iMagio® Administrative Tools

Location ConfigurationEntity MonitoringIP LockdownPassword Reset User Security Document UnlockPicklist ManagerReports

Oklahoma

3601 South Broadway, Suite 1400

Edmond, OK 73013

Phone 405.478.8181

Texas

15280 Addison Road, Suite 200

Addison, TX 75001

Phone 972.503.4111

Table of Contents

Recommended System Requirements

Processor

Operating Systems

RAM Requirements

Display

Other

Terminology Used In This Document

Administrative Tools

Getting to the Tools

How to use the Filter Users Feature

Location Configuration

Entity Monitoring

Monitor Batches

Monitor Workflow Packages

IP Lockdown

Create a new Group

Edit the Group Name

Edit the IP’s to Restrict

To Edit a Restricted IP

To Delete a Restricted IP

To Add Users to a Group

To Delete a User from a Group

Password Reset

Password Format Rules

User Security

Using User Security

User Security has the following components:

Manage Administrators

Managing Groups and Users

Group Rights

User Rights

Manage Repository Timeout

Unlock Documents

Picklist Manager

iMagio Reports Manager

Table of Figures

Figure 1: Administrative Tool Options

Figure 2: Filter Users Window

Figure 3: Location Selection Dialog

Figure 4: User Selection Dialog

Figure 5: Repository Selection

Figure 6: Entity Monitoring Page: Monitor Batches

Figure 7: Event Nodes

Figure 8: Entity Monitoring

Figure 9: Selected Batch

Figure 10: Selected Index

Figure 11: Entity Monitoring Page: Monitor Workflow Packages

Figure 12: Selected Package

Figure 13: Selected Package Contents

Figure 14: Add An IP Lockdown Group

Figure 15: Edit Group Name

Figure 16: IP Lockdown Mask

Figure 17: Restricted IP’s

Figure 18: Adding Users to a Group

Figure 18: Password Reset Dialog

Figure 20: User Security Tool

Figure 21: Manage Administrators

Figure 22: Manage Groups & Users

Figure 23: Group Rights

Figure 24: Document Filter

Figure 25: User Rights

Figure 26: Repository Timeout – Repository Selection

Figure 27: Document Unlock – Document List

Figure 28: Document Unlock – No Documents

Figure 29: Picklist Manager – Picklist Selection

Figure 30: iMagio Reports Manager – Report Selection

Figure 31: iMagio Reports Manager – Report Viewer

Figure 32: iMagio Reports Manager – Dashboard Report

Recommended System Requirements

Our recommended system requirements for an end user workstation are as follows:

Processor

Intel Pentium III, 600 MHz or higher

Operating Systems

Microsoft® Windows 2003

Microsoft Windows XP/SP2

RAM Requirements

256 MB or higher recommended

Display

Video: 1024X768 or higher, 256 colors, small fonts

Other

Microsoft Internet Explorer 6.0 or later is required with 128-bit encryption pack

Terminology Used In This Document

In an effort to clarify the functionality of the iMagio® Administrative Tools, please keep the following terms in mind:

  1. Account Administrator: User with rights to manage client accounts to include repositories, users, rights, etc.
  2. Back-End: Refers to the group of functionality that stores and processes documents and packages.
  3. Breadcrumb: Breadcrumbs are progressive/regressive links at the top, bottom or sides of a web page. Breadcrumbs show the hierarchy of screens being navigated. Any active link can be clicked to move to that page.
  4. DDM: Disconnected Database Manager – Manages communications to and from the database and image cache at the remote site.
  5. iMagio® Toolbox: Refers to the desktop GUI and functionality available to the user.
  6. Location: A Location is the PHYSICAL location of an MCP/DDM. A Company can have several Locations. For example, Company A can have Locations in Denver, Boston, and Oklahoma.
  7. MCP: Master Control Program – Synchronizes data and images between the remote location and Critical Technologies data center.
  8. Middle-Tier: Refers to the group of functionality that aids in the processing of images and packages.
  9. Panel: Refers to the display of functionality for each Tab.
  10. Queue: Part of the Workflow application. It keeps packages “in line” for processing according to rules set up in the Workflow application.
  11. Event: Refers to a step in the processing of an iMagio® batch, such as Index, Docmaker, etc.
  12. Tab: Refers to the GUI (Graphical User Interface) tool used by developers to emulate a file tab. These “Tabs” display functionality in the appropriate process flow groupings.
  13. User: Login that allows someone to use the functionality of iMagio Toolbox

Administrative Tools

The iMagio System provides useful tools for managing your system. These tools are reached via the URL: Some iMagio® tools may need to be purchased separately. Please contact your account manager, if you have any questions.

