xi4 bip admin_en

1004
Business Intelligence Platform Administrator Guide ■ SAP BusinessObjects Business Intelligence platform 4.0 Feature Pack 3 2012-08-17

Upload: tovetrivel

Post on 16-Jan-2015

407 views

Category:

Technology


2 download

DESCRIPTION

 

TRANSCRIPT

  • 1. Business Intelligence Platform Administrator Guide SAP BusinessObjects Business Intelligence platform 4.0 Feature Pack 3 2012-08-17

2. 2012 SAP AG. All rights reserved.SAP, R/3, SAP NetWeaver, Duet, PartnerEdge, ByDesign, SAP BusinessObjects Explorer, StreamWork, SAP HANA and other SAP products and services mentioned Copyright herein as well as their respective logos are trademarks or registered trademarks of SAP AG in Germany and other countries.Business Objects and the Business Objects logo, BusinessObjects, Crystal Reports, Crystal Decisions, Web Intelligence, Xcelsius, and other Business Objects products and services mentioned herein as well as their respective logos are trademarks or registered trademarks of Business Objects Software Ltd. Business Objects is an SAP company.Sybase and Adaptive Server, iAnywhere, Sybase 365, SQL Anywhere, and other Sybase products and services mentioned herein as well as their respective logos are trademarks or registered trademarks of Sybase, Inc. Sybase is an SAP company. Crossgate, m@gic EDDY, B2B 360, B2B 360 Services are registered trademarks of Crossgate AG in Germany and other countries. Crossgate is an SAP company. All other product and service names mentioned are the trademarks of their respective companies. Data contained in this document serves informational purposes only. National product specifications may vary.These materials are subject to change without notice. These materials are provided by SAP AG and its affiliated companies ("SAP Group") for informational purposes only, without representation or warranty of any kind, and SAP Group shall not be liable for errors or omissions with respect to the materials. The only warranties for SAP Group products and services are those that are set forth in the express warranty statements accompanying such products and services, if any. Nothing herein should be construed as constituting an additional warranty. 2012-08-17 3. Contents Document History.................................................................................................................19Chapter 1 Getting Started......................................................................................................................21Chapter 2 About this help.......................................................................................................................212.1 Who should use this help?.....................................................................................................212.1.1 About SAP BusinessObjects Business Intelligence platform .................................................212.1.2 Variables................................................................................................................................222.1.3 Before you start.....................................................................................................................222.2 Key concepts.........................................................................................................................222.2.1 Key administrative tools.........................................................................................................252.2.2 Key tasks...............................................................................................................................272.2.3 Architecture...........................................................................................................................31Chapter 3 Architecture overview............................................................................................................313.1 Architecture diagram..............................................................................................................323.1.1 Architecture tiers...................................................................................................................333.1.2 Databases..............................................................................................................................343.1.3 Servers..................................................................................................................................353.1.4 Web application servers.........................................................................................................363.1.5 Software Development Kits...................................................................................................373.1.6 Data sources.........................................................................................................................393.1.7 Authentication and single sign-on...........................................................................................403.1.8 SAP integration......................................................................................................................423.1.9 Lifecycle management (LCM).................................................................................................433.1.10 Integrated version control.......................................................................................................433.1.11 Upgrade path.........................................................................................................................443.1.12 Services and servers..............................................................................................................443.2 Server changes since XI 3.1...................................................................................................463.2.1 Services.................................................................................................................................473.2.2 Service categories.................................................................................................................553.2.3 Server types..........................................................................................................................583.2.4 Servers..................................................................................................................................603.2.5 2012-08-173 4. Client applications..................................................................................................................623.3 Installed with SAP BusinessObjects Business Intelligence Platform Client Tools....................633.3.1 Installed with SAP BusinessObjects Business Intelligence Platform.......................................683.3.2 Available separately...............................................................................................................693.3.3 Web application clients..........................................................................................................703.3.4 Process Workflows................................................................................................................743.4 Startup and authentication.....................................................................................................743.4.1 Program objects.....................................................................................................................763.4.2 Crystal Reports......................................................................................................................773.4.3 Web Intelligence....................................................................................................................813.4.4 Analysis.................................................................................................................................833.4.5 Managing Licenses...............................................................................................................85Chapter 4 Managing License keys..........................................................................................................854.1 To view license information....................................................................................................854.1.1 To add a license key...............................................................................................................854.1.2 To view current account activity.............................................................................................864.1.3 Measuring licenses................................................................................................................864.2 To run a license audit.............................................................................................................874.2.1 Managing Users and Groups................................................................................................89Chapter 5 Account management overview..............................................................................................895.1 User management..................................................................................................................895.1.1 Group management...............................................................................................................905.1.2 Available authentication types ...............................................................................................915.1.3 Managing Enterprise and general accounts............................................................................935.2 To create a user account........................................................................................................935.2.1 To modify a user account.......................................................................................................945.2.2 To delete a user account........................................................................................................945.2.3 To create a new group...........................................................................................................955.2.4 To modify a group's properties...............................................................................................955.2.5 To view group members.........................................................................................................965.2.6 To add subgroups..................................................................................................................965.2.7 To specify group membership................................................................................................975.2.8 To delete a group...................................................................................................................975.2.9 To add users or user groups in bulk.......................................................................................985.2.10 To enable the Guest account.................................................................................................985.2.11 Adding users to groups..........................................................................................................995.2.12 Changing password