Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.
Comment: Direct JSPUI users to the pre-3.0 section explicitly

Table of Contents
minLevel2
outlinetrue
stylenone

What is an Embargo?

An embargo is a temporary access restriction placed on metadata or bitstreams. Its scope or duration may vary, but the fact that it eventually expires is what distinguishes it from other content restrictions. For example, it is not unusual for content destined for DSpace to come with permanent restrictions on use or access based on license-driven or other IP-based requirements that limit access to institutionally affiliated users. Restrictions such as these are imposed and managed using standard administrative tools in DSpace, typically by attaching specific policies to Items, Collections, Bitstreams, etc. Embargo functionality was originally introduced as part of DSpace 1.6, enabling embargoes on the level of items that applied to all bitstreams included in the item. In DSpace 3.0, this functionality has been extended for the XML User Interface, enabling embargoes on the level of individual bitstreams.

DSpace 3.0 XMLUI Embargo Functionality

Warning
titleIncompatible with JSPUI

By enabling the DSpace 3.0 Embargo functionality you will break JSPUI submission functionality. JSPUI is not yet compatible with the new XMLUI Embargo.  If you use JSPUI, please see the Pre-DSpace 3.0 Embargo section.

Embargoes can be applied per item and per bitstream. The item level embargo will be the default for every bitstream, although it could be customized at bitstream level.

As a DSpace administrator, you can choose to integrate either Simple or Advanced dialog screens as part of the item submission process. These are outlined in detail in the sections Simple Embargo Settings and Advanced Embargo Settings.

...

On the level of an individual item, a new Private/Public state has been introducted to control the visibility of item metadata in the different indexes serving the DSpace web interface (search, browse, discovery), as well as machine interfaces (REST-API, OAI-PMH, ...)

The following functionality has been added in DSpace 3.0:

...

  • Edit Item
  • Edit Bitstream
  • Wildcard Policy Admin Tool

Admin Documentation

Introduction

Configuring and using Embargoes in DSpace 3.0

Warning
titleIncompatible with JSPUI

By enabling the DSpace 3.0 Embargo functionality you will break JSPUI submission functionality. JSPUI is not yet compatible with the new XMLUI Embargo.  If you use JSPUI, please see the Pre-DSpace 3.0 Embargo section.

Introduction

The following sections describe The following document describes the steps needed to configure and use the new Embargo functionality on in DSpace 3.0.

Note: when the embargo will be set at item level or bitstream level a new ResourcePolicy will be added.

Note: the new embargo is not supported on JSPUI.

Database

Run the script:

This embargo functionality is implemented using DSpace's system for ResourcePolicies.

Database

As a first step, the following script needs to be executed to ensure that your DSpace database gets extended with 3 new fields, required by the new embargo.

 - dspace/etc/[postgres-oracle Wiki Markup_ \- dspace/etc/\[postgres-oracle\]/database_schema_18-3.sql_

For PostgreSQL databases, the executed commands areHere is the script for postgres:

Code Block
ALTER TABLE resourcepolicy ADD rpname VARCHAR(30);
ALTER TABLE resourcepolicy ADD rptype VARCHAR(30);
ALTER TABLE resourcepolicy ADD rpdescription VARCHAR(100);

ALTER TABLE item ADD discoverable BOOLEAN;

update item set discoverable=true;

and here the one for OracleFor Oracle databases, the executed commands are:

Code Block
ALTER TABLE resourcepolicy
  ADD (
        rpname rpname VARCHAR2(30);
        rpdescription VARCHAR2(100);
        rptype VARCHAR2(30)
      );


ALTER TABLE item ADD discoverable NUMBER(1);

...

  • Simple Embargo Settings
  • Advanced Embargo Settings

To do it is needed switch between the two, you need to set the following variable in the dspace.cfg file.

...

To enable the new embargo have changes are required to be edited the item-submission.xml file, located in your config directory. This file determines which steps are executed in the submission of a new item.

Two new submission steps have been introduced in the file. By default, they are not activated yet has been modified, introducing two new steps:

  • AccessStep: it is a the step in which the user can set the embargo at item level, effectively restricting access to the item metadata.
  • UploadWithEmbargoStep: it is the step in which the user can set the embargo at bitstream level. If this step is enabled, the old UploadStep must be disabled, leaving both steps enabled will result in a system failure.

