Installation Qualification for E-Notebook 11 at Genzyme



Installation Qualification of

E-Notebook SQL 12.0 3-tier

|IQ PROTOCOL ORIGINATED BY: | | |

| | |Date |

|IQ PROTOCOL UPDATED BY: | | |

| | |Date |

DOCUMENT APPROVED BY CUSTOMER

|Department |Signature/Title |Date |

|Information Technology | | |

|Technical | | |

|Validation | | |

|Quality Assurance | | |

TABLE OF CONTENTS

1. Purpose 3

2. Scope 3

3. System Description 4

3.1. Database Server Verification 4

3.2. Webserver Verification 4

3.3. E-Notebook Client Verification 4

3.4. System Overview 4

4. Responsibilities 4

4.1. CambridgeSoft (CS) 4

4.2. CS Project Manager (PM) 5

5. Definitions 5

5.1. Variance 5

5.2. Installation Qualification (IQ) 5

5.3. Acceptance Criteria 5

6. Equipment/Material Needed 5

7. Customer Prerequisites 5

8. Acceptance Criteria 6

9. General Instructions For Executing The Protocol 6

10. Approvals 7

11. Verification of the Configuration of the Three Tiers that make up the E-Notebook SQL 12.0 Installation 9

11.1. Objective 9

11.2. Acceptance Criteria 9

11.3. Client PC 9

11.3.1. Accounts/Setup required 9

11.3.2. Hardware Installation Verification for Client PC 9

11.3.3. Software Installation Verification for Client PC 9

11.4. Web Server (Middle-Tier) 10

11.4.1. Hardware Installation Verification for the Web Server 10

11.4.2. Software Installation Verification for the Web Server 11

11.5. Database Server 11

11.5.1. Hardware Installation Verification for the Database Server 11

11.5.2. Required Software for Database 12

11.5.3. Database Checklist 13

12. Protocol Report 13

12.1. Protocol Report 13

12.2. Validation Package 13

Appendix A: Signature Identification Log 15

Appendix B: Supporting Documentation 16

Appendix C: Variance Procedure And Form 17

1. Introduction 19

2. Prerequisites 19

3. Database Server Software Requirements 19

4. Database Installation Instructions 19

4.1. Creating an E-Notebook Database 19

1.1. Setting up Access to the Database 24

2. E-Notebook Middle-tier Setup and Configuration Instructions 27

2.1. Installing SQL Server Native Client 27

2.1.1. Interactive Installation 27

2.1.2. Silent Installation 29

2.2. Installing E-Notebook Web Service 29

2.2.1. Running Web Service Installer 29

2.2.2. Confirming Settings and Functioning of Web Service 32

2.3. Generating Structure Index Files 37

2.4. Creating SQL Server Connection Configuration File 40

3. Enhanced Security Configuration (optional) Instructions 43

3.1. Configuring E-Notebook Web Service with a Domain Account 43

3.1.1. IIS Server Changes 43

3.1.2. Structure Index Files Permissions 51

3.1.3. SQL Server Changes 52

3.2. Removing SQL Server Securityadmin Privileges for ‘Schema User’ 52

3.3. Changing ‘Schema User’ Password 53

4. E-Notebook Client Configuration Instructions 55

4.1. Prerequisites 55

4.2. E-Notebook Client to Middle-Tier Connection Configuration 56

4.3. Adobe PDF Printer Configuration 58

4.4. Confirm Proper Configuration of the Three Tiers 59

Purpose

Use this Installation Qualification to verify the steps for installing and configuring E-Notebook SQL 12.0 in a 3-tier environment.

Scope

The Installation Qualification for E-Notebook SQL 12.0 in 3-tier mode includes steps for installing and configuring an E-Notebook database on SQL Server, installing and configuring E-Notebook Web service on an IIS middle-tier system, and configuring E-Notebook client to connect to the Web service.

System Description

1 Database Server Verification

Verify the following:

• SQL Server Hardware

• SQL Server Configuration

2 Webserver Verification

Verify the following:

• Webserver Hardware

• Webserver Configuration

3 E-Notebook Client Verification

Verify the following:

• E-Notebook Client Hardware

• E-Notebook Client-Server Connection Configuration

4 System Overview

The system components and their specifications are:

• The system consists of a database, Web server (middle-tier), and a client connected to the network.

• The Web server operating system consists of either Windows 2003 Server R2 SP2 or Windows Server 2008 SP1 and resides on its own server (see section 11.4.2 for Web server requirements).

• The database operating system consists of either Windows 2003 R2 SP2 or Windows Server 2008 SP1 and resides on its own server (see section 11.5.2 for database server requirements).

• The database is a SQL Server database.

• The client operating system is Windows XP or Windows Vista with Microsoft Office XP, Office 2003, or Office 2007.

Responsibilities

1 CambridgeSoft (CS)

CambridgeSoft is responsible for authoring and amending this document and for executing the protocol. CS initiates a variance form as needed and as instructed by Appendix C: Variance Procedure And Form. CS records the nature of the variance and authors the installation qualification (IQ) report.

2 CS Project Manager (PM)

The CambridgeSoft project manager is responsible for ensuring that the IQ includes the installation of all needed hardware and software and formulates a resolution for variances.

Definitions

1 Variance

A variance is a recognized departure from the documented procedures.

2 Installation Qualification (IQ)

The documented verification that hardware and software are installed with respect to vendor and user requirements.

3 Acceptance Criteria

Acceptance Criteria are pre-defined requirements or tests that must be fulfilled.

Equipment/Material Needed

Software and CDs needed to install the database and application are:

• SQL Server Database software

• Microsoft Office

• Chem(Bio)Office 12.0

• Adobe Acrobat

• E-Notebook v12.0

• The ‘DataManagement Server Setup’ folder and its contents

Customer Prerequisites

• Customer procedures needed to maintain the system in a validated state.

• IQ protocol approval.

• Completion and approval of an IQ on all prerequisite installations.

• Completion of prerequisite site preparations.

Note: All prerequisites for installation are included in the specific Installation Guides.

Before initiating any verification sections, the prerequisites must be completed. List and attach appropriate supporting documentation in Appendix B: Supporting Documentation.

Comments/Observations:

___

Reviewed by: ___________________________ Date:___________

Acceptance Criteria

• All IQ prerequisites are met.

• All personnel involved in executing the protocol have been properly trained. Copies of their training records are available for review.

• All acceptance criteria as defined in the IQ verification sections have been met. The installation of a validation (test) instance is complete, verified, and documented.

• All variances in the use of this protocol or in actual results from expected results have been described in a Variance Report (see Appendix C: Variance Procedure And Form). All variances are closed (complete and approved by QA /Validation).

• The system has been placed under the control of an approved change control procedure. All personnel entering data on this protocol have logged their signature in Appendix A: Signature Identification Log.

• All supporting documentation (screen prints, reports, etc.) collected during test execution has been logged in Appendix B: Supporting Documentation.