settings................................................................................................1005.2.13 Granting access to users and groups...................................................................................1025.2.14 2012-08-174 Contents 5. Controlling access to user inboxes.......................................................................................1025.2.15 Configuring BI launch pad options........................................................................................1035.2.16 Managing attributes for system users .................................................................................1065.2.17 Prioritizing user attributes across multiple authentication options.........................................1075.2.18 To add a new user attribute..................................................................................................1085.2.19 To edit extended user attributes...........................................................................................1095.2.20 Managing aliases.................................................................................................................1095.3 To create a user and add a third-party alias..........................................................................1105.3.1 To create a new alias for an existing user.............................................................................1105.3.2 To assign an alias from another user....................................................................................1115.3.3 To delete an alias.................................................................................................................1125.3.4 To disable an alias................................................................................................................1125.3.5 Setting Rights......................................................................................................................115Chapter 6 How rights work in BI platform.............................................................................................1156.1 Access levels.......................................................................................................................1156.1.1 Advanced rights settings......................................................................................................1166.1.2 Inheritance...........................................................................................................................1176.1.3 Type-specific rights..............................................................................................................1226.1.4 Determining effective rights.................................................................................................1236.1.5 Managing security settings for objects in the CMC..............................................................1246.2 To view rights for a principal on an object.............................................................................1246.2.1 To assign principals to an access control list for an object....................................................1256.2.2 To modify security for a principal on an object......................................................................1256.2.3 To set rights on a top-level folder in BI platform....................................................................1266.2.4 Checking security settings for a principal.............................................................................1266.2.5 Working with access levels..................................................................................................1296.3 Choosing between View and View On Demand access levels.............................................1316.3.1 To copy an existing access level..........................................................................................1326.3.2 To create a new access level...............................................................................................1326.3.3 To rename an access level...................................................................................................1336.3.4 To delete an access level.....................................................................................................1336.3.5 To modify rights in an access level.......................................................................................1336.3.6 Tracing the relationship between access levels and objects.................................................1346.3.7 Managing access levels across sites....................................................................................1356.3.8 Breaking inheritance.............................................................................................................1366.4 To disable inheritance...........................................................................................................1376.4.1 Using rights to delegate administration.................................................................................1376.5 Choosing between Modify the rights users have to objects options.....................................1396.5.1 Owner rights........................................................................................................................1406.5.2 Summary of recommendations for rights administration.......................................................1406.6 2012-08-175 Contents 6. Securing the BI platform.....................................................................................................143Chapter 7 Security overview ................................................................................................................1437.1 Disaster recovery planning...................................................................................................1437.2 General recommendations for securing your deployment.....................................................1447.3 Configuring security for bundled third-party servers.............................................................1457.4 Active trust relationship........................................................................................................1457.5 Logon tokens.......................................................................................................................1467.5.1 Ticket mechanism for distributed security.............................................................................1467.5.2 Sessions and session tracking.............................................................................................1477.6 CMS session tracking..........................................................................................................1477.6.1 Environment protection........................................................................................................1487.7 Web browser to web server.................................................................................................1487.7.1 Web server to BI platform....................................................................................................1487.7.2 Auditing security configuration modifications .......................................................................1497.8 Auditing web activity............................................................................................................1497.9 Protection against malicious logon attempts.........................................................................1497.9.1 Password restrictions...........................................................................................................1497.9.2 Logon restrictions................................................................................................................1507.9.3 User restrictions..................................................................................................................1507.9.4 Guest account restrictions...................................................................................................1517.9.5 Processing extensions.........................................................................................................1517.10 Overview of BI platform data security...................................................................................1517.11 Data processing security modes..........................................................................................1527.11.1 Cryptography in BI platform..................................................................................................1547.12 Working with cluster keys....................................................................................................1557.12.1 Cryptographic Officers.........................................................................................................1577.12.2 Managing cryptographic keys in the CMC............................................................................1587.12.3 Configuring servers for SSL.................................................................................................1627.13 Creating key and certificate files..........................................................................................1637.13.1 Configuring the SSL protocol...............................................................................................1657.13.2 Understanding communication between BI platform components.........................................1707.14 Overview of BI platform servers and communication ports...................................................1707.14.1 Communication between BI platform components ...............................................................1727.14.2 Configuring BI platform for firewalls......................................................................................1797.15 To configure the system for firewalls....................................................................................1797.15.1 Debugging a firewalled deployment......................................................................................1827.15.2 Examples of typical firewall scenarios...................................................................................1847.16 Example - Application tier deployed on a separate network..................................................1847.16.1 Example - Thick client and database tier separated from BI platform servers by a firewall.....1867.16.2 Firewall settings for integrated environments.......................................................................1897.17 2012-08-176 Contents 7. Specific firewall guidelines for SAP integration.....................................................................1897.17.1 Firewall configuration for JD Edwards EnterpriseOne integration..........................................1917.17.2 Specific firewall guidelines for Oracle EBS...........................................................................1937.17.3 Firewall configuration for PeopleSoft Enterprise integration .................................................1947.17.4 Firewall configuration for Siebel integration..........................................................................1967.17.5 