Working with sources

Sources

From the EOM Console, you can define, modify, and remove sources and source groups. Sources are used to receive data into Barr EOM. Sources can be organized into source groups, which allow for easier monitoring from the EOM Console.

See also:


Managing source groups

Source groups are used to organize sources in the Sources tree. Groups are represented as folders in the tree. From the EOM Console Sources tree, you can create, move, rename, and delete source groups.

To create a source group

  1. From the Sources tree, right-click a source group (folder) and select New Group. A new group (folder) titled UnNamed is added to the selected source group.

  2. In the edit field, type the name of the new group and press ENTER.

To move a source group

  1. From the Sources tree, select the source group you want to move.

  2. Use drag and drop functionality to place the group in the desired tree location. As you drag the item a yellow arrow will appear to the left of the tree to indicate where the group will be placed.

To rename a source group

  1. From the Sources tree, right-click a source group select Rename.

  2. In the edit field, type the new group name and press ENTER. To cancel the rename, press ESC.

To delete a source group

  1. From the Sources tree, right-click the source you want to delete.

  2. Select Delete from the menu. Groups that contain sources or source groups cannot be deleted. All of the objects must be removed before the group can be deleted.

Adding sources

Complete the following steps to add sources to the Sources application.

  1. From the Sources tree, select the source group (folder) where you want to add sources. Right-click and select New Source. The Add Source dialog box displays.

  2. In the Type list, select the type of source you want to create. You can select Email, EOM, FTP, LPD, Network Folder, Socket, Web Upload, WebSphere MQ, and Windows queue.

  3. Next to Add new devices enter the number of sources you want to create. You can create multiple sources of the type selected and configure the sources simultaneously.

  4. Click OK. Tab pages will display with options specific to the selected source type. The configuration options are shown differently depending if you chose to create a single source or multiple sources. When configuring one source, individual options are listed on the tab pages. When configuring multiple sources, the options are listed in grid format to allow for configuring multiple sources simultaneously.

  5. Make the necessary changes on each tab. For instructions specific to each source type, review the following topics:

  1. Receiving documents from an email address

  2. Receiving documents from another Barr EOM

  3. Receiving documents from an FTP connection

  4. Receiving documents from an LPD connection

  5. Receiving documents from a network folder

  6. Receiving documents from a socket connection

  7. Receiving documents from a Web Upload source

  8. Receiving messages from WebSphere MQ

  9. Receiving documents from a Windows queue

  1. Click OK.

Modifying sources

Complete the following steps to modify sources in the Sources application.

  1. From the Sources tree, right-click the source you want to modify and select Configure. You can also right-click a source in the grid view and select Configure.

  2. From the Configuration dialog box, make the necessary changes. The configuration options available vary based on the type of source selected.

  3. Click OK.

Removing sources

Complete the following steps to remove sources from the Sources application.

  1. From the Sources tree, right-click the source you want to delete.

  2. Select Delete from the menu.

Importing sources

Use the following procedure to import a list of sources into Barr EOM. This is particularly useful if you have a database, spreadsheet, etc. that lists your existing equipment. You can save that document as a .csv file and then import it to create matching sources in Barr EOM.

Before you begin, review the following information on configuring/importing .csv files:

Complete the following steps to import sources from a .csv file.

  1. From the Sources tree, right-click a source group (folder) and select New Source. The new sources will be created in this group.

  2. From the Add Source dialog box, select the source Type. The available source types are Email, EOM, FTP, LPD, Network Folder, Socket, Web Upload, WebSphere MQ, and Windows queue.

  3. Select Import devices from configuration (.CSV) file.

  4. In the box, enter the path and file name of the configuration file or click the Browse (...) button to navigate to the file.

  5. When the configuration file is selected, click OK. Tab pages will display with options specific to the selected source type.

