFC : Standalone Sample Program : All Basic Functionalities of Documentum
Hi, Here, a very useful class exposing a lot of functionalities of Documentum (found on the Internet https://worldofchaitu.wordpress.com/2012/11/08/documentum-dfc-standalone-sample-program/): To get a list of available docbase To create a cabinet (dm_cabinet) in docbase To create a folder (dm_folder object) in docbase To create a document (dm_document object) in docbase To check out a document from docbase using IDfOperations To check in a document to docbase using IDfOperations ...more»
Documentum : ACL template, Permission Set Template with Alias Set (PART 2 : practice)
Hello, After my first post concerning the theoretic aspects of Permission Set Template (ACL Template/PST) coupled with Alias Set (AS) Documentum : ACL template, Permission Set Template with Alias Set (PART 1 : theory), in this post, I would like to illustrate this theory, via a simple use of AS and PST in security of "documents archiving". The documents archived will ...more»
Page 1 of 3:1 2 3 »
bottom-img
Copyright ® 2012 Huseyin Ozveren. No reproduction, even partial, can be used from this site and all its contents including text, documents, images, etc.. without the express permission of the author.