BI platform and reverse proxy servers .................................................................................1977.18 Supported reverse proxy servers ........................................................................................1977.18.1 Understanding how web applications are deployed .............................................................1987.18.2 Configuring reverse proxy servers for BI platform web applications......................................1987.19 Detailed instructions for configuring reverse proxy servers..................................................1987.19.1 To configure the reverse proxy server..................................................................................1997.19.2 To configure Apache 2.2 reverse proxy server for BI platform .............................................1997.19.3 To configure WebSEAL 6.0 reverse proxy server for BI platform .........................................2007.19.4 To configure Microsoft ISA 2006 for BI platform .................................................................2017.19.5 Special configuration for BI platform in reverse proxy deployments......................................2027.20 Enabling reverse proxy for web services..............................................................................2037.20.1 Enabling the root path for session cookies for ISA 2006......................................................2057.20.2 Enabling reverse proxy for SAP BusinessObjects Live Office...............................................2077.20.3 Authentication.....................................................................................................................209Chapter 8 Authentication options in BI platform....................................................................................2098.1 Primary authentication..........................................................................................................2108.1.1 Security plug-ins..................................................................................................................2118.1.2 Single sign-on to BI platform................................................................................................2118.1.3 Enterprise authentication......................................................................................................2148.2 Enterprise authentication overview.......................................................................................2148.2.1 Enterprise authentication settings.........................................................................................2148.2.2 To change Enterprise settings..............................................................................................2158.2.3 Enabling Trusted Authentication...........................................................................................2178.2.4 Configuring Trusted Authentication for a web application.....................................................2188.2.5 LDAP authentication............................................................................................................2288.3 Using LDAP authentication..................................................................................................2288.3.1 Configuring LDAP authentication..........................................................................................2298.3.2 Mapping LDAP groups.........................................................................................................2408.3.3 Windows AD authentication.................................................................................................2498.4 Using Windows AD authentication.......................................................................................2498.4.1 Preparing the Domain Controller..........................................................................................2508.4.2 Configuring AD Authentication in the CMC..........................................................................2528.4.3 Configuring the BI platform service to run the SIA................................................................2588.4.4 Configuring the web application server for AD Authentication..............................................2608.4.5 Single Sign-On Setup...........................................................................................................2688.4.6 2012-08-177 Contents 8. Troubleshooting Windows AD authentication.......................................................................2808.4.7 SAP authentication...............................................................................................................2828.5 Configuring SAP authentication ...........................................................................................2828.5.1 Creating a user account for BI platform................................................................................2838.5.2 Connecting to SAP entitlement systems..............................................................................2848.5.3 Setting SAP Authentication options.....................................................................................2868.5.4 Importing SAP roles.............................................................................................................2908.5.5 Configuring Secure Network Communication (SNC)............................................................2948.5.6 Setting up single sign-on to the SAP system........................................................................3078.5.7 Configuring SSO for SAP Crystal Reports and SAP NetWeaver..........................................3118.5.8 PeopleSoft authentication....................................................................................................3128.6 Overview..............................................................................................................................3128.6.1 Enabling PeopleSoft Enterprise authentication......................................................................3128.6.2 Mapping PeopleSoft roles to the BI Platform........................................................................3138.6.3 Scheduling user updates......................................................................................................3168.6.4 Using the PeopleSoft Security Bridge..................................................................................3188.6.5 JD Edwards authentication...................................................................................................3288.7 Overview..............................................................................................................................3288.7.1 Enabling JD Edwards EnterpriseOne authentication..............................................................3288.7.2 Mapping JD Edwards EnterpriseOne roles to BI Platform.....................................................3298.7.3 Scheduling user updates......................................................................................................3328.7.4 Siebel authentication............................................................................................................3338.8 Enabling Siebel authentication..............................................................................................3348.8.1 Mapping roles to BI platform................................................................................................3348.8.2 Scheduling user updates......................................................................................................3378.8.3 Oracle EBS authentication...................................................................................................3398.9 Enabling Oracle EBS authentication......................................................................................3398.9.1 Mapping Oracle E-Business Suite roles to BI platform..........................................................3408.9.2 Unmapping roles .................................................................................................................3448.9.3 Customizing rights for mapped Oracle EBS groups and users .............................................3448.9.4 Configuring Single Sign-on (SSO) for SAP Crystal Reports and Oracle EBS........................3468.9.5 Server Administration..........................................................................................................347Chapter 9 Server administration...........................................................................................................3479.1 Working with the Servers management area in the CMC.....................................................3479.1.1 Managing servers by using scripts on Windows ..................................................................3519.1.2 Managing servers on Unix ...................................................................................................3519.1.3 Managing License keys........................................................................................................3519.1.4 Measuring licenses..............................................................................................................3539.1.5 Viewing and changing a server's status................................................................................3549.1.6 Adding, cloning, or deleting servers......................................................................................3599.1.7 2012-08-178 Contents 9. Clustering Central Management Servers..............................................................................3629.1.8 Managing server groups.......................................................................................................3669.1.9 Assessing your system's performance.................................................................................3719.1.10 Configuring server settings..................................................................................................3739.1.11 Configuring server network settings.....................................................................................3779.1.12 Managing Nodes..................................................................................................................3849.1.13 Renaming a machine in a BI platform deployment.................................................................4069.1.14 Using 32-bit and 64-bit third-party libraries with BI platform..................................................4129.1.15 Managing server and node placeholders..............................................................................4139.1.16 Managing Central Management Server (CMS) databases.................................................415Chapter 10 Managing CMS system database connections.....................................................................41510.1 To select SAP HANA as a CMS database...........................................................................41510.1.1 Selecting a new or existing CMS database..........................................................................41610.2 