  6. Make the necessary changes on each tab. For instructions specific to each source type, review the following topics:

  7. Receiving documents from an email address

  8. Receiving documents from another Barr EOM

  9. Receiving documents from an FTP connection

  10. Receiving documents from an LPD connection

  11. Receiving documents from a network folder

  12. Receiving documents from a socket connection

  13. Receiving messages from WebSphere MQ

  14. Receiving documents from a Windows queue

Searching for sources

You can search for sources from the Sources tree and Sources grid.

From the Sources tree:

In the Search box below the tree, type the text you want to find and press ENTER or click the search button. If the text is found, your focus will be moved to the first occurrence. New buttons will appear near the Search box that allow you to move to the previous occurrence and move to the next occurrence.

From the Sources grid:

In the search box below the grid, type the text you want to find, click the column in the grid you want to search, and press ENTER or click the Search image. If the text is found, your focus will be moved to the first occurrence. New buttons will appear near the Search box that allow you to stop searching, move to the previous occurrence, and move to the next occurrence.

Configuring security for sources

EOM security for the Sources application begins at the root of the Sources tree, the All Sources group. The Sources tree consists of sources and source groups. A source is an input into Barr EOM. A source group is a way to organize sources. EOM security is provided for both by adding a Microsoft Windows user or user group to the source or source group and assigning permissions to that user or user group. These EOM permissions define the type of access users and user groups have to the sources and source groups. Once the EOM security (Microsoft Windows users, user groups, and source permissions) is set in a source group, the EOM security is inherited by all the objects in that source group. When a new source or source group is created, its security is automatically the same as its parent source group’s security (that is, the new source inherits its security from its parent source group).

To begin configuring source security, start by assigning the desired source permissions for the All Sources group. To view sources in the tree, users or user groups must be assigned the Allow user to view the Source permission in the All Sources group. Users not assigned this permission in the All Sources group will not see any sources or groups even though they may have been given permissions for the specific source or group.

Complete the following steps to assign permissions for the selected source.

  1. From the EOM Console, select the Sources application in the navigation pane.

  2. In the Sources tree, right-click a source or source group and select Security. The Security Configuration dialog box displays. To access this dialog box, you must be a member of the local Administrators group or be assigned the Allow user to modify the Source’s security configuration permission. Users with these rights can add and remove users or groups and modify the assigned permissions.

    Security Configuration dialog box

  3. Use the Inherit permissions from the parent option to determine if you want to inherit permissions from a parent group or remove inheritance. By default, sources are configured to inherit permissions from the parent folder. Click the Browse button to select a new parent group for inheritance or to remove inheritance.

It is good practice to assign rights using inheritance, as it allows administrators to easily assign and manage permissions. Blocking inheritance is useful when a source or source group needs to be seen by just a few users. If you plan to block inheritance, make sure the users that need access to the blocked source or group are in the security settings for all of its parent groups, including All Sources. If this is not done then those users will not be able to see the source. Also remember to remove the users and user groups that should not have access to the source or group.

  1. From the Users and groups with permissions list box, select the appropriate user or group in the list. The Assigned permissions list box will display the assigned permissions for the selected user.

If you want to set permissions for a user or group that does not appear in the list, click Add. From the User and Group Selection dialog box, select the users/groups you want to add and click OK. If the user/group is not listed, click More Users to locate the user. From the list you can choose to add EOM users, LDAP users, or Windows users. You can also choose to import LDAP users. See the Adding users and groups to Barr EOM topic for detailed procedures on adding users. Once users are added, they are placed in the EOM database, causing them to always be listed in the future.

User and Group Selection dialog box

  1. From the Assigned permissions box, select or clear the permissions for the selected user/group. Click Select All or Unselect All to easily assign or remove all permissions. The permissions assigned to a source group will be inherited for all of the objects contained in that group, except for the ones that have inheritance blocked.

If you notice permissions that are selected and disabled, then the user/group selected has inherited permissions. Inherited permissions cannot be removed. To remove inherited permissions, you must first block inheritance for the source.

  1. Once all of your permission changes are complete, click OK.