cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
Showing results for 
Search instead for 
Did you mean: 

Community Tip - Your Friends List is a way to easily have access to the community members that you interact with the most! X

Windchill Tips

Sort by:
With Windchill 11.0 one can use Query Builder queries to further refine search results.  For example refine the search to look at results based upon related objects.   This zip file contains two queries from 11.0 M020   Search with Parts - additional query to find parts that are on a Change Notice at a given state Reference Designator - Find parts on a BOM with a given reference designator.  For example - find a part (eg Name Capacitor*) that has a reference designator C16
View full tip
Example of using Part Compare with and showing how Show Only Differences works   (view in My Videos)
View full tip
An example of uploading multiple representations to one CreoView session rather then having to start new sessions for each one.   I was adding as a comment on a Product Idea but it was not letting embed it so I added this a separate video and linked it.  The idea is the following:     (view in My Videos)    
View full tip
  Have you had a chance to learn about PTC Navigate yet? Did you know that PTC Navigate provides universal data access? Any stakeholder in the product’s lifecycle can access the latest, most accurate product information to drive better product decisions – with a user experience that is as simple and straightforward as the average smartphone app.   Join us on Tuesday, October 25th, at 1:00pm EST for the live webcast, “PTC Navigate: Easy Access to Enterprise Product Data”, to see a demonstration of how intuitive and easy to use PTC Navigate role-based apps are to: View documents. View drawings. View requirements. View part properties. View parts lists. View part structures. View design files. View and measure in 3D.   Don’t miss this opportunity for a live Q&A with PTC Experts, Chris Bergquist, Senior Solutions Director, PLM, and Steve Partridge, Director Solutions Management. REGISTER NOW   Are you already a customer using Windchill 10.2 or higher? If so, you can take advantage of PTC Navigate apps immediately. There's no need to upgrade your existing Windchill deployment. Dramatically expand the value of PLM information across the roles in your company TODAY! Contact us to learn more
View full tip
Starting in Windchill 10.2 M020, security labels and their values can be displayed in your workspace views.  If you have security labels configured, you are now able to add security labels to your workspace table views, just like any other attribute.   You do this by creating a new table view in your workspace.  In the New View wizard, add your security labels as part of the Set Column Display (step 4).  This can be done by either adding the “All Security Labels” from the "Available Columns" list on the left over to the “Selected Columns” list on the right. This, as the name suggests, adds all of your defined security labels into your table view in one step.  Alternatively, you can select individual security labels by name from the Available Columns list as shown in the following figure with the security label “Training Required” moved over to the Selected Columns list. Now that your workspace table view is saved to include your security labels, you are able to view them directly from your workspace listing. This eliminates the need to navigate to individual information pages to find out specific values. In addition to the workspace itself, this is applicable to all workspace related UIs such as the model structure report on the CAD document information page and the Check In UI (more on that in my next post).
View full tip
I will provide simple troubleshooting techniques that will assist you in identifying potential access related issues in your Windchill system.  Have you ever wondered: Why am I facing a NotAuthorizedException? Why are some Windchill objects not findable or accessible for me even I think I am having appropriate access permissions? Let’s get started.   Understanding Domains and Access Control   Windchill system behavior is based on a context or container model. The site context represents the system as a whole, whereas an Organization is a component of the Site and Products, Libraries, Projects and Programs are part of the Organization. Each of these contexts uses a cabinet to store data and system objects. Cabinets are associated with Windchill objects called Domain which store policies and access rules.   The chart below illustrates the default Domain Architecture; for a more detailed description please view article CS212423 in our PTC Support Knowledge Base.     Domain structuring in conjunction with inheritance enables general policies to be applied at higher domains and more specific policies to be applied at a lower level.   When debugging Access Control you not only have to consider inherited policies from higher contexts, but also keep in mind how Windchill will evaluate Security Labels, Access Permissions on Groups and individuals as well as Ad-Hoc Permissions. The following algorithm is generally applied:   Security Labels: Windchill will always check first if a user gets cleared by Security Labels System Policy Rules apply in the following order: Group Grant is overridden by Group Deny is overridden by User Grant is overridden by User Deny is overridden by Group and User Absolute Deny Ad-Hoc Rules: Ad-Hoc access can only grant permissions Ad-Hoc overrides a deny rule that is set by domain policy but not an absolute deny.   If you are interested in more details, please check in the Windchill Help Center in chapter “How ACLs work:” there you will find additional examples for a better understanding.   Debugging Access Control Issues   Now that you have a clear understanding on how Windchill calculates access permissions, I will concentrate troubleshooting ACL related issue. In Technical Support, most cases that are opened by customers fall into three categories:   Users can’t open an object or perform a specific action which results in Access Permission related error messages Users can’t find object in their Windchill System by Search or they are not visible to them Dedicated actions are not visible in the Windchill User interface for some users   We will concentrate in this post on the first category.   Troubleshooting Access Permission related error messages   Access related error messages come in many flavors. See below the most common ones that show up in the Windchill user interface or in the Method Server logs:     If you see one of these error messages, it is the time when you have to answer the question: Is this intentional or should this user have access to the object? To help you answer this question PTC provides you help with 3 tools:   Manage Security functionality in the Actions menu: Refer to Windchill Help Center chapter Manage Security for an Existing Object for additional information Policy Administrator on Site > Utilities > Policy Administrator or [Context] >Utilities > Policy Administrator: For additional information please refer to article CS26785 - How to troubleshoot the message "You do not have access to this object or it does not exist" in Windchill‌ Various Access loggers that help to understand how Windchill calculated the Access Permission and why this particular user was denied access: Technical Support prepared a set of articles that explain the various loggers available and helps to understand their results: The Hub article CS78689 - How to investigate Policy Access Control issues in Windchill CS78878 - The differences between the various Access Control related Loggers in Windchill CS78846‌ - How to interpret verbose Policy Access related log entries in Windchill   Thanks for your attention and any questions or feedback is welcome.