Figure 1: Administrative Tool Options

The main page allows selection of the Administrative Tools:

  1. Location Configuration: Allows an Administrator to modify existing iMagio Toolbox Capture Locations by assigning users and repositories to the location. This tool is accessible by Repository Configuration administrators and is available by default.
  2. Entity Monitoring: Allows an Administrator to monitor batches and packages as they are processed through the iMagio platform. This tool may be purchased separately or as a set and is available to Account administrators.
  3. IP Lockdown: Allows an Administrator to restrict user access to the iMagio system by IP address or range. This tool may be purchased separately or as a set and is available to Account administrators.
  4. Password Reset: Allows an Administrator to change passwords for existing users. This tool may be purchased separately or as a set and is available to Account, Domain or PasswordReset administrators.
  5. User Security: Allows an Account or Domain Administrator to create and manage user and groups and their rights to repositories, searches and documents.
  6. Document Unlock: Allows an Account Administrator to unlock documents in a repository.
  7. Picklist Manager: Allows an Account Administrator to change the contents of a pick list.
  8. iMagio Reports: Allow a Report Administrator to run audit reports.

Getting to the Tools

  1. Enter the page link into the browser:
  2. Click ”Administration” link
  3. Select a tool

Special Instructions

How to use the Filter Users Feature

  1. Click the “Filter Users” link.
  2. The Filter Users window will be displayed over your current screen
  3. Fill out all or part of the first name, last name, login and/or email address of the users you would like displayed.
  4. Click the Filter Users button to apply the filter and return.

Figure 2: Filter Users Window

Location Configuration

Path: Home > Administration > Location Configuration Wizard

The “Location Configuration” tool allows the System Administrator to edit existing iMagio Locations by adding rights for current users and assigning repositories to the location. To modify a location:

  1. Click Location Configuration from the Administrative Tool Options web page
  2. Click Next on the welcome screen to continue
  3. Select an account from the “Select Account” page. If you do not see the desired Account to update, you can click the numbers at the bottom of the page until you see the Account you need. Note: Currently logged-in user must be an account admin of an account for it to show up in the list.

  1. Select the Location to update. Again, if you do not see the Location you wish to update, click the numbers at the bottom of the page until you see the Location to update. Note: All locations under the previously selected account should be displayed (provided that the user is an account admin of the selected account).

Figure 3: Location Selection Dialog

  1. From the Select Users page, click the numbers at the bottom of the page until the User to modify is displayed. Note: Users are listed alphabetically by login. All users in the selected account should be displayed (provided that the user is an account admin of the selected account).

Figure 4: User Selection Dialog

  1. Click the “Assigned” check box next to the User being modified. This assigns this user to the LOCATION selected on the previous screen. Uncheck the box to remove a user’s access to the location.
  2. Select a User Type from the drop down list next to the selected User. There are two User Types:
  3. Standard: This is the typical iMagio user. All users are “Standard” except the MCP user.
  4. McpUser: This user is used to log into the remote database. This is NOT a typical user. You may only set ONE account as the McpUser for a location.
  5. Click Next to “save” the settings
  1. Select the Repository (ies) to assign to the selected location by clicking on the checkbox next to the Repository name(s). Note: All repositories in the selected account should be displayed (provided that the user is an account admin of the selected account). The Min and Max Batch Thresholds are used to set the low and high watermark for batch ids to be reserved and sent to the remote. We recommend a Max Threshold equal to the number of batches generally used over a three day period. This allows Toolbox capture to continue even if internet access is unavailable. Note: you must mark the Assigned checkbox in order to set the Min/Max Batch Threshold.

Figure 5: Repository Selection

  1. Click Finish to close the Location Configuration Manager and return to the Administrative Tools page
Entity Monitoring

Path: Home > Administration > Entity Monitoring

The Entity Monitoring tool allows the System Administrator to monitor all batches and packages in iMagio® and can be accessed from URL To use the Entity Monitoring tool:

  1. Click Entity Monitoring from the Administrative Tools page
  2. Select a type of objects to monitor:
  3. Monitor Batches: Shows information for batches in the iMagio® system
  4. Monitor Workflow Packages: Shows information for the Workflow packages in an iMagio® workflow

Monitor Batches

  1. Select a filter from the drop down menu:
  2. “No Filter” displays all batches regardless of status or date
  3. “Errored Batches” displays ONLY those batches that have error in the iMagio® system
  4. “Date Less Than” displays batches from the date -1 day entered and previous
  5. “Date Greater Than” displays batches from the date +1 entered and after

Figure 6: Entity Monitoring Page:
Monitor Batches

  1. Click the Refresh button
  2. Select iMagio® event from the tree

The tree displays event nodes if there is a batch in the sub category.

Figure 7: Event Nodes

  1. Select the event from the tree to expand for a list of repositories. Each node also displays the number of batches meeting the criteria of the node.
  2. Select the repository to show the batches.

Figure 8: Entity Monitoring

From this view in the Entity Monitoring tool, the System Administrator can monitor the volume of batches moving through the system. This can be helpful from an auditing standpoint or for system planning.

  1. Select a batch to see full batch information.

Figure 9: Selected Batch

This part of the Entity Monitoring tool gives the System Administrator access to the name of the batch in question. This allows the System Administrator to give precise and correct information to Critical Technologies’ Technical Support staff so they can quickly and accurately solve any issues that present themselves.

  1. Select an image index to view the index information.

Figure 10: Selected Index

This allows the System Administrator to access the information pertaining to the index.

