Skip Headers
Oracle® Secure Enterprise Search Administrator's Guide
10
g
Release 1 (10.1.8.1)
Part Number B32514-01
Home
Book List
Index
Contact Us
Next
View PDF
Contents
List of Tables
Title and Copyright Information
Preface
Audience
Documentation Accessibility
Conventions
What's New
New Features in Oracle Secure Enterprise Search Release 10.1.8.1
New Features in Oracle Secure Enterprise Search Release 10.1.8
1
Introduction to Oracle Secure Enterprise Search
Overview of Oracle Secure Enterprise Search
Oracle Secure Enterprise Search Components
Oracle Secure Enterprise Search Crawler
Oracle Secure Enterprise Search Administration Tool
Oracle Secure Enterprise Search APIs and Applications
Oracle Secure Enterprise Search Features
Secure Search
Federated Search
Web Services API
Extensible Crawler Plug-in Framework
2
Getting Started with Oracle Secure Enterprise Search
Getting Started Basics with Oracle Secure Enterprise Search
Understanding the Administration Tool
Home Tab
Search Tab
Global Settings Tab
3
Understanding Crawling and Searching
Overview of the Oracle Secure Enterprise Search Crawler
Crawler URL Queue
Understanding Access URLs and Display URLs
Using Crawler Plug-ins
Overview of Crawler Settings
Crawling Mode
URL Boundary Rules
Inclusion Rules
Exclusion Rules
Example Using Regular Expression
Crawling Depth
Robots Exclusion
Index Dynamic Pages
URL Rewriter API
Title Fallback
Special Considerations with Title Fallback
Character Set Detection
Special Considerations with Automatic Character Set Detection
Language Detection
Overview of Attributes
Example of Attribute LOV Collection
Understanding the Crawling Process
The Initial Crawl
Queuing and Caching Documents
Indexing Documents
Maintenance Crawls
Monitoring the Crawling Process
Crawler Statistics
Crawler Log File
Crawler Configuration File
Overview of Searching in Oracle Secure Enterprise Search
Basic Search
Advanced Search
Narrowing Searches by Search Attributes
Limiting Searches to Certain Source
Limiting Searches to Documents Written in a Specific Language
Browse Source Groups
Submit URL
4
Security in Oracle Secure Enterprise Search
About Oracle Secure Enterprise Search Security
Oracle Secure Enterprise Search Security Model
Passwords
Temporary Passwords
Authorization and Authentication
Overview of Oracle SES Authorization and Authentication
Restrictions on Changing the ACL Policy
Activating an Identity Plug-in
Re-registering Preinstalled Identity Plug-ins
Restrictions on Changing the Identity Plug-in
Authentication Methods
Oracle Secure Enterprise Search User Repository
Oracle Secure Enterprise Search Authentication Interface
Enabling Secure Search
Secure Search Options
Admin-based Authorization
Custom Crawler Plug-in
Identity-Based Secure Search
Query-time Authorization
Self Service Authorization
Configuring Secure Search with OracleAS Single Sign-On
Using mod_oc4j to Front Oracle Secure Enterprise Search with an Oracle HTTP Server
SSL and HTTPS Support in Oracle Secure Enterprise Search
Understanding SSL
Managing the Keystore
Oracle SES Acting as an SSL Client
Oracle SES Acting as an SSL Server
Configuring Oracle Secure Enterprise Search to Require SSL
Enabling SSL in Oracle HTTP Server's mod_oc4j Module
Security in a Federated Search Environment
5
Configuring Access to Enterprise Content Sources
Introduction to Enterprise Content Sources
Identity Management with Enterprise Content Sources
Setting Up Business Objects Sources
Important Notes for Business Objects Sources
Required Tasks
Required Software
Known Issues
Setting Up Identity Management for Business Objects Sources
Creating Business Objects Sources
Connector Configuration XML Format
Configuration Parameters for Business Objects
Tagger Configuration
Configuring the Source to Work in Simulator Mode
Registering Additional Parameters
BI Engine Security Considerations
Activating Incremental and Full Crawling
Setting Up Cognos Sources
Important Notes for Cognos Sources
Required Software
Known Issues
Setting Up Identity Management for Cognos Sources
Creating Cognos Sources
Configuration XML Format
Connection Parameters for Cognos
Tagger Configuration
Configuring the Source to Work in Simulator Mode
Registering Additional Parameters
BI Engine Security Considerations
Activating Incremental and Full Crawling
Setting Up Database Sources
Important Notes for Database Sources
