InfoSphere MDM Server V9.0: Developers Guide MDMDevelopers
User Manual:
Open the PDF directly: View PDF
Page Count: 856 [warning: Documents this large are best viewed by clicking the View PDF Link!]
- Contents
- Part 1. InfoSphere MDM Server platform
- Chapter 1. InfoSphere MDM Server architectural overview
- Understanding components
- Learning the core components layers
- Understanding common components
- Learning the extension framework layers
- Learning the Request-Response processor
- Understanding consumers layers
- Understanding component interactions
- Understanding business modules
- Understanding infrastructure modules
- Understanding customization restrictions
- Chapter 2. Customizing InfoSphere MDM Server
- Understanding extensions
- Understanding additions
- Creating extensions and additions
- Creating extensions and additions with InfoSphere MDM Server Workbench
- Understanding the extension handler component
- Creating extensions
- Starting an extension
- Extending business objects
- Extending database tables for new functions
- Defining extended functions in the request and response framework XSD
- Understanding transaction context passing and the DWLControl object
- Creating event behavior extensions
- Extending functions through the rules engine
- Understanding Java behavior extensions
- Creating additions to add new data and functionality
- Registering extended and new business objects
- Adding metadata to added or extended tables and columns
- To test an extension or addition
- Recognizing extensions and additions in InfoSphere MDM Server
- Accessing samples of extensions and additions
- Understanding InfoSphere MDM Server runtime metadata
- Maintaining metadata with InfoSphere MDM Server Workbench
- Understanding component functions
- Using the pureQuery data access layer
- Creating pluggable business object queries
- Implementing pluggable business object queries
- Customizing an existing pluggable business object query
- Using pureQuery data access layer in pluggable business object queries
- Understanding the structure of a constant
- Extending the BObjQuery class
- Creating a new pluggable business object query
- Implementing SQLJ-based queries
- Creating a pluggable persistence mechanism
- Chapter 3. Managing specs and spec values
- Understanding specs and the MDM metadata project
- Learning spec project structure
- Understanding spec composition
- Understanding spec profiles
- Understanding internal spec schemas
- Understanding external spec schemas
- Understanding localized spec schemas
- Learning national language support (NLS)
- Understanding design considerations and constraints governing internal spec schemas
- Understanding internal schema validations
- Deploying specs to the runtime
- Using spec values in the runtime
- Adding spec values
- Updating spec values
- Manipulating spec values
- Using AttributeValueBObj path elements
- Using AttributeValueBObj value elements
- Using AttributeValueBObj action elements
- Understanding spec value searches
- Understanding spec design considerations for searchable attributes
- Understanding deployment considerations for spec searchable attributes
- Using spec searchable attributes in the runtime
- Understanding localized searches
- Understanding multiple criteria search semantics
- Validating searches
- Understanding data type specific considerations
- Illustrating an end-to-end scenario of a spec and its usage
- Example: Identifying the required spec attributes in simple business terms
- Example: Creating a spec using the InfoSphere MDM Server Workbench
- Example: Deploying the metadata package for a spec to the InfoSphere MDM Server runtime
- Example: Associating a spec with a product
- Example: Adding a product with values corresponding to a new spec
- Example: Searching for a product with specific spec values
- Chapter 4. Understanding InfoSphere MDM Server common code type framework
- Chapter 5. Understanding InfoSphere MDM Server common features
- Chapter 6. Configuring Multi-Instance Federated Deployment
- Chapter 7. Subtyping entities
- Knowing when to use entity subtypes
- Knowing when to use data extensions
- Creating entity subtypes
- Supporting subtyped entities in database tables
- Configuring entity subtypes
- Understanding transactions that service subtypes
- Processing child objects
- Understanding inquiry transactions
- Understanding persistence transactions
- Chapter 8. Understanding entity suspects management and entity data stewardship frameworks
- Understanding the entity suspect management data model
- Understanding entity suspect management base classes for EObj and BObj
- Learning entity suspect management BObjQuery, QueryFactory, and ResultSetProcessor classes
- Understanding EntitySuspectComponent input and output objects
- Example: EntitySuspectListBObj containing multiple instances of EntitySuspectBObjs
- Example: EntitySuspectBObj containing multiple instances of EntityMatchResultBObjs
- Example: EntityMatchResultBObj containing suspect match result information
- Example: EntitySuspectSearchBObj containing search suspect transaction parameters and an optional domain specific request obj
- Understanding entity suspect management business component level methods