General Instructions For Executing The Protocol

1. The customer is responsible for the review and approval of this IQ prior to execution of the IQ.

2. This IQ covers the steps for installing and configuring E-Notebook SQL 12.0 database, installing and configuring E-Notebook Web service on IIS middle-tier system, and configuring E-Notebook client to connect to the Web service

3. All documents produced as part of the execution of this IQ will be printed out and appended to this document as evidence of test results.

Company Name :

Facility :

Address:

Approvals

Executed IQ Approval:

|Title or Department |Name |Signature |Date |

| | | | |

| | | | |

| | | | |

*Signature identification log is in Appendix A: Signature Identification Log.

• The prerequisite items identified in the Prerequisites Section must be completed before execution of the protocol. Prerequisite items are considered completed when all items are complete and a QA representative has reviewed and signed the prerequisite section.

• All personnel entering data (execution or review) into this protocol must complete the required portion of Appendix A: Signature Identification Log.

• As each activity is completed, the individual performing the activity enters the actual results achieved, initials, and dates the entry.

• Variances in the use of this protocol or in actual results from expected results must be documented in a Variance Report as specified in Appendix C: Variance Procedure And Form.

• A reviewer must review and sign at the bottom of each page on which data is recorded as part of the execution of the protocol. This includes the Prerequisites Section and all test sections. The reviewer cannot be the same individual who performed the validation activities.

• All protocol entries are to be made using blue ballpoint indelible ink.

• Each step in the test must be executed in order.

• All test response sections must be filled in.

• All completed test steps will have a test result of Pass (Pass) or Variance/Fail (Variance).

• Variance:

o A variance is a recognized departure from the documented procedures.

o List all variants from the acceptance criterion in the variance section.

o A procedural variance may occur when a test step cannot be executed as written. In this case a workaround may be substituted into the test step with a documented variance.

o A protocol variance should be written against any test step or acceptance criteria that was written incorrectly. The correction should be documented in the variance form.

o All variances will be investigated as part of their remediation. All variances that meet the failure definition upon investigation will be documented as Fail.

• Fail:

o A protocol fails when a test step fails to meet the acceptance criteria or expected results.

o A functional failure is realized when the product does not perform with respect to the requirements.

o All failures will be recorded (as variances) and communicated, and a plan for correction will be created.

o Catalogue all attachments with the Appendix Number, reference the test and test step, sign, and date.

o Always sign and date each test procedure section as indicated and prior to moving on the next test section.

o Verify that the acceptance criterion has been met for each test step.

Verification of the Configuration of the Three Tiers that make up the E-Notebook SQL 12.0 Installation

1 Objective

The objective of this test is to establish the correct configuration of each tier of the E-Notebook 12.0 installation.

2 Acceptance Criteria

Actual results must match or exceed expected results for all items before installation can begin.

3 Client PC

1 Accounts/Setup required

|# |Item |Actual |Initial/Date |

| |A Windows Administrator user account and password are known and available | | |

| |during installation | | |

|Conclusion re. Client installation |Pass ( | |

| |Variance ( | |

2 Hardware Installation Verification for Client PC

Logon ID used:_____________________________________

|# |IQ Item |Specification/ |Actual Result |Initial/ |

| | |Expected Result | |Date |

| |Memory |1GB (min), 2GB (preferred) |RAM: | |

| |(RAM) | | | |

| | | |Specification met: | |

| | | |Yes ( No ( | |

| |Processor type |1 CPU: |Processor Type: | |

| | |1.6 GHz or higher Pentium 4 |Serial #: | |

| | |1.6 GHz or higher Intel Core Duo | | |

| | | |Specification met: | |

| | | |Yes ( No ( | |

| |Available HDD Capacity|300MB – 2GB (offline use of E-Notebook varies the space | | |

| | |required) | | |

3 Software Installation Verification for Client PC

Logon ID used:_________________________________________

|# |IQ Item |Specification/ |Actual Result |Initial/ |

| | |Expected Result | |Date |

| |Client Operating system |Windows XP Professional SP2 32-bit |Version: | |

| | |Windows Vista Business and Ultimate 32-bit | | |

| | | |SP: | |

| |.NET Framework |.NET Framework 2.0 | | |

| |Microsoft Office |Version XP/2003/2007 |Version: | |

| | | | | |

| | | |SP: | |

| |Adobe Acrobat |8.1 Standard or Professional |Version: | |

| | |9.1 Standard or Professional | | |

| | | |Standard/Professional: | |

| |ChemDraw plug-in* |ChemDraw ActiveX Const11 version 12 |ChemDraw: | |

| |MolServer.dll |MolServer.dll Const11 version 12 | | |

| | | |Version: | |

| |*This is provided separately as part of Chem(Bio)Office Core with Serial number override. It is not necessary to install if full| |

| |ChemBioOffice Desktop is already present. | |

|Conclusion re. Server installation |All tests of the configuration meet expected results; the |Pass ( | |

