1004
Business Intelligence Platform Administrator Guide ■ SAP BusinessObjects Business Intelligence platform 4.0 Feature Pack 3 2012-12-06

Documentbo

  • Upload
    mukosha

  • View
    175

  • Download
    0

Embed Size (px)

Citation preview

Business Intelligence Platform Administrator Guide SAP BusinessObjects Business Intelligence platform 4.0 Feature Pack 3

2012-12-06

Copyright

2012 SAP AG. All rights reserved.SAP, R/3, SAP NetWeaver, Duet, PartnerEdge, ByDesign, SAP BusinessObjects Explorer, StreamWork, SAP HANA and other SAP products and services mentioned herein as well as their respective logos are trademarks or registered trademarks of SAP AG in Germany and other countries.Business Objects and the Business Objects logo, BusinessObjects, Crystal Reports, Crystal Decisions, Web Intelligence, Xcelsius, and other Business Objects products and services mentioned herein as well as their respective logos are trademarks or registered trademarks of Business Objects Software Ltd. Business Objects is an SAP company.Sybase and Adaptive Server, iAnywhere, Sybase 365, SQL Anywhere, and other Sybase products and services mentioned herein as well as their respective logos are trademarks or registered trademarks of Sybase, Inc. Sybase is an SAP company. Crossgate, m@gic EDDY, B2B 360, B2B 360 Services are registered trademarks of Crossgate AG in Germany and other countries. Crossgate is an SAP company. All other product and service names mentioned are the trademarks of their respective companies. Data contained in this document serves informational purposes only. National product specifications may vary.These materials are subject to change without notice. These materials are provided by SAP AG and its affiliated companies ("SAP Group") for informational purposes only, without representation or warranty of any kind, and SAP Group shall not be liable for errors or omissions with respect to the materials. The only warranties for SAP Group products and services are those that are set forth in the express warranty statements accompanying such products and services, if any. Nothing herein should be construed as constituting an additional warranty. 2012-08-17

Contents

Chapter 1

Document History.................................................................................................................19

Chapter 2

Getting Started......................................................................................................................21 About this help.......................................................................................................................21 Who should use this help?.....................................................................................................21 About SAP BusinessObjects Business Intelligence platform .................................................21 Variables................................................................................................................................22 Before you start.....................................................................................................................22 Key concepts.........................................................................................................................22 Key administrative tools.........................................................................................................25 Key tasks...............................................................................................................................27 Architecture...........................................................................................................................31 Architecture overview............................................................................................................31 Architecture diagram..............................................................................................................32 Architecture tiers...................................................................................................................33 Databases..............................................................................................................................34 Servers..................................................................................................................................35 Web application servers.........................................................................................................36 Software Development Kits...................................................................................................37 Data sources.........................................................................................................................39 Authentication and single sign-on...........................................................................................40 SAP integration......................................................................................................................42 Lifecycle management (LCM).................................................................................................43 Integrated version control.......................................................................................................43 Upgrade path.........................................................................................................................44 Services and servers..............................................................................................................44 Server changes since XI 3.1...................................................................................................46 Services.................................................................................................................................47 Service categories.................................................................................................................55 Server types..........................................................................................................................58 Servers..................................................................................................................................60

2.1 2.1.1 2.1.2 2.1.3 2.2 2.2.1 2.2.2 2.2.3Chapter 3

3.1 3.1.1 3.1.2 3.1.3 3.1.4 3.1.5 3.1.6 3.1.7 3.1.8 3.1.9 3.1.10 3.1.11 3.1.12 3.2 3.2.1 3.2.2 3.2.3 3.2.4 3.2.5

3

2012-08-17

Contents

3.3 3.3.1 3.3.2 3.3.3 3.3.4 3.4 3.4.1 3.4.2 3.4.3 3.4.4 3.4.5Chapter 4

Client applications..................................................................................................................62 Installed with SAP BusinessObjects Business Intelligence Platform Client Tools....................63 Installed with SAP BusinessObjects Business Intelligence Platform.......................................68 Available separately...............................................................................................................69 Web application clients..........................................................................................................70 Process Workflows................................................................................................................74 Startup and authentication.....................................................................................................74 Program objects.....................................................................................................................76 Crystal Reports......................................................................................................................77 Web Intelligence....................................................................................................................81 Analysis.................................................................................................................................83 Managing Licenses...............................................................................................................85 Managing License keys..........................................................................................................85 To view license information....................................................................................................85 To add a license key...............................................................................................................85 To view current account activity.............................................................................................86 Measuring licenses................................................................................................................86 To run a license audit.............................................................................................................87 Managing Users and Groups................................................................................................89 Account management overview..............................................................................................89 User management..................................................................................................................89 Group management...............................................................................................................90 Available authentication types ...............................................................................................91 Managing Enterprise and general accounts............................................................................93 To create a user account........................................................................................................93 To modify a user account.......................................................................................................94 To delete a user account........................................................................................................94 To create a new group...........................................................................................................95 To modify a group's properties...............................................................................................95 To view group members.........................................................................................................96 To add subgroups..................................................................................................................96 To specify group membership................................................................................................97 To delete a group...................................................................................................................97 To add users or user groups in bulk.......................................................................................98 To enable the Guest account.................................................................................................98 Adding users to groups..........................................................................................................99 Changing password settings................................................................................................100 Granting access to users and groups...................................................................................102

4.1 4.1.1 4.1.2 4.1.3 4.2 4.2.1Chapter 5

5.1 5.1.1 5.1.2 5.1.3 5.2 5.2.1 5.2.2 5.2.3 5.2.4 5.2.5 5.2.6 5.2.7 5.2.8 5.2.9 5.2.10 5.2.11 5.2.12 5.2.13 5.2.14

