iMagio® Administrative Tools
Location ConfigurationEntity MonitoringIP LockdownPassword Reset User Security Document UnlockPicklist ManagerReports
Oklahoma
3601 South Broadway, Suite 1400
Edmond, OK 73013
Phone 405.478.8181
Texas
15280 Addison Road, Suite 200
Addison, TX 75001
Phone 972.503.4111
Table of Contents
Recommended System Requirements
Processor
Operating Systems
RAM Requirements
Display
Other
Terminology Used In This Document
Administrative Tools
Getting to the Tools
How to use the Filter Users Feature
Location Configuration
Entity Monitoring
Monitor Batches
Monitor Workflow Packages
IP Lockdown
Create a new Group
Edit the Group Name
Edit the IP’s to Restrict
To Edit a Restricted IP
To Delete a Restricted IP
To Add Users to a Group
To Delete a User from a Group
Password Reset
Password Format Rules
User Security
Using User Security
User Security has the following components:
Manage Administrators
Managing Groups and Users
Group Rights
User Rights
Manage Repository Timeout
Unlock Documents
Picklist Manager
iMagio Reports Manager
Table of Figures
Figure 1: Administrative Tool Options
Figure 2: Filter Users Window
Figure 3: Location Selection Dialog
Figure 4: User Selection Dialog
Figure 5: Repository Selection
Figure 6: Entity Monitoring Page: Monitor Batches
Figure 7: Event Nodes
Figure 8: Entity Monitoring
Figure 9: Selected Batch
Figure 10: Selected Index
Figure 11: Entity Monitoring Page: Monitor Workflow Packages
Figure 12: Selected Package
Figure 13: Selected Package Contents
Figure 14: Add An IP Lockdown Group
Figure 15: Edit Group Name
Figure 16: IP Lockdown Mask
Figure 17: Restricted IP’s
Figure 18: Adding Users to a Group
Figure 18: Password Reset Dialog
Figure 20: User Security Tool
Figure 21: Manage Administrators
Figure 22: Manage Groups & Users
Figure 23: Group Rights
Figure 24: Document Filter
Figure 25: User Rights
Figure 26: Repository Timeout – Repository Selection
Figure 27: Document Unlock – Document List
Figure 28: Document Unlock – No Documents
Figure 29: Picklist Manager – Picklist Selection
Figure 30: iMagio Reports Manager – Report Selection
Figure 31: iMagio Reports Manager – Report Viewer
Figure 32: iMagio Reports Manager – Dashboard Report
Recommended System Requirements
Our recommended system requirements for an end user workstation are as follows:
Processor
Intel Pentium III, 600 MHz or higher
Operating Systems
Microsoft® Windows 2003
Microsoft Windows XP/SP2
RAM Requirements
256 MB or higher recommended
Display
Video: 1024X768 or higher, 256 colors, small fonts
Other
Microsoft Internet Explorer 6.0 or later is required with 128-bit encryption pack
Terminology Used In This Document
In an effort to clarify the functionality of the iMagio® Administrative Tools, please keep the following terms in mind:
- Account Administrator: User with rights to manage client accounts to include repositories, users, rights, etc.
- Back-End: Refers to the group of functionality that stores and processes documents and packages.
- Breadcrumb: Breadcrumbs are progressive/regressive links at the top, bottom or sides of a web page. Breadcrumbs show the hierarchy of screens being navigated. Any active link can be clicked to move to that page.
- DDM: Disconnected Database Manager – Manages communications to and from the database and image cache at the remote site.
- iMagio® Toolbox: Refers to the desktop GUI and functionality available to the user.
- Location: A Location is the PHYSICAL location of an MCP/DDM. A Company can have several Locations. For example, Company A can have Locations in Denver, Boston, and Oklahoma.
- MCP: Master Control Program – Synchronizes data and images between the remote location and Critical Technologies data center.
- Middle-Tier: Refers to the group of functionality that aids in the processing of images and packages.
- Panel: Refers to the display of functionality for each Tab.
- Queue: Part of the Workflow application. It keeps packages “in line” for processing according to rules set up in the Workflow application.
- Event: Refers to a step in the processing of an iMagio® batch, such as Index, Docmaker, etc.
- Tab: Refers to the GUI (Graphical User Interface) tool used by developers to emulate a file tab. These “Tabs” display functionality in the appropriate process flow groupings.
- User: Login that allows someone to use the functionality of iMagio Toolbox
Administrative Tools
The iMagio System provides useful tools for managing your system. These tools are reached via the URL: Some iMagio® tools may need to be purchased separately. Please contact your account manager, if you have any questions.
Figure 1: Administrative Tool Options
The main page allows selection of the Administrative Tools:
- Location Configuration: Allows an Administrator to modify existing iMagio Toolbox Capture Locations by assigning users and repositories to the location. This tool is accessible by Repository Configuration administrators and is available by default.
- Entity Monitoring: Allows an Administrator to monitor batches and packages as they are processed through the iMagio platform. This tool may be purchased separately or as a set and is available to Account administrators.
