In the Select Data Source dialog, select the desired data source from a list of defined sources and click OK. User data sources are available only to the user who defined them. For example, consider using a table procedure to navigate a complicated network database. Idle timeouts should generally be shorter the further away from the server they are set, to allow the servers to handle timeout errors more accurately and efficiently. There is also an IdmsDataSource class. You must supply the following essential information to define a new data source or modify. Displays a standard Browse window where you can select the certificate directory.

Uploader: Najas
Date Added: 10 December 2004
File Size: 62.10 Mb
Operating Systems: Windows NT/2000/XP/2003/2003/7/8/10 MacOS 10/X
Downloads: 59084
Price: Free* [*Free Regsitration Required]

CA Mobile Device Management Q1 Getting Started This Documentation, which includes embedded help systems and electronically distributed materials, hereinafter referred to as the Documentation is. ims

CA IDMS Server. User Guide. r17

Preparing for Installation This section contains the following topics: If the application attempts to use the connection after this, the JDBC driver returns a SQLException indicating that a communications error has occurred.

This setting defines how long the task waits for a specific resource, such as a database record. You can define this option in the caidms.

Jpmad4it Yeah thanks Filip, I read online about that being the problem. I am totally hdbc to Java and so the instructions are not making much sense at the moment. All certificate files must be in PEM format.


You can use subschema views that do not include the added fields to minimize changes to programs that do not access the foreign keys. For example, consider using a table procedure to navigate a complicated network database.

CA IDMS Server. User Guide. r17 – PDF

Sign on with a user ID that has administrative authority. You might need to edit the file before running it. You can specify the internal timeout interval that the JDBC server uses when reading from a socket or waiting for a connection request. User data sources are available only to ifms user who defined them.

That way, you only have to check one location, ivms people who volunteer their time to help you can see when you’ve got your answer and better spend their time helping others. The drivers suspend the connection and end the task after most SQL commands.

For example, consider using a view when joining tables using the set-name condition. BATCH Select this setting when the Data Source is to be used by a batch-type application, where pseudo-conversational processing is not used.

Use a combination of letters, numbers, spaces, or special characters. The existing data sources are not changed.

Password Identifies the password used for the client certificate. Use the Automatic Commit option when accessing tables in different page groups.

The ODBC driver does not use this view. This manual and the software described in it are.


The test program connects to the data source using the ODBC driver. The default is the first eight characters of the Data Source. The following table describes how the accounting data can be found: There is a caidms.

Custom Intended for compatibility with previous releases. When the timeout is exceeded, the server assumes that the client no longer needs the connection, possibly because of an error, and frees connection resources in an orderly fashion. It is not supported by the JDBC driver.

Similar Threads

The effective idle time for an application server that uses these or equivalent properties could be as large as the sum of the two intervals. The view definition must include the following columns: Certificate Directory Browse Specifies the name of the certificate directory. Use Accessible Tables View Specifies the name of a view, so that only a list of the tables of interest to the end user is returned. When the value is 0 for a data source, the drivers use the system default, if any.

This option is useful when accessing network databases, where records may be redefined so that decimal fields can contain non-numeric data.