Before you can run TES, you need to run through the licensing procedure. This applies whether you are just trying out the software, or have already decided to implement TES.
Registering the license for TES is done from the Tidal Web client.
Note Before you start the licensing procedure, set the system queue to 0. Select Queues> System Queue, and set the value to 0. This will stop all jobs from launching. Wait until all running jobs have completed.
To license with a Full license:
Step 1 Stop the master. You must stop the master before you can load a license file. An error message will display if you attempt to load a license while the master is still running.
a. Click Start and select Programs > TIDAL Software > Scheduler > Master > Service Control Manager.
b. Verify that the master is displayed in the Service list and click the Stop button to stop the master.
Enter tesm stop.
Step 2 Rename your Full license file to master.lic.
Note If you are applying a demo license, name the file demo.lic.
Ensure that the file has a.lic extension.
Step 3 Place the file in the C:\Program File\TIDAL\Scheduler\Master\config directory.
Step 4 Restart the master:
- For Windows, restart the master by clicking Start in the Service Control Manager.
- For Unix, restart the master by entering tesm start.
The master will read and apply the demo code when it starts.
Defining a Security Policy
Though six predefined security policies are available for immediate assignment to users, an administrator can create new security policies as the need arises.
Step 1 From the Navigator pane, select Administration > Security Policies to display the Security Policies pane with all existing security policies listed. If security policies do not appear, you do not have the appropriate rights to view security policies.
Step 2 Click the Add button add.gif or right-click and choose Add Security Policy from the context menu to display the Security Policy Definition dialog.
Step 3 In the Security Policy Name text field, enter the name of the security policy. The name must be unique and the length must not exceed 30 characters.
Step 4 Click the Functions page and select the functions to assign to the security policy. For more information on how to assign functions, see the to assign functions to a security policy procedure.
Step 5 Click the Description page and type a description for the security policy, up to 255 characters.
Step 6 Click OK to close the security policy and add it to the security policy is added to the Scheduler database. The security policy can now be assigned to users.
Adding a User
Adding Runtime Users
To add a Runtime user:
Step 1 From the Navigator pane, select Administration > Runtime Users to display the Runtime Users pane.
Step 2 Click the Add button or right-click in the Navigator pane and select Add Runtime Users from the context menu to display the User Definition dialog.
Step 3 If this is a new user definition, enter the new user name in the User Name field.
Step 4 For documentation, enter the Full Name or description associated with this user.
Step 5 In the Domain field, select a Windows domain associated with the user account required for authentication, if necessary.
Step 6 In the Windows/FTP Password field, enter the password for the user account provided by the Administrator.
Step 7 In the Confirm Password field, retype the password.
Step 8 If the passwords entered in the Windows/FTP Password and Confirm Password fields do not match, you must re-enter the password in both fields.
Step 9 Click OK to add or save the user record in the TES database.
Adding Interactive Users
To add an Interactive user:
Step 1 From the Navigator pane, select Administration > Interactive Users to display the Interactive Users pane listing all TES users.
If the TES users do not appear, you do not have the appropriate rights to view users.
Step 2 Double-click the name of an user account that you want to be able to run jobs to display the User Definition dialog.
Step 3 Click the Runtime Users tab in the User Definition dialog and select the check box(es) beside the name(s) of the Interactive user(s) you want to include in this TES users authorized user list.
Step 4 If you wish to restrict this user’s access to specific servers, click the Agents tab and make the appropriate selections.
Step 5 Click OK.