To select a new or existing CMS database on Windows......................................................41710.2.1 To select a new or existing CMS database on Unix..............................................................41710.2.2 Recreating the CMS system database.................................................................................41810.3 To recreate the CMS system database on Windows............................................................41810.3.1 To recreate the CMS system database on Unix...................................................................41910.3.2 Copying data from one CMS system database to another...................................................42010.4 Preparing to copy a CMS system database.........................................................................42010.4.1 To copy a CMS system database on Windows....................................................................42110.4.2 To copy data from a CMS system database on Unix............................................................42110.4.3 Managing Web Application Container Servers (WACS).....................................................423Chapter 11 WACS.................................................................................................................................42311.1 Web Application Container Server (WACS).........................................................................42311.1.1 Adding or removing additional WACS to your deployment...................................................42611.1.2 Adding or removing services to WACS................................................................................43011.1.3 Configuring HTTPS/SSL......................................................................................................43111.1.4 Supported authentication methods.......................................................................................43511.1.5 Configuring AD Kerberos for WACS ...................................................................................43611.1.6 Configuring AD Kerberos single sign-on ..............................................................................44211.1.7 Configuring RESTful web services........................................................................................44411.1.8 WACS and your IT environment...........................................................................................44811.1.9 Configuring web application properties.................................................................................45111.1.10 Troubleshooting...................................................................................................................45211.1.11 WACS properties.................................................................................................................45611.1.12 2012-08-179 Contents 10. Backing Up and Restoring..................................................................................................457Chapter 12 Backing up and restoring your system..................................................................................45712.1 Backups...............................................................................................................................45812.1.1 Restoring your system.........................................................................................................46412.1.2 BackupCluster and RestoreCluster scripts...........................................................................47212.1.3 Copying your deployment...................................................................................................477Chapter 13 Overview of system copying................................................................................................47713.1 Terminology.........................................................................................................................47713.2 Use cases............................................................................................................................47713.3 Planning to copy your system...............................................................................................47913.4 Considerations and limitations..............................................................................................48013.5 System copy procedure.......................................................................................................48213.6 To perform a system copy export from a source system......................................................48213.6.1 To perform a system copy import to a target system...........................................................48513.6.2 Version Management..........................................................................................................487Chapter 14 liveManaging Different Versions of BI resources .................................................................48714.1 Using the Version Management System Settings Option.....................................................48814.2 Setting the ClearCase Version Management System in Windows.......................................48914.2.1 Setting the ClearCase Version Management System in Unix...............................................48914.2.2 Comparing different versions of an LCM job........................................................................49014.3 Upgrading Subversion content.............................................................................................49014.4 Promotion Management......................................................................................................493Chapter 15 Welcome to promotion management....................................................................................49315.1 Promotion Management Overview.......................................................................................49315.1.1 Promotion Management Features........................................................................................49315.1.2 Application Access Rights....................................................................................................49415.1.3 Getting Started with the promotion management tool..........................................................49515.2 Accessing the promotion management application...............................................................49515.2.1 User Interface components..................................................................................................49515.2.2 Using the Settings Option....................................................................................................49715.2.3 Using the promotion management tool.................................................................................50315.3 Creating and Deleting a Folder.............................................................................................50415.3.1 Creating a Job.....................................................................................................................50515.3.2 Creating a New Job by Copying an Existing Job .................................................................50815.3.3 Searching for a Job..............................................................................................................50815.3.4 Editing a Job........................................................................................................................50915.3.5 2012-08-1710 Contents 11. Adding an Infoobject in promotion management...................................................................50915.3.6 Managing Dependencies in promotion management ...........................................................51015.3.7 Searching for Dependents ..................................................................................................51115.3.8 Promoting a Job When the Repositories are Connected......................................................51215.3.9 Promoting a Job by Using a BIAR File..................................................................................51415.3.10 Scheduling a job promotion..................................................................................................51715.3.11 Viewing the History of a Job................................................................................................51815.3.12 Rolling Back a Job...............................................................................................................51915.3.13 Managing Different Versions of an Infoobject.......................................................................52115.4 Version Management application access rights....................................................................52315.4.1 Backing Up and Restoring Subversion Files.........................................................................52315.4.2 Using the Command Line Option.........................................................................................52415.5 Running the Command Line Option in Windows...................................................................52515.5.1 Running the Command Line Option in UNIX.........................................................................52515.5.2 Command Line Option Parameters......................................................................................52615.5.3 Sample Properties File.........................................................................................................53215.5.4 Using the Enhanced Change and Transport System.............................................................53315.6 Pre-requisites.......................................................................................................................53415.6.1 Configuring the Business Intelligence Platform and CTS+ Integration...................................53415.6.2 Promoting a Job Using CTS.................................................................................................53915.6.3 Visual Difference.................................................................................................................543Chapter 16 Visual Difference in the promotion management tool............................................................54316.1 Comparing objects or files by using visual difference...........................................................54416.1.1 Comparing objects or files in version management system..................................................54516.1.2 Scheduling the comparison..................................................................................................54616.1.3 Managing Applications.......................................................................................................549Chapter 17 Managing applications through the CMC..............................................................................54917.1 Overview..............................................................................................................................54917.1.1 Common settings for applications........................................................................................55017.1.2 Application-specific