Job Management Partner 1/Software Distribution Setup Guide
![[Contents]](FIGURE/CONTENT.GIF)
![[Glossary]](FIGURE/GLOSS.GIF)
![[Index]](FIGURE/INDEX.GIF)
![[Back]](FIGURE/FRONT.GIF)
JP1/SD database login ID specifies the login ID to be used to connect to the managing server database.
Specify the password in the Set Password dialog box.
Specification of this item is mandatory.
The value set here is applied to Connection user ID in the Create Data Source/Net Service dialog box.
Connection service for JP1/SD database specifies the service name to be used to connect to the managing server database. This item specifies an ODBC data source name (in Embedded RDB or Microsoft SQL Server) or a net service name (in Oracle) that is used to connect to the managing server database.
Specification of this item is mandatory.
The value set here is applied to ODBC data source name and Net service name in the Create Data Source/Net Service dialog box.
Acquire devices on which JP1/SD is not installed specifies whether to acquire information about devices on which JP1/SD is not installed as part of non Software Distribution host information.
If JP1/Client Security Control is linked, use the settings for linking JP1/Client Security Control.
- Permitted value
- Acquire (default)
Acquire information on the devices on which JP1/SD is not installed as part of non Software Distribution host information.
- Do not acquire
Do not acquire information on the devices on which JP1/SD is not installed as part of non Software Distribution host information.
Working key specifies whether or not a host ID is used for the ID key for operations according to the settings on the managing server. If you have changed the Use host IDs setting on the managing server, also change this setting accordingly.
If JP1/Client Security Control is linked, use the settings for linking JP1/Client Security Control.
- Permitted value
- Use host ID (default)
Use host ID for the ID key for operations on the managing server. When this value is selected, the host ID is used to assign JP1/Software Distribution's inventory information and Asset Information Manager Subset's asset information.
- Do not use host ID
Do not use host ID as the ID key for operations on the managing server. If Node identification key of the system configuration information is host name working, assets with matching MAC address and host name are assigned. If the assets cannot be assigned, assets with matching MAC address are assigned. If the assets still cannot be assigned, assets with matching host name are assigned.
If the node identification key in the system configuration information is IP address working, the asset with the same MAC address and IP address is assigned. If no such asset exists, the asset with the same MAC address is assigned. If no asset with the same MAC address exists, the asset with the same IP address is assigned.
Targets for inventory specifies whether to acquire information on devices without host IDs or without system information when acquiring inventory information from JP1/Software Distribution.
- Permitted value
- Take all (default)
Acquire inventory information for all devices regardless of whether they have host IDs or system information.
- Only devices with host IDs
Acquire inventory information only for devices that have host IDs.
- Only devices with system information
Acquire inventory information only for devices that have system information.
Assign key for asset information selects an assignment key for identification purposes when the information collected on the managing server is registered according to Asset Information Manager Subset's asset information.
If JP1/Client Security Control is linked, use the settings for linking JP1/Client Security Control.
- Permitted value
- Use working key (default)
The value specified in Working key is used as the key value to assign JP1/Software Distribution's inventory information to Asset Information Manager Subset's asset information.
- Use Asset No.
The asset number specified during assignment of inventory information is used as the key. During assignment of inventory information, numbers are assigned automatically by default. Because inventory information cannot be assigned with this default setting, make sure that this setting is changed.
For details about the settings for assignment of inventory information, see 10.2.6 Setting how to assign inventory information.
Conditions for assigning asset information 1 specifies how to assign Asset Information Manager Subset's asset information when JP1/Software Distribution's inventory information is acquired. This specification is valid when the value of Assign key for asset information is Use working key, and the value of the Working key is Use host ID.
If JP1/Client Security Control is linked, use the settings for linking JP1/Client Security Control.
- Permitted value
- Machines with only the same Host ID (default)
If assets cannot be assigned by the host ID of the JP1/Software Distribution system configuration information, no other value is to be used for assignment.
- Machines with the same MAC address
If assets cannot be assigned by the host ID of the JP1/Software Distribution system configuration information, the MAC address is to be used for assignment.
- According to the JP1/SD definition
If assets cannot be assigned by the host ID of the JP1/Software Distribution system configuration information, the MAC address, host name, and IP address are to be used for assignment.
If assets cannot be assigned, then if the node identification key of the system configuration information is host name working, assets with matching MAC address and host name are assigned. If the node identification key of the system configuration information is IP address working, assets with matching MAC address and IP address are assigned.
If assets still cannot be assigned, the MAC address is to be used for assignment.
Regardless of the selected value, the value of the host ID is registered as Assignment key for Asset Information Manager Subset's asset information.
Conditions for assigning asset information 2 selects an assignment method to be used when assignment by Conditions for assigning asset information 1 fails.