Required Tasks
Creating Public Database Sources
Creating Secure Database Sources
Example of Creating a Secure Database Source
Setting Up EMC Documentum Content Server Sources
Important Notes for EMC Documentum Content Server Sources
Required Software
Required Tasks
Known Issues
Setting Up Identity Management for EMC Documentum Content Server
Creating an EMC Documentum Content Server Source
Setting Up EMC Documentum eRoom Sources
Documentum eRoom Web Services
Important Notes for Documentum eRoom Sources
Supported Platforms
Required Software
Required Tasks
Known Issues
Creating a Documentum eRoom Source
Setting Up FileNet Content Engine Sources
Important Notes for FileNet Content Engine Sources
Required Software
Required Tasks
Known Issues
Setting Up Identity Management with Filenet Content Engine
Creating a FileNet Content Engine Source
Setting Up FileNet Image Services Sources
Important Notes for FileNet Image Services Sources
Required Software
Required Tasks
Known Issues
Setting Up Identity Management for FileNet Image Services
Creating a FileNet Image Services Source
Setting Up Hummingbird Document Management Server Sources
Important Notes for Hummingbird DM Server Sources
Required Software
Required Tasks
Known Issues
Setting Up Identity Management for Hummingbird
Creating a Hummingbird Source
Deploy the Web Service on the Hummingbird DM Server
Setting Up IBM DB2 Content Manager Sources
Important Notes for IBM DB2 Content Manager Sources
Required Software
Required Tasks on the Server Side
Required Tasks on the Client Side
Known Issues
Setting Up Identity Management for DB2 Content Manager
Creating an IBM DB2 Content Manager Source
Setting Up Lotus Notes Sources
Important Notes for Lotus Notes Sources
Required Software
Required Tasks
Known Issues
Setting Up Identity Management for Lotus Notes
Creating a Lotus Notes Source
Setting Up Microsoft Exchange Sources
Important Notes for Microsoft Exchange Sources
Required Software
Required Tasks
Known Issues
Setting Up Identity Management for Microsoft Exchange
Creating a Microsoft Exchange Source
Setting Up Boundary Rules on Microsoft Exchange Sources
Setting Up Microsoft SharePoint Sources
Important Notes for Microsoft SharePoint Sources
Creating a Microsoft SharePoint Source
Deploy the Web Service on the SharePoint Portal Server
Setting Up MicroStrategy Sources
Important Notes for MicroStrategy Sources
Required Software
Known Issues
Setting Up Identity Management for MicroStrategy Sources
Creating MicroStrategy Sources
Configuration XML Format
Configuration Parameters for MicroStrategy
Tagger Configuration
Configuring the Source to Work in Simulator Mode
Registering Additional Parameters
BI Engine Security Considerations
Activating Incremental and Full Crawling
Setting Up NTFS Sources for Windows
Important Notes for NTFS Sources
Required Software
Required Tasks
Setting Up Identity Management with NTFS Sources
Creating an NTFS Source
Setting Up Boundary Rules on NTFS Sources
Setting Up NTFS Sources for UNIX
Important Notes for NTFS Sources
Required Software
Required Tasks
Setting Up Identity Management with NTFS Sources
Creating an NTFS Source
Setting Up Boundary Rules on NTFS Sources
Setting Up Open Text Livelink Sources
Important Notes for Open Text Livelink Sources
Required Tasks
Known Issues
Setting Up Identity Management for Open Text
Creating an Open Text Livelink Source
Setting Up Oracle Calendar Sources
Setting Up Identity Management for Oracle Calendar
Creating an Oracle Calendar Source
Setting Up Oracle Content Database Sources
Important Notes for Oracle Content Database Sources
Known Issues
Setting Up Identity Management for Oracle Content Database Sources
Creating an Oracle Content Database Source
Required Steps with Oracle Content Database Release 10.1.3
Setting Up Oracle E-Business Suite 11i Sources
Important Notes for Oracle E-Business Suite 11i Sources
Setting Up Identity Management for Oracle E-Business Suite 11i
Creating an Oracle E-Business Suite 11i Source
Setting Up Oracle E-Business Suite 12 Sources
Setting Up Identity Management for Oracle E-Business Suite 12
Creating an Oracle E-Business Suite 12 Source
Setting Up Siebel 7.8 Sources
Important Notes for Siebel 7.8 Sources
Required Tasks
Setting Up Identity Management for Siebel 7.8
Creating a Secure Siebel 7.8 Source
Creating a Public Siebel 7.8 Source
