Importing and managing applications and archives

Import and manage applications

In AEM forms, an application is a container for storing assets that are required for implementing a AEM forms solution. Examples of assets are form designs, form fragments, images, processes, DDX files, form Guides, HTML pages, and SWF files. During the development phase of a project, Workbench users can deploy applications directly from the Applications view in Workbench. Once deployed, these applications appear in administration console, on the Applications tab on the Application Management page.

When an application is complete and ready for deployment to a production server, the Workbench user packages the application into a AEM forms application file (.lca). Then an administrator uses administration console to import and deploy the application file, using the Applications tab on the Application Management page.

You can also use thearchives tab on the Application Management page to import LCAs that were created using workbench 8.x.

Note: There is a known issue that LCA files from a future release are not necessarily backward compatible. While it may be possible to view and import LCA files from a future release of AEM forms (for example, a preview release), doing so is not supported and may result in aberrant behavior.

Use the Applications tab to import and manage applications that were created in Workbench. Application administrators can also export the runtime configuration for an application. Exporting the runtime configuration eliminates the need to manually reconfigure settings in the production environment before starting deployed applications. The runtime configuration file contains:

  • service configuration settings

  • pool configuration settings

  • endpoint configuration settings

  • security profiles

Import an application or archive

  1. In administration console, click Services > Applications and Services > Application Management.

  2. Click Import.

  3. Click Browse and select the .lca file to import and click Preview. The Preview Application page displays information about the application.

  4. (Optional) To see a list of the assets contained in the application, click View Assets.

  5. (Optional) To deploy the assets to the runtime, select Deploy Assets To Runtime When Import Is Complete. If you do not select this option, you can deploy the assets later.

  6. Click Import. The application appears on the Applications tab.

  7. Log into the CRX repository with administrator credentials.

  8. Navigate to content/dam/lcapplications

    Note: The imported applications display in the lcapplications node.
  9. Click on one of the imported applications.

    The Properties tab on the right displays the properties of the selected CRX node.

    The syncState property indicates the state of synchronization of data between the AEM forms server and the CRX repository. As soon as the import process begins this state is set to 0 (zero). This state indicates the data is currently not synchronized. When the data is synchronized, the state is set to 1.

Deploy an application

You can deploy applications that you have imported, or that Workbench users imported from Workbench.

  1. In administration console, click Services > Applications and Services > Application Management.

  2. Select the checkbox next to the application that you want to deploy and click Deploy.

  3. Click OK in the confirmation dialog box that appears.

Undeploy an application

You can undeploy applications from the runtime.

  1. In administration console, click Services > Applications and Services > Application Management.

  2. Select the checkbox next to the application that you want to undeploy and click Undeploy.

  3. Click OK in the confirmation dialog box that appears.

Remove an application from the server

Undeploy the application before removing it from the server.

  1. In administration console, click Services > Applications and Services > Application Management.

  2. Select the checkbox next to the application that you want to remove and click Remove.

  3. Click OK in the confirmation dialog box that appears.

Import an application’s runtime configuration

If an application administrator exported the runtime configuration for an application, you can import it into the deployed application. You can import it using either the administration console or via scripted LCA deployment.

  1. In administration console, click Services > Applications and Services > Application Management.

  2. Click the name of the application.

  3. Click Import Runtime Config.

  4. Click Browse and select the XML file that contains the runtime configuration.

  5. Click Import.

Export an application’s runtime configuration

You can export the runtime configuration information for deployed applications.

  1. In administration console, click Services > Applications and Services > Application Management.

  2. Click the name of the application.

  3. Click Export Runtime Config and save the configuration file (XML) that is produced.

Scripted deployment of AEM forms applications

You can also use a scripted deployment tool to deploy application files, including a settings.xml file that specifies the following settings:

  • service configuration settings

  • pool configuration settings

  • endpoint configuration settings

  • security profiles

Scripted deployment eliminates the need to manually reconfigure settings in the production environment before starting deployed applications.