If JP1/Client Security Control is linked, use the settings for linking JP1/Client Security Control.
- Permitted value
- Use IP address and host name (default)
Of the devices that could not be assigned by Conditions for assigning asset information 1, assign those assets that have matching host name and IP address.
If assets cannot be assigned, then if the node identification key of the system configuration information is host name working, assign assets with matching host name; if the node identification key of the system configuration information is IP address working, assign assets with matching IP address.
- Use machine serial number
This method assigns asset information to the inventory information with the matching machine serial number. To use this method, "Machine serial number" needs to be specified for the managed item "Hardware information.Serial number" in the Assign Inventory window through the job category "System Definition".
- Use machine serial number and IP address and host name
For a device that has not been assigned to the inventory information by "Conditions for assigning asset information 1", this assigns asset information to the inventory information that has the same machine serial number, IP address, and host name. Otherwise, the asset information is assigned to the inventory information that has the same machine serial number and host name as when "host name working" is specified for the node identification key of the system configuration information, or that has the same machine serial number and IP address when "IP address working" is specified for the node identification key. If the assignment still fails, the asset information is assigned to the inventory information that has the same serial number only. To use this method, "Machine serial number" needs to be specified for the managed item "Hardware information.Serial number" in the Assign Inventory window through the job category "System Definition".
- Do not assign
Do not register unassigned assets.
- Assignment processing when the specification is Use machine serial number
Asset information with a matching machine serial number is assigned.
When specifying this assignment method, in the system definition job category, you must specify Machine serial number for the item to be assigned to Hardware information.Serial No in the inventory information assignment window.
- Assignment processing when the specification is Use machine serial number, IP address, and host name
Assignment follows the following procedure:
Asset information with a matching machine serial number, IP address, and host name is assigned.
- When the node identification key is Use host name, an asset with a matching machine serial number and host name is assigned.
- When the node identification key is Use IP address, an asset with a matching machine serial number and IP address is assigned.
- Asset information with a matching machine serial number is assigned.
When specifying this assignment method, in the system definition job category, you must specify Machine serial number for the item to be assigned to Hardware information.Serial No in the inventory information assignment window.
Perform new registration of unassigned assets specifies whether or not an unassigned asset is to be registered as a new asset. This applies to assets that have not been assigned pursuant to Conditions for assigning asset information 1 and Conditions for assigning asset information 2 when Use host ID is selected as the Working key.
If JP1/Client Security Control is linked, use the settings for linking JP1/Client Security Control.
- Permitted value
- New registration (default)
If there are assets registered in the database for which inventory information has not been assigned, register those assets as new assets.
- Do not perform new registration
If there are assets registered in the database for which inventory information has not been assigned, do not register those assets.
Note that when this value is specified, newly added assets might not be registered.
MAC address for dial up connection specifies whether or not the MAC address for dial-up connection is to be added to the information used for assigning Asset Information Manager Subset's asset information.
If JP1/Client Security Control is linked, use the settings for linking JP1/Client Security Control.
- Permitted value
- Add to the assigned information
Use the MAC address for dial-up connection to assign Asset Information Manager Subset's asset information.
- Do not add to the assigned information (default)
Do not use the MAC address for dial-up connection to assign Asset Information Manager Subset's asset information. Note that if Machines with the same MAC address is selected in Conditions for assigning asset information 1 and Do not assign is selected in Conditions for assigning asset information 2, Asset Information Manager Subset's asset information that cannot be assigned by host ID will no longer be assigned.
Type of information to acquire specifies the type of information to be imported into the Asset Information Manager Subset database from the managing server.
If you distribute software programs from the Software Applied window, set the Asset Information Manager to acquire software information to search for the target devices.
For details about the information that is updated by importing from the managing server, see 10.9 Inventory information that can be displayed by Asset Information Manager Subset.
If JP1/Client Security Console is linked, use the settings for linking JP1/Client Security Console.
- Permitted values
- Hardware information
Registers the hardware information only.
- Hardware and software information (default)
Registers the hardware and software information. The software information includes all the information that is installed at the clients (information cannot be selected).
- Hardware and software inventory information
Registers the hardware information and the information about software that is set to be monitored in the software inventory dictionary.
- Hardware and software and software inventory information
Registers the hardware and software information and the information about software that is set to be monitored in the software inventory dictionary.
Watch interval for update inventory specifies an interval at which updating of inventory information is to be monitored. This setting cannot be left blank.
- Permitted value
From 1 to 429,496 seconds. The default is 60 seconds.
Status of machines deleted with JP1/SD specifies the device status of devices collected as deleted devices, when inventory information changes are collected in real time.
If JP1/Client Security Control is linked, use the settings for linking JP1/Client Security Control.