| |server processor and memory are properly configured. |Variance ( | |

4 Web Server (Middle-Tier)

1 Hardware Installation Verification for the Web Server

Logon ID used (for the server manager):_____________________________________

|# |IQ Item |Specification/ |Actual Result |Initial/ |

| | |Expected Result | |Date |

| |Processor |1.6GHz dual processor or higher | | |

| |Available HDD Capacity |15 - 20GB | | |

2 Software Installation Verification for the Web Server

Logon ID used:_____________________________________

|# |IQ Item |Specification/ |Actual Result |Initial/ |

| | |Expected Result | |Date |

| |Operating system level: |Standard or Enterprise | | |

| |Operating system |32-bit (64-bit is NOT supported) | | |

| |architecture: | | | |

| |Internet Information |IIS 6.0 or IIS 7.0 | | |

| |Services (IIS)* | | | |

| |* This must be installed and running. To confirm: | |

| |go to Control Panel>Administrative Tools> | |

| |Internet Services Manager and ensure that “Default Web Site” is started. | |

| |‘IUSER_’ (win2003) or ‘IUSR’ (win2008) available | |

| |SQL Server Component: |SQL Server native client 2005 SP3 32-bit | | |

| |.Net Framework: |.Net Framework 2.0 | | |

5 Database Server

1 Hardware Installation Verification for the Database Server

Logon ID used (for the server manager):_____________________________________

|# |Procedure |Specification/ |Actual Result |Initial/ |

| | |Expected Result | |Date |

| |Note Server Name |Validation Database Server: | | |

| | | | | |

| | |Production Database Server: | | |

| |Server processor |2 Intel Xeon CPUs |Processor 1: | |

| |type | |Type: | |

| | | |Serial #: | |

| |Identify the | | | |

| |number and type(s)| |Processor 2: | |

| |of CPU(s). | |Type: | |

| | | |Serial #: | |

| | | | | |

| | | |Specification met: | |

| | | |Yes ( No ( | |

| |Server processor |Processor 1, serial number |Processor 1: | |

| |logical quantities| | | |

| | |____________, 2 partitions |Serial #: | |

| |The number of | | | |

| |partitions for |Processor 2, serial number |Number of partitions:_______ | |

| |each CPU | | | |

| | |____________, 4 partitions |Processor 2: | |

| | | | | |

| | | |Serial #: | |

| | | |Number of partitions:_______ | |

| | | | | |

| | | |Specification met: | |

| | | |Yes ( No ( | |

| |Memory (RAM) |Note the RAM. | | |

| | |4GB (min), 16GB (preferred) | | |

| |HDD Free Space |Note the Hard Disk Space | | |

| |Required |500-1000MB/User/Year (50 GB min) | | |

| |CPU speed and |1.8 GHz to 2.8 GHz, at least 512KB cache |Processor 1: | |

| |cache size | |Speed: | |

| | | |Cache size: | |

| |Speed > 1000Mhz | | | |

| | | |Processor 2: | |

| | | |Speed: | |

| | | |Cache size: | |

| | | | | |

| | | |Processor 3: | |

| | | |Speed: | |

| | | |Cache size: | |

| | | | | |

| | | |Specification met: | |

| | | |Yes ( No ( | |

|Conclusion re. Server |All tests of the configuration meet expected results; the server |Pass ( | |

|installation |processor and memory are properly configured. |Variance ( | |

2 Required Software for Database

|# |Item |Expected |Actual |Initial/ |

| | | | |Date |

| |Operating System |Windows 2003 R2 SP2 or Windows Server 2008 | | |

| | |SP1 | | |

| | |Standard and Enterprise | | |

| | |32-bit and 64-bit | | |

| |SQL Server |SQL Server 2005 SP2/SP3 or SQL Server 2008 | | |

| | |Standard or Enterprise | | |

| |SQL Server Tools |Management Studio | | |

| |NET Framework |NET Framework 2.0/3.5 (depending on SQL | | |

| | |version) | | |

|Conclusion re. Server installation |All tests of the configuration meet expected |Pass ( Variance ( | |

| |results; the server processor and memory are | | |

| |properly configured. | | |

3 Database Checklist

|# |Item |Actual |Initial/Date |

| |The SQL Server instance name |Instance Name: | |

| |The “sa” user account password is known, and the password is available | | |

| |during installation | | |

| |Ensure that the database system is available on the domain and accessible to| | |

| |other systems (the firewall must be configured to allow SQL traffic). | | |

| |. | | |

|Conclusion re. Server installation |Pass ( Variance ( | |

Protocol Report

1 Protocol Report

Prepare a Protocol Report that summarizes the results of the IQ. The report includes these sections:

• Purpose

• Scope

• References

• Analysis of Results

• Conclusion

2 Validation Package

Compile a Validation Package for each IQ that is formatted as follows:

• Final Approval Page

• Protocol Report Master (unexecuted)

• Protocol Executed (working copy)

• Protocol with all applicable attachments

Appendix A: Signature Identification Log

All personnel involved in the execution or review of this protocol must complete a row in the following table.

|Name (Print) |Signature |Initials |Company Affiliation |Date |

| | | | | |

| | | | | |

| | | | | |

| | | | | |

| | | | | |

| | | | | |

| | | | | |

| | | | | |

| | | | | |

| | | | | |

| | | | | |

| | | | | |

| | | | | |

| | | | | |

| | | | | |

| | | | | |

Appendix B: Supporting Documentation

• Attached all supporting documentation, including non-secured documentation, screen printouts, reports, collected during test execution.

• Affixed to a blank page any item smaller than this page.

• Labeled each attached page with:

o The document number of the validation protocol.

o A cross-reference to the test step and page number to which it pertains.

o A unique page number for each attachment, e.g., 1 of 3, 2 of 3, 3 of 3.

o The initials of the person who attached it and the date of entry.

• List the attachments below:

|Attachment # |Title |# of pages |Signature |

| | | | |

| | | | |

| | | | |

| | | | |

| | | | |

| | | | |

| | | | |

| | | | |

| | | | |

| | | | |

| | | | |

| | | | |

| | | | |

| | | | |

Appendix C: Variance Procedure And Form

Each variance must be documented in a Variance Report with a unique variance reference number.

• A single Variance Report may handle multiple occurrences of identical error conditions. Each occurrence of the error must be recorded, initialed, and dated by the observer in the executed protocol(s) at all procedural steps where the error applies.

• The person executing the protocol who encountered the variance labels the Variance Report with:

o The title, document number, and revision of the protocol to which it pertains.

o Variance number for that protocol (example: “2 of 4”).

o A reference to the page number and test step number of all occurrences of the error.

o A unique page number for that variance report (example: “1 of 2”).

• The person executing the protocol who encountered the variance fills in the “Observation” section, prints his or her name, signs and dates it. In the “Observation” section, they describe the error in the protocol, the problem encountered, or the difference between the Expected Results and the Actual Result.

• The CambridgeSoft Project Manager (as appropriate) records their conclusion concerning the impact of the variance on the system’s ability to reliably meet user requirements, and after discussion with the system owner, signs the “Conclusion/Impact” section. Changes to be made to the user requirements, or limits on system use, are indicated.

• The QA/Validation representative reviews the Variance and, if in agreement with the Resolution and Conclusion/Impact, approves the report by signing the “Approved By” space under the Conclusion/Impact section.

• Approved Variance Reports (or copies) are attached to the Variance Report.

PROTOCOL NAME: _______________________________________________________________

PROTOCOL #: ____________ REVISION______ VARIANCE REPORT (VR) #:______________

LOCATION OF VARIANCE: Page #_____________ Test Step #: ____________VR page #

|OBSERVATION: |

| |

| |

|By: | | | | | |

| |(name) | |(signature) | |(date) |

|RESOLUTION: |

| |

| |

| |

|By: | | | | | |

| |(name) | |(signature) | |(date) |

|By: | | | | | |

| |(name) | |(signature) | |(date) |

|CONCLUSION/IMPACT: |

| |

| |

| |

| |

| |

| |

| |

|By: | | | | | |

| |(name) | |(signature) | |(date) |

|Approved By: | | | | | |

| |(name) | |(signature) | |(date) |

Appendix D: Install guides for E-Notebook SQL database 12.0

INTRODUCTION

This document includes steps to install and configure CambridgeSoft E-Notebook SQL 12.0 in 3-tier mode (An E-Notebook client connects to a Web service that, in turn, communicates with SQL server). The installation procedure has three main components:

1. Installation and configuration of the E-Notebook database on SQL Server

2. Installation and configuration of E-Notebook Web service on the IIS middle-tier system

3. Configuration of the E-Notebook client to connect to the Web service

Prerequisites

Review and complete the checklists in section 11.5.3 before installation.

Database Server Software Requirements

See sections 11.4.2 and 11.5.2 for database servers and Web server software requirements.

Database Installation Instructions

1 Creating an E-Notebook Database

The default folder, [AppData]\CambridgeSoft\E-Notebook\12.0\, in which the Database Setup Wizard places the database and configuration files, is based on the operating system:

• On Windows Server 2003, the folder will be: C:\Documents and Settings\All Users\Application Data\CambridgeSoft\E-Notebook\12.0\

• On Windows Server 2008, the folder will be: C:\ProgramData\CambridgeSoft\E-Notebook\12.0\

N The [AppData] folder is by default hidden on the Windows OS System. Administrators might prefer to have the E-Notebook database and configuration files in a special ‘data’ location. This document will use a ‘data’ hard drive as an example.

| Step |User Input/Action |Expected Results |Actual Results |Initial/Date |

| |Copy the contents of the folder | | | |

| |“\DataManagement Server Setup\E-Notebook” to | | | |

| |the database server. Browse into the folder | | | |

| |“ELN Database Create Backup and Restore” that| | | |

| |is appropriate for the SQL Server version you| | | |

| |are running. | | | |

| |Run the Database Setup Wizard (SetupDB.exe). |The E-Notebook Setup Wizard welcome |  |  |

| | |screen appears: | | |

| | | | | |

| | |[pic] | | |

| |Click Next. |The Setup Tasks screen appears: |  |  |

| | | | | |

| |[pic] | |

| |Select Create a new E-Notebook database |The Destination Server screen appears: |  |  |

| |locally and click Next. | | | |

| |[pic] | | |

| |Select the SQL server instance name from the |The selected server instance name appears |  |  |

| |Enter a server name drop-down list. If the |in the Enter a server name field. | | |

| |list is empty, type in the server and | | | |

| |instance name. | | | |

| |Note: Since the Setup Wizard is run on the | | | |

| |same system as where the SQL Server is | | | |

| |installed, you can use ‘(local)’ for the SQL | | | |

| |Server name. For a SQL Cluster, type the name| | | |

| |of the virtual SQL server. | | | |

| |Enter the information of an account that has | |  |  |

| |administrative access to the SQL server. (If | | | |

| |you are logged into the system as an | | | |

| |administrator, Windows Integrated Security | | | |

| |can be used with SQL Server 2005. Otherwise a| | | |

| |SQL user, usually ‘sa’, that has | | | |

| |administrative permissions has to be | | | |

| |supplied). | | | |

| |Enter a name for your E-Notebook database and|The Database File Location screen appears.| | |

| |click Next. | | | |

| |[pic] | |

| |Browse to a folder where you will store the | |  |  |

| |E-Notebook database file (.MDF) and the | | | |

| |database log file (.LDF). If the folder does | | | |

| |not exist, it will be created. | | | |

| |Uncheck Create structure files and Create | | | |

| |server configuration file (in a 3-tier setup,| | | |

| |these files will reside on the middle-tier). | | | |

| |Click Next. |A summary dialog is displayed with the | | |

| | |database that will be created in SQL | | |

| | |Server. | | |

| |[pic] | |

| |Click Create to start the process. Depending |After successfully creating the database, |  |  |

| |on the SQL server system configuration, |a confirmation dialog box appears. A | | |

| |creating the database will take some time to |default E-Notebook administrator account | | |

| |finish. |is created with these credentials (note | | |

| | |the capitalization): | | |

| | |Username: ELNAdmin | | |

| | |Password: ELNAdmin | | |

| | |‘ELNAdmin’ is a SQL login account that is | | |

| | |used for the initial login and to create | | |

| | |other users. It can be disabled after at | | |

| | |least one more SQL or Windows E-Notebook | | |

| | |user is created with administrative | | |

| | |privileges. | | |

| | | | | |

|Note: While the E-Notebook database is created, a ‘schema user’ SQL account is also created. This schema user will by default have the same |

|name and password as the E-Notebook database name you chose; so in this example it is ‘CSNotebook12’. The password can (and should) be |

|changed in SQL Server Management Studio. However, since the password is stored in encrypted form in the SqlConfig.xml file on the |

|middle-tier, it is important to run the ‘Create SQL server connection configuration file’ utility each time the password is changed. |

|Once an E-Notebook user has authenticated against the database with either SQL, Windows, or LDAP authentication, the ‘schema user’ performs |

|all the transactions in the E-Notebook database. |

|Conclusion re. Creating E-Notebook Database |All tests of the configuration meet |Pass ( | |

| |expected results. |Variance ( | |

2 Setting up Access to the Database

Note: Follow the steps in this section only if you plan to use ‘Windows Authentication’ for users to log into E-Notebook.

When using Windows authentication for E-Notebook user accounts, the account login information is first validated against the domain server or list of local user accounts. The SQL server checks the account information.

When an E-Notebook user logs in with a Windows or domain user account, the account information is passed to the IIS Server on the middle-tier. The IIS server, in turn, submits the information to the SQL server. The IIS service account communicates with the SQL Server (so this service account needs to be known to SQL Server). By default, IIS runs under the ‘Network Service’ account and, since this is a local system account, it is not possible to add this account to the SQL Server user database if the database and middle-tier are on different systems. In that case, the account ‘NT AUTHORITY\Authenticated Users’ needs to be added to the SQL Server logins.

| Step |User Input/Action |Expected Results |Actual Results |Initial/Date |

| |Open SQL Server Management Studio and connect|The SQL Server Management Studio |  |  |

| |as an administrator to the instance with the |window appears. | | |

| |E-Notebook database. | | | |

| |Expand the ‘Security tree’ in the Object |The Login screen appears. |  |  |

| |Explorer. Right-click Logins and select New | | | |

| |Login from the context menu: | | | |

| |[pic] | |

| |Enter “NT AUTHORITY\Authenticated Users” in |The selected group appears in the |  |  |

| |the Login name text box. |Login name field. | | |

| |[pic] | | |

| |Under Select a page click User Mapping. | | | |

| |Check the Map checkbox for the E-Notebook | | | |

| |database. | | | |

| |[pic] | |

| |Click OK. |The Login screen closes. |  |  |

| |Note: To make the system more secure, IIS can be run under a domain account. This domain account needs to be | |

| |added to SQL Server instead of the more general ‘NT AUTHORITY\Authenticated Users’. | |

|Conclusion re. Setting up Access to the Database |All tests of the configuration meet |Pass ( | |

| |expected results. |Variance ( | |

E-Notebook Middle-tier Setup and Configuration Instructions

Copy the contents of the folder “\DataManagement Server Setup\E-Notebook” to the middle-tier (IIS) server and browse to the folder “ELN WebService”.

1 Installing SQL Server Native Client

The E-Notebook Web service uses some SQL client components to communicate with the SQL server database. If there is no SQL Server installed on the middle-tier, these client components need to be installed first by running the “SQL Server Native Client” installer. This installer can be run interactively or in silent mode.

