TK-Mail Installation Manual

table of contents

(main)


CHAPTER 9

INSTALLATION AND MAINTENANCE


The requirements for installation and maintenance of TK-MAIL are very simple and straight forward.
STORAGE REQUIREMENTS The current version of TK-MAIL is composed of 59 standard MUMPS routines requiring approximately 133,000 bytes for storage of the source code.

In addition, TK-MAIL requires the presence of TKWRITER to provide text editing and document printing. If not already present, an additional 53 routines requiring approximately 150,000 bytes of storage for source code will be required.

Of course where compilation is available, additional space will be required for object code.

The TK-MAIL database is kept in a file (global) named ^TKMAIL. The initial size and growth potential of this global is site specific and therefore unpredictable. Its size at any point in time depends on the number of users and the number, type and content of the mail it contains.

TK-MAIL is designed to be as efficient as possible with regard to document storage. No more than one physical copy of any memorandum is ever created, regardless of the number of persons to whom it was sent.

Clearly, however, frequent purging of unnecessary mail should be encouraged by each user to prevent unnecessary disk utilization. In addition, regular monitoring of disk growth by system managers is strongly recommended.

LOCAL MEMORY TK-MAIL has been designed to run in a relatively small user partition -approximately 7 KB. Systems which do not impose fixed partition sizes will have no problems. Systems with fixed partition sizes may begin experiencing local memory problems when partition sizes are less than 6.5 K.
INITIALIZATION This manual assumes that you have already loaded the TK-MAIL programs onto your system and are ready to get started. You will have noticed, then, that all TK-MAIL programs begin with the letters TKMA.

Although TK-MAIL is distributed in program form, it does build and maintain several files. By convention, these files also begin with the letters TKMA . When the installation is completed, the only file that will remain is ^TKMAIL.

In order to begin, invoke the initialization program by executing the following instructions

DO ^TKMAINIT


NOTE: If this is the first time PG&A software has been used on your system, you will first be taken through the Toolkit Initialization which defines operating system and terminal type parameters. Re- fer to Appendix A for more information on the init- ialization process.

The TK-MAIL Initialization screen will be displayed a facsimile of which is shown below.


NOTE: The TK-MAIL Initialization Program erases any existing information in the mail file. Proceed to initialization only if it has not yet been run, or you wish to clean it out and begin again.

QUIT or PROCEED ? The initialization program provides an opportunity to quit without affecting the TK-MAIL database. If this is a first-time initialization or you want to erase the files and begin again, move the highlighted bar to PROCEED and press [RETURN].

If you're wondering how to move the highlighted bar, you can use the [SPACE] key, cursor [LEFT] and cursor [RIGHT] keys, or type [P].

System Linkage As suggested by the Initialization Screen, TK-MAIL can be linked to TK-GUARDIAN or other security systems, or can be used standalone. When linked, TK-MAIL identifies users from the contents of a link variable which is defined in the next step.

If used standalone, TK-MAIL will request each user to identify themselves using a password assigned to them in the user maintenance routines.

Select the type of linkage desired by moving the highlighted bar to the desired selection and press [RETURN].

Link Variable As suggested above, many applications which provide logon security maintain a local variable in the user partition which identifies the user and often the user's security clearance information. Enter the name of that variable here. Further discussion of this linkage is provided later.

Encryption Keyword TK-MAIL uses a keyword-based encryption algorithm to encrypt passwords and confidential documents. This protects them from discovery by technicians which are able to view these files.

Enter a keyword or phrase in this field. Only upper case alphabetic characters, numerics, space and punctuation characters will be accepted.

Once initialization has taken place, this keyword cannot be changed, and is therefore not displayed or edited anywhere else in the system.

Last Chance When the fields discussed above have been properly filled in, the initialization program will provide one last chance to abort the process with the message at the botton of the following screen:

Press P and [RETURN] to build the TK-MAIL database. During the process, the initialization program will display status messages which indicate its progress. The complete procedure should take only a few seconds.

USER MAINTENANCE TK-MAIL creates a mailbox for each user with access to the system with a user maintenance program.

If your system has implemented TK-GUARDIAN and you selected a linkage to it when you initialized TKMAIL, then TK-MAIL will automatically us the user files created and maintained by TK-GUARDIAN. Refer to your TK-GUARDIAN manual for details regarding maintaining user information. The remainder of this section is not for you.

If you have not implemented TK-GUARDIAN, or elected not to interface TK-MAIL to it when you initialized TK-MAIL, then you will need to create and maintain a user file using the utility described in the next several pages.

If you are interfacing TK-MAIL to your own security system, pay special attention to the section which describes the link variable.

All user maintenance is performed using a utility which can be invoked by the following expression:

DO ^TKMAMU
When invoked, a screen resembling the example shown below will be displayed.

This is the user lookup screen. Your cursor, although not shown in the illustration will be right under user name.

Find User To find a user, enter as much of the user's last name as desired and press [RETURN]. TK-MAIL will present a list of all the user names which match what you entered. For example, if you entered an "A" as shown in the example below, a list of all names beginning with "A" will be displayed and a pointer provided with which to select one of them.

To view a list of all users, type a [*]. No [RETURN] is necessary.

Add User If no users are found which match the name to search for which you entered, or if you press the EXIT key indicating that the name you are looking for is not on the list, you will be asked whether this user should be added. Answer by typing a [Y] or [N] for YES or NO respectively. Do not be concerned if the name being added is not accurate.

The following sample screen illustrates how this will look.

Whether you found and selected a user already in the TK-MAIL file, or you elected to add one, you will be brought to a screen, an example of which is provided below.

User Name The name of the TK-MAIL user can be edited at any time on this screen. Whether you are adding a new user, correcting a name, or updating the system to reflect a name change, enter the name the way you would like it to appear in the system and press [RETURN].


NOTE: TK-MAIL stores names in a LAST,FIRST format and no provision is made for suffixes such as MD, PHD or II. You may enter the name in a FIRST LAST format as long as you do not include a comma in it. The name will be automatically reversed when you press [RETURN].

Status A user should be initially made ACTIVE by typing an [A] in this field. This enables the user to sign in and enables other users to address mail to this user.

However, if for any reason such as the user's departure, it becomes necessary to inactivate the user, simply type an [I] in this field.

Password Users must be assigned a unique password with which TK-MAIL can identify them and open their mail box. The password can be changed at any time, but must always be present if the user is to sign on.

Enter any alphanumeric password of up to ten characters in length and press [RETURN]. TK-MAIL will force uppercase. Should you enter a password which is already in use by another user, TK-MAIL will beep and not allow you to leave the field until an acceptible password has been entered.

Department When selecting addressees mail, TK-MAIL enables selection by department. Enter any department name or abbreviation of up to 9 characters in length. The use of this feature is completely optional.

It is a good idea to standardize your department names if you use this feature to make it easier for users to find the names of those to whom they wish to send mail.

Link Identifier As described earlier, TK-MAIL can be interfaced to any security system which can provide a unique value for each user with which to identify them.

If, during initialization of TK-MAIL, you entered the name of the link variable , then you must enter the value that variable will contain for this user here. This creates a cross-reference table with which TK-MAIL can relate the user identifier provided by your security system with the mailbox assigned to the user in TK-MAIL.