settings.................................................................................................55117.1.3 Managing applications through BOE.war properties.............................................................57917.2 The BOE war file..................................................................................................................57917.2.1 Customizing BI launch pad and OpenDocument logon entry points......................................58817.3 BI launch pad and OpenDocument file locations...................................................................58817.3.1 To define a custom logon page............................................................................................58917.3.2 To add trusted authentication at logon..................................................................................59017.3.3 2012-08-1711 Contents 12. Managing Connections and Universes...............................................................................593Chapter 18 Managing connections.........................................................................................................59318.1 To delete a universe connection...........................................................................................59318.1.1 Managing universes.............................................................................................................59418.2 To delete universes..............................................................................................................59418.2.1 Monitoring...........................................................................................................................595Chapter 19 About Monitoring.................................................................................................................59519.1 Monitoring terms..................................................................................................................59519.2 Architecture.........................................................................................................................59719.2.1 Cluster support for monitoring server...................................................................................60019.3 Metrics................................................................................................................................60119.4 CMS Query metrics.............................................................................................................61319.4.1 Configuration properties.......................................................................................................61319.5 JMX end point URL..............................................................................................................61819.5.1 Integrating with other applications........................................................................................61919.6 Integrating the monitoring application with IBM Tivoli............................................................61919.6.1 Integrating the monitoring application with SAP Solution Manager ......................................62219.6.2 Creating Universe for Derby Database.................................................................................62319.7 Audit DB Support for Monitoring .........................................................................................62419.8 Pre-Requisites......................................................................................................................62419.8.1 Configuring SBO files..........................................................................................................62419.8.2 Adding alias names in the SBO file ......................................................................................62619.8.3 Monitoring Database Migration............................................................................................62619.9 Pre-requisites.......................................................................................................................62719.9.1 Preparing the Target Database ............................................................................................62719.9.2 Creating CSV dumps...........................................................................................................62719.9.3 Restoring contents on the target database...........................................................................62819.9.4 Validating the Migration .......................................................................................................62919.9.5 Troubleshooting...................................................................................................................62919.10 Dashboard...........................................................................................................................62919.10.1 Alerts...................................................................................................................................63019.10.2 Watchlist..............................................................................................................................63019.10.3 Probes.................................................................................................................................63119.10.4 Metrics................................................................................................................................63119.10.5 Graph...................................................................................................................................63219.10.6 Auditing...............................................................................................................................633Chapter 20 Overview..............................................................................................................................63320.1 2012-08-1712 Contents 13. CMC Auditing page.............................................................................................................63920.2 Auditing Status Summary.....................................................................................................63920.2.1 Configuring Auditing events.................................................................................................64120.2.2 Auditing Data Store configuration settings...........................................................................64320.2.3 Audit events.........................................................................................................................64420.3 Audit events and details.......................................................................................................65320.3.1 Platform Search...................................................................................................................673Chapter 21 Understanding Platform Search............................................................................................67321.1 Platform Search SDK...........................................................................................................67321.1.1 Clustered Environment.........................................................................................................67421.1.2 Setting Up Platform Search..................................................................................................67421.2 Deploying OpenSearch........................................................................................................67421.2.1 Configuring reverse proxy....................................................................................................67621.2.2 Configuring Application Properties in CMC..........................................................................67621.2.3 Working with Platform Search..............................................................................................68121.3 Indexing Content in the CMS Repository.............................................................................68121.3.1 Searching Results................................................................................................................68321.3.2 Integrating Platform Search with SAP NetWeaver Enterprise Search...................................69021.4 Creating a Connector in SAP NetWeaver Enterprise Search ...............................................69021.4.1 Importing a User's Role in SAP BusinessObjects Business Intelligence Authentication........69121.4.2 Searching from NetWeaver Enterprise Search.....................................................................69121.5 Auditing................................................................................................................................69221.6 Troubleshooting...................................................................................................................69321.7 Self Healing..........................................................................................................................69321.7.1 Problem Scenarios...............................................................................................................69321.7.2 Federation...........................................................................................................................697Chapter 22 Federation............................................................................................................................69722.1 Federation terms..................................................................................................................69822.2 BI application .......................................................................................................................69822.2.1 Destination site ...................................................................................................................69922.2.2 Local....................................................................................................................................69922.2.3 Locally run completed instances ..........................................................................................69922.2.4 Multiple origin sites .............................................................................................................69922.2.5 One-way replication .............................................................................................................69922.2.6 Origin site ...........................................................................................................................70022.2.7 Remote................................................................................................................................70022.2.8 Remote connection..............................................................................................................70022.2.9 Remote scheduling..............................................................................................................70022.2.10 2012-08-1713 Contents 14. Replication...........................................................................................................................70022.2.11 Replication