2 Interactive Installation

| Step |User Input/Action |Expected Results |Actual Results |Initial/Date |

| |Double-click the ‘sqlncli.msi’ file to launch|The Welcome screen appears. |  |  |

| |the installer. | | | |

| |[pic] | | |

| |Click Next. |The License Agreement screen |  |  |

| | |appears. | | |

| |Accept the license agreement (only if you |The User Configuration screen |  |  |

| |have read it and agree to its terms) and |appears. | | |

| |click Next. | | | |

| |[pic] | | |

| |Enter a name and company and click Next. |The Feature Selection screen |  |  |

| | |appears. | | |

| |[pic] | | |

| |Accept the default settings for feature |The Confirmation screen appears. | | |

| |selection and click Next. | | | |

| |[pic] | | |

| |Click Install on the confirmation screen. |The Completion screen appears. | | |

| |[pic] | | |

| |Click Finish. |The Completion screen closes and | | |

| | |installation is completed | | |

| | |successfully. | | |

| |[pic] | | |

|Conclusion re. Interactive installation |All tests meet expected results. |Pass ( | |

| | |Variance ( | |

3 Silent Installation

The SQL Server Native Client can be installed silently without user interaction with the command line parameters: msiexec /i sqlncli.msi /qn

4 Installing E-Notebook Web Service

5 Running Web Service Installer

| Step |User Input/Action |Expected Results |Actual Results |Initial/Date |

| |Double-click the |The Welcome screen appears. |  |  |

| |“CambridgeSoft_ENotebook_WebServer_12.01.msi”| | | |

| |file. | | | |

| |[pic] | | |

| |Click Next. |The License Agreement screen |  |  |

| | |appears. | | |

| |Accept the license agreement (only if you |The Destination Folder screen |  |  |

| |have read it and agree to its terms) and |appears. | | |

| |click Next. | | | |

| |[pic] | | |

| |Change the install path (if desired) and |The Confirmation screen appears. |  |  |

| |click Next. | | | |

| |[pic] | | |

| |Click Install. |The Completion screen appears | | |

| |[pic] | | |

| |Click Finish. |The Completion screen closes and | | |

| | |installation is completed | | |

| | |successfully. | | |

| |[pic] | | |

|Conclusion re. Running Web service installer |All tests meet expected results. |Pass ( | |

| | |Variance ( | |

6 Confirming Settings and Functioning of Web Service

| Step |User Input/Action |Expected Results |Actual Results |Initial/Date |

| |Launch the Internet Information Services |This screen shown below appears: | | |

| |(IIS) manager and click the Web Service | | | |

| |Extensions node. Make sure that at least the | | | |

| |‘ v.2.0.x’ extension is allowed. | | | |

| |[pic] | | |

| | |

| |Note: If you install IIS after .NET framework or if you remove and reinstall IIS on a server that has .NET framework, then the |

| | entry might not show and/or pages will not work. This is because you are missing the IIS mappings associating the|

| | file extensions. To fix IIS mappings for , do a repair on the .Net Framework or follow these steps: |

| |a. Click Start -> run -> cmd |

| |b. At the command prompt, type the following, and then press : |

| |"%windir%\\Framework\[version]\aspnet_regiis.exe" -i |

| | |

| |In this path, [version] represents the exact version number of the .NET Framework 2.0 that you installed on your server (In this |

| |example, it is ‘v2.0.50727’). |

| |Navigate to Web Sites>Default Web Site, |The Properties dialog box appears. |  |  |

| |right-click the ENService Web service and | | | |

| |from the context menu, and select Properties.| | | |

| |[pic] | |

| |Click the tab and ensure that the | |  |  |

| | version is set to 2.0.x (where x is | | | |

| |the build number of the .NET Framework 2.0 on| | | |

| |your system). | | | |

| |[pic] | | |

| |Click the Directory Security tab. Under |The Authentication Methods dialog box | | |

| |Authentication and access control, click|appears. | | |

| |Edit. | | | |

| |Ensure that Enable anonymous access is |The Authentication Methods dialog |  |  |

| |checked and that all other check boxes are |box closes. | | |

| |unchecked. Click OK. | | | |

| |[pic] | | |

| |Click OK. |The Properties dialog box closes. | | |

| |Click the ENService service in the main IIS |A new browser window opens with the | | |

| |Manager screen. In the right pane, |ENService page. | | |

| |right-click ENService.asmx and select Browse | | | |

| |from the context menu. | | | |

| |[pic] | |

| |[pic] | |

| |Click GetPublicKey. |The ‘GetPublicKey’ sample page | | |

| | |appears. | | |

| |[pic] | |

| |Click the Invoke button to test the |A new browser window opens showing | | |

| |GetPublicKey implementation. |an XML string that contains the | | |

| | |ENService public key. | | |

| | |If the public key appears, the | | |

| | |E-Notebook Web service is | | |

| | |functioning. | | |

| |[pic] | |

|Conclusion re. Confirming Settings and Functioning of |All tests meet expected results. |Pass ( | |

|Web Service | |Variance ( | |

7 Generating Structure Index Files

The Structure Index Files store the information needed for structure searching. In a 3-tier environment it is the service account of the application pool that the E-Notebook webservice is running under, that accesses these files. For a default IIS and E-Notebook webservice installation, the E-Notebook webservice runs under the ‘DefaultAppPool’ and the ‘Network Service’ account runs this application pool. If these settings are left at default, the Structure Index Files are best created on the same system as where IIS is running.

| Step |User Input/Action |Expected Results |Actual Results |Initial/Date |

| |Browse to the Generate Structure Index Files |The Regenerate Structure Files |  |  |

| |folder and run |window appears. | | |

| |‘CambridgeSoft.ENServer.RegenerateStructureFi| | | |

| |le.exe’. | | | |

| |[pic] | | |

| |In the Regenerate Structure Files window, | |  |  |

| |enter or select: | | | |

| |Enter the system name and instance name of | | | |

| |the SQL server where the E-Notebook database | | | |

| |is. | | | |

| |Enter the information of an account that has | | | |

| |administrative access to the SQL server. (If | | | |

| |you are logged into the system as an | | | |

| |administrator, Windows Integrated Security | | | |

| |can be used with SQL Server 2005. Otherwise a| | | |

| |SQL user (usually ‘sa’) that has | | | |

| |administrative permissions has to be | | | |

| |supplied). | | | |

| |Enter the E-Notebook database name. | | | |

| |Select the folder where you want to store the| | | |

| |Structure Index files. If you want the | | | |

| |Structure Index Files on a different system, | | | |

| |enter a UNC path to a shared folder (example:| | | |

| |\\shared\ELN Structure Index Files) | | | |

| |Click OK. |A confirmation dialog appears | | |

| | |because the (re)generation of the | | |

| | |Structure Index Files will also | | |

| | |update the Mol ID table in the SQL | | |

| | |database. | | |

| |[pic] | | |

| | |When the Structure Index Files are |  |  |

| | |generated, a dialog appears, asking | | |

| | |whether you want to open the folder.| | |

| | |If you saved the files in a | | |

| | |temporary location, this will help | | |

| | |locate the files. | | |

| |[pic] | | |

| |Click Yes. |The folder containing regenerated |  |  |

| | |files is displayed. | | |

| |Note: On some systems, you will get an application crash message after exiting the Structure Generation | |

| |application. Since all tasks have already been performed successfully, this can be ignored. | |

