Job Management Partner 1/Software Distribution Setup Guide

[Contents][Glossary][Index][Back][Next]

10.2.5 Setting the link with JP1/SD

Specifies the information needed to connect to the managing server database, such as the login ID, service name, and how to register inventory information in the database.

For details about the settings for assignment between inventory information and Asset Information Manager Subset's asset information in (4) through (9), see 10.2.6 Setting how to assign inventory information.

The items listed below must be set only when JP1/Client Security Control is linked. If JP1/Client Security Control is not linked, there is no need to specify them.

For details about each setting, see the manual Job Management Partner 1/Asset Information Manager Planning and Setup Guide.

The following describes other items.

Organization of this subsection
(1) JP1/SD database login ID
(2) Connection service for JP1/SD database
(3) Acquire devices on which JP1/SD is not installed
(4) Working key
(5) Targets for inventory
(6) Assign key for asset information
(7) Conditions for assigning asset information 1
(8) Conditions for assigning asset information 2
(9) Perform new registration of unassigned assets
(10) MAC address for dial up connection
(11) Type of information to acquire
(12) Watch interval for update inventory
(13) Status of machines deleted with JP1/SD
(14) CSC notification count
(15) Inventory acquisition method
(16) Multiplex level for inventory acquisition
(17) Conditions for assigning asset information "a"
(18) Defining an assignment-exception MAC list

(1) JP1/SD database login ID

JP1/SD database login ID specifies the login ID to be used to connect to the managing server database.

Specify the password in the Set Password dialog box.

Specification of this item is mandatory.

The value set here is applied to Connection user ID in the Create Data Source/Net Service dialog box.

(2) Connection service for JP1/SD database

Connection service for JP1/SD database specifies the service name to be used to connect to the managing server database. This item specifies an ODBC data source name (in Embedded RDB or Microsoft SQL Server) or a net service name (in Oracle) that is used to connect to the managing server database.

Specification of this item is mandatory.

The value set here is applied to ODBC data source name and Net service name in the Create Data Source/Net Service dialog box.

(3) Acquire devices on which JP1/SD is not installed

Acquire devices on which JP1/SD is not installed specifies whether to acquire information about devices on which JP1/SD is not installed as part of non Software Distribution host information.

If JP1/Client Security Control is linked, use the settings for linking JP1/Client Security Control.

(4) Working key

Working key specifies whether or not a host ID is used for the ID key for operations according to the settings on the managing server. If you have changed the Use host IDs setting on the managing server, also change this setting accordingly.

If JP1/Client Security Control is linked, use the settings for linking JP1/Client Security Control.

(5) Targets for inventory

Targets for inventory specifies whether to acquire information on devices without host IDs or without system information when acquiring inventory information from JP1/Software Distribution.

(6) Assign key for asset information

Assign key for asset information selects an assignment key for identification purposes when the information collected on the managing server is registered according to Asset Information Manager Subset's asset information.

If JP1/Client Security Control is linked, use the settings for linking JP1/Client Security Control.

(7) Conditions for assigning asset information 1

Conditions for assigning asset information 1 specifies how to assign Asset Information Manager Subset's asset information when JP1/Software Distribution's inventory information is acquired. This specification is valid when the value of Assign key for asset information is Use working key, and the value of the Working key is Use host ID.

If JP1/Client Security Control is linked, use the settings for linking JP1/Client Security Control.

(8) Conditions for assigning asset information 2

Conditions for assigning asset information 2 selects an assignment method to be used when assignment by Conditions for assigning asset information 1 fails.

If JP1/Client Security Control is linked, use the settings for linking JP1/Client Security Control.

(9) Perform new registration of unassigned assets

Perform new registration of unassigned assets specifies whether or not an unassigned asset is to be registered as a new asset. This applies to assets that have not been assigned pursuant to Conditions for assigning asset information 1 and Conditions for assigning asset information 2 when Use host ID is selected as the Working key.

If JP1/Client Security Control is linked, use the settings for linking JP1/Client Security Control.

(10) MAC address for dial up connection

MAC address for dial up connection specifies whether or not the MAC address for dial-up connection is to be added to the information used for assigning Asset Information Manager Subset's asset information.

If JP1/Client Security Control is linked, use the settings for linking JP1/Client Security Control.

(11) Type of information to acquire

Type of information to acquire specifies the type of information to be imported into the Asset Information Manager Subset database from the managing server.

If you distribute software programs from the Software Applied window, set the Asset Information Manager to acquire software information to search for the target devices.

For details about the information that is updated by importing from the managing server, see 10.9 Inventory information that can be displayed by Asset Information Manager Subset.

If JP1/Client Security Console is linked, use the settings for linking JP1/Client Security Console.

(12) Watch interval for update inventory

Watch interval for update inventory specifies an interval at which updating of inventory information is to be monitored. This setting cannot be left blank.

(13) Status of machines deleted with JP1/SD

Status of machines deleted with JP1/SD specifies the device status of devices collected as deleted devices, when inventory information changes are collected in real time.

If JP1/Client Security Control is linked, use the settings for linking JP1/Client Security Control.

(14) CSC notification count

When acquiring inventory information, CSC notification count specifies the frequency (in terms of the number of inventory information items acquired from JP1/Software Distribution) at which to determine the status of security measures taken by Job Management Partner 1/Client Security Control. If this item is set to 0, security status is determined for the whole batch once all acquisition processing is complete. The smaller the value specified here, the faster the status of security measures undertaken by Job Management Partner 1/Client Security Control can be determined. However, too small a value lowers performance when acquiring inventory information.

(15) Inventory acquisition method

Inventory acquisition method specifies whether to use the conventional method or the multithread method when acquiring inventory information from JP1/Software Distribution. If you choose the multithread method, performance when acquiring inventory information increases, and acquisition time decreases.

Differences between acquisition methods

The following table outlines the differences between the acquisition methods.

Table 10-5 Differences in function between acquisition methods

Function Conventional method Multithread method
Take inventory flow
  • For Asset Information Synchronous Service
    Acquired in the order: inventory information, uninstalled equipment, deletion history information.
  • For the Take inventory task
    Acquired in the order: uninstalled equipment, inventory information.

  • For Asset Information Synchronous Service
    Acquired in the order: inventory information, uninstalled equipment, deletion history information.
  • For the Take inventory task
    Acquired in the order: inventory information, uninstalled equipment.
Handling when information exceeds the maximum size of a column's data areas in the database The acquired information is truncated to the column's maximum size.
When this causes the end to be half of a double-byte character, it is converted to a single-byte space.
The acquires information is truncated to the column's maximum size.
When this causes the end to be half of a double-byte character, it is deleted. However, for group-information.group-name, group-information.group, location-information.local-name, and location-information.local-name, the remainder is converted to a single-byte space.
Handling when a computer name or user inventory is assigned to management item asset-information.asset-number If more than 60 bytes of information is acquired, the new asset is not registered and assignment by asset number is not performed. If more than 60 bytes of information is acquired, only the first 60 bytes of the new asset are registered and use for the assignment by asset number.

Notes on using the multithread method

(16) Multiplex level for inventory acquisition

Sets the level of multiplexing when Multithread method is selected in Inventory acquisition method.

(17) Conditions for assigning asset information "a"

(18) Defining an assignment-exception MAC list

If multiple management-target devices have the same MAC address assigned to them when MAC addresses are set up as the key for Asset Information Manager to assign asset information to the asset management database, you can register these devices as separate assets. To do so, you must create an assignment-exception MAC list (MacListOfOmitMatching.ini). The storage destination, the description method, and a description example of the assignment-exception MAC list are as follows: