Cisco Cisco Process Orchestrator 3.1 Guía Del Usuario

Descargar
Página de 786
 
10-3
Cisco Process Orchestrator 3.1 User Guide
 
Chapter 10      Performing Administrative Actions
  Managing Properties
  –
HTTPS authentication mechanism—Choose the appropriate authentication for the Web service
Basic—Sends a username and password as the method of authentication. It's the simplest 
method of authentication, but the least Hidden value.
Digest—Sends cryptographic representation of the password rather than the password itself. 
This authentication method is more Hidden value than basic authentication.
Ntlm—Authentication protocol used on networks that include systems running on the Windows 
operating system. This option can be used to return to the normal mode of operation.
  •
Refresh Web Services—Click this button to regenerate the dynamic Web service methods in the 
North Bound Web service. This affects the Web service methods which start processes and retrieve 
process instance output variables.
For example, if you create a new process called My Process. Click the Refresh Web Services button 
to regenerate the NBWS so that the Process service has a new StartMyProcess() call.
Step 4
Click the Execution Limits tab to set the limits for the server. 
Each limit has two settings. One that will warn and generate a warning event log in the Cisco Process 
Orchestrator system audit and the other will generate an error entry in the system audit. If the error level 
is reached the process will halt.
  •
Warning Level—Set the limit before sending a warning. If this is reached, a warning message is 
returned.
  •
Error Level—Set the limit before sending an error. If this is reached, a error message is returned.
  •
Activity Instances in Process Instance—Set the number of activity instances within a process 
instance.
  •
String Variable Size—Set the size limit for the string variable
  •
Event Instance Size—Set the size limit for the event instance
Step 5
Click the Encryption tab to view a Uuencoded public key that can be used for external encryption of 
Hidden value strings. 
  •
External encryption public key (uuencoded)—Contains the default key or the imported key.
  •
Import—Imports a public/private key pair file into the Process Orchestrator. You must have 
“Update” permission over the “Environment Settings” object in order to import new public/private 
key pair. When you click this button, a standard File Open dialog box displays, allowing you to point 
the console to an existing file. PFX file format is supported. It supports password protection on the 
file. Therefore, when importing a PFX file, a dialog box displays requesting the password of the file.
  •
Reset to default key—Click to reset the current key to the default key.
Step 6
Click the History tab to view the history of changes made to an object.
  •
Created by—The user name of the person who created the object
  •
Created time—The date and time the object was created
  •
Time—The date and time the action occurred
  •
Change Type—The action that occurred
  •
User—The user name of the person that performed the action
  •
Orchestration Server—The name of the Orchestration server associated with the object
Step 7
Click OK.