Kofax TotalAgility Best Practices Guide Kofax TotalAgility Best Practices Guide...

download Kofax TotalAgility Best Practices Guide Kofax TotalAgility Best Practices Guide ¢â‚¬¢ Kofax Analytics

of 79

  • date post

    31-Jul-2020
  • Category

    Documents

  • view

    16
  • download

    0

Embed Size (px)

Transcript of Kofax TotalAgility Best Practices Guide Kofax TotalAgility Best Practices Guide...

  • Kofax TotalAgility Best Practices Guide Version: 7.5.0

    Date: 2018-06-12

  • © 2018 Kofax. All rights reserved.

    Kofax is a trademark of Kofax, Inc., registered in the U.S. and/or other countries. All other trademarks are the property of their respective owners. No part of this publication may be reproduced, stored, or transmitted in any form without the prior written permission of Kofax.

  • Table of Contents Preface...........................................................................................................................................................7

    Related documentation.......................................................................................................................7 Training............................................................................................................................................... 8 Get help for Kofax products...............................................................................................................8

    Chapter 1: Deployment topologies......................................................................................................... 10 Combined Web Application and Kofax TotalAgility Windows services............................................ 10 Separate tiers for Web and App...................................................................................................... 11 Combined Web App with separate App Servers running the Kofax TotalAgility Windows services...12 Separate tiers for Web, Core services App and Kofax TotalAgility Windows services App..............13 High availability and scaling.............................................................................................................14

    High availability......................................................................................................................14 Scaling....................................................................................................................................15

    Chapter 2: Performance........................................................................................................................... 16 Database...........................................................................................................................................16 Form..................................................................................................................................................20 Process............................................................................................................................................. 21 System Monitoring............................................................................................................................ 21 Capture Client...................................................................................................................................21

    Chapter 3: Configure Transformation Server instances when processing push activities............... 22 Chapter 4: Security................................................................................................................................... 23

    Protect data at rest...........................................................................................................................23 Protect data in transit....................................................................................................................... 23 Privileges...........................................................................................................................................23 Serve internal and external users.................................................................................................... 24 Protection against uploading malicious files in Scan Client.............................................................24 Server hardening.............................................................................................................................. 25 Protection against malicious database connections and web service URLs................................... 26

    Chapter 5: Database................................................................................................................................. 27 Sizing................................................................................................................................................ 27 Deployment....................................................................................................................................... 27 Memory............................................................................................................................................. 28 Maintenance......................................................................................................................................28 Resiliency..........................................................................................................................................28 MSDTC............................................................................................................................................. 29

    3

  • Kofax TotalAgility Best Practices Guide

    Chapter 6: Solution building....................................................................................................................30 System settings................................................................................................................................ 30

    Session ID..............................................................................................................................30 Allow Multiple Logons............................................................................................................30 Password Format...................................................................................................................31 Password Hashing Algorithm................................................................................................ 31 Allow Duplicate Email Addresses..........................................................................................31 Disable Logon without Password.......................................................................................... 31 Timeouts.................................................................................................................................32 Write to Audit Log..................................................................................................................32 Archive Finished Jobs........................................................................................................... 33 Reporting................................................................................................................................33 Form Cache........................................................................................................................... 33 Refresh Durations..................................................................................................................34 Business Calendar.................................................................................................................34 Skill Level...............................................................................................................................34 Exception Handling................................................................................................................34 Retention Policies.................................................................................................................. 35 Account Lockout Policy......................................................................................................... 35 Password Reset.....................................................................................................................35

    Configuration management for team based deployment.................................................................36 Shared deployment environment...........................................................................................36 Standalone deployment environment.................................................................................... 37 Promote new releases to new environments........................................................................38

    Resources......................................................................................................................................... 38 Access permissions............................................................................................................... 38 Activity allocation................................................................................................................... 39

    Building processes............................................................................................................................40 Case versus process.............................................................................................................40 Fragment versus process...................................................................................................... 41 General practices...................................................................................................................41

    Building forms................................................................................................................................... 46 Suitability of using forms....................................................................................................... 46 Design guidelines...................................................................................................................47 Combin