4

2012-08-17

Contents

5.2.15 5.2.16 5.2.17 5.2.18 5.2.19 5.2.20 5.3 5.3.1 5.3.2 5.3.3 5.3.4 5.3.5Chapter 6

Controlling access to user inboxes.......................................................................................102 Configuring BI launch pad options........................................................................................103 Managing attributes for system users .................................................................................106 Prioritizing user attributes across multiple authentication options.........................................107 To add a new user attribute..................................................................................................108 To edit extended user attributes...........................................................................................109 Managing aliases.................................................................................................................109 To create a user and add a third-party alias..........................................................................110 To create a new alias for an existing user.............................................................................110 To assign an alias from another user....................................................................................111 To delete an alias.................................................................................................................112 To disable an alias................................................................................................................112 Setting Rights......................................................................................................................115 How rights work in BI platform.............................................................................................115 Access levels.......................................................................................................................115 Advanced rights settings......................................................................................................116 Inheritance...........................................................................................................................117 Type-specific rights..............................................................................................................122 Determining effective rights.................................................................................................123 Managing security settings for objects in the CMC..............................................................124 To view rights for a principal on an object.............................................................................124 To assign principals to an access control list for an object....................................................125 To modify security for a principal on an object......................................................................125 To set rights on a top-level folder in BI platform....................................................................126 Checking security settings for a principal.............................................................................126 Working with access levels..................................................................................................129 Choosing between View and View On Demand access levels.............................................131 To copy an existing access level..........................................................................................132 To create a new access level...............................................................................................132 To rename an access level...................................................................................................133 To delete an access level.....................................................................................................133 To modify rights in an access level.......................................................................................133 Tracing the relationship between access levels and objects.................................................134 Managing access levels across sites....................................................................................135 Breaking inheritance.............................................................................................................136 To disable inheritance...........................................................................................................137 Using rights to delegate administration.................................................................................137 Choosing between Modify the rights users have to objects options.....................................139 Owner rights........................................................................................................................140 Summary of recommendations for rights administration.......................................................140

6.1 6.1.1 6.1.2 6.1.3 6.1.4 6.1.5 6.2 6.2.1 6.2.2 6.2.3 6.2.4 6.2.5 6.3 6.3.1 6.3.2 6.3.3 6.3.4 6.3.5 6.3.6 6.3.7 6.3.8 6.4 6.4.1 6.5 6.5.1 6.5.2 6.6

5

2012-08-17

Contents

Chapter 7

Securing the BI platform.....................................................................................................143 Security overview ................................................................................................................143 Disaster recovery planning...................................................................................................143 General recommendations for securing your deployment.....................................................144 Configuring security for bundled third-party servers.............................................................145 Active trust relationship........................................................................................................145 Logon tokens.......................................................................................................................146 Ticket mechanism for distributed security.............................................................................146 Sessions and session tracking.............................................................................................147 CMS session tracking..........................................................................................................147 Environment protection........................................................................................................148 Web browser to web server.................................................................................................148 Web server to BI platform....................................................................................................148 Auditing security configuration modifications .......................................................................149 Auditing web activity............................................................................................................149 Protection against malicious logon attempts.........................................................................149 Password restrictions...........................................................................................................149 Logon restrictions................................................................................................................150 User restrictions..................................................................................................................150 Guest account restrictions...................................................................................................151 Processing extensions.........................................................................................................151 Overview of BI platform data security...................................................................................151 Data processing security modes..........................................................................................152 Cryptography in BI platform..................................................................................................154 Working with cluster keys....................................................................................................155 Cryptographic Officers.........................................................................................................157 Managing cryptographic keys in the CMC............................................................................158 Configuring servers for SSL.................................................................................................162 Creating key and certificate files..........................................................................................163 Configuring the SSL protocol...............................................................................................165 Understanding communication between BI platform components.........................................170 Overview of BI platform servers and communication ports...................................................170 Communication between BI platform components ...............................................................172 Configuring BI platform for firewalls......................................................................................179 To configure the system for firewalls....................................................................................179 Debugging a firewalled deployment......................................................................................182 Examples of typical firewall scenarios...................................................................................184 Example - Application tier deployed on a separate network..................................................184 Example - Thick client and database tier separated from BI platform servers by a firewall.....186 Firewall settings for integrated environments.......................................................................189

7.1 7.2 7.3 7.4 7.5 7.5.1 7.5.2 7.6 7.6.1 7.7 7.7.1 7.7.2 7.8 7.9 7.9.1 7.9.2 7.9.3 7.9.4 7.9.5 7.10 7.11 7.11.1 7.12 7.12.1 7.12.2 7.12.3 7.13 7.13.1 7.13.2 7.14 7.14.1 7.14.2 7.15 7.15.1 7.15.2 7.16 7.16.1 7.16.2 7.17

6

2012-08-17

Contents

7.17.1 7.17.2 7.17.3 7.17.4 7.17.5 7.18 7.18.1 7.18.2 7.19 7.19.1 7.19.2 7.19.3 7.19.4 7.19.5 7.20 7.20.1 7.20.2 7.20.3Chapter 8