Queries to Crawl Siebel 7.8 Business Components
Service Request Attachments Query
Accounts Query
Products Query
Literature Query
Solution Query
Service Request Query
Contacts Query
Setting Up Siebel 8 Sources
Setting Up Identity Management for Siebel 8
Creating a Siebel 8 Source
Setting Up Federated Sources
Federation Trusted Entities
Example Creating a Federated Source
6
Oracle Secure Enterprise Search Advanced Information
Adding Suggested Content
Example Configuring Google OneBox for Suggested Content
Using Backup and Recovery
Understanding Attributes
Web Source Attributes
File Source Attributes
E-mail Attributes
OracleAS Portal Source Attributes
Microsoft Exchange Source Attributes
NTFS Source Attributes
Oracle Calendar Attributes
Oracle Content Database Source Attributes
Troubleshooting Sources
Tips for Using Table and Database Sources
Understanding Table Sources Versus Database Sources
Crawling Tables with Quoted Identifiers
Tips for Using File Sources
Crawling File Sources with Non-ASCII
Crawling File Sources with Symbolic Links
Crawling File URLs
Tips for Using Mailing List Sources
Tips for Using OracleAS Portal Sources
Tips for Using User-Defined Sources
Tips for Using Federated Sources
Federated Search Characteristics
Federated Search Limitations
Tuning Crawl Performance
Understanding the Crawler Schedule
Registering a Proxy
Checking Boundary Rules
Notes for File Sources
Checking Dynamic Pages
Checking Crawler Depth
Checking Robots.txt Rule
Checking Duplicate Documents
Checking Redirected Pages
Checking URL Looping
Increasing the Oracle Redo Log File Size
What to do Next
Tuning Search Performance
Adding Suggested Links
Optimizing the Index
Increasing the Indexing Batch Size
Increasing the Index Memory Size
Checking the Search Statistics
Relevancy Boosting
Increasing the JVM Heap Size
Increasing the Oracle Undo Space
Integrating with Google Desktop for Enterprise
Monitoring Oracle Secure Enterprise Search
Turning On Debug Mode
Accessing Application Server Control Console on Oracle SES
Restarting Oracle Secure Enterprise Search After Rebooting
7
Oracle Secure Enterprise Search APIs
Overview of Oracle Secure Enterprise Search APIs
Oracle Secure Enterprise Search Web Services APIs
Web Services APIs Installation
Query Web Services Installation
Admin Web Services Installation
Web Services Concepts
Web Services
Simple Object Access Protocol
Web Services Description Language
Web Services Architecture
Development Platforms
Query Web Services Common Data Types
Base Data Types
XML-to-Java Data Type Mappings
Complex Types
Array Types
Query Web Services Operations
Overview of Query Web Services Operations
Authentication Operations
Search Operations
Browse Operations
Metadata Operations
Search Hit Operations
User Feedback Operations
Query Web Services Query Syntax
Search Term
Phrase
Operators
Default Search - Implicit AND Search
Word Separator
Filter Conditions (Advanced Conditions)
Special Search Terms
Query Web Services Example
Client-Side Query Java Proxy Library
Internally Used Query Web Services Messages
Admin Web Services Operations
Client-Side Admin Java Proxy Library
Admin Web Services SOAP Fault Error Codes
Oracle Secure Enterprise Search Java SDK
Crawler Plug-in API
Crawler Plug-in Overview
Crawler Plug-in Functionality
URL Rewriter API
URL Link Filtering
URL Link Rewriting
Creating and Using a URL Rewriter
Security APIs
Identity Plug-in API
Authorization Plug-in API
User-Defined Security Model
Query-time Authorization API
Overview of Query-time Authorization
Filtering Document Access
Filtering Folder Browsing
Pruning Access to an Entire Source
Determining the Authenticated User
Query-time Authorization Interfaces and Exceptions
Thread-safety of the Filter Implementation
Compiling and Packaging the Query-time Filter
A
Oracle Secure Enterprise Search Secure Portlet
OracleAS Portal Tasks
Oracle SES Tasks
Example of Exporting Keys
B
Upgrading Oracle Secure Enterprise Search
Upgrading Oracle Secure Enterprise Search to 10.1.8.1
Checking Memory Requirements
Upgrading File Sources to 10.1.8
Upgrading Oracle Calendar Sources to 10.1.8
Using Secure Federated Search Between 10.1.8 and 10.1.6
C
URL Crawler Status Codes
D
Error Messages
E
WSDL Specifications
Query Web Service API
Admin Web Service API
F
Third Party Licenses
Apache Software
Plug-in Software
Glossary
Index