  1. From a command prompt, navigate to [aem-forms root] /sdk/misc/Foundation/ArchiveManagement.

  2. Review the ReadMe.txt file for more detailed instructions.

  3. Manually modify the scriptedDeploy.bat and sample-files/sample.xml files as described in the readme.txt file.

  4. Run the scriptedDeploy.bat file. This action deploys the AEM forms archive file with the override settings.

Import and manage archives

Use the archives tab to import and manage LCAs that were created in workbench.

Import an archive

  1. In administration console, click Services > Applications and Services > Application Management and click thearchives tab.

  2. Click Import.

  3. Click Browse to locate the archive to import, and then click Preview.

  4. Review the list of resources and objects that will be installed with the archive. Ensure that there are no conflicts with existing resources, objects, and service configurations because no undo capability is available.

    If you select to import the service configurations, AEM forms imports all of the process configuration files (endpoints, security profiles, and service configuration parameters) used by the processes in the LCA.

  5. Click Import.

  6. Review the import results and either click Skip Configuration to finish the import process or click Configure to configure the archive.

    Note: If you click Skip Configuration, you can configure the archive later.
  7. If you click Configure, the Configure Endpoints page appears, where you can make any changes that you require:

    • To rename an endpoint or edit its description, click it.

    • To add a Task Manager endpoint, click Add TaskManager. For details about the Task Manager settings, see Configuring Task Manager endpoints .

    • To add a Watched Folder endpoint, click Add WatchedFolder. For details about the Watched Folder settings, see Watched folder endpoint settings .

    • To add an Email endpoint, click Add Email. For details about the Email settings, see Email endpoint settings .

    • To add an EJB endpoint, click Add EJB and specify a name and description for the endpoint.

    • To add a SOAP endpoint, click Add SOAP and specify a name and description for the endpoint.

    • To add a Remoting endpoint, click Add Remoting. For details about the Remoting settings, see Remoting endpoint settings .

    • To add a REST endpoint, click Add REST and specify a name and description for the endpoint. Note the REST invocation URL displayed on the Add REST Endpoint page.

    • To remove an endpoint, select the checkbox next to it and click Remove.

  8. Click Next.

  9. If a process or service in the LCA has configuration parameters, a Configure Parameters page appears, where you configure the service parameters and click Next.

  10. On the Configure Security Profile page, make any changes that you require:

    • Require callers to authenticate: This setting indicates whether the service can be invoked with or without credentials.

      If Callers are currently required to authenticate is displayed, the caller of the service must be authenticated and the user principal for that caller must be authorized to invoke the service; otherwise, the invocation attempt will be refused. To remove the need to authenticate, click Allow Unauthenticated Callers.

      If Callers are not required to authenticate is displayed, the caller of the service need not be authenticated. The invocation of the service will always succeed because there is no authorization check. To require authentication, click Require Callers to Authenticate.

    • Run As: Specifies run-time identity used by a service after it has been invoked. To change this option, click Change. Choose from the following options:

      Unspecified: The default behavior is used.

      Invoker: Uses the same identity as the user who invoked the service.

      System: Runs the service with full privileges. This is the default setting for long-lived processes.

      Named User: Enables you to run the service as a specific user. This is the default setting for short-lived processes. When you select this option, click Select User to display the Select Principal page, where you can search for and select the user.

    • To add a principal to the security profile, click Add Principal and select the user or group to add as a principal. Click Next and then select the permissions you want to assign to this principal:

      INVOKE_PERM: To invoke all operations on the service

      MODIFY_CONFIG_PERM: To modify the configuration of a service

      SUPERVISOR_PERM: To view process instance data for a service that is created from a process

      START_STOP_PERM: To start and stop a service

      ADD_REMOVE_ENDPOINTS_PERM: To add, remove, and modify endpoints for a service

      CREATE_VERSION_PERM: To create a new version of the service

      DELETE_VERSION_PERM: To delete a version of the service

      MODIFY_VERSION_PERM: To modify a version of the service

      READ_PERM: To view the service

      Click Finished to add the principal to the security profile.

  11. Click Finished to complete the configuration.

Configure the AEM forms that are part of an archive file

  1. In administration console, click Services > Applications and Services > Application Management and click thearchives tab.