In a 3-tier E-Notebook environment the E-Notebook Web service changes the Structure Index Files and not the individual E-Notebook users. Therefore the service account for the E-Notebook Web service (‘Network Service’ by default) needs to be given ‘modify’ permissions to the Structure Index folder and all containing files.

| |Browse to the folder where you created the | | | |

| |structure index files. | | | |

| |Right-click the folder and select Properties |The Properties dialog box appears | | |

| |from the context menu. | | | |

| |On the ‘Security’ tab, click the Add button. |The Properties dialog box closes. | | |

| |[pic] | | |

| |Add the webservice service account. Give | | | |

| |‘modify’ permissions to the account and click| | | |

| |OK. | | | |

|Conclusion re. Generating Structure Index Files |All tests meet expected results. |Pass ( | |

| | |Variance ( | |

8 Creating SQL Server Connection Configuration File

The Web service needs to be configured with appropriate entries to connect to the SQL Server database. These settings are maintained in the SqlConfig.xml file in:

[AppData]\CambridgeSoft\E-Notebook\12.0\

On Windows Server 2003, the SqlConfig.xml file will be in:

C:\Documents and Settings\All Users\Application Data\CambridgeSoft\E-Notebook\12.0\

On Windows Server 2008, the SqlConfig.xml file will be in:

C:\ProgramData\CambridgeSoft\E-Notebook\12.0\

Note: The [AppData] folder is, by default, hidden on the Windows OS.

| Step |User Input/Action |Expected Results |Actual Results |Initial/Date |

| |Browse to the Create Server Configuration File folder and run|The ENotebook Server |  |  |

| |‘ENServerConfig.exe’. |Configuration window | | |

| | |appears. | | |

| | | | | |

| |[pic] |

| |In the configuration window: |[pic] |  |  |

| |Under ENotebook Server, enter the system name and instance |A ‘connection succeeded’ | | |

| |name of the SQL Server where the E-Notebook database is. |message appears. | | |

| |Enter the Schema User and Schema Password. The schema user | | | |

| |is a SQL login that was created while creating the database.| | | |

| |By default, the schema user and password will be identical | | | |

| |to the name of the E-Notebook database that was chosen while| | | |

| |creating the database. | | | |

| |Enter the E-Notebook database name. | | | |

| |Click Test to ensure that you can connect to the database | | | |

| |with the schema user specified. The password for the schema | | | |

| |user will be stored as an encrypted string in SqlConfig.xml | | | |

| |and is needed for all E-Notebook transactions | | | |

| |Enter the location of ‘ENotebook.mst’. This file is one of | | | |

| |the six files that make up the structure index files | | | |

| |generated in section 2.3. If you decided to place the | | | |

| |Structure Index Files on a different system than the | | | |

| |E-Notebook webservice, you need to provide a UNC path to the| | | |

| |shared folder. Make sure the IIS service account has modify | | | |

| |permissions to this shared folder. | | | |

| |Note: Under Configuration File, do not change the default name and location of the SqlConfig.xml file. | |

| |Click OK. |A dialog for the | | |

| | |successful creation of | | |

| | |the configuration file is| | |

| | |displayed. | | |

| |[pic] | |

| |Click OK to close the success message. | |  |  |

| |Click OK. |A dialog for the | | |

| | |successful creation of | | |

| | |the configuration file is| | |

| | |displayed. | | |

|Conclusion re. Creating SQL Server Connection Configuration File |All tests meet expected |Pass ( | |

| |results. |Variance ( | |

Enhanced Security Configuration (optional) Instructions

The above installation and configuration of the E-Notebook database and webserver uses default settings that can be applied on most systems. However, some environments require more enhanced security settings.

1 Configuring E-Notebook Web Service with a Domain Account

2 IIS Server Changes

First the domain account needs to have the relevant permissions set.

| Step |User Input/Action |Expected Results |Actual Results |Initial/Date |

| |Go to Start>Run, type cmd, and press Enter. |The command prompt window appears. |  |  |

| | | | | |

| |Browse to |On Windows Server 2003, running the |  |  |

| |“C:\WINDOWS\\Framework\v2.0.x” |‘Aspnet_regiis.exe –ga’ command adds the | | |

| |where ‘x’ is the version number of your .NET |account to the IIS_WPG group. Membership in the| | |

| |Framework. |IIS_WPG group grants the ‘Log on as a batch’ | | |

| |Run the command: aspnet_regiis.exe -ga |job permission to the account and ensures that | | |

| |domain\userName |the necessary file system and IIS metabase | | |

| |where domain\userName is your domain and the |permissions are granted. | | |

| |domain user account to be used by IIS service | | | |

| |account. | | | |

| |[pic] | | |

| |Open the Control Panel and run Local Security | |  |  |

| |Policy. | | | |

| |Click the User Rights Assignment node. | | | |

| |Select Deny log on locally in the right pane | | | |

| |and add the domain account | | | |

| |[pic] | | |

| |[pic] | | |

1 Creating a new application pool

The application pool under which the E-Notebook webservice is running determines what service account is used. If no other webservices are running on the IIS server, the changes can be made to the ‘DefaultAppPool’; otherwise, it is best to create a new application pool specific for the E-Notebook webservice.

| Step |User Input/Action |Expected Results |Actual Results |Initial/Date |

| |Launch IIS Manager and right-click | | | |

| |Application Pools. | | | |

| |[pic] | |

| |From the context menu, select New>Application|The Add New Application Pool dialog box appears:| | |

| |Pool. | | | |

| |[pic] | | |

| |Enter a name for the new pool to be used for |The Add New Application Pool dialog box closes. | | |

| |the E-Notebook Web service and click OK. | | | |

| |Right-click the new pool and select |The Properties dialog box appears. | | |

| |Properties in the context menu. | | | |

| |[pic] | | |

| |In the Identity tab, click the Configurable |The Properties dialog box closes. | | |

| |radio button. Enter the domain account and | | | |

| |password. Click OK and confirm the password. | | | |

| |[pic] | | |

| |[pic] | | |

| |Go to Web Sites>Default Web Site and |The Properties dialog box appears. | | |

| |right-click ENService. In the context menu, | | | |

| |select Properties. | | | |

| |[pic] | | |

| |On the Virtual Directory tab, select the new |The Properties dialog box closes. | | |

| |application pool from the drop-down list and | | | |

| |click OK. | | | |

| |[pic] | | |

| |In a command prompt, type ‘iisreset’. |IIS server is restarted and the changes take | | |

| | |effect. | | |

| |[pic] | | |

2 Giving Write Access to the Windows Temp Folder

When the E-Notebook Web service is invoked, temporary files are created in the Windows temp folder. The newly assigned domain service account needs ‘write’ access to this folder to create these files.

