Field
|
Default
|
Description
|
||
Does Your Source Database Use a Non-Default Audit Space?
|
No
|
Select Yes if you have renamed the out-of-the-box tablespace named “WCAUDIT”. Select No if you have not renamed “WCAUDIT”.
|
||
What is the Name of Audit Table Space?
|
This property is disabled if you select No for the previous property. If you select Yes for the previous property, enter the name of your audit tablespace.
|
|||
Run Upgrade to Completion
|
No
|
Select Yes if this is a test upgrade. This allows the test upgrade to continue if a migrator fails.
All upgrade phases are dependent on the successful completion of previous upgrade phases. A failure in one phase causes the upgrade to halt and the issues must be addressed before beginning the upgrade process again. During a test upgrade, it is often helpful to run the upgrade to completion in order to discover as many issues as possible and address them, reducing the overall time necessary to complete test upgrades. In this mode, if a migrator from an upgrade phase that depends on a migrator from another phase that has failed, the dependent migrator is skipped and the phase is marked Incomplete.
Run Upgrade to Completion is not available for a production upgrade.
|
||
Enable Modify Security Labels permission migrators
|
Yes
|
Select Yes to enable migrators to add Modify Security Labels permission to the existing access control rules that include the permission you specify. These migrators affect policy and ad hoc access control rules currently in effect in Windchill. They also affect rule definitions in container, lifecycle, and workflow templates.
For details about this new feature, see Manage Security UI Component Migrators.
|
||
Modify Security Labels source permission
|
1
This default value corresponds to the Modify permission
|
If you enable Modify Security Labels permission migrators in the previous option, provide one of the permission keys defined in the wt.acccess.AccessPermissionRB.rbInfo file (a value of -1, Full Control, is not allowed). Migrators will add the Modify Security Labels permission to each access control rule that includes the specified permission. For example, set this property to 1 for Modify permission (default) or 6 for Administrative permission. Wherever an access control rule is specified granting, denying, or absolutely denying this permission, the new Modify Security Labels permission will be added to the rule. The default setting gives participants the same ability to modify security labels that they had before upgrading.
|
||
Update policy access control rules for the Package Creator role
|
Yes
|
Select Yes to add new policy access control rules for the Package Creator role on the target system . Any policy access rules that existed on the source system for this role are migrated to the target system and maintained, and the new policy access rules are added to them. Select No if you do not want to add the new rules.
|
||
Loads Policy Access Control rules for CAPAActionPlan and CAPAChangeActivity
|
Select Yes to execute a migrator to add policy access control rules in existing quality containers and templates, granting Full control (All) permission to participants CAPAREQUESTER, CAPAREVIEWER, CAPAINVESTIGATOR, and CAPAMANAGER for types CAPAActionPlan and CAPAChangeActivity, and granting Modify permission to CAPAVERIFIER for type CAPAAction Plan, in the container’s Default domain for all states. With these rules, users with all permissions will be able to create actions and initiate them prior to planning state. Users with Modify permission will be able to modify an existing action plan. This migrator modifies existing quality containers and templates to match out-of-the-box rules provided for these participants in new quality templates in Windchill 11.0. For details about this functionality, see the “PTC Windchill CAPA: Access Control Rules” topic in the Windchill New and Changed for This Release documentation for Windchill 11.0 F000.
If a policy rule already exists for the same domain, type, state, and participant as one of the new rules, but with different permissions, the migrator will fail.
In addition to executing this migrator to load access control rules to existing containers and templates, to enable this functionality in Windchill, you must perform manual post-upgrade steps to assign appropriate permissions. For more information, see Post Upgrade Steps for Policy Access Control Rules.
If you choose not to execute this migrator, to enable this functionality in Windchill, you must manually load the access control rules for CAPAActionPlan and CAPAChangeActivity objects. For more information, see the “PTC Windchill CAPA: Access Control Rules” topic in the Windchill New and Changed for This Release documentation for Windchill 11.0 F000.
|
|||
Loads Policy Access Control Rules for CEDecontamination
|
Select Yes to execute a migrator to add policy access control rules in existing quality containers and templates, granting Full Control (All) permission to participants Customer Experience Product Receiver and Customer Experience Manager, and granting Read permission to Team Members, for type CEDecontamination (Returned product processing) in the container’s Default domain. This migrator modifies existing quality templates to match out-of-the-box rules provided in new quality templates in Windchill 11.0. For details about these rules, see the “PTC Windchill Customer Experience Management: Access Control Rules” topic in the Windchill New and Changed for This Release documentation for Windchill 11.0 F000.