Monitor Workflow Packages

  1. Select the “Monitor Workflow Packages” to view the workflow processes.
  2. Select an appropriate filter and click the Refresh button
  3. Select an iMagio® event from the tree to expand for a list of repositories. Each node also displays the number of workflow processes meeting the criteria of the node.
  4. Select the repository to show the workflow process.

Figure 11: Entity Monitoring Page: Monitor Workflow Packages

The tree displays workflow processes nodes, if there is a to be workflow queues in the sub category.

From this view in the Entity Monitoring tool, the System Administrator can monitor the volume of packages in a workflow process and/or the workflow queues. This can be helpful from an auditing standpoint or for system planning.

  1. Select a Package to see full package information.

Figure 12: Selected Package

This part of the Entity Monitoring tool gives the System Administrator access to the name of the package in question.

  1. Select a package’s documents or batches to view more details.

Figure 13: Selected Package Contents

This allows the System Administrator to access the information pertaining to the package contents

Please keep in mind that IP Lockdown will ONLY work for EXTERNAL IP’s

IP Lockdown

Path: Home > Administration > IP Lockdown Groups

IP Lockdown allows the System Administrator to group users by IP ADDRESS and sub-net MASK rather than by security group. For example, if Company A has shifts of call center users, the System Administrator can lock specific nodes of a network to allow use only from certain networks. The IP Lockdown tool can be accessed from URL To use the IP Lockdown tool:

Create a new Group

  1. Click IP Lockdown from the Administrative Tools page
  2. Click the drop down list under “Accounts” and select an Account
  3. Click the drop down list under “Domain” and select a Domain
  4. Enter a name in the text box under “Name”

Figure 14: Add An IP Lockdown Group

  1. Click Add

The new IP Restrictions group has been added.

Edit the Group Name

  1. Click Edit Name next to the Group to change
  2. Change the name of the Group by typing in the text box under the “Name” column

Figure 15: Edit Group Name

  1. Click Update to save the changes or Cancel to cancel the changes

Edit the IP’s to Restrict

From the main IP Lockdown page:

  1. Click Edit Restrictions
  2. Enter the Network ID
  3. Enter the Mask
  4. Click Add to add the IP Restriction

Figure 16: IP Lockdown Mask

The “Mask” in the IP Restrictions is a sub-net mask. IP addresses are actually 32-bit binary numbers (for example, 11000000101010000000000100010100). Each 32-bit IP address consists of two sub-addresses; one identifying the network and the other identifying the host to the network, with an imaginary boundary separating the two.

The location of the boundary between the network and host portions of an IP address is determined through the use of a subnet mask. A subnet mask is another 32-bit binary number, which acts like a filter when it is applied to the 32-bit IP address. By comparing a subnet mask with an IP address, systems can determine which portion of the IP address relates to the network, and which portion relates to the host. Anywhere the subnet mask has a bit set to "1", the underlying bit in the IP address is part of the network address. Anywhere the subnet mask is set to "0", the related bit in the IP address is part of the host address. From

Figure 17: Restricted IP’s

To Edit a Restricted IP

From the main IP Lockdown page:

  1. Click Edit Restrictions
  2. Click Edit next to the Network ID and Mask
  3. Enter the Network ID or Mask change
  4. Click Update to save the changes or Cancel to drop the changes

To Delete a Restricted IP

From the main IP Lockdown page:

  1. Click Edit Restrictions
  2. Click Delete next to the Network ID and Mask

To Add Users to a Group

From the main IP Lockdown page:

  1. Click Edit Users next to the Account and Domain to edit
  2. Click the drop down list of user names
  3. Select a name and click Add

Figure 18: Adding Users to a Group

To Delete a User from a Group

From the main IP Lockdown page:

  1. Click Edit Users next to the Account and Domain to edit
  2. Click the drop down list of user names
  3. Select a name and click Delete
Password Reset

Path: Home > Administration > Password Reset

The Password Reset tool allows an Administrator to reset the password of an existing user.

  1. Click Password Reset from the Administrative Tool Options web page
  2. Click on the “Account” drop down and select the account where the user is located.
  3. Click the “Available Users” drop down and select the user who’s password you want to change.

NOTE: Instructions for using the Filter Users feature are shown below.

  1. Click in the “New Password” field and type in the new password for the user.
  2. Click in the “Confirm Password” field and re-type the password you typed in the “New Password” field.
  3. Click “Save”.

Figure 18: Password Reset Dialog

Password Format Rules

  • The Password cannot be the same as the user’s iMagio Login (for example: the login “johndoe” cannot have a password of “johndoe”).
  • The Password must contain a minimum of 7 characters.
  • The Password cannot have more than 2 like characters in a row (for example: “RRR123” is not a valid password).
  • The Password must contain at least two of the following: upper case, lower case, numboers or special characters.
  • The Password cannot contain spaces (for example: “pop 123” is not valid, while “pop1234” is valid).
User Security

Path: Home > Administration > User Security

The User Security option enables administrators to set different access rights options to accounts, domains, repositories, batches, and documents and to set other users as administrators. This is usually the first option which has to be performed once the user Login ID has been created. The User Security tool can be accessed from URL

Note: Users must be an Account or Domain Administrator to use this tool.

Using User Security