| Step |User Input/Action |Expected Results |Actual Results |Initial/Date |

| |Browse to “C:\WINDOWS” and right-click the |The Properties dialog box appears | | |

| |Temp folder. From the context menu, select | | | |

| |Properties. | | | |

| |[pic] | | |

| |On the Security tab, click Add and add the |The Properties dialog box closes. | | |

| |domain account. Give the modify permissions | | | |

| |to the account. | | | |

3 Giving Access to the Public Key

The E-Notebook webservice creates a public key in the Windows certificates folder. If you already accessed the E-Notebook webservice, the key was created with the previous application pool service account (‘network service’ by default). In that case the new service account (domain account) does not have access to the public key and needs to be given access. This can be done by either deleting the certificate and have the E-Notebook webservice re-create it, or give full control to the domain account.

| Step |User Input/Action |Expected Results |Actual Results |Initial/Date |

| |Browse to “C:\Documents and Settings\All | | | |

| |Users\Application Data\Microsoft\Crypto\ | | | |

| |RSA\MachineKeys”. | | | |

| |Find the certificate with this name: | | | |

| |452f659a29adf4e1d65c29d269ec5f7c_51052c8e-5da| | | |

| |1-422d-8827-085c4556dad8 | | | |

| |Delete the certificate or go to the security |Either the certificate is deleted or the domain | | |

| |settings and give Full Control to the domain |account is given full control. | | |

| |account. | | | |

|Conclusion re. IIS Server Changes |All tests meet expected results. |Pass ( | |

| | |Variance ( | |

After making all the changes to the E-Notebook Web service, it is recommended that you confirm that the Web service is functioning. See “Confirming Settings and Functioning of Web Service” on page 32.

3 Structure Index Files Permissions

In a 3-tier E-Notebook environment, the E-Notebook Webservice changes the Structure Index files and not E-Notebook users. Therefore, the domain account needs to be given modify permissions to the Structure Index folder and all containing files.

| Step |User Input/Action |Expected Results |Actual Results |Initial/Date |

| |Browse to the folder where you created the |The Structure Index files appear. |  |  |

| |Structure Index files. | | | |

| |Right-click the folder and select Properties |The Properties dialog box appears. |  |  |

| |from the context menu. | | | |

| | | | | |

| |On the Security tab, click Add to add the |The Properties dialog box closes. |  |  |

| |domain account. Give modify permissions to | | | |

| |the account and click OK. | | | |

|Conclusion re. Structure Index Files Permissions |All tests meet expected results. |Pass ( | |

| | |Variance ( | |

4 SQL Server Changes

After switching the service account for the E-Notebook webservice to a domain account, this domain account needs to be added to the SQL Server logins and “NT AUTHORITY\Authenticated Users” can be removed.

| Step |User Input/Action |Expected Results |Actual Results |Initial/Date |

| |Open SQL Server Management Studio. Expand |The Login screen is displayed. |  |  |

| |the ‘Security tree’ in the Object Explorer. | | | |

| |Right-click Logins and select New Login in | | | |

| |the context menu. | | | |

| |Enter the domain account in the Login name |The Management Studio window is |  |  |

| |field and click OK. |closed. | | |

| |Under Select a page, click User Mapping. | | | |

| |Check the Map checkbox for the E-Notebook | | | |

| |database and click OK. | | | |

|Conclusion re. SQL Server Changes |All tests meet expected results. |Pass ( | |

| | |Variance ( | |

5 Removing SQL Server Securityadmin Privileges for ‘Schema User’

By default, the E-Notebook database is set up to allow Windows, LDAP, and SQL authentication (including mixed-mode). After authentication, the ‘schema user’ performs all the transactions, including creating new SQL login accounts. When a new E-Notebook user is created with SQL authentication, the ‘schema user’ also creates a new SQL login.

If only Windows or LDAP authentication will be used, the ‘securityadmin’ privileges can be removed from the schema user account.

| Step |User Input/Action |Expected Results |Actual Results |Initial/Date |

| |Open SQL Server Management Studio. Expand |The Properties dialog box is |  |  |

| |Security>Logins in the Object Explorer. |displayed. | | |

| |Right-click the schema user account (this | | | |

| |account has the same name as the E-Notebook | | | |

| |database and is ‘CSNotebook12’, by default) | | | |

| |From the context menu, select Properties. | | | |

| |[pic] | |

| |Go to the Server Roles page and remove |The Properties dialog box is closed.|  |  |

| |securityadmin from the server roles list. | | | |

| |Click OK. | | | |

|Conclusion re. Removing SQL Server Securityadmin |All tests meet expected results. |Pass ( | |

|Privileges for ‘Schema User’ | |Variance ( | |

6 Changing ‘Schema User’ Password

During the database creation process a ‘schema user’ is created that performs all the E-Notebook transactions. By default the name and password of this schema user will be the same as the database name that was chosen. This password is stored as an encrypted string in the SQLConfig.xml file (on the middle-tier) in the tag.

Whenever the password for the E-Notebook schema user is updated on the SQL server it is essential that the encrypted password in the SQLConfig.xml file is also updated.

| Step |User Input/Action |Expected Results |Actual Results |Initial/Date |

| |Access the middle-tier. On the middle-tier, |The ENotebook Server Configuration |  |  |

| |browse to the Create Server Configuration |window appears. | | |

| |File folder and run ‘ENServerConfig.exe’. | | | |

| |[pic] | |

| |Enter the E-Notebook server system name and |A ‘connection succeeded’ message is|  |  |

| |instance name of the SQL server where the |displayed. | | |

| |E-Notebook database is located. | | | |

| |Enter the schema user and the new password. |[pic] | | |

| |Enter the E-Notebook database name. | | | |

| |Click Test to ensure you can connect to the | | | |

| |database with the schema user and password | | | |

| |specified. | | | |

| |Click OK to close the message box. |A dialog for the successful | | |

| |Enter the location of ‘ENotebook.mst’ in the |creation of the configuration file | | |

| |Structure File text box. This file is one of |is displayed. | | |

| |the six files that make up the Structure | | | |

| |Index files that you had generated earlier. | | | |

| |If you placed the Structure Index Files on a | | | |

| |different system than the E-Notebook Web | | | |

| |service, you need to provide a UNC path to | | | |

| |the shared folder. Make sure the IIS service | | | |

| |account has ‘modify’ permissions on this | | | |

| |shared folder. | | | |

| |Keep the default the name and location of the| | | |

| |SqlConfig.xml file and click OK. | | | |

| |[pic] | |

|Conclusion re. Changing ‘Schema User’ Password |All tests meet expected results. |Pass ( | |

| | |Variance ( | |

E-Notebook Client Configuration Instructions

1 Prerequisites

At least one E-Notebook client needs to be setup in order to create the configuration file that can be pushed out to all additional E-Notebook client systems. There are three components that need to be installed on the E-Notebook Client:

• ChemBioOffice 12 core installer that contains the ChemDraw ActiveX Const11 version 12

• E-Notebook SQL client installer

• Activation override registry file

A manual installation is preferred on the initial E-Notebook client and a ‘push’ installation is recommended for all additional E-Notebook clients. For a manual installation double click the CambridgeSoft supplied .msi installer files and go through the install wizard accepting the defaults.