Specific firewall guidelines for SAP integration.....................................................................189 Firewall configuration for JD Edwards EnterpriseOne integration..........................................191 Specific firewall guidelines for Oracle EBS...........................................................................193 Firewall configuration for PeopleSoft Enterprise integration .................................................194 Firewall configuration for Siebel integration..........................................................................196 BI platform and reverse proxy servers .................................................................................197 Supported reverse proxy servers ........................................................................................197 Understanding how web applications are deployed .............................................................198 Configuring reverse proxy servers for BI platform web applications......................................198 Detailed instructions for configuring reverse proxy servers..................................................198 To configure the reverse proxy server..................................................................................199 To configure Apache 2.2 reverse proxy server for BI platform .............................................199 To configure WebSEAL 6.0 reverse proxy server for BI platform .........................................200 To configure Microsoft ISA 2006 for BI platform .................................................................201 Special configuration for BI platform in reverse proxy deployments......................................202 Enabling reverse proxy for web services..............................................................................203 Enabling the root path for session cookies for ISA 2006......................................................205 Enabling reverse proxy for SAP BusinessObjects Live Office...............................................207 Authentication.....................................................................................................................209 Authentication options in BI platform....................................................................................209 Primary authentication..........................................................................................................210 Security plug-ins..................................................................................................................211 Single sign-on to BI platform................................................................................................211 Enterprise authentication......................................................................................................214 Enterprise authentication overview.......................................................................................214 Enterprise authentication settings.........................................................................................214 To change Enterprise settings..............................................................................................215 Enabling Trusted Authentication...........................................................................................217 Configuring Trusted Authentication for a web application.....................................................218 LDAP authentication............................................................................................................228 Using LDAP authentication..................................................................................................228 Configuring LDAP authentication..........................................................................................229 Mapping LDAP groups.........................................................................................................240 Windows AD authentication.................................................................................................249 Using Windows AD authentication.......................................................................................249 Preparing the Domain Controller..........................................................................................250 Configuring AD Authentication in the CMC..........................................................................252 Configuring the BI platform service to run the SIA................................................................258 Configuring the web application server for AD Authentication..............................................260 Single Sign-On Setup...........................................................................................................268

8.1 8.1.1 8.1.2 8.1.3 8.2 8.2.1 8.2.2 8.2.3 8.2.4 8.2.5 8.3 8.3.1 8.3.2 8.3.3 8.4 8.4.1 8.4.2 8.4.3 8.4.4 8.4.5 8.4.6

7

2012-08-17

Contents

8.4.7 8.5 8.5.1 8.5.2 8.5.3 8.5.4 8.5.5 8.5.6 8.5.7 8.5.8 8.6 8.6.1 8.6.2 8.6.3 8.6.4 8.6.5 8.7 8.7.1 8.7.2 8.7.3 8.7.4 8.8 8.8.1 8.8.2 8.8.3 8.9 8.9.1 8.9.2 8.9.3 8.9.4 8.9.5Chapter 9

Troubleshooting Windows AD authentication.......................................................................280 SAP authentication...............................................................................................................282 Configuring SAP authentication ...........................................................................................282 Creating a user account for BI platform................................................................................283 Connecting to SAP entitlement systems..............................................................................284 Setting SAP Authentication options.....................................................................................286 Importing SAP roles.............................................................................................................290 Configuring Secure Network Communication (SNC)............................................................294 Setting up single sign-on to the SAP system........................................................................307 Configuring SSO for SAP Crystal Reports and SAP NetWeaver..........................................311 PeopleSoft authentication....................................................................................................312 Overview..............................................................................................................................312 Enabling PeopleSoft Enterprise authentication......................................................................312 Mapping PeopleSoft roles to the BI Platform........................................................................313 Scheduling user updates......................................................................................................316 Using the PeopleSoft Security Bridge..................................................................................318 JD Edwards authentication...................................................................................................328 Overview..............................................................................................................................328 Enabling JD Edwards EnterpriseOne authentication..............................................................328 Mapping JD Edwards EnterpriseOne roles to BI Platform.....................................................329 Scheduling user updates......................................................................................................332 Siebel authentication............................................................................................................333 Enabling Siebel authentication..............................................................................................334 Mapping roles to BI platform................................................................................................334 Scheduling user updates......................................................................................................337 Oracle EBS authentication...................................................................................................339 Enabling Oracle EBS authentication......................................................................................339 Mapping Oracle E-Business Suite roles to BI platform..........................................................340 Unmapping roles .................................................................................................................344 Customizing rights for mapped Oracle EBS groups and users .............................................344 Configuring Single Sign-on (SSO) for SAP Crystal Reports and Oracle EBS........................346 Server Administration..........................................................................................................347 Server administration...........................................................................................................347 Working with the Servers management area in the CMC.....................................................347 Managing servers by using scripts on Windows ..................................................................351 Managing servers on Unix ...................................................................................................351 Managing License keys........................................................................................................351 Measuring licenses..............................................................................................................353 Viewing and changing a server's status................................................................................354 Adding, cloning, or deleting servers......................................................................................359

9.1 9.1.1 9.1.2 9.1.3 9.1.4 9.1.5 9.1.6 9.1.7

8

2012-08-17

Contents

9.1.8 9.1.9 9.1.10 9.1.11 9.1.12 9.1.13 9.1.14 9.1.15 9.1.16Chapter 10

Clustering Central Management Servers..............................................................................362 Managing server groups.......................................................................................................366 Assessing your system's performance.................................................................................371 Configuring server settings..................................................................................................373 Configuring server network settings.....................................................................................377 Managing Nodes..................................................................................................................384 Renaming a machine in a BI platform deployment.................................................................406 Using 32-bit and 64-bit third-party libraries with BI platform..................................................412 Managing server and node placeholders..............................................................................413 Managing Central Management Server (CMS) databases.................................................415 Managing CMS system database connections.....................................................................415 To select SAP HANA as a CMS database...........................................................................415 Selecting a new or existing CMS database..........................................................................416 To select a new or existing CMS database on Windows......................................................417 To select a new or existing CMS database on Unix..............................................................417 Recreating the CMS system database.................................................................................418 To recreate the CMS system database on Windows............................................................418 To recreate the CMS system database on Unix...................................................................419 Copying data from one CMS system database to another...................................................420 Preparing to copy a CMS system database.........................................................................420 To copy a CMS system database on Windows....................................................................421 To copy data from a CMS system database on Unix............................................................421 Managing Web Application Container Servers (WACS).....................................................423 WACS.................................................................................................................................423 Web Application Container Server (WACS).........................................................................423 Adding or removing additional WACS to your deployment...................................................426 Adding or removing services to WACS................................................................................430 Configuring HTTPS/SSL......................................................................................................431 Supported authentication methods.......................................................................................435 Configuring AD Kerberos for WACS ...................................................................................436 Configuring AD Kerberos single sign-on ..............................................................................442 Configuring RESTful web services........................................................................................444 WACS and your IT environment...........................................................................................448 Configuring web application properties.................................................................................451 Troubleshooting...................................................................................................................452 WACS properties.................................................................................................................456