View full tip
Have you ever had an issue in Windchill for which you had to raise an Enterprise Down (EDOWN) case with PTC Technical Support? An EDOWN situation is the equivalent of an emergency room need: the Windchill server is down or unresponsive, productivity is crippled and the user community is impatiently waiting for updates on what’s going on and when the server is back up. It’s a pretty stressful environment. Having a support contract and the possibility of raising EDOWN cases is good to fall back on, but it’s similar to having doctors and dentists around: it’s comforting to know that they are there, but we’d rather prevent the need of their services in the first place. This is what this post is about.   General preventative measures We started doing analyses of Enterprise Down cases on a quarterly basis to get a better understanding of the underlying causes and see if we could work out some common practices that specifically targets these causes. Product improvements is one aspect that we are continuously working on (the Internet of Things opens up interesting possibilities), but there are actions that you can take right now to safeguard your server from some of the more common causes of EDOWN situations: Take regular backups – Daily incrementals is what you would normally strive for. We do occasionally get cases where production server backups are old or non-existent and a catastrophic hardware failure has led to data loss. Needless to say, this is beyond repair with possibly months or years of lost work as a consequence. Information on Windchill backup strategies can be found in the PTC Windchill Backup and Recovery Planning Technical Brief. Configure mail notifications – Windchill itself and some of its third-party components have built-in monitoring that can send out e-mail alerts when server performance indicators start drifting outside of their comfort zones. However, some configuration is needed for the alerts to be sent out. The configuration steps are described here. If you get a monitoring alert that you are unsure about, search in our Knowledge Base for information on the alert and what actions might be required in response to it. If no information is found, open a case with Technical Support. Set up a test server and use it – Any change to a Windchill server, no matter how small, can have unexpected side effects. There is a good chance that any adverse side effects will reveal themselves on the test server so that you know about them before applying them to the production system. It might not seem worth the extra cost and hassle to do this, but it makes troubleshooting so much easier for everyone involved so please reconsider if you don’t already have one. Other advantages include: Troubleshooting which requires verbose logging and/or frequent restarts does not disrupt the operation of the production server Reconfiguration for data capture does not disrupt production system. For example, profiling with the Windchill Profiler is greatly simplified with a single Method Server, which can be easily configured on a test server. Testing of potential fixes can be done without interfering with the production server. Monitor your server – use PSM if possible, or the out-of-the-box Site > Utilities > Server Status page. As a server administrator, keep the page (or an overview dashboard if using PSM) on a screen and check it regularly. This will make you familiar with the day-to-day load cycles on the server, including how user activity rises and falls on a daily basis and when background activities usually kick off. This makes it easier to spot unusual patterns that may indicate budding problems early. Server Status page: System Health dashboard in PSM: Going forward This was a brief overview of common measures that can be taken to avoid some EDOWNs. Some of this may seem basic and plain common sense to you; if so, excellent, hold on to that mindset. Nevertheless, we see a significant portion of EDOWN cases that may have been prevented with these measures, which is why they were covered here. On a final note, there is a new set of articles that outline the most common technical areas where EDOWNs occur and contain information including: Preventative actions Informative articles and resources Links to articles for the most common EDOWNs issues The main article is CS202168- How to avoid common Enterprise Down issues in Windchill, other related articles are linked from that one. These will be reviewed on a quarterly basis to ensure that they reflect the most recent EDOWN analysis results. Thank you for your time and as always, comments and feedback are greatly appreciated.
View full tip
This is the HTML5 drag-n-drop file upload in Windchill 10.2_M020. This will replace the Java drop target giving people a much simpler and intuitive way to upload new documents and attachments. This video demonstrates how easy it is to create a single document and its associated attachments
View full tip
sm
12-Amethyst
PTC is happy to announce the new HTML5 based drag-n-drop file upload utility with Windchill 10.2_M020. This new utility will replace the existing Java based drop target and give people a much simpler and more intuitive way to upload new documents and attachments. This video demonstrates how easy it is to create a single document and its associated attachments using the new drag-n-drop upload utility on MacOS with Safari.   This video does not contain audio.     Unable to play video. Please try again later. (view in My Videos)
View full tip
sm
12-Amethyst
This is a quick video showing how easy it is to use the built in drag-n-drop features of Firefox and Chrome to upload files in Windchill. This video demonstrates how to create both a single document or mulitple documents using simple drag-n-drop operations.     (view in My Videos)
View full tip
sm
12-Amethyst
PTC is happy to announce the new HTML5 based drag-n-drop file upload utility with Windchill 10.2_M020. This new utility will replace the existing Java based drop target and give people a much simpler and more intuitive way to upload new documents and attachments. This video demonstrates how easy it is to add multiple attachments using the new drag-n-drop upload utility.   This video does not contain audio, yet...   (view in My Videos)
View full tip
sm
12-Amethyst
This Rehosting Utility demo focuses on rehosting a CentOS based Windchill 10.1 clustered environment to another cluster. It also discusses some handy shortcuts that can be used when rehosting clusters to reduce the runtime of the utility.     (view in My Videos)
View full tip
Announcements