- Permitted value
- Scrap
The status is set to Scrap and the Data Maintenance task deletes association with other information.
- Pre-Scrap (default)
Handle as inventory information assignment objects. If information is assigned, the status returns to Active.
Furthermore, as with the Scrap setting, the Data Maintenance task deletes associations with other information.
- Erase
Set to Erase so that the Data Maintenance task erases the information.
- Specify code
Set to the code status specified in Code specified for deleted assets.
- Ignore
Do not change the device status.
When acquiring inventory information, CSC notification count specifies the frequency (in terms of the number of inventory information items acquired from JP1/Software Distribution) at which to determine the status of security measures taken by Job Management Partner 1/Client Security Control. If this item is set to 0, security status is determined for the whole batch once all acquisition processing is complete. The smaller the value specified here, the faster the status of security measures undertaken by Job Management Partner 1/Client Security Control can be determined. However, too small a value lowers performance when acquiring inventory information.
- Permitted value
From 0 to 10,000 notifications. The default is 100.
Inventory acquisition method specifies whether to use the conventional method or the multithread method when acquiring inventory information from JP1/Software Distribution. If you choose the multithread method, performance when acquiring inventory information increases, and acquisition time decreases.
- Permitted value
- Standard method (default)
Acquire inventory information using the conventional method.
- Multithreading method
Acquire inventory information using the multithread method.
Differences between acquisition methods
The following table outlines the differences between the acquisition methods.
Table 10-5 Differences in function between acquisition methods
Function |
Conventional method |
Multithread method |
Take inventory flow |
- For Asset Information Synchronous Service
Acquired in the order: inventory information, uninstalled equipment, deletion history information.
- For the Take inventory task
Acquired in the order: uninstalled equipment, inventory information.
|
- For Asset Information Synchronous Service
Acquired in the order: inventory information, uninstalled equipment, deletion history information.
- For the Take inventory task
Acquired in the order: inventory information, uninstalled equipment.
|
Handling when information exceeds the maximum size of a column's data areas in the database |
The acquired information is truncated to the column's maximum size.
When this causes the end to be half of a double-byte character, it is converted to a single-byte space. |
The acquires information is truncated to the column's maximum size.
When this causes the end to be half of a double-byte character, it is deleted. However, for group-information.group-name, group-information.group, location-information.local-name, and location-information.local-name, the remainder is converted to a single-byte space. |
Handling when a computer name or user inventory is assigned to management item asset-information.asset-number |
If more than 60 bytes of information is acquired, the new asset is not registered and assignment by asset number is not performed. |
If more than 60 bytes of information is acquired, only the first 60 bytes of the new asset are registered and use for the assignment by asset number. |
Notes on using the multithread method
- If the multiplex level for inventory acquisition is 2 or more, set Link with JP1/SD as follows.
- Set Working key to Use host ID.
- Set Conditions for assigning asset information 1 to Machines with only the same Host ID.
Otherwise, asset registrations may be repeated or assets nay unintentionally be updated when inventory information is acquired.
- The message ID output to the log is KDAM8Cnn-m.
- The number of connections to the Asset Information Manager Subset database is the total of the multiplex level for inventory and the number of connections used for search.
- The number of connections to the JP1/Software Distribution database is the multiplex level for inventory.
- If there are multiple assets to be assigned, only the information of the asset with the highest ID is updated.
- If the system information of the node to be acquired from JP1/Software Distribution has no IP address, network information is not saved.
Sets the level of multiplexing when Multithread method is selected in Inventory acquisition method.
- Permitted value
From 1 to 16. The default is 4.
- Permitted value
- Use the machine serial number to assign asset information
Machine serial number needs to be specified for the managed item Hardware information.Serial No in the Assign Inventory window through the job category System Definition.
- Do not assign
Do not register unassigned assets in the database.
If multiple management-target devices have the same MAC address assigned to them when MAC addresses are set up as the key for Asset Information Manager to assign asset information to the asset management database, you can register these devices as separate assets. To do so, you must create an assignment-exception MAC list (MacListOfOmitMatching.ini). The storage destination, the description method, and a description example of the assignment-exception MAC list are as follows:
- Assignment-exception MAC list storage destination
Asset-Information-Manager-installation-folder\env
A sample file of the assignment-exception MAC list (MacListOfOmitMatching.ini.org) is provided in the aforementioned storage destination for use as a reference when creating an assignment-exception MAC list. View this sample when creating an assignment-exception MAC list.
All Rights Reserved. Copyright (C) 2009, 2013, Hitachi, Ltd.
Copyright, patent, trademark, and other intellectual property rights related to the "TMEng.dll" file are owned exclusively by Trend Micro Incorporated.