10.1 10.1.1 10.2 10.2.1 10.2.2 10.3 10.3.1 10.3.2 10.4 10.4.1 10.4.2 10.4.3Chapter 11

11.1 11.1.1 11.1.2 11.1.3 11.1.4 11.1.5 11.1.6 11.1.7 11.1.8 11.1.9 11.1.10 11.1.11 11.1.12

9

2012-08-17

Contents

Chapter 12

Backing Up and Restoring..................................................................................................457 Backing up and restoring your system..................................................................................457 Backups...............................................................................................................................458 Restoring your system.........................................................................................................464 BackupCluster and RestoreCluster scripts...........................................................................472 Copying your deployment...................................................................................................477 Overview of system copying................................................................................................477 Terminology.........................................................................................................................477 Use cases............................................................................................................................477 Planning to copy your system...............................................................................................479 Considerations and limitations..............................................................................................480 System copy procedure.......................................................................................................482 To perform a system copy export from a source system......................................................482 To perform a system copy import to a target system...........................................................485 Version Management..........................................................................................................487 liveManaging Different Versions of BI resources .................................................................487 Using the Version Management System Settings Option.....................................................488 Setting the ClearCase Version Management System in Windows.......................................489 Setting the ClearCase Version Management System in Unix...............................................489 Comparing different versions of an LCM job........................................................................490 Upgrading Subversion content.............................................................................................490 Promotion Management......................................................................................................493 Welcome to promotion management....................................................................................493 Promotion Management Overview.......................................................................................493 Promotion Management Features........................................................................................493 Application Access Rights....................................................................................................494 Getting Started with the promotion management tool..........................................................495 Accessing the promotion management application...............................................................495 User Interface components..................................................................................................495 Using the Settings Option....................................................................................................497 Using the promotion management tool.................................................................................503 Creating and Deleting a Folder.............................................................................................504 Creating a Job.....................................................................................................................505 Creating a New Job by Copying an Existing Job .................................................................508 Searching for a Job..............................................................................................................508 Editing a Job........................................................................................................................509

12.1 12.1.1 12.1.2 12.1.3Chapter 13

13.1 13.2 13.3 13.4 13.5 13.6 13.6.1 13.6.2Chapter 14

14.1 14.2 14.2.1 14.2.2 14.3 14.4Chapter 15

15.1 15.1.1 15.1.2 15.1.3 15.2 15.2.1 15.2.2 15.2.3 15.3 15.3.1 15.3.2 15.3.3 15.3.4 15.3.5

10

2012-08-17

Contents

15.3.6 15.3.7 15.3.8 15.3.9 15.3.10 15.3.11 15.3.12 15.3.13 15.4 15.4.1 15.4.2 15.5 15.5.1 15.5.2 15.5.3 15.5.4 15.6 15.6.1 15.6.2 15.6.3Chapter 16

Adding an Infoobject in promotion management...................................................................509 Managing Dependencies in promotion management ...........................................................510 Searching for Dependents ..................................................................................................511 Promoting a Job When the Repositories are Connected......................................................512 Promoting a Job by Using a BIAR File..................................................................................514 Scheduling a job promotion..................................................................................................517 Viewing the History of a Job................................................................................................518 Rolling Back a Job...............................................................................................................519 Managing Different Versions of an Infoobject.......................................................................521 Version Management application access rights....................................................................523 Backing Up and Restoring Subversion Files.........................................................................523 Using the Command Line Option.........................................................................................524 Running the Command Line Option in Windows...................................................................525 Running the Command Line Option in UNIX.........................................................................525 Command Line Option Parameters......................................................................................526 Sample Properties File.........................................................................................................532 Using the Enhanced Change and Transport System.............................................................533 Pre-requisites.......................................................................................................................534 Configuring the Business Intelligence Platform and CTS+ Integration...................................534 Promoting a Job Using CTS.................................................................................................539 Visual Difference.................................................................................................................543 Visual Difference in the promotion management tool............................................................543 Comparing objects or files by using visual difference...........................................................544 Comparing objects or files in version management system..................................................545 Scheduling the comparison..................................................................................................546 Managing Applications.......................................................................................................549 Managing applications through the CMC..............................................................................549 Overview..............................................................................................................................549 Common settings for applications........................................................................................550 Application-specific settings.................................................................................................551 Managing applications through BOE.war properties.............................................................579 The BOE war file..................................................................................................................579 Customizing BI launch pad and OpenDocument logon entry points......................................588 BI launch pad and OpenDocument file locations...................................................................588 To define a custom logon page............................................................................................589 To add trusted authentication at logon..................................................................................590