...

Code Block
<!--Step 3 will be to Manage Item access.
       <step>
           <heading>submit.progressbar.access</heading>
           <processing-class>org.dspace.submit.step.AccessStep</processing-class>
           <xmlui-binding>org.dspace.app.xmlui.aspect.submission.submit.AccessStep</xmlui-binding>
           <workflow-editable>true</workflow-editable>
       </step>
       -->


<!-- Step 4 Upload Item with Embargo Features (not supported in JSPUI)
            to enable this step, please make sure to comment-out the previous step "UploadStep"
       <step>
           <heading>submit.progressbar.upload</heading>
           <processing-class>org.dspace.submit.step.UploadWithEmbargoStep</processing-class>
           <xmlui-binding>org.dspace.app.xmlui.aspect.submission.submit.UploadWithEmbargoStep</xmlui-binding>
           <workflow-editable>true</workflow-editable>
       </step>
        -->

To enable the new Embargo occurs uncomment-out , ensure that the new steps and comment-out are uncommented, while the old UploadStep .needs to be commented out.

Simple Embargo Settings

AccessStep

The simple AccessStep Embargo form renders just three options for the user:

  • Private item: to make an item not searchable
  • Embargo Access until Specific Date: to indicate a date until the item will be embargoed
  • Reason: to provide a description of the Item status

When Embargo is set it applies to Anonymous or to any other Group that is indicated to have default read access for that specific collection.

Here is the form that will be rendered in case of simple embargo settings:

Image Removed

UploadWithEmbargoStep

...

Using the simple embargo settings, submitters will be able to define embargoes bound to specific dates that are applied to all anonymous and default read access. To keep the interface simple, options to apply embargoes for particular groups of DSpace users are not shown. The simple embargo settings interface assumes that embargoes always start immediately upon submission, so only end dates are configurable.

AccessStep

The simple AccessStep Embargo form renders three options for the user:

  • Private item: to hide an item's metadata from all search and browse indexes, as well as external interfaces such as OAI-PMH.
  • Embargo Access until Specific Date: to indicate a date until when the bitstream item will be embargoed.
  • Reason: to provide a description of the bitstream status

These fields will be preloaded with the values set in the AccessStep. 

The following picture shows the form that will be rendered in case of simple embargo settings with preloaded values:

Image Removed

Advanced Embargo Settings

AccessStep

The Advanced AccessStep Embargo form allows the users to manage more fine-grained resource policies to attach to the item.

The form will render the following fields:

  • elaborate on the specific reason why an item is under embargo.

When Embargo is set it applies to Anonymous or to any other Group that is indicated to have default read access for that specific collection.

This shows how the Access step is rendered, using the simple embargo settings:

Image Added

UploadWithEmbargoStep

The simple UploadWithEmbargoStep form renders two new fields for the user:

  • Embargo Access until Specific Date: to indicate a date until when the bitstream will be embargoed. When left empty, no embargo will be applied.
  • Reason: to elaborate on the specific reason why the bitstream is under embargo.

These fields will be preloaded with the values set in the AccessStep.

The following picture shows the form for the Upload step, rendered using the simple embargo settings with preloaded values:

Image Added

Advanced Embargo Settings

The Advanced Embargo settings are really designed with a submitter in mind who is aware of user groups in DSpace and has notions of the way how Policies work.

AccessStep

The Advanced AccessStep Embargo step allows the users to manage more fine-grained resource policies to attach to the item.

The form will render the following fields:

  • Policies List: list of the custom policies already added
  • Private Item: to hide an item's metadata from all search and browse indexes, as well as external interfaces such as OAI-PMH.
  • Policies List: list of the custom policies already added
  • Private Item: to make an item not searchable
  • Name: to give a name to the policy
  • Groups: to indicate the group for which the policy will apply to.
  • Visible/Embargoed: to set if the Item will be visible or embargoed for that specific group
  • Embargo Access until Specific Date: to indicate a date until the item will be embargoed
  • Reason: to provide a description of the Item statuselaborate on the specific reason why the policy is applied.

