System form
|
|
Specify system-wide security parameters for this Process Commander system. C-2380 removed Authentication By B-19353 BERRB removed Starting activity, Pulse interval, concurrent sessions
Changes you make to this tab become effective the next time the system is started.
Field |
Description |
Production | |
Production Level |
Enter a production level value that characterizes the need
for access security on this system. To change the production level of a system, open and update the Production level field and save the System form. The change takes effect (for a node) the next time that a node is started. The DB Trace tool is not available in a production system — a system with the Production Level set to 5. SR-10014 LAFFJ 4/17/07
Automated Unit Testing is not
available for a production system (level 5) or for a system that has its |
License parameters name |
Optional. If you have completed a Data-Admin-License instance for your system, select it here. Otherwise, leave blank. C-2628 5.2 See Working with the License Compliance facility. BUG-2130 BUG-1828 BUG-1300 |
Lock Timeout |
Enter the maximum time in minutes that an instance — for example, a work object — remains locked when opened. The default value is 120 minutes. After this period, the system may mark this lock as soft, meaning that the lock is available to other users who request it. Soft locks help to prevent bottlenecks. (The other user is sometimes said to steal the lock.) However, even after a lock is marked as soft, the lock holder retains the lock and can save and commit the updated instance. For example, if user Harry opens and updates work object W-1000 but then does not save the updated work object for more than 120 minutes, another user — Martha — can open the (unchanged) work object, stealing the lock from Harry. Harry's changes are lost. However, if neither Martha nor any other user open W-1000 during this 120 minutes and Harry has not signed off, then Harry can still save W-1000 with his changes. When browser-based users exit Process Commander by closing the browser window rather than by logging off properly, locks held by the requestor remain until the session is later deleted. These locks block access by other requestors. Reducing this Lock Timeout value can reduce such bottlenecks. See Pega Developer Network article PRKB-17967 Adjust time-out settings to reduce locking issues when users do not log off. Don't confuse the lock timeout interval — a single system-wide value — with the authentication timeout value in an access group, which may vary from user to user. No relationship is required between these two intervals. |
Enable Persistent Context? |
Leave cleared; reserved for future use. Not implemented. COLEA 10/28/02 Bachir 5/18/06 |