- IP Lockdown: Allows an Administrator to restrict user access to the iMagio system by IP address or range. This tool may be purchased separately or as a set and is available to Account administrators.
- Password Reset: Allows an Administrator to change passwords for existing users. This tool may be purchased separately or as a set and is available to Account, Domain or PasswordReset administrators.
- User Security: Allows an Account or Domain Administrator to create and manage user and groups and their rights to repositories, searches and documents.
- Document Unlock: Allows an Account Administrator to unlock documents in a repository.
- Picklist Manager: Allows an Account Administrator to change the contents of a pick list.
- iMagio Reports: Allow a Report Administrator to run audit reports.
Getting to the Tools
- Enter the page link into the browser:
- Click ”Administration” link
- Select a tool
Special Instructions
How to use the Filter Users Feature
- Click the “Filter Users” link.
- The Filter Users window will be displayed over your current screen
- Fill out all or part of the first name, last name, login and/or email address of the users you would like displayed.
- Click the Filter Users button to apply the filter and return.
Figure 2: Filter Users Window
Location Configuration
Path: Home > Administration > Location Configuration Wizard
The “Location Configuration” tool allows the System Administrator to edit existing iMagio Locations by adding rights for current users and assigning repositories to the location. To modify a location:
- Click Location Configuration from the Administrative Tool Options web page
- Click Next on the welcome screen to continue
- Select an account from the “Select Account” page. If you do not see the desired Account to update, you can click the numbers at the bottom of the page until you see the Account you need. Note: Currently logged-in user must be an account admin of an account for it to show up in the list.
- Select the Location to update. Again, if you do not see the Location you wish to update, click the numbers at the bottom of the page until you see the Location to update. Note: All locations under the previously selected account should be displayed (provided that the user is an account admin of the selected account).
Figure 3: Location Selection Dialog
- From the Select Users page, click the numbers at the bottom of the page until the User to modify is displayed. Note: Users are listed alphabetically by login. All users in the selected account should be displayed (provided that the user is an account admin of the selected account).
Figure 4: User Selection Dialog
- Click the “Assigned” check box next to the User being modified. This assigns this user to the LOCATION selected on the previous screen. Uncheck the box to remove a user’s access to the location.
- Select a User Type from the drop down list next to the selected User. There are two User Types:
- Standard: This is the typical iMagio user. All users are “Standard” except the MCP user.
- McpUser: This user is used to log into the remote database. This is NOT a typical user. You may only set ONE account as the McpUser for a location.
- Click Next to “save” the settings
- Select the Repository (ies) to assign to the selected location by clicking on the checkbox next to the Repository name(s). Note: All repositories in the selected account should be displayed (provided that the user is an account admin of the selected account). The Min and Max Batch Thresholds are used to set the low and high watermark for batch ids to be reserved and sent to the remote. We recommend a Max Threshold equal to the number of batches generally used over a three day period. This allows Toolbox capture to continue even if internet access is unavailable. Note: you must mark the Assigned checkbox in order to set the Min/Max Batch Threshold.
Figure 5: Repository Selection
- Click Finish to close the Location Configuration Manager and return to the Administrative Tools page
Entity Monitoring
Path: Home > Administration > Entity Monitoring
The Entity Monitoring tool allows the System Administrator to monitor all batches and packages in iMagio® and can be accessed from URL To use the Entity Monitoring tool:
- Click Entity Monitoring from the Administrative Tools page
- Select a type of objects to monitor:
- Monitor Batches: Shows information for batches in the iMagio® system
- Monitor Workflow Packages: Shows information for the Workflow packages in an iMagio® workflow
Monitor Batches
- Select a filter from the drop down menu:
- “No Filter” displays all batches regardless of status or date
- “Errored Batches” displays ONLY those batches that have error in the iMagio® system
- “Date Less Than” displays batches from the date -1 day entered and previous
- “Date Greater Than” displays batches from the date +1 entered and after
Figure 6: Entity Monitoring Page:
Monitor Batches
- Click the Refresh button
- Select iMagio® event from the tree
The tree displays event nodes if there is a batch in the sub category.
Figure 7: Event Nodes
- Select the event from the tree to expand for a list of repositories. Each node also displays the number of batches meeting the criteria of the node.
- Select the repository to show the batches.
Figure 8: Entity Monitoring
From this view in the Entity Monitoring tool, the System Administrator can monitor the volume of batches moving through the system. This can be helpful from an auditing standpoint or for system planning.
- Select a batch to see full batch information.
Figure 9: Selected Batch
This part of the Entity Monitoring tool gives the System Administrator access to the name of the batch in question. This allows the System Administrator to give precise and correct information to Critical Technologies’ Technical Support staff so they can quickly and accurately solve any issues that present themselves.
- Select an image index to view the index information.
Figure 10: Selected Index
This allows the System Administrator to access the information pertaining to the index.
Monitor Workflow Packages
- Select the “Monitor Workflow Packages” to view the workflow processes.
