IBM InfoSphere Optim installation
and configuration reference
Installation and configuration information for IBM® InfoSphere® Optim™.
Getting Started
This guide describes the programs that are used to install
and configure the Optim solution.
The Setup program guides you through the installation process, and
the Configuration program prepares your databases and workstations
to use the solution.
Installation overview
Installing Optim takes
only a few minutes. The program guides you through the installation
process. You can install Optim using
the installer wizard, console install, or silent install. When installation
completes, use the Configuration program to prepare your workstations
to use Optim.
Signing an Optim Exit
Optim includes a
mechanism that allows you to use a custom exit to apply an additional
layer of security to Optim,
beyond the extensive security already included in the product, to
meet any security requirements mandated by your company or government
regulations. This additional security layer is accomplished through
a client-supplied exit that identifies who can use Optim and the executables that each user can
run.
Configuration window and menus
This chapter describes the main window for the Optim Configuration program and certain general
configuration functions. The principal configuration tasks are described
in the following chapters.
Configure Workstations
Two Configuration tasks are used to configure workstations
to use the Optim solution.
The first, Configure the First Workstation, creates
the Optim Directory and establishes
connectivity to databases through the creation of associated DB Aliases.
If additional workstations are used, the Configure Additional
Workstations task guides you through the process that is
needed to establish them.
Configure the Optim Server
The Server option allows users to define tasks on a workstation
and direct resource-intensive data processing functions to a machine
more suited to the task. When a task requires the movement, processing,
or storage of very large volumes of data, the request can be defined
at the workstation in the normal way, then directed for remote processing
on the machine hosting the Server. If this machine is the machine
on which the database is running, network traffic associated with
the movement of data is eliminated. You can also install the Server
on a machine dedicated to the Server function. In addition, a Server
is required to process from a database residing in a UNIX environment and to support access to archived
data using IBM's Open Data
Manager.
Maintenance and Other Configuration Tasks
After you configure the first and any additional workstations,
you are ready to start using Optim.
However, periodically, it may be necessary to perform other tasks
that are available from the Tasks menu.
Product Options
Each workstation using Optim must
reference a Product Configuration File. The path to the appropriate
Product Configuration File is specified in Personal Options. You must
use the Product Options dialog, however, to create a Product Configuration
File.
Personal Options
You can use Personal Options to customize Optim for use at each workstation. Personal
Options are recorded in the Windows Registry
of the workstation.
Server Credentials
This section provides information about credentials used
with the Optim Server (Server)
feature of Optim. The Server
can be installed and run on a machine using supported versions of Windows, Solaris, HP-UX, AIX®, or Linux; therefore, this appendix addresses credentials
for all supported platforms.
Command Line Maintenance Tasks
Optim provides a
Command Line Interface that allows you to perform certain configuration
tasks, without using the graphical user interface for Optim. You can run the Command Line Interface
from the command line, in a batch file, or from another program.
Optim Security
Optim provides three
types of security. For each Optim Directory,
you may establish any or all of the following types of security: Functional
Security, Object Security, and Archive File Security.
Security reports
Using the report process, you can create a report on the
permissions for functional or object security privileges assigned
to user and group accounts in your network.
Open Data Manager
Open Data Manager (ODM) provides access to data in archive
files for programs that use the Open Database Connectivity (ODBC)
or Java™ Database Connectivity
(JDBC) Application Programming Interfaces (APIs). Optim must be installed before installing ODM;
however, ODM can be installed during the Optim installation process.
Converting PST and Optim Directory Objects
All PST Directories created prior to version 6.0 of the
Princeton Softech products, Archive and the Relational Tools, require
a conversion to be compatible with later versions. Additionally, any Optim Directory created prior to Optim version 6.2 on an SQL Server
database must be converted.
Samples
The installation DVD provides sample data and files to
be used with Optim. Sample
database tables are not generally loaded until configuration but,
when you install Optim, you
can choose to install sample files.
Data Privacy Data Tables
Data privacy data tables are available to clients who have
an Optim Data Privacy License.
These tables allow you to mask company and personal data — such
as employee names, customer names, social security numbers, credit
card numbers, and email addresses — to generate transformed
data that is both unique and valid within the context of the application.
Generally, these data privacy tables are loaded when you configure
the first workstation, but you also can load them independently or
when you configure an additional DB Alias.
Uninstalling
To remove Optim from
a workstation, use the Add/Remove Programs utility in the Windows Control Panel, as follows.
Process Audit
Process Audit is a facility that can be enabled to monitor Optim processes and obtain information
about their execution. When a process is started, Optim collects information such as the type
of request and the user who initiated it. Optim then writes audit records to an XML document
in the Optim Directory audit
table or sends the audit information to a Guardium® system.