Last two fields will be enabled only in case of Embargoed has been selected.

This step gives the opportunity to the user to manage by hand the exceptionpolicy manually, so that combination as the following will be possible:

...

Here is a screenshot of the Access step form that will be rendered in case of for the advanced embargo settings:

UploadWithEmbargoStep

UploadWithEmbaroStep in case of Advanced Embargo will render only a new button on the file list:

  • Policies: pushing it will be possible to navigate into the Policies management.

Here is possible to see the button:UploadWithEmbargoStep for Advanced Embargo settings displays an additional Policies button next to Edit in the list of uploaded files.
Clicking it brings you to the a page where you can edit existing policies on the bitstream and add new ones.

When the button will be pushed a form similar to the one in the AccessStep will be render and will make makes it possible to manage the policies at bitstream level.

Here is a screenshot of the form:

Image Removed

Load only specific groups

In case of advanced form has been given another opportunity to the users: load only some specific groups in the "groups" select box.

at bitstream level.

Image Added

Restrict list of displayed groups to specific (sub)groups

For large instances of DSpace, the list of Groups can be quite long. Groups can be nested. This means that not only EPersons can be members of groups, but groups themselves can belong to other groups.

When advanced embargo settings are enabled, you can limit the list of groups displayed to the submitters to subgroups of a particular group.

To use this feature, assign the super group name to following configuration value in dspace.cfgTo do it occurs to assign a value to the following configuration field:

xmlui.submission.restrictstep.groups=name_of_the_supergroup

If Once a value is assigned to the parameter will be loaded only the group specific group is configured as supergroup here, only the groups belonging to the indicated group otherwise, by will be loaded in the selection dialogs. By default,  all the all groups will be are loaded.

Private/Public Item

The users could handle It is possible to adjust the Private/Public state of an item also after it has been archived in the EditItem _functionalityrepository.

Here is a screenshot that show the formshowing the updated Edit Item dialog:

Make an item private means that it won't be searchable.

Private items are not retrievable through the DSpace search, browse or Discovery indexes.

Therefor, an admin-only view has been created to browse all private items. Here To browse between all the private items a view has been created, here is a screenshot of the this new form:

...

Pre-3.0 Embargo Migration Routine

A migration routine has been developed to migrate the current Embargo to the new one.

...

Introduction

The following document illustrates sections illustrate the technical changes that have been made to the back-end to add the new Advanced Embargo functionality.

...

  • TYPE_SUBMISSION: all the policies added automatically during the submission process
  • TYPE_WORKFLOW: all the policies added automatically during the workflow stage
  • TYPE_CUSTOM: all the custom policies added by users
  • TYPE_INHERITED: all the policies inherited by the DSO father.

An embargo policy record will be something similar to the followingHere is an example of all information contained in a single policy record:

Code Block
policy_id: 4847
resource_type_id: 2
resource_id: 89
action_id: 0
eperson_id:
epersongroup_id: 0
start_date: 2013-01-01
end_date:
rpname: Embargo Policy
rpdescription:  Embargoed through 2012
rptype: TYPE_CUSTOM

...

Item.inheritCollectionDefaultPolicies(Collection c)

This method has been adjust adjusted to leave in place the custom policies, added by the users, in place and add the default collection policies only if not already in placethere are no custom policies.

AuthorizeManager

Some methods have been changed on AuthorizeManager _to manage _the new fields ans some convenient methods have been introduced like:

Code Block
languagejava
public static List<ResourcePolicy> findPoliciesByDSOAndType(Context c, DSpaceObject o, String type);
public static void removeAllPoliciesByDSOAndTypeNotEqualsTo(Context c, DSpaceObject o, String type);
public static boolean isAnIdenticalPolicyAlreadyInPlace(Context c, DSpaceObject o, ResourcePolicy rp);
public static ResourcePolicy createOrModifyPolicy(ResourcePolicy policy, Context context, String name, int idGroup, EPerson ePerson, Date embargoDate, int action, String reason, DSpaceObject dso);

...

Withdraw Item

The function withdrawn feature to withdraw an item from the repository has been modified to keep all the custom policies in place.

