Skip to main content

Configuring Empower


Configuring Empower

Overview

The Empower Server applications and services are highly configurable to meet your specific requirements. Many of the options are controlled through an XML file (web.config) that resides in the virtual directory of your server installation (e.g.: C:\Program Files\Empower Software\Empower). Other settings are specified within the applications such as the Empower Administrator and Empower Desktop (User Preferences).

These settings should only be modified by (or with the help of) a qualified Arena Empower Application Engineer.

Database Connections

For the Empower Server applications and services to communicate with the correct database, you must then modify the web.config file to identify the Empower metadata, documents, and Toolkit databases. The Server applications and services use 3 connection strings:

  • EmpowerDatabase
    • connection string (http://www.connectionstrings.com) to the Empower metadata database
  • EmpowerDocumentsDatabase
    • connection string to the Empower documents database
  • EmpowerToolkitDatabase
    • connection string to the Empower Toolkit database

Note: Empower can be configured to use a single database or multiple databases, however 3 connection strings are always required even in the event of a single database.

To modify the connection strings/database pointers, go to the Server Home Page and click on *Configuration Server.

This page requires a password that can be obtained from your qualified Empower Application Engineer

Once a valid password has been provided, you will be able to modify/configure various server settings

To modify the database connection strings, select the Database Settings page.

On this page you will be able to define the settings for each connection.

For each connection you will be able to define:

TypeSelect the database type
Server/InstanceServer name (or IP Address) as well as an "instance" reference (if necessary)
Database NameSpecify the name of the database
AuthenticationUse the default user or specify your own user

Mail Services

The Empower applications can be configured to send automatic and interactive email to users. All email settings are defined in the Empower Administrator. To set the email settings, launch the Empower Administrator from the Empower Server Home Page.

From the Empower Administrator navigation tree, select the Server/Settings page under the Email Alerts/Options section.

All email settings are assigned in the Mail Settings section. You can define/modify the following settings:

SettingDescription
SMTP Server Name/AddressSpecifies the Mail Server name or IP Address
SMTP PortSpecifies the outgoing TCP Port for mail traffic (usually 25 or 465 [SSL])
Authorization ModeSelect the authorization mode the applications should use to authenticate and send mail through the mail server. Options include:
  • Ignore Credentials
    • Only use when mail server does not require authentication for sending mail via SMTP
  • Use Network Credentials
    • Uses the currently logged user for authentication
  • Use Specified Credentials
    • Uses the specified "Authorized" settings to define the user, password, and domain for authentication
Authorized User NameWhen the Use Specified Credentials option is selected, this setting defines the username to use for authentication
Authorized PasswordWhen the Use Specified Credentials option is selected, this setting defines the password to use for authentication
DomainWhen the Use Specified Credentials option is selected, this setting defines the domain to use for authentication
SMTP From AddressSpecifies the email address that the messages are to be sent from
SMTP From (Friendly) NameSpecifies the user name that will appear as the "From" field in the user's mailbox
Use Secure Sockets Layer (SSL)When checked, email will use Secure Sockets Layer (SSL) to send mail.

Once all necessary settings have been defined, you can test the mail services by clicking the Test Settings link.

You can save the settings by clicking the Save toolbar button.

Document Vaulting

When vaulting documents, Empower can be configured to store the documents in the following locations:

LocationDescription
Documents DatabaseEntire document is stored in a database, no physical file is present/available. When a user requests a document, the Empower services create the physical file from the database and transmit it to the user.
File/Folders-basedEach vaulted document is stored as a physical file in a protected area of the server. Physical files are renamed with unique identifiers that are known to the databases and services. When a user requests a document, the Empower services rename the stored file to the original file name and then transmit it to user.

There are benefits and drawbacks to each method. You should consult a qualified Arena Empower Application Engineer to determine the best setup for your environment.

In addition to the physical location of files, Empower's vaulted document services provide the following additional options for document storage:

OptionDescription
Single Server, Single Document DatabaseThe default architecture of the vaulted document services and database is to have a single server that manages a single document database. In this scenario, all vaulted documents are stored in a single document database.
Single Server, Multiple Document DatabasesIn this scenario, 2 or more document databases can be created on the Empower Server and the services can be modified to determine the best location for storing the file content. Advantages to this configuration include smaller database files, more intuitive document locations, and improved upload/extract performance.
Multiple Servers – Replicated DocumentUsing this configuration, the web services will write document content to 2 or more servers when documents are checked-in/uploaded. Advantages to this configuration include automatic document backups and improved extraction/viewing for various client locations. This configuration is common for customers with multiple, remote, locations/sites where network performance is a concern.
Multiple Servers – Split Document StorageSimilar to the previous configuration, the web services can determine the location to store the contents of a particular file. The additional benefits of using this configuration include smaller and more intuitive document databases.
Hybrid – Vaulting/File Based StorageThe vaulted document services can store document contents in either the document database or maintain the file as a physical file on the server. The services also allow employing a "hybrid" approach where some files are stored in the database and others stored as physical files on the server. The benefits of this configuration include smaller documents databases, access to files without going through Empower, and ability to leverage other file storage systems.