- Understanding entity suspect management controllers
- Learning entity suspect management code types
- Understanding notifications for entity suspect persistence transactions
- Understanding the entity data stewardship data model
- Understanding data stewardship base classes for EObj and BObj
- Learning data stewardship BObjQuery, QueryFactory, and ResultSetProcessor classes
- Understanding EntityDataStewardComponent input and output objects
- Example: ConsolidatedEntityBObj containing an option target entity object and one or more entity objects to be collapsed
- Example: SplitEntityRequestBObj containing an entity id and an entity request object - ProductId and ProductRequestBObj
- Example: EntityListBObj containing a list of domain specific entities
- Example: LinkedEntitiesRequestBObj containing an entity id and an entity request object - ProductId and ProductRequestBObj
- Understanding entity data stewardship business component level methods
- Understanding entity data stewardship controllers
- Understanding soft delete
- Learning the generic entity suspect processing and data stewardship configuration elements
- Chapter 9. Configuring logging and error handling
- Chapter 10. Configuring external business rules
- Chapter 11. Configuring pluggable keys
- Chapter 12. Configuring Smart Inquiries
- Chapter 13. Customizing search SQL queries
- Understanding the Search framework
- Understanding InfoSphere MDM Server Search implementation
- Comparing search methods
- Understanding requirements for adding and editing SQL statements
- Customizing search features
- Understanding SQL lookup constraints
- Constructing dynamic SQL statements
- Adding new search input and output
- Understanding business object inheritance
- Adding new comparison operators
- Chapter 14. Configuring the service activity monitoring facility
- Chapter 15. Customizing the language and locale in InfoSphere MDM Server
- Chapter 16. Defining inquiry levels
- Chapter 17. Retrieving audit history
- Chapter 18. Retrieving historical information for party or contract images within a range of dates
- Chapter 19. Storing and retrieving the Transaction Audit Information Log
- Understanding transaction audit information log information
- Configuring transaction audit information logs
- Understanding transaction audit information log data tables
- Understanding transaction audit information logging
- Retrieving transaction audit information log information
- Understanding getTransactionLog transactions
- Understanding inquiry levels
- Setting up new transactions in the transaction audit information log
- Understanding getTransactionLog elements and attributes
- Chapter 20. Running parallel tasks using the Concurrent Execution Infrastructure (CEI)
- Chapter 21. Setting source values and data decay
- Chapter 22. Understanding performance tracking
- Chapter 23. Aliasing transactions
- Chapter 24. Configuring the Request and Response Framework
- Understanding the Request and Response Framework
- Understanding transaction flow
- Understanding DWLServiceController
- Understanding RequestHandler
- Understanding parser components
- Understanding the InfoSphere MDM Server XML parser
- Understanding constructor components
- Understanding the InfoSphere MDM Server XML constructor
- Understanding the business proxy
- Chapter 25. Creating composite transactions using customized business proxies
- Using best practices to develop customized business proxies
- Implementing customized business proxies
- Example: Step 1 – Determining the Request structure
- Example: Step 2 – Registering the transaction in the database
- Example: Step 3 – Adding the transaction name to the properties file
- Example: Step 4 – Implementing the business proxy
- Example: Step 5 – Deploying the business proxy with InfoSphere MDM Server
- To run the customized business proxy example
- Chapter 26. Creating composite XML transactions
- Understanding composite XML transaction syntax
- Understanding basic composite transactions
- Example: Reusing DWLControl values with GlobalFields
- Example: Correlating the transactions in the composite
- Example: Substituting values from another Request or Response
- Example: Qualifying an object name with criteria
- Example: Comparing strings
- Example: Comparing numeric values
- Example: Comparing dates
- Examples of substitution
- Creating composite transactions with if-then-else logic
- Creating composite transactions with looping logic
- Providing error messages using the error handling service
- Creating boolean expressions
- Creating object-set expressions
- Configuring the composite XML transaction
- Understanding requirements for submitting composite XML transactions
- Understanding requirements for customizing the composite response
- Chapter 27. Understanding the response publisher
- Chapter 28. Understanding batch transaction processing
- Understanding the InfoSphere MDM Server J2SE batch processor architecture
- Designing J2SE batch input and output
- Running J2SE Batch Processor batch jobs
- Configuring the J2SE batch processor
- Managing J2SE batch throughput
- Reviewing J2SE errors and logs
- Building custom batch jobs for the J2SE Batch Processor framework