16.1 16.1.1 16.1.2 16.1.3Chapter 17

17.1 17.1.1 17.1.2 17.1.3 17.2 17.2.1 17.3 17.3.1 17.3.2 17.3.3

11

2012-08-17

Contents

Chapter 18

Managing Connections and Universes...............................................................................593 Managing connections.........................................................................................................593 To delete a universe connection...........................................................................................593 Managing universes.............................................................................................................594 To delete universes..............................................................................................................594 Monitoring...........................................................................................................................595 About Monitoring.................................................................................................................595 Monitoring terms..................................................................................................................595 Architecture.........................................................................................................................597 Cluster support for monitoring server...................................................................................600 Metrics................................................................................................................................601 CMS Query metrics.............................................................................................................613 Configuration properties.......................................................................................................613 JMX end point URL..............................................................................................................618 Integrating with other applications........................................................................................619 Integrating the monitoring application with IBM Tivoli............................................................619 Integrating the monitoring application with SAP Solution Manager ......................................622 Creating Universe for Derby Database.................................................................................623 Audit DB Support for Monitoring .........................................................................................624 Pre-Requisites......................................................................................................................624 Configuring SBO files..........................................................................................................624 Adding alias names in the SBO file ......................................................................................626 Monitoring Database Migration............................................................................................626 Pre-requisites.......................................................................................................................627 Preparing the Target Database ............................................................................................627 Creating CSV dumps...........................................................................................................627 Restoring contents on the target database...........................................................................628 Validating the Migration .......................................................................................................629 Troubleshooting...................................................................................................................629 Dashboard...........................................................................................................................629 Alerts...................................................................................................................................630 Watchlist..............................................................................................................................630 Probes.................................................................................................................................631 Metrics................................................................................................................................631 Graph...................................................................................................................................632 Auditing...............................................................................................................................633 Overview..............................................................................................................................633

18.1 18.1.1 18.2 18.2.1Chapter 19

19.1 19.2 19.2.1 19.3 19.4 19.4.1 19.5 19.5.1 19.6 19.6.1 19.6.2 19.7 19.8 19.8.1 19.8.2 19.8.3 19.9 19.9.1 19.9.2 19.9.3 19.9.4 19.9.5 19.10 19.10.1 19.10.2 19.10.3 19.10.4 19.10.5 19.10.6Chapter 20

20.1

12

2012-08-17

Contents

20.2 20.2.1 20.2.2 20.2.3 20.3 20.3.1Chapter 21

CMC Auditing page.............................................................................................................639 Auditing Status Summary.....................................................................................................639 Configuring Auditing events.................................................................................................641 Auditing Data Store configuration settings...........................................................................643 Audit events.........................................................................................................................644 Audit events and details.......................................................................................................653 Platform Search...................................................................................................................673 Understanding Platform Search............................................................................................673 Platform Search SDK...........................................................................................................673 Clustered Environment.........................................................................................................674 Setting Up Platform Search..................................................................................................674 Deploying OpenSearch........................................................................................................674 Configuring reverse proxy....................................................................................................676 Configuring Application Properties in CMC..........................................................................676 Working with Platform Search..............................................................................................681 Indexing Content in the CMS Repository.............................................................................681 Searching Results................................................................................................................683 Integrating Platform Search with SAP NetWeaver Enterprise Search...................................690 Creating a Connector in SAP NetWeaver Enterprise Search ...............................................690 Importing a User's Role in SAP BusinessObjects Business Intelligence Authentication........691 Searching from NetWeaver Enterprise Search.....................................................................691 Auditing................................................................................................................................692 Troubleshooting...................................................................................................................693 Self Healing..........................................................................................................................693 Problem Scenarios...............................................................................................................693 Federation...........................................................................................................................697 Federation............................................................................................................................697 Federation terms..................................................................................................................698 BI application .......................................................................................................................698 Destination site ...................................................................................................................699 Local....................................................................................................................................699 Locally run completed instances ..........................................................................................699 Multiple origin sites .............................................................................................................699 One-way replication .............................................................................................................699 Origin site ...........................................................................................................................700 Remote................................................................................................................................700 Remote connection..............................................................................................................700 Remote scheduling..............................................................................................................700

21.1 21.1.1 21.1.2 21.2 21.2.1 21.2.2 21.2.3 21.3 21.3.1 21.3.2 21.4 21.4.1 21.4.2 21.5 21.6 21.7 21.7.1 21.7.2Chapter 22

22.1 22.2 22.2.1 22.2.2 22.2.3 22.2.4 22.2.5 22.2.6 22.2.7 22.2.8 22.2.9 22.2.10

13

2012-08-17

Contents

22.2.11 22.2.12 22.2.13 22.2.14 22.2.15 22.2.16 22.2.17 22.3 22.3.1 22.3.2 22.3.3 22.3.4 22.3.5 22.4 22.4.1 22.4.2 22.4.3 22.5 22.6 22.7 22.7.1 22.7.2 22.8 22.8.1 22.8.2 22.9 22.9.1 22.9.2 22.9.3 22.9.4 22.10 22.10.1 22.10.2 22.10.3 22.11 22.11.1 22.11.2 22.12 22.12.1 22.12.2 22.12.3

Replication...........................................................................................................................700 Replication job.....................................................................................................................700 Replication list......................................................................................................................701 Replication object.................................................................................................................701 Replication package.............................................................................................................701 Replication refresh...............................................................................................................701 Two-way replication..............................................................................................................701 Managing security rights......................................................................................................702 Rights required on the origin site..........................................................................................702 Rights required on the destination site.................................................................................703 Federation-specific rights.....................................................................................................704 Replicating security on an object..........................................................................................706 Replicating security using access levels...............................................................................706 Replication types and mode options.....................................................................................707 One-way replication .............................................................................................................707 Two-way replication .............................................................................................................707 Refresh from origin or refresh from destination....................................................................708 Replicating third-party users and groups...............................................................................709 Replicating universes and universe connections...................................................................710 Managing replication lists.....................................................................................................711 Creating replication lists.......................................................................................................712 Modifying Replication Lists...................................................................................................714 Managing remote connections.............................................................................................715 Creating remote connections...............................................................................................715 Modifying remote connections.............................................................................................717 Managing replication jobs.....................................................................................................718 Creating replication jobs.......................................................................................................718 Scheduling replication jobs...................................................................................................721 Modifying replication jobs.....................................................................................................722 Viewing a log after a replication job......................................................................................722 Managing object cleanup......................................................................................................723 How to use object cleanup...................................................................................................723 Object cleanup limits............................................................................................................724 Object cleanup frequency.....................................................................................................724 Managing conflict detection and resolution...........................................................................725 One-way replication conflict resolution.................................................................................726 Two-way replication conflict resolution.................................................................................727 Using Web Services in Federation.......................................................................................730 Session variables ................................................................................................................730 File caching .........................................................................................................................731 Custom deployment ............................................................................................................731