- Select an appropriate filter and click the Refresh button
- Select an iMagio® event from the tree to expand for a list of repositories. Each node also displays the number of workflow processes meeting the criteria of the node.
- Select the repository to show the workflow process.
Figure 11: Entity Monitoring Page: Monitor Workflow Packages
The tree displays workflow processes nodes, if there is a to be workflow queues in the sub category.
From this view in the Entity Monitoring tool, the System Administrator can monitor the volume of packages in a workflow process and/or the workflow queues. This can be helpful from an auditing standpoint or for system planning.
- Select a Package to see full package information.
Figure 12: Selected Package
This part of the Entity Monitoring tool gives the System Administrator access to the name of the package in question.
- Select a package’s documents or batches to view more details.
Figure 13: Selected Package Contents
This allows the System Administrator to access the information pertaining to the package contents
Please keep in mind that IP Lockdown will ONLY work for EXTERNAL IP’s
IP Lockdown
Path: Home > Administration > IP Lockdown Groups
IP Lockdown allows the System Administrator to group users by IP ADDRESS and sub-net MASK rather than by security group. For example, if Company A has shifts of call center users, the System Administrator can lock specific nodes of a network to allow use only from certain networks. The IP Lockdown tool can be accessed from URL To use the IP Lockdown tool:
Create a new Group
- Click IP Lockdown from the Administrative Tools page
- Click the drop down list under “Accounts” and select an Account
- Click the drop down list under “Domain” and select a Domain
- Enter a name in the text box under “Name”
Figure 14: Add An IP Lockdown Group
- Click Add
The new IP Restrictions group has been added.
Edit the Group Name
- Click Edit Name next to the Group to change
- Change the name of the Group by typing in the text box under the “Name” column
Figure 15: Edit Group Name
- Click Update to save the changes or Cancel to cancel the changes
Edit the IP’s to Restrict
From the main IP Lockdown page:
- Click Edit Restrictions
- Enter the Network ID
- Enter the Mask
- Click Add to add the IP Restriction
Figure 16: IP Lockdown Mask
The “Mask” in the IP Restrictions is a sub-net mask. IP addresses are actually 32-bit binary numbers (for example, 11000000101010000000000100010100). Each 32-bit IP address consists of two sub-addresses; one identifying the network and the other identifying the host to the network, with an imaginary boundary separating the two.
The location of the boundary between the network and host portions of an IP address is determined through the use of a subnet mask. A subnet mask is another 32-bit binary number, which acts like a filter when it is applied to the 32-bit IP address. By comparing a subnet mask with an IP address, systems can determine which portion of the IP address relates to the network, and which portion relates to the host. Anywhere the subnet mask has a bit set to "1", the underlying bit in the IP address is part of the network address. Anywhere the subnet mask is set to "0", the related bit in the IP address is part of the host address. From
Figure 17: Restricted IP’s
To Edit a Restricted IP
From the main IP Lockdown page:
- Click Edit Restrictions
- Click Edit next to the Network ID and Mask
- Enter the Network ID or Mask change
- Click Update to save the changes or Cancel to drop the changes
To Delete a Restricted IP
From the main IP Lockdown page:
- Click Edit Restrictions
- Click Delete next to the Network ID and Mask
To Add Users to a Group
From the main IP Lockdown page:
- Click Edit Users next to the Account and Domain to edit
- Click the drop down list of user names
- Select a name and click Add
Figure 18: Adding Users to a Group
To Delete a User from a Group
From the main IP Lockdown page:
- Click Edit Users next to the Account and Domain to edit
- Click the drop down list of user names
- Select a name and click Delete
Password Reset
Path: Home > Administration > Password Reset
The Password Reset tool allows an Administrator to reset the password of an existing user.
- Click Password Reset from the Administrative Tool Options web page
- Click on the “Account” drop down and select the account where the user is located.
- Click the “Available Users” drop down and select the user who’s password you want to change.
NOTE: Instructions for using the Filter Users feature are shown below.
- Click in the “New Password” field and type in the new password for the user.
- Click in the “Confirm Password” field and re-type the password you typed in the “New Password” field.
- Click “Save”.
Figure 18: Password Reset Dialog
Password Format Rules
- The Password cannot be the same as the user’s iMagio Login (for example: the login “johndoe” cannot have a password of “johndoe”).
- The Password must contain a minimum of 7 characters.
- The Password cannot have more than 2 like characters in a row (for example: “RRR123” is not a valid password).
- The Password must contain at least two of the following: upper case, lower case, numboers or special characters.
- The Password cannot contain spaces (for example: “pop 123” is not valid, while “pop1234” is valid).
User Security
Path: Home > Administration > User Security
The User Security option enables administrators to set different access rights options to accounts, domains, repositories, batches, and documents and to set other users as administrators. This is usually the first option which has to be performed once the user Login ID has been created. The User Security tool can be accessed from URL
Note: Users must be an Account or Domain Administrator to use this tool.