$TXT Created by VEHU.FO-BAYPINES.DOMAIN.EXT (KIDS) on Monday, 11/18/19 at 09:58 ============================================================================= Run Date: JAN 15, 2020 Designation: WEBG*1*0 Package : WEBG - WEB VISTA REMOTE ACCESS MANA Priority: Mandatory Version : 1 Status: Released Compliance Date: FEB 14, 2020 ============================================================================= Subject: WEBVRAM INITIAL RELEASE Category: - Routine - Other Description: ============ The new Web Vista Remote Access Management (WebVRAM) web application allows users to provision themselves in other remote VistA systems directly, with the same user profile that they have in their local VistA system, without having to submit a help desk request for access. This gives these users the ability to logon and use these remote VistA systems, without re-entering their Access/Verify codes, with the same level of access they have in their local VistA system. This feature, and the time it saves the user, directly supports Veteran Telehealth and benefit initiatives. WebVRAM is a web-based app, and replaces the similar VRAM client/server application. This gives users the same functionality as VRAM, but without having to install the VRAM client software on their workstations. As part of the preparation for this installation, this patch is being sent out to provide a WebVRAM menu option entry for the RPCs it uses, and to update the REMOTE APPLICATION (#8994.5) file, as WebVRAM uses the Broker Security Enhancement (BSE) to do its work. Please read the DATA DICTIONARY description of this file for more information. This patch contains a single routine, which is a post install routine that is automatically executed after patch installation. This routine adds one entry (WEBVRAM) to the REMOTE APPLICATION (#8994.5) file, which is the BSE entry for the WebVRAM callback to the VistA system. This patch contains one new entry (WEBG WEBVRAM GUI) in the OPTION (#19) file, for the RPCs used by WebVRAM. This patch also adds one new entry (WEBG AV PUSH) to the SECURITY KEY (#19.1) file, that is used to manage users of WebVRAM. In addition to the test sites listed below, the Fee Basis Claims System (FBCS) Technical Team will be testing FBCS functionality during IOC testing of this patch. Patch Components: ----------------- Files & Fields Associated: File Name (Number) Field Name (Number) New/Modified/Deleted ------------------ ------------------- -------------------- REMOTE APPLICATION ALL NEW ENTRY - WEBVRAM (8994.5) Forms Associated: Form Name File Number New/Modified/Deleted --------- ----------- -------------------- N/A Mail Groups Associated: Mail Group Name New/Modified/Deleted --------------- -------------------- N/A Options Associated: Option Name Type New/Modified/Deleted ----------- ---- -------------------- WEBG WEBVRAM GUI BROKER NEW ENTRY - WEBG WEBVRAM GUI Protocols Associated: Protocol Name New/Modified/Deleted ------------- -------------------- N/A Security Keys Associated: Security Key Name ----------------- WEBG AV PUSH Templates Associated: Template Name Type File Name (Number) New/Modified/Deleted ------------- ---- ------------------ -------------------- N/A Remote Procedures Associated: Remote Procedure Name New/Modified/Deleted --------------------- -------------------- N/A Parameter Definitions Associated: Parameter Name New/Modified/Deleted -------------- -------------------- N/A Additional Information: ----------------------- New Service Requests (NSRs): N/A Patient Safety Issues (PSIs): N/A Defect Tracking System Ticket(s) & Overview: N/A Test Sites: ----------- CINCINNATI, OH MINNEAPOLIS, MN CLARKSBURG, WV TOGUS, ME BECKLEY, WV Software and Documentation Retrieval Instructions: -------------------------------------------------- Documentation describing the new functionality and/or a host file containing a build may be included in this release. The preferred method is to retrieve the files from download.vista.domain.ext. This transmits the files from the first available server. Sites may also elect to retrieve the files directly from a specific server. Sites may retrieve the software and/or documentation directly using Secure File Transfer Protocol (SFTP) from the ANONYMOUS.SOFTWARE directory at the following OI Field Offices: Hines: domain.ext Salt Lake City: domain.ext Documentation can also be found on the VA Software Documentation Library at: https://www.domain.ext/vdl/ Documentation Title File Name FTP Mode --------------------------------------------------------------------- Deployment, Installation, Back-Out, and Rollback Guide (Word format) webvram_dibr.docx Binary Deployment, Installation, Back-Out, and Rollback Guide (PDF format) webvram_dibr.pdf Binary User Guide (Word format) webvram_ug.docx Binary User Guide (PDF format) webvram_ug.pdf Binary Admin Module User Guide (Word format) webvram_admin_module_ug.docx Binary Admin Module User Guide (PDF format) webvram_admin_module_ug.pdf Binary Host File Name FTP Mode --------------------------------------------------------------------- N/A Patch Installation: ------------------- Pre/Post Installation Overview: This patch contains a single post-install routine WEBGY00 which will automatically run after the patch installation. The routine updates the REMOTE APPLICATION file by adding an entry named WEBVRAM. This routine is automatically deleted after successful patch installation. Pre-Installation Instructions: This patch may be installed with users on the system although it is recommended that it be installed during non-peak hours to minimize potential disruption to users. This patch should take less than 5 minutes to install. No menu options need to be disabled for the installation. Installation Instructions: 1. If the release is provided using PackMan, choose the PackMan message containing this build. Then select the INSTALL/CHECK MESSAGE PackMan option to load the build. If this release is provided using a Host file, use the Load a Distribution option contained on the Kernel Installation and Distribution System Menu to load the Host file. 2. From the Kernel Installation and Distribution System Menu, select the Installation Menu. From this menu, A. Select the Verify Checksums in Transport Global option to confirm the integrity of the routines that are in the transport global. When prompted for the INSTALL NAME enter the patch or build name (ex. or XXXXX BUILD X.X). NOTE: Using will not bring up a Multi-Package build even if it was loaded immediately before this step. It will only bring up the last patch in the build. B. Select the Backup a Transport Global option to create a backup message of any routines exported with this patch. It will not backup any other changes such as DDs or templates. C. You may also elect to use the following options: i. Print Transport Global - This option will allow you to view the components of the KIDS build. ii. Compare Transport Global to Current System - This option will allow you to view all changes that will be made when this patch is installed. It compares all of the components of this patch, such as routines, DDs, templates, etc. D. Select the Install Package(s) option and choose the patch to install. i. If prompted 'Want KIDS to Rebuild Menu Trees Upon Completion of Install? NO//', answer NO. ii. When prompted 'Want KIDS to INHIBIT LOGONs during the install? NO//', answer NO. iii. When prompted 'Want to DISABLE Scheduled Options, Menu Options, and Protocols? NO//', answer NO. a. When prompted 'Enter options you wish to mark as 'Out Of Order':', press the Enter key. b. When prompted 'Enter protocols you wish to mark as 'Out Of Order':', press the Enter key. c. When prompted 'Delay Install (Minutes): (0 - 60): 0//', answer 0. Post-Installation Instructions: The post-install routine WEBGY00 will run automatically after patch installation. If there is a problem during execution, it can safely be manually re-run. This routine adds an entry named "WEBVRAM" in the REMOTE APPLICATION file. It is automatically deleted after successful patch installation. Back-Out/Roll Back Plan: ------------------------ - Delete the entry named WEBVRAM from the REMOTE APPLICATION (#8994.5) file - Delete the entry named WEBG WEBVRAM GUI from the OPTION (#19) file - Delete the routine WEBGY00 (if it exists) - Delete the entry named WEBG AV PUSH from the SECURITY KEY (#19.1) file Routine Information: ==================== The second line of each of these routines now looks like: ;;1.0;WEB VISTA REMOTE ACCESS MANAGEMENT;**[Patch List]**;Jun 24, 2019;Build 15 The checksums below are new checksums, and can be checked with CHECK1^XTSUMBLD. Routine Name: WEBGY00 Before: n/a After: B9323966 **0** ============================================================================= User Information: Entered By : Date Entered : MAR 11, 2019 Completed By: Date Completed: JAN 15, 2020 Released By : Date Released : JAN 15, 2020 ============================================================================= Packman Mail Message: ===================== $END TXT