In addition to executing this migrator to load access control rules to existing containers and templates, to match out-of-the-box rules in Windchill, you must perform manual post-upgrade steps to assign appropriate permissions. For more information, see Post Upgrade Steps for Policy Access Control Rules.
Additionally, after this migrator executes, “Customer Experience Product Receiver” has “All” permissions on CEDecontamination (Returned product processing). There is already a rule at site level to grant All permissions to users on this object. If you want only “Customer Experience Product Receiver” to have All permissions to this object, and no one else, delete the existing rule at the site level in Policy Administration.
If you choose not to execute this migrator, to match out-of-the-box rules in Windchill, you must manually load the access control rules for CEDecontamination (Returned product processing) objects. For more information, see the “PTC Windchill Customer Experience Management: Access Control Rules” topic in the Windchill New and Changed for This Release documentation for Windchill 11.0 F000.
|
|||
Loads Policy Access Control rules for FailureMode and FailureEffect
|
Select Yes to execute a migrator to enable new functionality related to new Failure Modes and Failure Effects. This migrator adds policy access control rules in existing quality containers and templates, granting the following permissions:
• To the group Reliability Engineer, Full Control (All) permission is granted for types FailureMode, FailureEffect, PredictedFailureMode, PredictedEffect, and PredictedFailureRate; and Read permission is granted for type ExperiencedEffect
• To the group Team Members, Read permission is granted for types FailureMode, FailureEffect, PredictedFailureMode, PredictedEffect, and PredictedFailureRate; and Read, Create, Modify, Delete permissions are granted for the type ExperiencedEffect.
• To the group This Org, Read permission is granted for types FailureMode, FailureEffect, PredictedFailureMode, PredictedEffect, PredictedFailureRate, and ExperiencedEffect.
If a policy rule already exists for the same domain, type, state, and participant as one of the new rules, but with different permissions, the migrator will fail.
For more information about this functionality, see the “Failure Effects and Failure Modes” topic in the “Windchill Quality Solutions” section of the Windchill Help Center.
If you choose not to execute this migrator, to enable this functionality in Windchill, you must manually set the above permissions in the target system after the upgrade is complete. This includes creating the RELIABILITYENGINEER role that is associated with the Reliability Engineer group.
|
|||
Partslink publishrule
|
Enter the property value for the Partslink publishing rules to migrate the rules to the target system. Refer to the com.ptc.windchill.partslink.publisher.publishrule property in the WT.properties file on the source system for the property value. If you do not indicate a value, the default global publish rules are migrated to the target system.
|
|||
Change Object Template Policies
|
Yes
|
Select Yes to update the policies of the change objects on the target system to allow all users read and download permissions in the System domain for the Site and all Organizations. The policies for reading, creating, and modifying change objects are configured in the Default domain for the delivered change objects.
Select No to manually update policies for change object templates in the target system post-upgrade. For more information, see the Updating Policies for Change Notice Templates topic in the Windchill Help Center.
|
||
Index Enabled
|
If you have Index Search installed on the source system, type a value of true to retain the policy rules on the target system. Type a value of false if Index Search is installed, but not used. Specifically, if the value is true existing wblib policy rules are retained and clflib rules are converted to wblib rules. If the value is false, existing wblib policy rules are deleted and clflib rules are converted to wblib rules.
|
|||
Enable migrator to add the required permissions (MODIFY and SET_STATE) to the Content ref that will allow S1000D Author users to create illustrations
|
No
|
For environments that include Windchill Service Information Module for S1000D, select Yes to modify access permissions for the Author group in the Default domain for the Service Information Manager Content Holder. Changes in Windchill 11.0 require users to have additional permissions for the Content Holder type in order to create or modify an Information Control Number (ICN). These permissions are needed if members of the Author group create illustrations in Windchill or Arbortext Editor using the Windchill Adapter. The migrator modifies policy access control rules to add permissions for the Content Holder type that are necessary for members of the Author group to create or modify an ICN for an S1000D product at Windchill 11.0 and have corresponding changes made to its associated illustration Content Holder, ensuring that the Information Structure is accurate.
A value of Yes specifies that members of the Author group will be granted Modify and Set State permissions, in addition to any permissions previously granted, on the Default domain of existing products for type Content Holder (com.ptc.sis.ContentRef), which represents the illustration content, in all life cycle states. Specifically, the migrator checks policy access control rules for the ContentRef type, for all life cycle states, in the Default domain of each product and performs the following modifications:
• If there are such existing access control rules for the Author group, the migrator ensures each rule includes Modify and Set State permissions.
• If there are no such access control rules for the Author group, one is created for each product to specify Read, Download, Create, Modify, and Set State permissions for the ContentRef type in the Default domain.
|