Reinstate Item

The function reinstate have feature to reinstate an item in the repository has been modified to preserves preserve existing custom policies.

Current Embargo

Pre-DSpace 3.0 Embargo Compatibility

The Pre-DSpace 3.0 embargo functionality (see below) has Current Embargo solution have been modified to adjust the policies setter and lifter

...

lifter. These classes now also set the dates within the policy objects themselves in addition to setting the date in the item metadata.

Anchor
pre-3.0
pre-3.0
Pre-DSpace 3.0 Embargo

Embargo model and life-cycle

...

DSpace embargoes utilize standard metadata fields to hold both the '"terms' " and the '"lift date'". Which fields you use are configurable, and no specific metadata element is dedicated or pre-defined for use in embargo. Rather, you specify exactly what field you want the embargo system to examine when it needs to find the terms or assign the lift date.

...

You replace the placeholder values with real metadata field names. If you only need the '"default' " embargo behavior - which essentially accepts only absolute dates as '"terms' ",
this is the only configuration required, except as noted below.

...

You are free to use existing metadata fields, or create new fields. If you choose the latter, you must understand that the embargo system does not create or configure these fields: i.e. you must follow all the standard documented procedures for actually creating them (i.e. adding them to the metadata registry, or to display templates, etc) - this does not happen automatically. Likewise, if you want the field for '"terms' " to appear in submission screens and workflows, you must follow the documented procedure for configurable submission (basically, this means adding the field to input-forms.xml). The flexibility of metadata configuration makes if easy for you to restrict embargoes to specific collections, since configurable submission can be defined per collection.Key recommendations:embargoes to specific collections, since configurable submission can be defined per collection.

Key recommendations:

  1. Use a local metadata schema. Breaking compliance with the standard Dublin Core in the default metadata registry can create a problem for the portability of data to/from of your repository.
  2. If using existing metadata fields, avoid any that are automatically managed by DSpace. For example, fields like '"date.issued' " or '"date.accessioned' " are normally automatically assigned, and thus must not be recruited for embargo use.
  3. Do not place the field for '"lift date' " in submission screens. This can potentially confuse submitters because they may feel that they can directly assign values to it. As noted in the life-cycle above, this is erroneous: the lift date gets assigned by the embargo system based on the terms. Any pre-existing value will be over-written. But see next recommendation for an exception.
  4. As the life-cycle discussion above makes clear, after the terms are applied, that field is no longer actionable in the embargo system. Conversely, the '"lift date' " field is not actionable until the application. Thus you may want to consider configuring both the '"terms' " and '"lift date' " to use the same metadata field. In this way,
    during  during workflow you would see only the terms, and after item installation, only the lift date. If you wish the metadata to retain the terms for any resaon, use 2 distinct fields instead.

...

After the fields defined for terms and lift date have been assigned in dspace.cfg, and created and configured wherever they will be used, you can begin to embargo items simply by entering data (dates, if using the default setter) in the terms field. They will automatically be embargoed as they exit workflow. For the embargo to be lifted on any item, however, a new administrative procedure must be added: the '"embargo lifter' " must be invoked on a regular basis. This task examines all embargoed items, and if their '"lift date' " has passed, it removes the access restrictions on the item. Good practice dictates automating this procedure using cron jobs or the like, rather than manually running it.
The lifter is available as a target of the 1.6 DSpace launcher - see launcher documentation for details.

...

The 1.6 embargo system supplies a default '"interpreter/imposition' " class (the '"Setter'") as well as a '"Lifter'", but they are fairly rudimentary in several respects.

...

The default setter recognizes only two expressions of terms: either a literal, non-relative date in the fixed format '"yyyy-mm-dd' " (known as ISO 8601), or a special string used for open-ended embargo (the default configured value for this is 'forever', but this can be changed in dspace.cfg to 'toujours', 'unendlich', etc). It will perform a minimal sanity check that the date is not in the past. Similarly, the default setter will only remove all read policies as noted above, rather than applying more nuanced rules (e.g allow access to certain IP groups, deny the rest). Fortunately, the setter class itself is configurable and you can 'plug in' any behavior you like, provided it is written in java and conforms to the setter interface. The dspace.cfg property:

...