Configure the AEM forms that are part of an archive file
- In administration console, click Services > Applications and Services > Application Management and click thearchives tab.
- On the Archive Management page, select the archive file to configure.
- On the View Archive page, select the highlighted archive resource.
- Configure the imported process archive file.
Use the configuration wizard to configure the AEM forms that are part of an archive file
-
In administration console, click Services > Applications and Services > Application Management and click thearchives tab.
-
Click Configure next to the archive file to configure.
-
The Configure Endpoints page appears, where you can make any changes that you require:
- To rename an endpoint or edit its description, click it.
- To add a Task Manager endpoint, click Add TaskManager. For details about the Task Manager settings, see Configuring Task Manager endpoints.
- To add a Watched Folder endpoint, click Add WatchedFolder. For details about the Watched Folder settings, see Watched folder endpoint settings.
- To add an Email endpoint, click Add Email. For details about the Email settings, see Email endpoint settings.
- To add an EJB endpoint, click Add EJB and specify a name and description for the endpoint.
- To add a SOAP endpoint, click Add SOAP and specify a name and description for the endpoint.
- To add a Remoting endpoint, click Add Remoting. For details about the Remoting settings, see Remoting endpoint settings.
- To add a REST endpoint, click Add REST and specify a name and description for the endpoint. Note the REST invocation URL displayed on the Add REST Endpoint page.
- To remove an endpoint, select the checkbox next to it and click Remove.
-
Click Next.
-
If a process or service in the LCA has configuration parameters, a Configure Parameters page appears, where you configure the service parameters and click Next.
-
On the Configure Security Profile page, you can make any changes that you require:
-
Require callers to authenticate: This setting indicates whether the service can be invoked with or without credentials.
If Callers are currently required to authenticate is displayed, the caller of the service must be authenticated and the user principal for that caller must be authorized to invoke the service; otherwise, the invocation attempt will be refused. To remove the need to authenticate, click Allow Unauthenticated Callers.
If Callers are not required to authenticate is displayed, the caller of the service may or may not be authenticated. The invocation of the service will always succeed because there is no authorization check. To require authentication, click Require Callers to Authenticate.
-
Run As: Specifies run-time identity used by a service after it has been invoked. To change this option, click Change. Choose from the following options:
Unspecified: The default behavior is used.
Invoker: Uses the same identity as the user who invoked the service.
System: Runs the service with full privileges. This is the default setting for long-lived processes.
Named User: Enables you to run the service as a specific user. This is the default setting for short-lived processes. When you select this option, click Select User to display the Select Principal page, where you can search for and select the user.
-
To add a principal to the security profile, click Add Principal and select the user or group to add as a principal. Click Next and then select the permissions you want to assign to this principal:
INVOKE_PERM: To invoke all operations on the service
MODIFY_CONFIG_PERM: To modify the configuration of a service
SUPERVISOR_PERM: To view process instance data for a service that is created from a process
START_STOP_PERM: To start and stop a service
ADD_REMOVE_ENDPOINTS_PERM: To add, remove, and modify endpoints for a service
CREATE_VERSION_PERM: To create a version of the service
DELETE_VERSION_PERM: To delete a version of the service
MODIFY_VERSION_PERM: To modify a version of the service
READ_PERM: To view the service
Click Finished to add the principal to the security profile.
-