job.....................................................................................................................70022.2.12 Replication list......................................................................................................................70122.2.13 Replication object.................................................................................................................70122.2.14 Replication package.............................................................................................................70122.2.15 Replication refresh...............................................................................................................70122.2.16 Two-way replication..............................................................................................................70122.2.17 Managing security rights......................................................................................................70222.3 Rights required on the origin site..........................................................................................70222.3.1 Rights required on the destination site.................................................................................70322.3.2 Federation-specific rights.....................................................................................................70422.3.3 Replicating security on an object..........................................................................................70622.3.4 Replicating security using access levels...............................................................................70622.3.5 Replication types and mode options.....................................................................................70722.4 One-way replication .............................................................................................................70722.4.1 Two-way replication .............................................................................................................70722.4.2 Refresh from origin or refresh from destination....................................................................70822.4.3 Replicating third-party users and groups...............................................................................70922.5 Replicating universes and universe connections...................................................................71022.6 Managing replication lists.....................................................................................................71122.7 Creating replication lists.......................................................................................................71222.7.1 Modifying Replication Lists...................................................................................................71422.7.2 Managing remote connections.............................................................................................71522.8 Creating remote connections...............................................................................................71522.8.1 Modifying remote connections.............................................................................................71722.8.2 Managing replication jobs.....................................................................................................71822.9 Creating replication jobs.......................................................................................................71822.9.1 Scheduling replication jobs...................................................................................................72122.9.2 Modifying replication jobs.....................................................................................................72222.9.3 Viewing a log after a replication job......................................................................................72222.9.4 Managing object cleanup......................................................................................................72322.10 How to use object cleanup...................................................................................................72322.10.1 Object cleanup limits............................................................................................................72422.10.2 Object cleanup frequency.....................................................................................................72422.10.3 Managing conflict detection and resolution...........................................................................72522.11 One-way replication conflict resolution.................................................................................72622.11.1 Two-way replication conflict resolution.................................................................................72722.11.2 Using Web Services in Federation.......................................................................................73022.12 Session variables ................................................................................................................73022.12.1 File caching .........................................................................................................................73122.12.2 Custom deployment ............................................................................................................73122.12.3 2012-08-1714 Contents 15. Remote scheduling and locally run instances........................................................................73222.13 Remote scheduling..............................................................................................................73222.13.1 Locally run instances............................................................................................................73322.13.2 Instance share......................................................................................................................73422.13.3 Importing and promoting replicated content..........................................................................73522.14 Importing replicated content.................................................................................................73522.14.1 Importing replicated content and continuing replication ........................................................73522.14.2 Promoting content from a test environment..........................................................................73622.14.3 Re-pointing a destination site...............................................................................................73722.14.4 Best practices......................................................................................................................73722.15 Current release limitations....................................................................................................74022.15.1 Troubleshooting error messages..........................................................................................74122.15.2 Supplementary Configurations for ERP Environments........................................................745Chapter 23 Configurations for SAP NetWeaver integration....................................................................74523.1 Integrating with SAP NetWeaver Business Warehouse (BW)...............................................74523.1.1 Configuring for JD Edwards integration................................................................................79323.2 Configuring Single Sign-on (SSO) for SAP Crystal Reports.................................................79423.2.1 Configuring Secure Socket Layer for JD Edwards Integrations............................................79423.2.2 Configuring for PeopleSoft Enterprise integration.................................................................79623.3 Configuring Single Sign-on (SSO) for SAP Crystal Reports and PeopleSoft Enterprise........79623.3.1 Configuring Secure Socket Layer communication................................................................79723.3.2 Performance Tuning for PeopleSoft systems........................................................................79923.3.3 Configuring for Siebel integration.........................................................................................80023.4 Configuring Siebel to integrate with SAP BusinessObjects Business Intelligence platform....80023.4.1 Creating the Crystal Reports menu item..............................................................................80123.4.2 Contextual awareness..........................................................................................................80323.4.3 Configuring Single Sign-on (SSO) for SAP Crystal Reports and Siebel................................80523.4.4 Configuring for Secure Sockets Layer Communication........................................................80623.4.5 Managing and Configuring Logs.........................................................................................807Chapter 24 Logging traces from components.........................................................................................80724.1 Trace log levels....................................................................................................................80724.2 Configuring tracing for servers.............................................................................................80824.3 To set the server trace log level in the CMC........................................................................80924.3.1 To set the trace log level for multiple servers managed in the CMC.....................................80924.3.2 To configure server tracing through the BO_trace.ini file......................................................81024.3.3 Configuring tracing for web applications...............................................................................81324.4 To set the web application trace log level in the CMC..........................................................81324.4.1 To manually modify tracing settings through the BO_trace.ini file.........................................81424.4.2 2012-08-1715 Contents 16. Configuring tracing for Web Intelligence applications............................................................81924.5 Configuring tracing for upgrade management tool................................................................81924.6 To configure tracing for upgrade management tool...............................................................81924.6.1 Integration to SAP Solution Manager..................................................................................821Chapter 25 Integration overview.............................................................................................................82125.1 SAP Solution Manager integration checklist.........................................................................82125.2 Managing system landscape directory registration...............................................................82325.3 Registration of BI platform in the System Landscape...........................................................82325.3.1 When is SLD registration triggered?....................................................................................82425.3.2 