14

2012-08-17

Contents

22.13 22.13.1 22.13.2 22.13.3 22.14 22.14.1 22.14.2 22.14.3 22.14.4 22.15 22.15.1 22.15.2Chapter 23

Remote scheduling and locally run instances........................................................................732 Remote scheduling..............................................................................................................732 Locally run instances............................................................................................................733 Instance share......................................................................................................................734 Importing and promoting replicated content..........................................................................735 Importing replicated content.................................................................................................735 Importing replicated content and continuing replication ........................................................735 Promoting content from a test environment..........................................................................736 Re-pointing a destination site...............................................................................................737 Best practices......................................................................................................................737 Current release limitations....................................................................................................740 Troubleshooting error messages..........................................................................................741 Supplementary Configurations for ERP Environments........................................................745 Configurations for SAP NetWeaver integration....................................................................745 Integrating with SAP NetWeaver Business Warehouse (BW)...............................................745 Configuring for JD Edwards integration................................................................................793 Configuring Single Sign-on (SSO) for SAP Crystal Reports.................................................794 Configuring Secure Socket Layer for JD Edwards Integrations............................................794 Configuring for PeopleSoft Enterprise integration.................................................................796 Configuring Single Sign-on (SSO) for SAP Crystal Reports and PeopleSoft Enterprise........796 Configuring Secure Socket Layer communication................................................................797 Performance Tuning for PeopleSoft systems........................................................................799 Configuring for Siebel integration.........................................................................................800 Configuring Siebel to integrate with SAP BusinessObjects Business Intelligence platform....800 Creating the Crystal Reports menu item..............................................................................801 Contextual awareness..........................................................................................................803 Configuring Single Sign-on (SSO) for SAP Crystal Reports and Siebel................................805 Configuring for Secure Sockets Layer Communication........................................................806 Managing and Configuring Logs.........................................................................................807 Logging traces from components.........................................................................................807 Trace log levels....................................................................................................................807 Configuring tracing for servers.............................................................................................808 To set the server trace log level in the CMC........................................................................809 To set the trace log level for multiple servers managed in the CMC.....................................809 To configure server tracing through the BO_trace.ini file......................................................810 Configuring tracing for web applications...............................................................................813 To set the web application trace log level in the CMC..........................................................813 To manually modify tracing settings through the BO_trace.ini file.........................................814

23.1 23.1.1 23.2 23.2.1 23.2.2 23.3 23.3.1 23.3.2 23.3.3 23.4 23.4.1 23.4.2 23.4.3 23.4.4 23.4.5Chapter 24

24.1 24.2 24.3 24.3.1 24.3.2 24.3.3 24.4 24.4.1 24.4.2

15

2012-08-17

Contents

24.5 24.6 24.6.1Chapter 25

Configuring tracing for Web Intelligence applications............................................................819 Configuring tracing for upgrade management tool................................................................819 To configure tracing for upgrade management tool...............................................................819 Integration to SAP Solution Manager..................................................................................821 Integration overview.............................................................................................................821 SAP Solution Manager integration checklist.........................................................................821 Managing system landscape directory registration...............................................................823 Registration of BI platform in the System Landscape...........................................................823 When is SLD registration triggered?....................................................................................824 Logging SLD connectivity ...................................................................................................825 Managing Solution Management Diagnostics agents...........................................................825 Solution Manager Diagnostics (SMD) overview...................................................................825 Working with SMD agents...................................................................................................826 SMAdmin user account........................................................................................................826 Managing performance instrumentation................................................................................827 Performance instrumentation for BI platform........................................................................827 Setting up performance instrumentation for BI platform........................................................827 Performance instrumentation for the web tier.......................................................................829 Instrumentation log files ......................................................................................................829 Tracing with SAP Passport...................................................................................................829 Command Line Administration............................................................................................831 Unix scripts..........................................................................................................................831 Script utilities.......................................................................................................................831 Script templates...................................................................................................................837 Scripts used by SAP BusinessObjects Business Intelligence platform.................................837 Windows scripts..................................................................................................................839 ccm.exe...............................................................................................................................839 Server Command Lines........................................................................................................842 Command lines overview.....................................................................................................842 Standard options for all servers............................................................................................843 Central Management Server................................................................................................844 Crystal Reports Processing Server and Crystal Reports Cache Server................................845 Dashboards Processing Server and Dashboards Cache Server...........................................846 Job servers..........................................................................................................................847 Adaptive Processing Server.................................................................................................848 Report Application Server....................................................................................................849 Web Intelligence Processing Server.....................................................................................850 Input and Output File Repository Servers.............................................................................852

25.1 25.2 25.3 25.3.1 25.3.2 25.3.3 25.4 25.4.1 25.4.2 25.4.3 25.5 25.5.1 25.5.2 25.5.3 25.5.4 25.6Chapter 26

26.1 26.1.1 26.1.2 26.1.3 26.2 26.2.1 26.3 26.3.1 26.3.2 26.3.3 26.3.4 26.3.5 26.3.6 26.3.7 26.3.8 26.3.9 26.3.10

