Copyright ©
Mindbreeze GmbH, A-4020 Linz, 2024.
All rights reserved. All hardware and software names used are registered trade names and/or registered trademarks of the respective manufacturers.
These documents are highly confidential. No rights to our software or our professional services, or results of our professional services, or other protected rights can be based on the handing over and presentation of these documents.
Distribution, publication or duplication is not permitted.
The term ‘user‘ is used in a gender-neutral sense throughout the document.
Before installing the Documentum Connector ensure that the Mindbreeze Server is already installed and this connector is also included in the Mindbreeze license.
The Documentum Connector allows you to index and search in Documentum repository.
The following requirements must be met before configuring Documentum connector:
Click on the “Indices” tab and then on the “Add new index” symbol to create a new index.
Enter the index path, e.g. “/data/Indices/documentum”. Change the Display Name of the Index Service and the related Filter Service if necessary.
Add a new data source with the symbol “Add new custom source” at the bottom right.
By default, documents deleted in Documentum are automatically removed from the index using Documentum Audit Trail. If the Audit Trail is not available, (e.g. due to missing access rights) there are following options to delete documents in this case:
It is possible to limit the data that should be crawled, for instance some particular document.
To keep the ACLs of indexed documents up to date, the dm_save, dm_destroy, and dm_saveasnew events for the dm_acl object type are audited (see the audit management reference for Documentum). The crawler searches the entries in the dm_audittrail_acl table for these events at each crawl run.
The crawler detects documents which are deleted by tracking events “Audit Trail Event Type (DQL)” in audit trail (dm_audittrail ). If the user provided in “Documentum Connection” section does not have access right to audit trail, another user can be configured here.
If required, the ACLs of the documents can be overwritten statically. To do this, activate the "Advanced Settings". In the section "Authorization Settings" the functionality is activated with "Enable Static Access Rules". "Access Check Principal" determines the name of the authorized or unauthorized principal. The "Access Check Action" determines whether the principal is authorized or not.
Note: If the rules are changed and documents already exist in the index, the option "Synchronize with Index on Startup" must be activated in the "Crawer Performance Settings" so that the changes are applied when the crawler is started.
In the new or existing service, select the Documentum Principal Resolution option in the Service setting. For more information about additional configuration options and how to create a cache and how to do the basic configuration of a cache for a Principal Resolution Service, see Installation & Configuration - Caching Principal Resolution Service.
Superuser Credential | Credential of the superuser that will be used for crawling. Must contain the username and password. These credentials should match the credentials set in the Documentum Connector settings. Unlike the connector, these credentials must be configured as Mindbreeze credentials in the Network tab. |
Repository Name | The name of the Documentum repository to connect to. Must match the credentials set in the Documentum Connector settings. |
DFC Properties File | The path to the “DFS Properties” file. Should match the path specified in the Documentum Connector settings. The file must be located in the config directory of dfc.data.dir. The dfc.data.dir must have write permissions with the user mes. The following properties must be configured (see dfc.properties file on the Documentum server): dfc.data.dir=/documentum dfc.docbroker.host[0]=documentum.mycompany.com dfc.docbroker.port[0]=1489 |
Exclude LDAP groups from Cache (Advanced Setting) | If this option is selected, groups assigned via LDAP will be excluded from this cache. Only use this option if you have configured an LDAP cache as a parent cache. It is necessary that the imported LDAP groups are always synchronised in Documentum. |
Get User Distinguished Ldap Name from Documentum (Advanced Setting) | If this option is enabled, the Principal Resolution Cache will no longer make a separate LDAP request for each user. With this the performance can be improved. This only works for users imported from LDAP. Users who are not from LDAP will find fewer or no documents. Of course, it is necessary that the imported LDAP users are always synchronised in Documentum. |
The following username aliases are used by the Principal Resolution Service to authenticate users:
This means that a Mindbreeze end user must authenticate to Mindbreeze with one of these three usernames to find documents from Documentum.