- Understanding the InfoSphere MDM Server WebSphere Extended Deployment Batch architecture
- Creating XJCL for batch jobs
- Running XJCL batch jobs
- Reviewing XJCL errors and logs
- Building custom batch jobs for the InfoSphere MDM Server WebSphere Extended Deployment batch processor
- Chapter 29. Using and configuring Web Services
- Understanding Web Services
- Understanding WSDL file structures
- Understanding Web Services operations and data types
- Understanding Web Services invocation
- Making data extensions available through Web Services
- Understanding data type definitions
- Understanding business object converters
- Making additions available through Web Services
- Implementing Web Services
- Invoking Web Services
- Invoking Web Services using JAX-RPC
- Invoking Web Services with atomic transactions
- Invoking Web Services with WS-Security
- Invoking Web Services with atomic transactions and WS-Security
- Configuring Web Services security for WebSphere Application Server
- Chapter 30. Using the external Web Services Adapter
- Chapter 31. Customizing Event Manager
- Understanding Event Manager business rules
- Understanding the Event Manager design overview
- Understanding events detected by the passage of time
- Understanding events triggered by a transaction
- Understanding explicit events
- Using Event Manager with InfoSphere MDM Server
- Understanding the Event Manager data model
- Setting up definition tables for Event Manager
- Setting up business systems and business entities
- Setting up event definitions and categories
- Setting up business rules for the event definitions
- Setting up the processing option for event detection
- Maintaining operational data manually
- Maintaining operational tables
- Maintaining the PROCESSCONTROL table
- Maintaining the PROCESSACTION table
- Maintaining operational data using transactions
- Writing business rules
- Implementing rules using Java
- Writing the business adapter
- Calling Event Manager from the business system
- Detecting events for all configured event categories
- Detecting events for explicit event categories
- Creating user explicit events
- Starting time-based event detection
- Configuring the EventDetectionScheduleController
- Configuring the notification topic
- Chapter 32. Setting and administering the security service
- Configuring the security service
- Understanding the Security Data Manager
- Configuring the user management run time API
- Understanding the runtime security service
- Understanding the default transaction authorization provider
- Configuring LDAP transaction authorization providers
- Configuring a custom transaction authorization provider
- Using a custom authentication assertions parser
- Chapter 33. Controlling the visibility and accessibility of data
- Chapter 34. Using the Configuration and Management components
- Understanding configuration
- Learning the Configuration and Management architectural overview
- Understanding the stand-alone enterprise application
- Understanding J2EE clustered enterprise application
- Understanding custom clustered enterprise application
- Understanding configuration definitions and schemas
- Understanding Configuration and Management database structure
- Using the Application Configuration Client
- Understanding the Configuration class
- Understanding configuration methods
- Understanding the ConfigContext class and public Node getConfigItemsMap() method
- Adding configuration nodes and items
- Broadcasting configuation changes
- Working with configuration data
- Understanding configuration elements in the Configuration and Management component
- Chapter 35. Validating data
- Understanding the Validate() method process
- Understanding external validation
- Learning external validation types
- Understanding external validation execution sequence
- Understanding validation database tables
- Understanding external validation rules
- Understanding recursive validation against an object graph
- Excluding validation for a specific transaction
- Example: Using external validations
- Understanding internal validation process
- Understanding business key validation
- Customizing business key validation
- Chapter 36. Paginating search results
- Chapter 37. Customizing task management
- Chapter 38. Understanding Multi time zone deployment
- Chapter 39. Implementing the Entity Standardization framework
- Chapter 40. Implementing and configuring the Notification Framework
- Chapter 41. Understanding the PIMDataTransformer module
- Chapter 42. External rules for the Platform domain
- Chapter 43. Learning the platform domain configuration elements
- Part 2. Introduction to the Party domain
- Chapter 44. Configuring Suspect Duplicate Processing
- Suspect category names and descriptions
- Suspect Duplicate Processing configuration points
- Configuring SDP on or off
- Configuring Persist Duplicate Parties on or off
- Customizing critical data elements
- Customizing matching matrices
- Customizing searching and matching
- Customizing adjustments to Party Matching
- Customizing the action to take when suspect duplicates are found
- Configuring SDP notifications
- Configuring real-time and offline SDP using InfoSphere MDM Server Evergreening
- Configuring Acxiom AbiliTec integration with SDP
