Step-by-step Instructions

Step-by-step Instructions

Create Automated Document Handling Base Data #

In the SICS System Administration Utility, open the “Database Updating” function and select “Update Automated Document Handling Data”.

adh_setup_1.png

Define Processing Options #

Open System Parameters and select the Automated Document Handling / Processing Options section.

adh_setup_2.png

The “XML Input Pattern Generation Algorithm” option defines which logic should be used when automatically generating the input pattern from a document. This functionality is triggered when the user creates a mapping from a specific document already present in the database. The Default Decimal Separator option defines which decimal separator character should be used as a default when designing mappings.

Define Translation Tables #

Translation Tables can be used by Automated Document Handling mappings. They can be defined in the SICS Workstation, under Reference Items. Translation Tables can be exported/imported to/from an XML file.

adh_setup_3.png

adh_setup_4.png

Define Output Patterns #

Output patterns are used for generating the result of a transformation. A set of default Output Patterns is provided. They can be edited in System parameters, under Automated Document Handling / Output Patterns. Output Patterns can be exported/imported to/from an XML file.

adh_setup_5.png

Define Mappings #

Mappings can be defined either from an imported document or from System Parameters, in Automated Document Handling / Transformation Mappings. Mappings can be exported/imported to/from an XML file.

adh_setup_6.png

Security Access Rights #

Security user roles can be set in the same way as other SICS functionalities.

In SICS ADH Server, security user roles of the user used for logging to the database are used.

Use cases relevant to Automated Document Handling are:

  • ADH Document
  • ADH Mapping
  • ADH Output Pattern
  • ADH System Parameters
  • ADH Transformation
  • Translation Table

In addition, for generating eMessaging Messages, it is necessary to have eMessaging access rights.