Skip Headers
Oracle® Health Sciences Data Management Workbench Installation Guide
Release 2.3
E35223-01
  Go To Table Of Contents
Contents

Previous
Previous
 
Next
Next
 

5 Integrate Oracle Health Sciences InForm

To import study data from InForm you must set up a database connection between the InForm database and the Oracle Health Sciences Data Management Workbench (Oracle DMW) database. The script that creates accounts also creates a tablespace on the InForm database to be used for the integration with Oracle DMW. All Oracle DMW objects are then created in this tablespace. Follow instructions in:

To send discrepancies from Oracle DMW to an InForm study, you must set up a web service. Follow instructions in:

5.1 Use Character Semantics

Setting et the Oracle Applications profile LSH: Use Character Semantics for Workarea Installation to Yes on each computer where you install Oracle DMW is required for integration with InForm. See Section 7.5.1, "Use Character Semantics".

5.2 Create Oracle Accounts for the Oracle DMW InForm Connector

For each InForm study database for which you plan to use Oracle DMW, do the following.

5.2.1 Create Directory on Each InForm Database

On each InForm database with a study for which you plan to use Oracle DMW, create one OS directory using the mkdir command to hold scripts you must copy and run.

You need one directory per database, not per study.

5.2.2 Copy Scripts

Copy the following files from the directory $CDR_TOP/patch/115/sql/ on the computer where you have installed Oracle Life Sciences Data Hub to each InForm database directory you created in Section 5.2.1:

  • DMWInFormInstall.sql—the driver script

  • DMWInFormCreateUser.sql—a script that creates a new user

  • DMWInFormExistingUser.sql—a script that confirms an existing user

  • DMWInFAdms.pls—a script that installs a package specification into the Oracle DMW administration account

  • DMWInFAdmb.pls—a script that installs a package body into the Oracle DMW administration account

  • DMWInFormROAccessObjs.sql—a script that installs a table into the Oracle DMW read-only access account

  • DMWInFroas.pls—a script that installs a package specification into the Oracle DMW read-only access account

  • DMWInFroab.pls—a script that installs a package body into the Oracle DMW read-only access account

5.2.3 Run the Driver Script

The driver prompts for all required input parameter values and calls the other scripts as required.

  1. Log into SQL*Plus with an account with DBA privileges.

  2. Go to the directory where the Oracle DMW InForm installation SQL scripts that you just downloaded are located.

  3. Execute DMWInFormInstall.sql. The script prompts for:

    • A name to give the log file

    • TNS name for the InForm database

    • system or other DBA username and password

    • Name and password of the Oracle DMW Admin account to be used or created for the purpose of giving privileges to the Oracle DMW read-only access account. The system creates the account if it does not already exist and updates the account if it already exists.

      If the system creates the account, it also prompts for a tablespace name. It then creates a tablespace on the InForm database to be used for the integration with Oracle DMW. All Oracle DMW objects are then created in this tablespace.

    • Name and password of the Oracle DMW read-only access account to be used or created. This user schema has select privileges on all tables and views in study accounts referenced by the InForm Connector, including metadata views, operational data views, and RDE views. This schema also has packages that facilitate the data load process.

5.2.4 Create Users in InForm

On each InForm database with a study you plan to use Oracle DMW for:

  1. Log in to InForm using an account that can create new users, such as system.

  2. In the InForm user interface, create a user with a suggested username DMW_AUTH to be used for authentication purposes by the web service connection. This user does not need any privileges. Its username and password will be used within Oracle DMW when creating web service locations.

  3. Create a user with the required name DMW_QUERY to be used for sending and updating discrepancies in InForm. Assign this user to a query group. The password for this user is not used in Oracle DMW.

  4. Activate both accounts.

5.3 Set Up the InForm Adapter

The InForm Adapter is required to send discrepancies to InForm.

  • If you are using Oracle Health Sciences InForm 5.5.1, use Oracle Health Sciences InForm Adapter 1.3.5 (1.3 SP5)

  • If you are using Oracle Health Sciences InForm 6.0, use Oracle Health Sciences InForm Adapter 1.3.6.1 (1.3 SP6)

5.3.1 Install the InForm Adapter

Install the InForm Adapter following instructions in:

  • Installation Guide InForm Adapter 1.3 SP5 if you are using Oracle Health Sciences InForm 5.5.1

  • Installation Guide InForm Adapter 1.3 SP6 if you are using Oracle Health Sciences InForm 6.0

You can install the Discrepancy Enhanced interface, Adapter Admin interface and RegisterTrialTool on a dedicated computer—the most common configuration—or on the InForm Application Server computer with the ISA (InFormServerAdapter).