- Configuring IBM Information Server QualityStage integration for SDP
- Wholly replacing the Suspect Duplicate Processing implementation
- Configuring external rules for SDP
- InfoSphere MDM Server party matching matrices for suspect duplicate processing
- Configuring Critical Data Change processing
- CDC configuration points
- Configure CDC processing on or off
- Customizing critical data elements
- Bypassing CDC processing
- Customizing the types of critical data changes allowed in a CDC request
- Determining which business objects have pending critical data changes
- Defining which business objects always use CDC
- Defining which business objects are updated when pending changes are accepted
- Define how suspects are re-identified when pending changes are accepted
- Chapter 45. Configuring Party Search
- Party search features
- Party search activity flow
- Configuring and customizing Party Search features
- Configuring Common Search Exclusion
- Configuring the Maximum Search Result Limit
- Customizing the InfoSphere MDM Server search strategy
- Configuring internal search operations
- Configuring SQL searches in InfoSphere MDM Server
- Configuring search result sorting and ranking
- Excluding name standardization during search
- Configuring the standardized or nickname search
- Customizing phonetic searches
- Customizing phonetic key generation
- Applying configuration settings for phonetic search
- Populating the phonetic key with a batch utility
- Configuring minimum wildcard search length validation
- Chapter 46. Standardizing name, address, and phone number information
- Chapter 47. Customizing Summary Data Indicators
- Chapter 48. Customizing Party Privacy
- Chapter 49. Customizing Campaigns
- Chapter 50. Configuring the Know Your Customer compliance feature
- Understanding Know Your Customer compliance transactions
- Extending the Know Your Customer compliance feature
- Configuring Know Your Customer compliance external validation rules
- Configuring Know Your Customer compliance business logic external rules
- Configuring Know Your Customer compliance business key validations
- Configuring Event Manager for Know Your Customer compliance
- Understanding compliance requirements for deleting parties
- Chapter 51. Configuring Party Demographics
- Chapter 52. Customizing Party Life Events
- Chapter 53. Deleting party information from InfoSphere MDM Server
- Chapter 54. Integrating IBM InfoSphere Information Server QualityStage with InfoSphere MDM Server
- Prerequisites for activating QualityStage features in InfoSphere MDM Server
- Activating QualityStage features in InfoSphere MDM Server
- Configuration settings for QualityStage and InfoSphere MDM Server
- Configuring security enabled servers
- QualityStage name and address standardization in InfoSphere MDM Server
- Using QualityStage in Suspect Duplicate Processing
- Customizing services that use InfoSphere Information Server Web services
- Chapter 55. Integrating AbiliTec with InfoSphere MDM Server
- Definitions of terms used when discussing AbiliTec integration
- References for more AbiliTec information
- About the Refresh AbiliTec link
- Configuring AbiliTec in InfoSphere MDM Server
- Customizing and extending the AbiliTec link in InfoSphere MDM Server
- Evergreening the Abilitec link
- Configuring the AbiliTec link
- Modifying the Evergreening rules
- Modifying InfoSphere MDM Server extensions for Evergreening
- The AbiliTec link in Suspect Processing
- Manual AbiliTec link management
- Refresh AbiliTec link sample XML
- Chapter 56. Integrating Dun & Bradstreet with InfoSphere MDM Server
- D&B matching integration scenario
- Matching profiles and file layouts for D&B integration
- Running the InfoSphere MDM Server batch matching process
- Customizing the behavior of the refreshPartyExtIdentification transaction for D&B integration
- Customizing external business rules for D&B integration
- Customizing the D&B Accessor
- Chapter 57. Integrating Entity Analytic Solutions products with InfoSphere MDM Server
- Chapter 58. External rules for the Party domain
- Chapter 59. Party domain configuration elements
- Part 3. Introduction to the Product domain
- Chapter 60. Configuring the product type hierarchy
- Chapter 61. Configuring product structures and relationships
- Chapter 62. Managing product data in multiple languages
- Chapter 63. Managing product terms and conditions
- Chapter 64. Configuring product category attributes
- Chapter 65. External validators for products
- Chapter 66. Configuring Product Search
- Chapter 67. Managing product suspects and product data stewardship
- Chapter 68. External rules for the Product domain
- Chapter 69. Product domain configuration elements
- Part 4. Introduction to the Account domain
- Chapter 70. Entity model for the Account domain
- Chapter 71. Managing terms and conditions for agreements
- Chapter 72. External validators for the Account domain
- Chapter 73. Example of how to use managed accounts
- Chapter 74. Agreement business services
- Chapter 75. External rules for the Account domain
- Chapter 76. Account domain configuration elements
- Chapter 77. Product information and support
- Part 5. Appendixes
- Appendix A. Notices
- Appendix B. Trademarks
- Index