16

2012-08-17

Contents

26.3.11 26.3.12Chapter 27

Event Server........................................................................................................................852 Dashboard and Dashboard Analytics Servers .....................................................................853 Rights Appendix..................................................................................................................855 About the rights appendix.....................................................................................................855 General rights......................................................................................................................855 Rights for specific object types............................................................................................858 Folder rights.........................................................................................................................858 Categories...........................................................................................................................858 Notes...................................................................................................................................859 Crystal reports.....................................................................................................................859 Web Intelligence documents................................................................................................860 Users and groups.................................................................................................................861 Access levels.......................................................................................................................862 Universe (.unv) rights...........................................................................................................863 Universe (.unx) rights...........................................................................................................864 Universe object-access levels..............................................................................................866 Connection rights.................................................................................................................867 Applications.........................................................................................................................869 Server Properties Appendix.................................................................................................881 About the server properties appendix...................................................................................881 Common server properties..................................................................................................881 Core Services properties.....................................................................................................884 Connectivity Services properties..........................................................................................898 Crystal Reports Services properties....................................................................................903 Analysis Services properties................................................................................................912 Data Federation Services properties....................................................................................914 Web Intelligence Services properties...................................................................................915 Dashboards Services properties..........................................................................................926 Server Metrics Appendix.....................................................................................................931 About the Server Metrics Appendix.....................................................................................931 Common Server Metrics .....................................................................................................931 Central Management Server Metrics...................................................................................934 Connection Server metrics...................................................................................................938 Event Server Metrics...........................................................................................................939 File Repository Server Metrics.............................................................................................940 Adaptive Processing Server metrics.....................................................................................940 Web Application Container Server Metrics..........................................................................946

27.1 27.2 27.3 27.3.1 27.3.2 27.3.3 27.3.4 27.3.5 27.3.6 27.3.7 27.3.8 27.3.9 27.3.10 27.3.11 27.3.12Chapter 28

28.1 28.1.1 28.1.2 28.1.3 28.1.4 28.1.5 28.1.6 28.1.7 28.1.8Chapter 29

29.1 29.1.1 29.1.2 29.1.3 29.1.4 29.1.5 29.1.6 29.1.7

17

2012-08-17

Contents

29.1.8 29.1.9 29.1.10 29.1.11Chapter 30

Adaptive Job Server metrics................................................................................................946 Crystal Report Server metrics..............................................................................................949 Web Intelligence Server metrics...........................................................................................952 Dashboards Server metrics..................................................................................................954 Server and Node Placeholder Appendix..............................................................................957 Server and node placeholders..............................................................................................957 Auditing Data Store Schema Appendix...............................................................................971 Overview..............................................................................................................................971 Schema diagram..................................................................................................................971 Auditing Data Store tables...................................................................................................972 System Copy Worksheet.....................................................................................................983 System copy worksheet.......................................................................................................983 More Information.................................................................................................................985 987

30.1Chapter 31

31.1 31.2 31.3Chapter 32

32.1Appendix A Index

18

2012-08-17

Document History

Document History

The following table provides an overview of the most important document changes.Version Date Description

SAP BusinessObjects Business Intelligence platform 4.0

Nov. 2011

First release of this document.

SAP BusinessObjects Business Intelligence platform 4.0 Feature Pack 3

March 2012

Additions to this release: Importing users and groups in bulk using the CCM Extending attributes for both imported and Enterprise user accounts Using the LDAP plugin to configure single sign-on to a SAP HANA database through JDBC SQL Anywhere as an ODBC data source. For node management with SQL Anywhere on Unix machines, see To prepare a Unix machine for SQL Anywhere. Best practices designed to prevent issues that can arise as a result of changes to machine names, IP addresses, cluster names, and server names Selecting SAP HANA as a CMS database after the initial installation of BI platform Configuring the RESTful Web Service hosted on a WACS server Performing a "hot backup" (creating a backup copy without having to stop servers) Creating a copy of a BI platform deployment for testing, standby, or other purposes Enabling and configuring integration details for the SAP StreamWork application Creating and assigning tasks to delegated administrators Self-healing mechanism for Platform Search In addition, all references to role-based licensing, BI Analyst and BI Viewer user accounts were removed.

Related Topics To add users or user groups in bulk

19

2012-08-17

Document History

Managing attributes for system users Using the LDAP plugin to configure SSO to the SAP HANA database To prepare a Unix machine for SQL Anywhere To select SAP HANA as a CMS database Configuring RESTful web services Hot backups Overview of system copying Managing SAP StreamWork integration Delegated administration and CMC tab access Self Healing

20

2012-08-17

Getting Started

Getting Started

2.1 About this helpThis help provides you with information and procedures for deploying and configuring your BI platform. Procedures are provided for common tasks. Conceptual information and technical details are provided for all advanced topics. For information about installing this product, see the SAP BusinessObjects Business Intelligence Platform Installation Guide.

2.1.1 Who should use this help?This help covers deployment and configuration tasks. We recommend consulting this guide if you are: planning your first deployment configuring your first deployment making significant changes to the architecture of an existing deployment improving your system's performance.

This help is intended for system administrators who are responsible for configuring, managing, and maintaining a BI platform installation. Familiarity with your operating system and your network environment is beneficial, as is a general understanding of web application server management and scripting technologies. However, to assist all levels of administrative experience, this help aims to provide sufficient background and conceptual information to clarify all administrative tasks and features.

2.1.2 About SAP BusinessObjects Business Intelligence platformThe BI platform is a flexible, scalable, and reliable solution for delivering powerful, interactive reports to end users via any web applicationintranet, extranet, Internet or corporate portal. Whether it is used for distributing weekly sales reports, providing customers with personalized service offerings, or integrating critical information into corporate portals, BI platform delivers tangible benefits that extend

21

2012-08-17

Getting Started

across and beyond the organization. As an integrated suite for reporting, analysis, and information delivery, the platform provides a solution for increasing end-user productivity and reducing administrative efforts.