  2. On the Archive Management page, select the archive file to configure.

  3. On the View Archive page, select the highlighted archive resource.

  4. Configure the imported process archive file.

Use the configuration wizard to configure the AEM forms that are part of an archive file

  1. In administration console, click Services > Applications and Services > Application Management and click thearchives tab.

  2. Click Configure next to the archive file to configure.

  3. The Configure Endpoints page appears, where you can make any changes that you require:

    • To rename an endpoint or edit its description, click it.

    • To add a Task Manager endpoint, click Add TaskManager. For details about the Task Manager settings, see Configuring Task Manager endpoints .

    • To add a Watched Folder endpoint, click Add WatchedFolder. For details about the Watched Folder settings, see Watched folder endpoint settings .

    • To add an Email endpoint, click Add Email. For details about the Email settings, see Email endpoint settings .

    • To add an EJB endpoint, click Add EJB and specify a name and description for the endpoint.

    • To add a SOAP endpoint, click Add SOAP and specify a name and description for the endpoint.

    • To add a Remoting endpoint, click Add Remoting. For details about the Remoting settings, see Remoting endpoint settings .

    • To add a REST endpoint, click Add REST and specify a name and description for the endpoint. Note the REST invocation URL displayed on the Add REST Endpoint page.

    • To remove an endpoint, select the checkbox next to it and click Remove.

  4. Click Next.

  5. If a process or service in the LCA has configuration parameters, a Configure Parameters page appears, where you configure the service parameters and click Next.

  6. On the Configure Security Profile page, you can make any changes that you require:

    • Require callers to authenticate: This setting indicates whether the service can be invoked with or without credentials.

      If Callers are currently required to authenticate is displayed, the caller of the service must be authenticated and the user principal for that caller must be authorized to invoke the service; otherwise, the invocation attempt will be refused. To remove the need to authenticate, click Allow Unauthenticated Callers.

      If Callers are not required to authenticate is displayed, the caller of the service may or may not be authenticated. The invocation of the service will always succeed because there is no authorization check. To require authentication, click Require Callers to Authenticate.

    • Run As: Specifies run-time identity used by a service after it has been invoked. To change this option, click Change. Choose from the following options:

      Unspecified: The default behavior is used.

      Invoker: Uses the same identity as the user who invoked the service.

      System: Runs the service with full privileges. This is the default setting for long-lived processes.

      Named User: Enables you to run the service as a specific user. This is the default setting for short-lived processes. When you select this option, click Select User to display the Select Principal page, where you can search for and select the user.

    • To add a principal to the security profile, click Add Principal and select the user or group to add as a principal. Click Next and then select the permissions you want to assign to this principal:

      INVOKE_PERM: To invoke all operations on the service

      MODIFY_CONFIG_PERM: To modify the configuration of a service

      SUPERVISOR_PERM: To view process instance data for a service that is created from a process

      START_STOP_PERM: To start and stop a service

      ADD_REMOVE_ENDPOINTS_PERM: To add, remove, and modify endpoints for a service

      CREATE_VERSION_PERM: To create a new version of the service

      DELETE_VERSION_PERM: To delete a version of the service

      MODIFY_VERSION_PERM: To modify a version of the service

      READ_PERM: To view the service

      Click Finished to add the principal to the security profile.

Remove an archive

Note: To remove an archive containing assets stored in a third-party repository (EMC Documentum Content Server, IBM FileNet Content Manager, or IBM Content Manager), you must also delete the asset files from the repository using Workbench.
  1. In administration console, click Services > Applications and Services > Archive Management.

  2. On the Archive Management page, select the check box for the archive to remove and click Remove.

Change the number of items displayed on the Applications and Services pages

On the Preferences page, you can control the number of services, endpoints, categories, and archives that are displayed on each of the Applications and Services web pages.

  1. In administration console, click Services > Applications and Services > Preferences.

  2. On the Preferences page, type the number of services, endpoints, categories, and archives that can be displayed on each page, and then click Save.

// Ethnio survey code removed