Add applications to the repository
In the navigation panel, go to Applications to open the data workbench for applications.
Add a new application. Click the New button to open the wizard.
Edit an existing application. Select the checkbox for the application you want to edit and click the Edit button to open the wizard. The Go to Step field displayed at the bottom of the wizard should show Basic Data so that you can capture the mandatory information about the application.
Define the application's basic data. Define the following fields in the wizard and click OK or Next to save your data. All mandatory fields must be defined to create the application and save it.
- Name: (Mandatory) Enter a name for the application that is known to end users. The application's name is typically different than the name of the vendor delivering the application. You can add an abbreviation (3-4 letters) of the name in the Short Name field to use in diagrams and other visualizations.
- Version: (Mandatory) Enter a version number for the application. It is recommended that you document major and minor release versions (<MajorVersion.MinorVersion>). For example, version 2.1 (<MajorVersion.MinorVersion>). You could document patch releases (<MajorVersion.MinorVersion.PatchRelease>) if your organization requires this level of detail.
- Start Date and End Date: (Mandatory) The start and end date captures the period when the application is actively running and can be used in the company. This is also when the Object State attribute should be specified as Active. Click the calendar icon to select the date or enter the date in the date format Month/Day/Year. For example: 4/30/2023
-
Object State: (Mandatory) The object state describes the use of the application in the real word. This can be understood as the operational status of the application. Possible values are:
- Plan: The application is proposed to be used and still in the stages of planning and building.
- Active: The application is currently and used now. The active period begins with the application's start date and ends with the end date.
- Retired: The application is no longer used.
The object state should be changed from Plan to Active once the application's start date is reached. It should be changed to Retire when the application's end data is reached.
-
Release Status: (Optional) This is an approval status and typically indicates the level of quality of the information about the application. The release status determines whether an application can or cannot be deleted. Possible values are:
- Draft: The application has only mandatory data defined.
- Under Review: The application is documented and being reviewed. An application with this release status cannot be deleted.
- Approved: The application has been approved by the responsible stakeholders. An application cannot be deleted when it has an approved release status. An application with this release status cannot be deleted.
- Data imported: The data regarding this application has been imported from an external system. Additional changes may be required to improve the data quality. An application with this release status can be deleted.
- Trash: The application is no longer valid and can be deleted.
-
Recommendation: (Optional) The strategic recommendation regarding future investment for the application. This information is used in TIME (Tolerate, Invest, Migrate, Eliminate) analyses. Possible values are:
- Tolerate: Invest in the application.
- Invest: Consider the application as a migration candidate.
- Migrate: Sundown the application.
- Eliminate: Discontinue the application.
-
Architecture Type: (Optional) The type of architecture infrastructure of the application. Possible values are:
- Client-Server: The application divides tasks or workloads between the providers and consumers of a resource or service.
- Cloud-Based: The application runs on SaaS cloud environments. The cloud infrastructure could be local or remote to the organization.
- Distributed: The application runs on multiple computers within a network. The network boundary can extend from private intranets to public clouds.
- External Webpage: The application is an external resource represented through a web link.
- Mainframe: The application is used by large organizations to carry out critical processing tasks such as bulk processing of data, transactions, planning or statistical activities.
- Stand-Alone: The application is a self-contained application that does not rely on external entities to complete a task.
- Unknown: The architecture type has not yet been assessed.
-
Development Type: (Optional) Development information about the application. Possible values are:
- Bespoke: The application was created specifically to address a unique use case.
- COTS - Configured: A commercial off-the-shelf application that has been configured or supports configuration to fulfill the requirements of the enterprise and is fully supported and upgrade-stable.
- COTS - Customized: A commercial off-the-shelf application that is customized or contains organization-specific code/programming to suit the requirements of the enterprise.
- Unknown: The application development type has not yet been assessed.
-
Authentication: (Optional) The authentication method used for the application. Possible values are:
- Autonomous: The application supports autonomous methods such as Direct Autonomous Authentication (DAA) for authentication. This can be carried out through mobile or remote authentication systems.
- Basic Access: The applications support basic authentication based on a username and password. Protocols and layers such as HTTPS, SSL. or TLS could be used to enhance security, but these are not mandatory.
- Multi-Factor: The application requires more than one method of authentication from independent verification sources to verify the transactional identity.
- Multi-Factor & SSO: The application supports both multi-factor authentication (MFA) and single sign-on (SSO) authentication methods.
- No Authorization: The application does not support authentication.
- Single Sign-On: The application supports the use of a single ID and password to gain access to several related or unrelated systems.
- Unknown: The authentication mode has not yet been assessed.
-
Pace-Layered Governance: (Optional) Classification of application according to the Pace-Layered Application Strategy to categorize, select, manage and govern applications to support business change, differentiation and innovation. Possible values are:
- System of Differentiation: The application enables unique company processes or industry-specific capabilities. The application has a medium-length lifecycle (one to three years) but needs to be reconfigured frequently to accommodate changing business practices or customer requirements.
- System of Innovation: The application is built on an ad-hoc basis to address new business requirements or opportunities. The application typically has a short lifecycle (zero to 12 months) using departmental or outside resources and consumer-grade technologies.
- System of Record: The application is an established packaged application or legacy homegrown system that supports core transaction processing and manages the organization's critical master data. The rate of change is low because the processes are well-established and common to most organizations and often are subject to regulatory requirements.
-
Cloud Migration Strategy: (Optional) Specify the planned strategy for the application regarding its migration to the cloud. Possible values are:
- Retain/Retire: The application supports a business capability that is relevant to the business but cannot be migrated to the cloud immediately. Or the application is at the end of its lifecycle and is about to be retired.
- Rehost: The application is SaaS-enabled but is either outdated or would require rehosting to the cloud platform.
- Refactor: The application requires some changes in code to be eligible for migration to the cloud. The application can be a modular or self-contained application with services that can easily be refactored.
- Rearchitect: The application requires additional effort to make it cloud enabled. For example, this might be due to application health monitoring, application security, data backup and policies, scalability and replication zones, disaster recovery, network utilization, multi-channel communication, or identity management.
- Rebuild: The application could be made cloud ready but would require a change in the build process to ensure seamless delivery. The concepts of CI/CD (continuous integration/continuous delivery) could be leveraged for these applications.
- Migrated: The application has been migrated to the cloud successfully.
- Unknown: The cloud migration strategy is unknown for the application. This may be the case for applications for which the Architecture Type attribute is not set to Cloud-Based.
- Subject to Compliance Regulation: (Optional) Select the checkbox if the application is bound to compliance regulations. This is relevant for migration analytics.
- Strategic Application: (Optional) Select the checkbox if the application is strategic for the company.
- Authorized Access tab: The user who creates the application is the authorized user per default. This can be changed. Select one or more authorized user groups that shall have write permissions to the object. All users in the authorized user group can edit the application.