You can configure the system to manage the files in multiple locations. Locations can be configured in the Empower Administrator.

You should contact your Empower Application Engineer for more information on setting folder/file locations.

Security/Folders

.NET application security configuration and IIS security configuration are completely independent and can be used independently or in conjunction with each other.

IIS maintains security related configuration settings in the IIS database. However, .NET maintains security (and other) configuration settings in XML configuration files (web.config).

The following figure illustrates the relationship between IIS and .NET.

.NET implements authentication using authentication providers, which are code modules that verify credentials and implement other security functionality such as cookie generation. .NET supports the following three authentication providers:

  • Forms Authentication
    • Using this provider causes unauthenticated requests to be redirected to a specified HTML form using client side redirection. The user can then supply logon credentials, and post the form back to the server. If the application authenticates the request (using application-specific logic), .NET issues a cookie that contains the credentials or a key for reacquiring the client identity.
  • Passport Authentication
    • This is a centralized authentication service provided by Microsoft that offers a single logon facility and membership services for participating sites.
  • Windows Authentication
    • This provider utilizes the authentication capabilities of IIS. After IIS completes its authentication, .NET uses the authenticated identity's token to authorize access.
<!-- web.config file -->
<authentication mode = "[Windows/Forms/Passport/None]">
</authentication>

Authentication Using Windows

For accounts Using Windows Authentication mode, you can use accounts maintained by a Windows domain controller or Active Directory. When authentication happens using this method, .NET constructs and attaches a Windows Principal object to the application context based on the authenticated user. As a result, the .NET thread can run as the authenticated user and can obtain the user's group membership.

Impersonation and Delegation

With impersonation, .NET applications can optionally execute with the identity of the client on whose behalf they're operating. Impersonation is usually performed for resource access control.

If impersonation is enabled, .NET will receive the token to impersonate from IIS. This is controlled by specifying a value in the application's Web.config file.

<identity impersonate="true"/>

To identify a specific account, use the name and password attributes:

<identity impersonate="true" userName="domain\user" password="passwd"/>

Many operations performed with Empower will interact with the physical file folders/directories of the web server. For example:

OperationDescription/System Interaction
User checks-in/adds a documentThe user specifies a local or shared document that they wish to "upload"/assign to an object. The web server accepts the local file and uploads it to a location accessible to the IIS server. The services then determine if the file is to be moved to a vaulted document area or loaded into the documents database.
User checks-out/views a documentThe service determines the location of the physical file (folder or database) and copies or creates the file to a location accessible to the IIS server. The service then transmits the file (through the browser) from the accessible location.
User imports a BOMThe user specifies a local or shared document that they wish to "upload"/assign to be read and assigned as BOM items. The web server accepts the local file and uploads it to a location accessible to the IIS server. The services then read the local file for its contents as BOM child items.

There are many scenarios like this in which the system needs to access and create files on the Web Server. The system will use the system security settings as assigned to the .NET user (as described above).

Thus, for the system to operate correctly, the .NET user must have access to the files\folders for these operations. Most of the locations are configurable in the web.config file. By default, you should provide read/write access for the .NET user to the following locations:

LocationDefault FolderDescription
StorageAreaC:\Program Files (x86)\Empower Software\Empower\StorageAreaDefault location for File/Folders-based vaulted files.
TempUploadC:\Program Files (x86)\Empower Software\Empower\TempUploadDefault/temporary area that the system uses when a user uploads a file for vaulting, import, etc.
VaultViewC:\Program Files (x86)\Empower Software\Empower\VaultViewDefault/temporary area that the vaulting services use to create/copy vaulted files that a user would like to view/check-out.

Login Methods

Empower administrators can define various login methods such as:

  • Empower
    • Use the traditional Empower database user name and password as defined in the Empower Administrator
  • LDAP
    • Lightweight Directory Access Protocol, looks up users and validates passwords as defined in LDAP by a network administrator (i.e. your network username and password)
  • Salesforce
    • Uses your Salesforce username and password. The system will use the OAuth REST services available.

When more than one method is enabled, the system will provide a "Method" list on the login page.

Refer to the Administrator User's Guide for more information on setting up authentication methods.