|
1
|
Select External in the SQL Database > Type list to use a SQL database in an external SQL database server.
|
|
2
|
Select the type of SQL database platform in the Platform list. The supported platforms are:
|
|
1
|
In the Server name field, write the name of the computer that the PostgreSQL® database server process runs on. Defaults to localhost.
|
|
2
|
In the Port field, write the number of the port that the PostgreSQL® database server listens on. Defaults to 5432.
|
|
3
|
In the Database name field, write the name of a SQL database that you want the Model Manager to use.
|
|
4
|
In the Method list, under Authentication, select the method of authentication. Select Password to authenticate using password-based authentication methods. Select Passwordless to authenticate using passwordless authentication methods (for example, SSPI on Windows®).
|
|
5
|
In the Username field, write the username used to authenticate with the PostgreSQL® database server.
|
|
6
|
In the Password field, write the password used to authenticate with the PostgreSQL® database server. This is only available when using password-based authentication methods.
|
|
The Model Manager supports PostgreSQL® version 10.0 and newer.
|
|
1
|
In the Server name field, write the name of the computer that the Microsoft SQL Server® database server process runs on. Defaults to localhost.
|
|
2
|
In the Port field, write the number of the port that the Microsoft SQL Server® database server listens on. Defaults to 1433.
|
|
3
|
In the Database name field, write the name of a SQL database that you want the Model Manager to use.
|
|
4
|
|
5
|
In the Application name field, write an application name to use when connecting to the database.
|
|
6
|
In the TLS encryption menu, select the TLS encryption mode used for the network communication between the Model Manager server and the Microsoft SQL Server® database server. Select Default to use the default mode of the database server, Disabled to not require TLS encryption, Strict to require strict TLS encryption, and Enabled to require non-strict TLS encryption. The strict TLS encryption mode uses version 8.0 of the Tabular Data Stream (TDS) protocol — supported in Microsoft SQL Server® 2022 and newer — allowing for a more secure handshake and supporting TLS 1.3.
|
|
7
|
In the Trust server certificate menu, select the trust mode for the certificate of the database server when TLS encryption is enabled. Select Yes to always trust the certificate. Select No if the Model Manager server must first validate the server certificate for the database server connection to succeed. Select Default to use the default trust mode — currently the same as No. If TLS encryption is set to Strict, the server certificate is always validated regardless of this setting.
|
|
8
|
In the Custom hostname in certificate field, write the hostname used when validating the certificate of the database server when TLS encryption is enabled. Leave empty to use the value of the Server name field.
|
|
9
|
Select the Use integrated security checkbox to authenticate using the Windows account running the Model Manager server process.
|
|
10
|
In the Username field, write the username used to authenticate with the Microsoft SQL Server® database server. Only available if the Use integrated security checkbox is cleared.
|
|
11
|
In the Password field, write the password used to authenticate with the Microsoft SQL Server® database server. This is only available if the Use integrated security checkbox is cleared.
|
|
The Model Manager supports Microsoft SQL Server® 2014 and newer.
|
|
Microsoft SQL Server® must be installed with the Full Text Search component to use it with a Model Manager server database.
|
|
You are strongly recommended to enable row versioning via the READ_COMMITTED_SNAPSHOT isolation level for the Microsoft SQL Server® database you intend to use with the Model Manager server database.
|
|
1
|
In the Server name field, write the name of the computer that the MySQL® database server process runs on. Defaults to localhost.
|
|
2
|
In the Port field, write the number of the port that the MySQL® database server listens on. Defaults to 3306.
|
|
3
|
In the Database name field, write the name of a SQL database that you want the Model Manager to use.
|
|
4
|
Select the Use SSL checkbox to require secure connections.
|
|
5
|
Select the Verify server certificate checkbox to require that the MySQL® database server’s certificate is verified.
|
|
6
|
|
7
|
|
•
|
|
•
|
|
•
|
|
The Model Manager supports MySQL® version 8.0.20 and newer.
|
|
A Model Manager server database requires utf8mb4 character set encoding and that the foreign_key_checks system variable is enabled.
|
|
in the MySQL® configuration file.
|
|
1
|
In the Server name field, write the name of the computer that the Oracle® Database server process runs on. Defaults to localhost.
|
|
2
|
In the Port field, write the number of the port that the Oracle® Database server listens on. Defaults to 1521.
|
|
3
|
|
4
|
|
5
|
|
6
|
|
•
|
|
•
|
|
•
|
|
The Model Manager supports Oracle® Database version 12.2.0.1 and newer.
|
|
1
|
|
2
|
In the Directory field, write the path on the file system to an existing directory.
|
|
1
|
Select External in the Search Indexes > Type list to use search indexes stored in an external search index server.
|
|
2
|
|
3
|
In the Base URL field, write the base URL used to connect to the Apache Solr™ server. Defaults to http://localhost:8983/solr.
|
|
4
|
In the Method list, select the method of authentication. Select Password to authenticate using a username and password. Select None if the Apache Solr™ server does not require authentication.
|
|
5
|
In the Username field, write the username used to authenticate with the Apache Solr™ server.
|
|
6
|
In the Password field, write the password used to authenticate with the Apache Solr™ server.
|
|
7
|
In the Assets and Items fields, write the names of Apache Solr™ cores to use as search indexes for the Model Manager server database.
|
|
The Model Manager search functionality uses a block join query parser to search nested documents. Make sure that the managed-schema files for the Apache Solr™ cores includes the element <fieldType name="_nest_path_" class="solr.NestPathField"/>.
|