Logging SLD connectivity ...................................................................................................82525.3.3 Managing Solution Management Diagnostics agents...........................................................82525.4 Solution Manager Diagnostics (SMD) overview...................................................................82525.4.1 Working with SMD agents...................................................................................................82625.4.2 SMAdmin user account........................................................................................................82625.4.3 Managing performance instrumentation................................................................................82725.5 Performance instrumentation for BI platform........................................................................82725.5.1 Setting up performance instrumentation for BI platform........................................................82725.5.2 Performance instrumentation for the web tier.......................................................................82925.5.3 Instrumentation log files ......................................................................................................82925.5.4 Tracing with SAP Passport...................................................................................................82925.6 Command Line Administration............................................................................................831Chapter 26 Unix scripts..........................................................................................................................83126.1 Script utilities.......................................................................................................................83126.1.1 Script templates...................................................................................................................83726.1.2 Scripts used by SAP BusinessObjects Business Intelligence platform.................................83726.1.3 Windows scripts..................................................................................................................83926.2 ccm.exe...............................................................................................................................83926.2.1 Server Command Lines........................................................................................................84226.3 Command lines overview.....................................................................................................84226.3.1 Standard options for all servers............................................................................................84326.3.2 Central Management Server................................................................................................84426.3.3 Crystal Reports Processing Server and Crystal Reports Cache Server................................84526.3.4 Dashboards Processing Server and Dashboards Cache Server...........................................84626.3.5 Job servers..........................................................................................................................84726.3.6 Adaptive Processing Server.................................................................................................84826.3.7 Report Application Server....................................................................................................84926.3.8 Web Intelligence Processing Server.....................................................................................85026.3.9 Input and Output File Repository Servers.............................................................................85226.3.10 2012-08-1716 Contents 17. Event Server........................................................................................................................85226.3.11 Dashboard and Dashboard Analytics Servers .....................................................................85326.3.12 Rights Appendix..................................................................................................................855Chapter 27 About the rights appendix.....................................................................................................85527.1 General rights......................................................................................................................85527.2 Rights for specific object types............................................................................................85827.3 Folder rights.........................................................................................................................85827.3.1 Categories...........................................................................................................................85827.3.2 Notes...................................................................................................................................85927.3.3 Crystal reports.....................................................................................................................85927.3.4 Web Intelligence documents................................................................................................86027.3.5 Users and groups.................................................................................................................86127.3.6 Access levels.......................................................................................................................86227.3.7 Universe (.unv) rights...........................................................................................................86327.3.8 Universe (.unx) rights...........................................................................................................86427.3.9 Universe object-access levels..............................................................................................86627.3.10 Connection rights.................................................................................................................86727.3.11 Applications.........................................................................................................................86927.3.12 Server Properties Appendix.................................................................................................881Chapter 28 About the server properties appendix...................................................................................88128.1 Common server properties..................................................................................................88128.1.1 Core Services properties.....................................................................................................88428.1.2 Connectivity Services properties..........................................................................................89828.1.3 Crystal Reports Services properties....................................................................................90328.1.4 Analysis Services properties................................................................................................91228.1.5 Data Federation Services properties....................................................................................91428.1.6 Web Intelligence Services properties...................................................................................91528.1.7 Dashboards Services properties..........................................................................................92628.1.8 Server Metrics Appendix.....................................................................................................931Chapter 29 About the Server Metrics Appendix.....................................................................................93129.1 Common Server Metrics .....................................................................................................93129.1.1 Central Management Server Metrics...................................................................................93429.1.2 Connection Server metrics...................................................................................................93829.1.3 Event Server Metrics...........................................................................................................93929.1.4 File Repository Server Metrics.............................................................................................94029.1.5 Adaptive Processing Server metrics.....................................................................................94029.1.6 Web Application Container Server Metrics..........................................................................94629.1.7 2012-08-1717 Contents 18. Adaptive Job Server metrics................................................................................................94629.1.8 Crystal Report Server metrics..............................................................................................94929.1.9 Web Intelligence Server metrics...........................................................................................95229.1.10 Dashboards Server metrics..................................................................................................95429.1.11 Server and Node Placeholder Appendix..............................................................................957Chapter 30 Server and node placeholders..............................................................................................95730.1 Auditing Data Store Schema Appendix...............................................................................971Chapter 31 Overview..............................................................................................................................97131.1 Schema diagram..................................................................................................................97131.2 Auditing Data Store tables...................................................................................................97231.3 System Copy Worksheet.....................................................................................................983Chapter 32 System copy worksheet.......................................................................................................98332.1 More Information.................................................................................................................985Appendix A Index 987 2012-08-1718 Contents 19. Document History The following table provides an overview of the most important document changes. DescriptionDateVersion First release of this document.Nov. 2011 SAP BusinessObjects Business Intelligence platform 4.0 Additions to this release: Importing users and groups in bulk using the CCM Extending attributes for both imported and Enterprise user accounts Using the LDAP plugin to configure single sign-on to a SAP HANA database through JDBC SQL Anywhere as an ODBC data source. For node management with SQL Anywhere on Unix machines, see To prepare a Unix machine for SQL Anywhere. Best practices designed to prevent issues that can arise as a result of changes to machine names, IP addresses, cluster names, and server names Selecting SAP HANA as a CMS database after the initial installation of BI platform Configuring the RESTful Web Service hosted on a WACS server Performing a "hot backup" (creating a backup copy without having to stop servers) Creating a copy of a BI platform deployment for testing, standby, or other purposes Enabling and configuring integration details for the SAP StreamWork application Creating and assigning tasks to delegated administrators Self-healing mechanism for Platform Search In addition, all references to role-based licensing, BI Analyst and BI Viewer user accounts were removed. March 2012 SAP BusinessObjects Business Intelligence platform 4.0 Feature Pack 3 Related Topics To add users or user groups in bulk 2012-08-1719 Document History 20. Managing attributes for system users Using the LDAP plugin to configure SSO to the SAP HANA database To prepare a Unix machine for SQL Anywhere To select SAP HANA as a CMS database Configuring RESTful web services Hot backups Overview of system copying Managing SAP StreamWork integration Delegated administration and CMC tab access Self Healing 2012-08-1720 Document History 21. Getting Started 2.1 About this help This help provides you with information and procedures for deploying and configuring your BI platform. Procedures are provided for common tasks. Conceptual information and technical details are provided for all advanced topics. For information about installing this product, see the SAP BusinessObjects Business Intelligence Platform Installation Guide. 