For a ‘push’ or silent installation, the following command line parameters can be used on the .msi installers:

ChemBioOffice core installer

msiexec /i " CambridgeSoft_ChemDraw_ActiveX_Enterprise_Constant_12.0.msi " /qn

E-Notebook client installer

msiexec /i " CambridgeSoft_ENotebook_12.01.msi " /qn

2 E-Notebook Client to Middle-Tier Connection Configuration

Each E-Notebook client must be configured with the proper entries to connect to the E-Notebook Webserver. These settings are maintained in the ENClientConfig.xml file.

There are two methods to set up the E-Notebook client systems to connect to the middle-tier server. The first is to have each user launch the ‘E-Notebook Configuration’ tool and fill in the appropriate information that the E-Notebook or IT administrator provides. The second is for the administrator to set up one system and then provides the configuration file to all the clients.

|Step |User Input/Action |Expected Results |Actual Results |Initial/Date|

| |From the Start menu, run E-Notebook Configuration and fill in all|The Configure E-Notebook Client |  |  |

| |the fields with the data provided by the E-Notebook |dialog box appears. | | |

| |administrator. | | | |

| | | | | |

| |[pic] | | | |

| |Enter a service name | | | |

| |Note: The service name can be any name and will appear on the E-Notebook login screen. It is recommended that you | |

| |enter a name that is easily identifiable, especially if multiple connections to different E-Notebook databases are | |

| |configured. | |

| |Select SQL server/LDAP Authentication or Windows authentication, | |  |  |

| |depending on how the E-Notebook user accounts are (or will be) | | | |

| |setup. | | | |

| |For SQL/LDAP authentication, there are fields for the userid and | | | |

| |password on the Login dialog. | | | |

| |For Windows authentication, the userid will be pre-filled (and | | | |

| |not editable) with the userid for the person currently logged | | | |

| |into the Windows account. There is no password field because the | | | |

| |credentials used to log into the Windows account is also used to | | | |

| |log into E-Notebook. | | | |

| |If you use Windows or LDAP Authentication for user login, the | | | |

| |initial connection to the E-Notebook database by the Notebook | | | |

| |administrator should still be with ‘SQL Server Authentication’. | | | |

| |No Windows or LDAP users exist yet at this point and need to be | | | |

| |created first by the administrator. | | | |

| |Under Server Connection, select Web Service URL. The URL should | | | |

| |be entered in the form: | | | |

| |http://[middle-tier servername]/ enservice/enservice.asmx | | | |

| | | | | |

| |where [middle-tier servername] is the name of the server where | | | |

| |you installed the E-Notebook Web service. | | | |

| |Click OK. |The ‘ENClientConfig.xml’ file will | | |

| |[pic] |be created in: | | |

| | |[AppData]\CambridgeSoft\E-Notebook\| | |

| | |12.0\ | | |

| | |On Windows XP this will be: | | |

| | |C:\Documents and Settings\All | | |

| | |Users\Application | | |

| | |Data\CambridgeSoft\E-Notebook\12.0\| | |

| | | | | |

| | |On Windows Vista, this will be: | | |

| | |C:\ProgramData\CambridgeSoft\E-Note| | |

| | |book\12.0\ | | |

| | | | | |

| | |Note: The [AppData] folder is by | | |

| | |default hidden on the Windows OS. | | |

| | |[pic] | | |

| | |After performing the configuration | | |

| | |steps, the system is completely | | |

| | |configured to connect to the | | |

| | |E-Notebook database. The | | |

| | |ENClientConfig.xml configuration | | |

| | |file from this system can be copied| | |

| | |to all clients so that the steps do| | |

| | |not have to be performed by each | | |

| | |individual. | | |

| |Browse to the [AppData] folder on the configured client system. |The folder is open. | | |

| |Copy the ‘ENClientConfig.xml’ file to the corresponding |The ENClientConfig.xml | | |

| |application data folders on all client systems. |configuration file from this system| | |

| | |is copied to all clients so that | | |

| | |the steps do not have to be | | |

| | |performed by each individual. | | |

| | |Client configuration is completed. | | |

|Conclusion re. E-Notebook Client to Middle-Tier Connection Configuration |All tests of the configuration meet|Pass ( | |

| |expected results. |Variance ( | |

3 Adobe PDF Printer Configuration

For each client who wants to use the export to PDF functionality, Adobe Acrobat Pro must be installed. The PDF printer on these clients needs to have the option 'Rely on system fonts only: do not use document fonts' unchecked.

|Step |User Input/Action |Expected Results |Actual Results |Initial/Date|

| |Click the Start button and choose Printers and Faxes. |The Printers and Faxes dialog box | | |

| | |opens. | | |

| |Right-click the Adobe PDF printer icon and select Printing |The Adobe PDF Printing Preferences |  |  |

| |Preferences in the context menu. |dialog box opens. | | |

| |Click the Adobe PDF Settings tab. |The Adobe PDF Settings tab is | | |

| | |selected. | | |

| |If the Rely on system fonts only: do not use document fonts check |The ‘Rely on system fonts only: do | | |

| |box is checked, uncheck it. |not use document fonts” check box | | |

| |[pic] |is unchecked. | | |

| |Click Apply. | | | |

| |Click OK. |The ‘Adobe PDF Printing | | |

| | |Preferences’ dialog box closes. | | |

| |Close the Printers and Faxes dialog box. |The ‘Printers and Faxes’ dialog box| | |

| | |closes. | | |

|Conclusion re. The Adobe PDF Printer is configured. |All tests of the configuration meet|Pass ( | |

| |expected results. |Variance ( | |

4 Confirm Proper Configuration of the Three Tiers

Before deploying the ‘ENClientConfig.xml’ file to all client systems, it is recommended to confirm the proper setup of all three tiers by logging into E-Notebook and performing some basic tasks.

| Step |User Input/Action |Expected Results |Actual Results |Initial/Date |

| |Launch E-Notebook from the start menu and |This dialog box is displayed: |  |  |

| |login using the pre-defined SQL |[pic] | | |

| |administrative user account with | | | |

| |login/password ‘ELNAdmin/ELNAdmin’. | | | |

| |Create a new ‘Chemistry Notebook’ with a |During these tasks no errors should |  |  |

| |reaction page. |show otherwise there is a problem | | |

| | |with one of the three tiers. If you | | |

| | |are unable to troubleshoot the | | |

| | |problem, contact CambridgeSoft | | |

| | |support. | | |

| |Draw a reaction and save it to the database. | | | |

| |Perform a structure search for one of the | | | |

| |reagents you submitted. | | | |

| |Export the notebook page to Microsoft Word | | | |

| |and/or PDF. | | | |

| |Create a new non-admin E-Notebook user | | | |

| |account (Windows, LDAP or SQL authentication)| | | |

| |and login as this user. | | | |

|Conclusion re. Confirm Proper Configuration of the Three|All tests meet expected results. |Pass ( | |

|Tiers | |Variance ( | |

................
................

In order to avoid copyright disputes, this page is only a partial summary.

Google Online Preview   Download