2.1.3 VariablesThe following variables are used throughout this guide:Variable Description

The directory where BI platform is installed. On Windows, the default directory is C:\Program Files (x86)\SAP BusinessObjects\. The name of your Unix operating system. Acceptable values are: aix_rs6000_64 linux_x64 solaris_sparcv9 hpux_ia64 The directory where scripts for administering BI platform are located On Windows: \SAP BusinessObjects Enterprise XI 4.0\win64_x64\scripts On Unix: /sap_bobj/enterprise_xi40//scripts

2.2 Before you start

2.2.1 Key concepts

22

2012-08-17

Getting Started

2.2.1.1 Services and serversBI platform uses service and server to refer to the two types of software running on a BI platform computer. A service is a server subsystem that performs a specific function. The service runs in the memory space of its server, under the process ID of the parent container (server). For example, the Web Intelligence Scheduling Service is a subsystem that runs on the Adaptive Job Server. A server is a process at the operating system level (on some systems, called a daemon) that hosts one or more services. For example, the Central Management Server (CMS) and Adaptive Processing Server are servers. A server runs on a specific operating system account and has its own PID. A node is a collection of BI platform servers running on the same host and managed by the same Server Intelligence Agent (SIA). One or more nodes can be on a single host. BI platform can be installed on one computer, spread across different computers on an intranet, or separated over a wide area network (WAN). Services, servers, nodes, and hosts The following diagram shows a hypothetical installation of BI platform. The number of services, servers, nodes, and hostsand the type of services and serversvaries in actual installations.

23

2012-08-17

Getting Started

Two hosts form the cluster named ProductionBISystem, which has two hosts: The host named HostAlpha has BI platform installed and is configured with two nodes: NodeMercury contains an Adaptive Job Server (NodeMercury.AJS) with services to schedule and publish reports, an Input File Repository Server (NodeMercury.IFRS) with a service to store input reports, and an Output File Repository Server (NodeMercury.OFRS) with a service to store report output. NodeVenus contains an Adaptive Processing Server (NodeVenus.APS) with services to provide publishing, monitoring, and translation features, an Adaptive Processing Server (Node Venus.APS2) with a service to provide client auditing, and a Central Management Server (NodeVenus.CMS) with a service to provide the CMS services.

The host named HostBeta has BI platform installed and is configured with three nodes: NodeMars contains a Central Management Server (NodeMars.CMS) with a service to provide CMS services. Having the CMS on two computers enables load balancing and mitigation and failover capabilities. NodeJupiter contains an Web Intelligence Processing Server (NodeJupiter.WebIntelli gence) with a service to provide Web Intelligence reporting and an Event Server (Node Jupiter.EventServer) to provide report monitoring of files.

24

2012-08-17

Getting Started

NodeSaturn contains an Adaptive Processing Server (NodeSaturn.APS) with a service to provide client auditing.

Related Topics Server administration

2.2.1.2 Server IntelligenceServer Intelligence is a core component of Business Intelligence platform. Changes to server processes applied in the Central Management Console (CMC) are propagated to corresponding server objects by the CMS. The Server Intelligence Agent (SIA) is used to automatically restart or shut down a server when it encounters an unexpected condition and is used by the Administrator to manage a node. The CMS archives information about servers in the CMS system database so you can easily restore default server settings or create redundant instances of server processes with the same settings. Because the SIA periodically queries the CMS to request information about servers it manages, the SIA knows which state servers should be in and when to take action. Note: A single computer can contain multiple nodes, and the nodes can be in the same BI platform cluster or in different clusters.

2.2.2 Key administrative tools

2.2.2.1 Central Management Console (CMC)

The Central Management Console (CMC) is a web-based tool that you use to perform administrative tasks (including user, content, and server management) and to configure security settings. Because the CMC is a web-based application, you can perform all of the administrative tasks in a web browser on any computer that can connect to the web application server.

25

2012-08-17

Getting Started

All users can log on to the CMC to change their own preference settings. Only members of the Administrators group can change management settings, unless a user is explicitly granted rights to do so. Roles can be assigned in the CMC to grant user privileges to perform minor administrative tasks, such as managing users in your group and managing reports in folders that belong to your team.

2.2.2.2 Central Configuration ManagerThe Central Configuration Manager (CCM) is a server troubleshooting and node management tool that is provided in two forms. On Windows, you use the CCM to manage local and remote servers, in the CCM user interface (UI) or from a command line. On Unix, you use the CCM shell script (ccm.sh) to manage servers from a command line. The CCM allows you to create and configure nodes and to start or stop your web application server, if it is the default bundled Tomcat web application server. On Windows, you can use the CCM to configure network parameters, such as Secure Socket Layer (SSL) encryption. The parameters apply to all servers in a node. Note: Most server management tasks are handled in the CMC, not the CCM. The CCM is used for troubleshooting and node configuration.

2.2.2.3 Repository Diagnostic Tool

26

2012-08-17

Getting Started

The Repository Diagnostic Tool (RDT) can scan, diagnose, and repair inconsistencies that may occur between the Central Management Server (CMS) system database and the File Repository Servers (FRS) filestore. You can set a limit for the number of errors the RDT will find and repair before stopping. RDT should be used after you restore your BI platform system.

2.2.2.4 Upgrade management toolUpgrade management tool (formerly Import Wizard) is installed as a part of SAP BusinessObjects Business Intelligence platform, and guides administrators through the process of importing users, groups, and folders from previous versions of SAP BusinessObjects Business Intelligence platform. It also allows you to import an