The ISA must be available on the InForm Application Server to invoke the "Issue" and "Update" methods in the Discrepancy Enhanced interface, and the ISA Windows service must be running.

5.3.2 Register the InFormServerAdapter

Follow instructions in the appropriate Installation Guide InForm Adapter to register the InFormServerAdapter (ISA) using the SetServer command in the RegisterTrialTool.

5.3.3 Register Each Trial

Follow instructions in the appropriate Installation Guide InForm Adapter to register each trial to using the SetTrial command in the RegisterTrialTool.

5.4 Configure the WebLogic Server for Sending Discrepancies to InForm Supporting HTTPS

The WebLogic Server, which you installed and configured in Chapter 3, "Install Oracle WebLogic Server" to support either HTTP or HTTPS requires additional setup if you are using HTTPS. If you are using HTTP, you can skip this section.

5.4.1 Create Custom WebLogic Keystores

Use the keytool utility in Java Development Kit (JDK) to create the following two keystores in the WebLogic server and set their passwords (keypass and storepass, respectively):

  • informkeystore.jks

  • informtruststore.jks

keytool -importcert {-alias your_alias} {-file your_cert_file} [-keypass your_keypass] {-storetype JKS} {-keystore your_keystore} [-storepass your_storepass] 

Where your_cert_file is the complete path and file name of a trusted signed certificate that you have obtained upon request from a CA vendor.

If you have more than one InForm Adapter Server, you must modify the keystores to configure each of them. For example, if you are using Oracle Health Sciences InForm 5.5.1 for one study and 6.0 for another study, you need both Oracle Health Sciences InForm Adapter 1.3 SP5 and Oracle Health Sciences InForm 1.3 SP6 and must have the certificate of both servers in the keystores. To add a new ceritificate to existing keystore use the following command:

keytool -importcert {-alias your_alias} {-file your_cert_file} [-keypass your_keypass] {-keystore your_keystore} [-storepass your_storepass] 

5.4.2 Set Up Custom Keystores

Make the WebLogic server point to the custom keystores.

  1. Log in to the WebLogic server console and select the server. In the Keystores subtab under the Configuration tab, select Custom Identity and Custom Trust for Keystores.

  2. Under Identity, enter the path and password for informkeystore.jks and enter JKS for Custom Identity Keystore Type. The password is the keypass value you entered in Section 5.4.1, "Create Custom WebLogic Keystores".

  3. Under Trust, enter the path and password for informtruststore.jks and enter JKS for Custom Trust Keystore Type. The password is the storepass value you entered in Section 5.4.1, "Create Custom WebLogic Keystores".

    Surrounding text describes wls_keystores.gif.
  4. Save.

5.4.3 Generate a Private-Public Key Pair and Set the Validity Period

Using the keytool utility in Java Development Kit (JDK) to generate a private-public key pair. The default validity period for the certificate is 90 days. Use the -validity option followed by the number of days. For example:

keytool -genkeypair -v -alias your_alias -keypass your_keypass -keystore your_keystore.jks -storepass your_storepass -storetype jks -validity 720

Note:

You will receive a warning when the certificate is about to expire.

5.4.4 Set the Alias

Set the above alias in the SSL tab of the WebLogic server and save the changes.

  1. Log in to the WebLogic server console and select the server. In the SSL subtab under the Configuration tab, select Keystores for Identity and Trust Locations.

  2. For Private Key Alias, enter the alias you created in Section 5.4.3, "Generate a Private-Public Key Pair and Set the Validity Period".

  3. For Private Key Passphrase enter the password, which is the string you used for your_storepass in Section 5.4.3.

    Surrounding text describes wls_ssl.gif.
  4. Save.

5.4.5 Set SSL-Related Settings

Configure SSL settings:

  1. Expand the Advanced section at the bottom of the page and select the check box Use JSSE SSL at the bottom. Leave the other settings unchanged.

  2. Save.

  3. In the General subtab under the Configuration tab, select the check box SSL Listen Port Enabled. Leave the other settings unchanged.

  4. Save.

5.4.6 Restart the WebLogic Server

See Section 3.11, "Stopping and Starting the WebLogic Servers."