Back Forward System form
Completing the Production tab

  1. About
  2. New
  3. Production
  4. History
  5. More...

Specify system-wide security parameters for this Process Commander system. C-2380 removed Authentication By B-19353 BERRB removed Starting activity, Pulse interval, concurrent sessions

Changes you make to this tab become effective the next time the system is started.

Field

Description

Production  
Production Level

Enter a production level value that characterizes the need for access security on this system.
5 = production, highest security
4 = preproduction
3 = test
2 = development
1 = experimental, lowest security
This production level and access roles together determine class access — which users can create, update, delete, and otherwise operate on objects of specific classes through Access of Role to Object rules (Rule-Access-Role-Obj rule type).

To change the production level of a system, open and update the Production level field and save the System form. The change takes effect (for a node) the next time that a node is started.

NoteThe DB Trace tool is not available in a production system — a system with the Production Level set to 5. SR-10014 LAFFJ 4/17/07

NoteAutomated Unit Testing is not available for a production system (level 5) or for a system that has its prconfig.xml file's initialization setting nodetype set to "web" or "webtesting".

License parameters name

SmartPromptOptional. If you have completed a Data-Admin-License instance for your system, select it here. Otherwise, leave blank. C-2628 5.2 See Working with the License Compliance facility. BUG-2130 BUG-1828 BUG-1300

Lock Timeout

Enter the maximum time in minutes that an instance — for example, a work object — remains locked when opened. The default value is 120 minutes.

After this period, the system may mark this lock as soft, meaning that the lock is available to other users who request it. Soft locks help to prevent bottlenecks. (The other user is sometimes said to steal the lock.) However, even after a lock is marked as soft, the lock holder retains the lock and can save and commit the updated instance.

For example, if user Harry opens and updates work object W-1000 but then does not save the updated work object for more than 120 minutes, another user — Martha — can open the (unchanged) work object, stealing the lock from Harry. Harry's changes are lost. However, if neither Martha nor any other user open W-1000 during this 120 minutes and Harry has not signed off, then Harry can still save W-1000 with his changes.

NoteWhen browser-based users exit Process Commander by closing the browser window rather than by logging off properly, locks held by the requestor remain until the session is later deleted. These locks block access by other requestors. Reducing this Lock Timeout value can reduce such bottlenecks. See Pega Developer Network article PDNPRKB-17967 Adjust time-out settings to reduce locking issues when users do not log off.

NoteDon't confuse the lock timeout interval — a single system-wide value — with the authentication timeout value in an access group, which may vary from user to user. No relationship is required between these two intervals.

Enable Persistent Context?

Leave cleared; reserved for future use. Not implemented. COLEA 10/28/02 Bachir 5/18/06

Up About System data instances