2.1.1 Who should use this help? This help covers deployment and configuration tasks. We recommend consulting this guide if you are: planning your first deployment configuring your first deployment making significant changes to the architecture of an existing deployment improving your system's performance. This help is intended for system administrators who are responsible for configuring, managing, and maintaining a BI platform installation. Familiarity with your operating system and your network environment is beneficial, as is a general understanding of web application server management and scripting technologies. However, to assist all levels of administrative experience, this help aims to provide sufficient background and conceptual information to clarify all administrative tasks and features. 2.1.2 About SAP BusinessObjects Business Intelligence platform The BI platform is a flexible, scalable, and reliable solution for delivering powerful, interactive reports to end users via any web applicationintranet, extranet, Internet or corporate portal. Whether it is used for distributing weekly sales reports, providing customers with personalized service offerings, or integrating critical information into corporate portals, BI platform delivers tangible benefits that extend 2012-08-1721 Getting Started 22. across and beyond the organization. As an integrated suite for reporting, analysis, and information delivery, the platform provides a solution for increasing end-user productivity and reducing administrative efforts. 2.1.3 Variables The following variables are used throughout this guide: DescriptionVariable The directory where BI platform is installed. On Windows, the default directory is C:Program Files (x86)SAP BusinessObjects. The name of your Unix operating system. Acceptable values are: aix_rs6000_64 linux_x64 solaris_sparcv9 hpux_ia64 The directory where scripts for administering BI platform are located On Windows: SAP BusinessObjects Enterprise XI 4.0win64_x64scripts On Unix: /sap_bobj/enterprise_xi40//scripts 2.2 Before you start 2.2.1 Key concepts 2012-08-1722 Getting Started 23. 2.2.1.1 Services and servers BI platform uses service and server to refer to the two types of software running on a BI platform computer. A service is a server subsystem that performs a specific function. The service runs in the memory space of its server, under the process ID of the parent container (server). For example, the Web Intelligence Scheduling Service is a subsystem that runs on the Adaptive Job Server. A server is a process at the operating system level (on some systems, called a daemon) that hosts one or more services. For example, the Central Management Server (CMS) and Adaptive Processing Server are servers. A server runs on a specific operating system account and has its own PID. A node is a collection of BI platform servers running on the same host and managed by the same Server Intelligence Agent (SIA). One or more nodes can be on a single host. BI platform can be installed on one computer, spread across different computers on an intranet, or separated over a wide area network (WAN). Services, servers, nodes, and hosts The following diagram shows a hypothetical installation of BI platform. The number of services, servers, nodes, and hostsand the type of services and serversvaries in actual installations. 2012-08-1723 Getting Started 24. Two hosts form the cluster named ProductionBISystem, which has two hosts: The host named HostAlpha has BI platform installed and is configured with two nodes: NodeMercury contains an Adaptive Job Server (NodeMercury.AJS) with services to schedule and publish reports, an Input File Repository Server (NodeMercury.IFRS) with a service to store input reports, and an Output File Repository Server (NodeMercury.OFRS) with a service to store report output. NodeVenus contains an Adaptive Processing Server (NodeVenus.APS) with services to provide publishing, monitoring, and translation features, an Adaptive Processing Server (Node Venus.APS2) with a service to provide client auditing, and a Central Management Server (NodeVenus.CMS) with a service to provide the CMS services. The host named HostBeta has BI platform installed and is configured with three nodes: NodeMars contains a Central Management Server (NodeMars.CMS) with a service to provide CMS services. Having the CMS on two computers enables load balancing and mitigation and failover capabilities. NodeJupiter contains an Web Intelligence Processing Server (NodeJupiter.WebIntelli gence) with a service to provide Web Intelligence reporting and an Event Server (Node Jupiter.EventServer) to provide report monitoring of files. 2012-08-1724 Getting Started 25. NodeSaturn contains an Adaptive Processing Server (NodeSaturn.APS) with a service to provide client auditing. Related Topics Server administration 2.2.1.2 Server Intelligence Server Intelligence is a core component of Business Intelligence platform. Changes to server processes applied in the Central Management Console (CMC) are propagated to corresponding server objects by the CMS. The Server Intelligence Agent (SIA) is used to automatically restart or shut down a server when it encounters an unexpected condition and is used by the Administrator to manage a node. The CMS archives information about servers in the CMS system database so you can easily restore default server settings or create redundant instances of server processes with the same settings. Because the SIA periodically queries the CMS to request information about servers it manages, the SIA knows which state servers should be in and when to take action. Note: A single computer can contain multiple nodes, and the nodes can be in the same BI platform cluster or in different clusters. 2.2.2 Key administrative tools 2.2.2.1 Central Management Console (CMC) The Central Management Console (CMC) is a web-based tool that you use to perform administrative tasks (including user, content, and server management) and to configure security settings. Because the CMC is a web-based application, you can perform all of the administrative tasks in a web browser on any computer that can connect to the web application server. 2012-08-1725 Getting Started 26. All users can log on to the CMC to change their own preference settings. Only members of the Administrators group can change management settings, unless a user is explicitly granted rights to do so. Roles can be assigned in the CMC to grant user privileges to perform minor administrative tasks, such as managing users in your group and managing reports in folders that belong to your team. 2.2.2.2 Central Configuration Manager The Central Configuration Manager (CCM) is a server troubleshooting and node management tool that is provided in two forms. On Windows, you use the CCM to manage local and remote servers, in the CCM user interface (UI) or from a command line. On Unix, you use the CCM shell script (ccm.sh) to manage servers from a command line. The CCM allows you to create and configure nodes and to start or stop your web application server, if it is the default bundled Tomcat web application server. On Windows, you can use the CCM to configure network parameters, such as Secure Socket Layer (SSL) encryption. The parameters apply to all servers in a node. Note: Most server management tasks are handled in the CMC, not the CCM. The CCM is used for troubleshooting and node configuration. 2.2.2.3 Repository Diagnostic Tool 2012-08-1726 Getting Started 27. The Repository Diagnostic Tool (RDT) can scan, diagnose, and repair inconsistencies that may occur between the Central Management Server (CMS) system database and the File Repository Servers (FRS) filestore. You can set a limit for the number of errors the RDT will find and repair before stopping. RDT should be used after you restore your BI platform system. 2.2.2.4 Upgrade management tool Upgrade management tool (formerly Import Wizard) is installed as a part of SAP BusinessObjects Business Intelligence platform, and guides administrators through the process of importing users, groups, and folders from previous versions of SAP BusinessObjects Business Intelligence platform. It also allows you to import and upgrade objects, events, server groups, repository objects, and calendars. For information on upgrading from a previous version of SAP BusinessObjects Business Intelligence platform, see the SAP BusinessObjects Business Intelligence Platform Upgrade Guide. 2.2.3 Key tasks Depending on your situation, you may want to focus on specific sections of this help, and there may be other resources available for you. For each of the following situations, there is a list of suggested tasks and reading topics. Related Topics Planning or performing your first deployment Configuring your deployment Improving your system's performance Central Management Console (CMC) 2.2.3.1 Planning or performing your first deployment If you are planning or performing your first deployment of BI platform, perform the following tasks and read the recommended topics: Architecture overview Understanding communication between BI platform components Security overview 2012-08-1727 Getting Started 28. If you plan to use third-party authentication, Authentication options in BI platform After installation, Server administration For more information about installing this product, see Business Intelligence Platform Installation Guide. To assess your needs and to design a deployment architecture, Business Intelligence Platform Planning Guide. Related Topics Architecture overview Understanding communication between BI platform components Secu